Basic communication encryption

Поділитися
Вставка
  • Опубліковано 6 сер 2024
  • The alphabet has 26 words, not 27, yes I was off one on the KINGFATHER key, gimme a break I was six beers deep,
    0:00 encrypting written numbers
    4:38 encrypting written alphabet
    6:29 encrypting analog radio

КОМЕНТАРІ • 125

  • @ViktoriousDead
    @ViktoriousDead  5 місяців тому +6

    Link to other videos
    My Preferred rifle Setup (SOCOM’s Rifle)
    ua-cam.com/video/U0uwZnOTVnY/v-deo.html
    Surplus snow gear for the Partisan
    ua-cam.com/video/JlE0BuSLJ64/v-deo.html
    Alternative weapons for the partisan
    ua-cam.com/video/HO9x5zkjgro/v-deo.html
    Basic communication encryption
    ua-cam.com/video/NiChRlOG-jk/v-deo.html
    Quick tip: Rifle to pistol transition
    ua-cam.com/video/DYUAoeSDnHE/v-deo.html
    Conducting an ambush
    ua-cam.com/video/0xQmxfp99Vg/v-deo.html
    3500 subscribers, future projects
    ua-cam.com/video/L6_PLAD5z20/v-deo.html
    Shooting off a brace
    ua-cam.com/video/eo4V2YhIfmA/v-deo.html

  • @samueljackson6188
    @samueljackson6188 5 місяців тому +120

    As every officer is taught in OCS. All communication is to be considered compromised. So never write down what can get you killed. Always memorize what is important. Alway carry pocket litter to disrupt the enemy's intel collection. Preferably to convince him of what you want him to believe.
    If you must carry important documents on your person. Then you should use stenography whenever possible.
    Remember folks your electronic devices are ready made surveillance devices. Never speak, write, or photograph anything you wouldn't want the enemy to know.

    • @Bf26fge
      @Bf26fge 4 місяці тому +1

      Invisible ink is not just for kids. Put it on the back of a utility bill or grocery list or something that doesnt arouse suspicion.

    • @samueljackson6188
      @samueljackson6188 4 місяці тому

      Thats until the enemy uses multi spectrum analysis on that document. One of the reasons many services declassified their ink recipes. The best defense against interception is the sneaker net. A harmless family photo can contain a wealth of information if one knows where to look. Believe it or not. Microdots are still an effective means. Even a sim card stashed into a cavity of some sort. If you go that route. make sure you never use your personal computer. Make sure that it is in a sterile environment free of Wi-Fi, internet, or blue tooth. You can find some good information in Clint Emersons books.@@Bf26fge

    • @justinmckibben4534
      @justinmckibben4534 29 днів тому

      @@AlphaOmegaSigma07 knotted strings? How much info can that convey? seems like it would take ages to string a message together

  • @backwoodswilly1288
    @backwoodswilly1288 5 місяців тому +167

    Rapidly consuming all of your vids. Praying that this channel stays up. Valuable, common sense and useful info.

    • @jasminejacob1870
      @jasminejacob1870 4 місяці тому +5

      Lol if it was common sense there wouldn't be much need for a video of it.

    • @osiris654
      @osiris654 4 місяці тому

      @@jasminejacob1870You’d be surprised

    • @munch762
      @munch762 2 місяці тому +4

      If it comes to it, give them hell, in Minecraft

    • @SolarGeneral
      @SolarGeneral 2 місяці тому +1

      Download the videos. Pass them around.

  • @ViktoriousDead
    @ViktoriousDead  6 місяців тому +157

    Plot twist, there are 26 letters in the alphabet, not 27.

    • @mediumpace9834
      @mediumpace9834 5 місяців тому +24

      Extra plot twist: 26 letters, not words. Thank you for your videos. They are very informative.

    • @ViktoriousDead
      @ViktoriousDead  5 місяців тому +34

      @@mediumpace9834 my brain is scrambled

    • @willholly1844
      @willholly1844 5 місяців тому

      ​@@mediumpace9834It was a code. We're compromised.

    • @VeNoM__007
      @VeNoM__007 5 місяців тому +2

      Good video, good knowledge on the channel .

    • @tizzin8r
      @tizzin8r 5 місяців тому

      O

  • @Gdaddygabe
    @Gdaddygabe 5 місяців тому +68

    This information legitimately might save someone’s life one day,I hope we never have to use it

    • @user-hz5rk5vy1t
      @user-hz5rk5vy1t 5 місяців тому +2

      I'll just send you quick messages, hopefully, on the toilet paper they give us slid under the door or hole in the wall.
      If it gets to the point of needing ciphers this primitive, it'll be game over.

    • @user-hz5rk5vy1t
      @user-hz5rk5vy1t 5 місяців тому +3

      And when you're done reading the messages, please use the tp to wipe your butt to destroy the message.

  • @robyee3325
    @robyee3325 5 місяців тому +49

    This requires you to have friends

    • @dnkmarci
      @dnkmarci Місяць тому +9

      @@LimaXIIIso you just gotta talk to the voices in your head?

    • @AmadeusDR
      @AmadeusDR Місяць тому

      @@dnkmarciyou don't already? they have great intel

    • @rageddyanne
      @rageddyanne Місяць тому

      Ouch bro. Ouch

    • @Alex-pe7yw
      @Alex-pe7yw 21 день тому +2

      (1) develop real life hobbies or interests (2) find groups in your area that cater to those hobbies and go to a gathering (3) actually talk to the people you meet (4) ask and listen more than you talk and take a genuine interest in the people you meet and what they have to say (5) invite them to do shit outside of your group (6) you have already made friends

  • @warweasel2832
    @warweasel2832 2 місяці тому +40

    A great way to delay (note, not "block", but delay) decryption is to use a viginere cypher. The pig pen cipher is pretty obvious, it's famous for a reason. A viginere cipher with transposed alphabet square (a la "KRYPTOS") is infamous in even high level cryptography circles. It took Langley significant enough manpower to crack a Viginere cipher that they actually banned agents from working on it during work hours, and that was WITH the transposition password revealed. It's simple to do on a piece of paper, and only requires two passcodes that can be mixed and matched with each message, or in coincidence with months/days. It's difficult enough to be practically uncrackable for your average opposition milita or even most regular units if they got their hands on it.

  • @Doodlefisher
    @Doodlefisher 5 місяців тому +31

    The L shaped patten mine-craft ambush was surely a good video . Watched it and thought it had a great dynamic!

  • @Kinetic.44
    @Kinetic.44 5 місяців тому +11

    This is one of the most educational videos I have ever seen.

  • @MalaklypsetheElder
    @MalaklypsetheElder 5 місяців тому +15

    I don't have a background on cryptography and I haven't really read a lot on the subject matter but I do have just kind of a basic math background and an understanding of probability and statistical probabilities and how to make things hard to figure out. I would also suggest people check out the work of the guy over at S2 Underground on UA-cam because he's done some cryptography and encryption videos I believe and all of his works really good as is forward observers although they don't really get much into this stuff it's more like area study until analysis type deal.
    But what I wanted to get into with this was how to make this more complicated and make more layers to make decrypting this by some Minecraft partisan enemy forces a whole lot harder barring of course the use of high-powered or high velocity computational methods. So there's a couple ways you can do this you can randomly assignments for instance to the larger 26 letter scheme that you point out about the middle of the video there where you're using two tic-tac-toe grids and then two x grids you can randomly assigned numbers to each of those placeholders and then create what would be considered a master key for generation of new Masonic key crypto. You could almost make a system where you would not need to have to pass out new keys every 24 hours you could have a little booklet full of random generated number Masonic code crypto schemes let's say like 50 of them and then on top of that you number each one of those one through 50 and then on any given day when you're changing up your crypto in a 24-hour period just give a general call over, or however your communicating with other elements and have them receive information on the pre-designated new Master crypto scheme that will be used for that day. And like that guy mentioned on S2 underground and like I will tell you from my experience younger playing role-playing games Believe It or Not tabletop role-playing games where you use actual dice not number generator software or apps you always want to generate these things randomly with dice or some other methods you don't want to use number generating software or apps because they are not random. You also don't want to just fill in the numbers yourself you want to have some randomization because that non-randomized element whether it be software or you just applying numbers there's patterns in there whether you know it or not and people can figure them out such as you know like fraud investigators for insurance companies or complicated software that's actually trying to unpack crypto.
    So you can further complicate this by taking those master keys that you generated let's say a book of 50 and they all have a numbering sequence which you can call out randomly every 24 hours you can further complicate this and make this harder to decrypt by applying some sort of methodology where you can reverse the alphabet depending on how you want to generate off of your master key and you can give some sort of signifier to your Communications for the 24-hour period on when to change the master key for your crypto so for instance if we're dealing with one through 50 you can call out one hour or 5q and they are the queue could designate reversing or putting the alphabet in the normal order and when you put this many combinations together you start to come up with really large numbers on how many variations you can have on this and creating more variations creates more statistical improbability that these things can actually be unpacked or solved. Now again if you're talking about people going against you know a Minecraft force of partisans or insurgents so-called and they're using supercomputers and stuff it's probably not going to hold up. Another example would be to just purposefully randomize the allocation of the numbers in the squares but I think that would go along with what I recommended for random number generation when you make those master keys in your master key book.
    Another one to keep in mind that has been covered by S2 underground would be the one-time pad. I'm almost thinking that's a little similar to this but I don't really remember I need to go back and watch that video again.
    Great video in great work and we all appreciate what you guys out here in the tubes are doing to help people figure out what is effectively a whole different broad spectrum of self-defense training Theory and applied techniques for people to have to use to survive some sort of future Calamity in Minecraft world whether it's natural man-made or being done by some sort of enemy force be at 4:00 or domestic in your Minecraft server.

    • @ViktoriousDead
      @ViktoriousDead  5 місяців тому +16

      I tried to very briefly touch on that fact, that you can essentially randomize any of this, it’s your oyster. This was mainly to give people a reference point and a platform to work off of for cryptology.
      You should consider making an in-depth video about what you said here, it would make an interesting watch.

    • @phl_knives
      @phl_knives 4 місяці тому +2

      Absolutely well said and informative. I agree this would be a great video.
      S2 Underground makes some amazing videos from encryption to defeating thermal, counter tracking and other cool stuff from an former Intel guy. The daily wires are super informative as well especially when it's not from a bias news source. It's just X is happening here, Y looks to be worsening here and Z is also looking to be a potential threat in the future. I recommend that channel and now this one to any like-minded individuals I am close to.

    • @osiris654
      @osiris654 4 місяці тому +1

      Interesting comment but please use some punctuation my man

  • @ct5465
    @ct5465 5 місяців тому +9

    Thank you for your work. Looks more and more needed by the day.

  • @JoiZ105
    @JoiZ105 Місяць тому +1

    Thats the old camouflage pattern of the swiss army you are wearing, very cool!

  • @ahiezzehd221
    @ahiezzehd221 2 місяці тому +2

    Also keep in mind we are being listened to on ELINT satellites and such. They keep records of everything. Phone calls, texts, etc.

  • @rollandleeper3810
    @rollandleeper3810 5 місяців тому +2

    Another excellent video. Keep them coming.

  • @HavocSolutions
    @HavocSolutions 6 місяців тому +7

    Thanks for this man. Very informative

  • @NukaVaultReadiness
    @NukaVaultReadiness 5 місяців тому

    Appreciate your video! There are times this can definitely come in handy!

  • @jerrycarlson666
    @jerrycarlson666 6 місяців тому +6

    Great video brother

  • @LegitVoltron5739
    @LegitVoltron5739 Місяць тому +2

    Your videos have filled the hole in my life left by the ban of Risky Chrisky.

    • @collinb.8542
      @collinb.8542 Місяць тому

      Chrisky was funny as hell lmao.

  • @dolphinboy_yt6429
    @dolphinboy_yt6429 4 місяці тому

    Dame this is very useful information you just earned a subscriber

  • @Doodlefisher
    @Doodlefisher 5 місяців тому +3

    Algebra becomes a rhythm the more you do it and it takes some practice before you can beat it!

  • @Long_Tall_Sally
    @Long_Tall_Sally 5 місяців тому +2

    Outstanding video

    • @ViktoriousDead
      @ViktoriousDead  5 місяців тому +1

      You’ll have to excuse me, I’ve got to return some Video tapes

  • @mouthboehm
    @mouthboehm 4 місяці тому

    Very cool stuff!

  • @Angrycapitalist
    @Angrycapitalist 3 місяці тому

    Super simple and easy to use, it seems all to common that people overthink comms and get hungup on "fancy gear" which if found on your person could be compromising.
    Basic radios with a good cipher can be easily explained or are cheap enough that disgarding them wouldn't be a problem as compared to digital radios with built in encryption.

  • @coltonmullins2274
    @coltonmullins2274 2 місяці тому

    I use your videos to help train my civ bros

  • @noname-bu1ux
    @noname-bu1ux Місяць тому

    Ty solid upload

  • @TheColtLockwoodRealm
    @TheColtLockwoodRealm 5 місяців тому +3

    great channel

  • @SoKyShoot
    @SoKyShoot 5 місяців тому

    Good name!! You should start a ruck group, would love to come learn some knowledge from you!!!

  • @johntoothman4888
    @johntoothman4888 5 місяців тому +4

    Very cool! What we've tried is naming land marks that we know.

  • @thelazygamer3788
    @thelazygamer3788 4 місяці тому

    Good vid.
    For even better code, look into 1 time pads. It is far more complex but also almost unbreakable.

    • @Bf26fge
      @Bf26fge 4 місяці тому

      Not almost. They are unbreakable when properly implemented. There can be no spaces between words, or spaces may be randomly put in. Nonsense symbols can be added too for funsies but arent really necessary. However if you are caught with papers or usb memory sticks with code on them then it's all over for you. Most likely rubber hose decryption will be used to induce you to give up your pad. I dont understand why no one seems to know the 17th century classic, invisible ink. Its not just for kids. symmetric codes like one time pads are the easiest to implement and properly designed and used symmetric codes are simple and completely unbreakable.

  • @theskyrider3455
    @theskyrider3455 5 місяців тому +3

    This is cool and all but it's not completely safe. Analog means everyone can listen to what your saying over the radio, They don't need to know the frequency you're on because there are SDR scanners that sweep across the whole spectrum from 0 into the gigahertz range. If someone can just listen in on your conversation and they hear you talking like that they will suspect you as potential hostiles.
    You need digital encrypted signals at the very least, frequency hopping would be ideal. The authenticating procedures you've described here is something to be done nontheless even if talking encrypted to ensure that the receiving radio device is still in the hands of those supposed to.

    • @ViktoriousDead
      @ViktoriousDead  5 місяців тому +6

      l talked about this in the video, yes, you cannot encrypt analog transmissions, but what percentage of the population do you think owns digital comms? Probably .02% or less, and the majority don’t have the money and won’t buy them regardless of the upsides. In addition there’s already lots of infrastructure for HAM radios, baofengs GMRS, etc….

    • @theskyrider3455
      @theskyrider3455 5 місяців тому

      @@ViktoriousDead yeah, DMR radios seem to be the most balanced solution here. There already is a lot of DMR infrastructure for HAM usage and if you want to create your own infrastructure DMR repeaters are very available on the market. It can also be encrypted and good Motorola radios (in that case MOTOTRBO which is motorolas derivate of DMR) can be acquired sub $1000.
      I also recommend people getting their HAM radio license you'll learn a lot of great things.

    • @samueljackson6188
      @samueljackson6188 4 місяці тому +1

      Better yet Only use the radio in microburst in case of an emergency. A texted sent over a Baofeng is damn hard to detect. Especially if the adversary is using a directional antenna or a relay. The most novel one I came across in Afghanistan was a model blimp that was programmed to orbit over a given set of coordinates. It drove us crazy looking for it. The Taliban even went the extra mile by setting up decoy relay stations. Just goes to show that one's imagination is limitless.

  • @reen6904
    @reen6904 2 місяці тому +1

    Why can't I acces the channel?

  • @rageddyanne
    @rageddyanne Місяць тому

    Great information but damn i have garage envy real bad rn 😂

  • @jeremycortese
    @jeremycortese 5 місяців тому

    Sweet camo pattern. What is it? Digging your videos, brother!

  • @krystalnguyen3285
    @krystalnguyen3285 Місяць тому

    How do you inform your partners about any changes/rotations made to the encryption?
    Great video!!

  • @somerandom2416
    @somerandom2416 4 місяці тому +2

    Question: Do they still use a rare and obscure languages for encryption these days? Like during the ww2 us marine corps used navajo codetalkers. Quite successfully.

    • @samueljackson6188
      @samueljackson6188 4 місяці тому +2

      The problem with such a system is that it only a select few can use that system. Making it easier for the enemy to disrupt communications.
      A better system would be to use one that is based upon mathematics. Such as the stream cipher or the OTP.
      Math is a universal language. I could see the need to use another language if the receiver is an indigenous ally. Just know that each ally needs to have a separate covcomm plan so as not to compromise your own covcom.

    • @marchese1311
      @marchese1311 3 місяці тому

      i believe so

    • @The_New_IKB
      @The_New_IKB Місяць тому

      The British military still uses Welsh speakers as code talkers, the trouble is that there are Welsh speaking communities outside of the UK. During the Falklands War the Welsh couldn't be used as Argentina is home to one of these Welsh speaking communities.

  • @wildcatcomms
    @wildcatcomms 5 місяців тому +8

    Great video. Anyone telling you to get a digital radio, encrypted this or that, is a goofball or worse, trying to rip you off on overpriced gear without instilling any of the fundamentals of COMSEC.

    • @theskyrider3455
      @theskyrider3455 5 місяців тому +2

      Do you know what you're talking about ? Digital has several advantages over analog not least giving you the option to actually encrypt signals. Talking in codes and authenticating is the bare minimum we would do even when talking encrypted. COMSEC by today's standards means AES encryption (or through a similar approved algorithm) + frequency hopping.
      What do you think will happen if you start talking over the radio and sound like the military but they know it's not them because they don't use static freq unencrypted analog signals ? They'll start looking for you, triangulate your signal and ambush you !

    • @wildcatcomms
      @wildcatcomms 5 місяців тому +2

      @theskyrider3455 have fun getting a business license from the govt in order to use encrypted radios... So you can talk with other businesses??? The same military who will "triangulate" an analog signal will still be able to find the source of, and destroy, your digital encrypted signal.

    • @theskyrider3455
      @theskyrider3455 5 місяців тому +1

      @@wildcatcomms Hey man, if you want to use analog comms in an SHTF scenario, which is unlikely to occur the way we think of it anyway, go for it why not ?
      As far as I understand you can do on your own IBB whatever you want you're not necessarily communicating with other businesses, however I don't know the exact limitations of that.
      On the internet I can only do so much, I can give you an idea and steer you in what I think is the right direction now you can follow my advice or reject it's your decision...

