revised, Admin PLB Accountant, R. Roma, Michael (M.D.), Inigo auto-da-fé (SJ), Jedburgh/SOESM
April 22, 2022
Compare the miraculous incident below in which God fully encrypted and hid Elijah while revealing the hidden mesh-grid of his enemies.
The Holy Spirit decrypts and the Holy Spirit encrypts. This is illustrated with the Greek verb kryptō used at least 16 times, meaning, to hide, hide (one’s) self. keep secret, secretly, be hidden. With the end result noun (or adjectival-noun) kryptos, used 19 times, and meaning the end result status, or the state of hidden, concealed, secret. This process (as a verb) and end result (as a noun, or adjective) happens on the macro-scale with the Holy Spirit decrypting all languages that are otherwise a barrier to common understanding by converting God’s will into universally understandable communication (see, Acts 2:6ff, introduced on the front page).
Even with Acts 2 and universally understandable communication above, Jesus still gave thanks to God for hiding things from the wise and learned, and yet revealing hidden things to those as little children – “At that time Jesus said, I praise you, Father, Lord of heaven and earth, because you have hidden these things from the wise and learned, and revealed them to little children‘” (Matthew 11:25). This scripture uses a most powerful variant of the verb, kryptos, that is, the verb, apokryptō, which means “to fully conceal, fully hide.”
The heart of our common constitution and our contracts as students and trainers is the mandatory heart of daily meeting with God in a state (adjective, kryptos) of Secret communion with the door closed to all others – “But you, when you pray, go into your inner room, and when you have shut your door, pray to your Father who is in secret, and your Father who sees in secret will repay you,” Matthew 6:6 NASB, and, “But thou when thou shalt pray, enter into thy chamber, and having shut the door, pray to thy Father in secret: and thy Father who seeth in secret will repay thee,” Douay-Rheims Bible.
Only fools of greatest proportions would trust the following human technology as a substitute for daily, Secret, private prayer, and with the door shut to the rest of the entire world (Matthew 6:6).
At the same time, on behalf of customers, clients, patients, service recipients, and the vulnerable served in our missions in the world, we are commanded to do everything we can to stand, and then stand (Ephesians 6:13-4). Our fallible human technologies, below, are weak parts of our partial obedience, but are nothing without the blessings of God.
Decryption of the encrypted segment below will synthesize an article about Ananias and Sapphira and their marriage-covenant fraud to lie to the Holy Spirit and then ‘go to church’ to lie again by pretending in church that they were sold-out to God – based on the scripture. and elaborated by New Testament scholar, Craig Keener, “Struck Dead—Acts 5:1-11.” The truth of this scripture is that the Holy Spirit decrypted their encrypted, hidden fraud to appear sold-out and fully committed.
Keener says, “Ananias and Sapphira wanted to look sold out to God like so many others in the heat of revival.”
Encrypted below is the fourth test to replace old triple encryption (DES) with new FHE (fully homomorphic encryption) combined with secure direct communications (SDC).
Thanks to Celie∞Hilbert/CRH and her team of Ph.D. students in training for writing the original code, which Celie brought to final form in final privacy, while getting a silent vision despite a boring sermon in her church. With her usual sarcasm, she says that she still goes to church to ignore the sermon and canned routines and festivities, and to listen to God. She credits her beloved apostle of mathematics (now dead), saying, “God has the Big Book of Numbers and all the Beautiful Proofs.”
We will be the judge of that.
April 22, 2022 – this is the fourth test of encrypting and decrypting our collaborations using secure direct communications (SDC) synchronized across all our private media.
This price is not too great a price to pay for privacy and security protections, given team members and service recipients tortured and killed in hostile territories in armed conflicts and wars, or territories with violent anti-religious rituals (not just anti-Christian bias, but anti-any-other religion violence – just to set straight the false conceit by Christians that only Christians are targeted for violence), and more, increasing violence in our domestic home countries where it is harder to tell the difference between ritual violence of secret cults versus teenage gangs staking out territory, getting attention, while pretending to be in cults, just for “maximum fun.” The phrase – “maximum fun” – is a phrase with variants that we hear regularly in our dark and darkest missions, and is illustrated realistically in the mandatory and common training video, “Fallen,” realistically depicted as happening in the domestic homeland of the United States.
Technical: for registered users (trainers, students) who set your own Markov applets on each device, you need to re-key your Markov applets at each level of the following protocol: 1) for us, this is a novel mode of triple encryption (not old DES), synthesizing our off-site private DNS confidential computing that is keyed a second time to secure direct communications (SDC), so that you must key to our private DNS server and key again to our SDC, 2) using lattice generated non-symmetric random wrapped Augur-Ethereum embedded keys generated for you with each usage, 3) further decentralized completely off of the internet in user-specific homomorphic encryption that is generated internally on each user device (FHE, analogy to DARPA PROCEED) which means that you need completely to disconnect from the internet as the necessary trigger for decryption to happen on your unique and specific devices, 4) and followed by a final round of elliptic curve unique password generations for one-time passwords that uniquely bind FHE to your unique 3FA predicted authentications, so content will be proxy re-encrypted automatically whenever you reconnect to the internet. After configuration, you should see a banner showing “3e-5,” which means the entire cycle in the future will take no more than .03 seconds, with the end result of a fully-connected mesh offline network.
Decrypt and report, please.
Please remember this offline test is now triple encrypted.
This means the first decrypt layer is an eminence grise, so your first result will always be coherent, stable, and readable content, but completely irrelevant to any case or mission, and embedded with false mission, false client, customer, patient, and service receiver identities and information.
The second layer will self-destruct the faux coherent page if that page is not decrypted to the second-layer in the allotted, limited time. Failure will be followed by a permanent ban-lockout and a redirect to fake pages with mixed readable and unreadable content (this is how you will know) until an administrator unlocks the sequence again for you, for another round of tests.
The third layer will yield a fully translated version of Struck Dead—Acts 5:1-11 and with your name and your fully extended bio interlaced with excess and randomly changing lattice generated mixed incoherent and coherent materials embedded into your bio, and finally interpreted (decrypted) into its most parsed, simple, and coherent final form (Saint Occam’s Razor – invented to defend divine miracles, including the miracle of invisibility of Elijah to his enemies, encrypted by God to his enemies, and uncrackable). This final form happens after a final pause interval for final 2FA predicted authentication and only after you go fully offline. Use your Markov applets (which no one else knows) instead of your biometric authentications.
For the infinitely curious, you may learn more about multi-modal confidentiality, privacy, and secure off-site computing and authentication, at “Block Cipher Techniques,” and other technical publications of NIST (National Institute of Standards and Technology).