Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Fixed a typo.

...

Weak cryptographic algorithms may be used in scenarios that specifically call for a breakable cipher. For instance the ROT13 cipher is commonly used on bulletin boards and web sites when the purpose of encryption is to protect people from the information, rather than protect information from the people.

...