Win / GreatAwakening
GreatAwakening
Sign In
DEFAULT COMMUNITIES All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Reason: None provided.

A Brief on Cryptography

Throughout the course of Human History there has developed a need to protect sensitive messages by means of altering the text in some way to prevent anyone but the message's intended recipient from being able to read.

The two parties, sender and recipient, will arrange ahead of time a system by which a message can be encoded and decoded.

For those of you familiar with Cryptography, that's what I'm talking about here.

There are various ways you might be able to come up with on how to accomplish this feat, however.

The most simple way is to replace alphabetic characters with numerals.

We are familiar with the number 17 here, no? 17 = Q.

CIPHER [A=1, B=2, C=3, D=4, E=5, F=6, G=7, H=8, I=9, J=10, K=11, L=12, M=13, N=14, O=15, P=16, Q=17, R=18, S=19, T=20, U=21, V=22, W=23, X=24, Y=25, Z=26]

So, if I wanted to hide a message, it would look something like this:

23;23;7;A;23;7;1;0; 23;8;9;20;5;18;1;2;2;9;20

While anyone could be able to decode this message easily, they would have to first be told that it meant something other than its literal interpretation. Additionally, while everyone knows how to formulate the CIPHER, unless they use it frequently they won't know to use it here.

If your message is especially sensitive, however, you can further obfuscate it by implementing a LOCK and KEY.

The LOCK(formula) looks like this: y=x+a

The KEY would be "a."

For example, I will now scramble a message using that formula. It's up to you to determine what the KEY is:

2;2;12;F;2;12;6;0; 2;13;14;25;10;23;6;7;7;14;25;0; 4;20;26;13;6;1;10;18;20;23;10;25;13;6;19;4;20;26;16;19;20;2

Hint: The first half is the same as the original message.

You can use https://www.dcode.fr/letter-number-cipher to help you out. There are tons of other ciphers to play with there as well.

What I actually did here was combine two Ciphers into one. I took a Letter->Alphabet Cipher and combined it with a Numerical Shift (Caesar) Cipher.

https://www.dcode.fr/caesar-cipher


Another Way

This same procedure isn't just restricted to text, however.

There's another way to encrypt a message. One that computers cannot as of yet comprehend. The examples above can be solved using a computer algorithm, but what if you wanted to hide text even more and require human experience to act as the necessary component in solving the puzzle?

For example, consider the following:

"He lost his silver spoon."

How might you interpret this sentence?

You can easily interpret it literally, and assume a man has lost his silver spoon, but if you are aware of idioms and expressions, the message has a completely different connotation.

https://idioms.thefreedictionary.com/silver+spoon

silver spoon: A metaphor for ample wealth that has been passed down through inheritance. (Used primarily in the phrase "born with a silver spoon in (one's) mouth.")

By replacing "silver spoon" with "inheritance" we get to explore a deeper meaning of what appears to be an innocuous case of a man losing his silverware.

Make no mistake, THIS IS A CIPHER SYSTEM.

You CAN absolutely utilize this dynamic in order to create a Cipher based on Metaphor, Analogy, Allegories, Idioms, Parables, and Symbols.

I have to see a man about a dog.

If you are stuck in literal thinking, you'll miss out on what is actually being said.

https://idioms.thefreedictionary.com/go+see+a+man+about+a+dog

To leave somewhere without explaining where one is going. The phrase is usually used as part of an obvious euphemism for going to the bathroom or going to get an alcoholic drink.

This system cannot be cracked by current computer systems, simply because it requires a KEY that comes from CONTEXT, and further elaborated upon by the Human Experience. A computer cannot think in ways of metaphor, and so it would require such a girth of folk lore and idioms in order to figure out what a hidden message truly means.


The Acroamatic Cipher

When you encode a message behind a wall of Metaphor, Analogy, Allegories, Idioms, Parables, and Symbols it is called the Acroamatic Cipher.

https://www.sacred-texts.com/eso/sta/sta42.htm

  1. The acroamatic cipher. The religious and philosophical writings of all nations abound with acroamatic cryptograms, that is, parables and allegories. The acroamatic is unique in that the document containing it may be translated or reprinted without affecting the cryptogram. Parables and allegories have been used since remote antiquity to present moral truths in an attractive and understandable manner. The acroamatic cryptogram is a pictorial cipher drawn in words and its symbolism must be so interpreted. The Old and New Testaments of the Jews, the writings of Plato and Aristotle, Homer's Odyssey and Iliad, Virgil's Æneid, The Metamorphosis of Apuleius, and Æsop's Fables are outstanding examples of acroamatic cryptography in which are concealed the deepest and most sublime truths of ancient mystical philosophy.

The acroamatic cipher is the most subtle of all, for the parable or allegory is susceptible of several interpretations. Bible students for centuries have been confronted by this difficultly. They are satisfied with the moral interpretation of the parable and forget that each parable and allegory is capable of seven interpretations, of which the seventh--the highest--is complete and all-inclusive, whereas the other six (and lesser) interpretations are fragmentary, revealing but part of the mystery. The creation myths of the world are acroamatic cryptograms, and the deities of the various pantheons are only cryptic characters which, if properly understood, become the constituents of a divine alphabet. The initiated few comprehend the true nature of this alphabet, but the uninitiated many worship the letters of it as gods.

Whenever Q says something like "Plants need water." Q is trying to show us how they use the Acroamatic Cipher in the day-to-day.

Those familiar with Decoding Symbols will know this already: https://decodingsymbols.wordpress.com/

This is the basis for their "Comms."

Whenever they randomly talk about dogs or "muh climate change" they aren't talking literally.

To interpret it as such would be like thinking they are actually going to see a man about a dog...

Don't be stupid.

Water = Information / Instructions

Plant = Someone who infiltrates an organization to gather evidence.

Climate Change = A change to their Global Climate (the power hierarchy of the Elites)

Carbon Emissions = Gossip and Rumors about "Dirty Secrets" AKA "Dirty Talk" AKA Conspiracy Theories

Dog = Assistant / Someone on a leash. "Man's best friend."

All these are examples of the Acroamatic Cipher in use.

When we see Dog Comms, this is the tool that's being utilized.

CONTEXT is KEY.

When Q tells us what the KEY is, he isn't saying there's just one singular KEY. He's tuning the Cryptogram to the proper CONTEXT.

https://qalerts.app/?q=KEY

Senate is key, Money is key, Military is key, the Graphic is key...

https://qalerts.app/?n=127

u/#q127

Why are there so many keys?

Because there is more than one LOCK? Because there are more than one DOOR? More than one way to find the TRUTH?

https://qalerts.app/?n=764

u/#q764

They KEY changes, just like I can change the Cipher Key. Just like how I can zoom in onto a MAP. MAPS within MAPS. Everything is Fractal.

Context points us to the KEY.

The CIPHER in widespread use is the Acroamatic Cipher.


For more of this, here's my series of Thinking in Symbols. Not everything is set in stone, it's just my interpretations.

The Symbol Language

Archives:

It's all Make Believe

1 Shooting Stars

2 What does the Fox say?

3 Climate Change

4 Racism and White Supremacy

5 Arctic Animals

6 The Farm (1)

7 Fish and Mercury

8 The Farm (2)

9 Metals

10 Freemasonry and the Game of Life (1)

11 369 Theory and Numbers (1)

12 369 Theory and Numbers (2)

13 Water, Ice, and Antarctica

14 Vampires, Werewolves, and other Mythical Creatures

15 Networks

16 DOE, a deer, a female deer...

17 World Penguin History Day

18 "Fear the Old Blood"

2 years ago
1 score
Reason: Original

A Brief on Cryptography

Throughout the course of Human History there has developed a need to protect sensitive messages by means of altering the text in some way to prevent anyone but the message's intended recipient from being able to read.

The two parties, sender and recipient, will arrange ahead of time a system by which a message can be encoded and decoded.

For those of you familiar with Cryptography, that's what I'm talking about here.

There are various ways you might be able to come up with on how to accomplish this feat, however.

The most simple way is to replace alphabetic characters with numerals.

We are familiar with the number 17 here, no? 17 = Q.

CIPHER [A=1, B=2, C=3, D=4, E=5, F=6, G=7, H=8, I=9, J=10, K=11, L=12, M=13, N=14, O=15, P=16, Q=17, R=18, S=19, T=20, U=21, V=22, W=23, X=24, Y=25, Z=26]

So, if I wanted to hide a message, it would look something like this:

23;23;7;A;23;7;1;0; 23;8;9;20;5;18;1;2;2;9;20

While anyone could be able to decode this message easily, they would have to first be told that it meant something other than its literal interpretation. Additionally, while everyone knows how to formulate the CIPHER, unless they use it frequently they won't know to use it here.

If your message is especially sensitive, however, you can further obfuscate it by implementing a LOCK and KEY.

The LOCK(formula) looks like this: y=x+a

The KEY would be "a."

For example, I will now scramble a message using that formula. It's up to you to determine what the KEY is:

2;2;12;F;2;12;6;0; 2;13;14;25;10;23;6;7;7;14;25;0; 4;20;26;13;6;1;10;18;20;23;10;25;13;6;19;4;20;26;16;19;20;2

Hint: The first half is the same as the original message.

You can use https://www.dcode.fr/letter-number-cipher to help you out. There are tons of other ciphers to play with there as well.

What I actually did here was combine two Ciphers into one. I took a Letter->Alphabet Cipher and combined it with a Numerical Shift (Caesar) Cipher.

https://www.dcode.fr/caesar-cipher


Another Way

This same procedure isn't just restricted to text, however.

There's another way to encrypt a message. One that computers cannot as of yet comprehend. The examples above can be solved using a computer algorithm, but what if you wanted to hide text even more and require human experience to act as the necessary component in solving the puzzle?

For example, consider the following:

"He lost his silver spoon."

How might you interpret this sentence?

