bk AHC: content, a reminder.

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3


1 Introduction.

2 A bit of history.

3 Why handwriting?

4 Relevance.

5 The method.

5.1 Getting an idea.

5.2 Seeking the information.

5.3 Learning all the details.

5.4 Working on your own.

6 Basic principles of handwriting encryption.

7 Techniques of encryption.

7.1 Confusion / substitution.

7.1a Information carriers.

7.1b Noise and distraction elements.

7.2 Diffusion / transposition.

7.3 Other techniques.

7.3a Data points method.

7.3b Mathematical method.

7.3c Art method.

7.3d Hiding method.

7.4 Writing styles.

7.5 Using switches.

8 Encryption symbols.

8.1 Base hieroglyphs.

8.2 Characters.

8.3 Additional signs.

9 Lists of symbols.

9.1 Classic text symbols (TS).

9.1a Alphabets.

9.1b Numerals.

9.1c Mathematical symbols.

9.1d Other symbols.

9.1e Highlighting and more.

9.2 Cryptic symbols (CS).

9.2a Diffusion symbols.

9.2b Correction symbols.

9.2c Assisting symbols.

9.2d Modifiers.

9.2e Switches.

9.2f Other tools.

10 How complex code is good enough?

11 Systematization and memorizing.

12 Sharing and personalization .

12.1 Sharing with one person.

12.2 Sharing with several people.

12.3 Temporary sharing.

12.4 Urgent sharing.

12.5 Key delivery.

13 Securing the method for recovery.

13.1 Recovery of encryption method.

13.2 Recovery of encrypted data.

14 For developers.

15 Application.

16 Example of glyph parts.

17 Examples of code creation.

17.1 Basic code.

17.2 Medium level code.

17.2a Matrix of symbols.

17.2b Encryption symbols.

17.2c The creation process.

17.2d Description of rules.

17.2d – 01 Basic rules of the code.

17.2d – 02 Base cryptic symbols (BCS).

17.2d – 03 Attached cryptic symbols (ACS).

17.2d – 04 Separate cryptic symbols (SCS).

17.2d – 05 Creating additional rules.

17.2e Writing sample.

18 Exercises.

18.1 Attention exercises.

18.2 Drawing exercises.

19 Commercial uses of the cryptography method.

19.1 Cryptic messages project.

19.1a Guessing of messages.

19.1b Creating a lottery.

19.1c Promotional ads.

19.2 Cryptic signatures.

19.3 Cryptic orders.

19.4 Other commercial uses.

20 Writing music.

21 Advanced games for training.

22 Cryptography in social life.

23 Cryptography in gambling.

24 The highest level method.

25 Work on the book.

26 Future of the method.

26.1 Writing without encryption.

26.2 Encoding without hieroglyphs.

26.3 About the next challenge.

27 Artwork.

28 To print / copy.

  • R-matrix.
  • C-list.
  • Drawing exercises.
  • Samples of world writings, horizontal.

  • Samples of world writings, vertical.

  • Encryption symbols, example of different parts.

  • Example of steganographic encryption.

29 Get in touch.

30 Legal notice.

31 Content.


download the full book: sellfy.com/p/ujMc


a quick temporary fix for eye injuries and gunshot wounds.

Scientists have developed a temporary glue which could afford people suffering major eye injuries precious time amid the race to get emergency surgery.

Developed at the University of Southern California (USC), the sealant is being pitched as a potential sight saver for soldiers inflicted with traumatic eye injuries by battlefield shrapnel. It’s hoped the hydrogel could also be used to prevent vision deterioration in other cases where full treatment is not immediately available.

The stopgap solution, which transforms from a fluid to a semi-solid when applied, can effectively plug lacerations to the eyeball. Successfully trialled on rabbits, the gel was injected via a syringe and was found to preserve the eyeball without inflammation or further damage, according to a Science Translational Medicine journal study.

read the full article.. www.rt.com/news/412216-reversible-superglue-eye-injuries/

bk AHC: Examples of code creation. (17)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The examples are created as simple as possible for easy and quick understanding. While using these examples as a template for your own method you should alter the code significantly, with original keys and symbols of encryption.

17.1 Basic code. /…/ 

17.2 Medium level code. /…/

[ the chapters with examples of the basic and medium level encryption method are published in great detail in the free version of the book, on over 20 pages.. sellfy.com/p/HQH3 ]


bk AHC: Example of glyph parts. (16-b)

An excerpt from the book Advanced Handwriting Cryptography..

full book https://sellfy.com/p/ujMc / free examples https://sellfy.com/p/HQH3

Here’s an example of a cipher text how it would actually look, prior to showing you the possible different parts:


The different ways to connect the glyphs are here hard to notice to those who don’t know where ends the base glyph and where begins the connection part between glyphs, which can actually be a separate cryptic symbol. Without showing you the separate parts in different colors it would be impossible to determine (for those who don’t have the key) where are the base glyphs and where are the attached parts.

An example of separate parts in writing the glyphs together..


