Reactor1967
New Member
- Messages
- 9
In Einstein’s space-time all space-time exist at the same time. Since all space-time exist at the same time that means all computer files exist at the same time. By using a science of check-sum hacking files can be reconstructed with their check-sums. So, a programmed binary counter that can reconstruct files by their check-sums can be used to construct computer media files of the past or the future. Time travel by hacking check-sums is called time-hacking. Search engines that can examine computer files written off time hacking binary counters can automate the process and create a search engine that can search the past, present, future, or alternate realities.
Its all in my web-sight at http://time-travel.institute
What I do is run a counter that can create files by both their weak and strong check-sums. I have my own methods of calculating these. The reason my software works so much better than any thing known is my software can control the speed of the counter. By speed I mean how fast it runs. This is accomplished by how many bytes my counter operates on at a time. Now, after the speed of the counter is controlled, my counter has a destination strong check-sum and a target strong check-sum. My counter will make changes to the file then check its destination check-sum and strong check-sums. If the destination check-sum has moved closer to the strong check-sum then the changes to the file are kept. If not then the changes to the file are reversed. So, depending on the size of the file in a very short period of time my software can take strong check-sum and recreate the file. No matter where or when that computer file existed my software can find it and reconstruct it.
I usually don't get file collisions but if I do I just increase the strength of my check-sum or use different variables to calculate it thus avoiding the collision.
Now, as said above all computer files past, present, and future exist at the same time. My software does not care where or when a file existed it or what computer it may have existed on it just creates it.
Now, the problem with this is computer files can now be created without connecting or hacking into other computers. So, my policy is I don't search for peoples private information and I don't search for classified information. And I don't search for copyrighted material either.
How my search is conducted. My other program I call a time scanner will take known computer media files and get their strong check-sums. Then get the root mean square and standard deviation of these check-sums. And also use linear regression curves to calculate what check-sums unknown computer media files will or may exist at and the rate of change in those check-sums so the scanner can create strong check-sums of time travel media up and down a large range of strong check-sums. Once it knows where known computer media files are in their check-sum ranges now it can find the strong check-sums or pretty close to it of files that may have existed in the past, present, future, or alternate realities.
My time-scanner will then create configuration files containing this information. Then the configuration files are feed to my reconstruct program that creates these files.
Then my search bots will check out these files and delete the bad ones and keep the good ones.
When I do find a file now I can run it back to my reconstruct program to clear it up and bring it into focus.
Thus, creating time travel media files that can be any computer file possible that existed in the past, present, future, or alternate realities. This is how time travel can be done and is being done by me with computers. This is a true story.
Its all in my web-sight at http://time-travel.institute
What I do is run a counter that can create files by both their weak and strong check-sums. I have my own methods of calculating these. The reason my software works so much better than any thing known is my software can control the speed of the counter. By speed I mean how fast it runs. This is accomplished by how many bytes my counter operates on at a time. Now, after the speed of the counter is controlled, my counter has a destination strong check-sum and a target strong check-sum. My counter will make changes to the file then check its destination check-sum and strong check-sums. If the destination check-sum has moved closer to the strong check-sum then the changes to the file are kept. If not then the changes to the file are reversed. So, depending on the size of the file in a very short period of time my software can take strong check-sum and recreate the file. No matter where or when that computer file existed my software can find it and reconstruct it.
I usually don't get file collisions but if I do I just increase the strength of my check-sum or use different variables to calculate it thus avoiding the collision.
Now, as said above all computer files past, present, and future exist at the same time. My software does not care where or when a file existed it or what computer it may have existed on it just creates it.
Now, the problem with this is computer files can now be created without connecting or hacking into other computers. So, my policy is I don't search for peoples private information and I don't search for classified information. And I don't search for copyrighted material either.
How my search is conducted. My other program I call a time scanner will take known computer media files and get their strong check-sums. Then get the root mean square and standard deviation of these check-sums. And also use linear regression curves to calculate what check-sums unknown computer media files will or may exist at and the rate of change in those check-sums so the scanner can create strong check-sums of time travel media up and down a large range of strong check-sums. Once it knows where known computer media files are in their check-sum ranges now it can find the strong check-sums or pretty close to it of files that may have existed in the past, present, future, or alternate realities.
My time-scanner will then create configuration files containing this information. Then the configuration files are feed to my reconstruct program that creates these files.
Then my search bots will check out these files and delete the bad ones and keep the good ones.
When I do find a file now I can run it back to my reconstruct program to clear it up and bring it into focus.
Thus, creating time travel media files that can be any computer file possible that existed in the past, present, future, or alternate realities. This is how time travel can be done and is being done by me with computers. This is a true story.