User:Laurier Rochon/work/kimjong-ilcipher: Difference between revisions
No edit summary |
|||
(2 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== The Kim Jong-Il Cipher == | == The Kim Jong-Il Cipher == | ||
<span style='float:right;padding:0 0 40px 40px;background:#fff;'> | <span style='float:right;padding:0 0 40px 40px;background:#fff;'>[[File:DSC_3506b.jpg|350px]]</span>The Kim Jong-Il Cipher is an encryptor/decryptor that allows you to send messages safely through state-controlled/censored communication systems. Using novel encryption techniques, your message is crunched up into an illegible and obscure form, guaranteed to fool any system administrator's vigilance. It can then be decrypted using the same engine, revealing the original, bare text. These high levels of encryption are quite necessary, as even Kim Jong-Il is himself 'an internet expert' (self-proclaimed) - you can only imagine what the North Korean engineers can do. | ||
You can also choose 3 different levels of encryption, the Kim Jong-Il, the Kadhafi and the Mugabe, depending on the level of secrecy you need. | You can also choose 3 different levels of encryption, the Kim Jong-Il, the Kadhafi and the Mugabe, depending on the level of secrecy you need. | ||
Line 7: | Line 7: | ||
How does the encryption process work? Well I'd love to tell you, but I'd have to kill you afterwards. | How does the encryption process work? Well I'd love to tell you, but I'd have to kill you afterwards. | ||
[http://www.pre26.com/kimjong Try it here] | |||
[[File:Klogo.gif]] |
Latest revision as of 22:13, 10 July 2011
The Kim Jong-Il Cipher
The Kim Jong-Il Cipher is an encryptor/decryptor that allows you to send messages safely through state-controlled/censored communication systems. Using novel encryption techniques, your message is crunched up into an illegible and obscure form, guaranteed to fool any system administrator's vigilance. It can then be decrypted using the same engine, revealing the original, bare text. These high levels of encryption are quite necessary, as even Kim Jong-Il is himself 'an internet expert' (self-proclaimed) - you can only imagine what the North Korean engineers can do.
You can also choose 3 different levels of encryption, the Kim Jong-Il, the Kadhafi and the Mugabe, depending on the level of secrecy you need.
How does the encryption process work? Well I'd love to tell you, but I'd have to kill you afterwards.