The book Advanced Handwriting Cryptography.

The book Advanced Handwriting Cryptography.

For several millennia, almost since the birth of writing, it’s been the dream of rulers and warlords to exchange letters without worries that someone could read their exchanges when intercepted. In the age of internet when almost anyone having proper hacking tools can read your messages, this dream of ancient powerful has found its way into the minds and hearts of common people. And now the dream has come true – the writing system which anyone can learn and customize the way that no unwanted parties can read, has been created. The new era of writing has begun. It’s the era when people can write with no worries about disclosure of their private messages.

code example

_

Legal Notice: The author of this book has used his best efforts in preparing this book. The author makes no representation or warranties with respect to the accuracy, applicability, fitness, or completeness of the contents of this book. The information contained in this book is strictly for educational purposes. Therefore, if you wish to apply ideas contained in this book, you are taking full responsibility for your actions. The author disclaims any warranties (express or implied), merchantability, or fitness for any particular purpose. The author shall in no event be held liable to any party for any direct, indirect, punitive, special, incidental or other consequential damages arising directly or indirectly from any use of this material, which is provided “as is”, and without warranties.


my books to download.. sellfy.com/youthextension

Advertisements

bk AHC: Content.

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

1 Introduction.
2 A bit of history.
3 Why handwriting?
4 Relevance.
5 The method.
5.1 Getting an idea.
5.2 Seeking the information.
5.3 Learning all the details.
5.4 Working on your own.
6 Basic principles of handwriting encryption.
7 Techniques of encryption.
7.1 Confusion / substitution.
7.1a Information carriers.
7.1b Noise and distraction elements.
7.2 Diffusion / transposition.
7.3 Other techniques.
7.3a Data points method.
7.3b Mathematical method.
7.3c Art method.
7.3d Hiding method.
7.4 Writing styles.
7.5 Using switches.
8 Encryption symbols.
8.1 Base hieroglyphs.
8.2 Characters.
8.3 Additional signs.
9 Lists of symbols.
9.1 Classic text symbols (TS).
9.1a Alphabets.
9.1b Numerals.
9.1c Mathematical symbols.
9.1d Other symbols.
9.1e Highlighting and more.
9.2 Cryptic symbols (CS).
9.2a Diffusion symbols.
9.2b Correction symbols.
9.2c Assisting symbols.
9.2d Modifiers.
9.2e Switches.
9.2f Other tools.
10 How complex code is good enough?
11 Systematization and memorizing.
12 Sharing and personalization .
12.1 Sharing with one person.
12.2 Sharing with several people.
12.3 Temporary sharing.
12.4 Urgent sharing.
12.5 Key delivery.
13 Securing the method for recovery.
13.1 Recovery of encryption method.
13.2 Recovery of encrypted data.
14 For developers.
15 Application.
16 Example of glyph parts.
17 Examples of code creation.
17.1 Basic code.
17.2 Medium level code.
17.2a Matrix of symbols.
17.2b Encryption symbols.
17.2c The creation process.
17.2d Description of rules.
17.2d – 01 Basic rules of the code.
17.2d – 02 Base cryptic symbols (BCS).
17.2d – 03 Attached cryptic symbols (ACS).
17.2d – 04 Separate cryptic symbols (SCS).
17.2d – 05 Creating additional rules.
17.2e Writing sample.
18 Exercises.
18.1 Attention exercises.
18.2 Drawing exercises.
19 Commercial uses of the cryptography method.
19.1 Cryptic messages project.
19.1a Guessing of messages.
19.1b Creating a lottery.
19.1c Promotional ads.
19.2 Cryptic signatures.
19.3 Cryptic orders.
19.4 Other commercial uses.
20 Writing music.
21 Advanced games for training.
22 Cryptography in social life.
23 Cryptography in gambling.
24 The highest level method.
25 Work on the book.
26 Future of the method.
26.1 Writing without encryption.
26.2 Encoding without hieroglyphs.
26.3 About the next challenge.
27 Artwork.
28 To print / copy.
– R-matrix.
– C-list.
– Drawing exercises.
– Samples of world writings, horizontal.
– Samples of world writings, vertical.
– Encryption symbols, example of different parts.
– Example of steganographic encryption.
29 Get in touch.
30 Legal notice.
31 Content.


my books to download.. sellfy.com/youthextension

bk AHC: following chapters (27-28)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

[ the following chapters you’ll find in the full book ]

/…/

27 Artwork

28 To print / copy.

R-matrix

C-list

Drawing exercises

Samples of world writings, horizontal

Samples of world writings, vertical

Encryption symbols, example of different parts

Example of steganographic encryption

/…/

encryption-symbols.jpg


my books to download.. sellfy.com/youthextension

bk AHC: About the next challenge. (26.3)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Perhaps there isn’t much to improve in the advanced handwriting cryptography method as such, because in the end everyone must come up with the details on his/her/its own, to make the personal code unique. The challenge thus is in making the method more convenient, to be able to write as fast as regular unencrypted handwriting, but not compromising the security of the code. There may be some tricks that I haven’t come up to as of yet, which I may discover one day. So far the method requires quite a bit of mental work, but I see it not as a fault — it’s rather an additional benefit. The challenge still is out there and I’m giving to it some thought from time to time.


my books to download.. sellfy.com/youthextension

bk AHC: Encoding without hieroglyphs. (26.2)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The encryption method can be used without the hieroglyphs, in an art for example — as I have mentioned already in the section ‘art method’ (chapter 7.3c) messages can be hidden in lines, curves, dots of a picture that has no resemblance to hieroglyphic script at all, not like in my ‘artwork’ in this book (chapter 27). The principles of encryption can well be used in steganographic way in many fields of life, encoding messages in sight of everyone while only those who know the key can get the message. Not sure that I myself be taking these steps in a serious manner, just having some fun, but these are the options to go further to anyone who would want to — to develop specific techniques for encrypting messages hidden in plain sight, while others cannot see there nothing else but just a painting or drawing, or just a regular text message while the encrypted message is hidden in cryptic symbols added to the text. On the pages to print/copy (chapter 28) I give an example of writing cryptic messages hidden in a regular text.

I did try to find interested people in that field. In 2015 in Italy I talked to many gallery owners in an attempt to get in touch with painters who would like to collaborate with me on inserting cryptographic messages into art. I failed to find interest in it. Myself I’m not a painter, very far from it, thus I know my limitations and won’t be taking this field up without a professional assistance. One day, after some specific training I may take up artwork in a sophisticated level as well, who knows. So far someone else could try, test and write a book about it, with examples of code creation, different possibilities of hidden messages in paintings, with basic principles everyone should follow and so on. Then it will be easier to put the method into practice.

For example in front of a safe can be a picture with encrypted code to open the safe. If that encryption art has to be developed from scratch, using only the principles given in this book, it will be possible but perhaps too time consuming for a practical use. When there will be a manual to follow, similar to the hieroglyphic writing, then it will be worth consideration by many.

I’m far from thinking that I have already thought of and written about all of the possible ways of using the writing method and the encryption method. I’ll be glad to learn from others the new ways of using the techniques of writing/encryption, so whenever free time I can take up a new journey in developing the methods further. The more challenging the task will be the better for keeping brain active and in good health.


my books to download.. sellfy.com/youthextension

bk AHC: Writing without encryption. (26.1)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

26 Future of the method.

The method of handwriting allows to separate it into different areas of application, also for a different purpose than encrypting data. And it also allows to make use of the cryptographic part of the method without using hieroglyphs.

26.1 Writing without encryption.

When there’s enough interest in different parts of the world then hopefully one day there will be groups of people who will be able to make another good use of the method of writing. It doesn’t have to be cryptographic but quite the opposite – creation of a writing system for representing any language with the same symbols, for easy learning to speak any chosen language.

No language exists which is capable of representing all the sounds from all the existing languages without significant modifications and additions to the existing characters in any chosen alphabet. As this writing method (with glyphs) allows representation of symbols in millions of ways I’m quite confident it will be capable to tackle any phonetic challenge with an ease, simply needs to be worked out by linguists. There are not so many ways to produce a sound, thus by creating the rules of representation of sounds within a single complex symbol (glyph) it is possible to have covered all sounds without the need to use many letters in combination. I imagine the set of a few hundred symbols will cover all spoken languages and maybe even less symbols is needed if used together with attached characters for sound modification.


my books to download.. sellfy.com/youthextension

bk AHC: Work on the book. (25-8)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

After writing the initial version of the book in 2013 I’ve been also promoting lectures/seminars on the topic. Unfortunately, as I lived in the countries where people consider lectures in English not as prominent as in their own language, I didn’t have much success. Maybe also the topic is too difficult for a larger interest in public, especially not in the main language of communication. Most importantly, my financial means to promote the lectures/classes/seminars were almost inexistent — I created fliers, printed and copied them whenever some little money available from occasional one-two day jobs, rarely longer, and shared them on the street. Sometimes I got a possibility to print/copy for free and I used every opportunity. I also tried to find free local online services for such information, which would be popular enough. On some popular online sites for private buy/sell/teach and such advertisements my ads were not allowed to be published and the money I paid was returned. The excuse was as “not compatible with community standards” or something like that. Also my tablet’s virus protection and anti-spy apps began warning me when I installed the apps for those popular online sites. Thus I stopped attempting to promote my cryptography on these sites.

Here are some advertisements which I did while having temporary longer stops between the periods of almost constant traveling..

In Switzerland, 2014..

ahc-wotb-25g

By the way, in Bern, Switzerland, I went to every private language school I could find — over ten of them — and proposed to include my classes of handwriting cryptography in their lists of classes. None of them was interested, even if they looked curious in the beginning. I have no idea why people are scared of cryptography.. that’s my impression.. people are scared.. curious, but afraid to get involved in any ways.
That’s entirely another topic, how people are enslaved in their minds, related to the politics and fear-mongering. Sure you already got an idea about my position from my political activism, but here’s something I wish to share: I have come to conclusion that generally (not individually) people deserve the life they get. Submission to authority as a nation or a large group of people isn’t a one time decision, but the personality traits and actions (or non-actions) of them as a whole, in majority, thus they deserve the results.

Here’s some of my street promotion in Italy, 2015..

ahc-wotb-25h1

ahc-wotb-25h2

These above are photos of the postcards which I painted, to promote the method. After few months of ‘selling’ I gave them all away for free because there was no point to carry around packs of them while the ‘business’ wasn’t picking up. It’s difficult to call it an art but I had to do something. At least I tried. People were curious but very seldom someone was willing to give money for a postcard where nothing could be understood what is written on them. In the back of the cards there was written the address of my website which clarified a lot to those willing to seek further information. By now the web domain I used is discontinued (at the time of editing the book) but hopefully I will soon earn enough and regain ownership of the domain name. Then I’ll be able to better promote the cryptography method and the book.


all my books to download.. sellfy.com/youthextension