confidential, HIPPA privacy protected, & mission-specific collaborations are here
open comments for general public and open subscribers are below
Admin PLB Accountant, R. Roma
This is our second test of encrypting and decrypting our collaborations that are on private (non-public) back pages, password protected, and encrypted for confidential and HIPPA privacy protected information related to our missions.
Decyrpt the encrypted segment below.
Decryption will synthesize an article about Ananias and Sapphira and their marriage-covenant fraud to lie to the Holy Spirit and then ‘go to church’ based on the scripture and elaborated in an excellent article by New Testament scholar, Craig Keener, Struck Dead—Acts 5:1-11.
“Ananias and Sapphira wanted to look sold out to God like so many others in the heat of revival.”
Encrypted below is the second test to replace our old triple encryption (DES) with new FHE (fully homomorphic encryption) designed for use in our encrypted pages and emails.
Thanks to Celie∞Hilbert/CRH for writing the code.
For registered users (trainers, students) who set your own Markov applets on each device, you need to re-key your Markov applets at each level of the following protocol: 1) this overall is a novel mode of triple encryption (not DES), synthesizing our off-site private DNS confidential computing, so you must key to our new private DNS server, 2) followed by lattice generated non-symmetric random wrapped Augur-Ethereum embedded keys that are generated for you with each usage, 3) and further decentralized completely off of the internet in user-specific homomorphic encryption that is generated internally on each user device (FHE, analogy to DARPA PROCEED) which means that you need completely to disconnect from all internet as a necessary trigger for decryption to happen on your unique and specific device, 4) and followed by a final round of elliptic curve unique password generations for one-time passwords that uniquely bind FHE to your unique 3FA predicted authentications so the content will be proxy re-encrypted automatically whenever you reconnect to the internet. After configuration, you should see a banner showing “3e-5,” which means the entire cycle in the future will take no more than .03 seconds.
Decrypt and report, please.
Use the decryption steps sent via HIPPA protected emails.
Please remember this test is now triple encrypted.
This means the first decrypt layer is an eminence grise, so your first result will always be coherent and readable content, but completely irrelevant to any case, client information, mission, or patient information.
The second layer will self-destruct the faux coherent page if not decrypted to the second-layer in the allotted time. Failure will be followed by a permanent ban-lockout and a redirect to fake pages with mixed readable and unreadable content (this is how you will know) until an administrator unlocks the sequence again for you for another round of tests.
The third layer will yield a fully translated version of Struck Dead—Acts 5:1-11 and with your name and your fully extended bio interlaced with excess and randomly changing lattice generated mixed incoherent and coherent materials embedded into your bio, and finally interpreted (decrypted) into its most parsed down and coherent final form (Saint Occam’s Razor – invented to defend divine miracles, including the invisibility of Elijah) after a final pause interval for final 2FA predicted authentication (3FA implementation soon). You may use your Markov applets (which no one else knows) instead of biometric authentications.
To learn more about multi-modal confidentiality, privacy, confidential off-site computing, and authentication, see “Block Cipher Techniques,” and other technical publications of NIST (National Institute of Standards and Technology).