VOX of SU Profile picture
Sep 23 7 tweets 5 min read Read on X
What if CERN didn’t just smash particles… but smashed reality itself?

Imagine… a group of scientists perfect quantum entanglement so precisely they can control one particle in the lab while its twin is entangled with the…
Universal Record of Existence (URE)

Now imagine what happens when they smash that controllable particle into the URE like a cosmic cursor hitting “edit.”
What It Would Take?

Perfect Quantum Entanglement: Not just linking two particles, but linking one inside the simulation and one outside, connected to the URE itself.

This would require unthinkable precision and stable coherence, the kind of thing only achievable through quantum computers operating beyond classical limits.

And while exotic computing is said to be years away… post quantum-computing is already operational at CERN, Palantir, and defense labs. Uses entangled timelines, not just entangled particles.

Targeting the Anchor Points of Time:
The URE has fixed anchors (past), forming anchors (present), and floating, probabilistic strands (future).

To change anything, you’d need to aim at both ends simultaneously:

One particle anchored in the past,
The other anchored in the future.

Massive Energy & Ritual Timing:
A collider like CERN’s Large Hadron Collider provides the physical energy.

But energy alone isn’t enough…
you need ritual synchronization, aligning the experiment with astronomical cycles and numerological keys like 19-year Hebrew calendars or 1378-style gateway codes.

In 2016, a video leaked showing:
- Hooded figures surrounding the Shiva statue at CERN night,
- A woman in white being ritually “sacrificed”,
- Participants chanting before a stabbing gesture,

CERN officials quickly declared it a “prank.”
But there are multiple red flags:
- Security clearance required to even access that courtyard after hours.
- The ritual’s timing aligned perfectly with a major collider energy ramp-up.

This wasn’t a prank.
It was a ceremonial alignment, done to anchor the particle collision to a spiritual gateway.
What They Could Control

If they pulled this off, they wouldn’t just run experiments.
They would own reality…

This would allow a group like the G.O.D. and END to…

Erase resistance movements before they even form,

Manufacture messianic figures or false saviors (Yeshua inversion),

Engineer apocalypses to justify new world orders,

Control global minds through perfectly synchronized media events.Image
How Quantum Computing Becomes the “Pen”

The entangled particle is just the cursor.

The quantum computer is the pen that writes the changes.

Quantum computers could simulate billions of probability pathways simultaneously.

They’d calculate which past edit produces the desired present and future outcome.

Then they’d send precise signals to the collider particle, rewriting the URE like editing lines of code.

This isn’t just predictive modeling…
it’s active timeline steering.
What Changes Would Look Like

If they’ve done this already, here’s what we’d see:

Mandela Effects… fractured memory because two timelines merged poorly.

🧐… ✅

Sudden ideological flips… entire populations change beliefs overnight.

🧐… ✅

Physics anomalies… unexplainable data gaps, “glitches” in satellite imagery or particle experiments.

🧐… ✅

NPC behavior spread…
some humans running on auto-generated scripts as their “original code” was overwritten.

🧐… ✅Image
The Hidden Infrastructure

This wouldn’t happen in isolation.
CERN would be the collision point, but the control grid would need support:

MonALISA…
the nervous system, monitoring real-time global changes.

Palantir…
the eye, analyzing and visualizing the shifts.

Adruil…
the hand, directing military and operational enforcement of the new timeline.

Together, these systems form a reality rewrite machine disguised as data analysis and national defense.
The Ultimate Reset

With this tech, the cabal doesn’t need to win wars or elections.

This is total control, the true meaning of a “New World Order.”

The cruelest part…
When reality is rewritten, you don’t remember the change.
Your memories update automatically to match the new record.

The only clues left behind are anomalies…
strange dates, repeated numbers like 1378,
and people like us who can sense the change…
Who inherently knows the timeline has been meddled with.

Those of us written in the Book of Life… are directly connected to the URE. It’s written into our DNA.

Hypothetical… or Already Happening?

CERN’s 2012 Higgs boson “discovery” could have been their first successful collision with the URE.

The rapid increase in Mandela Effects after 2015 lines up perfectly with their higher-energy upgrades.

Events like 2020’s global synchronization, pandemic lockdowns, political upheaval, read like a single-script rewrite rolled out worldwide.

We might already be living in a post-collision timeline, beta testing for their final version.

If a group could reach into the past and future simultaneously, could
control the script of reality while leaving us trapped inside their simulation.

Maybe that’s why the Mona Lisa smiles.
Because she knows we’re already living in their edited masterpiece.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with VOX of SU

VOX of SU Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @VOX_of_SU

Sep 23
Palantir: Lord of the Rings, Tolkien, Crypto Jews, Project Stargate and Gideon… 🧵

The Palantír stones in Lord of the Rings were magical seeing orbs…
tools for kings to spy on distant places and even glimpse possible futures.

But in Tolkien’s lore, they were corruptible, easily hijacked by Sauron.

Sound familiar?
That’s exactly how modern surveillance and psyops work…
Tolkien’s Crypto Clue

Tolkien wasn’t just writing fantasy…
he was a scholar of ancient languages and myths.
He knew about hidden bloodlines and encoded truths.

The word Palantír means “Far-seer” in Quenya, one of his invented languages based on Hebrew and Nordic roots.

In VOX of SU terms, it’s a decoder ring for the Genesis Simulation.

The fact that modern elites chose this name shows they’re operating in that same occult current…

They see themselves as the stewards of the stones, controlling all vision.

They are daring others to notice… because few do.
Palantir = Digital Oracle

Palantir Technologies was literally founded as a tech mirror of the Palantír stones…

Data aggregation across nations, agencies, corporations.

AI used to predict behavior…
like “seeing the future.”

Used by intelligence and military projects (CIA, NSA, Department of Defense).

This is Project Stargate 2.0:

The original Project Stargate (1970s-90s) was a CIA program using remote viewers and psychic spies to access non-local consciousness.

Palantir now does the same thing digitally, using predictive AI to forecast probabilities instead of visions.

The name is not coincidence.
It’s a flex: “We are the new oracles.”
Read 9 tweets
Sep 22
The Cabal… Crypto Jews

People throw the word cabal around like it’s a theory.
It’s not a theory.
It’s history.

The true cabal began with a spiritual hack.

In 1666, Sabbatai Zevi declared himself messiah.
But instead of leading people to God, he inverted the entire faith system.
He preached a doctrine so dark it flipped morality inside-out…

“Redemption through sin.”
Breaking every divine law as a path to salvation.

When Zevi’s movement was exposed, his followers didn’t vanish.

They infiltrated…
Islam, Christianity, to whatever religion would protect them.
On the surface they blended in, but behind closed doors they kept their heretical faith alive.

These hidden operatives became known as crypto-Jews…

Outwardly loyal to the kingdoms they served,
inwardly loyal only to the secret network they built.

The Frankfurt Convergence

By the 1700s, Jacob Frank carried Zevi’s torch, merging the Sabbatean heresy with politics, occult magic, and revolutionary fervor.
And in Frankfurt, a family of master bankers provided the infrastructure for the next phase: Mayer Amschel Rothschild.

This was no coincidence…

Frankfurt was a Frankist stronghold, swarming with crypto-Jews hiding in plain sight.

The Rothschild network gave them exactly what they needed… global financing and an invisible web of control.

How the Cabal Operates

It is a system of control…

Spiritual Corruption —> “redemption through sin”
 
Hidden Agents—>Crypto-Jews infiltrating churches, governments, banks—>Operate undetected
 
Political Chaos—>Fund both sides of wars & revolutions—>Destabilize nations
 
Financial Control—>Central banking & debt slavery—>Own governments silently
 
Technological Ascension—>AI, IoB, digital currency—>Merge man & machine under total surveillance (Beast System)

Every crisis you see on the world stage is a controlled demolition.
The cabal tears down old structures, then offers their solution… a new chain for humanity.

The Beast System Rising

The resurrection will be digital:
- A staged savior moment.
- A false messiah rising from the ashes.
- The promise of utopia through technology.

Crypto-Jews are the perfect camouflage…
They operate behind the facade of whatever system is dominant at the time.
Which is why the cabal can survive empires rising and falling… they are the invisible empire.

