9 Jul
2023
9 Jul
'23
2:18 p.m.
ok accumulate bounds of counterexample: - the source of f() must be passable to g(). this means f() must be finitely long, and its source must be publicly know. if we sufficiently encrypt, obfuscate, and work-burden f() then the function of g() becomes difficult