Reasonably Adequate Privacy
Data Obfuscation for the Masses
RAP User’s Guide
Volume I: Essential Topics
by Timothy Ruddick
tim /at/ ruddick /dot/ com
Revised: 13 October 1996, 4 April 1999, 5 September 2006
RAP Version 0.94 beta – 1 January 2019
Sunkist and General Electric
Synopsis: RAP uses a simple chemical process to protect data.
Communicate easily with people you’ve never met, with minimal
prior training. RAP is simple to use and fast, with robust construction,
very low computational cost, and adequate ergonomic design.
Documentation © 1996 Timothy Ruddick.
RAP Version 0.9 beta – 27 April 1996
RAP Version 0.91 beta – 13 October 1996
RAP Version 0.92 beta – 4 April 1999
RAP Version 0.93 beta – 5 September 2006 (updated formatting for new website)
RAP Version 0.94 beta – 1 January 2019 (updated formatting for WordPress)
All rights reserved. For information on RAP licensing, distribution,
copyrights, patents, trademarks, liability limitations, and export
controls, see the “Legal Issues” section in the “RAP
User’s Guide, Volume II: Special Topics”. Distributed by
Ruddick Institute of Silliness.
-Monty Python, Eric the Half-a-Bee
- Quick Overview
- Why Do You Need RAP?
- How it Works
- Installing RAP
- How to Use RAP
- Managing Keys
- Advanced Topics
- Configuring RAP
- Beware of Snake Oil
- Notice to Macintosh Users
- RAP Quick Reference
- Legal Issues
Reasonably Adequate Privacy (RAP), from Tim’s Reasonably Adequate Concepts, is a simple concealment concept requiring only hardware available at the local supermarket. RAP allows people to exchange written documents with reasonable privacy and convenience. Reasonable privacy means that only those intending to receive a message and possessing the appropriate hardware can read it. Convenience means that privacy is provided without the need for any software or computer hardware, whatsoever. No secure channels are needed to obtain the necessary hardware, which makes RAP easy to
use. This is because RAP is based on a simple technology known as “invisible ink”.
RAP combines the convenience of ordinary handwriting systems with obfuscation speeds impossible to match with conventional cryptography, data compression, adequate ergonomic design, and simple hardware requirements. And RAP performs its functions faster than any software implementation.
RAP is truly data obfuscation for the masses.
RAP does not provide any built-in modem communications capability. In fact it provides no data-transmission capabilities whatsoever. You must use separate products for that.
This document, “Volume I: Essential Topics”, only explains the essential concepts for using RAP, and should be read by all RAP users. “Volume II: Special Topics” covers the advanced features of RAP and other special topics, and may be read by more serious RAP users. Neither volume explains the underlying chemical processes used by the technology.
You want to transmit a message or some data and you don’t want anyone else to see it.
Conventional cryptosystems require complicated hardware and software to scramble a message, rendering it unreadable to anyone but you and the intended recipient.
With invisible ink there is no need for all that stuff. You just need:
- a stylus or writing implement (frequently called a “toothpick”),
- a message substrate (frequently called “paper”),
- an ink-source (frequently called a “lemon”),
- a heat-source (frequently called a “light-bulb”).
Using the heat-source the recipient can cause the invisible ink to become visible.
Anyone can use invisible ink to conceal a message to another person. Only a person who knows that the document contains a “secret message” will think to use a heat source to render the message visible.
Message authentication is also provided. One way would be for the recipient to call the sender on the phone and say something like, “Hey! Did you just send me a blank piece of paper?” And the sender could say something like, “Yes…” and pause, knowingly.
These two processes can be made to occur automatically whenever a sender creates a document using invisible ink. There is no need to acquire any information about the recipient at all!
The Basic RAP package comes complete with a box of styli (styluses for the Latin-impaired), several sheets of message substrate, an ink-source, and a heat-source. The Professional package contains a secondary ink-source, known in the industry as a “potato” (or “potatoe” to those working for former CIA staff), and a high-quality stylus similar to those sold at calligraphy counters of art and craft supply stores.
