imaginary halting problem was Re: [spam][crazy][spam] imaginary code resembling trained dissociation

Undescribed Horrific Abuse, One Victim & Survivor of Many gmkarl at gmail.com
Sun Jul 9 07:18:20 PDT 2023


ok accumulate bounds of counterexample:
- the source of f() must be passable to g(). this means f() must be
finitely long, and its source must be publicly know.

if we sufficiently encrypt, obfuscate, and work-burden f() then the
function of g() becomes difficult


More information about the cypherpunks mailing list