FREE OPEN SOURCE ENCRYPTION SOFTWARE - NO BACK DOORS

Below is an introduction from the user’s manual for text scrambling application R144. The application is free, fully modifiable, and will be sent on request on anyone interested.

Our privacy is challenged every day by electronic surveillance of communication, electronic transactions and location recording without our consent. Computers are compromised by advanced spying technologies inconspicuously transmitting data. However, we all have the right to maintain our privacy when we so desire. Intelligence agencies collecting and analyzing huge amounts of data gathered all the time don’t bother to inform us or ask for permission. Companies providing encryption applications are under pressure to make back doors in their software allowing hacking of messages and cannot be trusted.

Therefore, it is essential to have our own system to keep the private messages really private. We have nothing to hide but we have all the right to maintain privacy. The ever expanding surveillance of every day activities has crossed the line as exposed by the courageous NSA whistle blower Edward Snowden. The Big Brother described in George Orwell’s ominous book, 1984, has grown out of proportions and continues to grow with the lack of meaningful annoyance and resistance of the public. It is time to stick up the middle finger and defeat the Big Brother’s endless schemes to invade our privacy.

                      At the current form the text scrambler is made with Excel but anyone knowledgeable in matrices and programming C++ or other advanced programming languages is invited to develop the system further. The application is free to be used and modified. The only wish is to keep the key operating features of the key files and randomizable character set open for all users to modify in order to maintain the system at maximum level of security and privacy. Any developer of the system is urged to leave no back doors for the snooping agencies. Privacy is sacred.

This version or the modified scrambler can be distributed among the friends and family. The best way to do it is not by email attachment, but by handing it over personally. The scrambler does not need to be installed in any computer; it is enough to have it in a pen drive that can go with the user. The user only needs an Excel program to run it. Compatibility with Open Office work sheets has not been tested. It should be clear without saying that using Excel in a Cloud system over Internet completely exposes all you have been trying to keep private. Therefore, this application should be used with Excel, or Open Office, installed in the computer. This application does not affect or detect any spying equipment hidden in the computer.

In general, people would be wise to consider the personal information they post on the web. Many social networks, email services, online stores and other services have their shady links to intelligence services whose “business” in many cases goes far beyond of what normally is perceived as intelligence. Industrial and state espionage together with snooping to people’s personal lives is criminal but that is the soft side of “intelligence”. On the hard side there are “wet jobs” i.e. assassinations, and clandestine paramilitary operations, agent provocateurs, manufactured revolutions, drug business, extraordinary rendition, as well as blackmail, bribery and coercion of decision makers and public servants.

                      Crimes against we the people and the deterioration of the American Constitution are justified in the minds of the betrayers of humanity by hollow catchwords like the “national security”. All deception starts with self deception. Once again in history of humanity well meaning people are tricked to work and dedicate their lives for their own enemies. The criminal cabal running the show are manipulating the nations to give up their sovereignty and independence to a centralized and corrupt one world government. There is no place in that totalitarian system for nations or “national security”. It’s just one more illusion together with freedom and democracy, free speech or the American dream, a dream that once was but is turning into a nightmare. And it’s global.

 

Views: 666

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Less Prone on February 13, 2014 at 8:15pm

There are loads of text documents online that can be used as key files

Comment by Not mainstreamer on February 12, 2014 at 10:18am

http://en.wikipedia.org/wiki/Steganography may be an idea for transferring keys files?

Comment by Less Prone on February 12, 2014 at 9:08am

I agree that the computer are still far back in speed when compared to visual analysis that humans, animals, and even insects have. Human brain can recognize objects in the field of vision in a split second, a task that computers are incapable of. It is possible to hide pictures or text in pictures, I have tried some of that also.

Comment by Not mainstreamer on February 12, 2014 at 4:17am

When keys are hided into images by custom programming they are pretty lost these supercomputers - unless they start searching for hidden keys in everything :)

Comment by Not mainstreamer on February 12, 2014 at 4:12am

Sure they can tap data on (connected) PC/Mac/iPhone/Android (high priority targets). But they cannot copy all hard disks on everything for practical reasons ... that kind of activity will show up on phone bills.

