Submission + - ZOSCII: Post-quantum security through address-based encoding (no encryption) (github.com) 1
ZhuLien writes: After optimizing software for retro Z80 computers, I stumbled onto something interesting: what if instead of encrypting data, we just store memory addresses pointing to characters in a ROM file?
The result is ZOSCII — Zero Overhead Secure Code Information Interchange. Unlike AES-256 which uses mathematical complexity, ZOSCII uses "address indirection" for security:
1. Your data becomes a sequence of memory addresses
2. Without the ROM file, addresses are meaningless random numbers
3. Same message can encode millions of different ways (non-deterministic)
4. Creates "weaponized ambiguity" — any address sequence could decode to anything
Security researcher Bruce Schneier called it "snake-oil of the highest degree" expecting traditional encryption. But ZOSCII isn't encryption — it's information-theoretic security through mathematical impossibility rather than computational complexity.
Try the interactive demo: drop any file as your "ROM key" and see what messages appear on the bulletin board. Different files reveal completely different content from the same data. Wrong ROM = Orwellian privacy quotes.
I've also put this to the test with a 64-character private key encoded using ZOSCII — publicly available challenge file with real cryptocurrency bounty.
Live demo: https://zoscii.com/zosciibb/
Challenge details: zosciicoin.com
GitHub: https://github.com/PrimalNinja...
What do you think — revolutionary encoding method or elaborate snake-oil?
The result is ZOSCII — Zero Overhead Secure Code Information Interchange. Unlike AES-256 which uses mathematical complexity, ZOSCII uses "address indirection" for security:
1. Your data becomes a sequence of memory addresses
2. Without the ROM file, addresses are meaningless random numbers
3. Same message can encode millions of different ways (non-deterministic)
4. Creates "weaponized ambiguity" — any address sequence could decode to anything
Security researcher Bruce Schneier called it "snake-oil of the highest degree" expecting traditional encryption. But ZOSCII isn't encryption — it's information-theoretic security through mathematical impossibility rather than computational complexity.
Try the interactive demo: drop any file as your "ROM key" and see what messages appear on the bulletin board. Different files reveal completely different content from the same data. Wrong ROM = Orwellian privacy quotes.
I've also put this to the test with a 64-character private key encoded using ZOSCII — publicly available challenge file with real cryptocurrency bounty.
Live demo: https://zoscii.com/zosciibb/
Challenge details: zosciicoin.com
GitHub: https://github.com/PrimalNinja...
What do you think — revolutionary encoding method or elaborate snake-oil?