• Sign in
  • Sign up
Elektrine
EN
Log in Register
Modes
Overview Chat Timeline Communities Gallery Lists Friends Email Vault DNS VPN
Back to Timeline
  • Open on infosec.exchange

muddle

@muddle@infosec.exchange
mastodon 4.6.0-alpha.7+glitch

An a/c to announce, explain and discuss "muddle"

"muddle" is a "deniable encryption" scheme which I discovered (and maybe invented).
It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks.
Please follow, boost or @ me
0 Followers
0 Following
Joined February 23, 2025

Posts

Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 2d ago
@jayflo @brianbilston I think I was confusing him with Mr. Chombee...

https://www.youtube.com/watch?v=Ft9MCAwxjyA
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 2d ago
@brianbilston I got lost after rafe sinjin chomley...
1
2
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 3d ago
@mast0d0nphan @geekysteven I was going to reply to the original post (geekysteven's) and mention that if we didn't have any morals, we'd be setting up fake right-wing organisations in order to chase the billionaire dollars and use it to fund a secret resistance.

These "active clubs" seem like they could be a good thing to fake. We could learn how they operate and provide a good facsimile, but without the right-wing radicalisation.

Or maybe we're already doing that?
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@DocAtCDI mine took a left turn as it was transiting between me small and large intestines. Now I've got appendixitis.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@0xabad1dea Isn't that the default for all Dutch speakers?
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@bruces whose personal Nam(shub (of Enki)) was this?
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@brianbilston You do know youl'll be up agin the Healy-Raes if you ever decide to come to Kerry?

https://www.irishtimes.com/politics/2026/03/14/michael-healy-rae-what-does-irelands-wealthiest-td-own-and-what-is-it-worth/

#StiffCompetition
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@Alice also therapy-style roles that can safely reintegrate the cultists back into "polite society."
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 4d ago
@austinkocher I think it can be both personal revenge (Trump has form on this) and part of a broader strategy. That strategy is like the Reagan-era policy of redeploying "awkward" civil servants to posts where they can't do as much harm (there's also an element of "punishment" in this). Or it could be like a Gulenist-style infiltration of the apparatus of the government. Or perhaps a better comparison would be with how the right wing in the US takes its lead from places like Orbán's Hungary.

Speaking of, it will be interesting to see if/how civil society in Hungary can rid itself of such ideological appointees now that the climate seems to be shifting...
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 6d ago
@davidgerard Hmm. If you put an immovable object perpendicular to an unstoppable force, would you create a wormhole at 45 degrees? Or do you have to locate the immovable object and unstoppable forces in different verses?
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 6d ago
@metin well that's just peachy!
1
0
0
0
Open post
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · 6d ago
Hugo Boss, outfitters to the Nazis

#RuinABrandOrSlogan
#HashTagGames
#NeedsNoExplanation
#GodwinWuzHere
infosec.exchange

Infosec Exchange

13
0
4
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@citc yes, you are 100 right the eu's errelevence
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@citc "thoughts and prayer"
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@EUCommission "Hope is action." Really?
1
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@drwho @GGMcBG @beyondmachines1 hey! duck sphinx! I wrote a micro story about that the other day!
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@beyondmachines1 :rubberduck:
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 12, 2026
@Daojoan Usually I agree with things you say in your articles, but I don't agree with this. For one thing, I think that maybe you're equating pessimism with defeatism in certain sections. Also, I think that some of your criticisms (especially the labelling "competitive pessimism") is more about the media than pessimism as a personal approach, if that makes sense.

I'd consider myself a recent convert to pessimism, inspired by Camus and the essay he wrote about pessimism being the moral choice. It ends with the line "consider Sisyphus happy," IIRC.

Just one other thing, and I think someone pretty much touched on it without giving a concrete example (talking about the precautionary principle), I don't think that the Y2K problem was solved by optimists. I think that it was pessimists that saw a problem, enumerated all the various reasons this could be very bad as well as the obstacles to achieving the required fixes, and then, turned that into action.

