Random Fluctuations — From Roulette to Stock Exchange. (2018).

bk-rf2018-cvr

[ the book is available online — sellfy.com/p/SVsU ]

This book is a collection of materials which I have began publishing on my websites and social media since around 2010, which is about one and half decades after I began research with a scientific approach, using in technical terms “brute force”, using programmable scientific calculators with graphing capacity. Before that, for well over a decade, there was nothing to write about because I wasn’t able to come up with a solution. Even then, in 2010, after thousands of tested strategies, I still believed it is impossible to beat roulette, but I was already confident enough to disclose how to minimize losses, just to enjoy the game without ending up a big loser. Only somewhere in the end of 2014 it was becoming clear that there is a solution to beating roulette with mathematically defined steps, a clearly defined strategy, in terms of probabilities of several human lifetimes. I have never claimed that there’s an absolute guarantee to beat roulette with any of my strategies, because there isn’t. I only maintain that you can improve your chances so much that in a normal human lifetime, not sitting in casino 24 hours a day obviously, one can overcome the house edge if not being extremely unlucky or a victim of a fraud by casinos, about which you will also find information in this book, in the collected writings.

Part 1 of the book is about roulette. Part 2 is about applying my mathematical strategy to stock market, with examples of my trading tests with live forex data.

For more visit my blog..
youthextension.wordpress.com
..and select appropriate category for the material on the subject.

With Best Wishes,
Alex A. O. Kobold

Advertisements

The book Advanced Handwriting Cryptography.

The book Advanced Handwriting Cryptography.

For several millennia, almost since the birth of writing, it’s been the dream of rulers and warlords to exchange letters without worries that someone could read their exchanges when intercepted. In the age of internet when almost anyone having proper hacking tools can read your messages, this dream of ancient powerful has found its way into the minds and hearts of common people. And now the dream has come true – the writing system which anyone can learn and customize the way that no unwanted parties can read, has been created. The new era of writing has begun. It’s the era when people can write with no worries about disclosure of their private messages.

code example

_

Legal Notice: The author of this book has used his best efforts in preparing this book. The author makes no representation or warranties with respect to the accuracy, applicability, fitness, or completeness of the contents of this book. The information contained in this book is strictly for educational purposes. Therefore, if you wish to apply ideas contained in this book, you are taking full responsibility for your actions. The author disclaims any warranties (express or implied), merchantability, or fitness for any particular purpose. The author shall in no event be held liable to any party for any direct, indirect, punitive, special, incidental or other consequential damages arising directly or indirectly from any use of this material, which is provided “as is”, and without warranties.


my books to download.. sellfy.com/youthextension

bk AHC: Content.

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

1 Introduction.
2 A bit of history.
3 Why handwriting?
4 Relevance.
5 The method.
5.1 Getting an idea.
5.2 Seeking the information.
5.3 Learning all the details.
5.4 Working on your own.
6 Basic principles of handwriting encryption.
7 Techniques of encryption.
7.1 Confusion / substitution.
7.1a Information carriers.
7.1b Noise and distraction elements.
7.2 Diffusion / transposition.
7.3 Other techniques.
7.3a Data points method.
7.3b Mathematical method.
7.3c Art method.
7.3d Hiding method.
7.4 Writing styles.
7.5 Using switches.
8 Encryption symbols.
8.1 Base hieroglyphs.
8.2 Characters.
8.3 Additional signs.
9 Lists of symbols.
9.1 Classic text symbols (TS).
9.1a Alphabets.
9.1b Numerals.
9.1c Mathematical symbols.
9.1d Other symbols.
9.1e Highlighting and more.
9.2 Cryptic symbols (CS).
9.2a Diffusion symbols.
9.2b Correction symbols.
9.2c Assisting symbols.
9.2d Modifiers.
9.2e Switches.
9.2f Other tools.
10 How complex code is good enough?
11 Systematization and memorizing.
12 Sharing and personalization .
12.1 Sharing with one person.
12.2 Sharing with several people.
12.3 Temporary sharing.
12.4 Urgent sharing.
12.5 Key delivery.
13 Securing the method for recovery.
13.1 Recovery of encryption method.
13.2 Recovery of encrypted data.
14 For developers.
15 Application.
16 Example of glyph parts.
17 Examples of code creation.
17.1 Basic code.
17.2 Medium level code.
17.2a Matrix of symbols.
17.2b Encryption symbols.
17.2c The creation process.
17.2d Description of rules.
17.2d – 01 Basic rules of the code.
17.2d – 02 Base cryptic symbols (BCS).
17.2d – 03 Attached cryptic symbols (ACS).
17.2d – 04 Separate cryptic symbols (SCS).
17.2d – 05 Creating additional rules.
17.2e Writing sample.
18 Exercises.
18.1 Attention exercises.
18.2 Drawing exercises.
19 Commercial uses of the cryptography method.
19.1 Cryptic messages project.
19.1a Guessing of messages.
19.1b Creating a lottery.
19.1c Promotional ads.
19.2 Cryptic signatures.
19.3 Cryptic orders.
19.4 Other commercial uses.
20 Writing music.
21 Advanced games for training.
22 Cryptography in social life.
23 Cryptography in gambling.
24 The highest level method.
25 Work on the book.
26 Future of the method.
26.1 Writing without encryption.
26.2 Encoding without hieroglyphs.
26.3 About the next challenge.
27 Artwork.
28 To print / copy.
– R-matrix.
– C-list.
– Drawing exercises.
– Samples of world writings, horizontal.
– Samples of world writings, vertical.
– Encryption symbols, example of different parts.
– Example of steganographic encryption.
29 Get in touch.
30 Legal notice.
31 Content.


