MOTHER NECESSA.I.TY
Contents of Today’s Post
Artificial Intelligence (War and Writing)
Cryptography (cracking Vigenere with Python)
“MAGIC” (Philosophy & Information Warfare)
News Videos
I have provided you all with the war-winning strategies and tactics which Ukraine will use to win the war Russia started by invading Ukraine. You can just look here
https://osintbrief.substack.com/p/war-plan-red-beating-the-mucovite
to see it from the overview or search through previous posts if you wish.
ARTIFICIAL INTELLIGENCE
Increasingly, I will be writing here about artificial intelligence. A.I. will prove very effective in helping Ukraine win in
1. Helping to generate reports, training manuals, videos, morale boosting entertainment
2. Machine translation into and from Ukrainian language
3. Ĉryptography, though the existing models are not good enough at that so someone who knows about cryptography will have to write and train Ukraine's llm for cryptography.
4. Robot ambulances, robot demining, basically anything other than targeting. Aerial navigation is MUCH easier than land navigation.)
Who purged llama from hugging chat, and why?
Speaking of Purges, Vietnam court sentences corruptionaire billionairess chick to death.
Because AI has no feelings to hurt, expect human discourse to become even ruder. Even though I do use polite words with other humans I don't bother with them when I am talking to an a.i. I expect this will influence my other interactions with real people.
LLM AI is more than "Eliza on Steroids" but is Eliza on Steroids.
Here's some of the things I am publicly working on:
https://www.perplexity.ai/collections/HumanLanguageLe-bqdTjv1_Qr.5wHNB9gSa8Q
I am privately working on other things.
(base) ab@a-xssu:~$ ollama run codellama "Hello world..."
Honestly, ChatGPT kinda sucks, but because it sucks it will be (already is) freely available. Sora will probably be paywalled and paywalls went up for many api keys months ago.
Here are my earlier works on AI: been at this a while.
https://www.google.com/search?channel=fs&client=kali-linux-sn&q=eric+engle+artificial+intelligence
LLM AI
Large language models have the ability to generate human-like text and can create images when prompted properly. These models can be excellent research and writing assistants to help you summarize information, generate ideas, outline, and even help draft articles or help write reports. However, they are not magical instant solutions to all of our problems. There are few monopolistic opportunities. Large language model artificial intelligence will change how people work somewhat, but in a distributed manner that will be difficult to monetize in monopolistic ways. Though, it is entirely possible Microsoft's search engine will finally take market share from google and it is also evident to me that no one has put much thought in advertizing and llm ai. Advertizing is what made google big.
The clickbait youtube videos saying you can make 250k as a prompt engineer are that: clickbait. You can however use llm ai to improve your writing, in my case, advertisements. I dislike copy-writing mostly because you must write in an emotive unscientific manner and gear your writing to 12 year olds. I wish I were being sarcastic... Effective ads are kinda stupid, and that is why they make fantastic foreign language learning material. "Learn Chinese and Advertizing" is a course I could offer, for example.
Anyway, large language models are trained on vast amounts of text data. They generate text by predicting the likelihood of a particular word or phrase appearing next in a given context. This allows them to write in a way often indistinguishable from a human writer.
One of the key benefits of using a large language model as a research and writing assistant is its ability to quickly process and summarize large amounts of information. For example, if you are working on a research project and need to review several academic papers a language model can help you quickly identify the key findings and main points of each paper, saving you time and effort.
Language models can also be used to generate ideas and even to draft articles or reports. For example, if you are working on a blog post about a particular topic, you can use a language model to generate a rough draft of the post, which you can then edit and refine as needed. This can be a huge time-saver, especially for writers who are working on tight deadlines. It can also lead to garbage. It's not an instant no brains copy past solution.
Another area where large language models excel is in image generation. By using a process called "text-to-image synthesis," ai can create detailed, realistic images based on text descriptions. For example, you could describe a scene in detail, such as "a snowy mountain landscape with a small village in the foreground," and the model would generate an image that matches your description.
However, large language models are not perfect and have their limitations. For example, they may struggle to understand complex or ambiguous phrases, and their responses can sometimes be nonsensical or irrelevant "hallucination". One llm thinks I am living and teaching in Taiwan. I am not. Additionally, while llm ai can generate text and realisticimages, ai is not particularly creative let alone sentient.
Although I do know how to build an llm I don't plan to write about that here because it's beyond most of your interests.
CRYPTOGRAPHY:
Symmetric and asymmetric ciphers are two types of encryption methods used to secure data. Symmetric ciphers use the same key for both encryption and decryption, while asymmetric ciphers use different keys for each process. Both methods have advantages and disadvantages.
Symmetric ciphers are generally faster and more efficient than asymmetric ciphers. They are well-suited for encrypting large amounts of data quickly, making them ideal for real-time applications such as secure communication over a network. However, symmetric ciphers require the sender and the recipient to have a shared secret key, which can be difficult t o manage and distribute securely. The transfer of the key from one to another must be secure, and often isn't and even then it must be kept secret, and sometimes is not.
Asymmetric ciphers, also known as public-key cryptography, use a pair of keys: a public key for encryption and a private key for decryption. This allows for secure communication without the need for a shared secret key. Asymmetric ciphers are more secure than symmetric ciphers, as the private key is never shared and is only known by the recipient.
Symmetric and asymmetric ciphers are often used together to create a hybrid encryption system. In this approach, a symmetric cipher is used to encrypt the data quickly, and the symmetric key is then encrypted using an asymmetric cipher. This allows for the benefits of both symmetric and asymmetric ciphers to be utilized, providing a secure and efficient encryption solution.
BREAKING VIGENERE CIPHERS WITH BRUTE FORCE
Vigenere is the strongest or at least best known symmetric key cipher. The Vigenère cipher, once considered unbreakable, does have some weaknesses that can be exploited to decrypt the ciphertext. This type of polyalphabetic substitution cipher is essentially multiple Caesar ciphers applied in sequence. The ciphertext can be broken down into separate streams, each corresponding to a different Caesar cipher.
Breaking a Vigenère cipher involves several steps. First, determine the length of the key (n) using techniques such as the Kasiski examination or the index of coincidence. Once the key length is known, divide the ciphertext into n different streams based on the key length. Analyze the letter frequencies in each stream to determine the Caesar shift (key character) for that stream. This can be done by comparing the observed letter frequencies to the expected frequencies in the target language. Once the key has been recovered, the original plaintext can be decrypted by reversing the Vigenère encipherment process.
To break a Vigenère cipher use statistical analysis of the ciphertext to recover the key. By understanding the weaknesses of the Vigenère cipher and how to exploit them, it is possible to decrypt ciphertext that was once thought to be unbreakable.
from collections import Counter
from itertools import product
def compute_chi_square(text):
"""Compute the chi-square statistic for a given text."""
n = len(text)
counter = Counter(text)
expected = Counter(text[:n//2])
chi_square = sum((counter[c] - expected[c])**2 / expected[c] for c in counter)
return chi_square
def brute_force_vigenere(ciphertext):
"""Brute force solve a Vigenère cipher with key lengths of 1 to 3."""
for key_length in range(1, 4):
for shift in product(range(26), repeat=key_length):
plaintext = ""
for i in range(key_length):
for j in range(i, len(ciphertext), key_length):
plaintext_char = chr(((ord(ciphertext[j]) - 65 - shift[i] + 26) % 26) + 65)
if ciphertext[j].islower():
plaintext_char = plaintext_char.lower()
plaintext += plaintext_char
chi_square = compute_chi_square(plaintext)
if chi_square < 1000: # Arbitrary threshold for "english-like" text
return plaintext
return None
Here's an example of how to use the program:
ciphertext = "HXUC VLWH WUDJ RIHW ZDUH RQDO"
plaintext = brute_force_vigenere(ciphertext)
print(plaintext)
This should output
ATTACK AT DAWN WITH ALL FORCES
Note that the program assumes that the ciphertext is uppercase and uses a fixed alphabet of 26 characters (A-Z). This is usually the case for field ciphers.
