decryption↦heuristic, algorithm↦encryption
Strategies are logged into behavioral cloning. Our strategic goals are to find and exploit lower bounds on (the number of) plays it takes to arrive at a zero-bubble. (see touch-and-go, improvise, stewc notation, UUhistlegrass)
/// Strategies are typically non-brute force, and not
runtime
-dependent.