For the term as used in computer science, see obfuscation (software).
Obfuscation (or beclouding) is the hiding of intended meaning in communication, making communication confusing, wilfully ambiguous, and harder to interpret.[citation needed]
Contents
- 1 Background
- 2 "Eschew obfuscation"
- 3 White Box Cryptography
- 4 Network Security
- 5 See also
- 6 References
- 7 External links
|
Background [edit]
Obfuscation may be used for many purposes. Doctors have been accused of using jargon to conceal unpleasant facts from a patient; American author Michael Crichton claimed that medical writing is a "highly skilled, calculated attempt to confuse the reader".[1] B. F. Skinner, noted psychologist, commented on medical notation as a form of multiple audience control, which allows the doctor to communicate to the pharmacist things which might be opposed by the patient if they could understand it.[2] Similarly text-based language, like some forms of leet, are obfuscated to make them incomprehensible to outsiders...
"Eschew obfuscation" [edit]
"Eschew obfuscation", also stated as "eschew obfuscation, espouse elucidation", is a humorous fumblerule used by English teachers and professors when lecturing about proper writing techniques.
Literally, the phrase means "avoid being unclear" or "avoid being unclear, support being clear", but the use of relatively uncommon words causes confusion, making the phrase an example of irony, and more precisely a heterological or hypocritical phrase (it does not embody its own advice).
The phrase has appeared in print at least as early as 1959, when it was used as a section heading in a NASA document.[3]
An earlier similar phrase appears in Mark Twain's Fenimore Cooper's Literary Offenses,[4] where he lists rule fourteen of good writing as "eschew surplusage".
The philosopher Paul Grice used the phrase in the "Maxim of Manner", one of the Gricean maxims.
White Box Cryptography [edit]
In white box cryptography, obfuscation refers to the protection of cryptographic keys from extraction when they are under the control of the adversary, e.g., as part of a DRM scheme.
Network Security [edit]
In network security, obfuscation refers to methods used to obscure an attack payload from inspection by network protection systems.
See also [edit]
- Fallacy of quoting out of context
- Plain English
- Politics and the English Language
- Propaganda
- Prolixity
- Obfuscated code
References [edit]
- ^ Appendix 25 - Medspeak
- ^ Skinner, B.F. (1957) Verbal Behavior p.232
- ^ United States National Aeronautics and Space Administration, NASA Technical Memorandum (1959), p. 171.
- ^ Fenimore Cooper's Literary Offenses (1895)
External links [edit]
Fallacies of relevance
|
|
- A dicto simpliciter ad dictum secundum quid (Accident)
- Ad nauseam (Argument from repetition)
- Argumentum ad ignorantiam (Argument from ignorance)
- Argumentum e silentio (Argument from silence)
- Argumentum ad temperantiam (Argument to moderation)
- Argumentum ad populum (Appeal to the people)
- Base rate
- Compound question
- Evidence of absence
- Ignoratio elenchi (Irrelevant conclusion)
- Invincible ignorance
- Loaded question
- Moralistic
- Naturalistic
- Non sequitur
- Proof by assertion
- Special pleading
- Straw man
- Two wrongs make a right
|
|
Appeals to emotion |
- Fear
- Flattery
- Novelty
- Pity
- Ridicule
- Children's interests
- Invented here
- Island mentality
- Not invented here
- Repugnance
- Spite
|
|
Genetic fallacies |
- Ad hominem
- Ad hominem tu quoque
- Appeal to accomplishment
- Appeal to authority
- Appeal to etymology
- Appeal to motive
- Appeal to nature
- Appeal to novelty
- Appeal to poverty
- Appeals to psychology
- Argumentum ad lapidem (Appeal to the stone)
- Appeal to tradition
- Appeal to wealth
- Association
- Bulverism
- Chronological snobbery
- Ipse dixit
- Poisoning the well
- Pro hominem
- Reductio ad Hitlerum
|
|
Appeals to consequences |
- Argumentum ad baculum (Appeal to force)
- Wishful thinking
|
|
- List of fallacies
- Other types of fallacy
- Philosophy portal
|
|
Informal fallacies
|
|
- Absence paradox
- Begging the question
- Blind men and an elephant
- Cherry picking
- Complex question
- False analogy
- Fallacy of distribution (Composition
- Division)
- Furtive fallacy
- Hasty generalization
- I'm entitled to my opinion
- Loaded question
- McNamara fallacy
- Name calling
- Nirvana fallacy
- Rationalization (making excuses)
- Red herring fallacy
- Special pleading
- Slothful induction
|
|
Correlative-based fallacies |
- False dilemma
- Denying the correlative
- Suppressed correlative
|
|
Deductive fallacies |
- Accident
- Converse accident
|
|
Inductive fallacies |
- Sampling bias
- Conjunction fallacy
- False analogy
- Hasty generalization
- Misleading vividness
- Overwhelming exception
|
|
Vagueness and ambiguity |
- Amphibology
- Continuum fallacy
- False precision
- Slippery slope
|
|
Equivocation |
- Equivocation
- False attribution
- Fallacy of quoting out of context
- Loki's Wager
- No true Scotsman
- Reification
|
|
Questionable cause |
- Animistic
- Appeal to consequences
- Argumentum ad baculum
- Correlation proves causation (Cum hoc ergo propter hoc)
- Gambler's fallacy and its inverse
- Post hoc
- Prescience
- Regression
- Single cause
- Slippery slope
- Texas sharpshooter
- Wrong direction
|
|
- List of fallacies
- Other types of fallacy
- Philosophy portal
|
|