Installation of RAP is as simple as removing the parts from their box and placing them near where you wish to compose your message.
If you already own an earlier version of RAP there is no need to dispose of it. All items in any version are guaranteed to be fully compatible with all past and future versions and can even function in parallel! (Try to do that in software!)
In addition, you may find that you already own items similar to those found in a RAP package. These, too, should be fully compatible, except in the case of heat-sources purchased outside the U.S. Unlike certain other cryptosystems there are no export restrictions on any item in the RAP package; you may find, however, that heat-sources produced in the U.S. are incompatible with foreign fixtures.
Obfuscating a message is simple. Dip the stylus into the ink-source and use it to write on the message substrate. You may find that certain styli are easier to use than others. Experiment until you find a stylus that functions adequately and practice a little. You’ll soon find that writing becomes easy.
If you wish, you may compress messages after using RAP. It is easiest, however, to wait until after obfuscation to perform compression. One method is to fold the message substrate into thirds, so that it may more readily be inserted into an standard document carrier (or “envelope”). To foil Message Interception Attacks you might consider crumpling the substrate into a ball
so that it resembles an item of trash. More elegant and artistic solutions to the same problem may be found in any good origami book.
If you want to send the same message to more than one person, you have several choices: you can write the same document on more than one substrate; you can find a print shop willing to use your invisible ink during the production process; or you can try to ensure that all recipients are present when the document is made visible.
Sign a message much as you would sign a check. The only difference is that you will not be able to read the signature. It will be invisible. You’re using invisible ink.
Sometimes you need a little extra obfuscation. RAP can also work in this environment. If you and the recipient both know a foreign language, you could write in it. If you don’t know a foreign language, consider Pig-Latin (known in the industry as “Igpay-Atinlay”); it is an easy language even for non-native writers, and has the expressive power of English.
Since the time of Julius Caesar, key management has always been the hardest part of cryptography. One of the principal distinguishing features of RAP is that it uses no keys. The hardest problem simply vanishes (just like the ink)!
Most of the “Advanced Topics” are covered in the “RAP User’s Guide, Volume II: Special Topics”. But there is one topic that bears mentioning here.
Any message sent through the Postal Service should probably be enclosed in a document carrier, the simplest being an envelope. To save on postage and envelope costs you may wish to consider compressing the message prior to sending it. Various techniques for accomplishing this are outlined in the “Compressing a Message” section, above.
Invisible ink would seem to lend itself well to message delivery via postcard. RAP does not support this mode of transport, as postcards are difficult to use with a heat-source which increases the likelihood of ROML (see “Revealing Messages and Checking Signatures“, above).
It should be strongly stressed that to avoid a Message Interception Attack the recipient’s address should be written in standard, visible ink!
No data security system is impenetrable. RAP can be circumvented in a variety of ways. The greatest vulnerability is message interception by parties owning heat-sources.
Try to make sure that this doesn’t happen.
It doesn’t work and you have to find a snake. Lemon juice is better.
RAP is fully compatible with your choice of computer. You will find the user interface elegant and intuitive, and far better than those command-line things you’d otherwise need to put up with.
To obfuscate a message:
To sign a message:
- sign it as you would a check but with invisible ink.
To reveal an obfuscated message:
- hold it near a heat-source.
To obfuscate a message for any number of multiple recipients:
- write it once and make sure all recipients read the revealed copy.
To make your keys easier to find:
- try leaving them in a basket near the front door.
For detailed information on RAP licensing, distribution, copyrights, patents, trademarks, liability limitations, and export controls, see the “Legal Issues” section in the “RAP User’s Guide, Volume II: Special Topics”.
RAP uses technology that is unpatentable. Seriously, who besides a raving genetic engineer would try to patent a lemon. As such, you are free to redistribute the RAP hardware and this document in any way you see fit, provided the text remains unaltered.
Substantial portions of this document were basically stolen outright from Phil Zimmermann’s documentation for his excellent Pretty Good Privacy (PGP) product.
PGP is available on the Web at:
This document may shortly be available on the Web at: