P300
LOADING...
#How To Create An Online Account Using Digital Chip Card Locker
#See how signing up with DCCL works - step by step, in detail
A string consisting of 50 randomly selected digits is generated and included in the formulas for data encryption and decryption, respectively:
y[i] = Math.log(Math.pow(s[6], Math.log(Math.log(Math.pow(s[2], Math.log(Math.log(x[i]) / Math.log(base) + s[0]) / Math.log(s[1])) + s[4]) / Math.log(s[3])) / Math.log(s[5]))) / Math.log(s[7]);
x[i] = Math.round(Math.pow(base[n], Math.pow(s[1], Math.log(Math.pow(s[3], Math.pow(s[5], Math.log(Math.pow(s[7], y[i])) / Math.log(s[6]))) - s[4]) / Math.log(s[2])) - s[0]));
where X is the input signal,
Y is the output signal,
0 <= N < 9,
0 <= I < the length of the input signal,
BASE is a substring of the input signal consisting of digits from 0 to 3,
S[0] is a substring of the input signal consisting of digits from 3 to 8,
S[1] is a substring of the input signal consisting of digits from 8 to 15,
S[2] is a substring of the input signal consisting of digits from 15 to 22,
S[3] is a substring of the input signal consisting of digits from 22 to 27,
S[4] is a substring of the input signal consisting of digits from 27 to 32,
S[5] is a substring of the input signal consisting of digits from 32 to 37,
S[6] is a substring of the input signal consisting of digits from 37 to 43,
and finally, S[7] is a substring of the input signal consisting of digits from 43 to 50.
The input signal can be an array of letters and numbers, a file, or a message.
The sum of the substrings is the total number of chunks that the string consisting of randomly selected digits is divided into, which in this case is 9 (i.e. S[0]...S[7] + BASE).
Each new row of bytes that make up the input signal is encrypted with a new sequence consisting of 50 randomly selected digits, for a total of 500 digits arranged in 10 series.
When the sequence counter reaches the value 10, the process is repeated.
The output signal is an array of logarithmic values representing the encrypted bytes from the input signal.
The total length of the output signal is equal to the number of bytes of the input signal increased by a certain number of artificially generated "fake" logarithmic values, which further enhances the degree of protection of encrypted data.
For more details, please refer to https://soundsofsoftware.com/js/login.js.
#End-to-end encryption in the truest sense of the word: ChatLiner, at your service
![]() #ChatLiner is a messaging platform that provides authentic end-to-end encryption of transferred files and messages and prevents their modification, loss, damage or misuse.
There is no compromise, interception or collection of users' personal data or sensitive data from users' devices.
|