1. Introduction: Cryptology Before the Long Eighteenth Century and Foundational Writings; 2. Ciphering and Deciphering as Writing and Reading Processes; 3. Cipher Devices as Writing and Reading Technologies; 4. Cryptotypographies; 5. Conclusion: Pulling Back the Curtain of Secrecy.