Uhhh...
You did not really understand what I was trying to say...
In my previous posts (including the latest ones) I said multiple times how things work...I guess nobody read those posts...
So I will try my BEST to explain you this again.If some of you AGAIN don't read the post then it's your fault lol.
RED LETTERS = What is the UAC data device...
BROWN LETTERS = What is the UAC data device used for...
BLUE LETTERS = How is the data protected...
PURPLE LETTERS = How is the data organized...
GREY LETTERS = How the data looks when it is encrypted and how the data looks when it is decrypted...
The UAC data device is a unique portable place where all the UAC top secret classified data is being scanned,checked,verified,processed and stored to and it is the primary key element in using the UAC data in to the useable technological resources.
The UAC data device is used to contain all of the personnel sensitive data from many different people,companies,organizations and a lot more.What the actual data is I can't tell you.
Due to it's grand importance,all the UAC data on the UAC data device (every single file) are first converted to RTF text files whos information is then encrypted using multiple different existing encryptions which are then encrypted using custom multiple different encryptions (made in C#) which are also protected by multiple different hash codes which are physically separated on 10 different small flash memories and are valid only if they are all physically connected in the correct order and are only valid if the correct multiple hash codes entered in the UAC security software (made in C#) match the multiple hash codes in the UAC security software itself together with the multiple hash codes on the physically separated flash memories which are also encrypted using multiple different existing encryptions and which are then encrypted using custom multiple different encryptions (made in C#) and in order to even use the hash codes from those 10 physically separated flash memories they must be decrypted first.
And in order to perform any of this,you must type multiple different passwords.So in order to perform either ENCRYPTION or DECRYPTION process of all the data you must have multiple encrypted hash codes which are physically separated on 10 different flash memories and in order to use even them,they must ALSO be decrypted first.And of course those hash codes are completely USELESS if you don't have all physical 10 different flash memories or if all 10 of them are not connected in the right order.
And ONCE all this has been done,you will also be asked to type in multiple passwords which are then compared to multiple encrypted hash codes which are later DECRYPTED if the first password is correct and then later passwords you type are compared to already decrypted hash codes.And if ALL typed passwords ARE correct then the ENCRYPTION or DECRYPTION process will start.And of course it will take some time to finish since we are talking about thousands and thousands and thousands and thousands and thousands and thousands and thousands of files.
If the part of the UAC data is stolen by someone or if all the UAC data is stolen by someone,it is still virtually impossible for absolutely anyone to make the stolen UAC data even useable since in order to make it useable 10 physical flash memories are needed and must be connected together in the right order in order to create ONE PEACE OF INFORMATION CONTAINING ENCRYPTED HASH CODES which is used by the UAC security software (made also in C#) which makes all the UAC data useable if all typed passwords are correct.
So if the person who stole the UAC data does not have all those 10 physically different flash memories then it is virtually impossible for that person or/and absolutely anyone else to unlock the information.Not to mention that the person who stole the UAC data ALSO needs to have the UAC security software and know all the long passwords.
In short...if the person who stole the UAC data does NOT have all 10 physically different flash memories,UAC security software and all the needed passwords then it is VIRTUALLY IMPOSSIBLE FOR ABSOLUTELY ANYONE ON THIS PLANET TO MAKE ANY OF THE UAC DATA USEABLE.
All the data on the UAC data device is stored on 10 different hard disk drives.The data organization is actually pretty simple.All the UAC data is stored on the first 5 hard disk drives.Other 5 hard disk drives are just identical copies of the first 5 hard disk drives.The data is backed up using the UAC data backup software (made also in C#).
So if one of the hard disk drives die,no data will be lost.
When the UAC data (every single file of any type) is encrypted,they all turn into nothing more but a simple RTF text files.They can be opened in simple programs like WordPad,but all the user(s) will see in any of all those RTF text files is a lot of text which does not make absolutely any sense.
When the UAC data (every single RTF text file) is decrypted,they all turn back into their original state and the user(s) can use them normally just like they have never been encrypted in the first place.
Here is an example...let's say a video file called "The movie.avi" which is big...let's say 700 MB.
When the file is encrypted it looks like this:
UAC data number 1.rtf - approximately 690 MB to 710 MB
(The size of the encrypted file is never the same as it is when the file is decrypted.But the difference is just few MB.So in this case this 700 MB encrypted video file would approximately be 708 MB or 693 MB.But it really depends on the file's integrity itself)...
When the file is decrypted it looks like this:
The movie.avi - 700 MB
(The file is now back to it's original state and can be normally played in a video player such as Windows media player,VLC media player and so on)...
ABSOLUTELY SAME APPLIES FOR ALL OTHER FILES OF ANY TYPE!
Huh!
Well that would be it.I tryed my best to explain you this as best and as short as I could.
Cheers!