• expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical...
    7 KB (825 words) - 03:02, 20 May 2024
  • development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural...
    18 KB (1,687 words) - 03:31, 30 June 2024
  • hardware obfuscation modifies the design in such a away that the resulting architecture becomes un-obvious to an adversary. Hardware Obfuscation can be...
    8 KB (1,115 words) - 18:46, 30 January 2022
  • a circle of obfuscated values where the center reveals the individual's exact location. One should also consider the level of obfuscation required in...
    3 KB (381 words) - 09:26, 13 January 2024
  • The Obfuscated Perl Contest was a competition for programmers of Perl which was held annually between 1996 and 2000. Entrants to the competition aimed...
    2 KB (253 words) - 18:02, 15 March 2023
  • imitation typically succeeds at masking more characteristics than obfuscation. Automated obfuscation may require large amounts of training data written by the...
    32 KB (3,782 words) - 07:34, 20 April 2024
  • indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating any two programs that...
    23 KB (2,275 words) - 03:43, 30 June 2024
  • cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was...
    7 KB (979 words) - 15:10, 24 November 2022
  • Thumbnail for Security through obscurity
    to know Obfuscation (software) Presumed security Secure by design AACS encryption key controversy Zero-day vulnerability Code talker Obfuscation Zwicky...
    14 KB (1,399 words) - 00:18, 26 June 2024
  • entitled "Obfuscation" as well as "Disease, Injury, Madness" at the Lincoln Theatre in Raleigh, North Carolina. On September 16, "Obfuscation" was streamed...
    12 KB (1,080 words) - 00:10, 24 January 2024
  • Thumbnail for International Obfuscated C Code Contest
    out zero bytes, equivalent to its source code. In the effort to take obfuscation to its extremes, contestants have produced programs which skirt around...
    22 KB (2,881 words) - 16:46, 18 March 2024
  • Thumbnail for Online poker
    Online poker is the game of poker played over the Internet. It has been partly responsible for a huge increase in the number of poker players worldwide...
    44 KB (5,637 words) - 19:17, 16 May 2024
  • Obfuscated TCP (ObsTCP) was a proposal for a transport layer protocol which implements opportunistic encryption over Transmission Control Protocol (TCP)...
    6 KB (514 words) - 15:19, 8 May 2023
  • are negatively affected by obfuscation because of the price increases and direct costs it imposes on them. Although obfuscation is beneficial to firms, excessive...
    24 KB (2,875 words) - 04:16, 15 April 2024
  • century in England. Its purpose was to inform interested readers in an obfuscated manner whilst at the same time avoiding the risk of being sued for illegal...
    2 KB (299 words) - 06:44, 4 January 2024
  • Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while...
    22 KB (3,095 words) - 11:55, 26 March 2024
  • Vuze. PHE was implemented in old versions of BitComet. Similar protocol obfuscation is supported in up-to-date versions of some other (non-BitTorrent) systems...
    18 KB (1,721 words) - 15:22, 28 May 2024
  • solutions: face liveness detection, obfuscation of crucial information, and location privacy obfuscation. More advanced obfuscation technology can cover up the...
    33 KB (3,954 words) - 05:26, 27 June 2024
  • acronym for "Poor Obfuscation Implementation", referring humorously to the fact that the file formats seemed to be deliberately obfuscated, but poorly, since...
    11 KB (777 words) - 19:42, 14 May 2024
  • to Michael Shafir, the double genocide theory is at worst Holocaust obfuscation. Political scientist Clemens Heni [de] sees it as a form of Holocaust...
    38 KB (4,456 words) - 20:32, 11 April 2024
  • advantages of brevity should be weighed against the possibilities of obfuscation (making the communication harder for others to understand) and ambiguity...
    17 KB (632 words) - 14:13, 28 April 2024
  • general notions of obfuscation, in particular, to Black-box obfuscation, proven to be impossible, and to Indistinguishability obfuscation, constructed recently...
    20 KB (2,449 words) - 15:55, 13 June 2024
  • Thumbnail for Geographic coordinate system
    N. American Vertical Datum 1988 ETRS89 European Terrestrial Ref. Sys. 1989 GCJ-02 Chinese obfuscated datum 2002 Geo URI Internet link to a point 2010...
    22 KB (2,499 words) - 00:27, 29 June 2024
  • melting." The purpose of trail obfuscation is to confuse, disorient, and divert the forensic examination process. Trail obfuscation covers a variety of techniques...
    24 KB (2,932 words) - 11:36, 18 May 2024
  • Thumbnail for Email spam
    withheld their email address. Image spam, or image-based spam, is an obfuscation method by which text of the message is stored as a GIF or JPEG image...
    55 KB (6,044 words) - 01:15, 22 May 2024
  • Black Necrotic Obfuscation is the debut EP by the Norwegian electronic/noise/avant-garde metal artist Zweizz. It was released in a limited edition of...
    4 KB (498 words) - 16:44, 14 October 2023
  • techniques Black-box testing, Blackboxing Related techniques Feed forward, Obfuscation, Pattern recognition, White box, White-box testing, Gray-box testing...
    9 KB (1,036 words) - 21:00, 18 June 2024
  • Deception Dumbing down False balance Half-truths Machiavellianism Media Obfuscation Orwellian Persuasion Manipulation (psychology) Activism Alternative media...
    120 KB (14,740 words) - 09:42, 22 June 2024
  • table below they are shown as: CRCs in proprietary protocols might be obfuscated by using a non-trivial initial value and a final XOR, but these techniques...
    72 KB (5,953 words) - 12:06, 4 May 2024
  • Internet Archive. Tony Patton (2008-11-21). "Protect your JavaScript with obfuscation". TechRepublic. Archived from the original on March 15, 2014. Retrieved...
    44 KB (4,849 words) - 18:39, 22 June 2024