Dream : 2 contracts about a real-estate deal one containing the word Halls.
Zaporizhzhia.
Запорожье.
3 assholes come under nuclear attack? understandable.
religion doesn’t support you anymore, or something like that : well if you brainwash people or individuals through religion than you shouldn’t do it in a way that you proof the fact by individuals hanging 100 crosses in their home. This is not my preferred family strategy.
Truth, (2015).
family, religion, government… generalizations, mass manipulation strategies.
The audio track of the video that you are playing contains a Cinavia code indicating that it is an unauthorized copy of professionally-produced content.
war: the loss of respect for human life. the loss of respect for human life as such is self-destructive. Which entity delivers disrespect for human life?
derogatory ethnic remarks leading to loss of respect for human life, e g. Iryna Farion. John Marks.
people’s deputy of Ukraine.
ethic <> ethnic.
genetic profiling based on equality of human beings.
genetic profiling based on inequality of human beings.
human beings are equal but they do different things.
human beings are unequal and do the same things – > mass manipulation based on genetic markers including viruses and vaccines.
Mt. Gox, Bitcoin exchange 2006.
Binance Holdings Ltd., branded Binance.
Changpeng Zhao.
Beyoncé.
I wonder if human beings that are performing in virtual connectivity are used and abused for crypto currency exchanges. This means that cryptography has collisions meaning if a<>b, H(a) transmits as b and H(b) transmits as a. That means that the hash is transmitted to a human being with network thinking technology and not only to crypto currency network computers. a hash of a block of items is timestamped and wildly published (spam). Writing this daily blog is a timestamped hash that documents the side-effects of a technology that bleeds over in network thinking technology.
somebody wants money phone call. Zelenskyy : you want money to proceed with war as disrespect for human life? Money can’t buy love nor respect.
Algorithms – ESA 2006.
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms.
assign a virtual world to each crypto currency e. g. Bitcoin land. the land exists since the crypto currency exists. the customers or owners of Bitcoin are the people of Bitcoin land. What else are they doing besides trading their currency? the hash of block of items are the objects and events in Bitcoinland. The timestamp proves that the data must have existed and creates a virtual reality in Bitcoin land. This is identity and data theft, violation of privacy if random data are being used to prove a Bitcoin transaction exists. A paper dollar exists, there is no data associated with its existence, like the perfume or sweat or fingerprint of the individual it went through.
privacy? privacy is already violated. e. g. a serial rapist or serial killer doesn’t have the right for privacy in a crime in progress scenario. However imagine the idiosyncracy in Germany, where you are not allowed to photograph a burglar or intruder of your home because he has the rights for his pictures, this is of course another case of extreme stupidness.
The monetary capital of a country, the stock value of a company, the value of a commodity, the value of land and real estate : Bitcoin or crypto currency has no value, the proof of a service being provided is data and identity theft through the timestamped hash algorithm.
the fact that you encrypt my data and use it as a service without paying me is still identify theft. It is also a violation of copyright laws.
quote Datum (DAT) is a cryptocurrency that is categorized as artificial intelligence (AI). As of February 23, 2023, Datum was trading at $5.26, with a market cap of $2,625.34 billion USD. However, some sources say that Datum’s cryptocurrency data is untracked due to inactivity or insufficient data. end quote.
My husband is a firefighter…
… and I am
(a) his flame
(b) his wild fire
(c) his spark
(d) flame ring of the gas stove
(e) pilot light
(f) candle light
(g) Icarus
(h) other
EROS B satellite launched on April 25, 2006.
EROS Token crypto currency.
Dinner Rules :
appropriate conversation
no surgery talk
no suicide talk
no ailment talk
no sensationalism with graphic content
no TV, cellphone or radio disturbance
whereas
eating a sandwich while professional conversing as a homicide detective or a forensic expert
the sharp s as the method to talk with a hypnotizing impact.
Dreamcatcher, (2003).
2.33 trillion US in circulation.
1.2 trillion of Bitcoin in circulation.
crypto currencies are not a currency because they are not part of a countries right to print money.
seigniorage.
crypto currencies are not a stock either because there are not company assets behind it.
it is a exchange. Does it follow the rule of an exchange?
since crypto currencies are called currencies, they must be looked upon as currencies of virtual countries.
PoW – proof of work.
denial-of-service attacks.
160-bit secure hash algorithm 1 (SHA-1).
electronic cash system is a mutual exclusive terminology : it’s either cash or electronic.
