EDIT: please move to crypto (just realized it is the wrong one and “You can only post once every 40 minutes.”)
Suppose I give a sufficiently long key in a secure way (in person) to Alice.
I send her a file that is XORed with the key I initally gave her. In the file, there contains the message and a new, sufficiently long key.
Alice then creates a file and XOR with the key that is contained in my message. (Alice’s file contains her message and a new key)
What weaknesses are there to this approach? (Suppose too that we pad all messages with random bytes such that the file is 100 KiB in size)
✓ Extra quality
ExtraProxies brings the best proxy quality for you with our private and reliable proxies
✓ Extra anonymity
Top level of anonymity and 100% safe proxies – this is what you get with every proxy package
✓ Extra speed
1,ooo mb/s proxy servers speed – we are way better than others – just enjoy our proxies!
USA proxy location
We offer premium quality USA private proxies – the most essential proxies you can ever want from USA
99,9% servers uptime
No usage restrictions
Perfect for SEO
We are working 24/7 to bring the best proxy experience for you – we are glad to help and assist you!