This blog copyrighted (c) 2008 - 2016 time-travel.institute
All my books have been written and either have been released or will be released sometime in the future. I have put out my second BNS book with my the rest of my programs and listed it on my web-sight http://time-travel.institute
I am going back and editing my books and updating them from time to time whether or not they have been released. So, my current BNS books which I have on my web-page that are for sale will again be updated sometime in the future.
I am keeping the Conspiracy Against Time Travel guessing as to when and where the rest of my books and DVD's will or have been released. After I sale so many copies I will post that information on my blogs and web-sight.
And, as I said before from now on my final code will not be in the books but the good news is I have or will prepared DVD's with the compiled programs on them that will run my BNS program while take any computer file and make it a BNS number of 15 digits or less NO MATTER HOW LARGE THE FILE IS!!!!! That will be for sale on a DVD. The copyright and the code stay with me. How that works is my BNS system uses a algorithm to create a coding and decoding table. As the program runs it uses my tables to find R on coding and find the same R on decoding. That algorithm for creating those tables is a secret and my complied programs will run like an encrypted file container. All information in memory will be encrypted and all information on the hard drive will be encrypted. Even the compiled programs themselves will be encrypted. And the compiled program besides running like an encrypted file container will be spaghetti-fide to prevent reverse engineering. Each program will have to have a verified registration number to run and the program will not run if it can not verify the registration.
Also, on a DVD will be two programs. One program take any computer file and create a weak check-sum and strong check-sum. When those numbers are feed to my second program it will recreate the previous program. Now, the second program can be feed weak and strong check-sums to attempt to find computer files of the past, present, or future NO MATTER WHERE THAT FILE EXIST OR WHEN IT EXISTED!!!
No, computer hacking necessary to get that file. If you can find the weak and strong check-sum of another computer file no matter where or when it exist it can be recreated with these two programs. I will make a third program where that information can be entered and my first program will generate the necessary configure file(s) necessary to reconstruct other computer files from weak and strong check-sums so people can check-sum hack with these programs.
This will be my check-sum hacking software suit.
Now the programs on this DVD will also run like an encrypted file container and will be spaghetti-fide to prevent reverse engineering. Again, each program will have to have a verified registration number to run and the program will not run if it can not verify the registration.
I use check-sum hacking for time travel and it is my intention that this DVD be used for the same. And my other DVD can be used backup files and or data.
So "Conspiracy Against Time Travel" this is the reason you have not seen my using my home Internet very much lately. I know you guys are still in my home network. Thats ok, you can't see what matters. I have been taking a break lately from the Internet not because you guys have been harassing me but because I have been working.
So, I got two DVD's with compiled programs that have been or will be released with the rest of my books in the works.
Also, to know all my blogs are not up just what I want to be up at this time.
I have went back and greatly simplified how my code works. I did this by taking my complex algorithm's and making the algorithm's simpler. My BNS compression program which is not real compression I have table code simplified and no Aaron Hiniker your not getting that code. And, when I ran it with my BNS program I took a movie and using my table program made a 2 hour movie into two small numbers that I can write down on a piece of paper and put in my pocket. Then I put those two numbers back into my BNS program and it decoded the movie out. I ran a compare program with the uncoded movie and the decoded movie and they were the same.
Anyway the point is my new BNS table code speeds up the process. Its cleaner, simpler, faster.
And, I,ve done the same thing on my code to make a file into a weak and strong check-sum and decode that file from the weak and strong check-sum. Now, I am again scrapping some of my code (I put all scrap code into a file I don't just delete it) and putting in the new code.
I believe this is called a upgrade. I,ve been upgrading since 2008. On my check-sum software. I do have my own methods for my check-sums but my computer code now that creates files from check-sums is good enough now it can be used with any methods of check-sums.
If I wanted I could substitute other methods of strong and weak check-sums. Now my program could create files that have those check-sums but the quality of the files is as only good as the weak and strong check-sums being used.
But, I will stick with my check-sums. Ray Hudson, Darby Phillips, whats her name, and Aaron Hiniker will not get this stuff.
I,ve been told recently that if it is the CIA doing all this shit to me that their just fucking with me. Playing games with me to distract me and keep me from my work. To keep me from trying to bring this stuff to the public. And to steal my shit.
I also have been told that if there are not any laws governing this stuff that when it hits the public there will be.
Now, where does all this go? Will of course on DVD's that will be sold to the public. But my goal is to use my BNS to code my time travel media so no one can get it and to use my program that can create files from their check-sums to make my file scanner better.
My file scanner is the program that uses the check-sum creation program to scan the continuum meaning the past, present, and future for time-travel media. And to use my file scanner to establish communication with the past, present, and future.
You see my file scanner can use my programs to create any computer file no matter where, or when it exist. It can hack computers without ever connecting to that computer or the internet. IT DON'T NEED NO FUCKING CONNECTION TO HACK!!!!! NO EMAIL, NO COMPUTER FILE, NO DOCUMENT IN THE CONTINUUM IS SAFE FROM MY TIME TRAVEL COMPUTER CODE.
BECAUSE MY SCANNER CODE CAN TAKE MY PROGRAM THAT CREATES FILES FROM CHECK-SUMS AND RUN IT AS A SCANNER SCANNING ENTIRE RANGES OF CHECK-SUMS LOOKING FOR TIME TRAVEL MEDIA FILES!
And, using that with my time travel communication algorithms gaining real time communication with the past, present, future, and alternate time-lines is getting better and better with my faster simpler code.
Well that is all for today.
So, the punch line now is I am working on making my scanner code better.
Reactor1967 over and out.
And, as all ways Ray, Darby, Aaron and the rest of you conspiracy against time travel can suck my dick. Cock-Suckers.
For the DVD with my check-sum hacking programs there will be three programs.
1. Create config file. This program will take a known file and create a config file for it so in the event the the file is lost the config file can be used to reconstruct the file from its weak and strong check-sums.
2. Reconstruct - All this program does is take config files and reconstruct a file with the same weak/strong checksum that was in the config file.
3. File Scanner - Here is where the real power is. This program will take a weak/strong checksum range and construct config files for the reconstruct program to run. Now here again the file scanner does not give a shit about where or when these files did or will exist in space-time.
Well today I was playing with my DVD programs. I was using my strong check-sums to construct computer files. In my output I have my current strong check-sum subtracted from my target check-sum. As counter.bin is closer and closer to its target strong check-sum this number gets smaller and smaller till it reaches zero. Then my program prints FILE RECONSTRUCTED!!!. From there I can view the file.
I can't use my own internet and computers to talk with my publishers on my books or DVDs. Because of Ray Hudsons and Darby Phillips hacking of me I have to go to a computer and internet where they can't monitor me. They have my home network completely monitored. To work on my stuff I had to get a clean system and keep it off the internet and highly encrypt it.
Yeah Ray and Darby fucked up. If they were really watching me they would of never went for revenge on me for the way I talk about them because they are thugs. They tipped me off now they can't use their hacking shit to get to my time travel code. They really fucked up.
I am on to them cock-suckers now.
Problem for me is when the federal government does finally catch up with my books and DVD's will I get shut down. That is the question.
For me its not a issue to know that all files in space-time can be reconstructed with a weak and strong check-sum but for others this is a big fucking security risk.
No one is going to want people setting at home on their computers randomly reconstructing emails and documents that might exist on their personal private computer. That might exist on a business server. That might exist on a classified government computer system. And the kicker is. The emails, documents, and files can be in the past, present, future, or alternate time-lines. My software don't give a shit about where or when the check-sums I reconstruct as files existed.
I will say one thing about Ray Hudson and Darby Phillips they did teach me something. And, that is to be careful what I talk about on the internet.
Ray once told me that he is watching me. Well Ray, I am watching you too. Ray, has it not ever occurred to you that when you and Darby track me across the internet and show me where you are that I can make a record of that shit and create the big fucking picture with it.
Yeah, this whole blog not only what is in it but also what is not in it when my paths cross with that of the conspiracy against time travel it helps me create the big picture.
The big picture is I have been able to watch the conspiracy against time travel just as much as they have been watching me. So, the hunters have become the hunted and their prey is circling them.
These guys got my home address, phone, email, and everything. But, I don't tell these ass holes what I got on them. I have been playing a very advanced game of chess with the conspiracy against time travel going on 8+ years now.
Everyday I see what these guys have got. What they are made off. I think they have done their worst and aint got nothing left. But, for me I am still just getting started.
Well I got stuff to do then its back to my time-hacking, back to my updating my nuclear site, back to experimenting at my electronics bench and seeing what I can build.
Back to being watched by the conspiracy against time travel but Yeah they just think their watching me but really they are not because I KNOW WHERE THE BLIND SPOTS ARE. I WILL BE IN THOSE BLIND SPOTS DOING MY THING. When I am not in a blind spot I become very boring.
Reactor1967 over and out.
It is not very often that I find something that makes me laugh as hard as I laugh at Ray Hudson and Darby Phillips in their puny attempts to shut me up and run me off the internet and get revenge on me because I tell people about the stupid shit they do.
But, today I found it. I was watching YouTube about hash functions and check-sums and this guy in the video said "YOU CAN'T TAKE A HASH FUNCTION AND REVERSE IT TO GET A COMPUTER FILE". Man I laughed so hard I fell in the floor and my ribs starting hurting and I had tears coming out of my eyes.
I laughed like this for a few minutes and I had to calm myself down before I because seriously ill.
You see, when I create time travel media one of the things I do is I have my hash function for the computer file that I want to create. Now, this can be time travel computer media that I am searching for or known computer media that exist in my time line.
Then I have the current hash function of the file I have right now which was randomly created with the weak check-sum I am using.
I call this my destination hash function and my target hash function.
The destination is the hash function I have now. The target hash function is the function I want to bring my current file too.
Now, I use my own hash functions I specially designed and created to check-sum hack computer files and find time travel media. My computer program will come up with a change to the binary counter. It will compute the new hash function for that change.
Now, If my new destination hash function is not any closer to my target hash function the change is reversed and ignored. If the change brought my new destination hash function closer to my target hash function then the change is kept and becomes permanent at least at that stage. Later it may change again.
This is done till my destination hash function equals my target hash function. This is how I search for movies in space-time that will come out years from now. I watch the move. If or when it comes out I buy it so I can't be accused of stealing. This is what I do in my scanning program to find news broadcast of the future or future alternate realities.
You see, my programs don't give a shit when or where these files existed. I just have to do the math to calculate what check-sum range I need to create my files in and compute the hash functions for that check-sum range.
So please people I know science is suppose to be the know it all but seriously don't always believe everything some college educated person or scientist tells you. I am ahead of my time in in this area and so what can I say.
Here is the basic way to check-sum hack a file. Get a weak check-sum for it by just adding up all the bytes. Then compute a strong check-sum for that file. Now create a file with the same weak check-sum don't worry about the strong check-sum now.
Pick byte one from the counter file anywhere in the file is fine.
Pick byte two from the counter file anywhere in the file is fine.
If you can add 1 to byte 1 and subtract one from byte two do it.
Now, if you can't do this switch byte one and byte two. Put byte one where byte two used to be. Put byte two where byte one use to be. Now subtract 1 from byte 1.
Now you have a carry to worry about. Find a byte in the file you can add one too. This is byte three. Keep up where all these bytes were meaning record your changes so you can reverse them.
Now compute your new destination hash function. Is it closer to your target hash function. If it is keep the change in the file. If not reverse the changes.
Now, do this all over again.
Now the kicker is now you have the speed of the counter file. You can do this to AS MANY BYTES AT A TIME IN THE COMPUTER FILE THAT YOU WANT TO DO THIS TOO!!!!
IF YOUR YOUR DOING THIS ONCE (up to three bytes) IN THE COMPUTER FILE YOUR COUNTER SPEED IS 1X. Your operating on as much as 3 bytes at a time in the computer file.
NOW IF YOUR OPERATING ON 6 BYTES IN THE FILE YOUR COUNTER SPEED IS 2X.
IF YOUR OPERATING ON 9 BYTES AT A TIME IN THE COMPUTER FILE YOUR COUNTER SPEED IS 3X.
YOU SEE YOU CAN MAKE THIS COUNTER RUN AS FAST AS YOU WANT TILL YOUR DESTINATION HASH FUNCTION EQUALS YOUR TARGET HASH FUNCTION!!!!
MAN I CREATE WHOLE MOVIES, TEXT DOCUMENTS, AND EMAILS WHAT EVER THE FUCK I WANT THAT EXIST ON OTHER COMPUTERS SOME WHERE IN SPACE-TIME IN LESS THAN A HOUR IN THIS WAY.
I TIME TRAVEL SO FUCKING MUCH THIS WAY IT AIN'T EVEN A BIT FUCKING FUNNY. MORE SO WITH RAY HUDSON AND DARBY PHILLIPS HUMPING MY FUCKING LEG ALL THE TIME LIKE THE HORNY DOGS THEY ARE. BUT AS COMPENSATION I ENJOY WASTING THEIR TIME, MONEY, AND ENERGY ON ME. I AM WEARING THEM ****-******* DOWN. TIRING THEM OUT. AND, I AM DOING A DAMN GOOD JOB. I CAN DO THIS SHIT FOR EVER TILL THE DAY I FUCKING DIE.
THIS IS CALLED THE SPEED OF THE COUNTER. YOU CAN CONTROL THIS SPEED TO REACH YOUR TARGET HASH FUNCTION QUICKER!!!
NOW, IF YOU GET A FILE COLLISION, JUST INCREASE THE ENCRYPTION STRENGTH OF YOUR HASH FUNCTIONS TO AVOID THE FILE COLLISIONS.
FUCK, I TIME TRAVEL MY ASS OFF THIS WAY. I,VE SEEN SHIT NO OTHER MAN HAS SEEN OR WILL EVER SEE WITH MY TIME TRAVEL COMPUTER MEDIA.
DARBY I'M WRITING IN ALL CAPS AGAIN. WHAT ARE YOU GOING TO DO ABOUT IT? YOU AIN'T GOT SHIT. DARBY YOU AND YOUR FRIENDS CAN'T ACCEPT THE TRUTH OR LET THE PUBLIC KNOW ABOUT IT. EAT YOUR HEARTS OUT!!!
So, everyone please laugh your ass off at Ray Hudson and Darby Phillips for me. These government thugs can't stop me and will never ever stop me from time traveling and telling the world about it. And, as long as they hack my home network, look at my kids naked through their computer cams, stalk me across the internet, and harasses me I will continue to put their names in every fucking post I write till the day I fucking die.
To date this is one of my most informative post on how to time travel with computers i have ever made.
I hope I don't regret it later. It might hurt my book and DVD sales. I hope not.
Everyone enjoy, your welcome. For the conspiracy against time travel and you know who you the fuck you are you (not talking to the general public) can get on your fucking knees and **** my god damn **** and **** and **** my **** **** and go to god damn hell you ****-*******. You (the conspiracy against time travel aint got shit!! You can't touch this.)
AND LAST OF ALL. I DON'T OWE CONSPIRACY AGAINST TIME TRAVEL GOD DAMN THING. I ALSO DON'T OWE THE USA GOVERNMENT A GOD DAMN FUCKING THING. I OWE RAY AND DARBY AKA THE CONSPIRACY AGAINST TIME TRAVEL AND THE USA GOVERNMENT FUCKING NOTHING!!!
Reactor1967 coming to you from time travel one station over and out.