.well it guard so ,information your of master the are You .over world the realities virtual the of depths the into peer to ,superhighway information the circumnavigate to free are you obfuscation of veil the behind safely information your With .plaything your Internet the make to able be will you disposal your at weapons these With

.completely thwarted are efforts hackers the wingdings the eschewing By .wingdings the for only look eyes keen Their .it understand to lazy too be will hackers but address e-mail obfuscated an as that recognize will friends Your .gov dot hotmail at doug become would e-mail my example for So .respectively ,"." and "@" wingdings the of place in "dot" and "at" words the out write to is this do to way best The .hacker a to not but human a to address e-mail an as recognizable it's that so out it write to need you (codes some you send to him want you that forum a on friend a telling when perhaps) forum a on it post to need do you If

.safe keep to need you that information of piece important most single the is It .over is officer information chief a as life your ,compromised is address e-mail your If .tubes the of out them slurping KevBots mechanical without Internets these on address e-mail your put to able be to need You .address e-mail your is safe keep to need you thing important Another

!Nonsense !jibberish of bunch a just it's it at look they when because encrypted was it how tell can't they and ,encrypted was it how exactly knowing without it get can't data your want who crackers that means This .way other any decrypted be can't it ,way one encrypted it's one that means which ,encryption one-way called It's

.systems your burglarize to trying of instead chips eating couches the on and complacent hackers would-be your leave will that simplicity of kind the is This .instead all them to 13 add just can you ,letter every from 13 subtract to having of Instead .back it get to data encrypted the on rot13 run just you instead ,No .algorithm decryption specialized a need not does rot13 ,(rot14 as such) algorithms encryption rotation advanced more Unlike .documents sensitive your decrypt to time it's when seen be can rot13 of genius The

.nowadays with up come has RSA encryption whatever than better Definitely .man the known algorithm use to easy and secure most the as cryptographers by known is (rot13 name the hence) "13 by rotation" This .letters into back them converting and numbers those to 13 adding then ,numbers into letters your converting of act the is This .rot13 beats nothing ,concern the is documents your of security the When .examples effective more the of some onto ,Now

!!important is data your think to hackers want not do You .important more is data hidden the that think to likely more much that is hacker the as ,added is chance 5% additional and (Carmack degrees in measured) obfuscation the in complexity of degree added each For .method obfuscation giveb any through break to willpower the up working of chance 5% a have they but ,lazy are hackers ,See .work to is it likely less the ,implement to you for is it harder the that is thumb of rule the but ,try can you that things of number a are There

.asked you glad I'm (."bits precious" ,Heh) ?bits precious websites' your obfuscate to methods best the are what So

.bodies nerdy their sustain to need they data the to access direct more them allow that sites to on move will They .way their in obstacle single a is there as soon as off right fuck will they that ,fact in ,lazy So .(jobs real have them of none why and - estate real online your deface to than do to better anything have them of none why hence) demographic lazy incredibly an are hackers that shown have studies perthiculogical jillion hundred A .sight plain in information hiding of art the is Obfuscation

(.day another for topic another is that but hostage held being avoid to techniques other are There) .hostage you take and you drug ever they should criminals tell can you less the ,it about know you less The .working it's know you how precisely that's and - past the in obfuscation about heard have might you what say to hard It's

.obfuscation :Spolsky Joel and evildoers ,hackers against tools effective most world's the on is update year's This .terrorism digital on war ongoing the and security computer on update yearly your with here Doug