Microsoft to bury .Net Framework

Notice, I have this information from a credible inside source, and no I won’t tell you who. However, apparently Microsoft has plans to bury .Net Framework as of version 4.8. This means that version 4.8 will be the last update to .Net Framework to ever be released by Microsoft.

Apparently all focus is on .Net Core in the future. The reasons I assume is that .Net Core is platform agnostic, and Microsoft apparently no longer have an interest in creating lockins towards their own Windows systems. However, think about the ramifications of this for a while …

For instance, no more WCF, no more WPF, no more WinForms, no more WebForms, the list goes on …

Personally, I must admit I have mixed feelings to this. On the one hand, there’s a millions methods and classes I have grown accustomed to in .Net Framework, which simply does not have an equivalent in .Net Core. At the same time, I love the idea of cross platform development, and every time I have to mess with Mono to get my stuff working, it seems to create head aches for me. I also adore the modularity of .Net Core, which is in extreme contrast to the monolithic nightmare of .Net Framework …

However, .Net Framework will be killed by Microsoft, and the last major upgrade will be version 4.8. How they intend to do it, and if they intend to create security releases for a decade or so, fixing security holes the way they usually do when they snuff their own stuff, I don’t know. But one thing is certain, if you’ve got intellectual investments on .Net Framework today, you’d better start reading up on .Net Core – Otherwise I assume you’ll end up as the dinosaurs …


Voice based chat client that translates between ~50-100 languages

In the video below, I am demonstrating our latest product; A voice based chat client, that can translate between roughly 50-100 languages. Unfortunately it only works in Google Chrome at the moment, since this is the only browser that implements speech recognition. However, since this is a part of the web standards, it is likely that other browsers will support it too in the future.

You can try out an example installation here, but you’ll need to access the link with Google Chrome. If you purchase this snippet, you’ll get all the source code for it, and you can modify it as you wish. The code also serves as an example of how to use Hyperlambda in combination with ASP.NET, and hence is a nice starting ground for creating your own voice enabled applications.

The snippet will cost you €49, at which point you can modify it as you wish. It depends upon Phosphorus Five, and you’ll need to also have Micro and Hypereval installed to make it function. When you have placed your purchase, you can simply drag and drop it into your Hypereval installation, and the client will automatically install itself. Drop me an email at if you don’t understand how to get started. The snippet contains little bit less than 1,000 lines of code. Below is a video demonstrating it.

Click the PayPal button below to purchase and download it.

Use PayPal secure to secure your Professional Enterprise Subscription license

Earn money selling encrypted and secure email

We *really* want the world to start encrypting their data!!

When a user installs Phosphorus Five, and its “Peeples” module, he gets 5 user tickets for free. This allows a server installation to create up to 5 different users, which among other things, can be used to access Sephia Five. Sephia Five is a cryptographically secured webmail client. Se the video below for a demonstration of its features. Basically, one server installation of Phosphorus Five, Sephia Five, and Peeples, can create 5 user accounts, each having access to Sephia Five, without paying as much as a dime.

If however, a sys-admin wants to create additional users, besides the 5 that comes for free out of the box, he must purchase one “user ticket”, for each user he wants to create. This implies that a company with for instance 30 employees, must purchase 25 additional such “tickets”. The purchasing of such tickets is completely automated, and it will simply popup a PayPal window, and instantly gives the sys-admin access to his tickets, once the purchase has been approved. This creates a highly streamlines process for purchasing additional tickets, allowing for more than 5 people to check their email.

However, here comes the interesting parts; Pay particular notice to the “coupon code” in the screenshot below. If you type in for instance “” here, you will get a 10% price reduction on your tickets. This particular coupon code is quite frankly just an example though, and not intended for actually being used. The point here is, that we can create as many of these “coupon codes” as we want to, and associate these with partners, willing to sell our software. Typically a coupon code would be a person’s email address, or maybe his website address, or something that uniquely identifies a partner somehow.

If a root account types in the coupon code correctly, he is given a 25% discount for each purchase he does in the future. Which incentives the end consumer to type in the coupon code correctly. If he does, everything sold through this instance at a later point, will be attributed to one of our sales partners. Basically, for every dollar we make on that installation in the future, due to user tickets being sold – We will send the salesperson, who owns the coupon code, 25% commission, after PayPal’s commission has been deducted.

In our above use case for instance, normally a company with 30 employees, would have to pay €1125 to setup secure email for all of their employees. However, if the sys-admin, setting up this system, can punch a simple coupon code, he will pay €843 instead, and such save €282. While you’d be making €210 as he finalise his purchase.

You could make €1000 per week, by simply writing a few blogs per month, or Tweeting about the system, if you’re a “mover and shaker” from before

This creates an opportunity for you, to help us sell encrypted email, allowing for you to create a passive income, by simply helping us gain adoption, and refer others to use our software, punching a simple coupon code as they do.

A user looking for a cryptographically secure webmail system, who is willing to pay for setting such a thing up, would probably take great care making sure he’d get the coupon code correctly – Simply put, since he’d save 25% for all of his future user tickets. While you’d be making 25% of each purchase this user does in the future, as he purchases his user tickets. And of course, the user must purchase tickets, if he wants to create more than 5 users for his server. Below is a demonstration of Sephia Five, if you’d like to have a look at it.

Basically, if you can sell Sephia Five to one company every week, with 30 employees, and have their sys-admin punch the coupon code correctly, you’d be making 210 dollars every week. If you are interested in helping us sell such a thing, and create possibly a passive income – We’d be very interested in hearing from you.

Notice, however you choose to sell Phosphorus Five and Sephia Five, is entirely up to you to decide, as long as you obey by the law. Do you have an existing blog for instance, with hundreds of business executives reading it every day, blog about it. Do you have thousands of YouTube subscribers, interested in cryptography, create a YouTube video demonstrating Sephia Five. Are you a major shaker on Twitter, Tweet your coupon code, encouraging people to start encrypting their emails, etc, etc, etc. We don’t really care really, as long as you help us move the system into adoption, and of course don’t break any laws while doing so, or solicit people who don’t want to be solicited.

Notice, for the record, we currently have at the time of this writing, no more than 10 such open partner spots. If you’d like to acquire one, you’d probably benefit from moving fast. Also notice that unless you’re actually able to sell the system, and gain adoption, we might choose to invalidate your coupon code after a while of inactivity.

Although, it’s really none of our business, you’d probably have more success selling it, if you know what you’re talking about, and you have tried the system out for yourself. Below is a simply 3 liner to install the system on a vanilla Ubuntu Server, if you’d like to check it out.

chmod +x
sudo ./

Here is a more detailed blog, explaining everything you need to setup the system for yourself – Either on a VirtualBox or a vanilla Ubuntu Server.

Sounds interesting? Shoot us an email using the form below.

Is it safe to help the police?

I’ve been doing a lot of research and development into cryptography, and just for fun, I checked to see if I could find a public PGP key for the email addresses, that the Norwegian secret police is using to accept tips from the general public. Guess what, I found none!

This implies that it is actually impossible for the general public to securely help the Norwegian secret police (PST), by giving them tips, without potentially having a whole range of adversaries, being able to read these emails.

In today’s society, where terrorists and cyber criminals have infested literally every single aspect of our lives, this implies, that if a criminal adversary wants to, he could easily pick up the conversations the general public are having with the Norwegian secret police, and use this knowledge to his own advantage.

I do not mean to be rude or blunt to the Norwegian secret police (PST), but such a situation is of course unbearable, and not something a civilised society should be proud about. In fact, in theory, this implies that your neighbours could spoof your WiFi router hotspot, and verify whether or not you are talking to the secret police, and actually read the emails you are sending (and receiving) in plain text.

For the record, this is not unique for the Norwegian secret police, but actually something I have found to be almost consistently lacking, with all major secret police services I have studied. If you wish to verify my claims, you can type in your local secret police’s email address, at the following key server, and search for yourself.

Until this is fixed, I must unfortunately from a security perspective, encourage my readers to avoid helping their local secret police using email. However, you can still call them, or visit your local police station, and tell them in person about what you know. If the Norwegian PST wants to, of course, I hereby offer my help to them, such that they can accept emails that are encrypted with PGP. In fact, I have developed a system that allows for just that. Watch the video below for details about this system.

For the record, the Norwegian secret police, and any other police service, can (of course) contact me, cryptographically secured, with the following public PGP key.