Teleonomic cyborg semiotics

O.C.E.A.N., H.E.X.A.C.O. and autopoietic heterarchical hypermedia systems

[0]: “1. B generates a public key χ by resorting to a certain set of ‘generators’.
2. B sends the public key to A. Anyone can see it.
3. A uses the key to encrypt the message M;
4. A sends the encrypted message Mχ to B, but none can decrypt it.
5. B receives the message Mχ and, knowing the generators, is able to decrypt it.” (
[1]: “The generation of these more complex topologies may also be of interest in other applications relying on framed knots, such as quantum money.”

nobody leaves the cave before the end of a new dawn

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store