💾 Archived View for gemlog.blue › users › rc › 1671387169.gmi captured on 2024-07-09 at 04:47:21. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2023-01-29)

-=-=-=-=-=-=-

The Island • 18 Dec 2022

pjeklo@nightorb.com

Red Camel

Dear Jack,

It is really a great joy for me to write to you. I remember our meeting, the jokes, the laughter and the very constructive spirit of our conversation. I wished we had more time to make plans and share our visions.

Unfortunately, I will not be able to come and see you in Portsmouth in spring. There are several reasons that I can explain to you on the phone.

Hope you understand.

Much Love

Red

- - - - - - - - - -

The "common ground theory" reduces communication to unidentifiable information exchange (for third party unwanted listeners/readers) where both participants only hint to knowledge about what only both know.

https://citeseerx.ist.psu.edu/pdf/ee115523d8f1968e5816e323477b8e6f14120d70

Instead of the description of an easily identifiable Chicago Pizza restaurant as a possible meeting place they use as substitute identifier the name of a waiter in that Pizzeria.

When speaking about people they use nicknames that only they or very near family members are familiar with. In Arabic society they might use the third or fourth name of the person in focus.

Thus specific information is cloaked in simplistic plain text form and cannot be decrypted. There are no contextual or meta signals pointing to hidden content. The message will travel with a million others from sender to recipient.

The above cloaking strategy is as old as human communication. Parents would have a cloaked conversation in front of their children. Prisoners of war would converse via their own local idioms and nicks that the prison warden could not know.