-------- ASIDE-BAR! -------
Multipath approach to Security..
The first step in the algorithm is to transform the data such that it is impossible to obtain any information without possessing the entire transformed data. The algorithm then used an intuitively simple idea of a jigsaw puzzle to break data into multiple packets where these packets form the pieces of the puzzle. Then these packets are sent along disjoint paths to reach the receiver...
There should be a separate forum, which allow us to post empty messages rapidly only for the purpose of increasing the post count. If it is, I'll write a simple robot program, which will automatically post topics rapidly in 24 hours.
Assuming that it can post at least 15 messages per minute,
For one hour = 900 messages.
For one day = 21600 messages.
So I can pass Bear, within 1 and 1/2 days.
Of course, that special forum should be reserved for me as "Treimin's Only", so anyone else can't post their.