Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If you have a good rng it will be indistinguishable from encrypted data. In fact the more uniform the seemingly more cunning.

Be sure to put he proper headers on the data so it self identifies as an encrypted file.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: