Copyright (C) 2001, 2013 Neil Edelman, see copying.txt.
neil dot edelman each mail dot mcgill dot ca
Version 3.0.
This program comes with ABSOLUTELY NO WARRANTY.
This is free software, and you are welcome to redistribute it
under certain conditions; see copying.txt.
Usage: Obfuscator mode key
mode either + or -; eg, a file encrypted with - and then re-encrypted
with - will be decrypted by running + and +.
key the secret stream cipher private-key
Example:
Obfuscator + "12345" < secret > secret_encrypted
Obfuscator - "12345" < secret_encrypted > secret_decrypted
The encryption process uses an algorithm that the author made
himself. It turns out that it's a stream cipher. The length of the
key is linearly related to how many bits of encryption. The bits of
the key generate a pseudorandom keysteam. The author is not an
expert, and it is possible that this is insecure.