What the NSA overlooked

OK, it is not only them, or at least I think they overlooked it. You see, about 25 years ago I stumbled upon something. A person of (alleged) Russian origin had an encryption method that allowed out in the open messaging that remained hidden. He used a BBS system for this. I merely by accident stumbled upon it as I was looking for a file to use in an article and I think it was an image of the Kremlin (or one of those buildings on that square). I found it because I was playing with PhotoPaint to show people a few tricks in that program. So as I was looking I noticed something odd, at first I thought I had done something wrong, but after a few attempts I noticed something off. It was easy to see because my origin was in Merchant Navy, many others would have ignored it, and in addition, the man used a setting too strong, or compared to today, he used too strong a grade.

Look at the first example. It is easy to see as I used a complementary colour. 

So we can easily see what is going on. Yet there is another method

In this example we are using 2 layers and we can use 2 colours. The layers are CMYK, here we have one restraint, for some reason it does not work as good when we use Cyan (no idea why), black we cannot touch, but Yellow and Magenta we can. Now we need to make it clear in another way what the offset is. I tend to use the 2 points, but it can be anything from 1-6. So if the code for magenta is #FF00FF, I have that one and #FF00FD, the brain and eyes cannot differentiate, the computer can and here we have a nice way to remain hidden. For Yellow we have #FFFF00 and #FFFF02, and if we complete the image no one is the wiser, and if we know the offset (I tend to use the same offset for both colours) we can decrypt it decently easy too. Combined the image is so perfect that no one will see it. I also learned that straight lines when overlapping tended to make the code pop up too easily, or better stated the straight lines were broken due to the CMYK offset and this came to a solution in the simplest of ways. The naked lady has no straight lines and if there was a straight line, the people would be focussing on something entirely different (what a surprise). 

So why am I telling you this? Well as my health diminishes too few players would be able to vie for my IP and it is safely on 4Chen the release date is at present September 30th, If I do not make it a dozen mails to certain people and certain forums will be released. Yet as I see it the pool of people who would have a clue is slightly too small, as such I am placing the first clue here, hoping to enlarge the pool.

It will still be a puzzle to find the images and there is one other place where straight lines are seldom found. In addition, when the codes are correctly decrypted a set of three images and around 30 sets will give you billions in IP, or at least it is my claim that it will be worth billions. It is all up to you, I am too tired and that is the steeple chase. And the fun part is that the images have been there for months, per set all uploaded at different days using a fake ID, an asian ID no less (thanks to a friend I used to know at Uni). My only wish is that it will not be found by some Microsoft Dodo, but that is the risk I am willing to take. 

Frank Herbert once stated (in 1965) “He who can destroy a thing, controls a thing”, there is truth in that and I made the setting that if I leave it to public domain the larger corporations will stay away and the individuals get a fair shake for a change. A stage often overlooked but that is the nice thing about creation, it could foster new innovators, I can only hope that this will be the case here too.

Leave a comment

Filed under IT, Science, Stories

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.