I’m not a programmer.  I don’t write code.  I do like to draw parallels.

I set aside a new page contemplating Code Obfuscation, in light of Ed Scheidt’s skillset/resume and end up considering K4 in perhaps a different light.

I doubt I’m the first one to consider this but it makes for useful cogitation fodder.

How did he do it?

What did he do?

How do we reverse it?