about communication services/apps

please note that i began using the number +* *** *** ****  [# no longer in use since the month of may 2018, contact me by email] a month ago — reference article: youthextension.wordpress.com/2017/11/24/trading-forex-like-a-pro .. since then i have discovered that there are some communication services (whatsapp, telegram, perhaps more) associated with it, by the previous user(s) of the phone number. i have gained access to ‘whatsapp’ and ‘telegram’ and corrected the user data. i’m not using whatsapp anymore because messages there aren’t always delivered, saved data is sometimes lost, and other issues with it. i’m testing telegram app to see if it’s reliable — i haven’t found there the option to log out all the other users though. please be aware that any apps/services associated with the above mentioned phone number are not necessarily related to my activity — please confirm with me on the above phone number directly about the use of any apps/programs related to the number. there are loads of communication services out there and i have no time to check them all. thank you for your comprehension. A K

ps. the best way to contact me is by e-mail: data.test.pro@gmail.com


bk AHC: content, a reminder.

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3


1 Introduction.

2 A bit of history.

3 Why handwriting?

4 Relevance.

5 The method.

5.1 Getting an idea.

5.2 Seeking the information.

5.3 Learning all the details.

5.4 Working on your own.

6 Basic principles of handwriting encryption.

7 Techniques of encryption.

7.1 Confusion / substitution.

7.1a Information carriers.

7.1b Noise and distraction elements.

7.2 Diffusion / transposition.

7.3 Other techniques.

7.3a Data points method.

7.3b Mathematical method.

7.3c Art method.

7.3d Hiding method.

7.4 Writing styles.

7.5 Using switches.

8 Encryption symbols.

8.1 Base hieroglyphs.

8.2 Characters.

8.3 Additional signs.

9 Lists of symbols.

9.1 Classic text symbols (TS).

9.1a Alphabets.

9.1b Numerals.

9.1c Mathematical symbols.

9.1d Other symbols.

9.1e Highlighting and more.

9.2 Cryptic symbols (CS).

9.2a Diffusion symbols.

9.2b Correction symbols.

9.2c Assisting symbols.

9.2d Modifiers.

9.2e Switches.

9.2f Other tools.

10 How complex code is good enough?

11 Systematization and memorizing.

12 Sharing and personalization .

12.1 Sharing with one person.

12.2 Sharing with several people.

12.3 Temporary sharing.

12.4 Urgent sharing.

12.5 Key delivery.

13 Securing the method for recovery.

13.1 Recovery of encryption method.

13.2 Recovery of encrypted data.

14 For developers.

15 Application.

16 Example of glyph parts.

17 Examples of code creation.

17.1 Basic code.

17.2 Medium level code.

17.2a Matrix of symbols.

17.2b Encryption symbols.

17.2c The creation process.

17.2d Description of rules.

17.2d – 01 Basic rules of the code.

17.2d – 02 Base cryptic symbols (BCS).

17.2d – 03 Attached cryptic symbols (ACS).

17.2d – 04 Separate cryptic symbols (SCS).

17.2d – 05 Creating additional rules.

17.2e Writing sample.

18 Exercises.

18.1 Attention exercises.

18.2 Drawing exercises.

19 Commercial uses of the cryptography method.

19.1 Cryptic messages project.

19.1a Guessing of messages.

19.1b Creating a lottery.

19.1c Promotional ads.

19.2 Cryptic signatures.

19.3 Cryptic orders.

19.4 Other commercial uses.

20 Writing music.

21 Advanced games for training.

22 Cryptography in social life.

23 Cryptography in gambling.

24 The highest level method.

25 Work on the book.

26 Future of the method.

26.1 Writing without encryption.

26.2 Encoding without hieroglyphs.

26.3 About the next challenge.

27 Artwork.

28 To print / copy.

  • R-matrix.
  • C-list.
  • Drawing exercises.
  • Samples of world writings, horizontal.

  • Samples of world writings, vertical.

  • Encryption symbols, example of different parts.

  • Example of steganographic encryption.

29 Get in touch.

30 Legal notice.

31 Content.


download the full book: sellfy.com/p/ujMc

a quick temporary fix for eye injuries and gunshot wounds.

