Copyright (C) 2001, 2013 Neil Edelman, see copying.txt. neil dot edelman each mail dot mcgill dot ca Version 3.0. This program comes with ABSOLUTELY NO WARRANTY. This is free software, and you are welcome to redistribute it under certain conditions; see copying.txt. Usage: Obfuscator mode key mode either + or -; eg, a file encrypted with - and then re-encrypted with - will be decrypted by running + and +. key the secret stream cipher private-key Example: Obfuscator + "12345" < secret > secret_encrypted Obfuscator - "12345" < secret_encrypted > secret_decrypted The encryption process uses an algorithm that the author made himself. It turns out that it's a stream cipher. The length of the key is linearly related to how many bits of encryption. The bits of the key generate a pseudorandom keysteam. The author is not an expert, and it is possible that this is insecure.