Realty-PI - Real Estate Service Act (RA 9646)
Realty-PI  


Realty-PI
Home | FAQ | Contact Staff | Report a Bug | Register | Profile | Search
Username:
Password:
Save Password:   
Forgot your Password?
 Login to Add Listing
 Login to View Own Listings
 View Latest Images / Listings / Topics
 Search Listings
 Real Estate Service Act (RA 9646)
TopicNew Topic  ReplyReply to Topic   SendSend Topic to a Friend  PrintPrinter Friendly 
 

Author Previous Topic Topic Next Topic  

Carefree

Philippines
13 Posts


Posted - May 29 2025 :  02:07:27 PM  Show Profile  Email Poster  Visit Carefree's Homepage Send Carefree a Private Message  Reply  Reply with Quote

The most lucrative business in the world today isn't drugs, human trafficking, nor telecommunications. What is it? Computer hacking and scamming. In 2016 alone, computer hackers stole approximately 500 billion USD and the United States spent 28 billion combating cyber criminals. This isn't a five and dime activity any longer. Additionally, since HueWae (world's largest communications provider) is known to incorporate monitoring and back-door controls in their microchips and devices, non-encrypted communications are gifts to Chinese hackers and the Chinese government. If you have to send sensitive information electronically, it's a good idea to use several different procedures to keep the material secure.


Cryptography (Codes and Code Breaking)

First, both the sender and recipient should have the equivalent of "one-time pads". These are simply encryption keys which are typically used sequentially (only once) and then destroyed. Alternative methods include using books, ensuring that both parties have exactly the same edition, and some method of indicating what word(s) is/are used. For example, suppose you want to use the 27th word on the 132nd page ... but you want to preclude an organization such as the CIA or NSA (each of which has the resources to contain 99% of all published books in computers) from decoding your message. What I'd recommend is that the two parties agree in advance how much to change each number. So maybe for the page number, you would subtract 19 and for the word number, add 4. Then your message would start (or end) with 113031. That would indicate 113 + 19 (page 132) and 31 - 4 (word 27). So the recipient would go to that page and find the word, then that word would be used as the key to decrypt the message.

That's stage one. Using a computer, and knowing which program was used to encrypt, a government organization could simply try every word in every language's dictionary to decrypt a message. So, for added security, include a symbol or number with the key word(s), and doubly-encrypt. Note: Do not use the % symbol as part of the key. Encrypt the entire first stage message (including the keys), a second time - using different keys, preferably from a different text.

Another method to preclude the requirement for duplicate books would be using a popular daily publication (e.g., the New York Times). Here's how it could be done: Look at today's edition, and count the specified number of letters from the featured article. Use the next word (with a symbol) as the encryption/decryption key. Since the Times is available in almost every city worldwide, nobody would need to carry around a book (eliminating risks of security and that of potential damage or loss).


What Not To Do:
  • Do NOT make any marks on provided texts, nor keep any lists indicating which key(s) have been already utilized.
  • Do NOT use the same provided text for both keys.
  • Do NOT provide any plain-text indicator in the transmission to indicate which key(s) were utilized.
  • If you must use the same text(s) for more than one recipient, do NOT use the same key starting point(s) or pattern(s).

Here's an example of an insecure encryption method (from Napoleon's time). He used a simple substitution cipher � each letter in the message just a few characters forward or backward from its normal position in the alphabet. If the word to encrypt was "dog" and the code was + 3, you would get "grj". Long messages in such a code are very simple to break even without a computer. In each language, there are letters which are used more frequently than others. For example, in English, the most commonly used letters include: a,e,i,l,n,o,r,s and t (but not in that order). You would simply look for those and the odds are good you could guess what they had to be. Fill in those and the rest can be deciphered. Newspapers of today use a slightly more sophisticated code for "cryptogram" puzzles. A typical cryptogram puzzle also uses simple substitution, but the letters are not sequential. A might equal F, but B might equal Z. The only requirement is that each letter represents another, unique, letter.

Here's a chart of the English alphabet, showing the order in which letters are most frequently used in typical text. Of course, in texts dedicated to certain scientific studies (e.g., medicine, physics), the typical word usage is no longer valid and thus, the order of usage may differ. A French author wrote a 200 page book in French without ever using the letter E, and when a British man translated it to English, he adhered to the original and didn't use the letter E either. Of course, the text is NOT indicative of normal conversational English. In normal usage, one of every 8 letters in English is an E.

Letter frequency average percentage in English:

12.7 = E
09.1 = T
08.2 = A
07.5 = O
07.0 = I
06.7 = N
06.3 = S
06.1 = H
06.0 = R
04.3 = D
04.0 = L
02.8 = C / U
02.4 = M / W
02.2 = F
02.0 = G / Y
01.9 = P
01.5 = B
01.0 = V
00.8 = K
00.2 = J / X
00.1 = Q / Z


Encryption/Encoding:

Now - an example of what you SHOULD do to protect your data: Let's say your message is "Private party at the White House, Obama is providing the drugs and prostitutes, Hillary Clinton is providing the lesbians, ISIS is providing the security. Joe Biden is paying from Chinese and Russian bribes."

From your first text, the key to use might be "Democrats-0". If you used an application like Eldi's Encrypt/Decrypt (which is free and, incidentally, supports the Unicode character set - Cyrillic, Arabic, Chinese, Japanese, etc.), the result would be:

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

You could further confuse the issue (make it more difficult to break) by pre-defining a number with which to alter the result. For example, you might specify every 9th character as garbage. So you would insert a random letter or number after each 8 characters of the legitimate message. That's a technique known as "salting". Alternative salting methods include "progressive salting" (start with every X characters, add 1, add 2, repeat); "progressive step" (start with every X characters, skip Y characters, skip Y * 2 characters, repeat); "alternating salting" (start with every X characters, add 1, repeat); etc. A simple method to add security would be to use one method for the first encryption, then use a second method for the second encryption. Here's a tiny program which does the work. The variable "strSalt" contains all the letters A-Z and numbers 0-9; matching the encryption program. Save it as "encrypt.asp" on a website to use it.

Notes:

1. Change the on lines 71, 265, and 316 to remove the space between the words.
2. It's available online here, if you care to test these procedures.


<%
strTitle = "Salinate Encrypted Text"
Response.Write "" & vbNewLine & _
" " & vbNewLine & _
" " & strTitle & "" & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine
If Request("Block") > "" Then
strMessage = Request("Block")
strCrypt = ""
intI = 0 : intH = 0 : intG = 0
For I = 1 To Len(strMessage)
intH = intH + 1
If intH = 10 Then
strCrypt = strCrypt & Mid(strMessage, I, 1) & " "
intH = 0
intG = intG + 1
If intG = 10 Then
strCrypt = strCrypt & Chr(13)
intG = 0
End If
Else
strCrypt = strCrypt & Mid(strMessage, I, 1)
End If
Next
Response.Write "
" & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
" " & vbNewLine & _
"
" & vbNewLine & _
" Blocked" & vbNewLine & _
"
" & vbNewLine & _
" Salt Frequency:" & _
" " & v bNewLine & _
"
" & vbNewLine & _
" Salt Method:" & vbNewLine & _
" " & vbNewLine & _
"
" & vbNewLine & _
" " & _
"