The book Advanced Handwriting Cryptography.

The book Advanced Handwriting Cryptography.

For several millennia, almost since the birth of writing, it’s been the dream of rulers and warlords to exchange letters without worries that someone could read their exchanges when intercepted. In the age of internet when almost anyone having proper hacking tools can read your messages, this dream of ancient powerful has found its way into the minds and hearts of common people. And now the dream has come true – the writing system which anyone can learn and customize the way that no unwanted parties can read, has been created. The new era of writing has begun. It’s the era when people can write with no worries about disclosure of their private messages.

code example

_

Legal Notice: The author of this book has used his best efforts in preparing this book. The author makes no representation or warranties with respect to the accuracy, applicability, fitness, or completeness of the contents of this book. The information contained in this book is strictly for educational purposes. Therefore, if you wish to apply ideas contained in this book, you are taking full responsibility for your actions. The author disclaims any warranties (express or implied), merchantability, or fitness for any particular purpose. The author shall in no event be held liable to any party for any direct, indirect, punitive, special, incidental or other consequential damages arising directly or indirectly from any use of this material, which is provided “as is”, and without warranties.


my books to download.. sellfy.com/youthextension

Advertisements

bk AHC: Content.

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

1 Introduction.
2 A bit of history.
3 Why handwriting?
4 Relevance.
5 The method.
5.1 Getting an idea.
5.2 Seeking the information.
5.3 Learning all the details.
5.4 Working on your own.
6 Basic principles of handwriting encryption.
7 Techniques of encryption.
7.1 Confusion / substitution.
7.1a Information carriers.
7.1b Noise and distraction elements.
7.2 Diffusion / transposition.
7.3 Other techniques.
7.3a Data points method.
7.3b Mathematical method.
7.3c Art method.
7.3d Hiding method.
7.4 Writing styles.
7.5 Using switches.
8 Encryption symbols.
8.1 Base hieroglyphs.
8.2 Characters.
8.3 Additional signs.
9 Lists of symbols.
9.1 Classic text symbols (TS).
9.1a Alphabets.
9.1b Numerals.
9.1c Mathematical symbols.
9.1d Other symbols.
9.1e Highlighting and more.
9.2 Cryptic symbols (CS).
9.2a Diffusion symbols.
9.2b Correction symbols.
9.2c Assisting symbols.
9.2d Modifiers.
9.2e Switches.
9.2f Other tools.
10 How complex code is good enough?
11 Systematization and memorizing.
12 Sharing and personalization .
12.1 Sharing with one person.
12.2 Sharing with several people.
12.3 Temporary sharing.
12.4 Urgent sharing.
12.5 Key delivery.
13 Securing the method for recovery.
13.1 Recovery of encryption method.
13.2 Recovery of encrypted data.
14 For developers.
15 Application.
16 Example of glyph parts.
17 Examples of code creation.
17.1 Basic code.
17.2 Medium level code.
17.2a Matrix of symbols.
17.2b Encryption symbols.
17.2c The creation process.
17.2d Description of rules.
17.2d – 01 Basic rules of the code.
17.2d – 02 Base cryptic symbols (BCS).
17.2d – 03 Attached cryptic symbols (ACS).
17.2d – 04 Separate cryptic symbols (SCS).
17.2d – 05 Creating additional rules.
17.2e Writing sample.
18 Exercises.
18.1 Attention exercises.
18.2 Drawing exercises.
19 Commercial uses of the cryptography method.
19.1 Cryptic messages project.
19.1a Guessing of messages.
19.1b Creating a lottery.
19.1c Promotional ads.
19.2 Cryptic signatures.
19.3 Cryptic orders.
19.4 Other commercial uses.
20 Writing music.
21 Advanced games for training.
22 Cryptography in social life.
23 Cryptography in gambling.
24 The highest level method.
25 Work on the book.
26 Future of the method.
26.1 Writing without encryption.
26.2 Encoding without hieroglyphs.
26.3 About the next challenge.
27 Artwork.
28 To print / copy.
– R-matrix.
– C-list.
– Drawing exercises.
– Samples of world writings, horizontal.
– Samples of world writings, vertical.
– Encryption symbols, example of different parts.
– Example of steganographic encryption.
29 Get in touch.
30 Legal notice.
31 Content.


my books to download.. sellfy.com/youthextension

bk AHC: following chapters (27-28)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

[ the following chapters you’ll find in the full book ]

/…/

27 Artwork

28 To print / copy.

R-matrix

C-list

Drawing exercises

Samples of world writings, horizontal

Samples of world writings, vertical

Encryption symbols, example of different parts

Example of steganographic encryption

/…/

encryption-symbols.jpg


my books to download.. sellfy.com/youthextension