- adventitious, adjective. Happening or carried on according to chance rather than design or inherent nature.
- alderelde, noun. Extreme old age; a life of many years.
- aseity, noun. Existence originating from and having no source other than itself.
- banal, adjective. Devoid of freshness or originality; hackneyed; trite.
- corposant, noun. Another name for Saint Elmo’s fire, a ball of fire sometimes seen about a ship during a storm.
- cryptography, noun. The art of writing or deciphering messages in code; the system used in a code or cipher.
- excrescence, noun. An unattractive or superfluous addition or feature; any disfiguring addition.
- ignis fatuus, noun. A flitting phosphorescent light seen at night, chiefly over marshy ground, and believed to be due to spontaneous combustion of gas from decomposed organic matter; also something deluding or misleading (Latin, foolish fire).
- inexorably, adverb. In a way that is unavoidable, impossible to stop or prevent.
- jingoistic, adjective. Militantly nationalistic or chauvinistic; characterized by extreme patriotism, especially in the form of aggressive foreign policy.
- kitsch, adjective. Considered to be in poor taste but appreciated in an ironic or knowing way.
- mired, adjective. Trapped in mud, muck, or slime; entangled or stuck (e.g. in trouble or difficulty).
- phishing, noun. A type of email attack in which the attacker tries to find the sensitive information of users in a fraud manner through electronic communication by intending to be from a related trusted organization.
- seriatem, adverb. One after another; in a series.
- sinistrous, adjective. (archaic) wrong, disastrous, unlucky, perverse; on the left side, inclined to the left, sinistral.
- steganography, noun. The practice of concealing messages in such a way that only the sender and the recipient know that there is a message; (computing) the concealment of a message or data within an image, audio, or video file.
- vishing, noun. A type of cyber attack in which voice communication is used for stealing confidential data from a group of people (the attacker tricks the target to give sensitive information through a voice call pretending to be an employee from a related and trusted firm).
“Ask for the old paths, where is the good way, and walk therein.” Caveat lector
Translate
Saturday, November 12, 2022
In other words, steganographic cryptography
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment