TEA for Apple iPhone Encryption and Covert Communications Note (update)

62 views
Skip to first unread message

James M. Atkinson

unread,
Jun 15, 2016, 8:52:35 PM6/15/16
to TSCM-L Professionals List
For those customers who are using the "TEA" family of iPhone
communications applications, it is vital that you use the one-time pads
that are provided to you, in the exact manner in which the instructions
provide, with zero deviations. The sheets are scored down the center so
that you can provide your keys to another use of the software, but these
keys function for one and only one call, so please understand that this
single use only code is for your protection, once you download the
software and it is functional, it will display the address to which you
can send your $86 for a booklet of 100 one-time sheets, each with dual
column 16 codes of 16 symbols. You can tear the whole sheet in half if
you expect to have 16 calls with the same person, or you can tear off
and give out one code for one call. The booklet is generated at an
undisclosed third party and sent by mail to addresses inside the United
States, from an address in the United States.

The one-time code is not in the storage of the device in any form, and
as you key it in, it initializes the cryptographic mechanism original
settings as is mentioned on the GitHub page on the product family, but
the value itself is never stored and can never be retrieved. Once all 16
symbols are input the algorithm will start on its own, and your phone
will get quite hot, and it will rapidly drain the battery, so do NOT
leave it running unless you are on a live secure call. The initiating
application will remain red and will flash until all 16 keys are
entered, and the screen will turn white and remain white until the call
is terminated by either party. Please do not discuss on the phone what
the picture look like, but rather refer to the image by the four digit
code below each image so you can be sure that you and the other user are
using the same series of codes. The number is merely for reference
between users, and it is in no way part of the cipher. Do not initiate a
secure Facetime call unless you are plugged into a power adapter as the
battery will be sucked dry in merely 10-15 minutes on Facetime.

Once you enter secure model the iPhone will start having trouble
maintaining the cell connection as the software stuff false GPS
coordinates into the phone part of the iPhone to confound an
eavesdropper, so do not try to run any GPS related applications as their
positions are tainted by this software. If you have the GPS offset
option checked the phone will remain centered on the selected locations
and the updated positions will be in relationship to where you set the
initial offset. Ideally, the phone is best used while mobile, in large
groups because while in secure mode it will seek out all other phones
and base stations and establish a fractional channel through each to
break up the attack surface of the phone. When in secure mode there is
an option to carry on a pre-recorded audio track on the phone channel
itself, while at the same time connecting via Bluetooth or WiFi for the
secure channels, and the phone will split the data stream over these
donor routes.

If the phone is dropped, exposed to moisture, or a none-loader
ThunderBolt/et seq. cable is connected other than the provided loader
cable, the software will terminate itself, and erase all trace of ever
having been in memory and will use the images in the phone to overwrite
memory contents. Please keep in mind that if you charge your phone off a
computer, the software will wipe itself as it will view the computer or
any other device as hostile as soon as it notices activity on this
serial port.

In the updated version (6.13.2016) you must still input your U.S.
Passport number in order to get the software to load beyond the initial
loading screen, as this authentication algorithm actually does actually
check the passport number if you entered so if you use one that is not
valid, or is not in date, it will wipe the application off the phone and
it will permanently disable the loader cable. The software is also
specifically oriented so that it will only load on a phone that is
physically within the borders of the United States and within 5 miles of
the address to which the loader cable was originally sent.

To obtain the loader cable or the one-time pads, you still have to send
a copy of your current U.S. Passport, and it must be to date as of the
date the loader cable is shipped out. The cable and one-time pads are
only shipped once a week, and to get the wire data for the funds you
must get the initial loader off of GitHub, and not from the Apps store.
If the cable does not work when you first plug it in, you can suspect
something on your iPhone as the first thing the loader does is inventory
running processes and terminate itself and disable all resources until
the interfering item on the phone is wiped and disabled. The loader
cables are one shot devices as your phone is presumed to already be dirty.

The loaded cable will only work on the same iPhone into which it was
initially plugged in, and if an MITM interception is attempted on your
loader cable, it will arrive and will not work on arrival as it is
matched to the very first iPhone it is plugged into. Inside the present
loader cable (what looks like a USB mini to TB connector) there is a
moisture sensor, so that if you drop it into a glass of water it will
wipe the loader cable completely. As the circuit to do this is slightly
under the rubber boot, you need only to place the loader into your mouth
to get a small mouth of saliva on the boot to neutralize the loader (the
boot is designed to facilitate rapid destruction by wicking water to the
destruction circuit). If your loader has a small red dot next to this
hole, then the loader is sensitive to X-Rays and will wipe the loader if
place on or even near an X-Ray machine.

The old version of the loader has been abandoned in favor on the new
inline design, so you will need nothing other than the loader and the
one-time sheets to get you to a fully functioning ciphering machine on
an iPhone.

