FREE OPEN SOURCE ENCRYPTION SOFTWARE - NO BACK DOORS

Below is an introduction from the user’s manual for text scrambling application R144. The application is free, fully modifiable, and will be sent on request on anyone interested.

Our privacy is challenged every day by electronic surveillance of communication, electronic transactions and location recording without our consent. Computers are compromised by advanced spying technologies inconspicuously transmitting data. However, we all have the right to maintain our privacy when we so desire. Intelligence agencies collecting and analyzing huge amounts of data gathered all the time don’t bother to inform us or ask for permission. Companies providing encryption applications are under pressure to make back doors in their software allowing hacking of messages and cannot be trusted.

Therefore, it is essential to have our own system to keep the private messages really private. We have nothing to hide but we have all the right to maintain privacy. The ever expanding surveillance of every day activities has crossed the line as exposed by the courageous NSA whistle blower Edward Snowden. The Big Brother described in George Orwell’s ominous book, 1984, has grown out of proportions and continues to grow with the lack of meaningful annoyance and resistance of the public. It is time to stick up the middle finger and defeat the Big Brother’s endless schemes to invade our privacy.

                      At the current form the text scrambler is made with Excel but anyone knowledgeable in matrices and programming C++ or other advanced programming languages is invited to develop the system further. The application is free to be used and modified. The only wish is to keep the key operating features of the key files and randomizable character set open for all users to modify in order to maintain the system at maximum level of security and privacy. Any developer of the system is urged to leave no back doors for the snooping agencies. Privacy is sacred.

This version or the modified scrambler can be distributed among the friends and family. The best way to do it is not by email attachment, but by handing it over personally. The scrambler does not need to be installed in any computer; it is enough to have it in a pen drive that can go with the user. The user only needs an Excel program to run it. Compatibility with Open Office work sheets has not been tested. It should be clear without saying that using Excel in a Cloud system over Internet completely exposes all you have been trying to keep private. Therefore, this application should be used with Excel, or Open Office, installed in the computer. This application does not affect or detect any spying equipment hidden in the computer.

In general, people would be wise to consider the personal information they post on the web. Many social networks, email services, online stores and other services have their shady links to intelligence services whose “business” in many cases goes far beyond of what normally is perceived as intelligence. Industrial and state espionage together with snooping to people’s personal lives is criminal but that is the soft side of “intelligence”. On the hard side there are “wet jobs” i.e. assassinations, and clandestine paramilitary operations, agent provocateurs, manufactured revolutions, drug business, extraordinary rendition, as well as blackmail, bribery and coercion of decision makers and public servants.

                      Crimes against we the people and the deterioration of the American Constitution are justified in the minds of the betrayers of humanity by hollow catchwords like the “national security”. All deception starts with self deception. Once again in history of humanity well meaning people are tricked to work and dedicate their lives for their own enemies. The criminal cabal running the show are manipulating the nations to give up their sovereignty and independence to a centralized and corrupt one world government. There is no place in that totalitarian system for nations or “national security”. It’s just one more illusion together with freedom and democracy, free speech or the American dream, a dream that once was but is turning into a nightmare. And it’s global.

 

Views: 669

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by Not mainstreamer on February 11, 2014 at 1:51pm

Caller : Are you talking 512 bits key?

Rivero: I am talking away beyond that, 5-6000 bits key.

6000 bit = 750 bytes

I myself is talking keybooks: 200,000 -- 16,000,000,000 bytes (200 KBytes = an image, 16 Gig = size of a Memory stick). Those who knows programming, it is easy. Those who do not know programming, get a custom solution (RentaCoder.com) for $200 or more 

Comment by Not mainstreamer on February 11, 2014 at 9:23am

What is maybe more difficult for people to accept is Microsoft (and others) being a spy agency.

Comment by Not mainstreamer on February 11, 2014 at 9:19am

Rivero concludes NSA is losing. Solutions like The Free Open Source Encryption makes NSA impotent. They cannot break it

First hour 18:00 http://whatreallyhappened.com/WRHARTICLES/podcast.php

When we get homemade solutions everywhere they will be facing a task where everywhere there are no workable anti-algoritm. Compare that to the German Enigma - that would have been broken in one day by todays computers.

Comment by Not mainstreamer on February 10, 2014 at 1:21pm

I would like to see text in clipboard being encrypted by a button, and the same for decryption. That will be practical. 

Comment by Less Prone on February 10, 2014 at 6:04am

Not mainstreamer,

I believe the next logical step to improve the application would be the use of Excel macros and Basic language embedded in Excel. That would probably eliminate a lot of formulas repeated over and over again for each matrix element. I don't have time to do that. I have provided a prototype that works and is open for further development. Any other programming language capable of matrix operations would also do just fine. I'm developing the application to have larger mail matrix, from 85 x 201 to 85 x 1000 first and so on.

