A Brief on Cryptography
Throughout the course of Human History there has developed a need to protect sensitive messages by means of altering the text in some way to prevent anyone but the message's intended recipient from being able to read.
The two parties, sender and recipient, will arrange ahead of time a system by which a message can be encoded and decoded.
For those of you familiar with Cryptography, that's what I'm talking about here.
There are various ways you might be able to come up with on how to accomplish this feat, however.
The most simple way is to replace alphabetic characters with numerals.
We are familiar with the number 17 here, no? 17 = Q.
CIPHER [A=1, B=2, C=3, D=4, E=5, F=6, G=7, H=8, I=9, J=10, K=11, L=12, M=13, N=14, O=15, P=16, Q=17, R=18, S=19, T=20, U=21, V=22, W=23, X=24, Y=25, Z=26]
So, if I wanted to hide a message, it would look something like this:
23;23;7;A;23;7;1;0; 23;8;9;20;5;18;1;2;2;9;20
While anyone could be able to decode this message easily, they would have to first be told that it meant something other than its literal interpretation. Additionally, while everyone knows how to formulate the CIPHER, unless they use it frequently they won't know to use it here.
If your message is especially sensitive, however, you can further obfuscate it by implementing a LOCK and KEY.
The LOCK(formula) looks like this: y=x+a
The KEY would be "a."
For example, I will now scramble a message using that formula. It's up to you to determine what the KEY is:
2;2;12;F;2;12;6;0; 2;13;14;25;10;23;6;7;7;14;25;0; 4;20;26;13;6;1;10;18;20;23;10;25;13;6;19;4;20;26;16;19;20;2
Hint: The first half is the same as the original message.
You can use https://www.dcode.fr/letter-number-cipher to help you out. There are tons of other ciphers to play with there as well.
What I actually did here was combine two Ciphers into one. I took a Letter->Alphabet Cipher and combined it with a Numerical Shift (Caesar) Cipher.
https://www.dcode.fr/caesar-cipher
Another Way
This same procedure isn't just restricted to text, however.
There's another way to encrypt a message. One that computers cannot as of yet comprehend. The examples above can be solved using a computer algorithm, but what if you wanted to hide text even more and require human experience to act as the necessary component in solving the puzzle?
For example, consider the following:
"He lost his silver spoon."
How might you interpret this sentence?
You can easily interpret it literally, and assume a man has lost his silver spoon, but if you are aware of idioms and expressions, the message has a completely different connotation.
https://idioms.thefreedictionary.com/silver+spoon
silver spoon: A metaphor for ample wealth that has been passed down through inheritance. (Used primarily in the phrase "born with a silver spoon in (one's) mouth.")
By replacing "silver spoon" with "inheritance" we get to explore a deeper meaning of what appears to be an innocuous case of a man losing his silverware.
Make no mistake, THIS IS A CIPHER SYSTEM.
You CAN absolutely utilize this dynamic in order to create a Cipher based on Metaphor, Analogy, Allegories, Idioms, Parables, and Symbols.
I have to see a man about a dog.
If you are stuck in literal thinking, you'll miss out on what is actually being said.
https://idioms.thefreedictionary.com/go+see+a+man+about+a+dog
To leave somewhere without explaining where one is going. The phrase is usually used as part of an obvious euphemism for going to the bathroom or going to get an alcoholic drink.
This system cannot be cracked by current computer systems, simply because it requires a KEY that comes from CONTEXT, and further elaborated upon by the Human Experience. A computer cannot think in ways of metaphor, and so it would require such a girth of folk lore and idioms in order to figure out what a hidden message truly means.
The Acroamatic Cipher
When you encode a message behind a wall of Metaphor, Analogy, Allegories, Idioms, Parables, and Symbols it is called the Acroamatic Cipher.
https://www.sacred-texts.com/eso/sta/sta42.htm
- The acroamatic cipher. The religious and philosophical writings of all nations abound with acroamatic cryptograms, that is, parables and allegories. The acroamatic is unique in that the document containing it may be translated or reprinted without affecting the cryptogram. Parables and allegories have been used since remote antiquity to present moral truths in an attractive and understandable manner. The acroamatic cryptogram is a pictorial cipher drawn in words and its symbolism must be so interpreted. The Old and New Testaments of the Jews, the writings of Plato and Aristotle, Homer's Odyssey and Iliad, Virgil's Æneid, The Metamorphosis of Apuleius, and Æsop's Fables are outstanding examples of acroamatic cryptography in which are concealed the deepest and most sublime truths of ancient mystical philosophy.
