Sunday, January 22, 2012

Cover of Night

Some of what we do is conducted at night to avoid untimely scrutiny. The disclosure mechanism defaults to making the same message available to friends and foes simultaneously. As a result, secrecy vulnerabilities are virtually eliminated.

No interest in Keystone XL?
The only way to differentiate a message, transaction or conversation based on degree of friendliness is carefully choosing the content of the initial message and/or the time it is transmitted.

Hattiesburg is a good example. With insufficient data, we cannot be sure what, if any, significance it poses. Using the techniques described is a way to detect intention without unduly jeopardizing parties at either end.

© 2012 Buzz Hill

No comments:

Post a Comment