https://inventwithpython.com/cracking/chapter20.html
https://www.johndcook.com/blog/2021/08/19/vigenere/
https://mathweb.ucsd.edu/~crypto/java/EARLYCIPHERS/Vigenere.html
MAKING YOUR CIPHER TEXT MORE SECURE WITH OBFUSCATION TACTICS (BREAKING UNKNOWN VIGENERE CIPHERTEXT)
Breaking vigenere using frequency analysis usually presumes the cipher text's language is known. But suppose we have an unknown target language?
Based on a broad estimation from various languages and writing systems, here's a rough approximation of the global character frequencies for letters A through Z, ordered from most to least frequent:
1. E
2. A
3. O
4. I
5. N
6. R
7. T
8. S
9. L
10. C
11. U
12. D
13. P
14. M
15. H
16. G
17. B
18. F
19. Y
20. V
21. W
22. K
23. X
24. Z
25. J
26. Q
阿不从的俄法个和将可了木年哦平其人三他为新月在
This table is useful not merely for trying to break vigenere with brute force. It is also useful for obscuring your plain text. You could for example write a plain text
THIZ IZ THF PIAINTHXT
and suddenly your text is much tougher to break with a bruteforce attack. I do think any person of average intelligence would be able to read
THIZ IZ THF PIAINTHXT correctly.
Similar obfuscations of Chinese characters are also possible. The table above obviously is not taking into account pinyin, where Q and X figure quite frequently, unlike European languages!
“MAGIC”
Temporal Displacement
If the future is also the past how does this change your understanding of this world and your descriptions of it?
Tomorrow already happened. Yesterday hasn't happened yet? This means you can send things from the future to your present. This also means you should be sending things from right now back in time to yourself or whomever else you think should be getting things. The question "I how can things get past from" is also the question "how can i get things from the future." "How can I send back to me" is also "how can i receive forward from me".
For example, when you write things you are in fact sending experiences forward to the future. When you read things you are in fact receiving experiences from the past. But because all events cast ripples forward and backward through the streams of time sending forward also sends backward.
When I build a machine, a house, a thing, I am in fact sending items into the future, possibly to strangers. All those buildings you see are the past that was sent forward to you.
This concept of time challenges our conventional understanding of time as a linear progression from past to future. If the future is also the past, then there is no fixed or predetermined course of events, but rather a complex web of interconnected moments that can be accessed and experienced from different perspectives. Every day is pearl harbor day, and every day an atomic bomb landed on Japan.
One implication of this is that our actions and decisions in the present moment have far-reaching consequences that can affect not only the future, but also the past. For instance, if we were able to send objects or information backwards in time, this would necessarily alter the sequence of events leading up to the present. Similarly, any changes made to the past would ripple forward, potentially changing the course of history and reshaping the world as we know it.
This notion of time as bi-directional flowing streams which spiral or circle back and forth to and from their origin and destination changes how we describe and *understand the world around us. language and concepts are often grounded in a linear model of time, with clear distinctions between past, present, and future. However, if these categories are in fact interchangeable, then our descriptive frameworks must adapt accordingly. We might begin to speak of events not as discrete points along a timeline, but as nodes within a vast network of causality and connection.
Time travel raises questions about the nature of identity and personal continuity. If we can communicate across temporal boundaries, who exactly is doing the communicating? Are we speaking to ourselves at an earlier or later stage of life, or to entirely separate entities who happen to share our memories and experiences? And what does it mean to exist as a coherent self over time, if the boundaries between past, present, and future are so permeable?
These questions open up new possibilities for exploring the mysteries of time and its relationship to space, matter, and energy. By embracing the paradoxes and uncertainties of time travel, we may gain fresh insights into the workings of the universe and our own role within it.
