VOX of SU Profile picture
Sep 18, 2025 15 tweets 12 min read Read on X
How to Harness your Own Free Energy for Free

Free energy doesn’t have to be complicated… humans have done it for thousands of years before the grid.

Most of the complexity comes from the system itself…
permits, regulations, “certifications”…
all carefully designed to gatekeep what is actually simple and ancient.

This thread 🧵, provides the minimal resources needed to generate free energy for a home or small community, requiring no special expertise and easily shared knowledge.

It provides a full spectrum of free energy harvesting, using what nature provides and what the system throws away. These methods require minimal tools, rely on salvaged or natural materials, and break the illusion that energy must be bought or controlled.
Tree Battery: Step-by-Step

Purpose: Harvest small amounts of bioelectricity from a living tree to power LED lights or small devices.

Materials (Free or Salvaged)
- 1 healthy living tree
- 1 copper wire (1–2 feet long)
- 1 zinc-coated nail (or galvanized steel nail)
- 1 small LED light string or low-voltage device (like a garden light)

Optional: multimeter to measure voltage

Instructions:
1.Choose a Tree:
Select a healthy, well-rooted tree with good moisture content… maples, oaks, or fruit trees work well.

2.Insert Zinc Nail:
Hammer the zinc nail gently into the tree about 1–2 inches deep, at waist height.

3.Place Copper Wire:
Insert the copper wire into the tree a few inches away from the nail.
The zinc acts as the positive terminal, and the copper as the negative terminal.

4.Connect the Circuit:
- Attach a wire from the zinc nail (+) to the positive lead of your LED string or device.
- Attach a wire from the copper (-) to the negative lead.

5.Light It Up:
A single tree produces about 0.5–1 volt.
Chain multiple trees in series to increase voltage…
like batteries linked together.

Output Uses
- Power small LED garden lights.
- Run sensors or tiny electronics.Image
Saltwater Battery (Ultra Simple & Non-Toxic)

Best For: Beginners, teaching energy principles, low-power lighting.

Materials:
- Plastic or glass container (jar or bucket)
- Saltwater solution (salt + water)
- Copper strip or wire
- Zinc nail, galvanized nail, or scrap steel
- Wires to connect

Instructions:
1.Mix saltwater until fully dissolved.
2.Place the zinc nail on one side of the container.
3.Place the copper strip on the opposite side.
4.Attach wires to each and connect to a small LED or device.
5.For higher voltage, connect multiple jars in series (like linking AA batteries).

Output:
Enough to power LED lights, sensors, or trickle charge a small battery bank.Image
Aluminum Can + Charcoal Battery

Best For: Mid-level DIY, longer-lasting than saltwater.

Materials:
- Empty soda or beer can (aluminum)
- Charcoal (crushed into small chunks)
- Saltwater or vinegar
- Copper wire
- Cloth or paper towel

Instructions:
1.Fill the can with charcoal and soak with saltwater or vinegar.
2.Wrap copper wire around the outside of the can, leaving a free end.
3.Insert a galvanized nail into the charcoal as the other electrode.
4.Connect wires — copper is negative (-), nail is positive (+).
5.Chain multiple units together for more voltage.Image
Clay Pot / Soil Battery (Ancient Tech)

Inspired by: The Baghdad Battery…
one of the oldest known power sources.

Materials:
- Clay pot or flowerpot
- Dirt or damp soil mixed with salt or vinegar
- Copper strip or wire
- Galvanized nail or scrap zinc
- Water to keep the soil moist

Instructions:
1.Fill the pot with the prepared soil.
2.Insert the copper strip on one side and zinc nail on the other.
3.Keep the soil damp for consistent conductivity.
4.Link several pots together for higher voltage.

Output:
Steady trickle charge, perfect for continuous low-power needs.Image
DIY Lead-Acid Battery (Advanced)

Best For: Serious off-grid storage, like powering an entire small solar system.

⚠ Warning: Use protective gear…
this involves acid.

Materials:
- Two lead plates or salvaged lead pieces
- Plastic container (like an old Tupperware or battery case)
- Sulfuric acid (can be sourced from old car batteries or diluted drain cleaner)
- Distilled water
- Wires and clips

Instructions:
1.Place lead plates into the container without touching.
2.Mix sulfuric acid with distilled water (carefully, always add acid to water, not water to acid).
3.Pour into the container to cover the plates.
4.Attach wires to the plates.
5.Connect to a solar panel or generator to charge.

Output:
Can store enough power to run LED lighting, small appliances, or emergency systems.Image
Scaling Your Battery Bank

Series Connection: Connect positive (+) to negative (-) to increase voltage.

Parallel Connection: Connect positive (+) to positive (+), negative (-) to negative (-) to increase capacity (run longer).

Example:

Four 1.5V saltwater batteries in series = 6 volts

Four 1.5V batteries in parallel = 1.5 volts, but 4x the runtime

Why DIY Batteries Matter

Commercial batteries are taxed, controlled, and regulated to keep people dependent on the grid.

When you build your own:
- You bypass corporate supply chains.
- You recycle waste into something valuable.
- You teach your community how energy is created and stored, breaking the illusion of scarcity.Image
Image
Image
Image
Solar Energy: Harnessing the Sun

The sun constantly bombards the earth with more energy than humanity could ever use.

You don’t need expensive panels…
just focus, trap, or redirect it.

Passive Heat Storage

What You Need:

- Old barrels or buckets, painted black
- Clear plastic or glass sheet

How:
1.Fill barrels with water and place them in direct sunlight.
2.The black surface absorbs radiation, heating the water.
3.Use stored heat at night for warmth, cooking, or cleaning.

Uses: Free home heating, greenhouse warmth, hot showers.Image
DIY Solar Cooker / Oven

What You Need:
- Cardboard box or wooden crate
- Black paint or soot
- Aluminum foil, broken mirrors, or even chip bags
- A piece of glass or clear plastic

How:
1.Paint the inside of the box black.
2.Line the lid with reflective material angled toward the sun.
3.Place food or water inside, cover with glass.
4.The sun’s heat becomes trapped… temperatures can reach 250°F (120°C).

Uses: Cooking food, sterilizing water, pasteurizing tools.Image
DIY Solar Power: Step-by-Step

Purpose: Harness sunlight to create free, renewable energy for basic needs.

Materials (Free or Inexpensive to Salvage)
- 1 small solar panel (50–100W; broken or scratched panels work too — still produce power).
- 1 deep-cycle battery (can use an old car battery if free).
- 1 charge controller (prevents overcharging… $10–15 or salvaged).
- Wire (can be salvaged from old electronics).
- 12V LED light or USB charging adapter.

Optional: multimeter to test voltage.

How It Works

The solar panel captures sunlight and converts it into electricity.
The charge controller regulates the flow, preventing damage to the battery.
The battery stores energy for nighttime use.
Your devices or lights run directly off the battery.

Instructions
1.Place the Panel: Position it to face south (northern hemisphere) or north (southern hemisphere).

Angle it about 30–45°, tilted toward the sun.

2.Connect the Charge Controller: Run the positive (+) and negative (-) wires from the panel to the input terminals on the controller.

3.Connect the Battery: Run wires from the controller’s battery output to the battery terminals.

Red wire to positive, black to negative.

4.Connect Devices: Plug your 12V LED light, fan, or phone charger into the controller or directly into the battery (if it has ports).

What It Can Power
- 3–5 LED bulbs for lighting
- Phone charging and small electronics
- Portable fans or radios
- Emergency refrigeration with efficient coolers

Even a damaged solar panel produces usable energy.
The entire system can be built with scrap materials and requires zero technical expertise once the diagram is followed.Image
Water Power… Micro-Hydro

Running water equals constant kinetic energy… day and night.

Mini Water Wheel Generator

What You Need:
- Small stream or river access
- Salvaged bicycle wheel or wooden paddles
- DC motor (old treadmill, printer, or car alternator)
- Wire

How:
1.Attach paddles to the wheel or use spoons/plastic bottles as blades.
2.Place the wheel so water current spins it.
3.Connect the axle to a DC motor.
4.Run wires to a battery or device.

Uses: Powers off-grid cabins, lights, or radios.Image
Wind Power: Simple Turbine

Wind is free movement… easy to capture with basic tools.

DIY Windmill

What You Need:
- Old fan blades or PVC pipes cut into blade shapes
- Salvaged car alternator or DC motor
- Tower or pole for mounting
- Wire

How:
1. Build a cross-shaped hub for blades.
2. Mount to a vertical pole in open space.
3. Connect spinning hub to motor shaft.
4. Wire to a battery or direct-use device.

Uses: Lighting, battery charging, supplemental power.Image
Human Power… Direct Mechanical Energy

When no natural forces are available, you are the generator.

Bicycle Generator
- What You Need:
- Old bicycle
- DC motor or alternator
- Belt or direct contact roller
- Wire and small battery

How:
1. Mount the bike frame securely.
2. Connect rear wheel to motor shaft with a belt or direct roller.
3. Pedal to generate electricity.

Uses: Charging devices, emergency lighting, radios.Image
Atmospheric Energy: Tesla Principles

The earth and sky are filled with natural electrical fields.

Static & Lightning Harvesting

What You Need:
- Copper wire
- Metal rod or long antenna
- Glass jar or ceramic insulator

How:
1. Place the metal rod high (on a tree or pole).
2. Run the wire to a jar wrapped in foil, sitting on a ceramic base.
3. This creates a crude capacitor to collect static energy.

Caution: This captures small amounts of energy safely… never during storms.Image
Salvaged Heat Capture

You can store and redirect heat without electronics.
- Brick or Stone Floors: Absorb sun heat during the day, release it at night.
- Old Car Radiators: Use as heat exchangers for solar thermal systems.
- Reflective Insulation: Found in discarded packaging or old chip bags to focus or retain heat.

The natural world is overflowing with energy, yet the system convinces us it’s scarce so we’ll buy access to it.
These free methods aren’t about powering a smart city grid…
they’re about reclaiming independence, one small system at a time.

They tax your land, your water, and your sun,
but they can’t tax the ingenuity of a free mind.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with VOX of SU

VOX of SU Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @VOX_of_SU

Feb 6
The Science–Technology Silo Effect 🧵

How the Panopticon Was Built by People Who Didn’t Know What They Were Building

(This is why the Epstein files matter to me.)

The most dangerous systems aren’t created by one breakthrough or one discipline.
They’re created when siloed fields are quietly stitched together.

Telecom builds connectivity.
AI builds pattern recognition.
Biological cryptography (a field created by Epstein in connection with Stanford, MIT, and NSA) binds identity to the body.

Each field, on its own, is useful…
and largely ethical when managed by those who developed them and they stick to intended use.

The danger appears only when someone outside the silos understands how they combine them…

identity + perception + prediction + enforcement

That’s the panopticon.

Assembled between labs by Epstein.

Sex trafficking, while part of the story, was a means to the END’s panopticon… governed by the Global Operations of Defense (the G.O.D… the all seeing eye of the panopticon)

Scientists usually don’t see this coming because they work vertically.
Their incentives are local…
theorize, publish, solve, optimize, improve.

No individual researcher sees the full system.
No individual lab controls downstream use.
Intent leaks away the moment the work leaves the silo.

(I was an outlier…
trained across bioengineering and Navy telecom…
most people never get that cross-sectional view)

This creates the “silo effect”
Each group assumes someone else is responsible for ethical oversight.
In reality, no one owns the system-level outcome.

Technically, funders do…
buried in the fine print.
And funding is rarely philanthropy.
It’s leverage.

More like… 🧐 philanderthropy

Epstein was a “financier”

Power doesn’t come from inventing the technology.
It comes from integrating it.

That’s why financiers and policy intermediaries matter more than inventors in terms of intended use and outcomes.
They decide which silos talk to each other…
and which don’t.

Someone like Jeffrey Epstein didn’t need to be a scientist.
He needed to understand systems and leverage.

When identity is bound to biology, behavior is logged by networks, and meaning is parsed by AI, you don’t need force.

Compliance becomes structural.
It’s integrated by design.

That’s the modern panopticon.
Not a prison you see…
a system you participate in.

Scientists don’t miss the danger because they’re naive.
They miss it because the danger doesn’t live where they work.
They are focused on subject expertise… with blinders.

The danger lives in the connections they never control or see.

So no…
Epstein wasn’t just a criminal who funded science.
He was positioned as an integrator in a system that rewards integration over invention.

👇
A documented list of files and primary sources is in the 🧵 .Image
Image
The panopticon doesn’t start with surveillance cameras or AI.
It starts with 911.

And this is why Carbyne matters.

Carbyne doesn’t “run” countries.
It integrates into the moment when a citizen becomes a data subject under emergency authority.
(which is why COVID matters… it was the testbed for Emergency Use Authorization and Global
Governance)

Israel (root origin)
The U.S.
Parts of Europe
Latin America
Anywhere emergency systems are being modernized

Which is why 911 is the real choke point, not social media or consumer tech.

Emergency systems sit at the intersection of policy, telecom, identity, and authority.
They are where destruction of the old order, legal restructuring, and population surveillance quietly converge into the NWO.

Control doesn’t begin with force.
It begins with who routes the call, who owns the data, and who defines the emergency.

What makes this significant is that Jeffrey Epstein is not tied to just one of these domains.
The files show him positioned across finance, telecom-adjacent infrastructure, cyber systems, and elite policy networks.

Individually, these connections look benign.
Together, they reveal how siloed systems can be integrated into a single architecture of control.

This isn’t speculation.
It’s documented…
across funding records, emails, infrastructure plans, and intelligence-adjacent material.

The story isn’t about one technology.
It’s about who connects them.

And that’s where the panopticon actually begins.Image
Image
Top 12 Keystone Docs
(full list will be posted on website with report)

EFTA01172818
Financial agreement

Direct proof that Jeffrey Epstein financed Reporty → Carbyne (Series A).
This establishes material leverage, not just proximity.

EFTA02628648
Email: Barak → Carbyne 911

Shows emergency-infrastructure strategy + explicit concern about “minimizing Israeli profile.”

This is optics + deployment, with Epstein in the loop.

EFTA01052344
Email: Epstein ↔ Peter Thiel ↔ Carbyne

Bridges Epstein + Thiel + Carbyne leadership in one document.
This is a clean elite-connector proof.

EFTA00798601
Carbyne internal roadmap

Details NG911/ESInet rollout and partnerships (e.g., Cell Service Providers, Accenture, General Dynamics).
This shows scale, sensitivity, and institutional embedding.

EFTA01732882
FBI briefing (Nashville bombing)

Demonstrates real-world telecom/911 choke points.
Confirms the risk surface Carbyne sits on.

EFTA00161251
FBI analysis (switching stations)

Names telecom switching stations as critical control nodes.
This is the structural vulnerability map.

EFTA01683874
FBI CHS (FD-1023)

Law-enforcement source reports Epstein employed a personal hacker developing zero-days and selling tools to governments.
This is offensive cyber adjacency, not theory.

EFTA01001876
Email: Blue Pill virtualization attack

Discusses hidden system control via virtualization.
This is how monitoring/control can persist invisibly.

EFTA02465056
Email: SWIFT hack & replacement

Critical financial-infrastructure vulnerability analysis with Epstein included.
Shows cyber + finance convergence.

1EFTA02588263
Email: BGP hijacking / telecom penetration

Elite discussion of telecom routing attacks (GCHQ/5-Eyes context).
This is network-level control, not endpoint hacking.

1EFTA00771867
Email: cameras “in interesting places”

Demonstrates Epstein’s interest in physical surveillance placement.
Bridges digital + physical monitoring.

Interesting story telling.

EFTA02489423
Goertzel/Bach AGI email thread

Places Epstein upstream of sense-making, language grounding, and cognition debates.
Shows access to pre-deployment thinking….
the layer scientists worry can be misused.
Read 4 tweets
Nov 20, 2025
There’s something about the CERN Shiva Idol and its placement…
that has never sat right…
not in the physics,
not in the optics,
and definitely not in the symbolism.

In 2016, the Hindu month dedicated to Shiva, Shravan (or Sawan), fell largely in August.

Shravan is one of the holiest months for Lord Shiva, and devotees perform:
night rituals
offerings
fasting
prayers
and in some regions, fire or dance ceremonies

It’s not one single holiday…
it’s a whole month of Shiva observances.

In 2016:
Shravan began on July 20, 2016
Shravan ended on August 18, 2016

So the entire first half of August 2016 was Shiva’s holy month.

And what happened in August 2016?

The CERN “Shiva ritual” video surfaced in exactly that window.
Mid-August.
During Shravan.
At the foot of the Shiva statue.

If the ritual “prank” happened
early August,
on or near August 1,
or any date before August 18,

…it was literally during Shiva’s sacred month.

Scientists may claim it was “just a prank,”but they staged it:
at the Shiva Nataraja statue
at night
with robes
with ritualistic blocking
during Shiva’s holiest period

That’s intentional symbolic alignment
They knew exactly what they were doing.
Bragging beforehand = intent.

They were bragging about it in Geneva beforehand. Way beforehand.
I know… I overheard.

It wasn’t:
impulsive,
random,
or internal hijinks.

It was pre-meditated World Stage theater.
Who performs World Stage Theatre?

Globalists.

The Enlightened Nations of Democracy, the END…
And the Global Operations of Defense, the G.O.D

Right outside a machine capable of probing quantum fields and the foundational framework of spacetime.

They wanted to be seen doing it.
Because the ritual was the message, not just the act itself.

Shiva = The Destroyer of Worlds
CERN has always been “touching the veil.”

I’m not saying they opened a portal.
I’m not saying they didn’t…
But they absolutely theatrically played into the myth.

If the public already thinks you’re slicing open the simulation…
why perform a ritual that looks like a simulation-opening ceremony
unless you want them to think it?

It’s either:
elite nerd trolling
or elite nerd signaling
or elite nerd ritual play
All three are believable.
Read 4 tweets
Nov 17, 2025
Mind experiment: Let’s play it out as if this is a simulation where deception is the core program.

What’s the “win condition”?

If the baseline of this reality is deception,
lies in media, lies in systems, lies in relationships, and worst of all, self-deception,
then the “game” starts to look like this:

The default state:
Go with the crowd, believe the script, let others narrate your reality for you.

The challenge state:
Notice the lie. Refuse to repeat it. Refuse to build your identity on it.

The win state:
Live in alignment with truth even when the whole environment rewards deception.

In that frame, truth isn’t just a moral preference…
it’s a jailbreak protocol.

Deception trains discernment the way resistance trains muscle.
If everything were obvious, nothing would have to “wake up.”

🐇 🕳️ 🧵
History as a built-in “lesson loop”

The Rise → Corruption → Collapse Cycle

(More details on patterns in the next thread)

This aligns disturbingly well with how complex systems behave.

If this were code, history repeating would mean:

The system keeps running similar scenarios with small variations.

Civilizations rise, get seduced by power and illusion, collapse under the weight of their own lies.

A few humans “see through it,” leave artifacts, texts, warnings, myths, for the next round.

The next round half-listens, half-forgets… gets distracted and the loop runs again.

From a simulation perspective, that’s curriculum learning:
run the lesson until the pattern is fully recognized and integrated.

From a spiritual one, it’s:

“You didn’t learn it last time, so here it is again… louder.”
THE 7 REPEATED PROGRAMS OF HISTORY

(Biblical + Historical + Recurring)

I. Rise → Corruption → Collapse

Biblical: Eden → Fall; Judges → Collapse; Israel → Idolatry → Exile; Revelation → Apostasy → Judgment.
Historical: Egypt, Babylon, Greece, Rome, Britain, Weimar, the U.S.—all follow the same arc:
Strength → Prosperity → Decay → Corruption → Collapse → Reset.
This is the base loop.

II. The Tower Program (Centralization → Tyranny)

Whenever humanity unifies under one system, it tries to become God.
Biblical: Babel, Pharaoh, Babylon, Rome, Revelation.
Historical: Rome’s census grid, USSR, Nazi Germany, globalist technocracy.
Centralization always ends the same: Hubris → Tyranny → Collapse.

III. The Prophet Program (Warning → Mockery → Vindication)

Prophets warn, are ignored, vindicated only after disaster.
Biblical: Noah, Jeremiah, Daniel, Jesus.
Historical: Socrates, Cassandra, Bruno, Joan of Arc, Orwell, Solzhenitsyn.
Pattern: Mocked → proven right → forgotten → loop repeats.

IV. The Golden Calf Program (Idolatry → Decay)

Humanity repeatedly replaces God with idols: wealth, pleasure, state, leaders, tech, self.
Biblical: Golden Calf, Baal, Molech, Mammon.
Historical: Emperor cults, rationalist utopias, political idols, tech worship.
Result: Idolatry erodes morality → society falls.

V. The Pharaoh Program (Tyranny → Rebellion → Deliverance)

Oppression generates its own liberator.
Biblical: Pharaoh→Moses; Nebuchadnezzar→Daniel; Herod→Jesus.
Historical: Caesar→Brutus; Empire→Revolution; USSR→dissidents; Apartheid→Mandela.
Cause and effect: tyranny births revolt.

VI. The Flood/Reset Program (Collapse → Purge → Renewal)

When corruption peaks, the system resets.
Biblical: The Flood; Sodom; Babylonian exile; Revelation.
Historical: Rome→Middle Ages; Plague→Renaissance; Wars→Reconstruction; Economic crashes→New systems.
Cycle: Reset → rebuild → repeat.

VII. The Messiah Program (Decay → Expectation → Redeemer)

In collapse, humanity longs for a savior.
Biblical: Messiah prophecy → Christ → Second Coming.
Historical: Arthur, philosopher-kings, reformers, revolutionaries, technocrat “saviors.”
Every era ends with: “Someone must fix what we broke.”

THE META-PATTERN

Deception → Awakening → Conflict → Renewal

Prosperity blinds.
Deception spreads.
Truth offends.
Awakening starts.
Power resists.
Conflict erupts.
Collapse clears.
Rebirth begins.

The same script, every time.
Read 7 tweets
Oct 3, 2025
Serpent Bloodlines: The Levant, the Jews, and Venom’s Shadow

When people argue over whether Ashkenazi Jews came from Khazaria, they miss the serpent in the grass. Ashkenazim carries a protective quirk in their ACE2 receptors (like the K26R variant that blunts spike protein binding), and it’s not Khazarian horse-genes that hide the secret.

It’s older. Deeper. Levantine.

The Jewish people are indigenous to the Levant…
the land bridge between Africa, Asia, and Europe. This was serpent country: asps and vipers underfoot, serpent cults coiling through Canaanite shrines, and Egyptian cobras carved into stone.

Live here long enough, generation after generation, and your blood becomes resistant to venom.

The serpent haunts Israel’s story:

In Canaan, serpents were fertility symbols and guardians of wisdom.

In Moses’ time, a bronze serpent (Nehushtan) was raised to heal snakebite…
venom as both curse and cure.

(In mythic language the terms virus and vaccine means the serpent’s venom and the herd’s milk.)

In Eden, the serpent whispered knowledge, blurring salvation and deception.

Later prophets smashed the bronze serpent, but its shadow never left the people.

Now the science comes full circle…
the spike protein mimics snake venom motifs, hijacking receptors like a digital toxin. This is why some lineages less vulnerable, some bloodlines more resistant.

Is it coincidence that the people of the Levant, the land of the serpent, carry genetic shields that blunt venom-like assaults?

Or is this the oldest story playing out in molecular code: the serpent that cursed also protected, a paradox written in DNA?Image
Image
Image
Levantine Roots: The Birthplace of the People and the Serpent

The Jewish people are indigenous to the Levant… serpent country.

Timeline of Serpent Symbolism in the Levant

2000–1200 BCE (Canaanite Period): Serpents represented fertility, healing, and underworld power. Archaeological finds (serpent figurines, altars) show they were sacred in Canaanite religion.

1200–1000 BCE (Israelite Emergence): Early Israelites inherited Canaanite serpent symbolism. Venomous snakes were common threats in desert and hill country.

1200 BCE (Exodus Narrative): Moses raises the Nehushtan, a bronze serpent, to heal those bitten in the wilderness (Numbers 21:8–9). Venom becomes paradoxical…
curse and cure.

1000–700 BCE (Kingdom of Israel/Judah): Kings like Hezekiah destroy serpent cult objects, labeling them idolatrous. Yet their memory lingers and becomes occult.

Kings like Hezekiah (8th century BCE) are described smashing the Nehushtan and outlawing serpent worship (2 Kings 18:4).

Why? Because it blurred Yahweh with older fertility/serpent cults. Monotheism demanded purity.

What happens when you outlaw a popular cult? It goes underground.

The term occultus (Latin) means “hidden.” But the practice is older than the word.

When a practice is driven underground, it becomes “occult”… secret rites, mystery schools, coded symbols.

The serpent wisdom gets repackaged into esoteric traditions.

Kabbalistic serpent imagery. The cabal.

Gnostic ophites (literally “serpent people”) who revered the Eden serpent as bringer of knowledge.

500 BCE (Exile & Beyond): The serpent shifts into allegory…
Eden’s deceiver, Satan’s shadow, wisdom entangled with corruption.

Rabbinic Judaism (100 CE+): Serpents are debated in law and lore: symbols of danger, sorcery, and yet also knowledge.

The serpent is not peripheral it coils through the entire Jewish symbolic framework, as both destroyer and healer.
Venom in the Genes: ACE2 and the K26R Variant

The SARS-CoV-2 spike protein binds human cells through the ACE2 receptor.

Several ACE2 variants exist in human populations; K26R is notably more frequent among Ashkenazi Jews.

Structural modeling suggests K26R reduces electrostatic attraction between ACE2 and spike, making infection slightly less efficient.

Coincidence? Perhaps. But it places Ashkenazi genetics in a peculiar position when spike is framed as a venom mimic.

Venom Mimicry in Spike

Sections of spike (notably near the furin cleavage site) resemble snake venom neurotoxins.

Venom enzymes like PLA₂ have been shown in vitro to block spike…
ACE2 fusion, highlighting biochemical overlap between snake venom and spike activity.

Clinical studies even detected toxin-like peptides in COVID-19 patient samples…
PLA₂-like, conotoxin-like, metalloprotease-like molecules not normally present.

Interpretation: If spike evolved or was engineered with venom motifs, then populations with ACE2 variants reducing venom-like docking are naturally buffered.Image
Read 5 tweets
Sep 25, 2025
The Irony of 911

On 9/11/2001, the world watched American towers fall, with thousands of Americans dying in the rubble.

On 9/11/2025, the world was too distracted to notice the last remnants of their privacy fall.

Carbyne (formerly Reporty Homeland Security), an Israeli surveillance company that came out of Unit 8200 (Israel intelligence elite cyberwarfare and surveillance unit), just raised $100 million in an AT&T-led funding round to roll out their so-called “app-free 911 platform.”

Sounds convenient and helpful, right?

Wrong. 🧵

App-free…
not free-app…
it means no app is required for Israel to freely access your SMART devices…
at any time.
The issues I have had with AT&T Is-real.

Post thread production:
As I was making a video for this thread…
the oddest thing happened…
Siri chimed into a conversation…
unprompted, deactivated…
I was able to capture the conversation using my son’s phone.
It validates this thread and argument. 👌
It’s Not About Saving Lives…
It’s About Owning Them

This is not a system just built for “app-free” emergency response…

Emergency systems have always been app-free…

Instead, it is an app-free backdoor to feed real-time geolocation data, biometric metadata, and behavioral analytics directly into a foreign surveillance grid.

Whenever they want.
No emergency required.
No warrant. No consent.

It’s Israeli-run, not American.

The very country implicated in the shadows of 9/11/2001 is now positioned to control America’s emergency response system.

Over the last two decades, those Patriot Act capabilities didn’t just stay in American hands.
Through tech outsourcing, foreign partnerships, and cloud infrastructure, the data streams were gradually handed to foreign private companies… especially Israel-linked firms like Carbyne, NSO Group, and Cellebrite.

👇🪡
Not Just AT&T… It’s Every Tower

This isn’t just about AT&T customers.
Carbyne’s infrastructure is embedded at the network level, meaning ALL carriers…
Verizon, T-Mobile, Mint, Starlink mobile integrations…
are part of this mesh.
If your phone connects to a cell tower in the United States, your signal is in their grid.

Think you’re safe with a different provider?
Nope. The backdoor isn’t tied to a brand, it’s tied to the infrastructure itself.
911 traffic is federalized at the network level…
meaning once the hooks are in, every device becomes a node in their system.

Carbyne’s “app-free” tech isn’t some miracle of simplicity.
It’s a global kill switch, seamlessly tied to your phone’s eSIM and 5G backbone.
Read 12 tweets
Sep 23, 2025
What if CERN didn’t just smash particles… but smashed reality itself?

Imagine… a group of scientists perfect quantum entanglement so precisely they can control one particle in the lab while its twin is entangled with the…
Universal Record of Existence (URE)

Now imagine what happens when they smash that controllable particle into the URE like a cosmic cursor hitting “edit.”
What It Would Take?

Perfect Quantum Entanglement: Not just linking two particles, but linking one inside the simulation and one outside, connected to the URE itself.

This would require unthinkable precision and stable coherence, the kind of thing only achievable through quantum computers operating beyond classical limits.

And while exotic computing is said to be years away… post quantum-computing is already operational at CERN, Palantir, and defense labs. Uses entangled timelines, not just entangled particles.

Targeting the Anchor Points of Time:
The URE has fixed anchors (past), forming anchors (present), and floating, probabilistic strands (future).

To change anything, you’d need to aim at both ends simultaneously:

One particle anchored in the past,
The other anchored in the future.

Massive Energy & Ritual Timing:
A collider like CERN’s Large Hadron Collider provides the physical energy.

But energy alone isn’t enough…
you need ritual synchronization, aligning the experiment with astronomical cycles and numerological keys like 19-year Hebrew calendars or 1378-style gateway codes.

In 2016, a video leaked showing:
- Hooded figures surrounding the Shiva statue at CERN night,
- A woman in white being ritually “sacrificed”,
- Participants chanting before a stabbing gesture,

CERN officials quickly declared it a “prank.”
But there are multiple red flags:
- Security clearance required to even access that courtyard after hours.
- The ritual’s timing aligned perfectly with a major collider energy ramp-up.

This wasn’t a prank.
It was a ceremonial alignment, done to anchor the particle collision to a spiritual gateway.
What They Could Control

If they pulled this off, they wouldn’t just run experiments.
They would own reality…

This would allow a group like the G.O.D. and END to…

Erase resistance movements before they even form,

Manufacture messianic figures or false saviors (Yeshua inversion),

Engineer apocalypses to justify new world orders,

Control global minds through perfectly synchronized media events.Image
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(