How to make the US Post Office prosperous and relevant in the 21 century using the One-Time Pad algorithm!

Every Tuesday I meet with a group of Patriots from the Illumination Society at the Liberty Restaurant in Rochester NY to do a round table radio broadcast discussing topics about Geo politics, religion, Currant events and anything that has to do with Truth Liberty and Justice for all.  We not only talk about problems but as a group we also work on finding solutions to the world problems.  every week we have some of the brightest minds join us at the round table live Broadcast. http://www.blogtalkradio.com/anti-illuminati-party

The Illumination Society  presents a FREE Movie Night every month showing films that we feel are important for the time in which we live. Films that dig deep into subjects like – The World History – UFO – The New World Order – Spirituality – Prophecy – Science – What’s Happening To Our Food – Agenda 21 – Vaccines and many other subjects.

Our Free Movie Night has been well received by people from all walks of life. People concerned with the things happening in our world today. People that want to know what is happening all around us and what we can do to stand against those that wish to rob us of our freedoms and our God-given rights. Come out and learn about subjects you may or may not be aware of. We hope that our Movie Nights, and our following Q&A time will shed some light on these subjects, and help you to see America’s role in past, present and future history.

We will be presenting the following films on the following dates:
– See more at: https://www.eventbrite.com/e/movie-night-tickets-12609803261

You can also join us in our round table discussion and suggest topics you would like us to discus.

Anti New World Order Party ☼ Global Group

https://www.facebook.com/groups/AntiNewWorldOrderPartyGlobal/

Now to the main point of this blog post today,  We will also have a follow-up to this post.

Original posted on FutureBeacon.com

 

Communication Privacy
by
James Adrian

Introduction

      Many individuals, businesses and other organizations have a legitimate and lawful need to keep some of their information confidential or even absolutely secret from competitors, the press and others. Because email has become vital to timely communication and because email is not secure, encryption is often necessary.

      New employees of large companies are often encouraged to live near the company’s offices. In this kind of setting, privacy for technical and marketing information is convenient. Small organizations such as law offices, medical clinics, Internet businesses, and many others may not find the expertise they need in their local area. These small organizations, of which there are many, need secure communication to avoid the cost of face-to-face meetings. Lacking the funds for routine flights between cities, these organizations are very dependent on the electronic communication of data and ideas. Private medical information, schematic drawings, program source code, marketing plans, and innumerable other types of documents are involved. In such circumstances, strong encryption is needed.

      In many countries, the post office has the legal authority and obligation to enforce privacy for the postal mail. If these postal services were to offer secure email for a reasonable price, small companies would not be at such a disadvantage relative to larger companies.

      Established by the U. S. Constitution, Article I, Section 8, Clause 7, the United States Postal Service is authorized “To establish post offices and post roads. It also has a long history of adding services as needed, such as commemorative stamps, rural delivery, airmail, one-day delivery, zip codes, self-adhesive stamps, public Internet site, “Forever” stamps, and an iPhone app. Secure communication would add to its revenue (which would help ameliorate its recent shortfalls) and set a good example.

Technical Matters

      To create a secure message, the encryption algorithm must used secret information that cannot be discovered by unauthorized parties. If the encryption relies only on complexity or computational difficulty without involving secret information, the intended message can be discovered by third parties. To third parties, some aspect of the transmission must be unknowable.

      Within encryption technology, the embodiment of information unknowable to third parties often takes the form of secret random numbers. These random numbers are used to encrypt messages in such a way as to make decryption of a message impossible without access to those same random numbers.

      Many have said that what one person can encrypt, another can decrypt. This is a myth. TheOne-Time Pad algorithm was proved to be absolutely secure in the writings of Claude Shannon. See “Claude Elwood Shannon – Collected Papers” edited by N. J. A. Sloane and Aaron D. Wyner. In addition to being immune from hacking, this algorithm becomes more convenient as memory devices increase their capacity.

      Claude Shannon proved that any absolutely secure encryption algorithm must posses these characteristics:

      1. The encryption keys must be random numbers of uniform distribution.

      2. The keys must be shared in absolute secrecy by the sender and receiver.

      3. Any key encrypting a message must be as at least as long as that message.

      4. Any key used to encrypt a message must not be reused.

      The one-time pad is a famous encryption algorithm having all of these characteristics. By using a random key comprised of random numbers to encrypt a message (the plain text) with the XOR logical operation, the transmitted result (the ciphertext) is rendered as random as the key. The collection of secret keys is called the pad. Keys are of the same length as that of the messages they encrypt. They are erased immediately after their use. The result is that the actual message is as likely as any other message from the point of view of those attempting to decrypt the message without knowing the secret random numbers.

      Optionally, encrypted messages can be made to appear to be ordinary messages of a different type, such as pictures or sound files or text messages that contain information that is very different form that in the plain text. This process is called Steganography.

Services

      The most important service facilitating secure communication is the shipping of media containing random numbers. The production of truly random numbers for algorithms that encrypt messages by means of random keys is the part of the process most challenging and inconvenient for the customer. The principle service of USPS would be to place random numbers on appropriate media and ship copies to addresses designated by the customer. One shipment might serve the customer for only a few messages or for years worth of messages, depending on the number of random numbers shipped.

      Options may include picking up shipments from the local post office, receiving them in the mailbox, or receiving them at the recipient’s door (possibly by special delivery or with a return receipt).

Criminality

      Measures which distinguish legitimate from nefarious use of encryption services need not be publicly discussed.

Contact

      Please feel free to make suggestions by writing to jim@futurebeacon.com.

Alternative Currency System Secret Of Who Created Bitcoin Is Of Great Concern Truthers Want To Know Is Bitcoin A NWO Operation?

The bitcoin logo
The bitcoin logo (Photo credit: Wikipedia)

 

Alternative Currencies is something I have been interested in for awhile now that I have been enlightened about the Federal Reserve system and the IMF or International Monetary Fund run by private corporations who want to run the world and control the New World Order.  I’m working on putting together a page or categories for the best source for Alternative currency‘s or systems of Trade and Barter.  AntiNWOParty is also trying to through our hat in the ring at some point.  We are trying to create our own currency and Trade system for our community.  The Question I and I’m sure many other Truthers want to know is Bitcoin a NWO operation?   Bitcoin is an experimental new digital currency that enables instant payments to anyone, anywhere in the world. Bitcoin uses peer-to-peer technology to operate with no central authority: managing transactions and issuing money are carried out collectively by the network. Bitcoin is also the name of the open source software which enables the use of this currency. The software is a community-driven open source project, released under the MIT license.  Satoshi Nakamoto is the pseudonymous person or group of people who designed and created the original Bitcoin software, currently known as Bitcoin-Qt.  His involvement in the original Bitcoin software does not appear to extend past mid-2010.
A global currency the exact thing the New World Orders  “end game”.  Despite what we see here about Mr. Nakamoto’s views on central banking (https://en.bitcoin.it/wiki/Satoshi_Nakamoto), what if he (it?) is really using bitcoin as a test bed for a global currency? With global concerns of hyper-inflation and currency wars, it makes sense to me for something like bitcoin to become successful. What if talk of the “Sheeple” getting “chipped” just means their Bitcoin private addresses will be implanted so they can’t be stolen?

 

Max keiser says in an interview that there will only be 21 million bitcoins ever made and says nothing at all about them being divisible, it comes off as him trying to mislead people who know nothing about bitcoins to think these will be a rare item adding to the peoples desire to join in ? How can you have a Hard limit of about 21 million Bitcoins and have a global currency with     world population total number of living humans on Earth. As of today, it is estimated to number 7.073 billion by the United States Census Bureau (USCB).[1] The USCB estimates that the world population exceeded 7 billion on March 12, 2012.[2] According to a separate estimate by the United Nations Population Fund, it reached this milestone on October 31, 2011.[3][4][5] 

 

Peter Van Laer

 

One Bitcoin is divisible down to eight decimal places. There are really 2,099,999,997,690,000 (just over 2 quadrillion) maximum possible atomic units in the bitcoin design.

The value of “1 BTC” represents 100,000,000 of these. In other words, each is divisible by up to 10^8.

As the value of the unit of 1 BTC grows too large to be useful for day to day transactions, people can start dealing in smaller units, such as milli-bitcoins (mBTC) or micro-bitcoins (μBTC).

 

 

This section copied from socialcompare.com

 

Alternative currency is a term that refers to any currency used as an alternative to the dominant national or multinational currency systems (usually referred to as national or fiat money). Alternative currencies can be created by an individual, corporation, or organization, they can be created by national, state, or local governments, or they can arise naturally as people begin to use a certain commodity as a currency.

 

Mutual credit is a form of alternative currency, and thus any form of lending that does not go through the banking system can be considered a form of alternative currency. When used in combination with or when designed to work in combination with national or multinational fiat currencies they can be referred to as complementary currency. Most complementary currencies are also local currencies and are limited to a certain region.

