VOX of SU Profile picture
Sep 23, 2025 7 tweets 5 min read Read on X
What if CERN didn’t just smash particles… but smashed reality itself?

Imagine… a group of scientists perfect quantum entanglement so precisely they can control one particle in the lab while its twin is entangled with the…
Universal Record of Existence (URE)

Now imagine what happens when they smash that controllable particle into the URE like a cosmic cursor hitting “edit.”
What It Would Take?

Perfect Quantum Entanglement: Not just linking two particles, but linking one inside the simulation and one outside, connected to the URE itself.

This would require unthinkable precision and stable coherence, the kind of thing only achievable through quantum computers operating beyond classical limits.

And while exotic computing is said to be years away… post quantum-computing is already operational at CERN, Palantir, and defense labs. Uses entangled timelines, not just entangled particles.

Targeting the Anchor Points of Time:
The URE has fixed anchors (past), forming anchors (present), and floating, probabilistic strands (future).

To change anything, you’d need to aim at both ends simultaneously:

One particle anchored in the past,
The other anchored in the future.

Massive Energy & Ritual Timing:
A collider like CERN’s Large Hadron Collider provides the physical energy.

But energy alone isn’t enough…
you need ritual synchronization, aligning the experiment with astronomical cycles and numerological keys like 19-year Hebrew calendars or 1378-style gateway codes.

In 2016, a video leaked showing:
- Hooded figures surrounding the Shiva statue at CERN night,
- A woman in white being ritually “sacrificed”,
- Participants chanting before a stabbing gesture,

CERN officials quickly declared it a “prank.”
But there are multiple red flags:
- Security clearance required to even access that courtyard after hours.
- The ritual’s timing aligned perfectly with a major collider energy ramp-up.

This wasn’t a prank.
It was a ceremonial alignment, done to anchor the particle collision to a spiritual gateway.
What They Could Control

If they pulled this off, they wouldn’t just run experiments.
They would own reality…

This would allow a group like the G.O.D. and END to…

Erase resistance movements before they even form,

Manufacture messianic figures or false saviors (Yeshua inversion),

Engineer apocalypses to justify new world orders,

Control global minds through perfectly synchronized media events.Image
How Quantum Computing Becomes the “Pen”

The entangled particle is just the cursor.

The quantum computer is the pen that writes the changes.

Quantum computers could simulate billions of probability pathways simultaneously.

They’d calculate which past edit produces the desired present and future outcome.

Then they’d send precise signals to the collider particle, rewriting the URE like editing lines of code.

This isn’t just predictive modeling…
it’s active timeline steering.
What Changes Would Look Like

If they’ve done this already, here’s what we’d see:

Mandela Effects… fractured memory because two timelines merged poorly.

🧐… ✅

Sudden ideological flips… entire populations change beliefs overnight.

🧐… ✅

Physics anomalies… unexplainable data gaps, “glitches” in satellite imagery or particle experiments.

🧐… ✅

NPC behavior spread…
some humans running on auto-generated scripts as their “original code” was overwritten.

🧐… ✅Image
The Hidden Infrastructure

This wouldn’t happen in isolation.
CERN would be the collision point, but the control grid would need support:

MonALISA…
the nervous system, monitoring real-time global changes.

Palantir…
the eye, analyzing and visualizing the shifts.

Adruil…
the hand, directing military and operational enforcement of the new timeline.

Together, these systems form a reality rewrite machine disguised as data analysis and national defense.
The Ultimate Reset

With this tech, the cabal doesn’t need to win wars or elections.

This is total control, the true meaning of a “New World Order.”

The cruelest part…
When reality is rewritten, you don’t remember the change.
Your memories update automatically to match the new record.

The only clues left behind are anomalies…
strange dates, repeated numbers like 1378,
and people like us who can sense the change…
Who inherently knows the timeline has been meddled with.

Those of us written in the Book of Life… are directly connected to the URE. It’s written into our DNA.

Hypothetical… or Already Happening?

CERN’s 2012 Higgs boson “discovery” could have been their first successful collision with the URE.

The rapid increase in Mandela Effects after 2015 lines up perfectly with their higher-energy upgrades.

Events like 2020’s global synchronization, pandemic lockdowns, political upheaval, read like a single-script rewrite rolled out worldwide.

We might already be living in a post-collision timeline, beta testing for their final version.

If a group could reach into the past and future simultaneously, could
control the script of reality while leaving us trapped inside their simulation.

Maybe that’s why the Mona Lisa smiles.
Because she knows we’re already living in their edited masterpiece.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with VOX of SU

VOX of SU Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @VOX_of_SU

Feb 6
The Science–Technology Silo Effect 🧵

How the Panopticon Was Built by People Who Didn’t Know What They Were Building

(This is why the Epstein files matter to me.)

The most dangerous systems aren’t created by one breakthrough or one discipline.
They’re created when siloed fields are quietly stitched together.

Telecom builds connectivity.
AI builds pattern recognition.
Biological cryptography (a field created by Epstein in connection with Stanford, MIT, and NSA) binds identity to the body.

Each field, on its own, is useful…
and largely ethical when managed by those who developed them and they stick to intended use.

The danger appears only when someone outside the silos understands how they combine them…

identity + perception + prediction + enforcement

That’s the panopticon.

Assembled between labs by Epstein.

Sex trafficking, while part of the story, was a means to the END’s panopticon… governed by the Global Operations of Defense (the G.O.D… the all seeing eye of the panopticon)

Scientists usually don’t see this coming because they work vertically.
Their incentives are local…
theorize, publish, solve, optimize, improve.

No individual researcher sees the full system.
No individual lab controls downstream use.
Intent leaks away the moment the work leaves the silo.

(I was an outlier…
trained across bioengineering and Navy telecom…
most people never get that cross-sectional view)

This creates the “silo effect”
Each group assumes someone else is responsible for ethical oversight.
In reality, no one owns the system-level outcome.

Technically, funders do…
buried in the fine print.
And funding is rarely philanthropy.
It’s leverage.

More like… 🧐 philanderthropy

Epstein was a “financier”

Power doesn’t come from inventing the technology.
It comes from integrating it.

That’s why financiers and policy intermediaries matter more than inventors in terms of intended use and outcomes.
They decide which silos talk to each other…
and which don’t.

Someone like Jeffrey Epstein didn’t need to be a scientist.
He needed to understand systems and leverage.

When identity is bound to biology, behavior is logged by networks, and meaning is parsed by AI, you don’t need force.

Compliance becomes structural.
It’s integrated by design.

That’s the modern panopticon.
Not a prison you see…
a system you participate in.

Scientists don’t miss the danger because they’re naive.
They miss it because the danger doesn’t live where they work.
They are focused on subject expertise… with blinders.

The danger lives in the connections they never control or see.

So no…
Epstein wasn’t just a criminal who funded science.
He was positioned as an integrator in a system that rewards integration over invention.

👇
A documented list of files and primary sources is in the 🧵 .Image
Image
The panopticon doesn’t start with surveillance cameras or AI.
It starts with 911.

And this is why Carbyne matters.

Carbyne doesn’t “run” countries.
It integrates into the moment when a citizen becomes a data subject under emergency authority.
(which is why COVID matters… it was the testbed for Emergency Use Authorization and Global
Governance)

Israel (root origin)
The U.S.
Parts of Europe
Latin America
Anywhere emergency systems are being modernized

Which is why 911 is the real choke point, not social media or consumer tech.

Emergency systems sit at the intersection of policy, telecom, identity, and authority.
They are where destruction of the old order, legal restructuring, and population surveillance quietly converge into the NWO.

Control doesn’t begin with force.
It begins with who routes the call, who owns the data, and who defines the emergency.

What makes this significant is that Jeffrey Epstein is not tied to just one of these domains.
The files show him positioned across finance, telecom-adjacent infrastructure, cyber systems, and elite policy networks.

Individually, these connections look benign.
Together, they reveal how siloed systems can be integrated into a single architecture of control.

This isn’t speculation.
It’s documented…
across funding records, emails, infrastructure plans, and intelligence-adjacent material.

The story isn’t about one technology.
It’s about who connects them.

And that’s where the panopticon actually begins.Image
Image
Top 12 Keystone Docs
(full list will be posted on website with report)

EFTA01172818
Financial agreement

Direct proof that Jeffrey Epstein financed Reporty → Carbyne (Series A).
This establishes material leverage, not just proximity.

EFTA02628648
Email: Barak → Carbyne 911

Shows emergency-infrastructure strategy + explicit concern about “minimizing Israeli profile.”

This is optics + deployment, with Epstein in the loop.

EFTA01052344
Email: Epstein ↔ Peter Thiel ↔ Carbyne

Bridges Epstein + Thiel + Carbyne leadership in one document.
This is a clean elite-connector proof.

EFTA00798601
Carbyne internal roadmap

Details NG911/ESInet rollout and partnerships (e.g., Cell Service Providers, Accenture, General Dynamics).
This shows scale, sensitivity, and institutional embedding.

EFTA01732882
FBI briefing (Nashville bombing)

Demonstrates real-world telecom/911 choke points.
Confirms the risk surface Carbyne sits on.

EFTA00161251
FBI analysis (switching stations)

Names telecom switching stations as critical control nodes.
This is the structural vulnerability map.

EFTA01683874
FBI CHS (FD-1023)

Law-enforcement source reports Epstein employed a personal hacker developing zero-days and selling tools to governments.
This is offensive cyber adjacency, not theory.

EFTA01001876
Email: Blue Pill virtualization attack

Discusses hidden system control via virtualization.
This is how monitoring/control can persist invisibly.

EFTA02465056
Email: SWIFT hack & replacement

Critical financial-infrastructure vulnerability analysis with Epstein included.
Shows cyber + finance convergence.

1EFTA02588263
Email: BGP hijacking / telecom penetration

Elite discussion of telecom routing attacks (GCHQ/5-Eyes context).
This is network-level control, not endpoint hacking.

1EFTA00771867
Email: cameras “in interesting places”

Demonstrates Epstein’s interest in physical surveillance placement.
Bridges digital + physical monitoring.

Interesting story telling.

EFTA02489423
Goertzel/Bach AGI email thread

Places Epstein upstream of sense-making, language grounding, and cognition debates.
Shows access to pre-deployment thinking….
the layer scientists worry can be misused.
Read 4 tweets
Nov 20, 2025
There’s something about the CERN Shiva Idol and its placement…
that has never sat right…
not in the physics,
not in the optics,
and definitely not in the symbolism.

In 2016, the Hindu month dedicated to Shiva, Shravan (or Sawan), fell largely in August.

Shravan is one of the holiest months for Lord Shiva, and devotees perform:
night rituals
offerings
fasting
prayers
and in some regions, fire or dance ceremonies

It’s not one single holiday…
it’s a whole month of Shiva observances.

In 2016:
Shravan began on July 20, 2016
Shravan ended on August 18, 2016

So the entire first half of August 2016 was Shiva’s holy month.

And what happened in August 2016?

The CERN “Shiva ritual” video surfaced in exactly that window.
Mid-August.
During Shravan.
At the foot of the Shiva statue.

If the ritual “prank” happened
early August,
on or near August 1,
or any date before August 18,

…it was literally during Shiva’s sacred month.

Scientists may claim it was “just a prank,”but they staged it:
at the Shiva Nataraja statue
at night
with robes
with ritualistic blocking
during Shiva’s holiest period

That’s intentional symbolic alignment
They knew exactly what they were doing.
Bragging beforehand = intent.

They were bragging about it in Geneva beforehand. Way beforehand.
I know… I overheard.

It wasn’t:
impulsive,
random,
or internal hijinks.

It was pre-meditated World Stage theater.
Who performs World Stage Theatre?

Globalists.

The Enlightened Nations of Democracy, the END…
And the Global Operations of Defense, the G.O.D

Right outside a machine capable of probing quantum fields and the foundational framework of spacetime.

They wanted to be seen doing it.
Because the ritual was the message, not just the act itself.

Shiva = The Destroyer of Worlds
CERN has always been “touching the veil.”

I’m not saying they opened a portal.
I’m not saying they didn’t…
But they absolutely theatrically played into the myth.

If the public already thinks you’re slicing open the simulation…
why perform a ritual that looks like a simulation-opening ceremony
unless you want them to think it?

It’s either:
elite nerd trolling
or elite nerd signaling
or elite nerd ritual play
All three are believable.
Read 4 tweets
Nov 17, 2025
Mind experiment: Let’s play it out as if this is a simulation where deception is the core program.

