FREE OPEN SOURCE ENCRYPTION SOFTWARE - NO BACK DOORS

Below is an introduction from the user’s manual for text scrambling application R144. The application is free, fully modifiable, and will be sent on request on anyone interested.

Our privacy is challenged every day by electronic surveillance of communication, electronic transactions and location recording without our consent. Computers are compromised by advanced spying technologies inconspicuously transmitting data. However, we all have the right to maintain our privacy when we so desire. Intelligence agencies collecting and analyzing huge amounts of data gathered all the time don’t bother to inform us or ask for permission. Companies providing encryption applications are under pressure to make back doors in their software allowing hacking of messages and cannot be trusted.

Therefore, it is essential to have our own system to keep the private messages really private. We have nothing to hide but we have all the right to maintain privacy. The ever expanding surveillance of every day activities has crossed the line as exposed by the courageous NSA whistle blower Edward Snowden. The Big Brother described in George Orwell’s ominous book, 1984, has grown out of proportions and continues to grow with the lack of meaningful annoyance and resistance of the public. It is time to stick up the middle finger and defeat the Big Brother’s endless schemes to invade our privacy.

                      At the current form the text scrambler is made with Excel but anyone knowledgeable in matrices and programming C++ or other advanced programming languages is invited to develop the system further. The application is free to be used and modified. The only wish is to keep the key operating features of the key files and randomizable character set open for all users to modify in order to maintain the system at maximum level of security and privacy. Any developer of the system is urged to leave no back doors for the snooping agencies. Privacy is sacred.

This version or the modified scrambler can be distributed among the friends and family. The best way to do it is not by email attachment, but by handing it over personally. The scrambler does not need to be installed in any computer; it is enough to have it in a pen drive that can go with the user. The user only needs an Excel program to run it. Compatibility with Open Office work sheets has not been tested. It should be clear without saying that using Excel in a Cloud system over Internet completely exposes all you have been trying to keep private. Therefore, this application should be used with Excel, or Open Office, installed in the computer. This application does not affect or detect any spying equipment hidden in the computer.

In general, people would be wise to consider the personal information they post on the web. Many social networks, email services, online stores and other services have their shady links to intelligence services whose “business” in many cases goes far beyond of what normally is perceived as intelligence. Industrial and state espionage together with snooping to people’s personal lives is criminal but that is the soft side of “intelligence”. On the hard side there are “wet jobs” i.e. assassinations, and clandestine paramilitary operations, agent provocateurs, manufactured revolutions, drug business, extraordinary rendition, as well as blackmail, bribery and coercion of decision makers and public servants.

                      Crimes against we the people and the deterioration of the American Constitution are justified in the minds of the betrayers of humanity by hollow catchwords like the “national security”. All deception starts with self deception. Once again in history of humanity well meaning people are tricked to work and dedicate their lives for their own enemies. The criminal cabal running the show are manipulating the nations to give up their sovereignty and independence to a centralized and corrupt one world government. There is no place in that totalitarian system for nations or “national security”. It’s just one more illusion together with freedom and democracy, free speech or the American dream, a dream that once was but is turning into a nightmare. And it’s global.

 

Views: 666

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Less Prone on February 13, 2014 at 8:15pm

There are loads of text documents online that can be used as key files

Comment by Not mainstreamer on February 12, 2014 at 10:18am

http://en.wikipedia.org/wiki/Steganography may be an idea for transferring keys files?

Comment by Less Prone on February 12, 2014 at 9:08am

I agree that the computer are still far back in speed when compared to visual analysis that humans, animals, and even insects have. Human brain can recognize objects in the field of vision in a split second, a task that computers are incapable of. It is possible to hide pictures or text in pictures, I have tried some of that also.

Comment by Not mainstreamer on February 12, 2014 at 4:17am

When keys are hided into images by custom programming they are pretty lost these supercomputers - unless they start searching for hidden keys in everything :)

Comment by Not mainstreamer on February 12, 2014 at 4:12am

Sure they can tap data on (connected) PC/Mac/iPhone/Android (high priority targets). But they cannot copy all hard disks on everything for practical reasons ... that kind of activity will show up on phone bills.

Comment by Less Prone on February 11, 2014 at 8:31pm
Comment by Not mainstreamer on February 11, 2014 at 6:56pm

Ok. Maybe there are "SetFocus" / "Paste from clipboard" / "Select" / "Copy to clipboard" macros too - to skip dealing with Excel interface on small screens

http://social.msdn.microsoft.com/Forums/en-US/dae74b8d-1765-4d0c-87...

Comment by Less Prone on February 11, 2014 at 5:58pm

Not mainstreamer,

It's possible to copy the encrypted message from the Excel worksheet and paste it in email. The receiver of the mail then copies the encrypted message and pastes it in the MAIL.xls in his Scrambler folder and can read it with REAd.xls

Comment by Not mainstreamer on February 11, 2014 at 2:53pm

You said you'd like to have the software capable of encrypting text on a clipboard with a push of a button. This application does just that.

That is good news. On an iPhone, write message as normal, copy it to clipboard, execute something, and replace text in email client / application ... (that is pretty advanced programming)

Comment by Less Prone on February 11, 2014 at 2:16pm

Not mainstreamer,

You said you'd like to have the software capable of encrypting text on a clipboard with a push of a button. This application does just that. In place of clipboard you have lines where to type the message on a  worksheet and in place of buttons you have worksheets named.

MESSAGE worksheet in LOCK work book to type in the text to be encrypted

LOCKED worksheet in LOCK work book the encrypted message ready to be saved

READ workbook to read encrypted message sent to to you by email.

It cannot get much simpler than that.

Type in or copy paste your message in the LOCK workbook MESSAGE worksheet

Click LOCKED worksheet to view the encrypted message

Saving a copy of the encrypted (locked) message

Naming the encrypted message as MAIL.xls

Reading an encrypted message

These are the buttons; excel files with names describing their function

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

MAC posted a video
9 hours ago
tjdavis posted videos
9 hours ago
Doc Vega posted a blog post

Meanwhile Back on Planet Earth

With the news of the Jack Smith prosecution of Donald J. Trump being removed from the court docket,…See More
15 hours ago
rlionhearted_3 commented on cheeki kea's photo
Thumbnail

who would win a debate?

"It gets waaayy worse. TPTB want to normalize this gross fat bullshit."
18 hours ago
Doc Vega posted photos
18 hours ago
cheeki kea posted photos
21 hours ago
cheeki kea commented on cheeki kea's photo
22 hours ago
cheeki kea commented on tjdavis's video
Thumbnail

How They Will Use Your Doctor to Disarm You

"why of cause Any Mental Health issue would be enough to cause concern and it's known that in…"
23 hours ago
tjdavis favorited Doc Vega's blog post The Modern Day Twilight Zone!
yesterday
Doc Vega posted a blog post

The Modern Day Twilight Zone!

Here at the Twilight Zone I can make no apologies for the insanity you are about to see!It must be…See More
yesterday
rlionhearted_3 posted photos
Sunday
Sandy commented on Sandy's photo
Saturday
Sandy posted a photo
Saturday
Doc Vega posted photos
Friday
Doc Vega posted blog posts
Friday
Doc Vega commented on Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
"Less Prone thanks for the reply. Yes, these events could be very effective at destroying the US…"
Friday
tjdavis posted photos
Thursday
Doc Vega posted photos
Thursday
Doc Vega posted blog posts
Thursday
rlionhearted_3 posted a photo
Thursday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted