After two bottles of alcoholic beverage and sleep deprivation, you may not believe it because it's too good to be true, but I did the following... thing: I thought of a phrase, then I thought of its hexadecimal ASCII representation; then, for each hex digit, I thought of its representation in phonetic/radio communication alphabet (e.g. 0 = negative, 1 to 9 = one to nine, a = alpha, b = bravo, c = charlie, delta, echo, all the way to f = fox being the maximum hex digit possible), then I thought of this as Morse code (e.g. echo = . -.-. .... ---). No previous note taking (except for the "My mind is a Matrioshka" in Morse at the beginning of the note, although it was no help because I was encoding from ASCII rather than from Morse), no tools (no tools before the encoding; used tools after I was done with the encoding in order to check how much I got correct), no top-down writing, I processed everything in my mind and the only thing I wrote was the result in Morse. Of course, I missed some letters and one letter got replaced (because I thought of a 2 (72, r) instead of a 3 (73, s)), but the overall result quite of managed to do it.

The phrase? "My mind is a Matrioshka" as a meta-reference to the very thing I was trying to do: wrapping up several layers of encoding (text -> ASCII hex -> phonetics -> Morse). I ended up with "My min i a Matsioska" (I ate some letters during my multilayered thinking, it's not trivial to keep four simultaneous lines of thought, especially while drunk).

There's no use for this except for covert communication (but communication requires a peer, and I have none, let alone a peer nerd enough to manage such an "ability"). It's pointless. I managed to memorize the fucking ASCII table (earlier, I even recalled that I can recall of the ASCII code for apostrophe, it's 0x27, question mark is 0x3f for "Ontological Collapse" OC -> F3 -> 3F), it's also pointless. Morse may be useful for ham radio (but I don't do any QSO because I got no QRA).

I recorded the screen while I was doing this multilayered encoding. It took me 9 minutes to try and write "My mind is a Matrioshka". The screenshots happened afterwards as I then reverted back the encoding I made mentally. Well, you believe if you want to.

#ciphers #encoding #morse #morsecode

Exploring the world of the artist known as ECDSA!

In the latest TechAptitude post we dive into the primary cryptographic algorithm used in many blockchain based systems including Bitcoin and Ethereum, Binance Smart Chain, and Avalanche - Elliptic Curve Digital Signature Algorithm (ECDSA).

We review ECDSA and how it secures cryptocurrencies like BitCoin and Ethereum.

https://open.substack.com/pub/techaptitude/p/ecdsa-cryptographys-role-in-securing?r=vn8b8&utm_campaign=post&utm_medium=web&showWelcomeOnShare=true #Crypto #CryptoCurrencies #Cryptography #Ciphers #Security #PQC #ECDSA #BlockChain #BitCoin #Ethereum #TechAptitude #KeyPairs #EllipticCurve #CyberSecurity

It is a matter of time before Quantum Computing gains the ability to crack today’s core public key encryption methods.

Our latest post on TechAptitude outlines the efforts by NIST to generate new cryptography standards to help withstand future quantum powered cyber attacks. Check it out!

https://techaptitude.substack.com/p/quantum-technologies-nist-drives #Cryptography #Quantum #QuantumTechnology #QuantumComputing #NIST #FIPS #CodeBreaker #Encryption #QDay #PQC #PostQuantumCryptography #Passwords #Ciphers #Algorithm #TechAptitude

From Barnard’s Universal Criminal Cipher Code for Telegraphic Communication between Chiefs of Police, Sheriffs, Marshals and other Peace Officers of the United States and Canada, compiled by Floyd Shock (1895).

Source: University of Alberta Libraries / Internet Archive

https://pdimagearchive.org/images/3f8eb50c-6514-4278-ba1c-6f966a23c6d7

#books #education #language #dictionaries #vocabulary #ciphers #words #communication #police #codes #encryption #art #publicdomain

Poetic Carousel Again

#Mathober Curation by
@fractalkitty

Blog/ More Poems/Code https://blog.illestpreacha.com/mathober2025notation2

Poetic Notations made through Matrices

For My 29th Sketch of Mathober2025 using the 7th Prompt of “Notation” ,PoeticCarouselAgain is coded with Ruby & Python it remixes my Poetic Carousel Code (https://blog.illestpreacha.com/napowrimo24-poetic-matrices) code that uses 3 x 3 matrices to form a poetic notation to write the poems.

#Mathober2025 #Mathober7 #Notation #Python #Ruby

Poem 3

Poetic Stanza 1 :
[['d' 'p' 'v']
['s' 'e' 'i']
['u' 'h' 'c']]
Poetic Stanza 2:
[['d' 's' 'u']
['p' 'e' 'h']
['v' 'i' 'c']]

Deploying Powerful Visions
Synchronizing Every Imaginations
uniting Harmonious Content

Deploying Sparkling Unions
Proudly Echoing Honour
Viscously Intertwining Content

#creativecoding #poetry #poem #ciphers #transposition
#micropoem #illestpreacha #worldbuilding #ElectronicLit

CRYPTOGRAPHY GROUP

[for your address book]

https://soc.octade.net/cryptography/

A Fediverse group for sharing and discussing #ciphers, #codes #cryptography and #encryption and related applications and #research.

#crypto #cypher #cypherpunks #confidentiality #privacy #groups #fedigroups #fediverse
@[email protected]

Hexlish Alphabet for English, Constructed Languages and Cryptography: Automatic, Structural Compression with a Phonetic Hexadecimal Alphabet

DOI : https://doi.org/10.5281/zenodo.13139469

Hexlish is a legible, sixteen-letter alphabet for writing the English language and for encoding text as legible base 16 or compressed binary. Texts composed using the alphabet are automatically compressed by exactly fifty percent when converted from Hexlish characters into binary characters. Although technically lossy, this syntactic compression enables recovery of the correct English letters via syntactic reconstruction. The implementer can predict the size of the compressed binary file and the size of the text that will result from decompression. Generally it is intuitive to recognize English alphabet analogues to Hexlish words. This makes Hexlish a legible alternative to the standard hexadecimal alphabet.

#Hexlish #Conlang #Alphabets #English #Hexadecimal #Encoding #Cryptography #Ciphers #Crypto #Encryption #Compression #Papers #Preprints #Orthography #Language #Linguistics #Writing #Glyphs #Alphabetology #Technology
GEN V Season 2 Episode 6 Breakdown! Cipher's Power, Stan's Plan & Polarity Explained!

YouTube
GEN V Season 2 Episode 6 Breakdown! Cipher's Power, Stan's Plan & Polarity Explained!

YouTube

Schneier on Security: 1965 Cryptanalysis Training Workbook Released by the NSA. “The listings in the report are printouts from the Stethoscope program, run on the NSA’s Bogart computer, showing statistical and structural data extracted from encrypted messages, but the encrypted messages themselves are not included. They were used in NSA training programs to teach analysts how to interpret […]

https://rbfirehose.com/2025/09/04/schneier-on-security-1965-cryptanalysis-training-workbook-released-by-the-nsa/

Schneier on Security: 1965 Cryptanalysis Training Workbook Released by the NSA | ResearchBuzz: Firehose

ResearchBuzz: Firehose | Individual posts from ResearchBuzz