The recently updated paper upon which the one-time images are printed is
a highly specialized paper that is roughly 4 times thinner than regular
paper. The ink is also water soluble to facilitate easier destruction.
The paper is 100% cotton, treated with a common food substance to
enhance ignition, and all of the ink used are food dyes, and safe for
human consumption. The one-time packets are designed to have the
individual sheets removed before you resplit the sheets from left to
right, and then tear off the number of rows you wish to distribute. If
this paper or the books themselves are exposed to water, saliva,
Whiskey, coffee, tea or anything containing water not only will the inks
be instantly blurred, but the paper itself will dissolve into the gooey
mess. If you screw up the one-time pad books, you will have to more
replacements as the originals can not be replaced. Also, if you are
traveling in a situation where you will be carrying a full pad or
sheets, or strips form a sheet, do not allow them to be exposed to
freezing temperatures as this actually will stabilize the ink. Do not
expose the one time pads or strips to sunlight for more than a few
seconds as it will cause the page to turn fully black, and any attempt
to photocopy the pages or strips will also turn then black as the pages
are coated with a dye that is activated in the presence of UV light, so
that one pop of a camera flash, and poof you now have black strips. The
facing side of each sheet is a random pattern and design and which hold
no value other than to provide a surplus is ink for destruction my
moisture. The underside of the sheets that face away from you where the
actually imaged is placed. It can not be strongly emphasized enough that
moisture is the enemy of these one-time pads. Also, the ink is designed
so that by applying a very light coat of vegetable oil to the skin the
symbols can be transferred to the skin of a human, and normal sweat will
not interfere with the ink, but water will. The symbols can then be
transferred back to paper a few hours later, but the skin needs to be
pretreated with an anti-perspiration first, and then have the oil
applied and the image transferred. As the images are printed with a dark
hue if the image is transferred to the skin, on top of a tattoo, the
symbols will essentially vanish into the tattoo. To collect the ink off
the skin in such cases, as clean and fresh strip of cigarette paper may
be use, but the transfer will be optimal is the very last sheet of the
one time pad is used as this has a special component on it to facilitate
pick up on the ink.

There is no customer services, and no customer support available of any
sort, if you are smart enough to find the software and launch the
initial loaders, you are smart enough to understand the value of what it
does and how it works, and you are also smart enough not to make stupid
trade-craft mistakes. Any funds that you send for one time books, or the
loader cable/dongle is merely a tip or gratuity to the author of the
software for cranking our cool software and nothing else. There is no
warranty, there is no contact, and there is no obligation by the author
to support the software, the loader, or the one-time pads.

While it is ill advised to ingest anything that is not food, the current
loader is composed of very small amount or stainless steel, plastic,
epoxy and silver, and there is no lead or other toxic metals present in
any part of the device. If you obtain the version what is impervious to
moisture yu can carry it in your mouth, or in your digestive tract with
little risk of toxic effects. But of course transporting the loader in
this manner may cause the traveler to be given extra screening and undue
attention. The all plastic loader is essentially invisible to metal
detectors, but is not invisible to X-Ray imagery. The updated version
that will start shipping this evening is be APFS complaint, and will not
in any way interfere with the updated operating software.

In the initial loader on GitHub there is a mention of a NLT version of
the one time pad for $425, and this is for a leather bound book with the
cipher keys printed in a transferable ink in the margins of the bible,
but you must use the transfer fluid provided to lift the image of the
designated pages to the transfer device, and the special ink in which
the images are printed (invisibility) will only become visible while on
the transfer sheet for a period of about 15 seconds, and then the image
will forever vanish. This "NLT" version of the one time pad is provided
in two identical books so that one can be sent out into the field with a
missionary, and the other book to sit in a safe to be used to store the
keys to initiate a secure call. In order to reference a chapter and
verse, the number of the page is used at the beginning of the call and
not the verse itself, and the invisible image will be just below the
maginila next to that counted down on the page. Once the ink is lifted
for the key, there is no chemical residue left on the sheet. Any risk of
the Bible being discovered with the invisible ink on the pages can be
neutralized by exposing the pages to a mild vapor of alcohol from a
cologne, cosmetic, or liquid containing more that 20% alcohol. You need
only to pour this liquid out on a table and as it evaporates to fan out
the book over the vapors and the keying images will be destroyed. These
books will only be provided in matched sets of $950 per two books, and
only in a face to face interaction after the missionary/seminary student
who will be using it has been properly training in its use, and then
been subjected to dry runs on training materials sponsored by their
seminaries. A cologne or cosmetics will be provided in two containers to
be used on each end, also with transfer sheets in a different pad.

This software, the instructions for its use, the initial loaders, and
the secondary loader, the cipher engine itself and other forms of free
expression are all protected forms of speech as protected by the First
Amendment to the Constitution of the United States as incorporated
against both the state and federal agencies by operation of the
Fourteenth Amendment.

You can find other details on my GitHub page, or on my LinkedIn profile
at https://www.linkedin.com/in/jamesmatkinson


Reply all
Reply to author
Forward
0 new messages