- using ordinary and deterministic eliminate some avenues for exfiltrating data that is invisible to the attackers - based on indefinite length choices - very powerful - based on specific encoding chosen - based on order of maps - using ordinary or deterministic encoding eliminates some categories of resource exhaustion attacks -