Personalized medita­tion. Online consultation.

Personalized medita­tion for stress reli­ef,
against anxiety, depression, psychol­ogical and physical pains,
and simply for improving mood.. for you and/or for your friends.

Consultations can be done online in written form, via talk or video talk. My preferred language for consultations is English but if needed then I can help you out also in French, in Italian, in Russian and in Spanish. Fee depends on the income of the person — no income, no fee. Don’t forget about your friends who may need help.

Alex Kobold: click here for the contact information (may change over time)


For self-help you can download my book “Seeming Reality” for free..


There’s one more thing I can do to help someone in depression or with other problems of mind and soul.. I can create a personalized sigil (a symbol for meditation) to tap into the power of subconscious mind. The sigil may also work on the level of a placebo effect but the purpose of it is to evoke subconscious powers which create lasting positive changes.

past social media accounts.

to avoid confusion and/or not to look like careless person i must tell to those who find some active social media accounts on my name or the name of my YE blog, please be aware that most of them are no longer attended by me. over the years i have tried so many different accounts that i haven’t been using many of them for a long time as not practical for my needs. for instance facebook, twitter, linkedin and others. some of them have been in disuse for so long time that i cannot even delete them because of new access rules.. for example some kind of ‘suspicious’ acivity detector demands me to call to several people whom i know, to get from them a confirmation code to access a long disused account. i don’t have time nor i feel the need to go through whole the proccess simply to delete the still active accounts which i no longer use. some platforms demand to call specific persons whom i have no phone contact with which makes access to the long disused account impossible, or very troublesome requiring opening a new account, contacting that person and explaining the situation etc., which is no guarantee of a success because as you know in social media most of contacts are people whom you never met. so, please be informed that if a certain social communication account doesn’t show the date of my last activity to other users it may still most likely be an unused social account. please confirm with me directly, by phone or an email before trying to contact by social media platforms. after all there’s always a possibility that someone else has gained access to my old accounts simply because i have traveled world so much and changed so many phone numbers over the years which have been used to create the accounts. it even happened to me once that with a new phone number one social account activated all the data and contacts of the previous user of that phone number.. it was quite a job to delete them all because that particular service didn’t have an option to delete all old contacts at once for security reasons. you get the point. please talk to me personally, by any video options or voice call, if you wish to be sure the message is delivered to me and not into the web wide void with a wrong or no answer.


direct links to download my books, synopsis/description below.

here are the direct links to download my books,
the books are all free and permitted to share:

Random Fluctuations — From Roulette to Stock Exchange

Advanced Handwriting Cryptography

Proverbs, Wisdoms And Old Sayings

Seeming Reality

below are short descriptions of the books..

Continue reading “direct links to download my books, synopsis/description below.”

The book Advanced Handwriting Cryptography.

The book Advanced Handwriting Cryptography.

For several millennia, almost since the birth of writing, it’s been the dream of rulers and warlords to exchange letters without worries that someone could read their exchanges when intercepted. In the age of internet when almost anyone having proper hacking tools can read your messages, this dream of ancient powerful has found its way into the minds and hearts of common people. And now the dream has come true – the writing system which anyone can learn and customize the way that no unwanted parties can read, has been created. The new era of writing has begun. It’s the era when people can write with no worries about disclosure of their private messages.

code example


Legal Notice: The author of this book has used his best efforts in preparing this book. The author makes no representation or warranties with respect to the accuracy, applicability, fitness, or completeness of the contents of this book. The information contained in this book is strictly for educational purposes. Therefore, if you wish to apply ideas contained in this book, you are taking full responsibility for your actions. The author disclaims any warranties (express or implied), merchantability, or fitness for any particular purpose. The author shall in no event be held liable to any party for any direct, indirect, punitive, special, incidental or other consequential damages arising directly or indirectly from any use of this material, which is provided “as is”, and without warranties.

my books to download..

bk AHC: Content.

An excerpt from the book Advanced Handwriting Cryptography..
full book / free examples

1 Introduction.
2 A bit of history.
3 Why handwriting?
4 Relevance.
5 The method.
5.1 Getting an idea.
5.2 Seeking the information.
5.3 Learning all the details.
5.4 Working on your own.
6 Basic principles of handwriting encryption.
7 Techniques of encryption.
7.1 Confusion / substitution.
7.1a Information carriers.
7.1b Noise and distraction elements.
7.2 Diffusion / transposition.
7.3 Other techniques.
7.3a Data points method.
7.3b Mathematical method.
7.3c Art method.
7.3d Hiding method.
7.4 Writing styles.
7.5 Using switches.
8 Encryption symbols.
8.1 Base hieroglyphs.
8.2 Characters.
8.3 Additional signs.
9 Lists of symbols.
9.1 Classic text symbols (TS).
9.1a Alphabets.
9.1b Numerals.
9.1c Mathematical symbols.
9.1d Other symbols.
9.1e Highlighting and more.
9.2 Cryptic symbols (CS).
9.2a Diffusion symbols.
9.2b Correction symbols.
9.2c Assisting symbols.
9.2d Modifiers.
9.2e Switches.
9.2f Other tools.
10 How complex code is good enough?
11 Systematization and memorizing.
12 Sharing and personalization .
12.1 Sharing with one person.
12.2 Sharing with several people.
12.3 Temporary sharing.
12.4 Urgent sharing.
12.5 Key delivery.
13 Securing the method for recovery.
13.1 Recovery of encryption method.
13.2 Recovery of encrypted data.
14 For developers.
15 Application.
16 Example of glyph parts.
17 Examples of code creation.
17.1 Basic code.
17.2 Medium level code.
17.2a Matrix of symbols.
17.2b Encryption symbols.
17.2c The creation process.
17.2d Description of rules.
17.2d – 01 Basic rules of the code.
17.2d – 02 Base cryptic symbols (BCS).
17.2d – 03 Attached cryptic symbols (ACS).
17.2d – 04 Separate cryptic symbols (SCS).
17.2d – 05 Creating additional rules.
17.2e Writing sample.
18 Exercises.
18.1 Attention exercises.
18.2 Drawing exercises.
19 Commercial uses of the cryptography method.
19.1 Cryptic messages project.
19.1a Guessing of messages.
19.1b Creating a lottery.
19.1c Promotional ads.
19.2 Cryptic signatures.
19.3 Cryptic orders.
19.4 Other commercial uses.
20 Writing music.
21 Advanced games for training.
22 Cryptography in social life.
23 Cryptography in gambling.
24 The highest level method.
25 Work on the book.
26 Future of the method.
26.1 Writing without encryption.
26.2 Encoding without hieroglyphs.
26.3 About the next challenge.
27 Artwork.
28 To print / copy.
– R-matrix.
– C-list.
– Drawing exercises.
– Samples of world writings, horizontal.
– Samples of world writings, vertical.
– Encryption symbols, example of different parts.
– Example of steganographic encryption.
29 Get in touch.
30 Legal notice.
31 Content.

my books to download..

bk AHC: following chapters (27-28)

An excerpt from the book Advanced Handwriting Cryptography..

full book / free examples

[ the following chapters you’ll find in the full book ]


27 Artwork

28 To print / copy.



Drawing exercises

Samples of world writings, horizontal

Samples of world writings, vertical

Encryption symbols, example of different parts

Example of steganographic encryption



my books to download..

bk AHC: About the next challenge. (26.3)

An excerpt from the book Advanced Handwriting Cryptography..
full book / free examples

Perhaps there isn’t much to improve in the advanced handwriting cryptography method as such, because in the end everyone must come up with the details on his/her/its own, to make the personal code unique. The challenge thus is in making the method more convenient, to be able to write as fast as regular unencrypted handwriting, but not compromising the security of the code. There may be some tricks that I haven’t come up to as of yet, which I may discover one day. So far the method requires quite a bit of mental work, but I see it not as a fault — it’s rather an additional benefit. The challenge still is out there and I’m giving to it some thought from time to time.

my books to download..

bk AHC: Encoding without hieroglyphs. (26.2)

An excerpt from the book Advanced Handwriting Cryptography..
full book / free examples

The encryption method can be used without the hieroglyphs, in an art for example — as I have mentioned already in the section ‘art method’ (chapter 7.3c) messages can be hidden in lines, curves, dots of a picture that has no resemblance to hieroglyphic script at all, not like in my ‘artwork’ in this book (chapter 27). The principles of encryption can well be used in steganographic way in many fields of life, encoding messages in sight of everyone while only those who know the key can get the message. Not sure that I myself be taking these steps in a serious manner, just having some fun, but these are the options to go further to anyone who would want to — to develop specific techniques for encrypting messages hidden in plain sight, while others cannot see there nothing else but just a painting or drawing, or just a regular text message while the encrypted message is hidden in cryptic symbols added to the text. On the pages to print/copy (chapter 28) I give an example of writing cryptic messages hidden in a regular text.

