your food is affecting everyone.

one may say that what business others have with his/her/its food, it’s their personal choice. let see it: because food carries the building blocks of your body, and your body is the carrying substance of your mind, and your mind affects people around you, therefore the food you eat affects everyone around you. thus everyone has the right to stop you eating garbage food, because your food affects them as well, not only you.

Advertisements

bk AHC: Commercial uses of the cryptography method. (19)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Apart of securing some data from access by third parties there are other uses of the encoding in hieroglyphic writing as well. I’m describing some other uses of the method in other chapters briefly, but to the commercial use of the method I dedicate entire chapter. Not only because it needs more detailed explanation but also because while implemented in commerce the encryption method will become popular faster than with simple promotion.

bk AHC: Drawing exercises. (18.2)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Even if you’re good at drawing, having a lot of practice in precise hand movement, drawing the hieroglyphs which have a meaning in every line, dot, curve angle and so on, is quite different compared to an approximate representation of things where few lines more or less won’t make any difference. Also the Chinese and Japanese hieroglyphs do not compare in precision to drawing hieroglyphs for cryptography — it requires much more attention to detail than just general look of something represented in few almost careless lines. You must kind of learn to draw again, no matter what your experience.

That’s probably how you’ll begin to draw glyphs in my style of writing..

bkAHC_18-2-A

Here I give you some examples of glyphs to draw lines over them with ever greater detail (you don’t need to practice on this page — there are pages to print/copy in the end of the book — chapter 28, with the exercises as well) ..

The simplest glyphs, the beginning..

bkAHC_18-2-B

More complex and connected glyphs (as in these glyphs there are more details – which are important – and harder to understand, I include the sample script) ..

bkAHC_18-2-C

After several of the simplest exercises is easier to begin creating your own cryptic symbols of whatever design possible. As I mentioned, in the end of the book there are many glyphs to practice, on the pages to print/copy.. you can enlarge a copy if necessary in the beginning, and later to make another copy much smaller for the same exercise.

bk AHC: Attention exercises. (18.1. – B)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

These are two similar looking but far not identical scripts (part one of the exercise is on the previous page). Find the difference — just one. This little difference in writing will make a big difference in deciphering the code:

An example 1, part 2 – modified script:

bkAHC_18-1-B-1

An example 2, part 2 – modified script:

bkAHC_18-1-B-2

In the modified script of the second example there are four differences significant for the encryption method. Try first find the differences by visual memory, and only after the failure to find all the four differences compare the two scripts side by side.

bk AHC: Attention exercises. (18.1. – A)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

With your friends you can help each other with some visual attention exercises. You can write on paper whatever script, initially without any meaning, copy it, then change just a few symbols a little bit in one of the scripts — for example extend a line or a curve or add a line with an angle, and then copy the modified script. Then ask your friend to spot the difference on the two copies of the script.

An example 1, part 1 – original script:

bkAHC_18-1-A-1

An example 2, part 1 – original script:

bkAHC_18-1-A-2

The original and modified scripts must both be copied because then one can’t figure out the changes made by the applied extra ink. The exercise should first be made with bigger differences in scripts and gradually with ever subtle differences, up to reasonable degree of course, for a practical script writing purpose. While making changes try to stick to the logic of hieroglyphic writing described in the book — not all the differences between hieroglyphs can count as differences in encryption — you will never be able to write the same glyphs absolutely identical, making rather hugely differently looking glyphs at first glance, but with exactly the same value, thus only the relevant changes to hieroglyphs must be made right from the beginning, even for the visual attention exercises.

The script comparison samples should be shown separately, not together, to have a better effect on training memory and attention to detail. If one cannot spot the difference then both copies can be shown together to find the difference. Then new examples can be created repeating the process, showing first the different scripts separately. After some practice everyone should be able to see the whole picture and be able to spot the difference (in short scripts) without looking at them both at the same time.

bk AHC: Exercises. (18)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

For improving your skills in the cryptography method with hieroglyphs there are only two specific types of exercises needed: to improve attention to detail within the glyphs and to improve the skill of drawing the glyphs with all the attention to detail. All the other skills necessary for the encoding method are not so specific to the method — many other fields of life train you in general skills.
Obviously, those who have learned the languages which use hieroglyphic writing are much better off in this method of encryption, but at the same time this previous skill of writing different kind of glyphs – with completely different rules – may even be an obstacle. Exercises are good for all, with any background in languages.

bk AHC: content, a reminder.

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Content.

1 Introduction.

2 A bit of history.

3 Why handwriting?

4 Relevance.

5 The method.

5.1 Getting an idea.

5.2 Seeking the information.

5.3 Learning all the details.

5.4 Working on your own.

6 Basic principles of handwriting encryption.

7 Techniques of encryption.

7.1 Confusion / substitution.

7.1a Information carriers.

7.1b Noise and distraction elements.

7.2 Diffusion / transposition.

7.3 Other techniques.

7.3a Data points method.

7.3b Mathematical method.

7.3c Art method.

7.3d Hiding method.

7.4 Writing styles.

7.5 Using switches.

8 Encryption symbols.

8.1 Base hieroglyphs.

8.2 Characters.

8.3 Additional signs.

9 Lists of symbols.

9.1 Classic text symbols (TS).

9.1a Alphabets.

9.1b Numerals.

9.1c Mathematical symbols.

9.1d Other symbols.

9.1e Highlighting and more.

9.2 Cryptic symbols (CS).

9.2a Diffusion symbols.

9.2b Correction symbols.

9.2c Assisting symbols.

9.2d Modifiers.

9.2e Switches.

9.2f Other tools.

10 How complex code is good enough?

11 Systematization and memorizing.

12 Sharing and personalization .

12.1 Sharing with one person.

12.2 Sharing with several people.

12.3 Temporary sharing.

12.4 Urgent sharing.

12.5 Key delivery.

13 Securing the method for recovery.

13.1 Recovery of encryption method.

13.2 Recovery of encrypted data.

14 For developers.

15 Application.

16 Example of glyph parts.

17 Examples of code creation.

17.1 Basic code.

17.2 Medium level code.

17.2a Matrix of symbols.

17.2b Encryption symbols.

17.2c The creation process.

17.2d Description of rules.

17.2d – 01 Basic rules of the code.

17.2d – 02 Base cryptic symbols (BCS).

17.2d – 03 Attached cryptic symbols (ACS).

17.2d – 04 Separate cryptic symbols (SCS).

17.2d – 05 Creating additional rules.

17.2e Writing sample.

18 Exercises.

18.1 Attention exercises.

18.2 Drawing exercises.

19 Commercial uses of the cryptography method.

19.1 Cryptic messages project.

19.1a Guessing of messages.

19.1b Creating a lottery.

19.1c Promotional ads.

19.2 Cryptic signatures.

19.3 Cryptic orders.

19.4 Other commercial uses.

20 Writing music.

21 Advanced games for training.

22 Cryptography in social life.

23 Cryptography in gambling.

24 The highest level method.

25 Work on the book.

26 Future of the method.

26.1 Writing without encryption.

26.2 Encoding without hieroglyphs.

26.3 About the next challenge.

27 Artwork.

28 To print / copy.

  • R-matrix.
  • C-list.
  • Drawing exercises.
  • Samples of world writings, horizontal.

  • Samples of world writings, vertical.

  • Encryption symbols, example of different parts.

  • Example of steganographic encryption.

29 Get in touch.

30 Legal notice.

31 Content.

__

download the full book: sellfy.com/p/ujMc