The acroamatic cipher is the most subtle of all, for the parable or allegory is susceptible of several interpretations. Bible students for centuries have been confronted by this difficultly. They are satisfied with the moral interpretation of the parable and forget that each parable and allegory is capable of seven interpretations, of which the seventh--the highest--is complete and all-inclusive, whereas the other six (and lesser) interpretations are fragmentary, revealing but part of the mystery. The creation myths of the world are acroamatic cryptograms, and the deities of the various pantheons are only cryptic characters which, if properly understood, become the constituents of a divine alphabet. The initiated few comprehend the true nature of this alphabet, but the uninitiated many worship the letters of it as gods.
Whenever Q says something like "Plants need water." Q is trying to show us how they use the Acroamatic Cipher in the day-to-day.
Those familiar with Decoding Symbols will know this already: https://decodingsymbols.wordpress.com/
This is the basis for their "Comms."
Whenever they randomly talk about dogs or "muh climate change" they aren't talking literally.
To interpret it as such would be like thinking they are actually going to see a man about a dog...
Don't be stupid.
Water = Information / Instructions
Plant = Someone who infiltrates an organization to gather evidence.
Climate Change = A change to their Global Climate (the power hierarchy of the Elites)
Carbon Emissions = Gossip and Rumors about "Dirty Secrets" AKA "Dirty Talk" AKA Conspiracy Theories
Dog = Assistant / Someone on a leash. "Man's best friend."
All these are examples of the Acroamatic Cipher in use.
When we see Dog Comms, this is the tool that's being utilized.
CONTEXT is KEY.
When Q tells us what the KEY is, he isn't saying there's just one singular KEY. He's tuning the Cryptogram to the proper CONTEXT.
Senate is key, Money is key, Military is key, the Graphic is key...
Why are there so many keys?
Because there is more than one LOCK? Because there are more than one DOOR? More than one way to find the TRUTH?
They KEY changes, just like I can change the Cipher Key. Just like how I can zoom in onto a MAP. MAPS within MAPS. Everything is Fractal.
Context points us to the KEY.
The CIPHER in widespread use is the Acroamatic Cipher.
For more of this, here's my series of Thinking in Symbols. Not everything is set in stone, it's just my interpretations.
Archives:
10 Freemasonry and the Game of Life (1)
14 Vampires, Werewolves, and other Mythical Creatures
Something to meditate about. Thanks for posting! It found your post to be well written and I especially like the way you guided me through the subject. Well done!
One of the things I found myself somewhat disagreeing with is the phrase: plants need water.
Drain the swamp: A swamp is fed by water. Washington swamp is fed by money. (think FTX)
I happen to think water = money in the context of, for example: a certain lawyer I could mention or that little bitch testifying in Congress with the ketchup on the walls and Trump grabbing the steering wheel of the beast.
As for the stupid .... indeed, Ilias and Odysee hide three levels of comprehension. The most plain, the exoteric, are for those who are not initiated, the stupid. The esoteric for those who are introduced ( in = movement into, tro = terra, duc = leading, ed is added as conjugation to arrive at perfect tense), a guided tour to the initiate underground.
You're not wrong, but not for the reasons you might think.
Information is a form of Currency.
https://www.etymonline.com/word/currency
What other things can be used in barter? Gold? Water? Herbs & Spices? Information? Blackmail?
All these things are "current", or flow between peoples as the medium of exchange.
Money (fiat, specifically) is a thing of Man, which doesn't naturally occur. Currency, however, does naturally occur, and comes in various forms.
Fiat has no true substance, unlike a gold-backed dollar. So when you say water is "money" it's only because you sense it's ability to flow.
In reality, ALL things that have potential value can be considered viable Currency. Money is just one of those, so long as Man values it -- which in all honesty is slated to come to an abrupt end quite soon.
Agreed.
What does a specific plant need. blackmail, Q said, is the currency of the DS.
But what is blackmail, if not information?