• Jimbabwe@lemmy.world
    link
    fedilink
    arrow-up
    12
    arrow-down
    1
    ·
    4 days ago

    You could invent your own. It wouldn’t stop someone who was really determined to trick you, because the tradeoff between convenience and perfect security would likely leave you vulnerable to reverse engineering. But that being said, you can take your message, reverse it, Caesar cypher it, replace letters with numbers, drop vowels or spaces, etc etc until you’ve mangled it into a “hash” that only you know how to produce.

    • Brave Little Hitachi Wand@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      ·
      4 days ago

      Easier to have a cryptic rule, such as “third sentence in every entry must have exactly three words, and the last word in the entry must rhyme with the very first word.” That would validate the entry with far less work, and people would need massive sample sizes to have any chance at finding the pattern.

    • LifeInMultipleChoice@lemmy.world
      link
      fedilink
      arrow-up
      5
      ·
      edit-2
      4 days ago

      I remember in college one of my teachers told the class if we were going to be late with our submissions that were do by midnight to submit a corrupted document before midnight. Then when you finished your document to change your bios/system clock to before that time, paste it into a fresh document and save it with the same name. That way when he told you the document was corrupted it wouldn’t be obvious the document was created after the due date.

      Can’t remember if I ever ended up having to do that. (You can do it using the touch command in terminal I believe, instead of having to change your clock.). I just remember thinking it was comical that the professor told us to do it.