For those customers who are using the "TEA" family of iPhone 
communications applications, it is vital that you use the one-time pads 
that are provided to you, in the exact manner in which the instructions 
provide, with zero deviations. The sheets are scored down the center so 
that you can provide your keys to another use of the software, but these 
keys function for one and only one call, so please understand that this 
single use only code is for your protection, once you download the 
software and it is functional, it will display the address to which you 
can send your $86 for a booklet of 100 one-time sheets, each with dual 
column 16 codes of 16 symbols. You can tear the whole sheet in half if 
you expect to have 16 calls with the same person, or you can tear off 
and give out one code for one call. The booklet is generated at an 
undisclosed third party and sent by mail to addresses inside the United 
States, from an address in the United States.
The one-time code is not in the storage of the device in any form, and 
as you key it in, it initializes the cryptographic mechanism original 
settings as is mentioned on the GitHub page on the product family, but 
the value itself is never stored and can never be retrieved. Once all 16 
symbols are input the algorithm will start on its own, and your phone 
will get quite hot, and it will rapidly drain the battery, so do NOT 
leave it running unless you are on a live secure call. The initiating 
application will remain red and will flash until all 16 keys are 
entered, and the screen will turn white and remain white until the call 
is terminated by either party. Please do not discuss on the phone what 
the picture look like, but rather refer to the image by the four digit 
code below each image so you can be sure that you and the other user are 
using the same series of codes. The number is merely for reference 
between users, and it is in no way part of the cipher. Do not initiate a 
secure Facetime call unless you are plugged into a power adapter as the 
battery will be sucked dry in merely 10-15 minutes on Facetime.
Once you enter secure model the iPhone will start having trouble 
maintaining the cell connection as the software stuff false GPS 
coordinates into the phone part of the iPhone to confound an 
eavesdropper, so do not try to run any GPS related applications as their 
positions are tainted by this software. If you have the GPS offset 
option checked the phone will remain centered on the selected locations 
and the updated positions will be in relationship to where you set the 
initial offset. Ideally, the phone is best used while mobile, in large 
groups because while in secure mode it will seek out all other phones 
and base stations and establish a fractional channel through each to 
break up the attack surface of the phone. When in secure mode there is 
an option to carry on a pre-recorded audio track on the phone channel 
itself, while at the same time connecting via Bluetooth or WiFi for the 
secure channels, and the phone will split the data stream over these 
donor routes.
If the phone is dropped, exposed to moisture, or a none-loader 
ThunderBolt/et seq. cable is connected other than the provided loader 
cable, the software will terminate itself, and erase all trace of ever 
having been in memory and will use the images in the phone to overwrite 
memory contents. Please keep in mind that if you charge your phone off a 
computer, the software will wipe itself as it will view the computer or 
any other device as hostile as soon as it notices activity on this 
serial port.
In the updated version (6.13.2016) you must still input your U.S. 
Passport number in order to get the software to load beyond the initial 
loading screen, as this authentication algorithm actually does actually 
check the passport number if you entered so if you use one that is not 
valid, or is not in date, it will wipe the application off the phone and 
it will permanently disable the loader cable. The software is also 
specifically oriented so that it will only load on a phone that is 
physically within the borders of the United States and within 5 miles of 
the address to which the loader cable was originally sent.
To obtain the loader cable or the one-time pads, you still have to send 
a copy of your current U.S. Passport, and it must be to date as of the 
date the loader cable is shipped out. The cable and one-time pads are 
only shipped once a week, and to get the wire data for the funds you 
must get the initial loader off of GitHub, and not from the Apps store. 
If the cable does not work when you first plug it in, you can suspect 
something on your iPhone as the first thing the loader does is inventory 
running processes and terminate itself and disable all resources until 
the interfering item on the phone is wiped and disabled. The loader 
cables are one shot devices as your phone is presumed to already be dirty.
The loaded cable will only work on the same iPhone into which it was 
initially plugged in, and if an MITM interception is attempted on your 
loader cable, it will arrive and will not work on arrival as it is 
matched to the very first iPhone it is plugged into. Inside the present 
loader cable (what looks like a USB mini to TB connector) there is a 
moisture sensor, so that if you drop it into a glass of water it will 
wipe the loader cable completely. As the circuit to do this is slightly 
under the rubber boot, you need only to place the loader into your mouth 
to get a small mouth of saliva on the boot to neutralize the loader (the 
boot is designed to facilitate rapid destruction by wicking water to the 
destruction circuit). If your loader has a small red dot next to this 
hole, then the loader is sensitive to X-Rays and will wipe the loader if 
place on or even near an X-Ray machine.
The old version of the loader has been abandoned in favor on the new 
inline design, so you will need nothing other than the loader and the 
one-time sheets to get you to a fully functioning ciphering machine on 
an iPhone.
The recently updated paper upon which the one-time images are printed is 
a highly specialized paper that is roughly 4 times thinner than regular 
paper. The ink is also water soluble to facilitate easier destruction. 
The paper is 100% cotton, treated with a common food substance to 
enhance ignition, and all of the ink used are food dyes, and safe for 
human consumption. The one-time packets are designed to have the 
individual sheets removed before you resplit the sheets from left to 
right, and then tear off the number of rows you wish to distribute. If 
this paper or the books themselves are exposed to water, saliva, 
Whiskey, coffee, tea or anything containing water not only will the inks 
be instantly blurred, but the paper itself will dissolve into the gooey 
mess.  If you screw up the one-time pad books, you will have to more 
replacements as the originals can not be replaced. Also, if you are 
traveling in a situation where you will be carrying a full pad or 
sheets, or strips form a sheet, do not allow them to be exposed to 
freezing temperatures as this actually will stabilize the ink. Do not 
expose the one time pads or strips to sunlight for more than a few 
seconds as it will cause the page to turn fully black, and any attempt 
to photocopy the pages or strips will also turn then black as the pages 
are coated with a dye that is activated in the presence of UV light, so 
that one pop of a camera flash, and poof you now have black strips. The 
facing side of each sheet is a random pattern and design and which hold 
no value other than to provide a surplus is ink for destruction my 
moisture. The underside of the sheets that face away from you where the 
actually imaged is placed. It can not be strongly emphasized enough that 
moisture is the enemy of these one-time pads. Also, the ink is designed 
so that by applying a very light coat of vegetable oil to the skin the 
symbols can be transferred to the skin of a human, and normal sweat will 
not interfere with the ink, but water will. The symbols can then be 
transferred back to paper a few hours later, but the skin needs to be 
pretreated with an anti-perspiration first, and then have the oil 
applied and the image transferred. As the images are printed with a dark 
hue  if the image is transferred to the skin, on top of a tattoo, the 
symbols will essentially vanish into the tattoo. To collect the ink off 
the skin in such cases, as clean and fresh strip of cigarette paper may 
be use, but the transfer will be optimal is the very last sheet of the 
one time pad is used as this has a special component on it to facilitate 
pick up on the ink.
There is no customer services, and no customer support available of any 
sort, if you are smart enough to find the software and launch the 
initial loaders, you are smart enough to understand the value of what it 
does and how it works, and you are also smart enough not to make stupid 
trade-craft mistakes. Any funds that you send for one time books, or the 
loader cable/dongle is merely a tip or gratuity to the author of the 
software for cranking our cool software and nothing else. There is no 
warranty, there is no contact, and there is no obligation by the author 
to support the software, the loader, or the one-time pads.
While it is ill advised to ingest anything that is not food, the current 
loader is composed of very small amount or stainless steel, plastic, 
epoxy and silver, and there is no lead or other toxic metals present in 
any part of the device. If you obtain the version what is impervious to 
moisture yu can carry it in your mouth, or in your digestive tract with 
little risk of toxic effects. But of course transporting the loader in 
this manner may cause the traveler to be given extra screening and undue 
attention. The all plastic loader is essentially invisible to metal 
detectors, but is not invisible to X-Ray imagery. The updated version 
that will start shipping this evening is be APFS complaint, and will not 
in any way interfere with the updated operating software.
In the initial loader on GitHub there is a mention of a NLT version of 
the one time pad for $425, and this is for a leather bound book with the 
cipher keys printed in a transferable ink in the margins of the bible, 
but you must use the transfer fluid provided to lift the image of the 
designated pages to the transfer device, and the special ink in which 
the images are printed (invisibility) will only become visible while on 
the transfer sheet for a period of about 15 seconds, and then the image 
will forever vanish. This "NLT" version of the one time pad is provided 
in two identical books so that one can be sent out into the field with a 
missionary, and the other book to sit in a safe to be used to store the 
keys to initiate a secure call. In order to reference a chapter and 
verse, the number of the page is used at the beginning of the call and 
not the verse itself, and the invisible image will be just below the 
maginila next to that counted down on the page. Once the ink is lifted 
for the key, there is no chemical residue left on the sheet. Any risk of 
the Bible being discovered with the invisible ink on the pages can be 
neutralized by exposing the pages to a mild vapor of alcohol from a 
cologne, cosmetic, or liquid containing more that 20% alcohol. You need 
only to pour this liquid out on a table and as it evaporates to fan out 
the book over the vapors and the keying images will be destroyed. These 
books will only be provided in matched sets of $950 per two books, and 
only in a face to face interaction after the missionary/seminary student 
who will be using it has been properly training in its use, and then 
been subjected to dry runs on training materials sponsored by their 
seminaries. A cologne or cosmetics will be provided in two containers to 
be used on each end, also with transfer sheets in a different pad.
This software, the instructions for its use, the initial loaders, and 
the secondary loader, the cipher engine itself and other forms of free 
expression are all protected forms of speech as protected by the First 
Amendment to the Constitution of the United States as incorporated 
against both the state and federal agencies by operation of the 
Fourteenth Amendment.
You can find other details on my GitHub page, or on my LinkedIn profile 
at 
https://www.linkedin.com/in/jamesmatkinson