Science in art, deception through science

Just as I got past the first female night-horse (read: nightmare) I got into another one. I am not sure why, but for some reason it matters, in this there is a CIA wet work operative played by Graham McTavish, there is a spotter with him, he minds the listening system. They are watching a man seemingly talking to himself, but it is too much of a one sided conversation, the sniper (McTavish) changes the scope to thermal, now he sees a shimmer, one he had seen before, it was digital cloaking. He signals the spotter, who starts changing the dials on a small box and after several seconds he nods, he listens. He says ‘the other person is whispering Greek’, and he listens, they are looking at an almost surreal setting, it is almost 30 seconds until the spotter states ‘I cannot be here’ McTavish looks around, the man is absolutely pale with fear “I cannot be here” he states again, puts his sidearms in his mouth and pulls the trigger. The sniper gets out fast, they were both using suppressors, as such there was too little sound to set the alarm off. He grabs all the gear and he gets out as quickly a possible, all whilst sending the alert signal.

The scene was weird, I do not remember seeing it on TV or in the movies, but it got me thinking on communication, and soon thereafter encryption, do not ask why, I have no idea, but the slithers of one, connected to the idea of another. To show this here is an image

As you can see, it is in foundation a sudoku setting, an 81 figure number (nine times nine), yet the stage is to some degree predictable, every number used once, per square and no number the same in a row or column, even as there are only nine combinations, there is a larger stage for encryption systems to work on, but what if we look at killer sudoku?

As you see in the image, the stage becomes a little different, we get a combination of puzzles and it is that combination that could give reality to a new encryption method. A stage where the sudoku itself is merely part of the puzzle, it is the other part that gets us the encryption. Is it a 2H box, a 2V box and so on, but in that stage it becomes a lot harder to figure out the numbers. The shapes can be anything, a letter, numbers, any combination. The numbers are numbers but there are ways to encrypting that too, and as every level is larger the computer undoing the cypher will take more and more time, all whilst there is an optional setting to reset that setting, a solution in apps that makes any high end encrypted system a much larger option for diplomatic staff to keep encrypted data with them, without them knowing what they are carrying, or anyone for that matter. If they are not part of it, they are merely the vessel that the channel carries.

Or in humorous terms (an ode to Danny Kaye) “The pellet with the poison’s in the vessel with the pestle; the chalice from the palace has the brew that is true!”, as such the issue is not the servant, that person has no idea what they are carrying, a new stage where 2-3 apps set a larger stage and with the security out of the way (thanks to Microsoft and Epic) anyone can be a courier. Yes, when you (optionally) saw ‘Microsoft sides with Epic in its fight with Apple, promises a more open MS Store’ with the text “Microsoft filed a declaration in support of Epic’s request for an injunction against Apple’s plan to remove its access to iOS development tools. The company said in the filing that the Unreal Engine is “critical technology for numerous game creators,” and that taking away Epic’s ability to support it on iOS and MacOS devices “will harm game creators and gamers.”” Most people do not see the larger picture, all this was merely a way for Epic to shun its duties, duties that allow smaller players to avoid larger costs, yet once greed sets in there is a larger stage and they paved the way for organised crime to take much larger steps for people to be tempted to quick cash only to learn at a much larger stage that they became mules. It is that stage that also allows for a new encryption systems, with people having 1-2 apps, that the person with the third app will be able to capture what they need, sometimes it will be with the persons consent, but not always, and that is where we are at. The rich taking what they want and not wanting to be held responsible, no matter what damage they are at the head of, what a world we live in, it seems that my nightmares are a much more pleasant place to be soon enough.

Advertisement

Leave a comment

Filed under IT, Military, Science

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.