El Salvador, USD 2001, Bitcoin 2021.
Bitcoin is not a cash currency therefore El Salvador doesn’t have a currency.
POW/MIA prisoners of war missing in action.
SHA-2.
Merkle–Damgård hash function.
Merkle–Damgård construction.
SHA-512/224.
SHA-512/256.
2.285714285714285…
‘2’.
shavenoid.
shaven.
SH2.
China doesn’t allow crypto currencies, very smart!
So it was invented for spy agencies then it developed a life of its own.
Crypto currencies are a currency exchange and they have to be controlled as such.
denial of service is what Exner is doing since 2017,where is the connection, the sharp S hypnotizing technology?
quote : In cryptography, collision resistance is a property of cryptographic hash functions: a hash function H is collision-resistant if it is hard to find two inputs that hash to the same output; that is, two inputs a and b where a ≠ b but H(a) = H(b). The pigeonhole principle means that any hash function with more inputs than outputs will necessarily have such collisions; the harder they are to find, the more cryptographically secure the hash function is. end quote
This documentation seems to be about looking at the H(a) = H(b).
This deserves today’s “Computer Detectives Intercouse-Stupid Certificate”.
pigeonhole principle: which pigeonhole is this, virtual connectivity, the time all activity functions as the universal pigeonhole or drawer?
pursuit of happiness gone wrong : UBE3A imprinted.
the happy child behavioral program.
“happy child”.
the kill team that killed my brother’s child.
I know who you are and you can go and fuck yourself!
Benjamin Netanyahu, how are you?
Tell you savage kill team your genetic profiling program has flaws.
genetic warfare.
all men are equal but they do different things, especially the fucking-stupid. this deserves today’s “Computer Detectives Intercouse-Stupid Certificate”.
the patent : refinancing, to borrow and lend as a 1:1 approach.
the cental bank systems : to borrow and lend as a 1:17 approach. the loan cannot be repaid.
the cum-ex system : the central bank system is being melked by artificial stock crashes to created write-offs hiding profits. A real value loss doesn’t occur since other market prices down go up during the crash. Meaning the money cannot be reinvested since it needs to stay invested for the gain after the melking was crashed in. The cental bank systems and the associated countries will collapse. The right to print money is already undermined through cyber currencies. Cyber currencies is free trade as the consequence from overtaxation without spending control.
I was brought up catholic an it was normal for me to see one crucifix in a flat or classroom. acquaintances of mine collect decor crucifixes and they have about 10 in each room of their house. This is as odd to me as it might be odd for Muslims to see statues of Mohammad in a garden as mannequins piss. At least the Ku Klux Klan show only three.
das Sakrileg.
the sacrilege.
Avril Danica Haines.
Norbert O. P.
transient ischemic attack (TIA, lat. ischaemia cerebri transitoria).
Steve Buscemi.
aunt.
ant.
Renée Zellweger.
Anthony Richard “Ant” Anstead.
Antz (1998).
“TIA”.
the motherfucker drug dealer scenario.
the adopted daughter fatherfucker scenario.
man and woman are created equal but they do different things.
GE, the stock in the Rosemarie Meyer-Stoll portfolio.
quantitative Computertomographie (QCT).
quantitative Ultraschall (QUS).
Dual Energy X-ray Absorptiometry (DXA).
Digital Asset Exchange, DAX.
The name Dax derives from the French language and holds the meaning of Leader.
Deutscher Aktien-Index, DAX.
Dax, the singer.
Dax, the programming language.
DAX-1 mutation.
I was running through a bone density test today. Insider trading. a negative one is normal for bone density test.
As I said many years ago to Oswald: it’s not about not knowing enough, it’s about knowing too much and not knowing what to do with it.
the two conflicting programs are the global even triggers through endless decimals, the String Theory or whatever you want to call it and the receipts from the movie Munich (2005), tge Fetch App. How do they interact. My mentor’s environment already let me know about the interaction, I observed it and didn’t know what to do with it at the time, a couple of months ago. Since this interaction was communicated it is possible to predict that Benjamin Netanyahu will die. This is just interpretation of system dynamics not an option or a wish nor a regret. An unfortunate event that became predictable because of two different competing global mass manipulation methods.
The receipt at the Karstadt restaurant with the Apollinaris decimals for regular mineral water at the time.
Mike’s Aruba T-shirt and the death of Natalee Holloway.
Theresa talking about suicide over dinner, the song, the suicide at the church.