Comment by TeMPOraL
13 hours ago
Depends on how you modulate it. Think e.g. frequency hopping / spread spectrum: it's encryption, just done on modulation instead of transmitted data.
13 hours ago
Depends on how you modulate it. Think e.g. frequency hopping / spread spectrum: it's encryption, just done on modulation instead of transmitted data.
No comments yet
Contribute on Hacker News ↗