• expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical...
    7 KB (825 words) - 03:02, 20 May 2024
  • development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural...
    18 KB (1,694 words) - 18:39, 22 September 2024
  • hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
    8 KB (1,115 words) - 18:46, 30 January 2022
  • The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
    2 KB (253 words) - 18:02, 15 March 2023
  • indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
    23 KB (2,297 words) - 21:48, 16 August 2024
  • cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
    7 KB (979 words) - 15:10, 24 November 2022
  • a circle of obfuscated values where the center reveals the individual's exact location. One should also consider the level of obfuscation required in...
    3 KB (381 words) - 09:26, 13 January 2024
  • Thumbnail for Security through obscurity
    Obfuscation (software) Presumed security Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation...
    14 KB (1,398 words) - 14:20, 23 September 2024
  • entitled "Obfuscation" as well as "Disease, Injury, Madness" at the Lincoln Theatre in Raleigh, North Carolina. On September 16, "Obfuscation" was streamed...
    12 KB (1,080 words) - 00:10, 24 January 2024
  • imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the...
    32 KB (3,782 words) - 07:34, 20 April 2024
  • are negatively affected by obfuscation because of the price increases and direct costs it imposes on them. Although obfuscation is beneficial to firms, excessive...
    24 KB (2,879 words) - 16:52, 18 September 2024
  • Obfuscated TCP (ObsTCP) was a proposal for a transport layer protocol which implements opportunistic encryption over Transmission Control Protocol (TCP)...
    6 KB (514 words) - 15:19, 8 May 2023
  • Thumbnail for Online poker
    Online poker is the game of poker played over the Internet. It has been partly responsible for a huge increase in the number of poker players worldwide...
    44 KB (5,639 words) - 02:07, 27 September 2024
  • Thumbnail for International Obfuscated C Code Contest
    out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
    22 KB (2,881 words) - 16:46, 18 March 2024
  • Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while...
    22 KB (3,095 words) - 11:55, 26 March 2024
  • advantages of brevity should be weighed against the possibilities of obfuscation (making the communication harder for others to understand) and ambiguity...
    17 KB (632 words) - 14:13, 28 April 2024
  • century in England. Its purpose was to inform interested readers in an obfuscated manner whilst at the same time avoiding the risk of being sued for illegal...
    2 KB (299 words) - 06:44, 4 January 2024
  • Vuze. PHE was implemented in old versions of BitComet. Similar protocol obfuscation is supported in up-to-date versions of some other (non-BitTorrent) systems...
    18 KB (1,721 words) - 15:22, 28 May 2024
  • acronym for "Poor Obfuscation Implementation", referring humorously to the fact that the file formats seemed to be deliberately obfuscated, but poorly, since...
    11 KB (777 words) - 19:42, 14 May 2024
  • general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
    20 KB (2,481 words) - 07:20, 19 August 2024
  • solutions: face liveness detection, obfuscation of crucial information, and location privacy obfuscation. More advanced obfuscation technology can cover up the...
    33 KB (3,954 words) - 08:00, 14 September 2024
  • mode is data obfuscation (RFC 8907 Section 4.5), where the packet header is clear-text, but the body including passwords is obfuscated with an MD5-based...
    10 KB (1,232 words) - 22:00, 9 September 2024
  • melting." The purpose of trail obfuscation is to confuse, disorient, and divert the forensic examination process. Trail obfuscation covers a variety of techniques...
    24 KB (2,932 words) - 11:36, 18 May 2024
  • to Michael Shafir, the double genocide theory is at worst Holocaust obfuscation. Political scientist Clemens Heni [de] sees it as a form of Holocaust...
    39 KB (4,486 words) - 14:44, 26 August 2024
  • Thumbnail for Geographic coordinate system
    N. American Vertical Datum 1988 ETRS89 European Terrestrial Ref. Sys. 1989 GCJ-02 Chinese obfuscated datum 2002 Geo URI Internet link to a point 2010...
    22 KB (2,491 words) - 18:52, 1 October 2024
  • Black Necrotic Obfuscation is the debut EP by the Norwegian electronic/noise/avant-garde metal artist Zweizz. It was released in a limited edition of...
    4 KB (498 words) - 16:44, 14 October 2023
  • Thumbnail for Nicholas Carlini
    submission "This year's Best of Show (carlini) is such a novel way of obfuscation that it would be worth of a special mention in the (future) Best of IOCCC...
    14 KB (1,303 words) - 17:41, 26 September 2024
  • Crowd psychology Deception Dumbing down False balance Half-truths Media Obfuscation Orwellian Persuasion Manipulation (psychology) Activism Advocacy group...
    29 KB (2,947 words) - 17:37, 26 September 2024
  • Content delivery network vendors, such as Cloudflare, offer email address obfuscation services to their clients. "Transparent name mangling" involves replacing...
    10 KB (1,024 words) - 09:58, 18 July 2024
  • Thumbnail for Leet
    leet, while others maintain that leet consists of only symbolic word obfuscation. More obscure forms of leet, involving the use of symbol combinations...
    35 KB (3,720 words) - 07:24, 2 October 2024