You must log in or register to comment.
One neat use case a friend suggested is that you could also use this approach to share documents with people who have different levels of access.
shouldn’t ciphertext be indistinguishable from random? edit: oh i see, it’s like rubberhose or phonebook encryption