top of page

The People's cryptography versus Mathematical cryptography 

A Tectonic shift in cyberspace. Today the edge and the power is in the hands of the better mathematicians and the bigger computers. We, the people, keep our privacy in cryptography that looks hard and complex to us, but is routinely violated by the mathematical elite. 

It's time for a change, time for a new paradigm. We can now establish basic privacy and data assets security without resorting to mathematical complexity. Using randomness instead. Randomness is free and plentiful. Today’s Internet is robust enough to carry it, and it and thereby build security that is immunized against a hacker which is much better equipped than we are, and much smarter than we are. 

How Important is it? Freedom and dignity begin with privacy. Innovation and personal-reorientation emerge from an unviolated personal space. A conversation that remains within the conversing parties is the foundation of a free society. The more integrated we are on this earth, the more our privacy, freedom and dignity are at risk, and the more difficult it is to uphold this societal foundation

To explain the paradigm think of a chess game. You play against a world chess master. Before you start the game, the chess master knocks off one of his rooks. It does not help you. Your material advantage is not enough to overcome the smarts advantage of the master -- you lose. However, if you secure the same material advantage, one rook, in a game where both of you remain with the king only, and now you have an extra rook -- you win. No matter how much smarter the chess master is, the game is yours. What's the difference? It is one rook advantage in both cases. The difference is complexity. The complexity of the interacting thirty one pieces plays into the hands of the smarter player. When you remove this complexity and play a simple board, the smarts advantage disappears. 

That is exactly what the people’s cryptography does. It levels the playing field. It gives you the tools to think, say, converse, exchange with trusted parties, secure from exposure, even vis-à-vis those who have otherwise full power over you. Freedom and dignity start with privacy. Now privacy is re-enabled

The People cryptography is easy to use, but to fully appreciate its power requires some learning. You can learn it the hard way by reading "Pattern Devoid Cryptography" or you can approach the people’s cryptography by entertaining yourself with a nail-biting thriller “The Cipher Who Came in From the Cold”, available everywhere. And you can always write to to talk to us. We are looking for good people!  

bottom of page