(no title)
larryboyko | 1 year ago
A little earlier, the editorial instructions read: "These hash values, or checksums [...], were generated by the SHA-256 algorithm -- implementations of which you should easily be able to find and run on your own plaintexts. (By "plaintext", I mean the entire rest of the file, correctly deciphered -- of which, however, only the next chapter will be legible ... until the subsequent decipherment, and so on.)"
Is that helpful?
No comments yet.