    • @wildcatcomms
      @wildcatcomms 5 місяців тому

      @theskyrider3455 I'll stick with what I already know works, and what everyone else in the general public is using. You can get a business license and use encrypted radios to talk to other businesses if you think that's best for you and your commms plan.

  • @Skullzero1
    @Skullzero1 2 місяці тому

    My question is how do you securely distribute the keys

    • @joeysmith7296
      @joeysmith7296 2 місяці тому +3

      Gather the people you want to send encrypted messages to beforehand, and give them the keys on paper. Then, when they memorize it, have them burn it.

  • @pieterwillembotha6719
    @pieterwillembotha6719 5 місяців тому +3

    isnt this illegal according to the FCC? 🤓

    • @theskyrider3455
      @theskyrider3455 5 місяців тому +5

      This is not encryption per say. What's being said has to be understandable for the general public since that's the target group of ham radio. Everyone can understand what you're saying you're not hiding the content.
      Concealing the meaning of your message is something different I don't think the FCC will have any gripes with that. However it might annoy some other hams which could report you...

    • @ViktoriousDead
      @ViktoriousDead  5 місяців тому +1

      What @theskyrider3455 said

  • @orsotheshadowqueer7424
    @orsotheshadowqueer7424 5 місяців тому

    Smally saw both

  • @famosgunz2525
    @famosgunz2525 6 місяців тому +3

    TN Boys💪💪

  • @davidperalta876
    @davidperalta876 5 місяців тому

    I’m a HAM gonna bring this up next meeting with the club

    • @wyrdo1501
      @wyrdo1501 5 місяців тому +2

      im sure that will go over well, maybe things are changing but any sort of encryption over radio is illegal and most of the HAM guys are the "hall monitor" types lol. wish more people would get into radio with an outlaw attitude, probably gonna end up being a very useful skill. fck all the FCC do gooder types tho.

  • @bankrupt3am932
    @bankrupt3am932 2 місяці тому +1

    do tap code

  • @SuperP37
    @SuperP37 4 місяці тому

    I'm lost.....Why would you have G=4 at 8:16?

    • @ViktoriousDead
      @ViktoriousDead  4 місяці тому +1

      That was a mistake on my part, should be G=3 in that instance

    • @SuperP37
      @SuperP37 4 місяці тому +1

      @@ViktoriousDeadok..thanks. great videos man. more SUT and land nav video please

  • @Synochra
    @Synochra Місяць тому

    when I click on your channel, it says it's unavailable, any idea why?

    • @ViktoriousDead
      @ViktoriousDead  Місяць тому

      It’s blocked in Europe due to copyright

    • @Synochra
      @Synochra Місяць тому

      oh man

    • @blacklight4720
      @blacklight4720 13 днів тому

      @@ViktoriousDead I doubt that the copyright is the reason. Maybe it has to do with type of content and ideas you promote.

    • @ViktoriousDead
      @ViktoriousDead  13 днів тому

      @@blacklight4720 it literally tells me on my studio app that it’s blocked in France and a few others due to copyright song in a Short video

  • @inthenameofprog2243
    @inthenameofprog2243 2 місяці тому

    I guess I'm the only one that noticed the 69420 at the start 😂😂

  • @Dread_Pirate_Homesteader
    @Dread_Pirate_Homesteader 6 місяців тому +1

    Tri grams and one time pads can't be decrypted

    • @ViktoriousDead
      @ViktoriousDead  6 місяців тому +3

      Unfortunately they suffer the same issue as some show here, where both parties, at some point would need to meet to exchange the encryption key. This is one of the biggest downsides and challenges of all cyphers, the thing about the “KING FATHER” cypher method for numbers is that you can utilize 24 hour rotations in order to maintain COMMSEC.

    • @Dread_Pirate_Homesteader
      @Dread_Pirate_Homesteader 6 місяців тому +2

      @DukeOfTennessee117 yeah ncscout had a good training on it. You would need to meet up and exchange a bunch or drop off point. The authentication code is excellent but it doesn't provide security for those listening in

    • @ViktoriousDead
      @ViktoriousDead  6 місяців тому +2

      @@Dread_Pirate_Homesteaderof course, all ways best to keep comms brief, and always transmit as if everything is being recorded and passed off to SIGNIT.