Actually one final, final thing, and that's that I appreciate that you do (IIRC) tease out differences between outlook (optimism vs pessimism) and the ideas of hope and action. I just believe that both of those are at least achievable by starting with a pessimistic view, and maybe (as I said, I'm a pessimist) that's an even better starting point than optimism. That said, both starting points can end up being an excuse not to hope or not to act. I don't have any problems with optimistic people (I don't consider it to be an automatic character flaw) but I think it might be worth considering the opposite view as well.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@0xabad1dea It's almost like you were visiting Japan... your Japanese is great... can you use chopsticks?
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@brianbilston sorry if I've been over-replying to your daily poems but "may the forces of evil get confused on their way to your door"

(including me, if I have)
1
2
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@danirabbit I made a similar point recently, pointing out that apologising for AI is like apologising for slavery. In retrospect (and I apologised for it) I shouldn't have made the point where/when I did. I still stand up for the basic premise, though.
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@tillybridges https://www.youtube.com/watch?v=io-t-bUkfY8

Yeah! Science!
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@codinghorror "Unfortunately, as you probably already know, [also] people"

The platform has been transformed algorithmically to help turn it into a Nazi bar, but moderation is hard. Because of, as you know, people...

(with apologies to @Horse_ebooks )
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 11, 2026
@mattblaze I've still got my ape suit from the time John Glenn came back in 1998.
4
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 10, 2026
@qurlyjoe gotta admit... it took me significantly longer than a nano-century to figure out what this was saying.
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 10, 2026
@jenniferplusplus I think that another way of looking at this might be to say that we have an unusually high number of people here who understand power and recognise its application, but who just aren't that interested in wielding it themselves. And I think that's probably true. Calling out abuses of power kind of falls naturally out of our attitude to power in the first place?
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 10, 2026
@cstross It's all very mysterious. It reminds me very much of the film noir genre.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 09, 2026
@zaphodb @schrotthaufen @neurovagrant Or even S4... Shamir's Secret Sharing Scheme (for data redundancy)
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 09, 2026
@ai6yr Quoting from that:

So they adapt to build anti-distillation agent skills, just as the intellectuals adapted after the Anti-Rightist trap.

We are already seeing agent skills built specifically for job security. The performative skill looks comprehensive and demos well but omits the 20% of edge-case knowledge that makes it work in production — you are now more indispensable, not less. The poison pill encodes expertise faithfully but with subtle dependencies on context only you hold — internal wikis you maintain, terminology you coined, data pipelines you own — so removing you causes outputs to drift quietly until someone says “we need to bring them back on this.” The complexity moat makes the skill so architecturally entangled with your other work that extracting your knowledge is harder than keeping you around. You are now a load-bearing wall disguised as a decoration.

I wonder if this is something similar to the last AI boom, the one based on expert systems. I know that the technology had its limitations (but at least it was deterministic and actually included checkable logic) but one major reason that's often given for its failure was the sheer cost of encoding domain-specific knowledge. Maybe an unwritten part of the problem was that experts weren't particularly keen to make themselves redundant?

Anyway, mighty fine points raised there.
1
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@stavvers https://www.youtube.com/watch?v=B_m17HK97M8
0
0
0
0
Open post
Boosted by Charlie Stross @cstross@wandering.shop
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@cstross@wandering.shop Is it that time already?

https://www.youtube.com/watch?v=pi_YQul7XXk
5
0
3
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@brianbilston Nobody knows the Athlete's Foot like (the makers of) Thailand's Athlete Foot Cream...

[Thailand's authentic athlete's foot cream 25g] https://world.taobao.com/lang/en-us/goods/-100107358873.htm

(not a recommendation, although I do have a photo of a billboard in Thailand advertising something similar... it probably says something like "nobody knows the athlete's foot like the athlete's foot." Then again, I know of a shoe shop in Japan that's just called "Shoe" so idk.. things are just themselves-in-themselves? Let's just leave them at that... )
1
2
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@neauoire Thanks. I've got the paper loaded up in another tab for later reading.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 08, 2026
@mastodonmigration @jeeynet Reminds me of the problems that Edwyn Collins had many years ago, pre-"AI." Of course, this time around it's much more deliberate and mechanised. What a timeline!
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 07, 2026
@neauoire Only just came across this stuff you're doing recently and it looks fascinating. I wonder how you implement bags in the background. Since you use the / operator to remove or replace things I was wondering if perhaps each bag is a bignum with entities inside the sets (sorry, bags) represented by distinct prime numbers, and the bag as a whole being the product of all members...