my books to download.. sellfy.com/youthextension

bk AHC: following chapters (27-28)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

[ the following chapters you’ll find in the full book ]

/…/

27 Artwork

28 To print / copy.

R-matrix

C-list

Drawing exercises

Samples of world writings, horizontal

Samples of world writings, vertical

Encryption symbols, example of different parts

Example of steganographic encryption

/…/

encryption-symbols.jpg


my books to download.. sellfy.com/youthextension

bk AHC: About the next challenge. (26.3)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Perhaps there isn’t much to improve in the advanced handwriting cryptography method as such, because in the end everyone must come up with the details on his/her/its own, to make the personal code unique. The challenge thus is in making the method more convenient, to be able to write as fast as regular unencrypted handwriting, but not compromising the security of the code. There may be some tricks that I haven’t come up to as of yet, which I may discover one day. So far the method requires quite a bit of mental work, but I see it not as a fault — it’s rather an additional benefit. The challenge still is out there and I’m giving to it some thought from time to time.


my books to download.. sellfy.com/youthextension

bk AHC: Encoding without hieroglyphs. (26.2)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The encryption method can be used without the hieroglyphs, in an art for example — as I have mentioned already in the section ‘art method’ (chapter 7.3c) messages can be hidden in lines, curves, dots of a picture that has no resemblance to hieroglyphic script at all, not like in my ‘artwork’ in this book (chapter 27). The principles of encryption can well be used in steganographic way in many fields of life, encoding messages in sight of everyone while only those who know the key can get the message. Not sure that I myself be taking these steps in a serious manner, just having some fun, but these are the options to go further to anyone who would want to — to develop specific techniques for encrypting messages hidden in plain sight, while others cannot see there nothing else but just a painting or drawing, or just a regular text message while the encrypted message is hidden in cryptic symbols added to the text. On the pages to print/copy (chapter 28) I give an example of writing cryptic messages hidden in a regular text.

I did try to find interested people in that field. In 2015 in Italy I talked to many gallery owners in an attempt to get in touch with painters who would like to collaborate with me on inserting cryptographic messages into art. I failed to find interest in it. Myself I’m not a painter, very far from it, thus I know my limitations and won’t be taking this field up without a professional assistance. One day, after some specific training I may take up artwork in a sophisticated level as well, who knows. So far someone else could try, test and write a book about it, with examples of code creation, different possibilities of hidden messages in paintings, with basic principles everyone should follow and so on. Then it will be easier to put the method into practice.

For example in front of a safe can be a picture with encrypted code to open the safe. If that encryption art has to be developed from scratch, using only the principles given in this book, it will be possible but perhaps too time consuming for a practical use. When there will be a manual to follow, similar to the hieroglyphic writing, then it will be worth consideration by many.

I’m far from thinking that I have already thought of and written about all of the possible ways of using the writing method and the encryption method. I’ll be glad to learn from others the new ways of using the techniques of writing/encryption, so whenever free time I can take up a new journey in developing the methods further. The more challenging the task will be the better for keeping brain active and in good health.


my books to download.. sellfy.com/youthextension

bk AHC: Writing without encryption. (26.1)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

26 Future of the method.

The method of handwriting allows to separate it into different areas of application, also for a different purpose than encrypting data. And it also allows to make use of the cryptographic part of the method without using hieroglyphs.

26.1 Writing without encryption.

When there’s enough interest in different parts of the world then hopefully one day there will be groups of people who will be able to make another good use of the method of writing. It doesn’t have to be cryptographic but quite the opposite – creation of a writing system for representing any language with the same symbols, for easy learning to speak any chosen language.

No language exists which is capable of representing all the sounds from all the existing languages without significant modifications and additions to the existing characters in any chosen alphabet. As this writing method (with glyphs) allows representation of symbols in millions of ways I’m quite confident it will be capable to tackle any phonetic challenge with an ease, simply needs to be worked out by linguists. There are not so many ways to produce a sound, thus by creating the rules of representation of sounds within a single complex symbol (glyph) it is possible to have covered all sounds without the need to use many letters in combination. I imagine the set of a few hundred symbols will cover all spoken languages and maybe even less symbols is needed if used together with attached characters for sound modification.


my books to download.. sellfy.com/youthextension