Seth Kontny
Dec 8, 2014 · 3 min read

grid for illumination of recharge…

hus altering how we view example images, meta data within images. Not always designed to monitor user for advertising and marketing purposes. Therefore we shall note a few pieces of information → One is electrodes, and generation of frequency within grid for illumination of recharge… Or usage of detection of user to screen detector resulting in electrostatic notice registering by controller of and within grid coordinates of (what we view) screen therefore depending on how image inception is occurring we have a mulpliplex of endless conclusions from such triggers. Again besides marketing to detect response of user (us) You me engagement within anything any application we use and or view. We have to then understand compression of image, source, which concludes to metadata. Yet again we have to understand how pixelation processes and results in what we view. Notice how if zooming on an image, and zooming out with your iPhone → iPhone 5 or 6.. Based on source we have occurrences of what appears as illusion of hyper pattern recognition however knowing we are primed as humans to recognizes patterns; are we seeing an illusion? In fact we are not, by triggers from electrodes interacting with with local voltage or field (touch) this electrostatic charge happens grid. When we move our fingers, thumbs we are making this electrostatic interaction fire / ignite. There adaptation to what we view occurs. With this stated let your minds open.. Ive wrote in depth implications of procedures and demonstrations live…. Now i spoke of metadata within images from all images we have shared, taken, tagged and stored on a proprietary service or device. Thus if metadata is organizing information. Tags example relationship.. How hard is it to craft image inception for deception into users mental station -> emotional cognition. Again meta tag..your ex Facebook relationship.. This is then crafted into pixilation of and within axis of image to alter into one seeing this person within image (emotional trigger). This is a small precise example without proper explanation as people do not speak or write about such…I have researched this, intruded in some scary realms and began patenting interactions of not explainable here. When occurring stumbling (mining data) of research initiatives within patents of united states government and ….. Leading this road, crossing paths with creators of such cognitive nuero studies and filings. Resulting in what others would only conceive is comphrended as fallacy. Breaks logic and end result has no destination in sight, as when i hit this obstacle benign a underdog, and experimented upon as if i was operating unconciously through a maze. Though this maze is everything we do, to every interaction, digitally. Meaning not of applications, websites, tv, advertisements, emails, social clusters, tapping, leading, intruding, listening. Yet i was not only of recognition of occurrence at all times, i began to play back, temp whomever or whatever whomever (..no leaks here) crafted patterns of user persona, from algorithms by themselves meaning human developing computational instruction for post interaction of. Machine leaning sent out to do research, adapting and leading, learning, mining and attempting again. Thus results of data from computational (machine(altered by person(human(developer, programer, architect designer. Yet beyond this understanding from both ends of node (dataset(intentional collection of digital sphere. What matters is energy, chemistry of of ___.. what matters is matter itself.. Observing and responding.. all for now on this public jot…

Cyber Security

Intrusions, injections, impersonations, persona capture depletion

    Seth Kontny

    Written by

    Cyber Security

    Intrusions, injections, impersonations, persona capture depletion