I did try to find interested people in that field. In 2015 in Italy I talked to many gallery owners in an attempt to get in touch with painters who would like to collaborate with me on inserting cryptographic messages into art. I failed to find interest in it. Myself I’m not a painter, very far from it, thus I know my limitations and won’t be taking this field up without a professional assistance. One day, after some specific training I may take up artwork in a sophisticated level as well, who knows. So far someone else could try, test and write a book about it, with examples of code creation, different possibilities of hidden messages in paintings, with basic principles everyone should follow and so on. Then it will be easier to put the method into practice.

For example in front of a safe can be a picture with encrypted code to open the safe. If that encryption art has to be developed from scratch, using only the principles given in this book, it will be possible but perhaps too time consuming for a practical use. When there will be a manual to follow, similar to the hieroglyphic writing, then it will be worth consideration by many.

I’m far from thinking that I have already thought of and written about all of the possible ways of using the writing method and the encryption method. I’ll be glad to learn from others the new ways of using the techniques of writing/encryption, so whenever free time I can take up a new journey in developing the methods further. The more challenging the task will be the better for keeping brain active and in good health.

my books to download..

bk AHC: Writing without encryption. (26.1)

An excerpt from the book Advanced Handwriting Cryptography..

full book / free examples

26 Future of the method.

The method of handwriting allows to separate it into different areas of application, also for a different purpose than encrypting data. And it also allows to make use of the cryptographic part of the method without using hieroglyphs.

26.1 Writing without encryption.

When there’s enough interest in different parts of the world then hopefully one day there will be groups of people who will be able to make another good use of the method of writing. It doesn’t have to be cryptographic but quite the opposite – creation of a writing system for representing any language with the same symbols, for easy learning to speak any chosen language.

No language exists which is capable of representing all the sounds from all the existing languages without significant modifications and additions to the existing characters in any chosen alphabet. As this writing method (with glyphs) allows representation of symbols in millions of ways I’m quite confident it will be capable to tackle any phonetic challenge with an ease, simply needs to be worked out by linguists. There are not so many ways to produce a sound, thus by creating the rules of representation of sounds within a single complex symbol (glyph) it is possible to have covered all sounds without the need to use many letters in combination. I imagine the set of a few hundred symbols will cover all spoken languages and maybe even less symbols is needed if used together with attached characters for sound modification.

my books to download..

bk AHC: Work on the book. (25-8)

An excerpt from the book Advanced Handwriting Cryptography..
full book / free examples

After writing the initial version of the book in 2013 I’ve been also promoting lectures/seminars on the topic. Unfortunately, as I lived in the countries where people consider lectures in English not as prominent as in their own language, I didn’t have much success. Maybe also the topic is too difficult for a larger interest in public, especially not in the main language of communication. Most importantly, my financial means to promote the lectures/classes/seminars were almost inexistent — I created fliers, printed and copied them whenever some little money available from occasional one-two day jobs, rarely longer, and shared them on the street. Sometimes I got a possibility to print/copy for free and I used every opportunity. I also tried to find free local online services for such information, which would be popular enough. On some popular online sites for private buy/sell/teach and such advertisements my ads were not allowed to be published and the money I paid was returned. The excuse was as “not compatible with community standards” or something like that. Also my tablet’s virus protection and anti-spy apps began warning me when I installed the apps for those popular online sites. Thus I stopped attempting to promote my cryptography on these sites.

Here are some advertisements which I did while having temporary longer stops between the periods of almost constant traveling..

In Switzerland, 2014..


By the way, in Bern, Switzerland, I went to every private language school I could find — over ten of them — and proposed to include my classes of handwriting cryptography in their lists of classes. None of them was interested, even if they looked curious in the beginning. I have no idea why people are scared of cryptography.. that’s my impression.. people are scared.. curious, but afraid to get involved in any ways.
That’s entirely another topic, how people are enslaved in their minds, related to the politics and fear-mongering. Sure you already got an idea about my position from my political activism, but here’s something I wish to share: I have come to conclusion that generally (not individually) people deserve the life they get. Submission to authority as a nation or a large group of people isn’t a one time decision, but the personality traits and actions (or non-actions) of them as a whole, in majority, thus they deserve the results.

Here’s some of my street promotion in Italy, 2015..



These above are photos of the postcards which I painted, to promote the method. After few months of ‘selling’ I gave them all away for free because there was no point to carry around packs of them while the ‘business’ wasn’t picking up. It’s difficult to call it an art but I had to do something. At least I tried. People were curious but very seldom someone was willing to give money for a postcard where nothing could be understood what is written on them. In the back of the cards there was written the address of my website which clarified a lot to those willing to seek further information. By now the web domain I used is discontinued (at the time of editing the book) but hopefully I will soon earn enough and regain ownership of the domain name. Then I’ll be able to better promote the cryptography method and the book.

all my books to download..