A way discovered of doing radionic operations via the computer

Hello everyone. Today I will be revealing a way to conduct radionic operations via the computer (yes, really!)

The way is so:

hash(source)
hash(target)
sleep(1)

The hash is sha256.
for example, if you wanted to implant a thought on someone

hash(thought.json)
hash(target.png)
hash(target.json)
sleep(1)

The file of the thought looks like this, for instance:

{
    "Request":"John McWitch (born 1/1/1993) is the most attractive man to me right now"
}

The file of the person.jpg looks like this:

{
    "Name":"Targety Targetson"
}

I can give an explanation to my personal theory of why this works (boils down to EM waves) but really it is best if you just see for yourself.

Please take this concept and play around with it. Report what you see. Thank you!

I get the concept as ritual tool. Very cool!

I see i needs a bit of debugging :slight_smile: Just FYI … You put a json value pair in a person.jpg file in the instruction. But you listed the image file as a target.png not jpg - does it matter? But that text would be in the target.json file, right? What do you recommend for the image file contents, a photo of the target? And how do you include that in the send?

What are you running that hash as a command in? … Looks like Linux? But then it’s not properly formatted to run. Do you have a screenshot of the results? hash command in Linux with examples - GeeksforGeeks

Also, not too many people have Linux, do you have a recommendation for a substitute for MacOS or Windows?

What about, say, using the free Postman program to send a spoofed REST Services POST request wit the json in the header and image in the body?

1 Like

Great questions!

So really a png or a jpg doesn’t really matters. Computer file binary formats are self-defining, which means that loading the image file format reveals it is an image file format. It’s something the universe understand which is true for both jpgs and pngs, and all binary file formats.

Don’t think of the json as an actual HTTP/network request. The JSON is a simple file format which has a defined beginning and end. It is useful for that matter, and because JSON is frequently used as an addative to describe files, the universe understands this placing.

As for the photo, from my expirements any photo taken with any camera works – as long as you don’t alter it. If the photo is altered in any way (for example, compression) it loses its link to the target and to the “event” which it captures. Photos also go stale, so the more recent the better.

I know it sounds complicated, which is why I didn’t divulge it at first. It gets simpler with practice :smiley:

It’s not a command or anything, but more so a python script. You can build it pretty easily, just make sure that there is the crucial hash;hash;sleep; loop. This is the crux of the method. Also, implement the hashing via a sha256 because a faster algorithm will not work (CRC32 checksum does not work)

I’m not sure about using network requests or something like that, seems overkill. Just hash;hash;sleep. :slight_smile:

One things I wanted to add – this is very powerful and very verstile. I like to say, to friends and family, you can connect anything to anything. So let your imagination run really, really wild.

Well, you language here is very loose and not technically accurate, so I’m not following, json is not a file format, the file format is text. Which is why it can be edited in a text editor. You mean the code has a defined structure, yes? Similar to xml, that would probably do as well… You are more interested in the fact that it has value pairs?

No it’s nothing of the sort. A request uses a network to send the information somewhere, in this case using Internet protocols. JSON is the format of the information. the actual information is the target, the picture and the “thought”.

I don’t really see the point of using hash. hash is not a communication protocol. But using a request would fit with the feeling that you are sending a request to the universe. That was why I thought that would add to the mentality in the working.

Yes. This is true al all forms of magick. Like I always say the tool is not important, the operator is the only think that is actually magick here, so whatever props you want to use to get your energy flowing in the right direction, is all good. It’s all about the psychology in the end. :slight_smile:

Here’s the thing…
the sort of people that can adapt this to their computer probably know how to code, and that means they know how exact you must be for code to work. One period out of place and the whole thing can be broken. This is called a “bug”. (I’ve done this with Java.)

Buggy code means buggy magick - not really - but, that’s going to be embedded in the psychology of the person trying this.
So you want to be technically accurate and precise or all you have is sloppy intent, and sloppy intent makes for sloppy results.

My suggestion - first MOST people DON’T have Linux and hash makes no sense. And it will not return anything positive that tells you it was accurately done.

Use a html file, write these in basic HTML then open it in a browser - which runs HTML files by reading the HTML code and rendering the page as the code tells it to - to “run” it and “execute” the magick. This is something anyone with any kind of laptop can do.

Here is an example including the code:

You may want to make sure you are displaying file extensions, which in Windows by default are hidden. Use the Option in File Explorer to do this.

  1. Make a new folder anywhere in your computer’s file system
  2. Copy in here an image file for your target (maybe rename it for convenience)
  3. Create a text file in the same folder.
  4. Rename the text file to anything you like but make sure the file extension is changed to html not txt (or whatever text is for Mac or Linux)
  5. Edit the file in a text editor like notepad (I like Notepad++)
  6. Save the file

Write into the file something like the following:

<html>
<body>

</br>
</br>
<h1><p style="color:MediumSeaGreen;">Kek is Good</p></h1>
</br>
<img src="kek.jpg" alt="kek is good" width="500" height="300"> 
</br>
<h1><p style="color:Tomato;">Kek loves me</p></h1>

</body>
</html>

Here, my image file is called kek.jpg

  1. Click the file in the File Explorer to get it to ask you what program to open it in - choose any browser you have installed

The result is something like this - flashbacks to 1980s static web sites anybody?

And here is the original image just in case anyone wants it:

And now the Ancient Egyptian god Kek of the Ogdoad loves me, yay! :smiley:

1 Like

What you’re describing here doesn’t seem very logical, at least to me. You’re talking about magic numbers, but you’re only doing a few things with Python using hash and sleep commands. What exactly is your goal?

You base your fundamental source on magical numbers, but here you are trying to perform magic in a language the hardware can understand.

Here’s example from IDA for png file:

{7B7C49D2-F04B-4C71-9DDC-2E344E415070}

These are necessary to identify the file, as the operating system determines its format by reading the magic number in its header. The format of a file is recognized by signatures in the first few bytes of the file (the seal, magic bytes). However, these signatures do not contain all the specifications and rules of the format; they only indicate which decoder to use. That’s all actually.

Intent is always important, but your goal is really strange.

1 Like

oww that’s cutee

1 Like

HTML might look better, but in fact will work much worse because the files are loaded exactly once, the repeating action is important. I know I didn’t specify but it is done in a 12 minute loop, at the least. I might create a small webpage that does the hashing for you in the browser.

Better website:

Please do not post anything from AI on this forum. It’s against the rules.

If you can’t use your own words to explain it, you can’t explain it and has no value here.

It was only used to build the website. It has nothing to do with words.

That’s why I asked you what language this was.

Since this is only a tool I don’t see why literally any way wouldn’t work, except that you think it wouldn’t.

That’s literally the only way magick works. It’s all in the mental and energetic effort on your side and actually nothing to do with the computer.

Again, energy goes where you put your attention, what it does when it gets there is up to your intention. Candle or bytes, don’t matter if you don’t have those in place.

You are the magick one, not the computer. So it’s all good :slight_smile:

I know this seems weird, and you don’t know me and my background. But trust me this is not another way to manifest via mental means, it’s something different.

Are there any good books or grimoires on this type of computer magick? as well as others
i would like to formally learn it although im not a coder

I would very much like to discuss this form of magick with you among other things, please dm me if interested

1 Like

I’m interested in giving this a shot, as I have a good idea of what to use this for. It seems you’re using a Python script for this, which is pretty accessible for any desktop operating system. I do have a few questions about operating this, though. In your example, there is a target.png and a target.json. Are these interchangeable? Is the idea to use whatever you have that can identify the person? Secondly, how long should we have this looping for?

I’m also curious as to why you chose JSON and SHA-256 for this, why you think it works and why you think other options do not work.

Just a curiousity. What is your Delivery method?

All these Tech-Terms all Map out Organic terminology and Esoteric terms onto real world Circuits. Now circuits are basically “Paths of Flow.”

Since you decided to use tech terms, your basically mapping out using real world terminology on how you want your magick to flow. If its just some program you run in the background that has a simple Ritual Container (File Folder).. how this would map out in the real world is that your magick is only Local to your Aura. You are not connecting with an Organic Network of Recipients and Transmitters… Piggy backing off others and Tech infrastructure.

1 Like

Hi everyone, I think it is best to reveal more information about this technology.

As for the source, it’s a radionics project called infopathy. The record the EM signal of substances, and play them to water for the substance’s effect. You can search for it online. They, not me, discovered that when doing some sort of job on 2 files closer together, you can create a link between them. When you use the way above - you can influence a person and the target.

They are using it through these wav files, but I found that you can connect pretty much anything you can represent. I’ve already used their em files it to disrupt an adversaries hardware in a key moment, but I can’t divulge exactly what I did, nor will you believe me.

In any case, I have hit a roadblock. Although this technique can connect files (and place, and people and events…) to people and the like, I can’t seem to figure out how to use it for manifesting, or in other words, magick. I have more success conducting magick myself then using this technique, which is a big shame, because the potential I believe is great.

A word of caution – you shouldn’t run any version of this technology on your own PC for long periods, unless you discover a way of protecting your self from the EM waves. You will be exposed to the essence of the person you are influencing, and in close distance, and it can hurt you. However, for testing purposes, I don’t see why not.

I am working on recording the EM signal of orgone, but I believe a photo of an orgone generator might be just as good. Still, it doesn’t help manifestation, so recording orgone is my next step in this research.

I would also note that the infopathy substance files are not being played (in this technique), just hashed. But the connection between an audio file description and its state in the world is so great, the link appears to be extremely effective.

I consider my approach, although revolutionary, primitive – and this is why I am revealing to you my research this past half-year. My hope is that together, we can discover a free way to conduct radionics operations without the need of electrical equipment, while keeping the benefits that this equipment provides.

I can say more, I can probably write a quarter book on this already, but the best way to find out… is for yourselves.