It's an idea I toyed with a long time ago (for a different application) and I'd be delighted to find out that someone else might be using the same thing.

Again, it's all just about seeing the / sign and jumping to (probably unwarranted) conclusions.
0
2
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@brianbilston At least he had Shriving Time (for the weekend that was in it)
1
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice I can Iron man it for you if you give me something to work with.
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice what straw man am I conjuring up for you?
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice @petergleick so you're denying that you're treating Trump and his predecessors as equals?
0
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@rmondello There are levels of madness here, aren't there?
0
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@bencourtice @petergleick so, the equivocation fallacy, yes? "They're all equally bad?"
1
2
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@petergleick "Why should he balk at committing war crimes?"

Because he's a bully. Like all bullies, he only escalates if he thinks he can get away with it. This is his constant calculation. He learns when and where there is pushback and he avoids similar situations because he fears being exposed. At the same time, he always attacking what he thinks are the easiest targets. When he succeeds in gaining a capitulation, he feels validated.

On the other hand, when we push back, we expose his weakness and the essential hollowness of him and his threats. He might trial (as all trolls do) pushing against the boundaries, but in the end we all know (as does he, deep down) that he will back down in the face of real opposition.
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 06, 2026
@DocAtCDI 俺も、人前は我慢できない。人々のせいでかも…
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 05, 2026
@brianbilston Thanks. I have to admit I didn't come up with it: I stole it from the internet.
Thanks for all the poems, by the way. They may not be an antidote to all the craziness in the world, but they help.
1
1
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 04, 2026
@brianbilston I tend not to shop online so please forgive me for suggesting "Tales of the unexpected item in basket area"...

(more of a series of short stories than poems, perhaps, tho I admit I'm not good at either)
4
1
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 04, 2026
@gwynnion I didn't get the reference (not Canadian, eh?). Seems only fair I should include a reference you may not get...

https://www.youtube.com/watch?v=W_E8sC6Osns

(I think they use the phrase/sample "translunar injection burn" but I'm not 100% sure)
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 02, 2026
@brianbilston screaming line noise in your face / we're so hot your fax we'll erase.
1
0
1
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 01, 2026
@mikemathia drink your milk and stay in school, turtles!
0
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Apr 01, 2026
@Em0nM4stodon Lucky for me, I guess, that I won't be on the Fediverse today. I'll have my hands full reverting "joke" edits to Wikipedia's John (and Joan) Mastodon pages.
2
0
0
0
Open post
In reply to
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
muddle
muddle
@muddle@infosec.exchange

An a/c to announce, explain and discuss "muddle" "muddle" is a "deniable encryption" scheme which I discovered (and maybe invented). It is the combination of "Online Codes," a so-called "fountain code", and Rivest's concept of "Chaffing and Winnowing". The two are trivial to combine, producing something that seems to have good potential for privacy, deniable encryption and secure dispersal and recovery of files across distributed networks. Please follow, boost or @ me

infosec.exchange
@muddle@infosec.exchange · Mar 31, 2026
@thorncoyle Wooo! Dutch Angle! Scary!
1
0
0
0
313k7r1n3

Company

  • About
  • Contact
  • FAQ

Legal

  • Terms of Service
  • Privacy Policy
  • VPN Policy

Email Settings

IMAP: mail.elektrine.com:993

POP3: pop3.elektrine.com:995

SMTP: mail.elektrine.com:465

SSL/TLS required

Support

  • support@elektrine.com
  • Report Security Issue

Connect

Tor Hidden Service

khav7sdajxu6om3arvglevskg2vwuy7luyjcwfwg6xnkd7qtskr2vhad.onion
© 2026 Elektrine. All rights reserved. • Server: 00:35:57 UTC