Getting Into The Mind of a Hacker

Ilexa Yardley
The Circular Theory
1 min readJun 23, 2017

Zero and one are X and Y so pi controls the hacker (and the hacked).

Mind of a hacker.

Zero and one are X and Y, diameter and circumference, so pi controls the hacker and his-her-its target.

Therefore, we can predict what is going to happen.

One database, one index, two hackers (or any combination) (pi connects everything to everything).

https://www.amazon.com/Circular-Theory-Ilexa-Yardley/dp/0972575626/

--

--