FREE OPEN SOURCE ENCRYPTION SOFTWARE - NO BACK DOORS

Below is an introduction from the user’s manual for text scrambling application R144. The application is free, fully modifiable, and will be sent on request on anyone interested.

Our privacy is challenged every day by electronic surveillance of communication, electronic transactions and location recording without our consent. Computers are compromised by advanced spying technologies inconspicuously transmitting data. However, we all have the right to maintain our privacy when we so desire. Intelligence agencies collecting and analyzing huge amounts of data gathered all the time don’t bother to inform us or ask for permission. Companies providing encryption applications are under pressure to make back doors in their software allowing hacking of messages and cannot be trusted.

Therefore, it is essential to have our own system to keep the private messages really private. We have nothing to hide but we have all the right to maintain privacy. The ever expanding surveillance of every day activities has crossed the line as exposed by the courageous NSA whistle blower Edward Snowden. The Big Brother described in George Orwell’s ominous book, 1984, has grown out of proportions and continues to grow with the lack of meaningful annoyance and resistance of the public. It is time to stick up the middle finger and defeat the Big Brother’s endless schemes to invade our privacy.

                      At the current form the text scrambler is made with Excel but anyone knowledgeable in matrices and programming C++ or other advanced programming languages is invited to develop the system further. The application is free to be used and modified. The only wish is to keep the key operating features of the key files and randomizable character set open for all users to modify in order to maintain the system at maximum level of security and privacy. Any developer of the system is urged to leave no back doors for the snooping agencies. Privacy is sacred.

This version or the modified scrambler can be distributed among the friends and family. The best way to do it is not by email attachment, but by handing it over personally. The scrambler does not need to be installed in any computer; it is enough to have it in a pen drive that can go with the user. The user only needs an Excel program to run it. Compatibility with Open Office work sheets has not been tested. It should be clear without saying that using Excel in a Cloud system over Internet completely exposes all you have been trying to keep private. Therefore, this application should be used with Excel, or Open Office, installed in the computer. This application does not affect or detect any spying equipment hidden in the computer.

In general, people would be wise to consider the personal information they post on the web. Many social networks, email services, online stores and other services have their shady links to intelligence services whose “business” in many cases goes far beyond of what normally is perceived as intelligence. Industrial and state espionage together with snooping to people’s personal lives is criminal but that is the soft side of “intelligence”. On the hard side there are “wet jobs” i.e. assassinations, and clandestine paramilitary operations, agent provocateurs, manufactured revolutions, drug business, extraordinary rendition, as well as blackmail, bribery and coercion of decision makers and public servants.

                      Crimes against we the people and the deterioration of the American Constitution are justified in the minds of the betrayers of humanity by hollow catchwords like the “national security”. All deception starts with self deception. Once again in history of humanity well meaning people are tricked to work and dedicate their lives for their own enemies. The criminal cabal running the show are manipulating the nations to give up their sovereignty and independence to a centralized and corrupt one world government. There is no place in that totalitarian system for nations or “national security”. It’s just one more illusion together with freedom and democracy, free speech or the American dream, a dream that once was but is turning into a nightmare. And it’s global.

 

Views: 666

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Less Prone on January 22, 2014 at 7:02pm

All text scrambler files available for download on scribd

http://www.scribd.com/collections/4423026/Text-scrambler-application

No more on 2016

Comment by Not mainstreamer on January 16, 2014 at 4:23pm

x = the message, y = the code, 100 = the encryptic message

Example: sending account number

Encryptic message = 48230057399

Here NSA, knowing the method, can conclude the real message is some number that can be an account number. But to find account number they need the code. So they must locate the code - lets say that was by phone (audio) ... another job/department. Code could also be by snail mail, now they have a real problem, reading all snail mails, and putting it together.

Comment by Less Prone on January 15, 2014 at 4:41am

Yes, in general and in real numbers x and y can be anything from minus infinity to plus infinity as long as their sum in one hundred. In this application the limits are set from 100 to 999.

Comment by Not mainstreamer on January 14, 2014 at 7:36pm

(I have not studied this Excel workbook or Micheal Rivero on the topic)

How much time will a supercomputer need to solve: x + y = 100 ?

Answer = inf years, too many unknown. NSA is helpless against that kind of encryption. In the age of computing encryption itself is easy. When people start to use it NSA in the end will need more water than there is in US to cool down their computers.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone commented on Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
"Perfect for destroying the supply chain. It could well have been intentional."
14 hours ago
Less Prone favorited Doc Vega's blog post Was Sabotage or Terrorism used in the Collapse of the Francis Scott Key Bridge?
14 hours ago
Doc Vega posted blog posts
16 hours ago
rlionhearted_3 posted photos
19 hours ago
rlionhearted_3 favorited Doc Vega's photo
19 hours ago
tjdavis posted a video

Alabama’s Biggest Secret - Operation Paperclip 🇺🇸

In the north of Alabama is the city of Huntsville. It's here where German scientists built NASA in secrecy after World War II. Operation Paperclip is still s...
22 hours ago
tjdavis posted a photo
yesterday
Doc Vega commented on Doc Vega's blog post Americans You’re Being Squeezed Out!
"Cheeki kea always nice to her you chime in and you're damn right! "
yesterday
Doc Vega commented on Doc Vega's blog post Americans You’re Being Squeezed Out!
"Les Prone thanks for your support Dude! "
yesterday
Doc Vega posted a photo

The inconvenient truth

Trump spells it out!
yesterday
Sandy posted a photo
Wednesday
Less Prone favorited Doc Vega's blog post What Made the Founding Fathers of America so Brilliant?
Tuesday
Less Prone commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Motives of Joe, to shit in the well by showing totally irrelevant proof?"
Tuesday
Doc Vega commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Less, Motives of Wyatt or Joe? What archeologist wouldn't want proof of Jesus as part of his…"
Tuesday
Doc Vega commented on Doc Vega's blog post Why didn't the Archeological World Announce Proof that Jesus Lived?
"Less Prone, Considering Joe Rogan to be the gatekeeper of anything is just short of ridiculous the…"
Tuesday
Doc Vega posted a blog post
Tuesday
MAC posted a video

Don't Go To Hong Kong Now (Even on Connecting Flights)

Secure your privacy with Surfshark! Enter coupon code laowhy86 for an extra 3 months free at https://Surfshark.deals/laowhy86Article 23 in Hong Kong is real,...
Tuesday
cheeki kea commented on cheeki kea's video
Thumbnail

Terrorist Attack on Moscow - Ukraine Committing Suicide? | Larry C. Johnson

"...And I guess I'll just park this you tube here also for something to ponder from last year.…"
Tuesday
tjdavis posted photos
Tuesday
Less Prone posted a video

Climate: The Movie (The Cold Truth) NL

Deze nieuwe documentaire van de Britse filmmaker Martin Durkin toont aan dat klimaatalarm een verzonnen doembeeld is zonder enige wetenschappelijke basis. He...
Monday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted