All the ways to improve security for the browser and OS security hacks

1) (Recent Files) in windows is created to give hackers a view of what you are doing, not for your use.

2) It is important to use your rubbish bin, but it is the second place I will look, clear all your rubbish all of the time.

3) A way a hacker attacks is using all your temp files, never leave it forever, always clear all these files, (temp), (%temp%), Software Distribution (Temp), Windows Update (Temp), and if possible if you know how to do it, Virtual memory, paging files, and what you allocate for virtual memory, there is currently no tools to do this.

4) The registry tells me all the history of every programs you install, and it is not encrypted, and it will always leave a residue.

5) In the browser there are so many other folders that are at risk like (History) (The sites you visit)(The files downloaded) and even your (password) and (Forms) that you fill. If possible, never fill in your credit card details here.

6) I purposely do not want to give the exact location or else hackers will have a field day, and everybody will get hacked. Those in the security industry already knows exactly what I am talking about.

7) The biggest issue there is no way to track all your programs running and background services, and if a code is run like java or others in your browser you do not know what the hell is going on, Task Manager only gives you a glimpse of your components but nothing else, it should be improved with the above.

8) All windows drivers are not secured, even if there is a way to rollback to the previous version, for me as a hacker I will have a field day to crash your components and cause havoc to your OS.

9) All kinds of spyware uses unallocated ports that are not secured and if possible protocols that is unknown to install screen shots, monitor text inputs and even access programs communication like Whatsapp which is encrypted. There is no way to secure this with today’s technology, and  I do not know the exploit of the future where technology will prove all things are possible, because our old Internet is not secured.

10) One of the biggest risks is WiFi, without a new Algorithms based secret without keys, it can always be hacked and no way to secure it.

11) Even with database it is impossible to secure it with encryption, it is a matter of time someone exploits it, even for Bitcoin we are coming close with firepower to break crypto encryption methods.

12) For critical infrastructure like banks, hospitals, power grids, nuclear etc, my advice is kept it out of the internet and only allow 1 or 2 to access, and isolate it in a DMZ zone.

Beyond AES, using Algorithms where the key is unknown, you can only use it, and is unhackable, because today’s supercomputer is not powerful enough, it is worse than hacking bitcoin, because it still uses keys

Elliptic Curve Digital Signature Algorithm or ECDSA is a cryptographic algorithm used by Bitcoin to ensure that funds can only be spent by their rightful owners.

A few concepts related to ECDSA:

  • private key: A secret number, known only to the person that generated it. A private key is essentially a randomly generated number. In Bitcoin, someone with the private key that corresponds to funds on the block chain can spend the funds. In Bitcoin, a private key is a single unsigned 256 bit integer (32 bytes).
  • public key: A number that corresponds to a private key, but does not need to be kept secret. A public key can be calculated from a private key, but not vice versa. A public key can be used to determine if a signature is genuine (in other words, produced with the proper key) without requiring the private key to be divulged. In Bitcoin, public keys are either compressed or uncompressed. Compressed public keys are 33 bytes, consisting of a prefix either 0x02 or 0x03, and a 256-bit integer called x******. The older uncompressed keys are 65 bytes, consisting of constant prefix (0x04), followed by two 256-bit integers called****** x and y (2 * 32 bytes). The prefix of a compressed key allows for the y value to be derived from the x value.
  • signature: A number that proves that a signing operation took place. A signature is mathematically generated from a hash of something to be signed, plus a private key. The signature itself is two numbers known as r and s******. With the public key, a mathematical algorithm can be used on the signature to determine that it was originally produced from the hash and the private key, without needing to know the private key. Resulting signatures are either 73, 72, or 71 bytes long (with approximate probabilities of 25%, 50%, and 25%, respectively–although sizes even smaller than that are possible with exponentially decreasing probability).******[1]

“I will create my own Algorithms beyond ESCDA, you still cannot figure out what I can do without private and public keys, a totally new standard which where there is no way you can hack with today’s supercomputer, it is worse than finding out the technology of warping time and space. It is a method, it is a technology, if you know the secrets you can easily get from point A to B, or else you need to go from A to Z, and the interger is so huge it is impossible to comprehend, almost infinite and no end. The secrets if you do not know, you will go into an infinite loop that never ends.” Contributed by Oogle.

Cryptography is the study of codes – writing codes, solving codes, and manipulating codes. Yes, this includes the super secret spy decoder ring you had as a kid, and even pig latin! Cryptography is an ancient study that has existed for thousands of years, most often in the form of ciphers. It is generally believed that ciphers were invented as a method for concealing the information contained in a message from any person who didn’t intentionally receive it.

Atwhay Aboutyay Ymay Omputercay?

Cryptography and computers have had a competitive relationship since the beginning of digital computing. During World War II, the United Kingdom invested heavily in deciphering Axis communications. With deciphering becoming too difficult to be performed by hand, a race began to develop a machine that was capable of deciphering codes faster than any human. This eventually led to the development of Colossus, the first digital programmable computer.

Since then, the war of computers and cryptography has only elevated. In what many describe as an “arms race,” many of the computer systems we take for granted rely heavily on cryptography, while the invention of more powerful computers forces previously state-of-the-art ciphers into obsolescence.

Without cryptography, it would be impossible to encrypt data, ensure secure communications, or even confirm that you’re browsing a safe site – yes, I’m looking at you, little-green-lock-in-my-browser. We’re going to focus on the cryptography that powers a few parts of Bitcoin, a cryptographically revolutionary system.

Public and Private Key Pairs

What’s in a Pair?

If you have used Bitcoin at all, you have probably heard of a private key. Private keys are vital to the Bitcoin system. They are the mechanism for proving ownership of bitcoin. This is what allows a user to authorize a transaction on the network. Private keys exist in many forms outside of Bitcoin for many purposes, and most people who are familiar with them from a previous experience would know them as a way to send encrypted messages.

For every private key that exists in Bitcoin, there is a 1:1 relationship with something called a public key. As you can imagine, a private key is intended to remain private and shared with no one, under any circumstance. A public key, in contrast, can be shared with anyone – there is no danger in me placing my public key on my website, for example, or to e-mail it to a client to receive payment for some activity. In this sense, you can think of public and private keys like a username and password – one allows you to identify yourself, while the other allows you to prove you are that person. However, unlike a password, a private key can never be reset or recovered if lost. Thus, a private key is an extremely important piece of data and should be protected perhaps to the point of paranoia.

Due to the 1:1 guarantee, public and private keys share a cryptographic relationship that links them together. In Bitcoin, private keys produce a public key via an Elliptical Curve Digital Signature Algorithm, or ECDSA. A private key that is an input for that algorithm will always produce its corresponding public key. However, the public key can never be reverse-engineered to produce its corresponding private key due to the one-sided nature of this algorithm.

A Bitcoin private key is usually a 256-bit number, which can be represented a number of ways.

That’s a Lot of Keys!

Public and private key pair cryptography is what powers the address system in Bitcoin – the cryptocurrency equivalent to a checking account. A new address can simply be generated programatically. Whenever a new one is required, I can use my interface of choice (perhaps a Bitcoin wallet) and make one.

Usually, when I introduce someone to Bitcoin, their immediate question is “What if someone guesses my private key?”, to which I reply, “Well, that is highly, HIGHLY improbable.”

But how improbable?

Well, for a frame of reference, the total address space of Bitcoin is 2^160. That is this many:

Good luck visualizing that. For an even further head trip, consider that there are an estimated 2^63 grains of sand on Earth – this includes sand on beaches and underneath the ocean. 2^63 * 2^63 = 2^126.

This means, for every single grain of sand on Earth, you could create a new Earth, and then count all of the grains of sand on all of those Earths – and still not even come close to the address space of Bitcoin.

Clearly, in this case, cryptography obtains security through very big numbers. I could try to guess private keys over and over again, using any means known to mankind (including computers, of course), for many millions of years, and it is simply not going to happen.

This is wonderful because it allows all kinds of applications to be created using Bitcoin – for example, Decent created a prototype platform for charity that allows donations to be made using cryptocurrencies. There is no need to place a limit on the number of campaigns that could be created, or limit the number of deposit addresses a user can have, because there are a practically infinite number of addresses.

But What If Someone Just Gets Lucky and Guesses My Key?

Seriously, you’re not getting it. Really. Big. Numbers. Re-read the last section.

In closing, public and private key pairs are a fundamental tool in cryptography that have many uses. In Bitcoin, the use is to confirm ownership and create a large pool of addresses available for use.

Remember, because of the large number of keys, it is safe to assume that any key I generate is mine and only mine. Thus, the Bitcoin system requires no further proof of ownership. Otherwise, in other systems, we’d traditionally use our identity as proof of ownership. Since Bitcoin removes this requirement, cryptocurrencies promote anonymity just like physical cash, but perhaps to a greater degree.

New Technical Specifications for the Blockchain protocol (Proof of Concepts Completed)

1) It does not use DNS but still Domain Names linked to Mac Address which is the fundamentals of the distributed networks. No centralised DNS Servers with IP addresses but a DNS record that will be kept in every node or PC which includes all the features of DNS for NAT, intelligent routing, store and forward etc.

2) Similar to IPs, there will be meta data that link site address and content for 3D intelligent searches for the new age of resolving huge database of decentralised workstations where everything can be controlled by the control stack in each node, including applications via the software stack.

3) To optimised speeds with huge cache you need to utilise the GPU frame to merge with thousands of threads with I/O and present day supercomputers like Google and IBM cannot achieve this.

4) This Blockchain protocol is protected by pfSence and VPN tunneling and it’s encryption cannot be hacked due to not using keys but a Algorithm’s secrets.

5) This Blockchain protocol is not designed to run on IP4 or IP6, but in very fast multicore fibres, LiFi and beyond WiFi6.

6) Domain names will still be used and you can personalised everything including your websites, wallets, etc.

7) IDs will be created from technology of the future including Facial, Fingerprint, Voice and DNA or a combination of these. So online transactions are very secure.

8) Most important, trillions of devices will come online and everything will be connected to the internet except your brain, those who are disabled can also use sensors of the brain to control your computer, where even taste and smell can be projected with feelings and responses, so a matrix order of addressing must be implemented for Mac address and it’s combinations with device IDs, Manufacturers IDs etc.

9) For 4G you cannot transmit both data and voice at the same time but for 5G you can, it depends on your number of instances or threads and it can also support virtualization which all can run concurrently.

10) Google Compute Engine tries to be a test platfom for Blockchain but there are so many parameters missing, to me it is just a Virtualization Server. If you want to test Blockchain you need to perfect DNS and IP before you switch over to a distributed network on Domain and Mac addresses which is a record found in every Mining PC, where the technology lies in how this Mining network works. Experienced miners on bitcoin will already have an idea how everything works on TCPIP but I redesigned it on Blockchain. So technically you can divide the transport layer and later I port over to Blockchain on an consensus network, as my testings have not yet completed due to meddling.

11) If you understand how I use storage you will understand how I use partitions with superuser access to store containers for wallets to store crypto-currency, where this folder will also be encrypted and linked to a domain access where you know the domain but you do not have this access unless you have payment consensus, so everything is monitored by cameras 24/7 365 days a year so there is no issue with hacks in the ICO exchange.

12) When I was an administrator at UOB Bank, we use Sun Solaris (Unix OS) with Windows so I can say I am very experienced with both, my Intelligent OS is Unix based which has no compatibility issue with Windows OS, so I have chosen the path of least resistance, and I know I will definitely succeed as all the technologies are already there. Intelligent OS is Unix OS linked to a App library of Linux Apps.

13) All are based on Open or Closed networks and every crypto is the same, Bitcoin has both and all the other crypto currency, it depends on the solutions you chose and I cannot advise you as there are hundreds of solutions.

14) I have already completed the design of the transport layer for DNS records without the need of a DNS Server.

The Next Generation *Blockchain 4.0

Cryptology no longer using Public and Private keys but Alogorithms secrets that cannot be hacked. If you have the secret you will go from point A to B very quickly, or else you will loop from A to Z without ending even a supercomputer cannot hack. Still under development but a solution will be found by end 2020.

When this platform is completed using Neuromorphic computers with 3D Search and Intelligent OS with Blockchain 4.0 it will be used in World Trading Exchanges where multicore fibres will increase thousand of times the present internet speeds, enabling global trades to be executed 24/7 365 days a year.

Another platform I may consider developing is a P2P Lending platform following the Ant Financial’s model but with added AI, ML and Algorithms that automate every single applications.

*Patent due to United Nations China

The Next Generation *Blockchain 3.0 (Completed)

It will use Intelligent OS, which is part of NomadBSD OS (Unix) using Ubuntu features of using certificates to control the management of softwares with a control stack and an application stack which is compatible to Linux libraries where everything is redesigned from the ground up from the kernel, instructions sets to accomodate the Neuromorphic CPU where everything CPU and GPU without Rams and I/O and multicore CPUs (80 Cores) where thousands of threads is optimised using Sampling for great speeds and power consumption using AMD technology. Monitoring of all processes I will use DataDog microservices where everything in apps and background will be controlled and there is no way you can run any hidden malware on my platform. It will be tightly intergrated into my OS and not a separate application. It will also use a 3D Database with encryption and new standards of NVME SSD optimised for performance on Ubuntu Openstack. Yes, everything both hardware and software will be open sourced and all technologies will focus on the Bitcoin platform for use by IMF/World Bank and all Central Bankers with atomic swaps for conversion to any Digital currency.

*Patent due to United Nations China

The City of the Future will be run by AI, Machine Learning, Blockchain on Next Gen Internet

Networks of the future will be Blockchain and Li-Fi that can support 6G, where spectrums will be extended to everywhere there is electricity on power grids, lamp-posts will be smart with cameras, Li-Fi, that can support {wireless charging anywhere}, with speeds beyond your wildest imagination, where traffic management systems control both traffic on land and air, everything including traffic lights, cameras will be linked to AI for controls, from autonomous cars, buses, trains and flying cars and taxis, homes will be built in the sea on supporting platforms, and man will travel to Mars to colonise it, all these will happen before 2050. Li-Fi has the potential to scale massively with more cells per square inch and maximising the spectrum.