You can easily interpret it literally, and assume a man has lost his silver spoon, but if you are aware of idioms and expressions, the message has a completely different connotation.

https://idioms.thefreedictionary.com/silver+spoon

silver spoon: A metaphor for ample wealth that has been passed down through inheritance. (Used primarily in the phrase "born with a silver spoon in (one's) mouth.")

By replacing "silver spoon" with "inheritance" we get to explore a deeper meaning of what appears to be an innocuous case of a man losing his silverware.

Make no mistake, THIS IS A CIPHER SYSTEM.

You CAN absolutely utilize this dynamic in order to create a Cipher based on Metaphor, Analogy, Allegories, Idioms, Parables, and Symbols.

I have to see a man about a dog.

If you are stuck in literal thinking, you'll miss out on what is actually being said.

https://idioms.thefreedictionary.com/go+see+a+man+about+a+dog

To leave somewhere without explaining where one is going. The phrase is usually used as part of an obvious euphemism for going to the bathroom or going to get an alcoholic drink.

This system cannot be cracked by current computer systems, simply because it requires a KEY that comes from CONTEXT, and further elaborated upon by the Human Experience. A computer cannot think in ways of metaphor, and so it would require such a girth of folk lore and idioms in order to figure out what a hidden message truly means.


The Acroamatic Cipher

When you encode a message behind a wall of Metaphor, Analogy, Allegories, Idioms, Parables, and Symbols it is called the Acroamatic Cipher.

https://www.sacred-texts.com/eso/sta/sta42.htm

  1. The acroamatic cipher. The religious and philosophical writings of all nations abound with acroamatic cryptograms, that is, parables and allegories. The acroamatic is unique in that the document containing it may be translated or reprinted without affecting the cryptogram. Parables and allegories have been used since remote antiquity to present moral truths in an attractive and understandable manner. The acroamatic cryptogram is a pictorial cipher drawn in words and its symbolism must be so interpreted. The Old and New Testaments of the Jews, the writings of Plato and Aristotle, Homer's Odyssey and Iliad, Virgil's Æneid, The Metamorphosis of Apuleius, and Æsop's Fables are outstanding examples of acroamatic cryptography in which are concealed the deepest and most sublime truths of ancient mystical philosophy.

The acroamatic cipher is the most subtle of all, for the parable or allegory is susceptible of several interpretations. Bible students for centuries have been confronted by this difficultly. They are satisfied with the moral interpretation of the parable and forget that each parable and allegory is capable of seven interpretations, of which the seventh--the highest--is complete and all-inclusive, whereas the other six (and lesser) interpretations are fragmentary, revealing but part of the mystery. The creation myths of the world are acroamatic cryptograms, and the deities of the various pantheons are only cryptic characters which, if properly understood, become the constituents of a divine alphabet. The initiated few comprehend the true nature of this alphabet, but the uninitiated many worship the letters of it as gods.

Whenever Q says something like "Plants need water." Q is trying to show us how they use the Acroamatic Cipher in the day-to-day.

Those familiar with Decoding Symbols will be familiar with this already: https://decodingsymbols.wordpress.com/

This is the basis for their "Comms."

Whenever they randomly talk about dogs or "muh climate change" they aren't talking literally.

To interpret it as such would be like thinking they are actually going to see a man about a dog...

Don't be stupid.

Water = Information / Instructions

Plant = Someone who infiltrates an organization to gather evidence.

Climate Change = A change to their Global Climate (the power hierarchy of the Elites)

Carbon Emissions = Gossip and Rumors about "Dirty Secrets" AKA "Dirty Talk" AKA Conspiracy Theories

Dog = Assistant / Someone on a leash. "Man's best friend."

All these are examples of the Acroamatic Cipher in use.

When we see Dog Comms, this is the tool that's being utilized.

CONTEXT is KEY.

When Q tells us what the KEY is, he isn't saying there's just one singular KEY. He's tuning the Cryptogram to the proper CONTEXT.

https://qalerts.app/?q=KEY

Senate is key, Money is key, Military is key, the Graphic is key...

https://qalerts.app/?n=127

u/#q127

Why are there so many keys?

Because there is more than one LOCK? Because there are more than one DOOR? More than one way to find the TRUTH?

https://qalerts.app/?n=764

u/#q764

They KEY changes, just like I can change the Cipher Key. Just like how I can zoom in onto a MAP. MAPS within MAPS. Everything is Fractal.

Context points us to the KEY.

The CIPHER in widespread use is the Acroamatic Cipher.


For more of this, here's my series of Thinking in Symbols. Not everything is set in stone, it's just my interpretations.

The Symbol Language

Archives:

It's all Make Believe

1 Shooting Stars

2 What does the Fox say?

3 Climate Change

4 Racism and White Supremacy

5 Arctic Animals

6 The Farm (1)

7 Fish and Mercury

8 The Farm (2)

9 Metals

10 Freemasonry and the Game of Life (1)

11 369 Theory and Numbers (1)

12 369 Theory and Numbers (2)

13 Water, Ice, and Antarctica

14 Vampires, Werewolves, and other Mythical Creatures

15 Networks

16 DOE, a deer, a female deer...

17 World Penguin History Day

18 "Fear the Old Blood"

2 years ago
1 score