[time-nuts] Sinlge ADC multi-band receiver
jimlux at earthlink.net
Mon Apr 10 19:49:24 EDT 2017
On 4/10/17 2:08 PM, Eric Scace wrote:
> This approach is known as “security through obscurity”, and is deprecated in the professional of information security. What one invents, another can discover.
> The most secure systems use well-documented algorithms with open-source software — widely scrutinized for bugs or implants, and therefore with well-understood performance limitations. The secrecy comes from good crypto key management.
The M-code is described in a fair amount of detail here:
More information about the time-nuts