On 4/10/17 2:08 PM, Eric Scace wrote:
This approach is known as “security through obscurity”, and is deprecated in
the professional of information security. What one invents, another can
discover.
The most secure systems use well-documented algorithms with open-source
software — widely scrutinized for bugs or implants, and therefore with
well-understood performance limitations. The secrecy comes from good crypto key
management.
The M-code is described in a fair amount of detail here:
www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA456656
_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.