bk AHC: Cryptography in gambling. (23)

 

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Anyone playing in casinos professionally knows that there are all sorts of people around in those places. Most of them are just casual losers or have dropped in from curiosity. Those who do play seriously are noticed and kept an eye on, to find out if they really are regularly winning and making some profit. For certain casino games there are permitted to make notes, and if you’re the one who do know the secret of the trade, it is better to keep your notes encrypted. The writing method is particularly convenient for certain casino games because it allows to make notes in just a few short symbols in place of a regular writing which would take for the same amount of information several times more symbols. But you need to develop your own writing of course. Your gambling notes don’t need to be completely (deeply) encrypted because your play is visible to others anyway, but your long term strategy will not be known to any curious onlooker because others won’t make any sense of your notes just by a quick look at them.


a reminder, my books.. sellfy.com/youthextension

Advertisements

bk AHC: Cryptography in social life. (22)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Clubs, organizations, religions, politics.. any social environments can make a great use of the cryptography method. It becomes especially useful because you don’t need other tools but your brain to encode/decode messages, right on the spot (event, gathering) when necessary. For example one could put under a slogan of a political party an encrypted smaller message to those closer circles, dedicated to the key of the code.. like saying in the hidden message “don’t believe it, that’s just for a public sell of our party”.

bk AHC: Advanced games for training. (21)

An excerpt from the book Advanced Handwriting Cryptography..
full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

Already for some time I’ve had in my mind the idea to develop games, for creating more interest in the method and thus training in the capacity to read this kind of hieroglyphic writing. One example of the games is described in the cryptic messages project (chapter 19.1), a guessing game, but that’s a very simple version. The encryption method allows to create way more sophisticated games, not only for a larger public but also for trained mathematicians and cryptanalysis professionals, up to the point till they begin turning themselves in for a psychiatric assessment and committing suicides.. just kidding.
It may indeed seem too tough, but again, it’s like with music — if you learn to play different kind of instruments from notes, then picking up another instrument which is quite similar will be much easier.
The problem here is that for me games are a waste of life, except if they demand physical input and thus help keeping you healthy, or those intellectual games that don’t go over the same mental processes endlessly but teach you something new, practical for life — but then I don’t call them games, I call these activities training, to make the distinction. The distinction must also be made between those who practice and those who watch others practicing without ever having been engaged in the activities themselves in any serious manner, so called fans.
I haven’t played any computer games since I was perhaps in my twenties, or maybe I stopped playing games even earlier, before I joined army in 18 years of age. After the end of the service it happened that I played minesweeper in some rare occasions — I must admit wasting few hours of my life on it. Creating myself a game for this method of cryptography isn’t really my calling, but as you see I did try to make a business with it, offering my services to marketing companies.. I suspect that from my letters was possible to read out the lack of enthusiasm by some syntactic rules known to people in the marketing business, and that’s why I had so few responses regardless of a good idea.
I realize it will be beneficial for promoting the method to create some games so I’m open to this option somewhere in an unpredictable future when I’ll get nothing better to do with my life, which actually I don’t see coming. Life is very Interesting and there’s much to discover. The book has waited to be written for so long time because I’ve been traveling extensively, been around the world, meditating in high mountains in several places, living in many countries for a long time, and all this demands time. As I love traveling then I hardly imagine spending time on creating games, only on writing the book for few weeks or months.
For now I leave the creation of games to others who would like to get involved in making this type of cryptography a popular subject in peoples lives. With creation of games the cryptography method can get a bit better traction in popular culture I suppose, because there are so many people for whom playing games is the meaning of life. Creating games on the subject that can benefit someone’s life it’s not a bad thing. With the cryptography games the attention of at least some people will be taken away from the games that are completely useless in acquiring practical skills.
I’ll be happy to read about the encryption games from others who will come up with something, either described in this book or something new, while using the basic principles of the method. That’s my goal — to promote the method to the point till it will be a compulsory subject in the education system of every civilised country on this planet and beyond.

bk AHC: Writing music. (20)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

As I mentioned in the chapter ‘Application’ even music can be encrypted using this method. Many years ago I even made an attempt to encode music. I have studied some musical instruments as a child, in a music school, thus the idea came naturally at some point. But that attempt of encrypting music was just fun, not for a practical purpose. One must be a genius to write music without playing an instrument, thus encrypting notes has no point — in most cases anyone can hear what you’re trying to create while you practice, and after all, music isn’t something you wish to hide normally. For some musical instruments this method of writing may be useful, for easier and compact reading while playing, without encrypting in a secret way of course, simply encoding for fast reading. But for most cases all the necessary musical writing techniques have already been developed perhaps to the best possible way it can be done. People have dedicated to this their whole lives thus there’s no need to discover a new way to do the same thing.

