How Do All Hacks Work?

Ilexa Yardley
The Circular Theory
1 min readMay 15, 2017

They must conserve a circle.

X and Y (good and bad) conserve a basic circle.

Anything that can be used to help can obviously be used to hinder. We all know this. And, then, we ignore it.

So eventually, the hacker (surfaces in time) (to remind us).

An algorithm is dependent on an uber-basic circle (any algo will do).

If zero, then one.

Conservation of the circle is the core dynamic in nature.

https://www.amazon.com/Constant-Liability-Conservation-Circle/dp/1534712097

--

--