danhab99@programming.dev to Programmer Humor@programming.dev · 1 year agoOrderprogramming.devimagemessage-square32fedilinkarrow-up1519arrow-down111
arrow-up1508arrow-down1imageOrderprogramming.devdanhab99@programming.dev to Programmer Humor@programming.dev · 1 year agomessage-square32fedilink
minus-squareMic_Check_One_Two@reddthat.comlinkfedilinkarrow-up106·1 year agoChaotic evil is encrypting, compressing, then encrypting again.
minus-squareUtMan1988@lemmy.worldlinkfedilinkarrow-up44·1 year agoThen decompress after. Let fear be your cypher.
Chaotic evil is encrypting, compressing, then encrypting again.
Then decompress after. Let fear be your cypher.
That’s like md5(sha512(“somefile.blah”))