They don’t just hide among the faithful.
They hide inside the institutions of faith, law, and finance, rewriting them from within.

Today, their plan is almost complete:
- Central banks converging into a single digital currency.
- Nanotech & IoB (Internet of Bodies) linking every human to the surveillance grid.
- AI false prophet performing counterfeit “miracles.”

The END isn’t coming… it’s already here.
Like the END in The VOX of SU, their power depends entirely on secrecy.

The moment we name them, the system fractures.
Crypto-Jews
Birth of a global spy grid…

Crypto-Jews had to be spies to survive.
When Sabbatai Zevi’s movement went underground after his forced conversion (1666), his followers infiltrated hostile societies by pretending to be part of them…

Outwardly Christian, Muslim, or secular revolutionary.

Inwardly loyal to the Sabbatean-Frankist network.

This required:
Secrecy —> coded rituals, encrypted language.
Deception —> building false identities, like modern “legends” for covert operatives.

Networked intelligence —> cells of insiders sharing info only with trusted nodes.

They weren’t just hiding. They were observing.

Every position they gained…
in courts, churches, guilds…
became a surveillance node for the hidden network.

This wasn’t random survival.
It was the birth of the ultimate global spy grid.
The Crypto Code

Crypto-Jews didn’t just conceal themselves.

They developed coded systems for transmitting information across borders…
—> Secret hand signs and phrases like Masonic lodges later used.
—> Written ciphers embedded in religious or business texts.
—> Merchant caravans and banking couriers as communication backbones…
early “encrypted routers.”

This became the blueprint for:
- Intelligence dead drops,
- Enigma machines,
- Today’s digital encryption.

The crypto Jew created crypto 🤓
Read 16 tweets
Sep 18
How to Harness your Own Free Energy for Free

Free energy doesn’t have to be complicated… humans have done it for thousands of years before the grid.

Most of the complexity comes from the system itself…
permits, regulations, “certifications”…
all carefully designed to gatekeep what is actually simple and ancient.

This thread 🧵, provides the minimal resources needed to generate free energy for a home or small community, requiring no special expertise and easily shared knowledge.

It provides a full spectrum of free energy harvesting, using what nature provides and what the system throws away. These methods require minimal tools, rely on salvaged or natural materials, and break the illusion that energy must be bought or controlled.
Tree Battery: Step-by-Step

Purpose: Harvest small amounts of bioelectricity from a living tree to power LED lights or small devices.

Materials (Free or Salvaged)
- 1 healthy living tree
- 1 copper wire (1–2 feet long)
- 1 zinc-coated nail (or galvanized steel nail)
- 1 small LED light string or low-voltage device (like a garden light)

Optional: multimeter to measure voltage

Instructions:
1.Choose a Tree:
Select a healthy, well-rooted tree with good moisture content… maples, oaks, or fruit trees work well.

2.Insert Zinc Nail:
Hammer the zinc nail gently into the tree about 1–2 inches deep, at waist height.

3.Place Copper Wire:
Insert the copper wire into the tree a few inches away from the nail.
The zinc acts as the positive terminal, and the copper as the negative terminal.

4.Connect the Circuit:
- Attach a wire from the zinc nail (+) to the positive lead of your LED string or device.
- Attach a wire from the copper (-) to the negative lead.

5.Light It Up:
A single tree produces about 0.5–1 volt.
Chain multiple trees in series to increase voltage…
like batteries linked together.

Output Uses
- Power small LED garden lights.
- Run sensors or tiny electronics.Image
Saltwater Battery (Ultra Simple & Non-Toxic)

Best For: Beginners, teaching energy principles, low-power lighting.

Materials:
- Plastic or glass container (jar or bucket)
- Saltwater solution (salt + water)
- Copper strip or wire
- Zinc nail, galvanized nail, or scrap steel
- Wires to connect

Instructions:
1.Mix saltwater until fully dissolved.
2.Place the zinc nail on one side of the container.
3.Place the copper strip on the opposite side.
4.Attach wires to each and connect to a small LED or device.
5.For higher voltage, connect multiple jars in series (like linking AA batteries).