 

Barters are another type of alternative currency. These are actually exchange systems, which only trade items; thus without the use of any currency whatsoever. Finally, LETS is a special form of barter which trades points for items. One point stands for one man-hour of work.

 

Often there are issues related to paying tax. Some alternative currencies are considered tax-exempt, but most of them are fully taxed as if they were national currency, with the caveat that the tax must be paid in the national currency. The legality and tax-status of alternative currencies varies widely from country to country; some systems in use in some countries would be illegal in others.

 

List of alternative currencies

 

 

The Rise and Fall of Bitcoin

 

 

 

Cell Phones WiIl Hurt you! (Everywhere) Privacy you no longer have!

English: Mobile phone evolution Русский: Эволю...
English: Mobile phone evolution Русский: Эволюция мобильных телефонов (Photo credit: Wikipedia)

 

After reviewing just the basic programs that you need to operate a smart phone…when you go to applications, for example and look at google mail..it states they have right to go into your mail, look at your documents and alter (even if it is confidential) , change your contacts or even delete contacts, have access to your text message and pictures, they can even use your text and phone to call and send messages. So with that said…they have access to your mail by default because you have to use that program on your phone to be activated for most functions on your phone to work properly.
If you go through all the programs you have on your phone before adding more apps, they all say pretty much the same thing. But look at the big picture…where are these phone made (China, Japan, Korea)! Government employees are using these phones just as much as anyone else..what can be worse then countries that are making these phones have access to sensitive material including personal information that can be of use in sensitive ways including…where they are, their pictures, their contacts and their email documents.
Now your family members are adding app after app with location settings needing to be active on the devices for them to be of service. With that said there is apps and even programs that someone can see all cell phones in that area so a possible predator can single out possible victims. What about some family members who take pictures of their drivers license, SSN and other highly personal information for identity theft to be easy..not alone..logging into bank accounts..in which you are allowing the manufacture to have access to with your passwords and all. Also think about this, these apps also are being allowed to turn on your video camand recorder on your cell at any given time to listen and look at your surroundings. They do not have to inform you when they do, what they alter or delete or whom they give your information to. Also keep in mind that a lot of the apps are created by criminals that are making it legal to commit crimes against you by just getting their free app.So the matter of this news story, if we buy these cell phones from a company ..just say Sprint, shouldn’t they be liability for use licensing with the apps for the purpose of the basic operation of the phone and not carried over to us making ourselves liable for any misuse of our privacy in which will will not know? Should the consumer buying the cell phone have licensing right to know when an invasion by the app provider went into the phone and made changes?

For another quick check of what your allowing your cell phone maker to do to you…go to settings, then look at what system your phone uses..Android system for example, click that and read of the privacy you no longer have!

Let me not to forget to mention the negative heath effects Cell phones can have on your body because of the radiation-emitting  device inside of cell phones that allow it to transmit the communication signals

By Dr. Mercola

If you’re an avid cell phone user who refuses to believe that holding this radiation-emitting device next to your head poses a potential health risk, take note…

Italy‘s supreme court has ruled that a man’s brain tumor is, in fact, linked to his heavy cell phone use.

Heavy Cell Phone Use Caused Business Exec’s Tumor

The court’s assessment included studies by Professor Lennart Hardell of Sweden, stating they had more cases, involved long-term use and were independent (as opposed to Interphone’s industry funding). Hardell has found that those who begin using cell phones heavily as teenagers have 4 to 5 times more brain cancer as young adults!

Just 50 Minutes of Cell Phone Use Alters Your Brain

Even if you don’t use a cell phone for hours each day, research by leading brain imaging researcher Nora D. Volkow, MD of the National Institutes of Health, revealed that after just 50 minutes of cell phone exposure, the emitted radiation increases brain cell activity in the region closest to the cell phone antenna.1 The exact health effects of that increased brain activity are as of yet unknown, but the study effectively debunked the myth in U.S. government research circles that cell phone radiation at non-thermal levels is incapable of causing biological change.

So keep using your cell phone if you don’t give a crap about your health and the Antichrist NWO Global Government spying on you.  And when your sitting in a NDDA Death Camp don’t call me to get you out and fix your brain. I tried to tell you but you didn’t listen you brainwashed boot licking Zombie’s

http://www.foodconsumer.org/newsite/Non-food/Environment/cell_phone_tumor_court_ruling_1107120716.html

Create a website or blog at WordPress.com

Up ↑