Scientists have developed a temporary glue which could afford people suffering major eye injuries precious time amid the race to get emergency surgery.

Developed at the University of Southern California (USC), the sealant is being pitched as a potential sight saver for soldiers inflicted with traumatic eye injuries by battlefield shrapnel. It’s hoped the hydrogel could also be used to prevent vision deterioration in other cases where full treatment is not immediately available.

The stopgap solution, which transforms from a fluid to a semi-solid when applied, can effectively plug lacerations to the eyeball. Successfully trialled on rabbits, the gel was injected via a syringe and was found to preserve the eyeball without inflammation or further damage, according to a Science Translational Medicine journal study.

read the full article.. www.rt.com/news/412216-reversible-superglue-eye-injuries/

bk AHC: Examples of code creation. (17)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The examples are created as simple as possible for easy and quick understanding. While using these examples as a template for your own method you should alter the code significantly, with original keys and symbols of encryption.

17.1 Basic code. /…/ 

17.2 Medium level code. /…/

[ the chapters with examples of the basic and medium level encryption method are published in great detail in the free version of the book, on over 20 pages.. sellfy.com/p/HQH3 ]


bk AHC: Example of glyph parts. (16-b)

An excerpt from the book Advanced Handwriting Cryptography..

full book https://sellfy.com/p/ujMc / free examples https://sellfy.com/p/HQH3

Here’s an example of a cipher text how it would actually look, prior to showing you the possible different parts:


The different ways to connect the glyphs are here hard to notice to those who don’t know where ends the base glyph and where begins the connection part between glyphs, which can actually be a separate cryptic symbol. Without showing you the separate parts in different colors it would be impossible to determine (for those who don’t have the key) where are the base glyphs and where are the attached parts.

An example of separate parts in writing the glyphs together..


Now lets have another look at this. In case of different parts of the similar looking glyphs chosen as base glyphs, and therefore different ways of encoding information, the separate parts of the similar cipher text may be as this..


Notice, the attached parts weren’t possible to distinguish without knowing the base glyphs, and that’s just one of the easiest examples I have given you. During design of the encryption elements in your code you must consider all the reasonably applicable ways to confuse possible adversaries, but not going to such length as to confuse yourself. There are more tools and ways to make the code sufficiently strong, not only the style of writing and visible/invisible attached parts of the glyphs.

bk AHC: Example of glyph parts. (16-a)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

There are countless ways to create glyphs with different parts, so here I’ll give you just an idea, not a rule for following. It’s always better if each and every code is created unique, not copied from the book or anybody else. An allegoric comparison can be made with music — if someone gives you an instrument and you’re free to play then you don’t need to play the same melodies that others do, you can compose your own, but you’re still bound by the principles of music and by the possibilities of the instrument. But if you look around then you’re not bound to the instrument neither.. you can find another type of instrument. And if you’re talented enough you can even build your own original instrument. But no matter what instrument you have you’re still bound by the rules of the music. This is like the boundary of the cryptography, the rules you must follow in order for the cryptography to accomplish the task of encoding. But you can use whatever suitable instruments.. whatever hieroglyphs or other symbols that cannot be even called hieroglyphs, as long as you’re able to encode data with the tools you’ve chosen or created your own.

Here are some examples of different parts of glyphs..


In the samples above the base glyphs are black and data points are in several colors. The gray part in the end of the glyphs is an example of connecting glyphs in different ways. The different connections between glyphs can carry specific information or may be just a design element, a noise.

Scientists found a way to reprogram cells faster, skipping the stage of stem cells.

Scientists from the University of Edinburgh have made a discovery that will speed up the process of production of cells in the lab. This discovery is just two molecules, called SMAD2 and SMAD3. Scientists found that they are very important in the process of reprogramming of cells. This allows one type of cells to become another type of cells. Reprogramming is used in the labs all over the world extensively, but is has never been a very efficient process. Now scientists are hoping that the discovery of these two molecules, which are able to enhance the efficiency of converting mature cells into induced pluripotent stem cells, will speed up the production of cells for lab testing.

read the full article.. www.technology.org/2017/12/01/scientists-found-a-way-to-reprogram-cells-faster-skipping-the-stage-of-stem-cells