Neurohacking & Cybersecurity 110: M1 Bionic Chipset Pierced by ChinaCCP NeuroStrike now enables Tik Tok Content Pipeline Amplification
So, it was published that the M1 chipset manufactured by Apple in Apple City, China has been compromised on a hardware level, which leaks secret keys, enabling neurohacking via apps like Tik Tok.
Apple M1 City’s Bioinic Chipset Pierced by NeuroStrike [1] every person on earth with an M1 or newer has been compromised by ChinaCCP AI BCPS in one way shape form or another. The silicon chip flaw, enables secret key as well as wireless non-invasive ni neurotechnology brain-machine-interfaces bmi with the human brain. https://mashable.com/article/apple-silicon-m-series-chip-vulnerability-hackers-encryption-keys
So what does a bionic chipset, when enabled with wireless technology and interfaced with a person that has synthetic biology successfully integrated into them (not all people are successfully integrated with synthetic biology, due to various factors)? It gives you “superhuman” performance or “degradation” effects depending upon the use case and is by all means a double-edge sword, as billions of Apple users are now finding out as well as Tik Tok users (the use of both has to be worse than the use of either independently to be optogenetically hacked as well as hardware bionic chip hacked). God bless those neurocompromised people out there, billions of them now.
In the world of neurotechnology, there are two areas:
Content (byte-based)
Consumption of information via screen of smart TV or smart phone or from bluetooth chipset or other wireless chipset linked to the phone
Hardware delivery pipelines for content (data in-the-flow byte-based)
access to the secret keys on a hardware device and operating system enable data-in-the-flow intercepts and direct delivery of neurotechnology enabled information, through apps like Tik Tok to directly and covertly influence a user’s behavior through direct physical control of the mind through a hybrid synthetic biology based niBMI channel build-out that can be switched per key signal. When a phone manufacturer’s secret keys are hackable, then all bets are off on securing the device’s neurotechnology hardware and software data in the flow intercepts. Therefore, the M1+ series of Apple phones are broken and in my professional opinion immediately cease use of, above and beyond the fact that they are manufactured in China. The phones have backdoors in that can give ChinaCCP neurotechnology access to your brain data and contro you (worse case):
So, now the question is what smart phones are safe? Well since ChinaCCP turned on their 3d space, time and the vacuum weapon of war anything made before or on 2016-2017 and not in China or affiliated with a Chinese national (e.g. their government). Specifically, avoid Lenovo, as that is a guaranteed ChinaCCP backdoor into you as well as neurotechnology backdoor. I can’t stand ChinaCCP and their mind and brain thievery/theft.
When there is a hardware chipset compromise, it means all bets are off. Anything M1+ coming out of Apple City, China is contaminated by ChinaCCP NeuroStrike in my professional opinion, based upon independent research into reverse engineering neuroweapons that hit our team in 2022 as well as the fact that have had team members with Apple products (as has majority of the world). The difference is we switched to older hardware pre 2017 manufactured date upon reverse engineering the neurostrike domain operations in 3d space, time and the vacuum.
When ChinaCCP Coalition turned online their echelon (AI BCPS) system 2018/2019/2020, the prior 2000/2001 Jam Echelon Day initiative took on a whole new perceived reality, literally, through 3d space, time and the vacuum. Now we have NATO AI BCPS and China AI BCPS in “hyperwar” through 3d space, time and the vacuum as well as higher dimensional spaces ( with gate keepers). I find it humbling that the Dali Cross is a 4D key, known as the tesseract and part of a CODEX mult-factor authentication MFA system, for the path less traveled.
[0] https://archive.org/details/DJI_1506456264_2017_09_26_9.3.5_gitlab_backup
[1] https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/
[2] https://www.zdnet.com/article/apple-vision-pro-hands-on-buying-advice/
[3] https://www.zdnet.com/article/jam-echelon-day-doomed-to-failure-say-experts/