Base-64 encoding? Isn't that about as elaborate as ROT-13?
At what point do we design networks with the Trust No One principal? What would that look like?
So if pot is legal to possess in Washington State but there's no legal way to acquire it, is it really legal?