Hacker News new | past | comments | ask | show | jobs | submit login

My trust isn't blind, it's based on their solid track record in availability and network ops, while your example is about something different (text obfuscation).

Anyway, I wasn't aware about that case, do you have a link to learn more?





Thanks.

Assuming keys vary [pseudo-]randomly, even the Caesar cipher is a viable protection in this particular case (mass e-mail harvesting).


In this case you don't even need to know N, you can just cycle through it until single @ character is in the text and you have the email decoded!

The only thing email harvester would need is awareness of this and few lines of code. The field even clearly identifies itself!

Source: I wrote a generic web-scraper for these emails several years ago :D




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: