FREE OPEN SOURCE ENCRYPTION SOFTWARE - NO BACK DOORS

Below is an introduction from the user’s manual for text scrambling application R144. The application is free, fully modifiable, and will be sent on request on anyone interested.

Our privacy is challenged every day by electronic surveillance of communication, electronic transactions and location recording without our consent. Computers are compromised by advanced spying technologies inconspicuously transmitting data. However, we all have the right to maintain our privacy when we so desire. Intelligence agencies collecting and analyzing huge amounts of data gathered all the time don’t bother to inform us or ask for permission. Companies providing encryption applications are under pressure to make back doors in their software allowing hacking of messages and cannot be trusted.

Therefore, it is essential to have our own system to keep the private messages really private. We have nothing to hide but we have all the right to maintain privacy. The ever expanding surveillance of every day activities has crossed the line as exposed by the courageous NSA whistle blower Edward Snowden. The Big Brother described in George Orwell’s ominous book, 1984, has grown out of proportions and continues to grow with the lack of meaningful annoyance and resistance of the public. It is time to stick up the middle finger and defeat the Big Brother’s endless schemes to invade our privacy.

                      At the current form the text scrambler is made with Excel but anyone knowledgeable in matrices and programming C++ or other advanced programming languages is invited to develop the system further. The application is free to be used and modified. The only wish is to keep the key operating features of the key files and randomizable character set open for all users to modify in order to maintain the system at maximum level of security and privacy. Any developer of the system is urged to leave no back doors for the snooping agencies. Privacy is sacred.

This version or the modified scrambler can be distributed among the friends and family. The best way to do it is not by email attachment, but by handing it over personally. The scrambler does not need to be installed in any computer; it is enough to have it in a pen drive that can go with the user. The user only needs an Excel program to run it. Compatibility with Open Office work sheets has not been tested. It should be clear without saying that using Excel in a Cloud system over Internet completely exposes all you have been trying to keep private. Therefore, this application should be used with Excel, or Open Office, installed in the computer. This application does not affect or detect any spying equipment hidden in the computer.

In general, people would be wise to consider the personal information they post on the web. Many social networks, email services, online stores and other services have their shady links to intelligence services whose “business” in many cases goes far beyond of what normally is perceived as intelligence. Industrial and state espionage together with snooping to people’s personal lives is criminal but that is the soft side of “intelligence”. On the hard side there are “wet jobs” i.e. assassinations, and clandestine paramilitary operations, agent provocateurs, manufactured revolutions, drug business, extraordinary rendition, as well as blackmail, bribery and coercion of decision makers and public servants.

                      Crimes against we the people and the deterioration of the American Constitution are justified in the minds of the betrayers of humanity by hollow catchwords like the “national security”. All deception starts with self deception. Once again in history of humanity well meaning people are tricked to work and dedicate their lives for their own enemies. The criminal cabal running the show are manipulating the nations to give up their sovereignty and independence to a centralized and corrupt one world government. There is no place in that totalitarian system for nations or “national security”. It’s just one more illusion together with freedom and democracy, free speech or the American dream, a dream that once was but is turning into a nightmare. And it’s global.

 

Views: 666

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Not mainstreamer on February 11, 2014 at 1:51pm

Caller : Are you talking 512 bits key?

Rivero: I am talking away beyond that, 5-6000 bits key.

6000 bit = 750 bytes

I myself is talking keybooks: 200,000 -- 16,000,000,000 bytes (200 KBytes = an image, 16 Gig = size of a Memory stick). Those who knows programming, it is easy. Those who do not know programming, get a custom solution (RentaCoder.com) for $200 or more 

Comment by Not mainstreamer on February 11, 2014 at 9:23am

What is maybe more difficult for people to accept is Microsoft (and others) being a spy agency.

Comment by Not mainstreamer on February 11, 2014 at 9:19am

Rivero concludes NSA is losing. Solutions like The Free Open Source Encryption makes NSA impotent. They cannot break it

First hour 18:00 http://whatreallyhappened.com/WRHARTICLES/podcast.php

When we get homemade solutions everywhere they will be facing a task where everywhere there are no workable anti-algoritm. Compare that to the German Enigma - that would have been broken in one day by todays computers.

Comment by Not mainstreamer on February 10, 2014 at 1:21pm

I would like to see text in clipboard being encrypted by a button, and the same for decryption. That will be practical. 

Comment by Less Prone on February 10, 2014 at 6:04am

Not mainstreamer,

I believe the next logical step to improve the application would be the use of Excel macros and Basic language embedded in Excel. That would probably eliminate a lot of formulas repeated over and over again for each matrix element. I don't have time to do that. I have provided a prototype that works and is open for further development. Any other programming language capable of matrix operations would also do just fine. I'm developing the application to have larger mail matrix, from 85 x 201 to 85 x 1000 first and so on.

Comment by Not mainstreamer on February 10, 2014 at 4:56am

If one can define program logic then getting coding done by http://www.getacoder.com/ will cost $200-$1000.. very timesaving because a professional do not need to learn a new language

Comment by Not mainstreamer on February 10, 2014 at 4:46am

C# and SharpDev as IDE are easy and free tools. Javascript is the choice that works on all platforms. Both have sufficient speed. C++ is a hell to learn.

Comment by Not mainstreamer on February 10, 2014 at 4:32am

When the password is as long as the message, then it has the same effect as if it were infinite

That is a good point. When the key/password is larger than the message (100 times preferable) then the key becomes unsolvable (for supercomputers). For practical reason one will use the same key for some time, meaning 100 times larger than each message is best. This is something most people will comprehend. - they can do it themselves. NSA breaking "any code" is just pretense - they cannot.

Comment by Less Prone on February 9, 2014 at 7:22pm

The figures you are referring to (85x201) are simply a limitation set by Excel and the application. In Excel and this application the password can be extended to 85 x 65535 = 5,570,475 characters. When the password is as long as the message, then it has the same effect as if it were infinite. It is the idea that is important here. I'm inviting people to the test the application and get used to the idea so that they can develop their own software based on C++ or other programming language. Go and download the files from Scribd  or send me email address where you want the application to be sent. A zipped file is just about 4M in size.

Comment by Not mainstreamer on February 9, 2014 at 6:51pm

The password is set to 85 * 201 bytes = 17085 bytes

One cannot transfer 17085 bytes by voice, it has to be transferred digitally - memory stick is one solution. A memory stick can hold 16,000,000,000+ bytes. Just use all that storage as "password", or at least 200,000 bytes (hidden into an image?).  But then a programming language like Javascript or PowerBasic is needed for speed.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone posted a video

How the Government Uses Fear-Mongering to Alter Your Brain

Unlock the full interview here: https://bit.ly/3RCq6ccMolecular geneticist and immunologist Dr. Michael Nehls tells Tucker Carlson how fear-mongering is used...
1 hour ago
Doc Vega posted blog posts
8 hours ago
Doc Vega posted a photo

main-qimg-5806e1adb3109cf42e236b6063e7e3ec

The cowardly murderous Democrats out to destroy America.
9 hours ago
Sandy posted videos
11 hours ago
Burbia commented on Sandy's photo
Thumbnail

FB_IMG_1710523455761

"Is that the narrative now? Its more like Tik Tok influenced the younger generation to not be…"
23 hours ago
Burbia commented on Less Prone's photo
Thumbnail

Rebuilding Khazaria

"Who exactly are these beings? They violently push their way into the Middle East claiming it their…"
23 hours ago
Less Prone posted a photo

Famine or War What Would it Be

How far are these monsters allowed to go?
yesterday
Less Prone favorited cheeki kea's blog post The saddest post I've ever read. ( vaccine victim speaks out. )
yesterday
Less Prone commented on cheeki kea's blog post The saddest post I've ever read. ( vaccine victim speaks out. )
"It's so cruel and unfair. So many innocent people fell for it and even now the wictims are…"
yesterday
Doc Vega commented on truth's video
Thumbnail

MSM Admits US Funding Al-Qaeda & Taliban Terror Attacks

"In all likelihood if the MSM comes up with an explanation it's probably pure unadulterated…"
yesterday
Doc Vega commented on truth's video
Thumbnail

MSM Admits US Funding Al-Qaeda & Taliban Terror Attacks

"Mark Levin talks about all the front groups funded by Soros that have provided revenue for the…"
yesterday
Doc Vega favorited cheeki kea's blog post The saddest post I've ever read. ( vaccine victim speaks out. )
yesterday
Doc Vega commented on cheeki kea's blog post The saddest post I've ever read. ( vaccine victim speaks out. )
"Sad, but this is the fate of those who don't take heed and refuse to do their due diligence…"
yesterday
Doc Vega posted blog posts
yesterday
cheeki kea commented on Sandy's photo
Thumbnail

FB_IMG_1710523455761

"Hi Thia I'm back with news.... gvmnt will not protect you from Tick Tock, at this point it…"
yesterday
cheeki kea commented on cheeki kea's blog post Dr. Aseem Malhotra's Explosive Court Testimony on COVID "Vaccines"(UPDATED)
"More news dripping out from this story. ( found on Slay news…"
yesterday
cheeki kea commented on cheeki kea's blog post The saddest post I've ever read. ( vaccine victim speaks out. )
yesterday
cheeki kea posted a blog post

The saddest post I've ever read. ( vaccine victim speaks out. )

You know what, I think if God had a message for us here it would be the one that goes... Be as Wise…See More
yesterday
Burbia commented on Burbia's group The Comment Section is Closed
"So far, there are 14 comments here for the video about Iran's influence on Generation Z and…"
Wednesday
tjdavis posted videos
Wednesday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted