Anonymous ID: ee8e38 Feb. 20, 2022, 9:58 a.m. No.15674954   🗄️.is 🔗kun   >>4968 >>5001 >>5002 >>5088

Hook kidnapped children and held then outside time in Never Never Land, which is the quantum phenomenal layer, where the particles emerge from the noting once known as aether, the pleroma, the Land of Forms, and by a host of technical names employed by various religious, occult and esoteric traditions.

 

Hook made anon think of the most famous of Chinese pirates, a historical figure named Zheng Yi Sao (born Shi Yang, a.k.a. Shi Xianggu), also known as Ching Shih, a Chinese pirate leader active in the South China Sea from 1801 to 1810.

 

So what?

 

The Pirate Queen and her Lieutenants knew and carefully obeyed rules prescribed for conduct that would insure their survival:

 

Zhang Bao's three codes for the pirates of the Red Flag Fleet are often misattributed to Zheng Yi Sao. The codes are:

 

1) If any pirate goes privately on shore, he shall be taken, his ears mutilated, he will be paraded around the fleet and executed.

 

2) Not the least thing shall be taken privately from the stolen and plundered goods, all shall be registered. The pirate receives for himself, out of ten parts, only two; eight parts belong to the storehouse, called the general fund; those who steal anything out of this general fund, shall be executed.

 

3) Women captured from villages shall not be harmed or harassed. All women captives shall be registered, their place of origin recorded, and be given separate quarters. Those who rape or commit adultery with the women captives shall be executed.

 

By adhering to rules of conduct the pirates were to fulfill a role essential to the future survival of the Chinese nation - which had been set upon and destroyed by drug trafficker's. Indeed she, the pirate Queen, was fighting battles in the 1000 year war, the war against the invisible enemy, which began before she was born and would continue after here death

 

The same conflict the same invisible enemy, then as now.

The same families, Astor, Vanderbilt, many of the American and British elite made their fortunes running opium from India into China, the same secret societies, the same presiding entities destroyed the Chinese Imperial authority funding endless destructive civil wars, wars which would enable the communists victory

 

Real wars are fought over centuries, and employ the sleeping masses, prisoners of fake history , as forces to be harnessed in the eternal 5D strategic conflict.

 

Might be some connections IDK

 

https://historyofyesterday.com/ching-shih-a-prostitute-who-became-historys-deadliest-pirate-f596f7fcff23

Anonymous ID: ee8e38 Feb. 20, 2022, 10:07 a.m. No.15675003   🗄️.is 🔗kun

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication, which can be performed even when the messages are encrypted. In general, the greater the number of messages observed, or even intercepted and stored, the more can be inferred from the traffic. Traffic analysis can be performed in the context of military intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.

 

Traffic analysis /meta data can tell everything about an individual without ever knowing real world identities. Where we shop, how we vote, and if we vote, why and for whom. If a subject's real world identity matters, it is trivial to 'unmask'and identify by name, social security number or any other registry system.

 

But there's no reason to care about our real-world identities. An opponent doesn't need to have a name to manipulate an individual news feed and to provide specially prepared media content that will prompt the target to voluntarily choose a given course of action - to act and think in ways harmful to that individual and the community they are part of.

 

Media news content can make us angry or sad, stimulate us sexually, make us recall old grievances, encourage us to drink or take drugs, make us feel more threatened by, or less conscious of, race, religion and economic status. Using out metadata allows marketers and digital enemies to modify that news and media content that shapes our beliefs and forms our understanding of the world.

 

To defeat traffic analysis and remove the possibility of this type of control we need to engineer a specific type of advanced network.

 

An identity based secure network which use a series of specially configured servers called a "mix net" which scrambles the data of millions of users messages at the same time; encrypting, mixing and routing the messages through multiple servers, re mixing and encrypting at each stage, making it impossible for others to determine where a message came from, defeating "traffic analysis."

 

https://en.wikipedia.org/wiki/Mix_network

 

(The former data limitation of mixnets has been largely overcome.)

