Wednesday, August 23, 2017

Amazon redress picture


Just a picture file.

Pictures for amazon redress 2017


MR=AR+VR: facebook+OCCULUS-RIFT| hololens|Google-glasses


http://aaqg-arunarya.blogspot.in/2017/08/mrarvr-facebookocculus-rift.html

AR is augmented reality. There is a reason why I devote time on it. AR is mixing real world and artificial images. It can be used in elevator repairs. Any repair really. Even by idiots talking to remote experts whose time is carefully used and who are in comfort!

VR is virtual Reality. No mixing. It is of two types. One is by Google cardboard I have now. You can fit a mobile into it. If the mobile has 2 images, a fused 3D happens, You can also do pseudo-3D.

Occulus Rift is other kind where a complete 3D virtual world is made. With normal Google cardboard kind, if I move my neck, see the same image. Here, a complete 3D virtual world is made. If you move neck, the image changes correctly! And amazingly, enough and fast computers ensure there is no disorientation or giddy feeling! No wonder Facebook paid another 10’s of billions.

Now the next application using Facebook -  1-3 friends can call and find a private room and have a party! Each is really in the virtual room, you can act VERY natural. Century 21 is here!

MR is mixed reality. Google glasses are in that direction. AR or VR is consumer choice.


Sunday, August 20, 2017

Who am I, What do I want



In Aug, 2017 I found my nirvana. Nothing matters now.
All Blue+ words are clickable.
Nerd looking for commitment, link tells you what I like, but read before (i.e.breathfirst), link will remain here!
All I need is to overcome my TBI and I have clock of old age ticking on me. I go for novel square root for nested safety in required law-enforcement disclose
Proofs are simple. Military encryption from UN works for symmetric encryption, so the only remaining problem is key k distribution. Assume one-way function. Publish one-way of k. The respondent can invert, hence get k. Others can’t. Simplest one-way is discrete square on 1000 bits. Its reversal is square root, doable in numbers modulo 1000 bit primes product, both mod 3 on dividing by 4.
Amortality
I strongly want and consider achievable of amortality (long life with small diseased periods at end). There are only two methods at this time – calorie restriction but not starvation, and angiogenesis by ECP (external counter pulsation) – needed by me anyway with narrow Asian Indian blood vessels in heart; means no surgery again, not needed only with ECP.
I have plans to treat self when diabetes gets me and offer medical tourism to low cost India, for applications in toning up other body parts too
.
One way to become young again is by stem cells. There are two challenges – how to make them work ans how to replace. replacement is easy of non-cancerous cells, just inject the site, old ones will die. So many disease conditions can be fixed even before aging – the thousand noble prize. Consider this experience quote from great IITian
One possible but illegal way to get amortality is by suicide. No one catch you after this crime!
I believe totally in aaquantum-stoicism which need no faith and is not staticand which derives its ethics + behavior directives from reality of death (stoicism),
narrative of creation from quantum mechanics, and narrative of life + development from evolution with punctuated natural selection.
Dynamism exceeds the links given to firmly understood before this and new are ethics + behavior modern physics and evolution.
One way around creation mysteries is via torsion. Every Black Hole Contains a New Universe. It is agnostic on God but strongly so in that ALL existing religions are considered to the conspiracy to defraud by criminal priests who need to be routinely investigated for fraud and must never be able to impose religion derived enunciation through the state, even if in majority.

Science
I wept with joy when gravitational waves were discovered when I live.
also.
They even found Higgs. The raging curiousities in me are quiet now.
These are my latest interests, likely to death.
Quality singing: A wonder for me
I enjoy science seeking answers to questions in me - what is this universe around me (aaquantum-cosmology), what is life and how did it begin (aaquantum-biology), what is living and death (aaquantm-stoicism). Stupidest are derivations from greats and tomes. Answer is skepticism, constrained rationally when required.
The aaquantum-cosmology
of physics
with
Yes, we can distinguish between 48% copenhagen quantum scientists and 1% pilot wave (me)
This is why aaquantum-stoicism may be the last great religion to arise –
quantum mechanics may be limited in answering more
What does nested safety mean?
It means a series of keys are partitioned into levels such that a key on a level will open all documents of level below, but none of same or higher level. Presumably the Supreme court has the most powerful key, then president next and so on, an order constructed by the congress as if amending the constitution.
Then stories like links are passe
Never kneel down
“Do not get down on your knees to pray just to show God that you always remember him. Instead stay on your feet, and always do as he would do in place of him.” ―
Suzy Kassem
I suffered bad auto-accident in 1990, survived long unconscious to TBI, overcame ALL physical debilitations and solutions to mental disabilities through parents, now aged. I have always fought deficits; do not have patience with those who compromise. I seek none beyond anger less understanding of explicit decline to a request to shared activity. I don’t compromise often and feel contemptuous sorry for those who do.

what do I want?
I realize my TBI limts, but not mathematical error. Under no competition and no disclosure, no cost unless used, royalties per use.

Saturday, August 19, 2017

FIBER The Arun Arya Unabusable Identity Based Encryption System for Internet of Things



self link

Any existing encryption system can be abused by terroristsand people central to the system or else foreign countries. My system (FIBER or Family Identity Based Encryption Restricted) is based on fast discrete number theory square roots modulo semi-primes, derives it strength from published zero-knowledge proofs; can be used even in terrorist-sensitive locations, by very closed governments and can be proved safe.

Let us start with easiest to understand. Many (check ok) people want square roots of numbers, with semi-prime, sent cryptographic ally with respect to 1000 bit or longer numbers. If I can, send them the answer which they can check by free square function or their own way. Otherwise I answer “can’t” to indicate one of “don’t want to”, “not a square”, “not allowed”, etc. How I calculate, it is my business. In some case, the answer can be found in mail, on sites, or in directories, the user better check by squaring for each could be hacked. The process of extraction is a proprietary very hard cryptographic problem done on cloud, check is easy, decentralized and local!

Any string can become cryptographic ally digest using the standard edigest gratis function. It produces a 576 bit number (regardless of string length of the string processed by our edigest) is standard 512 bit digest appended with 64 bit length. The length append eliminates many fraudulent insertion techniques. It is crypt-hard to find another string with that aaq-digest.

A two level encryption is used. The encryption key is by the arun-arya method. The message itself is encrypted using the key and strongest-symmetric-encryption. The destination key is obtained and checked once every year by the year, public-key and registered name of the destination by the yes/no question
Question( “has-public”,  year,  public-key:  huge,  name-destination: string)

which anyone can pay say 1 cent and get answer. 1 cent charge is sufficient to kill spammers and guessers!

The method (number, sqrt_number/standard-key) is standard ZKP in our world except that proofs can be obtained, if entitled, without knowing how they were obtained and then locally checked. This is basic to my aaquantum encryption and called XZKP or extended zero knowledge proof. Some one can assert without man-in-the middle, their public key for a year given their name. A name can be reused after 20 years only. A name terminated by year can never be reused!

All kinds of math-hair-splitting is avoided by term strongest_symmetric-encryption chosen by the designer. To undo encryption, all needed is the symmetric-key supplied by sender as a published encryption quantity that can be inverted on the cloud and results returned encrypted. Inversion is

Message("Invert", send_bits, my-semi-prime, my_family,  my-public,  my_root) => sym_key

The corresponding send (used some send-key) is

gratis_send( send_key, target-public, target-semi-prime, family_semi_prime ) => send_bits

which squares send_key modulo family_semi_prime and then exponentiates modulo target-semi-prime to remove any telltale squares. The result is published and can only be decoded by the target!

Proofs, general comment

All the proofs rarely use complex mathematical notation but are STILL as solid as any using the reuse principle which says that rather than start from nothing, it is always better to prove by showing that if a goal problem can be solved, then so can a known hard one. We know that square root extraction solved the factoring problem and hence is crypt-hard. We also assume without proof that all bits of the digest of a string are fully random independent of any other bits. Since digest is cryptographic, it is assumed that constructing a string with given digest is crypt-hard.

