Below is an introduction from the user’s manual for text scrambling application R144. The application is free, fully modifiable, and will be sent on request on anyone interested.

Our privacy is challenged every day by electronic surveillance of communication, electronic transactions and location recording without our consent. Computers are compromised by advanced spying technologies inconspicuously transmitting data. However, we all have the right to maintain our privacy when we so desire. Intelligence agencies collecting and analyzing huge amounts of data gathered all the time don’t bother to inform us or ask for permission. Companies providing encryption applications are under pressure to make back doors in their software allowing hacking of messages and cannot be trusted.

Therefore, it is essential to have our own system to keep the private messages really private. We have nothing to hide but we have all the right to maintain privacy. The ever expanding surveillance of every day activities has crossed the line as exposed by the courageous NSA whistle blower Edward Snowden. The Big Brother described in George Orwell’s ominous book, 1984, has grown out of proportions and continues to grow with the lack of meaningful annoyance and resistance of the public. It is time to stick up the middle finger and defeat the Big Brother’s endless schemes to invade our privacy.

                      At the current form the text scrambler is made with Excel but anyone knowledgeable in matrices and programming C++ or other advanced programming languages is invited to develop the system further. The application is free to be used and modified. The only wish is to keep the key operating features of the key files and randomizable character set open for all users to modify in order to maintain the system at maximum level of security and privacy. Any developer of the system is urged to leave no back doors for the snooping agencies. Privacy is sacred.

This version or the modified scrambler can be distributed among the friends and family. The best way to do it is not by email attachment, but by handing it over personally. The scrambler does not need to be installed in any computer; it is enough to have it in a pen drive that can go with the user. The user only needs an Excel program to run it. Compatibility with Open Office work sheets has not been tested. It should be clear without saying that using Excel in a Cloud system over Internet completely exposes all you have been trying to keep private. Therefore, this application should be used with Excel, or Open Office, installed in the computer. This application does not affect or detect any spying equipment hidden in the computer.

In general, people would be wise to consider the personal information they post on the web. Many social networks, email services, online stores and other services have their shady links to intelligence services whose “business” in many cases goes far beyond of what normally is perceived as intelligence. Industrial and state espionage together with snooping to people’s personal lives is criminal but that is the soft side of “intelligence”. On the hard side there are “wet jobs” i.e. assassinations, and clandestine paramilitary operations, agent provocateurs, manufactured revolutions, drug business, extraordinary rendition, as well as blackmail, bribery and coercion of decision makers and public servants.

                      Crimes against we the people and the deterioration of the American Constitution are justified in the minds of the betrayers of humanity by hollow catchwords like the “national security”. All deception starts with self deception. Once again in history of humanity well meaning people are tricked to work and dedicate their lives for their own enemies. The criminal cabal running the show are manipulating the nations to give up their sovereignty and independence to a centralized and corrupt one world government. There is no place in that totalitarian system for nations or “national security”. It’s just one more illusion together with freedom and democracy, free speech or the American dream, a dream that once was but is turning into a nightmare. And it’s global.


Views: 559


You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Less Prone on February 13, 2014 at 8:15pm

There are loads of text documents online that can be used as key files

Comment by Not mainstreamer on February 12, 2014 at 10:18am may be an idea for transferring keys files?

Comment by Less Prone on February 12, 2014 at 9:08am

I agree that the computer are still far back in speed when compared to visual analysis that humans, animals, and even insects have. Human brain can recognize objects in the field of vision in a split second, a task that computers are incapable of. It is possible to hide pictures or text in pictures, I have tried some of that also.

Comment by Not mainstreamer on February 12, 2014 at 4:17am

When keys are hided into images by custom programming they are pretty lost these supercomputers - unless they start searching for hidden keys in everything :)

Comment by Not mainstreamer on February 12, 2014 at 4:12am

Sure they can tap data on (connected) PC/Mac/iPhone/Android (high priority targets). But they cannot copy all hard disks on everything for practical reasons ... that kind of activity will show up on phone bills.

Comment by Less Prone on February 11, 2014 at 8:31pm
Comment by Not mainstreamer on February 11, 2014 at 6:56pm

Ok. Maybe there are "SetFocus" / "Paste from clipboard" / "Select" / "Copy to clipboard" macros too - to skip dealing with Excel interface on small screens

Comment by Less Prone on February 11, 2014 at 5:58pm

Not mainstreamer,

It's possible to copy the encrypted message from the Excel worksheet and paste it in email. The receiver of the mail then copies the encrypted message and pastes it in the MAIL.xls in his Scrambler folder and can read it with REAd.xls

Comment by Not mainstreamer on February 11, 2014 at 2:53pm

You said you'd like to have the software capable of encrypting text on a clipboard with a push of a button. This application does just that.

That is good news. On an iPhone, write message as normal, copy it to clipboard, execute something, and replace text in email client / application ... (that is pretty advanced programming)

Comment by Less Prone on February 11, 2014 at 2:16pm

Not mainstreamer,

You said you'd like to have the software capable of encrypting text on a clipboard with a push of a button. This application does just that. In place of clipboard you have lines where to type the message on a  worksheet and in place of buttons you have worksheets named.

MESSAGE worksheet in LOCK work book to type in the text to be encrypted

LOCKED worksheet in LOCK work book the encrypted message ready to be saved

READ workbook to read encrypted message sent to to you by email.

It cannot get much simpler than that.

Type in or copy paste your message in the LOCK workbook MESSAGE worksheet

Click LOCKED worksheet to view the encrypted message

Saving a copy of the encrypted (locked) message

Naming the encrypted message as MAIL.xls

Reading an encrypted message

These are the buttons; excel files with names describing their function


  • Add Photos
  • View All



Please remember this website is supported by your donations...

© 2018   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 2007-2015 - all rights reserved. unless otherwise noted