  • @MrSlickPulla
    @MrSlickPulla 5 місяців тому +1

    Why not just use a one time pad? Get yourself some 10 sided dice to created your pad.

    • @save2a4all
      @save2a4all 4 місяці тому

      Makes key exchange/rotation more difficult 11:00

  • @rubberduckindustries6665
    @rubberduckindustries6665 Місяць тому

    If you hate your liver, take a shot everytime a SAD HAM makes a comment about encryption being illegal.

    • @ViktoriousDead
      @ViktoriousDead  Місяць тому

      What do you do if you hate HAM’s?

    • @rubberduckindustries6665
      @rubberduckindustries6665 Місяць тому

      @@ViktoriousDead I only hate SAD HAMS. You know...the spergy boomers who will be the first one to tell you about the letter of the law and that you bofaeng is junk.....even though the last time they left the shack Bush was in office.
      You know...the guys with a DTOM flag right next the their "thin blue line" flag.
      Yes, I am a licensed operator. No, I don't think you need one to use the gear.

  • @TransilvanianHunger1334
    @TransilvanianHunger1334 Місяць тому

    What a great way to get every message you are sending out deciphered and having your men killed.
    I get that your inspiration comes from real guerilla movements but they were active decades ago and these methods are outdated with today's tools. If an actual government agency got on it, it would take them minutes to solve it.
    If you really need to do it one day, go digital with your comm as well. Use encryption tools like kleopatra which are built-in to tails.

    • @ViktoriousDead
      @ViktoriousDead  Місяць тому +2

      All do this can be encrypted better than demo’d. Digital comms are not prevalent enough to be in common use in a movement.
      Every guerrilla movement has used analog comms since its inception and are still in use today. Saying “just use digital comms” is like saying “just have a force of 45-70 men well trained and equipped with modern weapons/kit and technology” is it possible? Yes, will 99.9% of people achieve that? No.
      You’re welcome to make your own videos however, I’m sure you have the experience, background and education/training to talk about the subject, and are not an overweight Buffoon nerd who has a “UA-cam” education and just repeats what he hears

  • @user-hz5rk5vy1t
    @user-hz5rk5vy1t 5 місяців тому

    As a cybersec pro. It's all been hacked.
    This primitive comms won't help longterm.

    • @ViktoriousDead
      @ViktoriousDead  5 місяців тому +6

      Nerd

    • @user-hz5rk5vy1t
      @user-hz5rk5vy1t 5 місяців тому

      @@ViktoriousDead True. But I can shoot and fight. 😉

    • @save2a4all
      @save2a4all 4 місяці тому

      ​@@user-hz5rk5vy1tit's all PACE contingencies and METTC risk mitigation dependent 😉

    • @samueljackson6188
      @samueljackson6188 4 місяці тому

      Tell that to the Taliban with their sneakernet. A 14-year-old kid and a dirt bike is damn hard to intercept. Not to mention the numerous places a message can be hidden in. A case study is the hells angel and meth. They call it crank because the bikers hid the drugs in the crank cases. Speaking from experience. No soldier is going to take the time to dismantle the entire bike looking for a piece of paper.
      Don't get me started on their hawala money system. Good luck following the money in that system. Most are just nicknames and alphanumeric codes.

  • @mrbenjiboy9527
    @mrbenjiboy9527 2 місяці тому

    These ciphers are way too simple to seriously use.

  • @treborschafer3945
    @treborschafer3945 5 днів тому

    27 letters in the alphabet? American schools really are terrible lol

  • @TacticalXmen
    @TacticalXmen 5 місяців тому

    Hi, I like you! Are you interested in reviewing our outdoor tactical gear?