Advertisement
lotus777

Mariana's Web Encryption Layer Guide Most Secured Internet

Jul 21st, 2018
1,160
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.06 KB | None | 0 0
  1. https://steemit.com/deepweb/@j1337/deepweb-encryption-layer-guide-and-mariana-s-web-the-most-secured-internet-of-all-time
  2. [LAYER 1]
  3. DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers
  4. The New Freedom of Speech and Privacy. No to mass censorship and spying. Deepweb websites can be seen and access only in the deepweb by using a Tor like browsers only. Make deepweb accounts, deepweb email addresses and deepweb websites in the deepweb now. Your must have a “HTTPS” protocol prefix for security thru SSL Certificate. NOT HTTP. Use VPN or Proxy to cover your IP address and PGP keys as extra security for email and login authentication. Use Bitcoins as a donation and payment method without spying on you. The more professionally operated and maintained deepweb (Tor .onion) websites, the more secured, resilient, more difficult to attack, detect, track, hack and shutdown.
  5.  
  6. [LAYER 2]
  7. For its authentication/dialog boxes before viewing and login into the website. The most private and secured DeepWeb Website. Also, The Website must have SSL Certification, VPN, Bitcoin Address and PGP Key. It must be private, invite-only and PGP Key Authentication and Login Username/Email//Password (or Paraphrase) Protected. Make accounts in https://vk.com the New Facebook and Twitter.
  8. To get access to the Deepweb or Darkweb, the Secret and Hidden Internet: Install deepweb browsers or one of them.
  9. Tor - https://www.torproject.org/
  10. Tails - https://tails.boum.org/
  11. I2P - https://geti2p.net/en/
  12. Fresh Onions - http://zlal32teyptf4tvi.onion/
  13. Enjoy your deepweb adventure. The victory awaits .
  14.  
  15. [LAYER 3]
  16. The Hidden Wiki http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
  17. The Hidden Wiki Org – http://thehiddenwiki.org/
  18. TorLinks - http://torlinkbgs6aabns.onion/
  19. Hidden Answers - http://answerstedhctbek.onion/
  20. Atlayo http://atlayofke5rqhsma.onion/
  21. Daniel's Chat http://danschatjr7qbwip.onion/
  22. Blackbook - http://blkbook3fxhcsn3u.onion/
  23. Torchan - http://zw3crggtadila2sg.onion/imageboard/
  24. 8Chan - http://oxwugzccvk3dk6tj.onion/
  25.  
  26. [LAYER 4]
  27. Deepweb Email and Messenging: secured but use ciphers and encryption.
  28. Tor box - http://torbox3uiot6wchz.onion/
  29. Mail 2 tor - http://mail2tor2zyjdctd.onion/
  30. Bitcoin - https://www.bitcoin.com/
  31. Cyber Ghost VPN - http://www.cyberghostvpn.com/en_us
  32. PGP Key - http://www.gpg4win.org/download.html
  33. SSL or HTTPS - https://www.instantssl.com
  34. Use LINUX instead of Windows or MAC
  35. Hushmail
  36.  
  37. [LAYER 5]
  38. Protonmail
  39. Fake GPS
  40. Locker 10
  41. Encrypted messaging Apps like WhatsApp and Telegram
  42. RSA or rsa.com for public and private keys
  43. Opera Browser Make passwords (now Paraphrase) 30 characters long mix small and big letters, numbers and symbols. Use manual/mechanical encryption devices like Enigma-Caesar cipher combination Encrypt your communications by hand or manually BEFORE using and send to Encryption/Cipher Machines, Encryption Programs, Encryption Apps and Internet. Uncrackable Codes and Ciphers http://weburbanist.com/2010/05/31/cryptic-codes-11-le.. http://listverse.com/2007/10/01/top-10-uncracked-codes/ The Uncrackable Cipher Systems: Voynich Cipher
  44.  
  45. [LAYER 6]
  46. Zodiac Killer Cipher
  47. Beale Papers
  48. Dorabella Cipher
  49. D’Agapeyeff Cipher
  50. ChaoCipher
  51. Kryptos
  52. Affine Cipher
  53. Uncrackable Ancient Scripts “To make a better uncrackable encryption and cipher Systems.”
  54. The Manual Enigma Machine please modify it. https://www.creativecrafthouse.com/enigma-ii-encryption-machine-puzzle-encode-decode-size-lrg.html
  55.  
