Limited Time Offers
| Main Page | Home | Practical Use | 3 Keys
| Legal References
IP Seven Alpha Identity Registration
Three Keys (Symbolism)
The three keys represented in Seven Alpha are 'Death', 'Hell', and 'The Grave'.
Physically there are three component keys to access security, which may be kept together or
separately by members.
Each key represents an access token to the database and strong-identity tracking
service system available to a Seven Alpha member. Feature availability is subject to the
use of API (Application Programming Interfaces) on the respective "segment" of the network
according to its administrator and their wishes. The API provides the user with the ability
to enter into the protectorate and participate according to a set of rules and policies
which facilitate trusted name and identity generation without disclosure of the 'true owner'
of the registered Seven Alpha account. Thus, a Protectorate may allow users to have a screen
name, to change screen names at a frequency, and to have that screen-name associated permanently
with the protectorate as a local name (valid only in that region) or global registration
(valid in all regions) preventing impersonation of a well known user across multiple zones.
In this way users can have academic discussions without reliance on their identity or credibility
to influence debate, while retaining the right to user names across the enterprise, and hosts
can select what degree of privacy is permitted (if any) to manage bans and administrative controls
while users enjoy anonymity and multiple account profiles (personas) that are not bound to IP
address identifiers or other tracking data visible to network partners.
"Seven Alpha" Asset API Framework - A Trust Management Tool
Assets are stored on the Seven Alpha network, separate from vendors, to ensure credit and license
rights for later use in change of service and end-of-life support for virtual goods. This
'Virtual Data Vault' keeps the account information in a format usable by other vendors and private
while browsing, as well as accessible as an asset and thus transferrable to controlling legal
parties throught the Access Right panel - preserving the 'digital Life' of the user after
the passing of registered owner.
Virtual Identity credentials are likewise 'digital assets' preserved in the data store, along with
associated membership and voting rights, information feeds, access, and social data keys; and may
be reviewed for proof of use and first-use by the Archive Right panel, even after the physical
passing of the registered owner.
In this way, through asset protection and virtual (intangible) property and persona management, the
Legacy (means of influence, record of influence, record of contributions) remain intact in the
Seven Alpha account database while maintaining strong controls and integrity checks for users during
and after their physical lifetime. Because this data can be segmented, scaled into new branch databases,
and preserved in triple-cipher encrypted block storage for archival and long-term reference, the Legacy
of members does not degrade over time or memory and remains subject to strict privacy controls.
This ensures that the dignity (integrity of identity and standing derived in any persona)
of the user regardless of multiple personas registered and used over
the course of a lifetime across multiple network clients who retain no records correlating this data,
may be maintained and protected despite the loss of life or other injury to the natural born person
who is agent of this estate system.
Conventional estate law and instruments, like the Social Security System of the United States, are not
designed to protect the privacy of the individual and do not use strong four-factor encryption technology
to protect this data or segment access to specific groups and limited grants.
Seven Alpha provides this 'discrete atomic locking' system of identification and asset registration
services, as well as a means to access without assuming legal agency thereof a vital 'view'
of data to resolve pertinent legal questions similar to a record of a registered court at law or
county seat and county record services. Automation in this area, to serve discrete 'protectorate'
parties requests based on strict third-party-observed access contracts afford maximum security and utility
to the public while protecting the privacy of individuals in a free society, including anonymity and
screen names with strong accountability for abusive actions to include effective limited and network
Respectively, Seven Alpha prevents Death in the sense it retains your Virtual Data after you
physically die, so others may enjoy it; Seven Alpha preserves the Dignity of a formal record
to assure usage of your online activity can be relied on in a strong three-party registration system
affording anonymity necessary for academic work and review; and Seven Alpha ensures that after you are
no longer able to protect your own works it will not rely on others or community support to ensure
your Legacy (record of contributions, memberships, participation, and title) remain intact.
The alternative outcomes: Death representing the loss of virtual property when the estate at
law normally is dissolved by other forms of registration or liquidated wrongfully; Hell as
the erosion of relevance after an influencer or innovator passes and/or ceases to exert a role in
community activity; and The Grave representing the end of suffrage and participation right
with the passing of the agent and conditional their life and ongoing contribution, to any roles or
equity including voice in community which their legal heir may wish to exercise or preserve at law.
As such, and conditional to the terms set forth in Seven Alpha governing the optional contracts and
defined agreements among API providers, the creation of the estae in trust is made a legal fact
pursuant to the laws of the State of Oklahoma and our participants, and bears standing as a central
user account in registry of the Seven Alpha Network and its sponosred agent in limited INTERSTATE
COMMERCE by United States corporation in formal and state made lawful
agency, presently RACCOON TECHNOLOGIES INCORPORATED of Ada (Oklahoma), the designated trustee of such estate at law.
Historical and Legal Context of the Metaphors
Historically, Death represents the end of all power to act in the world of living persons and over property
there. So arresting 'Death' means arresting the disruption of that authority.
Hell, in context to the old language, is more accurately translated as the abolition of existence
than the metaphor of the garbage dump well know in Biblical times, and wrongly interpreted as fire
and torture in evangelical era, to represent the utter destruction of any record or evidence that a
person actually lived or existed - similar to erasing them from history and seizing credit for their
works and acts, innovation, and deeds by larger collective groups they were assimilated by or outcast
into. If the works of a person are their 'soul', then the destruction of their soul (works) would
be the erasure of their deeds and all memory and name from history. In this context, the Legacy of
the person would be obliterated, and so the concept of 'Hell' above and preservation of the same to
the credit of individual and not to works of groups or outcome of society as some imaginary function
of process or collective will, is preserved by this system as its core objective goal.
The Grave is the physical representation of the body being decomissioned and removed out-of-sight
and beneath the earth (grave) so it shall no longer have standing or be used as a legal thing in
matters at state by anyone. To literally 'walk out of the grave' is to walk in legal standing
from a place having none to the square which bestows the rights of individual personhood and powers
associated with the being of a living person. This power, too, afforded by the estate planning of
the contracts and conditions codified for use by vendors and the estate at-law represented by the
Key system which survives the physical death of its original agent in perpetuity - including all the
rights bestowed upon it and the option to continue to exercise those rights with consent of the other
parties in contract a legal thing at law among Seven Alpha partners and the designated survivor/heir
of the estate, without right to sale or other use in Commerce or transfer for lesser circumstance.
This concept, the same element in contract as a security for financial instruments, disbarring any
money or commodity and limited solely to persona, suffrage, access rights, social media authority,
and other privileges at-law, also conditional terms and service and use.
The cryptographic identity, registration, and access framework of Seven Alpha therefore
seeks to arrest other automatic procedures at law which are afforded the right under Trust
and estate rules a civil contract at law, and establish in trustee a stewardship over the
affairs and protection of such data as afford certain advantage for partners and members
and other API consumers, including strong user control and privacy rights.
This is, in a small way, a metaphorical stab at "defeating death, hell, and the grave" as relayed
in the story of Jesus of Nazareth with respect to his time during Passover and popular stories in
the evangelical tradition of Southeastern Oklahoma, and its relationship to the domain:
...and the related core registry of users (The Book of Life) governing the service Seven Alpha. The
theme is recurring, such as reference to the "Seven Seals" of Revalations as the "Seven Gates" of the
VPN network routing mesh, ephermal IP end-point-netwrok, and citation of the "Ninth Gate" (a citation
to 'The Nine Doors to the Kingdom of Shadows' in the Roman Polanski movie on the screenplay by Enrique Urbizu
in 1999.) The original book (a work of fiction, published in 1993) as "The Club Dumas"
The illustrations of which, including moving gates and doors, inspired the concepts in
advanced networking and cloud servers employed for Seven Alpha security. The concept
that you could walk through a door and be free of mortal contraints fascinated the
writer to consider the legal ramifications and requirements in context to business law,
information services, network security, and privacy rights.
As Crypto evolved into multi-key multi-factor solutions and instanced cloud technology infrastructure,
the metaphor of the 'seven gates' and ninth gate (administration) access control evolved to abstract
the concepts that would bore more non-programmers to tears (PKI, key stores, digital signing, etc).
At risk of upsetting traditional Christian audiences, the metaphor dramatically cuts a path down
analytical conversations of security versus non-germaine hate speech from users who traditionally
win by 'shouting down' their opponents and overplaying their skills to intimidate other vendors
and customers against criticism and report of illegal activity in backbone optical transport and
high volume data network services, where state sponsorship to promote censorship and wiretapping
directly threaten users rights to the extent a network like Seven Alpha is now necessary.
As with shippping, the amount of goods a vendor can move is not nearly as important as the
security and privacy of their movement. Efforts to disrupt that movement by large monopolies in optical
transport against many smaller vendors using forged Denial of Service (DoS) and violent fraud tactics
by Texas and Michigan companies prompted the Seven Alpha concept into formal development.
Contrary regular VPN services, Seven Alpha provides valid user information to combat abuse
by customers of other customers and services, limiting service to maximize business throughput
while monitoring and arresting beligerant traffic and removing bad actors proactively.
Effort to discredit or mar the service based on superstition or lack of access arise mostly from
volume wholesale public Internet Exchanges (IX) whose practices of scraping data and selling access
are threatened by strong cryptographic data services and next-generation privatized Internet
with national ownership limitations. The Seven Alpha technology would disbar large foreign state
investors in the United States and other countries vulnerable to wholesale wiretapping and espionage at the carrier and exchange
level, and reveal true ownership via shell companies a number of foreign owners who represent a clear threat to
national security of nations in which they are seeking expansion.
Like the work of Julian Assange and Phil Zimmerman, the impact on United States network services and
policies if Seven Alpha products gain traction is substantian. Encryption has never been a strong
platform for national security interest in transparency of civilian communication, contrary the
best practices and abuses evident in 2001-2019 assault on the Oklahoma firm developing Seven Alpha.
Encryption is in the interest of National Security, so much so that military networks will not even
share truck access with the services used by civilian businesses, citing national security concerns.
Some States, like STATE OF TEXAS, also object - as they rely on forfeiture laws to compel citizens
to comply with fraud before the Federal Treasury for monies in excess of $70 billion USD per year,
and such laws have been (recently) ruled unconstitutional and illegal for over 200 years per the
SCOTUS ruling in 586 U.S. case 17-1091 and 588 U.S. case 17-647 right to relief contrary sovereign
immunity claims of STATE OF TEXAS in these matters, tainting the United States Patent and Trademark
Registry by such unlawful and illegal actions since 2001 August in support of their optical telecom
and related securities markets jointly with STATE OF MICHIGAN, STATE OF CALIFORNIA, and STATE OF
NEW YORK - executing large capital finance rounds similar to ENRON and MCI WORLDCOM again through
NATION OF JAPAN and PEOPLE'S REPUBLIC OF CHINA state-fund investment.
Private networks like Seven Alpha are therefore vital, just as an impartial judge might have been
in the case of Pontius Pilot at the Trial of Jesus, and resulting crucifixion to 'please the Jews'
rather than comply with the Rule of Law; a Hegelian Dialectic decision if ever there was one.
In terms of Internet security and privacy, control over contact, and harassment - a civil death
can have all the same impact in our society and workplace rights as a physical death, rendering
a person 'legally dead' while their body remains alive to suffer the 'invisible' (inferior)
treatment and exploitation of human trafficking, debt-bondage, and other forms of abuse barred
by 22 USC Chapter 75 and 21 O.S. 21-748.1, generaly themed "genocide" by removal of children,
loss of economic right to work, emotional and psychological abuse, deprivation of care and basic
services, and other forms of injury themed "serious injury" in 18 USC 1589 Federal Law, a felony
even when performed by State agents and court officers as a procedure at law, per Supreme Law
in "The Convention on the Prevention and Punishment of the Crime of Genocide"; as exposed in
case 01-17702-R and "FR-18-04", a civil suit themed "automatic mistrial" and refused 45 CFR 303.6
rule and protection at law to embezzle (18 USC 666) from the Treasury of the United States from
2001-2019. These concepts, in civil death, also strongly contributed to the design and language
of Seven Alpha, to compare the right of return and remedy guaranteed under Oklahoma Constitution
Article II section II-6 with the raising of Lazarus in the Biblical fable, and threat that such
revalation posed to the Sanhedrin, as well as to the fable of of Hiram Abiff
as killed and concealed under a sprig of Acacia. Like the allegory, Seven Alpha relies on
metaphors to guard secrets of design (also protected at law by the Oklahoma Trade Secrets Act).
§21-1732. Larceny of trade secrets – Applicability of section.
A. Any person who, with intent to deprive or withhold from the owner thereof the control of a trade secret, or with an intent to appropriate a trade secret to his or her own use or to the use of another:
(a) steals or embezzles an article representing a trade secret, or,
(b) without authority makes or causes to be made a copy of an article representing a trade secret, shall be guilty of larceny under Section 1704 of this title. For purposes of determining whether such larceny is grand larceny or petit larceny under this section, the value of the trade secret and not the value of the article shall be controlling.
C. In a prosecution for a violation of this act, it shall be no defense that the person so charged returned or intended to return the article so stolen, embezzled or copied.
D. The provisions of this section shall not apply if the person acted in accordance with a written agreement with the person’s employer that specified the manner in which disputes involving clients are to be resolved upon termination of the employer-employee relationship.
(a) The word "article" means any object, material, device, customer list, business records, or substance or copy thereof, including any writing, record, recording, drawing, sample, specimen, prototype, model, photograph, microorganism, blueprint, information stored in any computer-related format, or map.
(b) The word "representing" means describing, depleting, containing, constituting, reflecting or recording.
(c) The term "trade secret" means information, including a formula, pattern, compilation, program, device, method, technique, customer list, business records or process, that:
(d) The word "copy" means any facsimile, replica, photograph or other reproduction of an article, including copying, transferring and e-mailing of computer data, and any note, drawing or sketch made of or from an article.
1. derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and
2. is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.
Added by Laws 1968, c. 110, §§ 1 to 3, emerg. eff. April 1, 1968. Amended by Laws 1986, c. 85, § 12, eff. Nov. 1, 1986; Laws 2009, c. 287, § 1, eff. Nov. 1, 2009.
What this means is, asking for technical plans or details beyond the metaphor as a condition of
right to operate a business or make claims or offers shall be construed as felony criminal activity
and treated as such. Do not fail to regard the law in this matter. Elements of the Seven Alpha
product are protected by Trade Secret and subject to the prior statutory rule verbatim.
For more infomration, see: Blackmail, extortion, and felony rules in Oklahoma.
Seven Alpha requires three (3) digital keys and one (1) password to access the data store and related
data associated. This key system protects users from access without authorization, monitors internal access,
and automates information without making credentials a mandatory part of the account system, further allowing
granular control over access for users concerned about any tracking of their activity not required for site-to-site
ban and age verification tools. By rating user authentication using tokens, questions like age validity and
right to contact into binary (True or False) query-response API tools.
In context wtih COPPA and other regulations deemd good legal stewardship, Seven Alpha presents a framework
API which help vendors be compliance with the minimum amount of customization on their part. By associating
the INTERSTATE COMMERCE obligations with strong identity and management tools, Seven Alpha effectively privatizes
the traditional role of government in the same manner that lawful agency and trust law in estate afford protection
to corporations for individual and private business, entertainment, and social aspects not governed at law by
the same protections afforded economic activity.
As a Christian, the developer used the citation of Jesus power to overcome 'Death', 'Hell', and 'The Grave'
to represent the ability to defeat the pluralism of property, reputation, and rights associated with the
physical living body - preserving those rights with consent and prior agreement of the service provider
(rights grantor) and customer (rights receiver), including the right to create transferrable account
privleges and benefits as a class of rights. Imagine, if you will, passing down your user account for a
game over 50 years to your son, his daughter, and her child... as a founder of that product or service.
Seven Alpha preserves the 'works' of a person, in this manner, and creates a portable and industry standard
model compatible with transfer of ownership and license rights for major properties which may fall under
development of multiple companies over a twenty or thirty year property lifecycle. This type of grant
installs unique property rights and collective bargaining opportunities with major vendors to support a
large community base and development of that community.
This process only makes sense when the Seven Alpha network exposes that accounts are not destroyed or
new accounts created on lapse of subscription, and the data is preserved whenever a member stops paying
for service as a permanent account in trust for as long as the Seven Alpha Network shall exist. This
means your data - the works performed via this intrumentality at least - will be preserved
For persons who have been through genocide, hate crimes, and other forms of stalking targeting the
reputation and character of their mind and mental health, as cited by Justice Thomas in the characiture
abuse by Liberal Progressive violence in his term as Supreme Court Justice, the ability to keep a 'diary'
during such abuse and records closed to the public which family members and historians may benefit from
later is of tremendous value. With online violence escalating to directed attacks and abuse of network
services at the national level as Russian Federation members witnessed in the Ukraine cyberattacks, the
ability to insulate your online life and protect your channels of contact among trusted persons and
communities protecting the contents of those publications from surveillance on a global scale with VPN
and other tools available to abusers - Seven Alpha begins to define its niche in privacy application middleware.
The only inaccuracy in the prior diagram is that all keys AND a fourth factor are required to access any
of the components of the system. While the keys are named after the three aspects they address, metaphorically,
they do not have any ability to open a locking mechanism without the other three components. Seven Alpha is
therefore more secure than the International Payment Card Services (PCS) standard, and requires 2048 bit or
higher security, to the third power, making for 755 billion possible combinations or more per user account.
Counting the user name (factor five), IP address locking (factor six), and device strong identity key (factor seven),
that makes brute force attacks statistically impossible without triggering account lockdown and verification activity.
Details pertaining this method (security) are not featured or representative above, and do not describe the
"Seven Gates" system - the VPN peer network and routing mesh - which are proprietary to Seven Alpha.
Metaphors, especially religious themed ones, tend to quickly identify the irrational and dangerous persons
who read into content delusions and projection unrelated to the subject matter (non-germaine content) -
and help us to filter these persons out of our community prior to any meaningful discussion or serious dialog.
The symbolism and naming conventions also resonate the values and mission statement of Seven Alpha, which is
to enhance the dignity and security of all persons against forms of abuse amplified by modern anonymous
communication and global visibility of viral media which is beyond the control of regional and national
jurisdictions to support adequate protection and enforcement set forth in law. Seven Alpha is just an
enforcement mechanism, and unlike early crypto-tools (eMule, Napster, et al) it is designed to support proper
law enforcement actions and assist rights holders, not disable them.
FAQ (Frequently Asked Questions)
- Does Seven Alpha include Cloud Storage?
No. Not as a part of the core service. Vendors using Seven Alpha may provide Cloud Storage, but key services
do not provide mass storage of data or files. Frankly, this is because the framework disclaims any and all
content themed sexually oriented, and most content people store even if personal and lawful, contains that data.
We do not want to be a time capsule for your grandfather's pics of your grandmother. If you need that,
contact one of the many other services for that purpose and party on.
- What is stored in the Key Database
Serial numbers, tokens for product sku invoices, and other data and products which are formatted for the
Seven Alpha API. Vendors must supply this information if they want to register products via the API.
- Are all licenses perpetual or transferrable
No. Certain rights may be flagged as such, like Founder / Sponsor Honors as a transferrable honorarium,
which add value to being a start-up or venture patron, but most license models are terminated lease on
end of contract which occurs when the registered party ceases to be alive permanently. That we offer
options that can be conveyed to family or transferred to related accounts by sanguinality disclaim the
sale of such honors and title, while affording a great benefit to venture micro-capital offers.
- What is the purpose of Access and Archive Rights?
Access rights allow use and control of account content, while Archive tools afford access based on
strict terms such as warrant or specific application data obligated by law. When a question at law
arises, such as first use, creation dates, etc - these data points can be essential to settle matters
and are routinely distributed and deleted in five years by most providers. Retained data is goverend
by COPPA, and beginning January 1 2020 strict rules governing this will come into effect in the
United States similar to GDPR in the European Union. The tools also provide a way to register and
log any executed "right to be forgotten" in full or part, if exercised by our clients, and may be
used to clear this information in compliance with European Union law by the end user or their estate
at-law, unlike most other services today. This compliance feature again benefits API users.
- Why Centralize my Data?
Networks adapt to risk. In the past, the threat of your data being gathered and sold or retained,
or shipped to jurisdictions which do not regulate its retention prior deletion in the country it
was gathered in or from, did not pose a threat to individual users. Violent and abusive stalkers
also did not enjoy the privileges of large corporations reluctance to permanently ban them and
reliance on difficulty to refuse to do so.
Threats have changed, and personal computer services
are also not trustworthy third-parties for information tokens. A trusted third-party to hold and
verify users and data is a form of risk management. Paired with disclosure and transparency for
the end-user, and 'right to be forgotten' to control or delete data specifically, creates a form
of private social media space essential to electronic commerce and trust with export capabilities
for virtual products (Serial Numbers, et al).
As long as you control your data, and can physically
tokenize the access tool for unsophisticated (family) use in case of emergency, this is a good and
necessary evolution of security against systematic and large-scale identity and traffic data collection
now supporting many "free" services in exchange for carte blanche access to your communications and
activity at your computer, phone, or Internet device. Since all Seven Alpha members adhere to a
DO NOT TRACK policy, this means your data in your own account is the only record you need to be
concerned with and a complete view of all network records associated with your account which do not
belong to the application of a Seven Alpha host, and such data is not eligible for sale or access
as a condition of their participation in the network. Paired with the variable IP and user identity
matrix in the Seven Gates (mesh network), application providers are not privy to user activity or
their home IP or other identifying information.
This "blind trust" of user accounts from a trusted
network resolves most of the tracking issues associated with abuse of privileged connection information
in the same way a global VPN affords anonymous users. To these clients, the ability to effectively
ban a user without an IP ban is more valuable than any loss of potential revenue from scraping
connection data which could potentially become a COPPA (2020) violation later.
- What is Logical Storage Block Data?
Volume Block Storage, sometimes called "attached storage" is a file mounted as a file system,
much like a 'virtual hard drive'. The term "logical" means this is not a 'physical' drive or
device, but instead a file which can be moved from place to place (like a block of data), and
remains secure and locked during transport independent of the encryption (or lack thereof) in
a specific channel. While this can be used for cloud storage, it is also useful to hold very
small credentials and keys, database files, and other records not designed for flat-file access.
The 'object' that is locked by the system and requires the 'keys' to open in our model is a
similar logical encrypted block data object, designed to be secure when not in use or access.
Stealing an entire machine with the data block on it will not, therefore, allow access to a
party without the keys and secret. Additionally, the encryption is multi-layer multi-cipher,
making decryption by brute force under ideal circumstances still very difficult and limited
by physical storage media regardless of computing power. In combination with the rotation of
keys regularly, this prohibits long-term brute-force attacks from potentially compromising a
secure data store even in the hands of a hostile power or state.
Because the object holds
other tokens to access the distributed data system, it further negates the chance of data
access by forcing a single or multiple keys and a secret known to the client, without the
additional secret and keys retained by the service. It is not a virtual drive for customers
to store data or files on. Instead, it is the 'master gate' which client requests must pass
to execute changes on a secure network of very strong cryptographic trust. In the Seven
Alpha Network, the unit functions as a single openstack universal link to other data servers (gates).
- How does this differ from Kerberos?
Kerberos is a Massachusettes Institute of Technology project that handles hand-off security between
two servers to a third server, effectively obscuring your key using a single link implicit
trust between a ticket-office and a back-office server. Kerberos does not manage any data or
access privileges, authenticate other aspects of accounts atomically, nor provide network-wide
ban capability to select areas or multiple sub-nets. No code is shared with the Kerberos
project in Seven Alpha.
Copyright © 2019 SHADOWDANCERS LLC - ALL RIGHTS RESERVED.