Neurohacking + Cybersecurity 108: Time Reversal Hacking Passwords before You Read a 2FA Code at 1.5 times speed of light
So, this further explains how time hacking works with scalar information transfer through biological and synthetic biology based AI BCPS and AI CPS systems with organic brain and synbio brain.
This post resulted in the culmination of reverse engineering an active ChinaCCP neurostrike on our team, such that our information on 2FA was getting compromised before we could type it into our computer systems for two factor authentication (this includes using 2FA on apps via smartphone as well as text message or even phone call message). After isolating each cyberattack category we came to the conlusion that we, internally were literally bugged and after further neurotechnology research this can occur in two main attack vector categories with an organic brain or a synthetic biology non-invasively dosed brain-machine-interface niBMI overlay or channel hack.
So, how did the neurohackers enter in our pin codes and 2FAs so fast (yes, they also got our bank account information and charged on the debit and credit cards)?
First, let’s go into the older neurotechnology that utilizes organic neurons and monitors these via ELF and scalar transmitters with neuron depolarization and subsequent SQUID monitoring in space systems then transit back to an AI super computer (quantum based or not depending upon the attack’s neurohacking platform).
Step 1: You go to check your email or a social network to login. The thought in your mind triggers a wetware niBMI CODEX response that then alerts the AI BCPS system (adversarial) in our case monitoring you that you are visiting a key node in their data, social network, business connection and intellectual property system. So, currently your adversarial AI attacker is ready and watching you (e.g. their eye on you).
Step 2: You then use your password manager to log into an account (e.g. if you use a password manager to hide the actual password and if you have ever read the actual password then your adversarial AI attacker also knows this). So assume you are not neuroaware and that you’re entering and not having the computer autogenerate a random set of alphanumeric and special character strings, therefore your adversarial niBMI AI has your password, from the first time you thought it and it knows the password and username/login associated from that first time you thought it when typing it.
Step 3: You then receive login approved now verify 2FA step and have option to select a text message or a app authentication. Why? because the platform hasn’t added 2FA FIPS keys yet (which can stop the login duplicaton part of the attack, but not the information transfer, as I’ll discuss in a bit). So, you opt for a text message and you pick up your phone (since you’re smart you have noise notifications disabled) and read the code and you notice on your computer when you go to login with the exact same code that it is no longer valid. Welcome to neurowar as the US Naval Academy Masters Thesis authors call it.
So, how in the world did step 3 work so darn fast that you didn’t have time to login first? Well you’re literally out tech’d with time-reversal hacking of your brain and cyber systems (subsequently). More to follow later this week on the exact calculations and systems utilized for this hack and how to specifically decouple from it, as it took our team time to reverse engineer this one (while we switched to 2FA FIPS keys to carry-on work during the midst of a neuroattack).
List of References
[1] https://phys.org/news/2019-04-time-reversal-violation-abundance-antimatter-physicist.html