finding happiness

Finding Happiness in an Uncertain World

vimeo.com/youthextension

__
all my books to download.. sellfy.com/youthextension

__

Advertisements

bk AHC: The highest level method. (24-b)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

It will be impossible to crack a properly created highest level code because those who would attempt to crack the code will have no access to so many parts of the puzzle:

  • number of dimensions in the matrix;
  • size of the dimensions in the matrix;
  • all of the real symbols used in the encryption method;
  • which alphabet letters and punctuation marks are doubled/tripled/quadrupled/.. within the matrix;

  • how many sets of numbers there are in the matrix;

  • which alphabet letters are combined into syllables in the matrix and how;

  • how numbers are combined into pairs within the matrix;

  • how many positions in the matrix are utilized for noise;

  • commands and switches used in the encryption method;

  • position of real symbols/commands/modifiers/switches in the matrix;

  • values of the elements in the glyphs (lines, line breaks, curves, dots etc.);

  • relative sizes of valid elements in glyphs;

  • valid combinations of elements in glyphs;

  • values of valid combinations of the elements in glyphs;

  • context of applying values in elements of glyphs;

  • elements in glyphs with no values, the noise;

  • reading patterns of values within glyphs;

  • number of reading patterns within glyphs and when they change;

  • up to how many glyphs takes to access one location in matrix;

  • changes in the application order of different hieroglyphs;

  • rules of access of information in the matrix;

  • context of using symbols and commands in the matrix;

  • which words are preset and encrypted with a single symbol (TS and/or CS);

  • how the preset words are created within hieroglyphs or within the matrix;

  • which prefixes and suffixes are preset and how are they used in the code;

  • which grammatical rules are preset for easy creation of sentences;

  • in which context the preset grammatical rules apply within cipher text;

  • abbreviation tools for words within cipher text (TS/CS);

  • abbreviation tools for sentences/propositions within cipher text (TS/CS);

  • highlighting tools within cipher text;

  • error correction tools within cipher text (TS and CS):

  • copy/add/paste tools within cipher text (TS and CS);

.. and more — only known to me;

.. and much much more, limited only by the imagination;

(The CS in context of the highest level method means specific combinations of the elementary parts — the elements from which the glyphs are created on the spot — lines, dots, etc., and not the ready glyph parts as in basic/medium/high level code).

The possible number of different combinations of all of this is quite impossible to determine. Even if the number of possible combinations of the separate elements (lines, angles, curves etc.) can approximately be determined by some level of human precision in writing, and by that also the number of possible combinations between the elements in a glyph, then possible number of rules can only be limited by human imagination. So the lifetime safety of your code is guaranteed because even the repeating hieroglyphs which you happen to create on the spot similar to each other, don’t need to carry the same information — the hieroglyphs can change access values depending on context (previously encrypted information or previously used elements in the cipher text). After all, you’ll not be encrypting everything in life, only in case of necessity, thus there will never be the critical mass of a cipher text out there even to consider an attempt of cracking the code. Regardless of all the mathematical impossibility to determine the used logic of encryption by third parties the code is still simple to use by those who know the key. In the sense of the cryptography method, while numbers are being used as values hidden in the glyphs to access information in the matrix, you can say that a hieroglyph is worth more than a thousand numbers.

Before going for the highest level code for your personal use you should begin practicing with the simpler versions, which can also be useful in some occasions. You should always keep in mind the Basic Principles of Handwriting Encryption (described in the chapter 6). Without paying attention to the basic principles whole your work may turn out useless – the keys to your code must remain secret.

One remark about whatever encryption method, not only the method described in this book: If there’s a real need to crack a code of a common person then in many cases a simple, verified by historic accounts method — fingers under the chair — will produce all the necessary keys. Thus, don’t overwork with this, have some common sense and consider your realistic needs, not an utopian scenario of aliens attacking and necessity to have an unbreakable code against an advanced civilisation, to save mankind.


a reminder, my books.. sellfy.com/youthextension

bk AHC: The highest level method. (24-a)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The medium and high level encoding techniques of the advanced handwriting cryptography method aren’t principally very different. Both of them are utilizing ready parts of hieroglyphs which in correct combinations are pointing to precise locations in the matrix. The difference in them comes mostly from the amount and level of complexity of the rules. The highest level encryption technique is more complex and more simple at the same time, depending on the point of view.

Lets have an overview first, beginning with the most basic level:

In the most basic level (chapter 17.1) the combinations of the cryptic symbols are very straightforward, with no many possibilities of different combinations of BCS, while utilizing several additional cryptic symbols, ACS and SCS, for safety.

In the medium level code (chapter 17.2) there are many more combinations of BCS with ACS, which can by themselves change value with the help of correction symbols and some SCS. The ACS/SCS themselves are also much more numerous.

In the high level code (which I mentioned within the chapter 17.2) the principles are similar to the medium level code but with less BCS and many more possibilities of applying different rules to access information in the matrix, with the help of a larger number of ACS/SCS in many different combinations.

