[time-nuts] Sinlge ADC multi-band receiver

jimlux jimlux at earthlink.net
Mon Apr 10 19:49:24 EDT 2017

On 4/10/17 2:08 PM, Eric Scace wrote:
>    This approach is known as “security through obscurity”, and is deprecated in the professional of information security. What one invents, another can discover.
>    The most secure systems use well-documented algorithms with open-source software — widely scrutinized for bugs or implants, and therefore with well-understood performance limitations. The secrecy comes from good crypto key management.

The M-code is described in a fair amount of detail here:

More information about the time-nuts mailing list