NOTE: if (2.) and (3.) are too complex for you, skip to section (4.) 1. Your own tools. Learn enough about internet security so that you can make your own tools. They might have bugs, but if only you use it, the location of bugs is sort of "a password nobody knows". If an (in+)security agency now tries to crack (crack does not equal hack!) your security system, they have to at least make a human effort instead of just clicking the "just crack this password"-button. _________ 2. And we, we are humans. Resistance is NOT futile. We will not be assimilated into a Bot-system network. Try to program an encryption program that changes the algorithm for every new password. The only quantum algorithm able to crack this would include (in)human-level AI from a CyBORG-Hitler with quite a few naive and still clever enough peoples as support-trolls to create the AI. But more likely (if you do not believe conspiracy theories) you force (in+)security agencies to implement a cracking algorithm for your code manually (and spend human time) to break through your computers security. _________ 3. Take it up to eleven – where nobody has gone before … … Disclaimer: an alien might be gone there and NSA peoples might be aliens (but that's about opinions) Enjoy symmetric algorithms and asymmetric in combination. Generate a unique asymmetric algorithm (or if you are less sophisticated, combine symmetric and asymmetric) and share them all like symmetric algorithms. These run in a secure sandbox which only allows "input + code → output" which offers some shortcuts for a speed boost. In a triangle, you need to know: – 2 side lengths and 1 angle – 2 angles and one side length – or 3 side lengths to get any side length and angle. With 3 angles, you can't get the absolute side length of any side. An asymmetric algorithm is similar: – the 3 sides are: plain text, encrypted text, signed text. – the 3 angles are: private key, public key, algorithm inclusive shared key. RSA, the most commonly used asymmetric is possibly weak for a base-n (base-"encrypted text") equation solution where all you have to do is to calculate a calculation like this: – log-private( encrypted to the power of private ) = base-n 10 E+? – base-n 10 E+? = base-n a * base-n b + base-n c | a, b, c are known Is it a true weakness or just something that comes out of a crazy mind? You do NOT have to know, just prepare for both cases (if it doesn't give you a headache). Even if it isn't true almost certainly, soon someone may build a quantum computer to factorize the shared key and re-generate the private key from it. ________ 4. Cakes for skipping above – exclusively in this thread Always use more than 1 solution as security shells for your core. If one might proof insecure, you still have a backup. Easy said, but it takes some effort to implement. Especially if your communication partners are too lazy to care about their valuable security. The only 3 good reasons for laziness are 1. being a child, 2. if you want to distract intruders from your treasury or 3. if you have a 2-sided contract to secretly support Big Brother.