• ☆ Yσɠƚԋσʂ ☆OP
    link
    33 years ago

    One neat use case a friend suggested is that you could also use this approach to share documents with people who have different levels of access.

  • down daemon
    link
    3
    edit-2
    3 years ago

    shouldn’t ciphertext be indistinguishable from random? edit: oh i see, it’s like rubberhose or phonebook encryption