obfuscator/Obfuscator-3_0
2021-06-12 20:23:21 -07:00
..
copying.txt Extracted. 2021-06-12 20:23:21 -07:00
gpl.txt Extracted. 2021-06-12 20:23:21 -07:00
Makefile Extracted. 2021-06-12 20:23:21 -07:00
Obfuscate.c Extracted. 2021-06-12 20:23:21 -07:00
readme.txt Extracted. 2021-06-12 20:23:21 -07:00

Copyright (C) 2001, 2013 Neil Edelman, see copying.txt.
neil dot edelman each mail dot mcgill dot ca

Version 3.0.

This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions; see copying.txt.

Usage: Obfuscator mode key

mode   either + or -; eg, a file encrypted with - and then re-encrypted
       with - will be decrypted by running + and +.

key    the secret stream cipher private-key

Example:
Obfuscator + "12345" < secret > secret_encrypted
Obfuscator - "12345" < secret_encrypted > secret_decrypted

The encryption process uses an algorithm that the author made
himself. It turns out that it's a stream cipher. The length of the
key is linearly related to how many bits of encryption. The bits of
the key generate a pseudorandom keysteam. The author is not an
expert, and it is possible that this is insecure.