Text this: Novel Techniques of Using Diversity in Software Security and Information Hiding

 __   _     ______    _  __   _    _   __    __  
| || | ||  /_   _//  | |/ // | || | || \ \\ / // 
| '--' ||   -| ||-   | ' //  | || | ||  \ \/ //  
| .--. ||   _| ||_   | . \\  | \\_/ ||   \  //   
|_|| |_||  /_____//  |_|\_\\  \____//     \//    
`-`  `-`   `-----`   `-` --`   `---`       `