Remix.run Logo
TeMPOraL 13 hours ago

Or you can call it encryption along different axis. Much like extracting GPS signals from below thermal floor level - you can do it if you 1) know it's there, and 2) know exactly how to key in. It's impressive as heck, but you can always rephrase it in terms of information theory in ways that makes it sound like slightly different shade of mundane.

g-b-r 13 hours ago | parent [-]

No, this has nothing whatsoever to do with encryption, and no real security, probably

TeMPOraL 13 hours ago | parent [-]

Depends on how you modulate it. Think e.g. frequency hopping / spread spectrum: it's encryption, just done on modulation instead of transmitted data.