Comment by Less Prone on February 11, 2014 at 8:31pm
Comment by Not mainstreamer on February 11, 2014 at 6:56pm

Ok. Maybe there are "SetFocus" / "Paste from clipboard" / "Select" / "Copy to clipboard" macros too - to skip dealing with Excel interface on small screens

http://social.msdn.microsoft.com/Forums/en-US/dae74b8d-1765-4d0c-87...

Comment by Less Prone on February 11, 2014 at 5:58pm

Not mainstreamer,

It's possible to copy the encrypted message from the Excel worksheet and paste it in email. The receiver of the mail then copies the encrypted message and pastes it in the MAIL.xls in his Scrambler folder and can read it with REAd.xls

Comment by Not mainstreamer on February 11, 2014 at 2:53pm

You said you'd like to have the software capable of encrypting text on a clipboard with a push of a button. This application does just that.

That is good news. On an iPhone, write message as normal, copy it to clipboard, execute something, and replace text in email client / application ... (that is pretty advanced programming)

Comment by Less Prone on February 11, 2014 at 2:16pm

Not mainstreamer,

You said you'd like to have the software capable of encrypting text on a clipboard with a push of a button. This application does just that. In place of clipboard you have lines where to type the message on a  worksheet and in place of buttons you have worksheets named.

MESSAGE worksheet in LOCK work book to type in the text to be encrypted

LOCKED worksheet in LOCK work book the encrypted message ready to be saved

READ workbook to read encrypted message sent to to you by email.

It cannot get much simpler than that.

Type in or copy paste your message in the LOCK workbook MESSAGE worksheet

Click LOCKED worksheet to view the encrypted message

Saving a copy of the encrypted (locked) message

Naming the encrypted message as MAIL.xls

Reading an encrypted message

These are the buttons; excel files with names describing their function

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted videos
3 hours ago
Doc Vega posted photos
8 hours ago
Doc Vega posted blog posts
9 hours ago
Less Prone left a comment for alux junes
"Thanks for the add. I saw you gab profile, you are solid minded."
11 hours ago
Less Prone and alux junes are now friends
11 hours ago
Less Prone posted a video

Klaus Schwab, Transgenderism, and AI | Russian Philosopher Aleksandr Dugin

Aleksandr Dugin is the most famous political philosopher in Russia. His ideas are considered so dangerous the Ukrainian government murdered his daughter and ...
11 hours ago
cheeki kea posted a blog post
13 hours ago
cheeki kea commented on cheeki kea's blog post The saddest post I've ever read. ( vaccine victim speaks out. )
"You're right LP their stories must be heard but they are scattered among numerous websites and…"
14 hours ago
cheeki kea commented on tjdavis's photo
Thumbnail

Sisterhood

"ah I hear music to my ears. Perhaps she know s o m e t h I n g . Smoking poisonous nightshade…"
15 hours ago
alux junes posted a status
16 hours ago
tjdavis posted a video

Australia's Sex v Gender Case Could Change Women's Rights GLOBALLY

Australian media are ignoring a landmark fight to reclaim sex based rights and protectionsfor all women and girls. This constitutional law case is not only r...
yesterday
Doc Vega posted blog posts
Monday
tjdavis posted a photo
Monday
Less Prone commented on tjdavis's video
Thumbnail

"The Chinese thought it was an elaborate joke" | Helen Joyce

"It is so ridiculous and sad how we are being manipulated to accept all this nonsense. "
Monday
Less Prone favorited tjdavis's video
Monday
tjdavis posted a video

Afroman - Hunter Got High (Official Video)

Support Afroman and what this video is about by buying HUNTER GOT HIGH merch! LET PEOPLE KNOW HOW YOU FEEL! https://basterecords.com/pages/artists/afroman-me...
Monday
Burbia commented on tjdavis's video
Monday
Burbia commented on KLC's group MUSICWARS
Monday
Burbia posted videos
Sunday
Burbia commented on Burbia's video
Sunday

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted