Doing everything exactly opposite from "The Mainstream" is the same thing as doing everything exactly like "The Mainstream." You're still using What Everyone Else is Doing as your primary point of reference.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
But I remain confident that on a 256 key scale the brute force method would be ineffective.What does this mean to you and how does it apply to what you've made here?
"The charge of the light brigade" is just begging for a modern re-write really.
Half a block, half a block
half a block onward,
All in the valley of cops,
Rode the 200
Forward the hipsters!
Charge for the cuffs he said
Into the valley of cops
Rode the 200
Paes, remember that this was originally meant for a password, not a message.
In which case, it's irrelevant if a hacker can guess the original password, they just need to find out the sequence of characters.
Though it would be still set in stone, but with multiple letters having the same encrypted counterpart.
It could be numbers, symbols, or letters that need to be skipped. This is for encrypting passwords and what not to make it impossible for them to decrypt. Now if me and someone were exchanging encrypted messages. Obviously that other person would have the key and would be able to figure out what doesn't belong. Also these are not programs, I know nothing of those sort of things, though very soon will be trying for I have an ingenious idea. But for the time being these are written out on paper and calculated in my head.