Ordered tuple

A cryptographic oorderes tuple COT places any 1+ number of objects, laid out by separators in a string form and then digested. The digest is crypt-quality witness of the tuple. Such a witness is assumed to be impossible to decode into another tuple, provided that the separators can never be sub strings of the elements. It hold for other properties of separators too, but this suffices.

Use of man-in-the-middle MITM

Positive use of MITM is basic. Let us start by making IBE from OAEP+ RSA or strong_RSA. One cannot use t\an exponent for more than one person. But let each have own semi-prime. The semi-prime of a name is published in a directory. But that entry can be hacked. So along with name and semi-prime, there is a three numbers called proof-1-3. Suppose the creator publishes three semi-prime. Proof-1 power digest(name)  mod creator-number-1 equal semi-prime. So is proof-2 for creator-number-2 and proof-3 for creator-number-3. Being semi-prime, they are not common in factors by overwhelming probability. The check for a proof is easy. Solving for proof not knowing factors implies the name and semi-prime are in use but unrelated. The solution for proof-3 is crypt-hard! At least one of three equations are crypt-hard for all but the creator.

We use MITM very simply to provide a proof for a user submitted semi_prime (with a license from enclosing jurisdiction!) Since we do not know the factors, it is safe for us. Since it is licensed, it must be acceptable to the jurisdiction. One way to license is to submit the factors solely to the jurisdiction with strong encryption on communication.

Given a name and a semi-prime, considering the jurisdiction as a family, we construct the closest square to the name chosen (i.e. J(perturbed) = 0). We calculate the triple of proof to prevent a possibly long search for nearest square. The nearest square, square root of the nearest square and three proof of the supplied semi-prime are returned.

To encrypt for sending, some key is chosen. Encrypted communication with the manager of system returns target-bits which are published/sent along with the encrypted message These bits and target-data causes the encryption key to be returned encrypted in target semi-prime. Best way to select the key is output of a squaring generator.

New and fascinating is the use of MITM for imposing a repeated deadline (no generality loss assumed every year or month>). Then the factors of semi-primes used in creator proof are published! Every proof fails and has to be rebuilt without effecting any one's secrets! No matter how done, an impostor can do precisely the steps and create encryption-identical copy in impostor's semi-prime! This means that legacy certificates are valid only as long as subscribed, or somehow ensure proven tools were used.

Friday, August 18, 2017

The Aaqgs-weltanschauung


Aaqgs (pronounced aux) is Aroon Aryan quantum gravity stoicism), last three words lettered reflect on determination that Einstein gravity and Bohr Quantum Mechanics are the only physics theories without exception, widely tested and stoicism that started in Greece 2300 years ago, is the only source of ethics needed and is scientific Agonostic, depends on no God.

While a weltanschauung or world-view; it is supposed to be like religion, answering questions, often by deductive logic, sometimes by extrapolation; never by faith considered the tool of thug out to criminalize you based on ancient scroll of reinterpreted sayings of ancient-wise now-stupid humans.

Religions (All subhuman, not alternate path to some God) and what the genesis of our world is

Path to robust long life with outside chance of indefinite life


Vigilant citizen of huge democracy






Thursday, August 17, 2017

aaquantum-war on religions


self link
Why are ALL religions bullshit? How do you PROVE that ALL of them are so? Only by empirical proof, go out and measure something, yourself or paid scientists unlikely to be anyone’s stooge!
Just get the gear and peer at sky (everywhere) to measures CMB! The cosmic microwave background (CMB) is electromagnetic radiation left over from an early stage of the universe in Big Bang cosmology. In older literature, the CMB is also variously known as cosmic microwave background radiation (CMBR) or "relic radiation".

1. The universe emitted a faint microwave glow CMB 380,000 years after big bang. Extensive decade long search through telescopes have built a vast distribution of stellar objects of last seven billion years. There is stark evolution relationship between CMB and the survey!