expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical...
7 KB (825 words) - 03:02, 20 May 2024
development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural...
18 KB (1,694 words) - 18:39, 22 September 2024
hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
8 KB (1,115 words) - 18:46, 30 January 2022
The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
2 KB (253 words) - 18:02, 15 March 2023
indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
23 KB (2,297 words) - 21:48, 16 August 2024
cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
7 KB (979 words) - 15:10, 24 November 2022
a circle of obfuscated values where the center reveals the individual's exact location. One should also consider the level of obfuscation required in...
3 KB (381 words) - 09:26, 13 January 2024
Security through obscurity (redirect from Security by obfuscation)
Obfuscation (software) Presumed security Secure by design AACS encryption key controversy Full disclosure (computer security) Code talker Obfuscation...
14 KB (1,398 words) - 14:20, 23 September 2024
The Great Misdirect (redirect from Obfuscation (song))
entitled "Obfuscation" as well as "Disease, Injury, Madness" at the Lincoln Theatre in Raleigh, North Carolina. On September 16, "Obfuscation" was streamed...
12 KB (1,080 words) - 00:10, 24 January 2024
Adversarial stylometry (redirect from Authorship obfuscation)
imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the...
32 KB (3,782 words) - 07:34, 20 April 2024
Search cost (section Obfuscation and search costs)
are negatively affected by obfuscation because of the price increases and direct costs it imposes on them. Although obfuscation is beneficial to firms, excessive...
24 KB (2,879 words) - 16:52, 18 September 2024
Obfuscated TCP (ObsTCP) was a proposal for a transport layer protocol which implements opportunistic encryption over Transmission Control Protocol (TCP)...
6 KB (514 words) - 15:19, 8 May 2023
Online poker (redirect from Hand summary obfuscation)
Online poker is the game of poker played over the Internet. It has been partly responsible for a huge increase in the number of poker players worldwide...
44 KB (5,639 words) - 02:07, 27 September 2024
out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
22 KB (2,881 words) - 16:46, 18 March 2024
Data masking (redirect from Data obfuscation)
Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while...
22 KB (3,095 words) - 11:55, 26 March 2024
advantages of brevity should be weighed against the possibilities of obfuscation (making the communication harder for others to understand) and ambiguity...
17 KB (632 words) - 14:13, 28 April 2024
Fillet (redaction) (redirect from Filleting (obfuscation))
century in England. Its purpose was to inform interested readers in an obfuscated manner whilst at the same time avoiding the risk of being sued for illegal...
2 KB (299 words) - 06:44, 4 January 2024
BitTorrent protocol encryption (redirect from Protocol obfuscation)
Vuze. PHE was implemented in old versions of BitComet. Similar protocol obfuscation is supported in up-to-date versions of some other (non-BitTorrent) systems...
18 KB (1,721 words) - 15:22, 28 May 2024
Apache POI (redirect from Poor Obfuscation Implementation)
acronym for "Poor Obfuscation Implementation", referring humorously to the fact that the file formats seemed to be deliberately obfuscated, but poorly, since...
11 KB (777 words) - 19:42, 14 May 2024
general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
20 KB (2,481 words) - 07:20, 19 August 2024
solutions: face liveness detection, obfuscation of crucial information, and location privacy obfuscation. More advanced obfuscation technology can cover up the...
33 KB (3,954 words) - 08:00, 14 September 2024
mode is data obfuscation (RFC 8907 Section 4.5), where the packet header is clear-text, but the body including passwords is obfuscated with an MD5-based...
10 KB (1,232 words) - 22:00, 9 September 2024
Anti–computer forensics (section Trail obfuscation)
melting." The purpose of trail obfuscation is to confuse, disorient, and divert the forensic examination process. Trail obfuscation covers a variety of techniques...
24 KB (2,932 words) - 11:36, 18 May 2024
Double genocide theory (redirect from Holocaust obfuscation)
to Michael Shafir, the double genocide theory is at worst Holocaust obfuscation. Political scientist Clemens Heni [de] sees it as a form of Holocaust...
39 KB (4,486 words) - 14:44, 26 August 2024
N. American Vertical Datum 1988 ETRS89 European Terrestrial Ref. Sys. 1989 GCJ-02 Chinese obfuscated datum 2002 Geo URI Internet link to a point 2010...
22 KB (2,491 words) - 18:52, 1 October 2024
Black Necrotic Obfuscation is the debut EP by the Norwegian electronic/noise/avant-garde metal artist Zweizz. It was released in a limited edition of...
4 KB (498 words) - 16:44, 14 October 2023
submission "This year's Best of Show (carlini) is such a novel way of obfuscation that it would be worth of a special mention in the (future) Best of IOCCC...
14 KB (1,303 words) - 17:41, 26 September 2024
Crowd psychology Deception Dumbing down False balance Half-truths Media Obfuscation Orwellian Persuasion Manipulation (psychology) Activism Advocacy group...
29 KB (2,947 words) - 17:37, 26 September 2024
Address munging (redirect from Email address obfuscation)
Content delivery network vendors, such as Cloudflare, offer email address obfuscation services to their clients. "Transparent name mangling" involves replacing...
10 KB (1,024 words) - 09:58, 18 July 2024
leet, while others maintain that leet consists of only symbolic word obfuscation. More obscure forms of leet, involving the use of symbol combinations...
35 KB (3,720 words) - 07:24, 2 October 2024