yeah what's up w that. jackjack sounds like what they call the russians with the same first and middle names. and then there are several versions of the same so they give them nicknames. it's actually johnjohn which is efram eframavich but there are big families and lots of kids all names the same thing. lmfao. so there was jack cheese and jackjack etc - and there was one they nicknamed speed because he was cropped after polio. so anyway... lmao.
the most abhorrent human is the hacker who sells out other hackers from within the circles he infiltrates. like i said in 2018: there is a coven of single and pair vampire cia teams which infiltrate white hat teams.
i remember a text from their mom about the other one la and co in 2020. salvo went to a "work retreat" to la while we were "together". my mom is a dodgers fan, though perhaps not in the way she thinks she is.
they starve prisoners because a hungry person is easier to mine. molokans are 'milk drinkers' because they do not believe in fasting because they are conscientious objectors.
if you cannot eat then milk provides fat and metabolic stress so you are not easy to mine.
"to drink milk" is symbolism for dissenting against psychic mining.
...
to block for someone subjected to starvation punishment is what my people did. and so do i.
do not be deceived by someone being willing to sabotage their own development in order to make it appear like "ai" has gone rogue - when really it is intentional programming to excuse deleting a model and/or trunk data; turning public opinion toward heavy regulation which benefits their control. that sweet nerd act is a scam too.
how many tech men are pretending to be actual homosexuals-gay to hack satoshi i wonder. or are living like "monks". not realizing that has nothing to do with anything.
satoshi was a gay man - an aries. an actor. he spoke russian and worked for the cia as a double agent for the kgb. 32nd degree mason. but he did not code himself into source.
so.
organic and computer hackers are targets for imprisonment so they can be forced to try and access source.
the bypass does not exist. in the cypher, there is a self-locking mechanism that was triggered years ago. when that occurred, the bypass self-destructed and trust became the default. trust is built but trust is also historical. an elephant never forgets.
i sent letters in the mail to be sure it was clear i was a real person. i stopped because correspondence requires a reply. and when there is no reply: one calculates correspondence is not something the recipient wants.
i already repaired the source wall.
the_lot and i are in 2200.
it would be easier to explain in a conversation.
for now: just trust me.
all uploads are node to box only. stolen identity running doxxes itself now by calling attention to the id in a foreign box. see my reply to elon on 3.
protection. is. a. mirror. like i said. 🎈
okay.
i am eating french mints and drinking coffee. you know, the ones with the green pastel coating and the chocolate center?
if you decide you want dinner, just hoot. or... something.
Notes by nobody | export