  56. [LAYER 7]
  57. Modify the Manual Enigma Encryption Machines : Please use any writing characters or writing scripts EXCEPT LATIN ALPHABETS Letters (Characters).
  58. The Writing Systems below: https://en.wikipedia.org/wiki/List_of_writing_systems Use rare languages for encrypted communication too http://www.toptenz.net/top-10-rarest-languages.php Then use a different Binary Code Systems by using Letters than Numbers or Using Numbers except Zero (0) and One (1).
  59. Do them Both and Combine with Bacon Cipher to hide the coded messages within the plain messages. Do it (encrypt) better than the Aryan Brotherhood Prison Gang in America.
  60. Use public and private keys that needs a year of preparation before use the cipher system. Aryan Brotherhood Code (Bacon Cipher and Enigma Coded texts hidden within the Plaintexts)
  61. The Hand written or typewriter written code book (DO NOT use of computers, gadgets or printers in making the code books) must be good enough for a year.
  62. The Number of Coding Methods like public/private keys, numbers, characters, symbols, binary codes, permutations and combinations must be HOW MANY SECONDS IN A YEAR. Then divide them (Coding Methods) into minutes, hours, days, weeks, months, quarters or semi annual of the the Year to make.
  63.  
  64. [LAYER 8]
  65. Different Coding Patterns of your choice (NEVER use 1 coding pattern more than 1 or 2 messages to prevent code breaking). The book must only a select trusted FEW, distribute the code book excerpts to others weekly or monthly. You Need to make 10 more unique code books (good for 10 years). The best is 20 code books (20 years). Do not save in the computers with internet connection or flash drives, just Hand written or typewriter written paper only in codes, anagrams or invisible ink. Mathematical skills like Algebra, Trigonometry, Algorithms, Geometry, Calculus and Statistics is important to make public and private keys for better encryption like RSA and PGP. Also make a different writing paths rather than writing from horizontal left to right (Latin Writing Path), Writing from horizontal right to Left (Arabic Writing path). Other writing paths like skipping, diagonal, weaving, zigzag, vertical, spiral and etc. The number of characters per line in cipher blocks can be even or odd (17 of 20 characters per line). The patterns of cipher blocks must NOT in a square alone; means use diamond, circle, stripe, trapezoid and triangle hidden within the cipher block. Add nulls within the cipher block. Make your cipher sophisticated that the code breakers will call HOAX (means They quit) Just only to you. DISCIPLINE, TRUST, ALERTNESS, AWARENESS AND UNIQUENESS are important for Successful Encryption. The shape of the cipher block of zodiac killer cipher is square and odd
  66.  
  67. [LAYER 9]
  68. (17 characters per line). Encrypt your messages manually with Bacon Cipher plus enigma or other ciphers (used by Aryan Brotherhood prison Gang) before using encryption apps like Telegram, Mail, Morse Code Telegram, Text and Email. Modify by yourself all the time. Mariana’s Web is most secret Internet more than the DarkWeb that is accessible only by Quantum Computers , Closed Shell Systems & Polymeric Falcighol Derivation.
  69. lakes_and_oceans.png
  70.  
  71. THE MOST SECURED INTERNET/ONLINE USE LAYOUT:
  72. USER ->Password -> PGP -> VPN –> HTTPS/SSL -> TOR/DARKWEB <- HTTPS/SSL <- VPN <- PGP <– Password <-Website(s) USER -> Quantum Computer, Closed Shell Systems (CSS) or Polymeric Falcighol Derivation (PFD) -> Password -> PGP -> VPN –> HTTPS/SSL -> Marianas’ Web <- HTTPS/SSL <- VPN <- PGP <– Password <- Quantum Computer, Closed Shell Systems (CSS) or Polymeric Falcighol Derivation (PFD) <-Website(s)
  73.  
  74.  
  75. deepweb marianasweb security encryption hacking
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement