I’m not a programmer.  I don’t write code.  I do like to draw parallels.

I set aside a new page contemplating Code Obfuscation, in light of Ed Scheidt’s skillset/resume and end up considering K4 in perhaps a different light.

I doubt I’m the first one to consider this but it makes for useful cogitation fodder.

How did he do it?

What did he do?

How do we reverse it?

Kryptosfan

Advertisements