Breakthrough in Email Privacy: MySQIF™ Message Vault™

If you have been reading our reports over the years, you know that the invention of social networking was stolen by Obama’s White House, supported by the Supreme Court where justices held newly-issued Facebook stock and did not recuse themselves, and marketed as “open source” by the military industrial complex to hide the theft, has been on our radar since 2016. AIM has been on a mission to educate and enlighten people around the world about the underlying THEFT that is the foundation of any program that uses an Internet log-in, including all social media platforms.

Along the way many of you asked if Michael McKibben and Leader Technologies would invent a secure way to communicate with one another, bypassing the ‘backdoor’ access that the government uses to spy on WtPeeps.

As you know, the engineering team invented MySqif in 2024, and many of you in this audience participate in its beta testing. The team listened to your comments in how you are using it (or not) and identified bugs that were fixed. Now, the team is delivering the next iteration of MySqif which includes easy-to-use messaging encryption – called MESSAGE VAULT.

Below, Michael McKibben explains this new technology. The ‘Deep State’ and the British Pilgrims Society no longer have access to the backdoor keys to open and read your emails.

Michael McKibben’s MySQIF™ Message Vault™ is the first true advancement in Email privacy encryption since Phil Zimmerman introduced Pretty Good Privacy (PGP) on Jun. 06, 1991.

Michael McKibben and Douglas Gabriel Introduce Message Vault


First real advancement in message encryption since 1991

By Michael McKibben, CEO, Leader Technologies, the true inventor of social networking, and co-inventor of MySQIF™ Privacy App™ writing in the third person, Jan. 10, 2025.

In 1995, Leader Technologies founder Michael McKibben had rebuilt AT&T’s AccessPlus 3.0 email system[9] in time for release with Microsoft Windows 95. He then supported AT&T’s entire internal operations as well their major customers. This gave Michael a bird’s eye view on the emergence of electronic mail, groupware, and mobile computing at the same time that we now know that British Pilgrims Society insiders within the Clinton administration were dictating to the technology world that an encryption backdoor for MI6, MI5, GCHQ, CIA, FBI, and NSA (“Five Eyes” with MI6 driving this surveillance dragon) must be built into the Internet—as a universal backdoor.

Michael McKibben’s[1] MySQIF™ Message Vault™ is the first true advancement in Email privacy encryption since Phil Zimmerman introduced Pretty Good Privacy (PGP) on Jun. 06, 1991.[2]


Zimmerman was almost immediately indicted by the new Clinton administration for providing PGP to subscribers all over the world. Phil refused courageously to give backdoor access to TheCityofLondon and New York banks and spies.

We have learned the inner workings of the attack on Zimmerman thanks to discovery of Hillary’s email servers by Judicial Watch ca. 2016.

On Jun. 07, 1993,[3] the Clinton administration convened the “Third CPSR Cryptography and Privacy Conference”—a secret conference near the White House “to require that telecommunications manufacturers and service provider​s redesign their systems to facilitate wiretapping.

Ironically, CPSR means Computer Professionals For Social Responsibility.[4] Hindsight shows that the word “social” in the morally rapacious tech world means community property and “open source” where royalties and licenses for use are no longer required—what’s yours is mine.

This conference proposed the “Clipper” chip. Although not approved by Congress subsequently, the approach merely shifted attention to embedding the backdoor requirement in export laws and SSL certification mumbo jumbo.

Encryption backdoors were baked into U.S. Export law & Secure Socket Layer (SSL) Public Key Infrastructure

The conference initiative was assigned to the grifting organizers at the National Institute of Standards and Technology (NIST) to require all software, hardware, and firmware vendors to embed a backdoor algorithm named “Dual_EC_DRBG” (Dual Elliptic Curve Deterministic Random Bit Generator).[5] 

In short, this algorithm has an inbuilt mathematical flaw that only dues-paying members know how to exploit. By way of analogy, it is like knowing that if a password contains the phrase “ekim” alone will unlock the encryption. So, in this example, a password like “Lor3mipsOmdolorsi@metekimc0s>ct^turad!piscingel)t” only needs to enter “ekim” to decrypt it.

Despite claims this requirement was “withdrawn” in 2014, no one believes this propaganda. Widely-deployed government programs like this rarely stop. It appears that NIST merely renamed the algorithm to “CTR_DRBG_Instantiate”  to overcome the bad publicity that their Dual_EC_DRBG received.[6]

On Jun. 07, 1993 the Clinton conference was underwritten by the British Pilgrims Society’s Carnegie Endowment for International Peace. It was organized by Clinton’s new pederast chief of staff John Podesta and George Washington Law professor James P. Chandler. The stated intention was to authorize giving the FBI (and its “Five Eyes” British spy handlers) an encryption backdoor key into all hardware, software, and firmware, including a recalcitrant PGP.

Zimmerman’s PGP proposed a Public Key Infrastructure (PKI) where static public and private keys are combined to encrypt a file.

“Pretty Good Privacy” was a mathematically honest name that recognized that any encryption could be cracked given enough time and money.

Spies Control Global Encryption—SSL/TLS is a grifter spy toll booth called the Federal Bridge Certificate Authority. It is where they muzzle their dutiful spy minions when they are put out to pasture (e.g., Clintons, Bravo, Mueller, Chertoff, Thomas E. Noonan, Gilman Louie, Kappos).

HINT: High-sounding names and promises are cheap. In this case they are deceptions/lies of the highest order in the federal government. Lies that become policies and laws invite demons to possess them. Conclusion: the entire SSL/TLS certification system is demon possessed.

The workaround of the spy agencies was to embrace Zimmerman’s public-private keys and implement Secure Transport Layer (SSL, 1994).

Federal Bridge Authority

An SSL “Federal Bridge Authority” was then created to manage “Certificate Authorities.” These authorities were then given authority to collect a monthly toll tax from you before you can access the Internet. Toll Tax Graphic: thelivenagpur.com.

These fascist “public-private partnerships” include Alibaba, AWS (Amazon), CertiPath, Click SSL, CloudFlare (beneficiary: Robert S. Mueller), Comodo, DigiCert, Entrust (beneficiaries: Hillary Clinton, Michael Chertoff), Exostar, Facebook, GeoTrust, GlobalSign, Google, IBM Eclipse, IdenTrust, Keyfactor, NASA, NicSRS, NRC, OpenSSL, PTO, RapidSSL, SAFE Identity, Sectigo, SeroSSL, SignMyCode, Southwest Texas Regional Advisory Council, SSL2BUY, StackPath, State of Virginia, Symantec, Tencent, Thawte, Transglobal, U.S. Department of Defense, U.S. Department of Energy, U.S. Department of Homeland Security, U.S. Department of State, U.S. Department of Transportation, U.S. Government Printing Office, U.S. Patent Office (read: British SERCO), U.S. Treasury, Verizon, and Widepoint.

AES-256 was cracked in 2013 by a MySQIF™ Privacy App™ principal. [Learn about MySqif at http://www.mysqif.com.]

This system of federal grifters today uses AES-256 (Advanced Encryption Standard) as their allegedly “impenetrable” encryption algorithm. The Department of Defense requires it to be used by all their contractors. This is despite the fact that AES-256 was cracked in 2013.

“Secure.” “Trustworthy.” NOT.

The propaganda of these “authorities” tells you that they are “secure” and “trustworthy” when they are not.

Worse, not well known, and without your knowing permission, the Certificate Authorities store not only your public key, but also all your private keys “to enable you to recover your keys after a data loss.”

Did you get this memo about SSL, TLS, AES-256? We did not think so. Just to triple check, we just consulted one of the top five cryptologists on the planet if he/she knew that the PKI Certificate Authorities stored your private keys along with your public key. He/she did not.

The theft of your private keys is euphemistically named the “Key Recovery Authorities.”[7]

The fact is this highly convoluted 146-pages of Nandini et al bureaucratic word salad (footnoted below) gives Federal Bridge Certificate Authority insiders carte blanche to hijack your private keys and give them to shadowy third parties (spies) without your knowledge, at any time.[8]

Federal Encryption Standards Violate Citizen Trust

This underhanded key storage “key recovery authority” explains why the Federal Bridge Certificate Authority does not care whether or not AES-256 is cracked.

These fascist “authorities” have access to ALL your public and private keys. In other words, all your messages are readable from the moment you login into the Internet via your SSL/TLS certificate (https://websiteURL).

The “Federal Bridge Authority” public key infrastructure is a diabolical spy confident trick.

Zimmerman says while he was associated with PGP, no backdoors existed. After Zimmerman exited PGP, however, one can only assume PGP private keys began to be secretly stored by one’s certificate authority and accessible to secret third parties.

MySQIF™ Message Vault™ is the first trustworthy innovation in message encryption since PGP in 1992 Nothing new in encryption has occurred from the inception of PGP in 1991 until now with the introduction of MySQIF™ Message Vault.™

Phil Zimmerman is no longer associated with PGP. He says PGP had no backdoors while he was the owner. But now, numerous PGP owners have come and gone, including Proton Mail, Infineon, Yubikey, OpenPGP, Symantec, Seahorse, MacGPG, GnuPG, GNU Privacy Guard, LibrePGP, Hushmail, Network Associates, PGP2, PGP3, PGP4, and PGP5.

MySQIF™ Privacy App™ Message Vault™ is Encryption Revolution 2.0.

This latest update of MySQIF™ Privacy App™ will include MySQIF™ Message Vault.™Many advancements have been introduced to make it look and operate more like an email interface on the surface. The same revolutionary MySQIF™polymorphic encryption magic is retained just below the surface.  (Up to twenty-thousand one-time, unclonable keys derived from your unique device footprint used for each encryption.)

Automated key exchanges

No more waiting for half-key responses from sender and receiver. Those actions have been automated (assuming MySQIF™ Privacy App™ is running on both sides).

Once the sender has sent his/her package, the encryption happens in near real time (depending on the size of the package) and the next event is the encrypted message appearing in the receipient’s INBOX for decryption!

The recipient will actually be able to visually see the decryption occurring!

It supersedes the insecure MIME (Multipurpose Internet Mail Extensions) protocol.

We have also dramatically upgraded the text-handling to include unlimited characters and rich text formatting.

Six months ago we introduced MySQIF™ Privacy App™ to rave reviews. It was focused on facilitating polymorphic encryption of files up to 4 GB.

Very quickly requests arrived to send short messages with the files, or instead of a file, which we accommodated.

The private key exchanges added several approval steps into the process. This meant that a sender had to wait for a recipient to Approve (send his or her unique half-key) before sender could encrypt and send the message, after which the Recipient could decrypt the file.

We asked ourselves how we could streamline this process.

We determined how and reengineered the app to include MySQIF™ Message Vault.™

With this introduction of MySQIF™ Message Vault™ the first true innovation of messaging encryption since PGP in 1992 has occurred.

Here is the MySQIF™ Message Vault™ streamline process:

That’s it folks. Sometimes the most profound solutions can be accomplished simply!


[1] With partners Albert Carlson, PhD, and Michael De La Garza.

[2] Phil Zimmerman, PhD, advisor to Leader Technologies ca. 2001-2003. https://philzimmermann.com/EN/background/index.html

[3] James P. Chandler, John D. Podesta. (Jun. 07, 1993). Third CPSR Cryptography and Privacy Conference included Stephen Crocker, NPR, ABC, US West, Ann Harkins, Ken Mendelson, Juan Osuna, Cathy Russell, Steven Wolff, James Chandler, IBM, HP, FBI, Mitre Corp, C.I.A., NSA, FBI, ACLU, Oracle, Deloitte, Qualcomm, NIST, Wilmer LLP, George Washington University, New York Times, MIT, Washington Post, Apple, Digital, AT&T. FOIA No. 9403963. U.S. Department of State, U.S. Justice Department.

[4] Computer Professionals For Social Responsibility. (Accessed Jan. 09, 2025). Source: http://cpsr.org/  (“Social Responsibility” means the opposite. CPSR unilaterally redefines software intellectual property creations as “open source” and free to all, despite the inventors’ intentions or constitutional rights. [1] DRBG Validation List. (Oct. 23, 2015). National Institute of Standards and Technology (NIST).

[5] DRBG Validation List. (Oct. 23, 2015). National Institute of Standards and Technology (NIST).

[6] Elaine Barker, John Kelsey. (Nov. 01, 2014). Recommendation for Random Number Generation Using Deterministic Random Bit Generators (ref. Dual_EC_DRBG). NIST Publication 800-90A, Rev. 1. National Institute of Standards and Technology. Source: https://csrc.nist.gov/files/pubs/sp/800/90/a/r1/final/docs/sp800-90a_r1_draft_november2014_ver.pdf

[7] Tim Baldridge, Co-chair, W-1455368100. (Oct. 25, 2024). Key Recovery Authorities, X.509 Certificate Policy for the Federal Bridge Certification Authorities, Ver. 3.6, Oct. 25, 2024, PDF pp. 4-6,8,10,17,19,24,25,41,42,57-59,60,65,69,73,74,79,80,81,92-94,96,114,115,128,135,136,144-146. Source: https://www.idmanagement.gov/docs/fpki-x509-cert-policy-fbca.pdf

[8] Nandini Diamond, Ramon Burks, ICAMSC Co-Chairs. (Aug. 01, 2021, formed 2002). Federal Public Key Infrastructure Policy Authority Charter (FPKIPA), Version 2.0, DocuSign Env. ID: 9A249C14-2CCD-495E-8A74-419D86A40116. Federal Public Key Infrastructure Policy Authority Center. Source: https://www.idmanagement.gov/docs/fpkipa-charter.pdf

[9] Ron Lietzke. (Feb. 19, 1996). New Software spruces up E-mail text. The Columbus Dispatch; John W. Frees. (Feb. 19, 1996). Small firm helps AT&T cure program headache. Columbus Business First; Vicki Oliver. (1996). Planning Works’ latest effort is with Gillette Co. Daily Reporter; C. Yearwood. (Feb. 1996). AccessPlus Rewritten By Popular Demand. AT&T News; Product Brochure. (Feb. 1996). AT&T AccessPlus 3.0: The smart way to organize and manage your mail. New capabilities and enhanced features make it faster, friendlier and more functional, for improved productivity, And now a great thing just got better, with enhancements that make the software even more powerful and flexible. AT&T Mail, AT&T EasyCommerce Services.


In 2018, we alerted our readers about the Federal Bridge Authority and wrote:

“Even a criminal network such as the one we see in the swamp has an organizational and communication structure. We need all White Hats to pay attention to this intel and act accordingly. This is the center hub of their activity – the den of the devil, so to speak.

Ordinary citizens will not know what to do with this information. But patriots inside the White House will. Make sure to push this info to the top of your influence channel. It will get where it needs to go if everyone pushes it “up” through their channels.”

Organization and Communication Structure of the Swamp Uncovered

Federal Bridge Certificate Authority is the Technical Platform for Senior Executive Service aka ‘Deep State’

“The “Federal Bridge” public encryption key platform was set up in the early 1990’s under Bill Clinton to enable the spy agencies to tap into any cooperating computer system at any time. It was facilitated by the National Institute of Science and Technology (NIST) through the embedding of an “encryption backdoor key” (algorithm) called the Dual_EC_DRBG algorithm (Dual Elliptical Curve Deterministic Random Bit Generator).”