 

Mix nets are only one component of a secure information distribution system, one that the world needs to secure our common information supply and prevent the most common and widely used forms of surveillance, manipulation and social control.

 

The chief requirement of a secure network is identity. We need a single, permanent lifetime identity in virtual space for the same reason we need one in the real world.

 

If our friends or neighbors could switch identities and appear to be someone else in the real world we would not know who to trust. We'd be surrounded by shapeshifters -like the internet -where there is no fixed or permanent identity. On an anonymous insecure network it is possible to spoof credentials and present a convincing and deceptive appearance to cheat and manipulate others.

 

We need a single permanent lifetime identity - but we also need assured anonymity.

 

There are lots of good reasons for someone to want to be anonymous. To make a gift. To blow the whistle on crime. To buy and sell without giving your real-world identity to a merchant who sells it to others.

 

On a secure "identity based" network it is possible to do everything anonymously - credentials can be split many ways. If an anonymous user wants to offer proof of expertise while remaining anonymous it is possible to do that. We can display credentials and others can see they are real without revealing any more of ourselves.

 

Networks are not secure for anybody until they are secure for everybody.

 

We need to build the information system of the future as an international engineering project, so the safety and engineering are open to all the nations who will depend on this infrastructure to support civilization.

 

We can not allow an enemy to capture our information systems again. The way to prevent this happening is to make the network a public utility owned and controlled by users used to provide media content provided by trusted individuals or companies, unmanipulated by anyone else. Secure for all, because it is secure from all, even the people who build it.

Anonymous ID: ee8e38 Feb. 20, 2022, 10:15 a.m. No.15675050   🗄️.is 🔗kun   >>5537

The world financial system, like this board and the US government is controlled by Whitehats who are engaged in an operation to open eyes and save the souls of the 100s of millions of NPCs worldwide trapped in MSM pseudo reality.

Anonymous ID: ee8e38 Feb. 20, 2022, 10:17 a.m. No.15675060   🗄️.is 🔗kun

Moloch, Ba’al and the rest of the Y-head demon brands are represented in 3-dimensional space by families of associated, interconnected symbols, sigils and glyphs. These symbols constitute the satanic “brands” – marketing identities which now surround us; advertising has conditioned us from infancy to view the branding and marketing of consumer goods as “normal.”

 

Recognizing occult elements and understanding how they insinuate themselves into consciousness to become unconsidered, automatic repetitive, conditioned or ritual behaviors is part of what the "Great Awakening" is about.

 

Repeated exposure to satanic symbols, sigils, images and glyphs embedded in advertising and entertainment media content activates corresponding influences within us.

 

Hypersexualized, materialist culture is not an accident; it is not the product of creative competition – it is the product of occult rituals, ceremonies and sacrifices engineered to produce the illusory materialist environment in which we are, many of us, confined.

 

Pedovore cultists openly promote satanic “art” rituals in media content targeting children on You Tube.

Ritual ceremonies are disguised as children’s activities, "art," theater, comedy or concerts.

More than 1 million human ‘preborn’ infants are sacrificed to Moloch or the Asherah every year in the US alone.

 

Hypno-sexual mind control components ancient runes, demonic sigils, talismans and glyphs perfuse engineered pop culture. News and “entertainment” media content is pumped full of embedded symbols, sounds and subliminal images related to SEX and DEATH. These overt and covert occult influences accumulate and their combined effect over decades has produced and sustained a selfish, shallow and violent materialist consciousness, a culture where satan runs commerce and where trans dimensional entities may more easily manifest the hierarchical, slave society of pedovore criminality they prefer.

The satanic cultists have expended much cleverness to channel and confine human consciousness. Constricted human consciousness, harassed and distracted with unnecessary, socially mandated tasks, economic slavery and engineered social conflict, has no time for the reflection that leads to psychospiritual growth.

 

We can awaken to the true nature of reality and to the powers of big G God inside us.

Satanic cultists can’t. All cultists can do is what they've always done, use drugs, sex, illusion and NLP mind tricks to create endless cycles of revenge and retribution.

 

DIG MEME PRAY