Obfuscation is the obscuring of the intended meaning of communication by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or intentional (although intent usually is connoted), and is accomplished with circumlocution (talking around the subject), the use of jargon (technical language of a profession), and the use of an argot (ingroup language) of limited communicative value to outsiders.
In expository writing, unintentional obfuscation usually occurs in draft documents, at the beginning of composition; such obfuscation is illuminated with critical thinking and editorial revision, either by the writer or by an editor. Etymologically, the word obfuscation derives from the Latin obfuscatio, from obfuscāre (to darken); synonyms include the words beclouding and abstrusity.
Doctors are faulted for using jargon to conceal unpleasant facts from a patient; the American author and physician Michael Crichton said that medical writing is a "highly skilled, calculated attempt to confuse the reader". The psychologist B. F. Skinner said that medical notation is a form of multiple audience control, which allows the doctor to communicate to the pharmacist things which the patient might oppose if they could understand medical jargon.
"Eschew obfuscation", also stated as "eschew obfuscation, espouse elucidation", is a humorous fumblerule used by English teachers and professors when lecturing about proper writing techniques. Literally, the phrase means "avoid being unclear" or "avoid being unclear, support being clear", but the use of relatively uncommon words causes confusion in much of the audience (those lacking the vocabulary), making the statement an example of irony, and more precisely a heterological phrase. The phrase has appeared in print at least as early as 1959, when it was used as a section heading in a NASA document.
Obfuscation of oral or written communication achieves a degree of secure communication without a need to rely upon technology. This technique is sometimes referred to as "talking around" and is a form of security through obscurity.
The semester begins in three more weeks. We've obtained 19 confirmations for studies in the faculty of law, the faculty of urban planning, the faculty of fine arts and the faculty of engineering.
- "semester" refers to planned September 11 attacks
- "three more weeks" refers to the date when the attacks are scheduled
- "19 confirmations" refers to the Hijackers in the September 11 attacks
- "faculty of law" refers to a target, the United States Capitol
- "faculty of urban planning" refers to a target, the World Trade Center
- "faculty of fine arts" refers to a target, the White House
- "faculty of engineering" refers to a target, The Pentagon
Within the illegal drug trade, obfuscation is commonly used in communication to hide the occurrence of drug trafficking. A notable example is the use of "420" as a code word to refer to cannabis consumption, an activity which despite legalisation changes, was once illegal in most jurisdictions. The Drug Enforcement Administration reported in July 2018 a total of 353 different code words used for cannabis.
White box cryptography
In network security, obfuscation refers to methods used to obscure an attack payload from inspection by network protection systems.
In popular culture
- In Animal Farm, the pigs such as Squealer and Snowball use obfuscation to confuse the other animals with doublespeak in order to prevent any uprisings.
- The Oxford Companion to the English Language, Tom McArthur, Ed., (1992) p. 543.
- Skinner, B.F. (1957) Verbal Behavior p. 232
- United States National Aeronautics and Space Administration, NASA Technical Memorandum (1959), p. 171.
- "Virtual soldiers in a holy war". Haaretz.com. Retrieved 2020-06-25.
- Sirohi, Dr M. N. (2015). Cyber Terrorism and Information Warfare. New Delhi: Vij Books India Private Limited. ISBN 978-81-931422-1-9. OCLC 920167233.
- "Slang Terms and Code Words: A Reference for Law Enforcement Personnel" (PDF). Drug Enforcement Administration. Retrieved 2020-06-26.
- Chow S, Eisen P, Johnson H, et al. A white-box DES implementation for DRM applications[M]//Digital Rights Management. Springer Berlin Heidelberg, 2002: 1-15.
- Media related to Obfuscation at Wikimedia Commons