You are viewing a single comment's thread.

view the rest of the comments →


[–] TerraKell 0 points 3 points (+3|-0) ago  (edited ago)

Don't get mad, get even. In 1968 I was taking a correspondence course in electronics. One of the lessons dealt with frequency inversion to encrypt voice communication. It was a rudimentary form of voice encryption that the police used on their radios. It used a 3.5kHz oscillator, solid state diodes, and 2 audio transformers if I remember correctly. I would never trust encryption on my phone or computer such as Skype to have no backdoors. Having said all this I have a plan to make evesdropping on telephone conversations very difficult to understand by the person(s) intercepting it.

Microprocessors are cheap. There would be 2 or more devices with the same key that the microprocessor would invert and vary the conversation amplitude and frequency according to the same random number set on both devices. These would be independent of the telephones and 'encrypt' the audio before it gets to the phone and after it leaves the phone. It would sound like the old modem and fax telephone signals because it could be acoustically coupled to and from the phone.

So disposable phones and these devices would ensure private conversations. And frustrate the NSA listeners as well as the computers looking for key words. Beep, beep, bop, and so on.

This same idea could encrypt text messages outside of the phones.


So here are schematics and descriptions for this scrambler.