imaginary halting problem was Re: [spam][crazy][spam] imaginary code resembling trained dissociation
Undescribed Horrific Abuse, One Victim & Survivor of Many
gmkarl at gmail.com
Sun Jul 9 07:18:20 PDT 2023
ok accumulate bounds of counterexample:
- the source of f() must be passable to g(). this means f() must be
finitely long, and its source must be publicly know.
if we sufficiently encrypt, obfuscate, and work-burden f() then the
function of g() becomes difficult
More information about the cypherpunks
mailing list