Jump to content

TIME TRAVEL WITH INFORMATION


TimeCrime1986
 Share

Recommended Posts

  • Replies 137
  • Created
  • Last Reply

Top Posters In This Topic

Well let me say I have to prove what I find is the future. But from I see in the near future is more of the same for today. Since I have to prove my media I try not to get tied down so I dont get called stuff. My method of time travel involves getting it all at the same time then picking out the bad apples from the good apples then waiting to see what happens.

 

 

Link to comment
Share on other sites

I was using that as my avatar at one time. I only use it when I do my TT dance now.

 

The photo itself is not my work and I did not want to give that impression. I have had that photo since I first started posting in the forums. The artist that did that photo did some really good work. It looks a lot like that machine off the movie time machine.

 

The computers I do have. I have more than 4 of these that run binary counters to mathematically describe the information in what ever system I give it to describe the information in. Systems are defined by units, coordinates, or a numerical number in a numerical base. Its purpose is to virtually create a 5th dimension on a computer that can be data-mined for time travel media. M-thory supports time travel thru another dimension. Nothing has ever been said about that dimension being created virtually on a computer with binary counters. There is very little if anything about how to create another dimension. Everyone will have to excuse me. Im off in the woods today and the sun is hitting my laptop screen and is hard to see and write.

 

Oh by the way I am assuming you will answer to Darby here.

 

 

Link to comment
Share on other sites

I got this whole forum to myself. Wow, im not going to complain. Note to myself for the future. Make the pictures smaller. Well I explained briefly how I time travel. I have a theory by which information is used to meet the criteria of a time travel theory. That theory being counters can be used to find information within a system. We use counters to virtually create another dimension by which we can find time travel computer media.

 

By doing this it is possible to view messages between your current point in time and the future and watch time travel computer media. There is one draw back. The information has to be verified. So, until the future arrives and the information within the media or messages becomes verified we dont know. Hey, since I am the only one here can I have moderator status? Hhahaha, I know that wont happen. Just asking.

 

Well tomorrow I am going to be busy, busy, busy. I am making ether boot images for my machines and installing more hard drives. Also, I have been running a varity of bootable operating systems from cd's and dvds along with the standard operating systems I have on the hard drives but I want to standardize my parallel computer to boot up from just the hard drives only. The other ways were pretty good for getting something up quick and running and they had their uses but now it is time to standardize. Forgive me please im not using a spell checker here.

 

Well im off.

 

 

Link to comment
Share on other sites

  • 2 weeks later...
I was using that as my avatar at one time. I only use it when I do my TT dance now.

I'm glad that you cleared that up.

You and I know why I asked the question. In the past you've had a penchant for overstatment - building nuclear reactors, being a licensed private investigator with government security agency contracts, being a computer engineer involved with government contracts to reverse engineer IBM 5100 PC's, owning a business involved in international high finance and trading...

 

So it's good to see that you weren't trying to leave the impression that you took the photos and it was your "stuff" in your house.

 

 

Link to comment
Share on other sites

  • 4 months later...

Code Posted with program

 

Well as promised on other forums I dumb-ed my software down and per Rainmans instructions it is posted on another site. The program I posted here is very similar to what I used to time travel with information. It uses outside files for random numbers I most often scramble videos and use that. Anyway it has a very simple AI which I did build in a AI tool for training it but it is still not all the way finished. The user may have to manually edit the files. The AI is trained on files that are positive and trained on files that are negative. I use the trash files from my counters so the AI can see what a non-postie result looks like. Now remember I use a collection of computers as a super computer to data-mine or as I like to call it my time travel station. So, anyone playing with this will have to start from scratch and educate themselves thru experience as I did to get this to work. It is not very user friendly and it is a console program. I did supply the source code but the executable was compiled on windows 7 with a 64 bit processor. Or in my case a processor with several cpus built into it. I do have a project called time travel station but I need to separate fire-codes from the data-mining part and port that over to time travel station. What your getting here is fire-codes and time travel station rolled into one console program with some tool programs off to the side. I did my best to dumb this down for the average user but as I said it is still not user friendly. I don't think like Microsoft. Anyway here is the link. It is fresh off the compiler and still may have a bug or two.

 

http://sourceforge.net/projects/firecodes/

 

Reactor out.

 

 

Link to comment
Share on other sites

Re: Code Posted with program

 

I worked some bugs out of the AI. Now, if anyone ever wanted to try what I do now they can. The software is pretty complicated and the terms are fancy for people not as trained in computers as I am but the code is there in a compiled binary that runs on windows 7 64 bit. As time goes on I will improve the software some more. Funny thing though. I got an email telling me I was required to send the government a email about the encryption in my program. I will see where that goes. Im gone, off to explore this wonderful universe through temporal hacking...........

 

 

Link to comment
Share on other sites

  • 3 weeks later...

Public version of code working and getting better.

 

The public version of my code which is very far cry from the code that I use is now in its beginning working stages. https://sourceforge.net/projects/firecodes

 

I have not got the strong check-sums built in for it yet since I have to install a code library in the public version which is a windows console version. Tonight I and no I am not full of BS took the public version of my code and successfully recreated a file with a target weak check-sum and a target weighted check-sum. So, devulging one of my before never posted secrets I had the program monitor whether the changes to the counter were better or worse. Worse changes were disregarded and better changes were kept. In this way I very quickly in a matter of a few short minutes (no not all night long, not two weeks, not one month, but a very short few minutes.) Used a check-sum counter to recreate a file with the public version of my software. The current version of my software does not monitor the counter file but simply just makes the changes and searches for the output. I have a long ways to go. I have to upgrade how I train the AI, search for results, and of course add in the new code I currently have working.

 

Now this is a long way from the temporal hacking that I do in my real life as my hobby but I am successfully and a little at a time bringing my software to the public. Conditioning the public to use it. Then when all is said and done I will bring in project number two and show people how to use it for temporal hacking. Well the lies are thick but the truth must shine and shine it will. My new version will be be out probably some-time in the next few weeks. TimeCrime1986 aka Reactor signing off from time travel station one. Over and out.

 

 

Link to comment
Share on other sites

Re: Public version of code working and getting better.

 

Could I post my experiments and results? Man I would not know where to began. I jumped off the boat a few years ago. Started this project. Tangled with the staff err (government agents) here which work at countless other forums all over the internet. And I have been going ever since. So, trying to get on your level. My experiments and results consist of computer source code which started out in basic and went to c++.

 

My theory - Using check-sum hacking to target a range of check-sums which by the way can be calulated by any number of ways. Check-sums are usually referred to as hash functions. Anyway getting back to my point. Lets say I watch the evening news every night. I record those news programs and track their check-sums. By looking at the entropy in those check-sums, the highest and lowest bytes and their positions in those check-sums, and the check-sums range now we have enough information to put together a binary counter whos job is to un-cover the information within a system. Like cracking a web page. The counter throws passwords at the web-page till the web page says ok your the owner of this account come on in. Well with temporal hacking we are hacking check-sums to find computer media from the future or the past so we have to set up a system to judge whether or not the front door has been opened up for us with the results off the binary counter. So we set up the counter to run and set up the programs to search the results off the counter. There counter itself is the media we are searching for. The programs change the check-sum of the counter till one of our search bots says "BINGO we have something".

 

Go to sourceforge and do a search for fire-codes. Its the very beginnings of my code I am slowly improving it for the public to use.

 

Now, back to some information theory which may further help to answer your question or questions.

 

So I use a weak check-sum and a weighted check-sum. My program would first.

 

1. create a file.

 

2. get the file to a specific weak check-sum

 

3. copy the file out to be looked at by the search bots.

 

Now I can do a weak check-sum say 12 bytes with the weak check-sum range at 1294 and a weighted check-sum of 0.00079000000000000001. That by the way is a file saying my true name. My programs can crack this in about 15 seconds.

 

Or I can have the program do this 1294 weak check-sum and a weighted check-sum of 0.00079000000000000001 with 25 different results. Then a do a weak check-sum of 1294 and a weighted check-sum of 0.00079000000000000002 and so on. Or I can have my programs select a random weighted check-sum from within a specific range with a specific weak check-sum and my programs would data-mine all the results. You see, programs from the future or the past have real specific check-sums both weak, weighted, and strong check-sums. With temporal hacking it is just a matter of knowing where information from the future or the past may lay in the check-sum range. Then writting software to construct those check-sums to files and data-mine those files for information. The reason we have to use data-mining is because as I said in a past post information like oil and gas is also a natural resource but it is a resource that does not exist physically we have to put together the tools to mine that resource as we do with physical resources. Information is a non-physical resource that has to be comprehended and understood and yes it can be mined for like a natural resource. And that includes files from the future or the past or technology or files that may exist on other computers either now, in the past, or in the future.

 

Look at sourceforge also Rainman you told me to keep one eye open. Well dude can you keep up with me. I welcome you to try. I will be upgrading my sourceforge source code later. I worked on it tonight and later on when I have certain things in place I will be releasing a new release.

 

One more thing. By using check-sum hacking to search for information of not only now but of the future, past, and alternate time-lines this is another avenue or way to study how the physical temporal time really works. From my experiences even a small experiment with time-travel using information can have large effects. The best way to study those effects is by trying to be outside of the experiment as much as possible and not part of the experiment. Using yourself as a test subject and as a researcher is not the right way to approach it. You want to watch things outside of your physical control and influence and only get involved as the experiment requires it. I learned this lesson the hard way. But as a time travel researcher I have been improving and getting better. There you go. As per my forum experience nothing can be proving in a forum. More so with one ran by the government in an attempt to monitor and control the information on the internet.

 

My assesment of space-time.

 

Time is like a bunch of rocks in a stream. We can jump from rock to rock. Each rock is a different place in space-time. Now in the perfect time-travel world we would be able to choose what rock we can jump to or from and if we want go back to the same rock. But no, nature tells us what rocks we can jump to or from and to what rocks we can go to. Now if we can bend nature to our will then we can jump to and from what ever rocks we like and as many times as we want. That is true space-time travel. That is how the universe is really made. Now for the kicker. The multi-verse on a larger scale works the same way. Our universe itself has its own path from a potentially unlimited number of other paths but what path our universe takes is also controlled by nature on the macro scale just like we are controlled on the micro scale. So when I run my programs the time-travel media that I am receiving is the rocks in space-time. Now if I want to know the future I just have to get the rock that I am currently on and look in the direction of the rock or rocks that I can jump too. Basicly I find out before hand what check-sum range the data I am searching for is in. I find my rock then I look at the other rocks. Well I have said enough for one evening and missed my bed time. I will be around some-time in the future. Here or some-place else.

 

 

Link to comment
Share on other sites

Re: Public version of code working and getting better.

 

Well I got the upgrades into fire codes and posted it as sourceforge. Option 4 was where I put the upgrade and I the tool to get a weak check-sum of a file was off kink by 1 byte with firecodes which I fixed. I put in the weak and and weighted check-sum I wanted and how many results I wanted and what percent of match to find and spat out 100 files in less than a minute on my test.

 

Someone using it for the first time will have a bit of a learning curve.

 

I probably will not ever get it up to the level I use at home because most people would not know how to use it but for the public version of what I do it is starting to come into its own.

 

I will work on options 2 and 3 now of firecodes. Option 4 runs like a scalded dog when it is setup right by someone who knows how to use it.

 

TimeCrime aka reactor1967 signing off from time travel station one. Over and out.

 

 

Link to comment
Share on other sites

Re: Public version of code working and getting better.

 

I do with linux but with windows I have had some trouble finding a command line tool that is not copyrighted which I can use in my programs. I can install a open source library which I plan to do later. I do have a strong check-sum checker in the zip file but it is a third party tool to use on the side it is not built into the program. When I run my programs in linux there are command line tools available in linux that my programs can use such as md5sum. I run a system command from my program to get the strong check-sum of a file and save that to another file then my program opens up the file and uses the strong check-sum. The only reason I am using windows now is because that is what the public uses and I wanted to put out a program that the public can use.

 

Also on the check-sum checker it has to be a command line too that I can run like this.

 

md5sum filetest.bin > output.txt

 

It has to be completely public domain code if I use it in my code.

 

Output.txt is what my program would open. I did a few weeks back try your search exactly as you posted it.

 

 

Link to comment
Share on other sites

  • 2 weeks later...

Thanks, I did download the checksum checker and have it bookmarked. I will look at it. Well I have some good news. As Darby and Rainman already know in the other forums I had talked about misplacing my main code. Well after running the executables for so long and starting a total rewrite when I was at my underground shelter out in the country where I keep the bulk of my found media on a little micro SD disk laying up on one of the shelves back behind all of my DVD's, CD's, and external hard drives I took the little disk and blew the dust off the case and put it into my laptop I keep there and low and behold I found my long lost code along with some other goodies. Hey here is the first program I ever posted here. It is my VCNS. I also found where I kept my old VCNS equations which I had not talked about. I was not coming back for a while but upon finding my old code I was static to say the least. Here is a repost of the only code I have ever been allowed to post here. This was the early code demonstrating how time can store and decode information. I have my old stuff safely put up again. this time I hope I can keep up with it.

 

Code deleted - I was asked a while back not to store my code here. Sorry.

 

 

Link to comment
Share on other sites

As Darby and Rainman already know in the other forums I had talked about misplacing my main code.

I do (know that you misplaced your code)? I don't have a clue what you're refering to or what website (and I'm just assuming that it is a forum site).

 

 

Link to comment
Share on other sites

  • 1 month later...
  • 3 months later...

When I first posted here I talked about the computational world world where all information exist that our physical reality can represent or contain. Now all this information of course can not be represented at the same time. The computational world is far bigger than our universe but its existence is a mathematical function of entropy and information. So mathematically the computational worlds existence can be proven as I said as a function of entropy and information.

 

Now using computers and a form of hacking known as check-sum acting using binary counters computer files can be created using the computational world as a 5th dimension for time travel because binary counters in and of themselves are tools to identify information within a system. That is how computers are hacked. And it is how I hack the temporal time line to obtain computer files from space-time of the future or the past.

 

As promised last year I have been updating my code. But my main drive has been creating Artificial Neural Net to act as a filter for my binary counters. You see check-sum hacking or check-sum counters find a real computer file as the collisions within the check-sum are data-mined to find the file.

 

Now there are other methods which use controlling the entropy in a binary counter by controlling the statistical probability of bytes occurring at different locations within the computer file.

 

And with my Brand new powerfully improved running AI now I can not only use it to filter files but also to identify files from the future or the past. Yep old reactor is still on the job. Well im off to another forum where there is more going on. I was just dropping in for a visit. And to the forum owners here you guys keep up the good work for the CIA. I know where ever I go you are not far behind me.

 

 

Link to comment
Share on other sites

apple already has a patent for this. they use it for photography. you couldve made a ton of money if you wouldve used it for different purposes. ive said it before, and ill say it again: for every second you look in the future, the less accurate it is. 10 seconds into the future is a random guess. humans are much better predictors unless its looking 2 seconds or less in the future.

 

 

Link to comment
Share on other sites

For those wanting my research site it is

 

http://timetravelinstitute.biz/

 

I also have my own forum at http://thetimetravelinstitute.com

 

And there are no patents on what I do. I,ve done my homework. For my haters and disinformation agents all I have to say to you is have a good day.

 

Reactor from time travel one station over and out.

 

 

Link to comment
Share on other sites

 Share


×
×
  • Create New...