> > Let’s imagine an imaginary mailing list topiced around cryptography, > > with multiple influences changing its content. one of these influences > > could be an anti cryptography influence. What kind of cryptography > > would an anti cryptography influence support, in such a scenario? > > > > What if we were to xor every bit of a message with 0s. This may sound > > new to some, but there is a hook — our xor0 operation exists in a > > fallible physical world, where, due to electromagnetic noise, > > component degradation, corruption, os and microcode bugs, etc etc etc > > certainly malicious actors, cosmic rays, and the karma and intents of > > the user (!;s) along with cpu overclocking and electron hole density > > fluctuations … — sometimes this xor0 operation returns an incorrect > > result. > > > > It’s not bad ! I wrote about it for a paragr—! > > One could go on, on that topic. Here’s another —- uhhh or > > Hmm
great idea: let’s make a xor0 message encryption/decryption tool! There is worry that it could be mispurposed to perform one-time pads somehow. After our extreme experience of being domesticated by surveillance empires, it could be scary if our xor0 code were mutated by a 3rd actor into xorkey code. We’d want to make sure it wasn’t a setup to get us targeted for non-fake cryptographic works.
