Cyphersol Manifesto
Since the earliest civilizations, the ability to communicate freely among individuals has played a crucial role in the social fabric.
Private conversations within a family context or among friends have always represented not only an expression of trust and personal bond but also an essential means for the transmission of knowledge and decision-making.
This freedom of private communication has always been seen as an intrinsic component of personal identity and autonomy.
This sanctity of the domestic hearth was reflected in laws and social norms that protected the privacy of individuals.
For example, in tribal societies, trust and open communication among members were considered essential for the survival and integrity of the group.
Limiting such freedom would have undermined not only social cohesion but also the collective ability to respond to challenges and threats.
This international recognition reflects an ancient and universal principle, emphasizing how a civil and guaranteeing society considers the right to private communication to be fundamental.
However, it is evident that this is merely a cunning means to try to circumvent Article 12 of the universal rights declaration.
For a long time, governments have been trying to "convince" citizens that Freedom is a dangerous concept, which should be viewed negatively.
And that it should always be placed far behind concepts such as security.
This is because in this way they can justify and make increasingly restrictive laws acceptable.
End-to-end encryption is a technology designed to ensure that only the people involved in a conversation can read the messages exchanged, thus protecting the privacy and security of personal communications.
People should shudder at such requests.
They blatantly violate Article 12 of the Universal Declaration of Human Rights, and even more so the natural universal law that mandates the freedom of private communication between individuals.
More than a risk, it is a certainty.
It also makes it clear that the intent to combat terrorism is not exactly the true goal.
Having the ability to globally control citizens means "Power".
It means having an enormous means of blackmail against citizens who would live in fear of freely expressing their opinions when not aligned with governmental ones.
How figures like Hitler and other dictators used control of information to suppress opposition and perpetuate their power, highlighting the dangers of invasive laws in the modern digital era.
This widespread surveillance system made it nearly impossible for citizens to organize an effective resistance.
Similarly, in the Soviet Union under Stalin, control over communications allowed the government to arrest and deport millions of people considered threats to state power.
If invasive laws allowing global surveillance like those today had been in the hands of Hitler, the power to suppress dissent would have been total and devastating.
To assume that a Hitler will no longer exist is at least naive.
Only now, he would find himself with laws that would greatly increase his power.
Protecting the freedom of speech, expression, and private communication is crucial not only for individual dignity but also for a society's ability to protect itself from future tyrannies.
History has shown that rights can be rapidly eroded under the yoke of new authoritarian regimes.
Maintaining the freedom of uncontrolled and free communication is an essential safeguard that can protect society from similar future threats.
The cost of ignoring this lesson could be freedom itself.
Everyone has the right to the protection of the law against such interference or attacks.
F.A.Q
What is Cyphersol?
Cyphersol is an advanced system for encoding and decoding.
It allows for the encoding of sensitive texts (private communications, seeds, private keys, passwords, etc.).
What sets it apart from other systems?
Beyond its security, Cyphersol's feature is its nature, being both digital and manual at the same time.
Typically, encoding software operates only digitally.
In this case, it can be used both through the software and without it.
Why is it an extremely secure and practically inviolable encoding system?
Everything will be explained in detail in the dedicated guide.
However, the main factors that make this system extremely secure and inviolable are the nature of the "matrix" and the fact that both the matrix itself and the encoded and decoded data always reside strictly on the user's local device.
Why are data not saved in the cloud or on a network server?
Such a hypothesis, especially in the case of certain types of data, would be truly dangerous.
Therefore, I chose to set up the application this way.
In this regard, I want to emphasize the risk that versions forked by others might implement such a feature.
If so, never trust them.
What does it mean that the matrix is unique?
It means that it is practically impossible for even just 2 identical ones to be created.
After reading the guide you will understand the reasons.
How can this system be violated?
In only one way.
It can be violated only if both the matrix and the code derived from it are stolen.
Possession of only the matrix or only the code will not allow the attacker to trace back to the decoded text.
In this sense, the advice is always to keep the two files separate (and renamed imaginatively).
Obviously, such a scenario should not even be considered a weakness of the software but a lack of the necessary caution on the part of the user.
By following these steps, you can confirm that the files have not been tampered with.
- Make sure you have downloaded the following files:
Cyphersol.AppImage.tar.gz
Cyphersol.AppImage.tar.gz.asc
pgp-key.asc - Ensure all three files are in the same directory
- Open the terminal and move to the directory where the files are located or directly open the terminal when you are in the correct directory
- Run the following command to import the public key:
gpg --import pgp-key.asc
- Now run the following command to verify the file signature:
gpg --verify Cyphersol.AppImage.tar.gz.asc Cyphersol.AppImage.tar.gz
- Ensure that the output indicates that the signature is valid and was made using the PGP key with ID 79A0D0AF38F08EA0F3F1E261A5FCAAF91538D881.
The output should inform you that the signature is correct and that the key used matches the one imported.
- Download and install Gpg4win, the software to verify signatures on Windows.
- Make sure you have downloaded the following files:
Install.zip
Install.zip.asc
pgp-key.asc - Ensure all three files are inside the same directory
- Open the command prompt or PowerShell and move to the directory where the files are located
- Run the following command to import the public key:
- Now run the following command to verify the file signature:
gpg --verify Cyphersol.AppImage.tar.gz.asc Cyphersol.AppImage.tar.gz
- Ensure that the output indicates that the signature is valid and was made using the PGP key with ID 79A0D0AF38F08EA0F3F1E261A5FCAAF91538D881.
The output should inform you that the signature is correct and that the key used matches the one imported.
gpg --import pgp-key.asc
After downloading, you can place it in any directory of your choice.
To function, however, it must be made executable.
Example of how to make the application executable if placed in the home directory.
Open the terminal and type:
chmod +x Cyphersol.AppImage
Tested Linux versions:
Ubuntu 24.04
Ubuntu 22.04
Linux Mint 21.3
Linux Mint 22
MX Linux 23
Kali Linux 2024.2
Tested Windows versions:
Windows 10
Windows 11
The "Cyphersol" software is provided "as is", without any warranty of any kind, express or implied, including, but not limited to, the warranties of merchantability or fitness for a particular purpose.
In no event shall the software creator be liable for any direct, indirect, incidental, special, exemplary, or consequential damages.
Be advised that modified versions (forks) of "Cyphersol" are not officially supported and may include changes that alter the intended operation of the software, such as the ability to interface with external servers.
This could pose significant risks to the security of the user's data.
Users are advised to verify the authenticity and integrity of any forked version of the software before use.
"Cyphersol" was developed to operate exclusively in a local environment.
Specifically, data will always and only be created and saved locally.
Forked versions of Cyphersol that involve remote data storage should be absolutely avoided.
Using the software in ways not intended by the original developer can increase the risk of exposure of user data.
The only difference, if you use it without donating, is the opening of a popup window with a countdown of a few seconds every time you perform an operation.
However, the software will function correctly in the same way.
In any case, if you find this software useful, I ask you to consider the work done and to make a donation so that I can keep it updated and monitored.
After making a donation, contact me via email and I will provide you with the version free from countdown popups.