muddle
An a/c to announce, explain and discuss "muddle"
"muddle" is a "deniable encryption" scheme which I discovered (and maybe invented).
It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks.
Please follow, boost or @ me
Posts
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
https://www.youtube.com/watch?v=Ft9MCAwxjyA
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
These "active clubs" seem like they could be a good thing to fake. We could learn how they operate and provide a good facsimile, but without the right-wing radicalisation.
Or maybe we're already doing that?
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
https://www.irishtimes.com/politics/2026/03/14/michael-healy-rae-what-does-irelands-wealthiest-td-own-and-what-is-it-worth/
#StiffCompetition
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Speaking of, it will be interesting to see if/how civil society in Hungary can rid itself of such ideological appointees now that the climate seems to be shifting...
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
#RuinABrandOrSlogan
#HashTagGames
#NeedsNoExplanation
#GodwinWuzHere
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
I'd consider myself a recent convert to pessimism, inspired by Camus and the essay he wrote about pessimism being the moral choice. It ends with the line "consider Sisyphus happy," IIRC.
Just one other thing, and I think someone pretty much touched on it without giving a concrete example (talking about the precautionary principle), I don't think that the Y2K problem was solved by optimists. I think that it was pessimists that saw a problem, enumerated all the various reasons this could be very bad as well as the obstacles to achieving the required fixes, and then, turned that into action.
Actually one final, final thing, and that's that I appreciate that you do (IIRC) tease out differences between outlook (optimism vs pessimism) and the ideas of hope and action. I just believe that both of those are at least achievable by starting with a pessimistic view, and maybe (as I said, I'm a pessimist) that's an even better starting point than optimism. That said, both starting points can end up being an excuse not to hope or not to act. I don't have any problems with optimistic people (I don't consider it to be an automatic character flaw) but I think it might be worth considering the opposite view as well.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
(including me, if I have)
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
The platform has been transformed algorithmically to help turn it into a Nazi bar, but moderation is hard. Because of, as you know, people...
(with apologies to @Horse_ebooks )
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
So they adapt to build anti-distillation agent skills, just as the intellectuals adapted after the Anti-Rightist trap.
We are already seeing agent skills built specifically for job security. The performative skill looks comprehensive and demos well but omits the 20% of edge-case knowledge that makes it work in production — you are now more indispensable, not less. The poison pill encodes expertise faithfully but with subtle dependencies on context only you hold — internal wikis you maintain, terminology you coined, data pipelines you own — so removing you causes outputs to drift quietly until someone says “we need to bring them back on this.” The complexity moat makes the skill so architecturally entangled with your other work that extracting your knowledge is harder than keeping you around. You are now a load-bearing wall disguised as a decoration.
I wonder if this is something similar to the last AI boom, the one based on expert systems. I know that the technology had its limitations (but at least it was deterministic and actually included checkable logic) but one major reason that's often given for its failure was the sheer cost of encoding domain-specific knowledge. Maybe an unwritten part of the problem was that experts weren't particularly keen to make themselves redundant?
Anyway, mighty fine points raised there.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
[Thailand's authentic athlete's foot cream 25g] https://world.taobao.com/lang/en-us/goods/-100107358873.htm
(not a recommendation, although I do have a photo of a billboard in Thailand advertising something similar... it probably says something like "nobody knows the athlete's foot like the athlete's foot." Then again, I know of a shoe shop in Japan that's just called "Shoe" so idk.. things are just themselves-in-themselves? Let's just leave them at that... )
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
It's an idea I toyed with a long time ago (for a different application) and I'd be delighted to find out that someone else might be using the same thing.
Again, it's all just about seeing the / sign and jumping to (probably unwarranted) conclusions.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Because he's a bully. Like all bullies, he only escalates if he thinks he can get away with it. This is his constant calculation. He learns when and where there is pushback and he avoids similar situations because he fears being exposed. At the same time, he always attacking what he thinks are the easiest targets. When he succeeds in gaining a capitulation, he feels validated.
On the other hand, when we push back, we expose his weakness and the essential hollowness of him and his threats. He might trial (as all trolls do) pushing against the boundaries, but in the end we all know (as does he, deep down) that he will back down in the face of real opposition.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
Thanks for all the poems, by the way. They may not be an antidote to all the craziness in the world, but they help.
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
(more of a series of short stories than poems, perhaps, tho I admit I'm not good at either)
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
https://www.youtube.com/watch?v=W_E8sC6Osns
(I think they use the phrase/sample "translunar injection burn" but I'm not 100% sure)
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me
An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me