Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent usually is connoted), and is accomplished with circumlocution (talking around the subject), the use of jargon (technical language of a profession), and the use of an argot (ingroup language) of limited communicative value to outsiders.[1]

In expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical thinking and editorial revision, either by the writer or by an editor. Etymologically, the word obfuscation derives from the Latin obfuscatio, from obfuscāre (to darken); synonyms include the words beclouding and abstrusity.

Medical

Doctors are faulted for using jargon to conceal unpleasant facts from a patient; the American author and physician Michael Crichton said that medical writing is a "highly skilled, calculated attempt to confuse the reader". The psychologist B. F. Skinner said that medical notation is a form of multiple audience control, which allows the doctor to communicate to the pharmacist things which the patient might oppose if they could understand medical jargon.[2]

Eschew

"Eschew obfuscation", also stated as "eschew obfuscation, espouse elucidation", is a humorous fumblerule used by English teachers and professors when lecturing about proper writing techniques. Literally, the phrase means "avoid being unclear" or "avoid being unclear, support being clear", but the use of relatively uncommon words causes confusion in much of the audience (those lacking the vocabulary), making the statement an example of irony, and more precisely a heterological phrase. The phrase has appeared in print at least as early as 1959, when it was used as a section heading in a NASA document.[3]

An earlier similar phrase appears in Mark Twain's Fenimore Cooper's Literary Offenses, where he lists rule fourteen of good writing as "eschew surplusage".

Secure communication

Obfuscation of oral or written communication achieves a degree of secure communication without a need to rely upon technology. This technique is sometimes referred to as "talking around" and is a form of security through obscurity.

A notable example of obfuscation of written communication is a message sent by September 11 attacks ringleader Mohamed Atta to other conspirators prior to the attacks occurring:[4]

The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts and the faculty of engineering.

In this obfuscated message, the following code words are believed to exist:[5]

Within the illegal drug trade, obfuscation is commonly used in communication to hide the occurrence of drug trafficking. A common spoken example is "420", used as a code word for cannabis, a drug which, despite some recent prominent decriminalization changes, remains illegal in most places. The Drug Enforcement Administration reported in July 2018 a total of 353 different code words used for cannabis.[6]

White box cryptography

In white-box cryptography, obfuscation refers to the protection of cryptographic keys from extraction when they are under the control of the adversary, e.g., as part of a DRM scheme.[7]

Network security

In network security, obfuscation refers to methods used to obscure an attack payload from inspection by network protection systems.

  • In Animal Farm, the pigs such as Squealer and Snowball use obfuscation to confuse the other animals with doublespeak in order to prevent any uprisings.
  • In the British Sitcom Yes, Minister, the character Sir Humphrey Appleby often uses obfuscation for comedic effect while trying to confuse and prevent Jim Hacker from taking charge.

See also

References

  1. The Oxford Companion to the English Language, Tom McArthur, Ed., (1992) p. 543.
  2. Skinner, B.F. (1957) Verbal Behavior p. 232
  3. United States National Aeronautics and Space Administration, NASA Technical Memorandum (1959), p. 171.
  4. "Virtual soldiers in a holy war". Haaretz. Retrieved 2020-06-25.
  5. Sirohi, Dr M. N. (2015). Cyber Terrorism and Information Warfare. New Delhi: Vij Books India Private Limited. ISBN 978-81-931422-1-9. OCLC 920167233.
  6. "Slang Terms and Code Words: A Reference for Law Enforcement Personnel" (PDF). Drug Enforcement Administration. Archived (PDF) from the original on 2022-10-09. Retrieved 2020-06-26.
  7. Chow S, Eisen P, Johnson H, et al. A white-box DES implementation for DRM applications[M]//Digital Rights Management. Springer Berlin Heidelberg, 2002: 1-15.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.