Advertisement
Guest User

consumer encryption layer

a guest
Mar 31st, 2020
1,092
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.74 KB | None | 0 0
  1. Macrobius are you here?
  2.  
  3. I have a project I am currently working on that may be of some interest to you.
  4. Related to our brief discussion we had almost a year ago now.
  5.  
  6. ...
  7.  
  8. CONSUMER ENCRYPTION LAYER
  9.  
  10. IDEA
  11. The idea is simple: encryption, where employed, should be independent of the company or
  12. technology that it operates on. An independent layer - built on top of a messaging app,
  13. or service, should replace the traditional model -> trusting the tech co.'s who have an
  14. incentive to monetize and sell your data = has always been a terrible idea.
  15.  
  16. CURRENT METHODOLOGY
  17. I already use encryption for my company's trade secrets & important teq - from concepts
  18. to fully-refined product maps - that are stored on 'the cloud' (other ppl's computers.)
  19. Everything is done manually for my version, pertaining to different and somewhat random
  20. rules. This makes it incredibly difficult to crack. Its nothing new under the sun, I've
  21. simply appropriated Caesar's Cipher Concept, and made it my own.
  22.  
  23. NEW VERSION
  24. I now want to extend this concept to twitter, facebook & email messaging - automating t.
  25. process via extensions and add-ons from the browser that will handle it all. Everythings
  26. done through 'reference pointing' - which I'll discuss in my next poast in detail. There
  27. is no need for servers, we will be hiding our messages in plain site - in pastebin files
  28. that expire over 'x' time. If we get blocked from pastebin, then we'll move to ghostbin.
  29.  
  30. DISCLAIMER:
  31. This isn't intended to be a fully end-to-end independent encryption layer. Its a toy.
  32. This version is easily crackable so long as you follow the static formula. This is an
  33. Moderate Iberian Plumber's Guild, rest assured, no bad actors will use it.
  34.  
  35. END
  36. Let me know what you think. Best regards.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement