248 bytes added
, 4 years ago
Here, however, we should abandon a little the acquired patterns and opinions to better follow the concept of ‘encrypted language’. Let's suppose, therefore, that the System is generating and sending the following encrypted message, for instance