Quotes: Decrypting Codes

 

Quote:

And so we have a System, a System that is Individually Centred, within each Human – as their Own Unique Code, the Book of Life, which is Ensures that: No One gets Out, No One Finds Life; and everyone that Looks at the World, do Not Look at the World as it Really Exists – you only Look at the World through your Designed Encryption and through the Feelings that you have Accepted and Allowed. And what you See is Measured according to these Feelings, and when you ‘Feel Good’ about it, then you do it – if you ‘Feel Bad’ about it, you stay away from it. You Never Challenge the System, because from your perspective – ‘everything is exactly the way it should be’.

http://creationsjourneytolife.blogspot.com/2013/02/day-304-encryption-of-systems-part-five.html

And Each System, that’s Decrypting – need to be Corrected, need to be Taken-out of its Position of Control, it Needs to be Forgiven, Understood, from All Dimension so that it cannot occur again

http://creationsjourneytolife.blogspot.com/2013/02/day-301-encryption-of-systems-part-two.html

So, for some years now we are busy with the Physical Encryption. A little bit more difficult, because – you have to take down the Complete Program, Decode the Encryption; and – these Programs are Programmed to Activate similarly, to say, the Seed of a Plant. The Seed of a Plant requires a certain amount of Rain, a certain amount of Heat, a certain type of Environment before it Activates and it Grows.
The System is Designed like a Plant. It requires a Very Specific Environment before it Activate. So, before we can Find the System, because it’s hidden into uncountable Dimensions – we have to first Create the Environment within which the System Activates. And when the System Activates – we can find the bloody thing. When we find the bloody thing, then we can deal with it, Decrypt it, take it out. And then – we have to take it out in the Physical, because it is a Physical System that is Creating Control within the Physical. And as you’ve Noticed, that stuff is like Really Effective.

Taking out a System in the Physical, is like walking through the Valley of the Shadow of Death. It is absolutely Hell, because – the Physical Body Believe itself to be the System. So, you have to get it to See, and Realize that it is Not and that it can be something else, because it’s Complete Image and Likeness, it is the Physical. And then, you have to take it out – and its got to then Willingly Release the System and itself from the Ideas and the Ideologies that the System Represents…and only then, can the System be Removed.

http://creationsjourneytolife.blogspot.com/2013/02/day-301-encryption-of-systems-part-two.html

Taking out a System in the Physical, is like walking through the Valley of the Shadow of Death. It is absolutely Hell, because – the Physical Body Believe itself to be the System. So, you have to get it to See, and Realize that it is Not and that it can be something else, because it’s Complete Image and Likeness, it is the Physical. And then, you have to take it out – and its got to then Willingly Release the System and itself from the Ideas and the Ideologies that the System Represents…and only then, can the System be Removed.

http://creationsjourneytolife.blogspot.com/2013/02/day-303-encryption-of-systems-part-three.html

Something to Look at:

Wikipedia

Encryption

In cryptography, encryption is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can.In an encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be able to determine anything about the original message.

An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to randomly produce keys.

The Key

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm or cipher. Without a key, the algorithm would produce no useful result. In encryption, a key specifies the particular transformation of plaintext into ciphertext, or vice versa during decryption. Keys are also used in other cryptographic algorithms, such as digital signature schemes and message authentication codes.

References:

Creations Journey To Life

Encryption of Systems Part 1

http://creationsjourneytolife.blogspot.com/2013/02/day-300-encryption-of-systems-part-one.html

Encrypton of Systems Part 2

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s