Houston 2600

Computer security, hacking, coding and mayhem

Using relativity to encrypt data

Bob Way has a great post up about his brainstorm for a file-sharing system that technically does not include the actual data it shares, but can reconstruct it from a relative measurement of it, which is stored. This is much like coming up with a mold for a part and using relative vectors to describe it, so that when needed, it can be re-created using some seed data and thus.. Read More

Architecture versus pattern recognition

Most programming is a variant of “cut and paste” programming. You find the archetype you’re looking for, adapt it, and then paste it into the program from a mixture of sample code and blog posts. It works; you move on. Some programmers are even more experienced. Their pattern recognition and Pavlovian syntax response is all in their heads. They see a situation, and dump code from their fingers in response… Read More