bk AHC: Other commercial uses. (19.4)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

In a company which has many workers there are often message boards to the workers in different departments, which all of the workers read when arriving to work. There’s no end to human curiosity thus some people read the messages not meant to them. Not every company has the means and even economic benefit for setting up electronic devices of communication, because these need maintenance, repair and so on. Thus the message board will still be there for many years to come in many large companies. To specify some messages on the board for reading by the people in certain department only, a simplest encrypted message can be put up on the board, while all of the workers in the department have the key. If someone has a difficulty to read the message on the board then another one in the same department can help out. Shaking up the capacity of the brain to function properly will only be beneficial for a company in a life of a routine. Encrypted messages in a company don’t need to be in a completely secret writing. A steganographic way may also be used. In the end of the book on the pages to print/copy (chapter 28) I give an example of writing cryptic messages on top of a regular text. The example of different inserted codes are on the first five lines of the sample text — you can practice with the following lines on a printed/copied page and then copy it after your cryptic symbols are written, then you will see how much of the added signs will be lost and how many remain visible after several copies. Almost any field of human non-digital communication which needs some parts of the information exchange to remain confidential or secured may find the cryptographic writing method useful in some ways, while using a light encryption in basic level or strong encryption in medium level. The strong encryption in high level is mostly for personal use only, for having a code which one can use the entire lifetime without worries.

bk AHC: Cryptic orders. (19.3)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

The use of cryptic orders can be accomplished in a similar way to the cryptic signatures, with the most basic advanced encryption method. It may be utile within companies and also between different companies which are in a regular partnership. Instead of cryptic signature the encrypted parts will be some items, or demands, or whatever needed, which are written on a document using the hieroglyphic method, while only the dedicated parties can read the messages. Then the document can pass through all the other departments and delivery persons without disclosing the sensitive parts of the document.

bk AHC: Cryptic signatures. (19.2)

An excerpt from the book Advanced Handwriting Cryptography..

full book sellfy.com/p/ujMc / free examples sellfy.com/p/HQH3

A simple signature is easy to fake. There are secure digital signatures in use these days but all human legal transactions will never be digitally confirmed. Common handwriting signature will remain in use. Here the cryptic signature may come for help against misuses. A cryptic signature will be harder to fake and it will also provide a level of confidentiality, in cases where the name isn’t written on the document but only a signature is required. For using a cryptic signature there can be used the most basic version of the advanced encryption method (described in chapter 17.1), which takes only a few minutes to create when you have done it before. You can change the cryptic signature while it remains yours. You can create the key of the code in a small piece of hard paper, protect it with a plastic cover, and carry around like other documents. When an occasion demands to sign something and it’s permitted to do it in encrypted way to hide your name from others who sign the same paper, then instead of your known signature you can create a cryptic signature on the spot, using the key you carry with you. Then in another document you can use a different cryptic signature so others can’t relate the documents as both been signed by you. But then needed to prove the authenticity of your signature you will prove it with your key, which isn’t secret but simply not available to anyone, like your passport. The key can be copied and kept in a secure location as a backup in case of loss, and you don’t need to write your name on the key. Anyone who finds the lost key will not know to whom it belongs, so a deliberate forgery of a signature becomes impossible — the person who finds the key won’t know the person to forge the signature, except stealing the key directly from the owner of the key. And even then it will be impossible if the owner of the key won’t have the full key written down, keeping few extra elements in memory, for safety. At the same time, anyone who finds the key can use it (even if the key is incomplete, without the extra safety elements) for securing his/her own signature (adding personal safety elements), or for sending lightly secured messages to someone having the copy of the same key. The probability of accidentally having identical key with someone else, an unwanted party, is extremely low even without the additional safety elements which are created by each user of the same key and memorized. the code won’t be unbreakable though, by other users of the same key, but that isn’t needed for signature — you only need the protect your signature against forgery. A cryptic signature is definitely safer than a simple signature. You can create several different cryptic signatures in advance the design you like and to practice them for a bit. Then you won’t have to invent a cryptic signature by the key on the spot, but use one of the available cryptic signatures which you use in different occasions, all of them valid.. or even a non valid signature if needed due to some social pressure, if you can’t refuse a thing that others demand you to sign, so if later you’ll get into a complicated situation you simply won’t recognise the signature as yours. For using your cryptic signature on an official document with your written name on it the key of the cryptic signature must be registered in some ways, for not claiming later that the signature isn’t yours, and the authorities must be capable of verifying the signature with the key, I suppose, but that’s not absolutely necessary because in these occasions you can use your regular signature.