Copyright © 2024 by Mattanaw. All Rights Reserved.
Publisher: PlaynText Location: Tempe, Arizona
PlaynText is dedicated to the publication of high quality journal publications issued in premium book format, as book/journal hybrids. Each publication is intended to be an illustration, potentially, of the maximum and least-inhibited use of free thought and free expression.
Copying, distributing, plagiarising, processing, storing, and serving the contents of this book is a violation of intellectual property, unless otherwise indicated by the copyright holder elsewhere, as it relates to this specific issue of the Book and Journal of Mattanaw. For permission to use any contents of this book, please contact the author at http://mattanaw.org/com.html.
Published by PlaynText, Inc, companies wholly owned by the author, Mattanaw, Mattanaw, (formerly “Christopher Matthew Cavanaugh”).
Printed in Tempe, Arizona, in the United States of America.
Published and printed by PlaynText, an imprint of PlaynText, Inc.
The Publisher is not responsible for the content of others produced on websites, applications, social media platforms, or information related storage or AI systems. The processing of this Book and Journal by an AI System is prohibited.
Library of Congress Control Number (pending)
Library of Congress ISSNs: 2998-713X (Online), 2998-7121 (Print)
Artist/Author: The Honorable Dr.9 Mattanaw, Christopher Matthew Cavanaugh, Retired
Interdisciplinarian with Immeasurable Intelligence. Lifetime Member of the High Intelligence Community.6
Former Chief Architect, Adobe Systems
Current President/Advisor, Social Architects and Economists International.
CEO PlaynText | CEO PlainText
Contact:
Resumé
For communication, I’ve gradually decided to create tighter control on access, and nowadays rely on my Garmin Satellite communicator for text and email, and my iPhone 12 Max Pro, for occasional calls through VOIP, using Google Voice. This ensures that I’m not receiving too many unwanted messages, phone calls, and provides me offgrid ways of chatting with others who I need to remain in contact with. This includes lawyers, real-estage agents, and some few friends or colleagues I need to talk with to accomplish various goals personal or shared.
I don’t have a working cell phone with a cellular connection, and I don’t have direct access over any phone number. The result has a been a great reduction of unwanted relationships with companies or others who call who are unwanted.
Here I’m pogressing my communication strategy further to utilize my own communication tools primarily. For present I still periodically access and respond to emails, including those listed on this site, but responsiveness, reading, receipt, and so on is tightly restricted to what is relevant and wanted. I will also still use my Garmin SAT device and my cell phone over Wifi periodically, but primarily I will shift all my communication to this tool.
This communication tool is more secure than email or text message. Here I will describe the purpose of the tool, its history of development, method of encryption, and details related to why I or anyone else would want to use it. Interestingly, I expect that some who would learn that this is how I communicate may want to not use the tool further, and may prefer instead to use email or another method. Oddly, one does not understand the security of email or other messaging tool, but knowing less somehow earns more trust. Here I describe exactly what this tool is an most of how it works, and what security is provided, so after reading and understanding this information it will be understood and known that this is a more trustworthy tool than email, although its untilization is constrained to use with me only.
For readers, friends, colleagues and others who need a means of communicating with me, they will be directed to using this tool. The invitation to use the tool is one that should be considered an honor, because since my communication has been reduced as far as it has, and I don’t invite anyone to speak through this tool, using this as a means for communication is one that is special. I would liken it to having a intraorginational method of communication only between a few special participants, like if an organization gave cell phones, radios, or other comm devices only for use within a particular circle.
This tool was created by myself and utilizes industry standard encryption, although I have plans to utilize special cryptography I’ve created to enhance the security.
Although the primary purpose of this chapter is to provide the use of the tool, it will also be expanded upon to include details of my communication methodology and strategy, that is informed by my history of work as a software architect, and as a business owner with interests in protection intellectual property, and as someone involved in digital security of large websites of massive corporations.
Readers and users may recall a time in which a bank or other organization has opted to send secure messages to users via a system alternative to email. Sometimes an organization will send an initial email with a link and relevant information for getting to the message, but the user is then directed to another location owned by the company to receive the message, any attachments or documents, and respond to the message directly. This was expected to provide security measures that do not exist in email. Within email systems there are few protections against sending messages to other recipients, and less direct control over the methods of encryption, storage, and retention. It also provides them greater legal power over the authentication, transmission, and reading of materials. It can be confirmed what was read and what was not. It can be confirmed how the user interracted with the browser, if the technology was developed enough to check for that. Information leaks are hard to control so it would not be expected that users could not then take the same information off the site and send it elsewhere, but there they have not provided the means to send along that information. There would be many legal protections for using such a system that could be utilized in court if the user made claims that were false regarding it. If a user made a liability claim it would be very difficult to win under those conditions since the company has provided additional security.
Here I’m not really interested in this level of security, creating some kind of non-bidirectional legal controls with people I speak with. Instead my primary interst is getting away from using email as often or at all if possible. Email is a system that is not required to be used, but we have come to think that email is somehow a trustworthy enough system that we are willing to depend upon it. Furthermore, we are and have been willing to be forced to use email, in a similar way that we’ve been forced to use mail. At present from my legal background I’m aware that some methods of communication are indeed forced upon us by our governments at a minimal level, and this includes mail to an extent, “information by publication” which means if someone in the legal system can’t get a hold of you, they can simply publish a message someplace and pretend you received it, and signs of various kinds. They can visit your property and put a sign on it for example. But this can still be greatly limited using various techniques.
Since I’ve actually faced legal attacks from unwanted activists, and have been digitally harassed via social media, email, and the phone, I’m wanting to have a better strategy to control my communication. I’ve been successful reducing unwanted comm, using various approaches which anyone can use that would be effective in reducing unwanted spam from companies, unwanted mail, and unwanted relationships with organizations or untrustworthy people. It is true that all face this to an extent, but as one gets older and has new experiences, the true extent of the problem becomes more clear, and the issue begins to appear more complex. Handling of the issue is more complex the more one wants to disconnected, and this is faced by famous people, politicians, lawyers and others who were exposed to unwanted relationships and communiction in more ways than others. Likewise I have been so exposed, and now am interested in creating my own processes and methods of communication to reduce unwanted contact.
This communicator tool is an outgrowth of my earlier text encryption tool. That text encryption tool was made available to users of the site to encrypt their messages with password to send to others for decryption using the same tool. This uses industry standard AES-256 encryption that is impossible for a normal person to break, although it may be possible for large organizations or the military to break the encryption. That is unknown to me but may be possible. I utilized this briefly for business, and later simply used it as a text editor option of my own, for note taking, for play, and sometimes for encrypting my own messages. Usage has been minimal, but I retain the tool mostly because of my interest in computer science and cryptography.
Since the tool was useful for note taking, password protecting messages, and the like, it is useful also for being the starting point for a general application for communication that I intend to use for myself primarily. For users who are interested the message encryptor can be used to encrypt email messages, messages sent over social media, and messages sent by text. Anything that is text can be encrypted using the tool, as long as what is copied into the tool is not too large for the browser. The receiving party simply needs the URL to the tool and, the text, and the password. Some use messaging tools that offer encryption without realizing the simplicity of the solution. It does not require a new software tool for messaging to send encrypted messages. Instead one just needs the text, and can send it wherever and however text is sent, as long as there is not too much text for the tool. One could have a social media profile and contents that is all encrypted for example.
For those who are interesed, they can also simply take the entire page and publish it on their website or use it on their computer locally. It will still work. All the code is still visible in the browser. One can use this to confirm that no messages are ever sent from this tool to my server. It is a safe tool to use and no information is ever stored, sent to me, or sent to anyone else. It simply changes the text in the browser and is safe to use. Since this message encryptor tool is a simple one and this is easy to verify by any developer, it is clear and obvious that there are no special uses other than encryption and that the user can trust it. More details can be found on the message encryptor page.
The communication tool on this page however will send information to me, and will be stored, as encrypted text. It would not be possible to receive any message without allowing it to be sent to me! It is more secure than email, and after submission and reading, the other reading user does have access. I may be willing to open source this tool in the future so others can use the same system, but for now it is in development, is not entirely complete regarding what might be worthwhile to others, and is proprietary initially to ensure I can secure and meet my own communications objectives.
To initiate a communication with Mattanaw, the author, one can use the tool below.
Instructions:
This can be used to have a long ongoing conversation, and it is easy to retain the link and check it for new messages, without receiving any notifications. In this way it is like standard email. Whenever you want to chat, you can find me at the link. If you lose the link, a new one can easily be created with a new message.
I am a retired executive, software architect, and consultant, with professional/academic experience in the fields of Moral Philosophy and Ethics, Computer Science, Psychology, Philosophy, and more recently, Economics. I am a Pandisciplinarian, and Lifetime Member of the High Intelligence Community.
Articles on this site are eclectic, and draw from content prepared between 1980 and 2024. Topics touch on all of life's categories, and blend them with logical rationality and my own particular system of ethics. The common theme connecting all articles is moral philosophy, even if that is not immediately apparent. Any of my articles that touch on "the good and virtuous life" will be published here. These articles interrelate with my incipient theory of ethics, two decades in preparation. This Book and Journal is the gradual unfolding of that ethic, and my living autobiography, in a collection of individual books that fit into groups of book collections.
This Book and Journal is already one of the largest private websites and writings ever prepared, at nearly 1 million words, greater than 50,000 images and videos, and nearly one terabyte of space utilized. The entire software architecture is of my creation. Issues of the book for sale can be found under featured. These texts are handmade by myself, and are of excellent quality, and constitute the normal issues of my journal that can also be subscribed to. The entire work is a transparent work in progress. Not all is complete, and it will remain in an incomplete state until death.
I welcome and appreciate constructive feedback and conversation with readers. You can reach me at mattanaw@mattanaw.com (site related), cmcavanaugh@g.harvard.edu (academic related), or christopher.matthew.cavanaugh@member.mensa.org (intelligence related), or via the other social media channels listed at the bottom of the site.