Now, the highest level code has no specified BCS, ACS or SCS at all, only specific rules to read information from the angles of lines, curves, dots, circles, triangles, crossing lines in different (relative) angles, relative positions/sizes of the elements and so on. There are countless possible combinations of them with consequently changing values which are also context dependant, location dependant, relative size dependant and more.. not all the specifics I can make known here because that’s the method I use myself. You can already get the idea that in the highest level code there’s no list of cryptic symbols, only the rules of reading values from the elements of the glyphs and very complex matrix with many dimensions. All the hieroglyphs in the cipher text are created on the spot by the specific rules which allow to encrypt/decrypt values in the glyphs for accessing information in the matrix. It may all look a bit similar to the principles of Chinese/Japanese hieroglyphs but with way more clear rules, because the rules of cryptography specify precise numerical values for accessing data in the matrix — no varying exceptions which are present in any natural language. Of course you can include at will specific exceptions to your highest level code and with that to make the code even more secure, but there’s no need for it. The code is in principle already extremely secure. You can use for noise any combinations of the elements which aren’t included in the rules. As a reminder: a single specific symbol or specific combination of symbols designated for the purpose can discard all of the default rules which allows you to design for noise (and for aesthetic look) any hieroglyphs at will, including the elements which in default conditions you’re using for encoding with valid values. The options of including noise in the cipher text are limitless.


a reminder, my books.. sellfy.com/youthextension

bk AHC: Cryptography in gambling. (23)

 

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Anyone playing in casinos professionally knows that there are all sorts of people around in those places. Most of them are just casual losers or have dropped in from curiosity. Those who do play seriously are noticed and kept an eye on, to find out if they really are regularly winning and making some profit. For certain casino games there are permitted to make notes, and if you’re the one who do know the secret of the trade, it is better to keep your notes encrypted. The writing method is particularly convenient for certain casino games because it allows to make notes in just a few short symbols in place of a regular writing which would take for the same amount of information several times more symbols. But you need to develop your own writing of course. Your gambling notes don’t need to be completely (deeply) encrypted because your play is visible to others anyway, but your long term strategy will not be known to any curious onlooker because others won’t make any sense of your notes just by a quick look at them.


a reminder, my books.. sellfy.com/youthextension

bk AHC: Cryptography in social life. (22)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Clubs, organizations, religions, politics.. any social environments can make a great use of the cryptography method. It becomes especially useful because you don’t need other tools but your brain to encode/decode messages, right on the spot (event, gathering) when necessary. For example one could put under a slogan of a political party an encrypted smaller message to those closer circles, dedicated to the key of the code.. like saying in the hidden message “don’t believe it, that’s just for a public sell of our party”.

bk AHC: Advanced games for training. (21)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Already for some time I’ve had in my mind the idea to develop games, for creating more interest in the method and thus training in the capacity to read this kind of hieroglyphic writing. One example of the games is described in the cryptic messages project (chapter 19.1), a guessing game, but that’s a very simple version. The encryption method allows to create way more sophisticated games, not only for a larger public but also for trained mathematicians and cryptanalysis professionals, up to the point till they begin turning themselves in for a psychiatric assessment and committing suicides.. just kidding.
It may indeed seem too tough, but again, it’s like with music — if you learn to play different kind of instruments from notes, then picking up another instrument which is quite similar will be much easier.
The problem here is that for me games are a waste of life, except if they demand physical input and thus help keeping you healthy, or those intellectual games that don’t go over the same mental processes endlessly but teach you something new, practical for life — but then I don’t call them games, I call these activities training, to make the distinction. The distinction must also be made between those who practice and those who watch others practicing without ever having been engaged in the activities themselves in any serious manner, so called fans.
I haven’t played any computer games since I was perhaps in my twenties, or maybe I stopped playing games even earlier, before I joined army in 18 years of age. After the end of the service it happened that I played minesweeper in some rare occasions — I must admit wasting few hours of my life on it. Creating myself a game for this method of cryptography isn’t really my calling, but as you see I did try to make a business with it, offering my services to marketing companies.. I suspect that from my letters was possible to read out the lack of enthusiasm by some syntactic rules known to people in the marketing business, and that’s why I had so few responses regardless of a good idea.
I realize it will be beneficial for promoting the method to create some games so I’m open to this option somewhere in an unpredictable future when I’ll get nothing better to do with my life, which actually I don’t see coming. Life is very Interesting and there’s much to discover. The book has waited to be written for so long time because I’ve been traveling extensively, been around the world, meditating in high mountains in several places, living in many countries for a long time, and all this demands time. As I love traveling then I hardly imagine spending time on creating games, only on writing the book for few weeks or months.
For now I leave the creation of games to others who would like to get involved in making this type of cryptography a popular subject in peoples lives. With creation of games the cryptography method can get a bit better traction in popular culture I suppose, because there are so many people for whom playing games is the meaning of life. Creating games on the subject that can benefit someone’s life it’s not a bad thing. With the cryptography games the attention of at least some people will be taken away from the games that are completely useless in acquiring practical skills.
I’ll be happy to read about the encryption games from others who will come up with something, either described in this book or something new, while using the basic principles of the method. That’s my goal — to promote the method to the point till it will be a compulsory subject in the education system of every civilised country on this planet and beyond.