MAGIC and MAJESTIC
During World War II and the Cold War, the United States had two classified intelligence programs, known as MAGIC and MAJESTIC. The code names refer to their security classifications: Top Secret Magic for MAGIC and Top Secret Restricted Majestic for MAJESTIC.
MAGIC was the name given to the U.S. military's decryption efforts targeting Japanese diplomatic codes. The program, operated mainly by the Signals Intelligence Service (SIS) within the U.S. Army, successfully broke the PURPLE code in late 1940. This achievement provided American officials with valuable insights into Japanese strategic planning and political maneuvers throughout World War II. Due to its high level of secrecy, only a select group of authorized personnel knew about the program's existence.
On the other hand, MAJESTIC refers to a series of highly sensitive studies conducted by the U.S. government regarding extraterrestrial life and technology. Also known as Project MAJESTIC-12 or simply Majestic-12, this alleged organization comprised prominent scientists, military leaders, and government officials. Their task was to investigate reports of unidentified flying objects (UFOs) and evaluate their potential impact on national security.
Although officially denied by the U.S. government, documents purportedly originating from MAJESTIC indicate that the project investigated claims of alien encounters, reverse engineering recovered technologies, and developing contingency plans for public disclosure. Despite ongoing debate about the authenticity of these documents, they continue to fuel interest in theories concerning extraterrestrial visitation and government cover-ups. Mostly these are disinformation to distract from real covert programs like
In summary, MAGIC and MAJESTIC are two distinct classified intelligence programs in the United States. MAGIC focused on decrypting Japanese diplomatic communications during World War II, while MAJESTIC dealt with broader concerns related to extraterrestrial life and its implications for U.S. foreign policy and defense strategy. MAJESTIC is likely disinformation. MAGIC is not.
SPELLS AND TIME (Philo & InfoWar)
Telekinesis the ability to move objects with my mind. Chronokinesis the ability to manipulate time. Here is a detailed description of the process:
1. Preparation: Before attempting to send an item through time, first gather all necessary materials and tools required for the spell. These might include rare herbs, crystals, powders, or potions known to enhance temporal manipulation; a sturdy container to protect the object during transit; and a focusing tool like a crystal ball, mirror, or talisman to aid visualization and concentration.
2. Object selection: Carefully choose the item(s) to be sent through time, ensuring that they are neither too heavy nor fragile for transportation. Consider whether the object(s) will retain their integrity upon arrival, especially if sending them to a drastically different time period or environmental context.
3. Timing: Determine the precise point in time to which the object(s) will be sent, taking care to avoid disrupting major historical events or causing unintended harm to people or ecosystems. Use astronomical charts, divination methods, or intuition to pinpoint the exact date and coordinates for delivery.
4. Protection: Cast protective spells on both the object(s) and their containing vessel, shielding them from potential damage during transit and safeguarding against unwanted interference from external forces. Ensure that the container is airtight, waterproof, and insulated against extreme temperatures, as needed.
5. Focusing and Visualization: Using telekinesis and chronokinesis, concentrate intently on the chosen object(s), picturing them clearly in the mind's eye. Next, envision a swirling vortex of shimmering light enveloping the object(s), drawing them gently towards the desired point in time. Simultaneously, picture oneself standing firmly in the present, maintaining a strong connection to both the object(s) and the intended destination.
6. Incantation: With heightened concentration and visualization, recite a carefully crafted incantation designed to facilitate temporal movement. This incantation might incorporate ancient languages, rhythmic patterns, and powerful words associated with time, transformation, and protection. Throughout the chant, f maintain a firm grip on the focused energy, guiding the object(s) steadily toward their target destination.
7. Release: Once the incantation reaches its climax, release the concentrated energy, allowing the object(s) to slip seamlessly into the designated point in time. Monitor the transition closely, ensuring that the object(s) arrive safely and without disruption to the local environment. Upon successful delivery, reinforce any protective barriers to prevent accidental tampering or premature retrieval.
8. Confirmation: After releasing the object(s), verify that they have reached their intended location by employing clairvoyance, remote viewing, or scrying techniques. If necessary, establish contact with the recipient self (erlier me!) to confirm receipt and assess any potential impacts on the local timeline. Speling was differrent then!
9. Documentation: Record details of the time-travel event in a secure journal or archive, noting the object(s) involved, dates and locations, and any notable outcomes or side effects. Regularly review and update this record, cross-referencing entries with other sources to track long-term trends and potential consequences.
MAGIC ITEMS ASSOCIATED WITH TEMPORAL MASTERY
Magical implements inspired by astrological associations, elements, and various mythological traditions:
1. Saturnine Hourglass: Modeled after the planet Saturn and its association with structure, limitation, and time, this hourglass features dark obsidian sands flowing through golden rings, symbolizing the balance between restriction and abundance. Its base contains crushed hematite, believed to promote clarity and focus, enhancing the user's ability to manage and direct temporal energies.
2. Capricorn Crystal Orb: Drawing on Capricorn's earthy qualities and affinity for ambition, discipline, and achievement, this orb comprises alternating layers of green malachite and black tourmaline, fostering determination, stability, and growth. Charged under a full moon, it enables users to tap into hidden reserves of strength, facilitating precise navigation through time.
3. Celestial Compass Rose: Inspired by the zodiac signs and celestial bodies, this compass rose boasts twelve directional markers corresponding to the constellations, with additional symbols indicating lunar phases and planetary influences. Designed for practitioners seeking guidance on multidimensional journeys, it helps align intentions with cosmic rhythms, illuminating paths through the labyrinth of time.
4. Timekeeper's Scroll: Ancient scrolls infused with ink derived from oak galls, iron gall, and dragon's blood create a potent mixture capable of recording and preserving temporal sequences. Users can etch spells and invocations onto parchment, sealing it with wax imprinted with sigils evoking the passage of hours, days, months, or years.
5. Horologium Astrarium: Combining mechanical ingenuity with esoteric principles, this elaborate clockwork device incorporates gears, cogs, and dials linked to celestial movements, enabling precise adjustments to the flow of time. Enhanced with runic inscriptions and alchemical emblems, it serves as both an instrument for managing temporality and a symbol of humanity's quest for dominion over natural cycles.
6. Zephyr Wind Chimes: Crafted from delicate glass tubes suspended on silver chains, these chimes emit melodious tones attuned to elemental air spirits, summoning gentle breezes to carry messages and visions between past, present, and future. Ideal for meditative practices, they foster lucidity and creativity, encouraging spontaneity and improvisation in temporal explorations.
7. Chronos Pendant: Named after the Greek god of time, this pendant radiates a subtle yet powerful aura of sovereignty and authority, granting wearers enhanced command over temporal phenomena. Carved from carnelian or agate, it bears the image of an aged deity bearing a scythe and orb, signifying wisdom, cyclicity, and eternal renewal.
8. Merlin's Time Staff: Based on legends surrounding the famed sorcerer, this staff embodies the essence of arcane mastery and foresight. Constructed from yew wood adorned with gold leaf and ruby accents, it resonates strongly with Earth and Fire energies, empowering users to shape and bend the threads of time according to their desires.
9. Quicksilver Mirror: Utilizing mercury's liquid metallic sheen and malleability, this mirror reflects images of past, present, and future selves simultaneously, providing insight into one's evolution throughout various stages of life. Encased within a polished steel frame, it encourages reflection and contemplation, promoting awareness of the ever-shifting dance between destiny and free will.
10. Kairos Talismans: Drawn from the Greek personification of opportune moments, these charms represent fleeting instances when fate intervenes, offering windows of possibility and chance. Fashioned from brass, copper, and bronze, they bear inscribed symbols linking to specific timespans—minutes, hours, weeks, or decades—encapsulating the elusive quality of ephemerality and urgency inherent in time travel.
11. Ankh of Eternity: Derived from Egyptian hieroglyphics depicting eternal life, this ankh combines lapis lazuli, turquoise, and carnelian to form an exquisitely detailed amulet reflecting the complexity of human experience. Channeling divine energy drawn from solar and lunar deities, it bestows longevity, vitality, and endurance upon users, bolstering their capacity to traverse time with grace and fortitude.
12. Ouroboros Ring: Symbolizing the cyclical nature of existence, this ring showcases a serpent consuming its tail, crafted from twisted strands of gold, silver, and platinum. Representing regeneration and rebirth, it allows users to explore past lives, revealing karmic debts and ancestral wisdom essential for navigating future challenges.
13. Time Traveler's Map: Infused with cartographical lore and leylines converging across centuries, this map unfolds to reveal intricate landscapes teeming with mystical landmarks and portals. Layered with geomantic sigils, sacred geometry, and topographic anomalies, it guides seekers through veiled dimensions, unlocking secrets concealed beneath the surface of reality.
14. Atlantean Sandglass: Unearthed from legendary ruins, this sandglass defies traditional conventions, measuring intervals based on tidal shifts and stellar alignments instead of standardized units. Engraved with cryptic inscriptions hinting at advanced civilizations lost to antiquity, it offers glimpses into forgotten histories, inspiring curiosity and wonder amidst temporal voyagers.
15. Hourglass Pocket Watch: Marrying horology and alchemy, this pocket watch houses dual chambered hourglasses rotating in tandem, tracking elapsed minutes alongside shifting sands captivated within glass vessels. Etched with symbols associating planets, zodiac signs, and seasons, it harmonizes internal rhythms with universal frequencies, synchronizing body, mind, and spirit.
16. Dragon Claw Pendulum: Adapted from Chinese feng shui principles, this pendulum consists of jade, quartz, and metal components fashioned into a menacing dragon claw poised to strike. Suspended above auspicious diagrams charting favorable directions and orientations, it reveals optimal timing for undertaking ventures, mitigating risk, and capitalizing on propitious opportunities.
17. Mayan Long Count Calendar: Rooted in Mesoamerican cosmologies, this calendar traces celestial cycles through iterative sequences of days, months, and eras, culminating in grand conjunction points aligned with transformational thresholds. Embodying calendrical precision and metaphysical significance, it functions as a gateway to liminal spaces where creation and destruction commingle, catalyzing spiritual awakening.
18. Astrolabe Sundial: Integrating astronomy, mathematics, and occult sciences, this sundial projects shadows indicative of celestial positions onto graduated discs marked with astrological symbols. Serving as both functional timepiece and ceremonial artifact, it connects terrestrial observers to heavenly spheres, bridging disparate domains through measured radiance.
19. Celestial Navigation Chart: Overlaid with celestial maps plotting starry configurations, this nautical chart demarcates oceanic currents, wind patterns, and magnetic fields conducive to maritime time travel. Guided by lunar cycles and polar constellations, sailors embark on odysseys traversing temporal and spatial frontiers, encountering mythic creatures and untold treasures along the way.
20. Oracle Bone Diviner: Modeled after Neolithic bone fragments inscribed with omens and prophetic verses, this diviner channels ancestral wisdom through trancelike states induced by rhythmic drumming and meditation. Cracking bones foretell destinies written in primordial script, elucidating lessons learned from millennia of trial and error, steering souls through tempests and calm seas alike.
For my whole life, I didn't know if I even really existed.
But I do, and
PEOPLE ARE STARTING TO NOTICE
Kill your fear, not your self.
Believe in your hopes, make your dreams come true.
How do we interpret the dream when we are awake.ive heard in physics theres at least 10 dimensions. We are limited to the third. Length, height, witdth. Time appears linnear. Angels, God, are outside of our continuem. Non- confined. GODS throne is in the 3rd heaven. Theres more to what we perceive and they want us numb. We need a solid standard of operation not our limited own. Am i a nutter?
Wouldn't time streams be running at different rates in different instances. Things like accumulated wealth passed generationally to an existing entity. Hmmm .