Now lets have another look at this. In case of different parts of the similar looking glyphs chosen as base glyphs, and therefore different ways of encoding information, the separate parts of the similar cipher text may be as this..


Notice, the attached parts weren’t possible to distinguish without knowing the base glyphs, and that’s just one of the easiest examples I have given you. During design of the encryption elements in your code you must consider all the reasonably applicable ways to confuse possible adversaries, but not going to such length as to confuse yourself. There are more tools and ways to make the code sufficiently strong, not only the style of writing and visible/invisible attached parts of the glyphs.

bk AHC: Example of glyph parts. (16-a)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

There are countless ways to create glyphs with different parts, so here I’ll give you just an idea, not a rule for following. It’s always better if each and every code is created unique, not copied from the book or anybody else. An allegoric comparison can be made with music — if someone gives you an instrument and you’re free to play then you don’t need to play the same melodies that others do, you can compose your own, but you’re still bound by the principles of music and by the possibilities of the instrument. But if you look around then you’re not bound to the instrument neither.. you can find another type of instrument. And if you’re talented enough you can even build your own original instrument. But no matter what instrument you have you’re still bound by the rules of the music. This is like the boundary of the cryptography, the rules you must follow in order for the cryptography to accomplish the task of encoding. But you can use whatever suitable instruments.. whatever hieroglyphs or other symbols that cannot be even called hieroglyphs, as long as you’re able to encode data with the tools you’ve chosen or created your own.

Here are some examples of different parts of glyphs..


In the samples above the base glyphs are black and data points are in several colors. The gray part in the end of the glyphs is an example of connecting glyphs in different ways. The different connections between glyphs can carry specific information or may be just a design element, a noise.

Scientists found a way to reprogram cells faster, skipping the stage of stem cells.

Scientists from the University of Edinburgh have made a discovery that will speed up the process of production of cells in the lab. This discovery is just two molecules, called SMAD2 and SMAD3. Scientists found that they are very important in the process of reprogramming of cells. This allows one type of cells to become another type of cells. Reprogramming is used in the labs all over the world extensively, but is has never been a very efficient process. Now scientists are hoping that the discovery of these two molecules, which are able to enhance the efficiency of converting mature cells into induced pluripotent stem cells, will speed up the production of cells for lab testing.

read the full article.. www.technology.org/2017/12/01/scientists-found-a-way-to-reprogram-cells-faster-skipping-the-stage-of-stem-cells

bk AHC: Application. (15)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The method of encryption I developed can be applied to any language, without exemptions, thus anyone can make use of it. I guess even aliens could use this method to transfer information as long as they produce sound, and even without sound. The method is based on representing one kind of information with another type of information, thus even music can be written using this encryption method. But the main application, in my opinion, is keeping your boring moments in life filled with an interesting and useful activity and keeping your brain active for the health of it. There are countless situations in life when people get stressed because something is happening just too slowly, forcing them to wait. I filled many of those moments thinking about the cryptography – either developing a system in mind or repeating the symbols not to forget them. In some occasions, when I was tired of working on a new system, I challenged myself to recall a discarded system which I have created long ago, and very successfully, being surprised how well I have remembered things I thought to have long forgotten. I wasn’t able to do it in the beginning but after years of training my capacity to memorize has grown quite a bit. My life has never been boring and for me the encryption was never a means for really hiding some information.. I don’t keep a diary and there’s no really a point in encrypting an address book – the data like phone numbers is possible to find out by other means if someone really wants to. After I did it once, for training purposes, I have never again encrypted my contacts. I am a developer.. I had interest in creating ever more sophisticated methods of encryption rather than really using them. It doesn’t mean I won’t, because now I have my own method which I’m happy with, but previously there was no point to encrypt something for a long time storage because after creating yet another code I didn’t use the old one anymore and purposefully tried to forget the old system which I didn’t use, not to confuse with the new one.

Creating your own writing method is an excellent memory training and on top of that it trains you in multitasking. For example if you stay in a queue in a shop exercising cryptography in your mind you cannot just lose your attention falling deep into thoughts – you must pay attention to everything around you, not to let have something stolen from you. You can clean your house and train your brain the same time – what an excellent application in my opinion. You can achieve the level when you walk around in a city for your daily stuff and develop cryptography in mind at the same time. I wouldn’t advise driving while doing so, unless you drive a car in a computer game. In any case, after some time of training you’ll be able to have complex tasks going on in your brain without affecting your attention to surroundings. I would even claim that you’ll be reacting more adequately to the situations around you when your brain is actively working on something than if you hang around on autopilot. When it comes to memorizing and recalling it’s quite clear from recent studies that human memory is specific to states. It means if you learn the glyphs in a quiet environment in home and try to recall them in other places, often in quite complex situations, you’ll present to your brain an extra challenge. With changed states (different surroundings, environment) between learning and recalling of learned information you’ll be creating and strengthening new paths in your brain (especially for finding connections in seemingly unrelated information), giving your brain extra capabilities which will help you in many ways.

Continue reading “bk AHC: Application. (15)”