Add files via upload

This commit is contained in:
Riccardo Giuntoli 2019-11-10 09:19:51 +01:00 committed by GitHub
parent 56487aaaad
commit 82e4e898a5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -79,10 +79,12 @@ So let's consider the image on the header. Like I explain it is a production lin
![Mantis](../Images/04-praying-mantis-nationalgeographic_2301352.jpg) ![Mantis](../Images/04-praying-mantis-nationalgeographic_2301352.jpg)
Let's analyze this radical transformation that can occur in a mind because the work of a expert human hacker. This is in reality what we've described as this peculiar profession. I think that a transformation like this need at least ten years of work. The result is a perfect **Mantis** [[23]](https://en.wikipedia.org/wiki/Mantis). A tool in human hacking. Let's analyze this radical transformation that can occur in a mind because the work of an expert human hacker. This is in reality what we've described as this peculiar profession. I think that a transformation like this need at least ten years of work. The result is a perfect **Mantis** [[23]](https://en.wikipedia.org/wiki/Mantis). A tool in human hacking.
1. Find the correct prey using the tools present in the synthetic telepathy network. The hacker, or better say the stalker, use this network to search for a woman that enjoy sex, is beautiful, aggressive, with some type of childhood trauma that cause her to fall in drug abuse, cocaine normal or sexual violence, and like luxury ambients. The stalker usually have to apply a vast check list of different comportments and physical values. He will utilize programmed situation in real life using a tool, but like we're speaking about reality those tool are obviously human relations with some other that are already infected by the visual cortex system read. Others victim that accept to work in this world. Using the machine of the other the human hacker read value of the victim, the girl. Like how many times she got orgasm when she is having sex or if cocaine or others drug affect her nervous system and if with heavy abuse when her mind and her body collapse. Another think that the stalker search is if with alcohol and cocaine the sexual defenses of the victim go down. 1. Find the correct prey using the tools present in the synthetic telepathy network. The hacker, or better say the stalker, use this network to search for a woman that enjoy sex, beautiful, aggressive, with some type of childhood trauma that cause her to fall in drug abuse, cocaine normal or sexual violence, and like luxury ambients. The stalker usually have to apply a vast check list of different comportments and physical values. He will utilize programmed situation in real life using a tool, but like we're speaking about reality those tool are obviously human relations with some other that are already infected by the visual cortex system read. Others victim that accept to work in this world. Using the machine of the other the human hacker read value of the victim, the girl. Like how many times she got orgasm when she is having sex or if cocaine or others drug affect her nervous system and if with heavy abuse when her mind and her body collapse. Another think that the stalker search is if with alcohol and cocaine the sexual defenses of the victim go down.
2. After a little bit of survey the stalker usually go in the same neighborhood next to the victim and catch her normally in a market where he starts to work or in a discotheque smelling her like a wolf. This is not an history this is the reality. Yes it is not simple find one, but if you find him take care. Go away! He will try to have a sporadic sex relation with the victim to investigate more her mind and body. Why? Remember that he is an hacker. To **exploit** [[24]](https://en.wikipedia.org/wiki/Exploit_(computer_security)) her fantasies but in reality to exploit her weakness. But remember that like nobody explain this old art, probably Japanese, and there's no public repository of exploit. Like **exploit database** [[25]](https://www.exploit-db.com/) for systems. 2. After a little bit of survey the stalker usually go in the same neighborhood next to the victim and catch her normally in a market where he starts to work or in a discotheque smelling her like a wolf. This is not an history this is the reality. Yes it is not simple find one, but if you find him take care. Go away! He will try to have a sporadic sex relation with the victim to investigate more her mind and body. Why? Remember that he is an hacker. To **exploit** [[24]](https://en.wikipedia.org/wiki/Exploit_(computer_security)) her fantasies but in reality to exploit her weakness. But remember that like nobody explain this old art, probably Japanese, and there's no public repository of exploit. Like **exploit database** [[25]](https://www.exploit-db.com/) for systems.
3. The stalker got access to the "Machine" of the network. With this radio waves machine he can masturbate continuously the victim. Using the reproductive system over excitement described on chapter one. Also using dream injection the stalker can provoke that the victim fall in love with him, creating a psychological dependency with one's executioner, the **Stockholm syndrome** [[26]](https://en.wikipedia.org/wiki/Stockholm_syndrome). Day by day the stalker became the master of the victim something similar to what we find in BDSM ambients.
4. Women got many times the same weak point, that is not a weak point but if you're stalked yes it is, child. The insanity that is present in this network is enormous. I've listen to the owner to menace a lot of women, mi ex girlfriend also, to violate them child, and she has done it! With this threat women became very vulnerable. They start to oblige them to have bigger and bigger orgies, so they lose the limit of sexual violence. And this is another very important step in the forge of a human mantis tool.
# External links # External links
@ -136,4 +138,6 @@ Let's analyze this radical transformation that can occur in a mind because the w
25. https://www.exploit-db.com/ 25. https://www.exploit-db.com/
26. https://en.wikipedia.org/wiki/Stockholm_syndrome