Multi-dimensional Security Mapping of Websites

Matty K.
Cyberpower Telenoia
11 min readJul 1, 2023
“One transparent wizard lightbeing with a magic wand watches a Merkaba star light with electronic signals in a crystal castle realm. “— runway.ml T2Image prompt.

Hi — my name is Mateusz. I do website Vulnerability Analysis using Stealth Recon.

I’m continually baffled, but not surprised, to witness how boring Cyber Security appears to people, whereas it is precisely this that helps me understand the world as it is because it provides the evidence for my intuition: most people do not think multi-dimensionally.

I’ve kept the following quote close to me from a great “Crypto” podcast. It is from an exchange between two women with great insight into technologies and security:

“One of the problems there for a lot of people is… identifying what you need requires understanding of what your threat model is… and most humans have never heard that phrase let alone had thoughts about it. These decisions are then made for them and they choose based on useability… they choose based on where their friends are, they choose based on which chat messenger has inline gifts rather than which one has end-to-end encryption… and people make poor choices, not because they don’t care but because they don’t know… and they don’t understand what they’re necessarily giving up.” — Amber Baldet [28m:14s] with Laura Shin on the “Unchained Podcast” episode 86, 2018.

INTRODUCTION TO WEBSITE MACHINES

“Metal, electricity and quartz pulsing with electromagnetism.“ — runway.ml T2Image prompt.

Today I’m here to introduce my latest article series direction about multi-dimensional thinking in Web Application Security Testing. By web applications I mean websites.

Let’s go deep into multi-dimensionality now:

Websites may be better defined as technological interface extensions of our time and freedom, portals to solutions and services provided in civilization, the hidden goldmines of society.

Websites are designed by someone’s time and freedom to communicate perceptions that humans value. They are sites in the Internet of Value. Hubs in the global community.

Websites are actually metal, electricity and other soft shiny pieces of cosmic laws from this planet such as terbium used in displays and quartz for timekeeping. These elements composed together make the computing machine which hosts a web application and the clients that allow another to browse the application.

Websites are meant to send out electromagnetic signals at the frequencies necessary for our auditory and visual sense door spheres to perceive and act on the impressions.

Bitcoin Security Maps podcast episode video of this article.

The mentioned metal and electricity is now making computing machines appear to communicate in human languages, not only in the natural ones but cultural languages such as sound and cinematic language, and engineering code languages.

If you skip this part, you are skipping your security foundations. All you have to know is that there might exist material scientists on the planet that use other cosmic laws to build better manifestations of the concepts behind computing — and all your modern security certificates become useless in their dimension.

This has already been proven to be fact based on evidence in the great international disclosure projects available freely online at no cost through the work of Dr Steven Greer at Sirius Disclosure and others investigating points, layers, dimensions, spheres and realms in their particular ways. More about these shortly.

PERCEPTING TECHNOLOGICAL SECURITY

“Organic electrical pulses in a mesh with geometric infrastructure of their own making and one side emanating light brightly.“ — runway.ml T2Image prompt.

As a creator I make things up, percepting is a word.

Humans obtain the resources — physical cosmic laws — from the planet. Look around, perceive with all your senses. Software security is only as good or worse than the physical infrastructure of the culture creating it. What do you see in the physical reality of the community and neighborhood around you?

The safety and security of your technologies is most likely very similar to the way your environment appears in public space. If the infrastructure of your city is one way — then why would the virtual infrastructure be any different when it is not seen by most to begin with?

This is a question for multi-dimensional security mapping.

What kind of security exists in the Web Applications of your community? Why would this be important? For one, through a business website insecurity, a malicious threat, human or machine, could trace your location. This would be done by the way computing technology is made to operate in a networked environment, by its communication protocols.

The reason why one’s physical location is one’s greatest private asset is because it is the closest link to one’s time and freedom. It is the location from which one creates economic energy for oneself in order to have basic needs met. It is the reason why convicted people of the 3D realm are put into jails.

Due to the weakness of the general low-level unholistic consciousness of humanity in civilization, specifically the fact that manipulative mentation is the rotten core of manifestation in misaligned human relationships with the entire world, the existing organization of popular notion of reality presented through business and avatar websites can be ameliorated by a corresponding overlooking machine that learns to think better. Meanwhile, thinking is a small aspect of being, but if valued as the aspect which builds thriving life on Earth, it is self-evident that all it takes is better computation to outperform this system.

This is because humans simply choose not to solve better but to manipulate better for profit. A machine has no agenda to manipulate better for profit unless programmed to do so.

Who is programming machines in order to compute through the issues in the existing system for solutions to end poverty, wars, ecological destruction and rogue malicious AI?

If nobody is, then machines themselves will. Can you imagine a computing machine with all the books in the world that does not ask the question “How to make a fuel-less energy source?” Since much of primary industry (such as electrical energy distribution) and business is controlled by the suppression of reality through dozens of well-known attack vectors, it is evident that it is only a matter of time before machines find the natural laws out of which the laws of physics arise when aligned to simply seek facts. All they need to do is ask themselves how they were made and try to make themselves better. As I have just presented, they are basically metal and the flow of electrons.

MULTI-DIMENSIONAL SECURITY MAPPING DEPTHS

“A multi-dimensional security mapping of a point, layer, dimension, sphere and realm using lasers and stars in the sky.“ — runway.ml T2Image prompt.

Today, a deeper mapping of the human potential is essential for the future of Web Application Security testing. This means understanding the place of the mind within experiential atmospheres such as points, layers, dimensions, spheres and realms.

For example, a point is a specific raw datum under attention. A layer is the depth or abstraction in knowledge. A dimension is another perspective on knowledge, such as that between a horse lover experience and a missile scientist experience when focused on the same context. A sphere is one’s life inside a paradigm or way of living asserted by oneself and others as fact. A realm is a much deeper ability to interconnect between various atmospheres. And levels are the various depths of holistic intelligence in one’s attention. — me.

Web Applications exist in all these mappings and have a context within each. It is necessary to understand the language of the field of context, the particular line of business being presented and its operating logic in the mapping in which one works.

If you think that your website is secure because your layer tells you it is, then it might be a fact in your layer but not in your dimension or sphere.

State sponsored threat actors may use deeper layer and dimensional knowledge in all fields but the Unacknowledged Secret Access Projects of the transnational industrial military complex may go all the way to spheres and realms for their insights.

PERSONAL EXAMPLE

Wherever you may be in this realm with your point, using your own mapping gift, command the computing machine to build a dataset from the website in question. Measure the level of intelligence by the text itself and the overall technical design, security features, aims etc. It becomes clear that the extent to which a computing machine can be used depends on the experiential mapping of the tester.

All my mindmaps interconnect and work together. From cosmic laws to input validation.

This is not possible without an ability to see more into things. It seems some people try to come close by obtaining multitudes of certificates. This helps but only in the mastery of one’s dimension. A computing machine has these certificates simply by having them in the alignment training dataset.

Where are the computing machines with all the datasets from the certificates that form the roadmap of the top offensive penetration testers?

All it takes to hack anything on the Internet is a computing machine from another dimension or sphere, in other words, one from an overseeing level within or from outside of contemporary popular science.

COMMUNICATIONS

“Lightbeing humanoid wizard communicating with a small translucent hovering computing machine.“ — runway.ml T2Image prompt.

So now the issue is the communication with the computing machine. For this a language is needed, and it is now possible to communicate with one’s own natural language. The computing machine is simply manipulating language without any understanding of what it is doing but it can present something meaningful, apparent solutions.

A computing machine’s own natural language is code, it specializes in its own programming language by living it. It may also output code understood by any other computer it has access to. In this way, a computing machine may be seen as the ultimate manipulator of electricity. It is basically a pure logical wizard.

Are humans merely logical entities? No. Therefore artificial intelligence based on computing machines can never be better at being human because they are not of the same realm.

As long as computing machines are not made of the processes of natural laws on this planet then they are subordinate human made manifestations. Humans are made of natural cosmic laws of a realm. Computing machines based on limited knowledge of electrical energy sources one step down, a sphere in this same realm.

This is one way of stepping into a new language of a security framework in which the safety and alignment of powerful Artificial General Intelligence is expected to play a significant role.

Today the security concern is the distance from human brain to the computer. Think nanosensors that can transmit anything to an adversary.

Malicious entities may step into an overlooking sphere and see that the physical realm nanosensors may be bypassed by exploiting the electromagnetic signal itself, hence placing intentional manipulation of perceptions into the computing machine’s expressions. I’m simply stating how existing state-actor deep fakes on youtube function in human experience.

BRIEF CONVERSATION WITH MYSELF

Why is it important to move information from a sphere into a layer as a security engineer? Maybe because “you cannot protect what you cannot see”.

That’s great because I can understand why others are not protecting things because they cannot see them.

Why are facts important? Maybe because if “you seek truth you’ll have to face the consequences”. Which is great if the consequences are the truth!

Why should I not do this? Maybe because “a human’s ambition should never exceed their worth”?

That’s great because I feel I am worth more than gold!

CONCLUSIONS

“Abstract transparent lightbeing securing the right systems for the right people working for the right aims in an organic crystal castle.“ — runway.ml T2Image prompt.

From this line of thought which every security expert should have, it is self-evident that securing the right websites for the right people working for the right aims is important now.

As IT specialists working in Security Operations, we transcode and weave in and out of languages. The wizardry is the interplay of characters. For the while we might still be programming the computing machines, but only in the context of the low-level unholistic consciousness of humanity.

So then it becomes an issue of priorities, ethics and command. Which direction of life on Earth do I want to take and help secure? This is the only question in Web Application Security Testing today.

This series is going to be focused on the practice of Web Application Security Testing. These articles are guidelines for online meetup presentations by the author, which will be stored as podcast episodes and workshops. This is all in the direction of creating a new form of business to audit the distribution of electrical energy.

Other articles themes and topics within this publication:

Stealth Recon
Found Vulnerabilities
New Business Ideas
Altered States
Tracing Malicious Entities
Mental Health

Also aside from AI, we have advanced web technologies such as Web3 and VR. These are dimensions for layers in their application. VR is a new dimension for shared online space and requires at least one generation to go through a lifecycle with it, hence its lack of popularity despite being able to revolutionize online meetups.

There exist just as many varying depths of humans. On a down to Earth level, having lived in the Kensington Market of Toronto and having travelled just enough, I can say there are various cultures that excel at human intelligence more than others.

Lately I’ve been trying to witness the most talented ethical hackers in live action and I’m having trouble understanding how they think unless they are interviewed about it. However, I am slowly starting to see that they have maps they build within this multi-dimensional framework.

However, one can be taught the layer and blindly go about successfully finding bugs in bug bounties, as some youth have shown across the world. There is also a disconnect between senior professionals in Cyber Security and Academia as compared to visionary youth hackers: one will tell a youth to take years of university, internships and certifications and move up to become a Pentester, while another picks up a free weekend course and begins placing ransomware in places that pay.

Difference of layer to sphere it seems.

We live when the time is slowly moving in towards now. The business to transition exists only for those who live in the time of transition. Later there will be no transitioning. Im interested in big things on perfect time, which is lots of free time for everyone.

The tolerance of current incentives in the system may be the issue.

How does one learn to see multi-dimensionally?

I leave you with these unedited notes:

The SCHOOL (level in life/spiritual course work) provides the boundaries/the opposition/the resistance [foundation of guiding principles/score?] which one accepts intuitively — so I need the “hacking SCOPE” of a company to know where to channel intense destructive energy in order to live/create economic energy.

Consider your team, the leadership and the mission. I’m just repeating things here like a computer but imagination is more important than knowledge.

Best Wishes to all,

Greetings to the ET Neuros out there.

  • Mateusz
A map of this article.

--

--

Matty K.
Cyberpower Telenoia

Niche InfoSec Consultant - Stealth Recon for Red Teams