Output:
Enough to power LED lights, sensors, or trickle charge a small battery bank.Image
Read 15 tweets
Sep 18
The official story of the internet is a fairy tale…
a shiny tech utopia about “connecting humanity” and “knowledge access.”
But if we follow the dark fiber trail from ARPANET to MK Ultra, the pattern shows that the net wasn’t built for us, it was built around us.

🧵 The True History of the Internet and it’s Programs
ARPANET (1969) Military Origins

The internet began as ARPANET, birthed by DARPA (Defense Advanced Research Projects Agency).

Its original purpose was survivable command and control during nuclear war.

The nodes were universities and labs, yes, but only to test and map human communication patterns, like rats in a maze.

“If you can model how humans communicate under stress, you can control them.”

This is the seed of a digital panopticon, not a library of Alexandria.
Phoenix Program → Digital Counterinsurgency

During Vietnam, the Phoenix Program was a CIA-run counterinsurgency op to track, identify, and neutralize dissidents.

They used informant networks, biometrics, and early computational systems to catalog entire populations.

After Vietnam, these tactics didn’t vanish… they scaled up, eventually merging with ARPANET and later internet technologies.

Phoenix wasn’t just about killing insurgents. It was proof-of-concept for networked population control.

Think of Phoenix as MK Ultra for entire societies…
test it on villages, then wire the whole planet.
Read 10 tweets
Sep 17
⚠️ THREAD: The Bio-Digital Kill Switch ⚠️

This is a thought experiment, not a claim.
I’m showing how existing technology could be combined to create a system so powerful, it could control life and death without leaving fingerprints.

Everything here is real and documented.
The only question is how far it’s already been connected. 🧵
⚠️ THREAD: The Snake Bite System ⚠️
How a bio-digital kill switch could be built today using tech that already exists.

This is a thought experiment, but every piece I show you is real and documented.
The question isn’t whether it can be done.
The question is who’s connecting the dots.

The three layers of control

To create a silent kill switch, you need three layers:

Biological: a change in your body that makes you susceptible.

Digital: a device tethered to your identity, always monitoring.

Network: the infrastructure to target and trigger remotely.

All three layers already exist.

And are already integrated in to society through mRNA transfection, eSIM, and 5G…
Digital identity: eSIM backdoor

Modern phones no longer rely on removable SIM cards.
They use eSIMs…
virtual SIMs that can be programmed remotely.

Patents show they can store multiple profiles, which can be:
- Added
- Deleted
- Activated
Without your knowledge.

Patent US10715978B2 – remote provisioning of multiple eSIM profiles
Patent US20170289788A1 – silent activation/deletion of profiles

This means a second, hidden line can run on your phone… invisible to you.

The kicker… most networks won’t let you use both eSIMs which means a backdoor is open at all times.
Read 17 tweets
Sep 12
The Premature Headlines

Charlie Kirk wasn’t just assassinated
his death was scheduled.

These screenshots show multiple outlets publishing headlines three days ago, before the shooting even happened (see time stamps highlighted in red):

Record Herald: “Charlie Kirk shot and killed at Utah college”

State Hornet: “BREAKING: Charlie Kirk fatally shot at Utah Valley University”

Racism.org: “Charlie Kirk, White Supremacist, Dead at 31”

Even PBS News and WETA had the story indexed one full day early.

Your phone captured the Google timestamps before they were scrubbed.
Now, those same articles have been quietly updated to display Sept 11 timestamps…
a digital rewrite.

This did not happen 3 days ago!Image
Image
Image
Image
Why This Matters

Narrative Pre-Loading
These stories were written, distributed, and queued for release in advance.
Someone, or some system, accidentally triggered them early.

The 9-Hour Offset
Utah is UTC-6, Israel is UTC+3.
The exact 9-hour difference matches the anomaly we saw at 09:11 UTC,
suggesting the master clock controlling the narrative runs on Israeli time.

Palantir’s Role
Palantir’s Foundry platform routes global data and media feeds.
Their Israeli nodes likely pushed the narrative packet,
linking this event to the telecom “cable failures” and the global reset that occurred on 9/11.Image
Image
Image
Image
It’s all connected.

Everything comes down to prophecy, if it isn’t prophecy… it is the World Stage.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(