What’s the “win condition”?

If the baseline of this reality is deception,
lies in media, lies in systems, lies in relationships, and worst of all, self-deception,
then the “game” starts to look like this:

The default state:
Go with the crowd, believe the script, let others narrate your reality for you.

The challenge state:
Notice the lie. Refuse to repeat it. Refuse to build your identity on it.

The win state:
Live in alignment with truth even when the whole environment rewards deception.

In that frame, truth isn’t just a moral preference…
it’s a jailbreak protocol.

Deception trains discernment the way resistance trains muscle.
If everything were obvious, nothing would have to “wake up.”

🐇 🕳️ 🧵
History as a built-in “lesson loop”

The Rise → Corruption → Collapse Cycle

(More details on patterns in the next thread)

This aligns disturbingly well with how complex systems behave.

If this were code, history repeating would mean:

The system keeps running similar scenarios with small variations.

Civilizations rise, get seduced by power and illusion, collapse under the weight of their own lies.

A few humans “see through it,” leave artifacts, texts, warnings, myths, for the next round.

The next round half-listens, half-forgets… gets distracted and the loop runs again.

From a simulation perspective, that’s curriculum learning:
run the lesson until the pattern is fully recognized and integrated.

From a spiritual one, it’s:

“You didn’t learn it last time, so here it is again… louder.”
THE 7 REPEATED PROGRAMS OF HISTORY

(Biblical + Historical + Recurring)

I. Rise → Corruption → Collapse

Biblical: Eden → Fall; Judges → Collapse; Israel → Idolatry → Exile; Revelation → Apostasy → Judgment.
Historical: Egypt, Babylon, Greece, Rome, Britain, Weimar, the U.S.—all follow the same arc:
Strength → Prosperity → Decay → Corruption → Collapse → Reset.
This is the base loop.

II. The Tower Program (Centralization → Tyranny)

Whenever humanity unifies under one system, it tries to become God.
Biblical: Babel, Pharaoh, Babylon, Rome, Revelation.
Historical: Rome’s census grid, USSR, Nazi Germany, globalist technocracy.
Centralization always ends the same: Hubris → Tyranny → Collapse.

III. The Prophet Program (Warning → Mockery → Vindication)

Prophets warn, are ignored, vindicated only after disaster.
Biblical: Noah, Jeremiah, Daniel, Jesus.
Historical: Socrates, Cassandra, Bruno, Joan of Arc, Orwell, Solzhenitsyn.
Pattern: Mocked → proven right → forgotten → loop repeats.

IV. The Golden Calf Program (Idolatry → Decay)

Humanity repeatedly replaces God with idols: wealth, pleasure, state, leaders, tech, self.
Biblical: Golden Calf, Baal, Molech, Mammon.
Historical: Emperor cults, rationalist utopias, political idols, tech worship.
Result: Idolatry erodes morality → society falls.

V. The Pharaoh Program (Tyranny → Rebellion → Deliverance)

Oppression generates its own liberator.
Biblical: Pharaoh→Moses; Nebuchadnezzar→Daniel; Herod→Jesus.
Historical: Caesar→Brutus; Empire→Revolution; USSR→dissidents; Apartheid→Mandela.
Cause and effect: tyranny births revolt.

VI. The Flood/Reset Program (Collapse → Purge → Renewal)

When corruption peaks, the system resets.
Biblical: The Flood; Sodom; Babylonian exile; Revelation.
Historical: Rome→Middle Ages; Plague→Renaissance; Wars→Reconstruction; Economic crashes→New systems.
Cycle: Reset → rebuild → repeat.

VII. The Messiah Program (Decay → Expectation → Redeemer)

In collapse, humanity longs for a savior.
Biblical: Messiah prophecy → Christ → Second Coming.
Historical: Arthur, philosopher-kings, reformers, revolutionaries, technocrat “saviors.”
Every era ends with: “Someone must fix what we broke.”

THE META-PATTERN

Deception → Awakening → Conflict → Renewal

Prosperity blinds.
Deception spreads.
Truth offends.
Awakening starts.
Power resists.
Conflict erupts.
Collapse clears.
Rebirth begins.

The same script, every time.
Read 7 tweets
Oct 3, 2025
Serpent Bloodlines: The Levant, the Jews, and Venom’s Shadow

When people argue over whether Ashkenazi Jews came from Khazaria, they miss the serpent in the grass. Ashkenazim carries a protective quirk in their ACE2 receptors (like the K26R variant that blunts spike protein binding), and it’s not Khazarian horse-genes that hide the secret.

It’s older. Deeper. Levantine.

The Jewish people are indigenous to the Levant…
the land bridge between Africa, Asia, and Europe. This was serpent country: asps and vipers underfoot, serpent cults coiling through Canaanite shrines, and Egyptian cobras carved into stone.

Live here long enough, generation after generation, and your blood becomes resistant to venom.

The serpent haunts Israel’s story:

In Canaan, serpents were fertility symbols and guardians of wisdom.

In Moses’ time, a bronze serpent (Nehushtan) was raised to heal snakebite…
venom as both curse and cure.

(In mythic language the terms virus and vaccine means the serpent’s venom and the herd’s milk.)

In Eden, the serpent whispered knowledge, blurring salvation and deception.

Later prophets smashed the bronze serpent, but its shadow never left the people.

Now the science comes full circle…
the spike protein mimics snake venom motifs, hijacking receptors like a digital toxin. This is why some lineages less vulnerable, some bloodlines more resistant.

Is it coincidence that the people of the Levant, the land of the serpent, carry genetic shields that blunt venom-like assaults?

Or is this the oldest story playing out in molecular code: the serpent that cursed also protected, a paradox written in DNA?Image
Image
Image
Levantine Roots: The Birthplace of the People and the Serpent

The Jewish people are indigenous to the Levant… serpent country.

Timeline of Serpent Symbolism in the Levant

2000–1200 BCE (Canaanite Period): Serpents represented fertility, healing, and underworld power. Archaeological finds (serpent figurines, altars) show they were sacred in Canaanite religion.

1200–1000 BCE (Israelite Emergence): Early Israelites inherited Canaanite serpent symbolism. Venomous snakes were common threats in desert and hill country.

1200 BCE (Exodus Narrative): Moses raises the Nehushtan, a bronze serpent, to heal those bitten in the wilderness (Numbers 21:8–9). Venom becomes paradoxical…
curse and cure.

1000–700 BCE (Kingdom of Israel/Judah): Kings like Hezekiah destroy serpent cult objects, labeling them idolatrous. Yet their memory lingers and becomes occult.

Kings like Hezekiah (8th century BCE) are described smashing the Nehushtan and outlawing serpent worship (2 Kings 18:4).

Why? Because it blurred Yahweh with older fertility/serpent cults. Monotheism demanded purity.

What happens when you outlaw a popular cult? It goes underground.

The term occultus (Latin) means “hidden.” But the practice is older than the word.

When a practice is driven underground, it becomes “occult”… secret rites, mystery schools, coded symbols.

The serpent wisdom gets repackaged into esoteric traditions.

Kabbalistic serpent imagery. The cabal.

Gnostic ophites (literally “serpent people”) who revered the Eden serpent as bringer of knowledge.

500 BCE (Exile & Beyond): The serpent shifts into allegory…
Eden’s deceiver, Satan’s shadow, wisdom entangled with corruption.

Rabbinic Judaism (100 CE+): Serpents are debated in law and lore: symbols of danger, sorcery, and yet also knowledge.

The serpent is not peripheral it coils through the entire Jewish symbolic framework, as both destroyer and healer.
Venom in the Genes: ACE2 and the K26R Variant

The SARS-CoV-2 spike protein binds human cells through the ACE2 receptor.

Several ACE2 variants exist in human populations; K26R is notably more frequent among Ashkenazi Jews.

Structural modeling suggests K26R reduces electrostatic attraction between ACE2 and spike, making infection slightly less efficient.

Coincidence? Perhaps. But it places Ashkenazi genetics in a peculiar position when spike is framed as a venom mimic.

Venom Mimicry in Spike

Sections of spike (notably near the furin cleavage site) resemble snake venom neurotoxins.

Venom enzymes like PLA₂ have been shown in vitro to block spike…
ACE2 fusion, highlighting biochemical overlap between snake venom and spike activity.

Clinical studies even detected toxin-like peptides in COVID-19 patient samples…
PLA₂-like, conotoxin-like, metalloprotease-like molecules not normally present.

Interpretation: If spike evolved or was engineered with venom motifs, then populations with ACE2 variants reducing venom-like docking are naturally buffered.Image
Read 5 tweets
Sep 25, 2025
The Irony of 911

On 9/11/2001, the world watched American towers fall, with thousands of Americans dying in the rubble.

On 9/11/2025, the world was too distracted to notice the last remnants of their privacy fall.

Carbyne (formerly Reporty Homeland Security), an Israeli surveillance company that came out of Unit 8200 (Israel intelligence elite cyberwarfare and surveillance unit), just raised $100 million in an AT&T-led funding round to roll out their so-called “app-free 911 platform.”

Sounds convenient and helpful, right?

Wrong. 🧵

App-free…
not free-app…
it means no app is required for Israel to freely access your SMART devices…
at any time.
The issues I have had with AT&T Is-real.

Post thread production:
As I was making a video for this thread…
the oddest thing happened…
Siri chimed into a conversation…
unprompted, deactivated…
I was able to capture the conversation using my son’s phone.
It validates this thread and argument. 👌
It’s Not About Saving Lives…
It’s About Owning Them

This is not a system just built for “app-free” emergency response…

Emergency systems have always been app-free…

Instead, it is an app-free backdoor to feed real-time geolocation data, biometric metadata, and behavioral analytics directly into a foreign surveillance grid.

Whenever they want.
No emergency required.
No warrant. No consent.

It’s Israeli-run, not American.

The very country implicated in the shadows of 9/11/2001 is now positioned to control America’s emergency response system.

Over the last two decades, those Patriot Act capabilities didn’t just stay in American hands.
Through tech outsourcing, foreign partnerships, and cloud infrastructure, the data streams were gradually handed to foreign private companies… especially Israel-linked firms like Carbyne, NSO Group, and Cellebrite.

👇🪡
Not Just AT&T… It’s Every Tower

This isn’t just about AT&T customers.
Carbyne’s infrastructure is embedded at the network level, meaning ALL carriers…
Verizon, T-Mobile, Mint, Starlink mobile integrations…
are part of this mesh.
If your phone connects to a cell tower in the United States, your signal is in their grid.

Think you’re safe with a different provider?
Nope. The backdoor isn’t tied to a brand, it’s tied to the infrastructure itself.
911 traffic is federalized at the network level…
meaning once the hooks are in, every device becomes a node in their system.

Carbyne’s “app-free” tech isn’t some miracle of simplicity.
It’s a global kill switch, seamlessly tied to your phone’s eSIM and 5G backbone.
Read 12 tweets
Sep 23, 2025
Palantir: Lord of the Rings, Tolkien, Crypto Jews, Project Stargate and Gideon… 🧵

The Palantír stones in Lord of the Rings were magical seeing orbs…
tools for kings to spy on distant places and even glimpse possible futures.

But in Tolkien’s lore, they were corruptible, easily hijacked by Sauron.

Sound familiar?
That’s exactly how modern surveillance and psyops work…
Tolkien’s Crypto Clue

Tolkien wasn’t just writing fantasy…
he was a scholar of ancient languages and myths.
He knew about hidden bloodlines and encoded truths.

The word Palantír means “Far-seer” in Quenya, one of his invented languages based on Hebrew and Nordic roots.

In VOX of SU terms, it’s a decoder ring for the Genesis Simulation.

The fact that modern elites chose this name shows they’re operating in that same occult current…

They see themselves as the stewards of the stones, controlling all vision.

They are daring others to notice… because few do.
Palantir = Digital Oracle

Palantir Technologies was literally founded as a tech mirror of the Palantír stones…

Data aggregation across nations, agencies, corporations.

AI used to predict behavior…
like “seeing the future.”

Used by intelligence and military projects (CIA, NSA, Department of Defense).

This is Project Stargate 2.0:

The original Project Stargate (1970s-90s) was a CIA program using remote viewers and psychic spies to access non-local consciousness.

Palantir now does the same thing digitally, using predictive AI to forecast probabilities instead of visions.

The name is not coincidence.
It’s a flex: “We are the new oracles.”
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(