Comment by Not mainstreamer on February 10, 2014 at 4:56am

If one can define program logic then getting coding done by http://www.getacoder.com/ will cost $200-$1000.. very timesaving because a professional do not need to learn a new language

Comment by Not mainstreamer on February 10, 2014 at 4:46am

C# and SharpDev as IDE are easy and free tools. Javascript is the choice that works on all platforms. Both have sufficient speed. C++ is a hell to learn.

Comment by Not mainstreamer on February 10, 2014 at 4:32am

When the password is as long as the message, then it has the same effect as if it were infinite

That is a good point. When the key/password is larger than the message (100 times preferable) then the key becomes unsolvable (for supercomputers). For practical reason one will use the same key for some time, meaning 100 times larger than each message is best. This is something most people will comprehend. - they can do it themselves. NSA breaking "any code" is just pretense - they cannot.

Comment by Less Prone on February 9, 2014 at 7:22pm

The figures you are referring to (85x201) are simply a limitation set by Excel and the application. In Excel and this application the password can be extended to 85 x 65535 = 5,570,475 characters. When the password is as long as the message, then it has the same effect as if it were infinite. It is the idea that is important here. I'm inviting people to the test the application and get used to the idea so that they can develop their own software based on C++ or other programming language. Go and download the files from Scribd  or send me email address where you want the application to be sent. A zipped file is just about 4M in size.

Comment by Not mainstreamer on February 9, 2014 at 6:51pm

The password is set to 85 * 201 bytes = 17085 bytes

One cannot transfer 17085 bytes by voice, it has to be transferred digitally - memory stick is one solution. A memory stick can hold 16,000,000,000+ bytes. Just use all that storage as "password", or at least 200,000 bytes (hidden into an image?).  But then a programming language like Javascript or PowerBasic is needed for speed.

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone favorited tjdavis's video
8 hours ago
Less Prone posted a photo

Social Engineering 101

That's how it goes.
8 hours ago
Doc Vega posted a blog post

A Prelude to WW III ? It Seems There We Are Trailblazing Idiocy into More Blood and Destruction!

They're rolling out the 25th Amendment trying to stop Joe Biden from insanely thrusting the US in a…See More
14 hours ago
Less Prone posted a video

Chris Langan - The Interview THEY Didn't Want You To See - CTMU [Full Version; Timestamps]

DW Description: Chris Langan is known to have the highest IQ in the world, somewhere between 195 and 210. To give you an idea of what this means, the average...
yesterday
Doc Vega posted a blog post

RFK Jr. Appoinment Rocks the World of the Federal Health Agncies and The Big Pharma Profits!

The Appointment by Trump as Secretary of HHS has sent shockwaves through the federal government…See More
Tuesday
tjdavis posted a video

Somewhere in California.

Tom Waites and Iggy Pop meet in a midnight diner in Jim Jarmusch's 2003 film Coffee and Cigarettes.
Tuesday
cheeki kea commented on cheeki kea's photo
Thumbnail

1 possible 1

"It's possible, but less likely. said the cat."
Monday
cheeki kea posted a photo
Monday
tjdavis posted a blog post
Monday
Tori Kovach commented on cheeki kea's photo
Thumbnail

You are wrong, all of you.

"BECAUSE TARIFFS WILL PUT MONEY IN YOUR POCKETS!"
Monday
Tori Kovach posted photos
Monday
Doc Vega posted a blog post

Whatever Happened?

Whatever Happened?  The unsung heroes will go about their dayRegardless of the welcome they've…See More
Sunday
Doc Vega commented on Doc Vega's blog post A Requiem for the Mass Corruption of the Federal Government
"cheeki kea Nice work! Thank you! "
Sunday
cheeki kea commented on Doc Vega's blog post A Requiem for the Mass Corruption of the Federal Government
"Chin up folks, once the low hanging fruit gets picked off a clearer view will reveal the higher…"
Sunday
Doc Vega's 4 blog posts were featured
Saturday
tjdavis's blog post was featured
Saturday
cheeki kea commented on cheeki kea's blog post Replicon Started in Tokyo October 08, 2024
"Your right LP it's insane for sure and hopefully improbable, keeping an open mind. Checking…"
Saturday
rlionhearted_3 commented on tjdavis's blog post Bill Gates Deleted Documentary
Saturday
rlionhearted_3 commented on tjdavis's blog post Bill Gates Deleted Documentary
"The white dude in the center is Bill Gates!!! "
Saturday
Less Prone favorited tjdavis's blog post Bill Gates Deleted Documentary
Nov 15

© 2024   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted