Explore your Subconscious  

Indeed.

Indeed.

As a known blunt, in-your-face expert who takes no shit and pushes people to shut up and act, obviously it is aseninse to act in an unitelligent way (e.g. an incorrect direction).

Such is why, for uncertain students, career-changers, , I conduct 2hr sessions where I grill the hell out of their via highly unorrhodox drills so to ucover their innate desires, then reveal such to them and the strategy for non-Chicken-Little action.

I noticed a few times recently that while sleeping, I had dreams where I said to other characters stuff like: "sorry, but this is just a dream", or "if I do this it will mess with the dream".

This documentary helped me realize that I am not as in control as I thought. My brain is greatly impacted by my environment, culture, and past trauma. Even being on Mastadon has impacted the things I have ended up caring about.
I highly recommend watching this all the way through, if you're looking to better understand yourself and others.

Local Intelligence Series: Wrocaw - Update (Mid Summer 2024)

This is an episode about the initial mappings of how the city of Wrocaw works in Poland. It's about the tangible apparent system and the possible hints of the hidden matrix in its framework. By following the money and the prime industries as they interconnect human civilian daily life, it is possible to get a sense of the pulse of the networks. There is a security presence, and an ongoing development of infrastructure which maintains a general neutral sense of balance. How secure is this from any outside threats, whether physical, virtual or mental F# around and find out! Maybe this will lead to creating a local NGO for Web App Sec wizards or a mesh of BTC LN nodes for the significant organizations supporting ecological thriving in town.


Professional Refinement - Passing CompTIA Security+ (2023)

This episode is about the author's study process for passing the foundational Cyber Security "CompTIA Security+" exam in 2023. It's all about the timeframe, study materials and the live testing approach. One book has the knowledge. Another book has the tests. An online course compliments this. Answering a couple thousand quizz questions helps. Making mind maps assists in weaving sense from the realm of computing machines which themselves are interconnected as part of their existence, so in a way this helps make the theory real, because it is founded on what is known about reality through physics.

Web App Security Testing Series: RECON Foundations - INTRO

ARTICLE:

AUDIO:

This introductory episode to Recon covers foundational theory including tactics, techniques and actual command-line procedures. From manual passive indirect information gathering to automated scans and into stealth packet manipulation. Examples are given of this particular first stage of a Vulnerability Assessment in a sequential manner in order to enhance the effectiveness of mapping the attack surface of the target web application.

The amount of times my eyebrow reacts to my voice is remarkable within the first minute. Recording myself helps me continue to work on this.


Aspie Hackers, Bug Whisperers

Open for highly-functioning -nontypical who may wish to work as by collaborating with peers on Hunting platforms:



Aspie Hackers, Bug Whisperers

This episode is about the existing open bootcamp potential of highly-functioning neuro-nontypical autistic people, specifically Aspies (those previously diagnosed with Asperger's) who may wish to work as Ethical Hackers by collaborating with peers in the form of an online community organization. Specifically the aim is to work together on Bug Bounty Hunting platforms in order to professionally help businesses secure their websites by finding and reporting security vulnerabilities in their products. There are dramatic reasons to believe that Aspies in particular are natural daily hackers in the ordinary world. Such an Aspie group always works at its best and brightest.



If you're into facts and dimensions from a self-induced caring need, this series is for you!

Let me know how you relate. If you don't relate at all then I'd be happy to hear of your reality because it would mean you are quite mature. I just started but I'm learning fast.

Since my daily life is affected by the ongoing news at the local and global level, usually in direct relation to national security and the cost of cornflakes, clean air and water, I find it important to understand what I am and what the meaning of the internet is today. Having clarity where moist psychology meets the dry technology is essential for the ethical hacker. Tune into my hacked box Infosec series for 25 years of observations compacted into a few hours of maps of mental models. It's a ten part foundation set in the first season of "Bitcoin Security Maps", a podcast I started as part of my professional refinement because these days that's what it takes to attempt next-level vocational engagement in Cyber Security. After turning 25. First I wrote the articles for my Medium publication, then I mapped them and recorded their readings in audio-visual format which was then syndicated on separate podcast channels, such as youtube and others available on an increasing numer of advanced podcast listening apps empowered by bitcoin. For censorship resistance and sanity.

When I tune into any other top podcast in (and outside) my professional field, these other podcasts often discuss the issues and challenges that I present abstract solutions for. This includes the Jordan Peterson podcast and Peter McCormack's "What Bitcoin Did", two excellent intellectually high spirits. This is how I know that my friends on the Meta-facebook network are receiving very valuable content from me while I currently excite six subscribers and certain videos with zero views after a couple of months. My podcast is meant to inspire rather than persuade anyone of anything, I merely make statements of observations deeply rooted in reality, and even label these as "cosmic laws" or "direct personal experience" and "clarity of meaning in the experience of consciousness" etc.

I have identified the main issue to be a lack in successful communication about the tools that are available through spiritual practice and interactions with computing machines. For this reason this series culminates in the design of a new human communications protocol for those interested in debate, discussion and ongoing exchange about what is happening.

I am continuing the podcast with the second season coming soon but I do not plan on another series like this because first of all the burden of spending more time than necessary in darkness is not as interesting as allowing myself to thrive, and secondly because I feel that this covers everything from how to access reality all the way to the end of it all for life on Earth. I am working on my articulation in order to collaborate with those living and doing the work. The meanings of the words I use are often not the same as the average layperson's. It is right to have a need to know how to articulate better.

The point is that if the "human" world falls apart any time soon within the meshcode memory of this series, then I will not feel a need to help or explain anything to anyone and my conscience will be clear as it is now, when I feel I am doing my best to live for myself and for others. Through that lens it's possible to see what's going on.

See more links in the video description.



As of the summer of 2024, representatives in the US Senate are working on the disclosure of new energy systems from beyond human intelligence. My podcast is aimed to be on the front lines of the audit of electrical energy distribution using bitcoin foundations. That is where many lightworker polymath technologists are based.

In order to continue in this direction, if you want to know what it took to set up a censorship resistant podcast - here's the video:

"All about the Podcasting2.0 V4V Bitcoin Lightning Network Node Monetization setup for the Bitcoin Security Maps podcast. From cosmic laws to philosophy, theory, and the practice of moist human interaction with digital virtual realms. The theoretical depths of Web Application Security Testing. The creation of audio-visual content in the civilian matrix, with all the foundational steps involved in a successful censorship-resistant run of the first season. The significance of the mapping of Bitcoin and Nostr private key security."

Links to the audio and article are available in the description.


Subconscious






Hutton 24 topics