ASK N U SHALL RECEIVE

04.01.2022

APRIL FOOLS

THE HOLY SPIRIT

If you take all the quotes of a person or a president and you add them together you’ll get straight messages…from the dead whom have risen up for such a time as this…..

“I send you a cipher to be used between us, which will give you some trouble to understand, but, once understood, is the easiest to use.”

It was a way to keep “matters merely personal to ourselves” as well as a way to “have at hand a mask for whatever may need it.”

“suppose the keyword to be ‘antipodes’ write it thus.

then copy out the ciphered line thus. uvyvqb&mgtsfrcsssnjemcuqitm.”

“look for the t. in the 1st vertical column, & a in the 1st horizontal one gives u.”

“I am at the head of the Missouri. All is well, and the Indians so far friendly.”

Or more securely (with the keyword of “artichoke”):

“jsfjwawpmfsxxiawprjjlxxzpwqxweudusdmf&gmlibexpxu&izxpsecr”

“stealth.”

Remember, if you don’t see the Ashlar “A”, it’s not authentic.

By Brothers, For Brothers & always For the good of the craft…

Masonic Cipher

About the Cipher

Masonic cipher or cypher is also known as pigpen cipher and was used frequently not only by the freemasons but by individuals all around the world. Famously used to deliver messages during various 18th century conflicts, it is still effective for messages that are short enough. While some believe it to be secret, it is not. Masonic/Pigpen cipher is taught to children in schools around the world and has fallen into common use as a children’s riddle. This particular tool uses the configure as shown below. Various concordant bodies within freemasonry such as the york and scottish rite, still teach it but use a variety of configurations relating to the arrangement of the symbols. Not being a member of anything other than the bue lodge, this designer of this page is not privy to those configuration, nor would he disclose them if he was.

Define a Key

Type in a short encryption key and then take another look at the encrypted alphabet above and how the key is implemented should become apparent. Note that duplicate characters are dropped from the key. So in essense an encryption key of “freemason” would be the same as an encryption key of “fremason”.

Deciphering

1. To read or interpret (ambiguous, obscure, or illegible matter).

2. To convert from a code or cipher to plaintext; decode.

1. to determine the meaning of (something obscure or illegible)

2. (Communications & Information) to convert from code into plain text; decode

1. to make out the meaning of (something obscure or difficult to read or understand): I couldn’t decipher his handwriting.

2. to interpret by the use of a key, as something written in cipher: to decipher a secret message.

3. Obs. to depict; portray.

1. to make out the meaning of (something obscure or difficult to read or understand): I couldn’t decipher his handwriting.

2. to interpret by the use of a key, as something written in cipher: to decipher a secret message.

3. Obs. to depict; portray.

de·crypt  (dē-krĭpt′)

tr.v. de·crypt·ed, de·crypt·ing, de·crypts

1. To decipher.

2. To decode.

n. (dē′krĭpt′)

A deciphered or decoded message.

[de- + -crypt (from cryptogram).]

de·cryp′tion n.

1. (Communications & Information) to decode (a message) with or without previous knowledge of its key

2. (Broadcasting) to make intelligible (a television or other signal) that has been deliberately distorted for transmission

To convert encrypted text into its equivalent plain text by means of a cryptosystem. (This does not include solution by cryptanalysis.) (Note: The term “decrypt” covers the meanings of “decipher” and “decode.”) See also cryptosystem.

rewrite – write differently; alter the writing of; “The student rewrote his thesis”

To find the key to (a code, for example):

break, crack, decipher, puzzle out.

“We defend and we build a way of life, not for America alone, but for all mankind.”
— Franklin Delano Roosevelt

“Freedom of thought and the right of private judgment in matters of conscience direct their course to this happy country.”
— Samuel Adams

Without Freedom of Thought, there can be no such Thing as Wisdom; and no such Thing as publick Liberty, without Freedom of Speech.
— Benjamin Franklin

Our government conceived in freedom and purchased with blood can be preserved only by constant vigilance.
— William Jennings Bryan

“We have built no temple but the Capitol. We consult no common oracle but the Constitution.”
— Rufus Choate

If he give a gift of his inheritance to ☝️ of his servants, then it shall be his to the year of liberty; after it shall return to the prince: but his inheritance shall be his sons’ for them.

I will walk at liberty: for I seek thy precepts.

But whoso looketh into the perfect law of liberty, and continueth therein, he being not a forgetful hearer, but a doer of the work, this man shall be blessed in his deed.

And that because of false brethren unawares brought in, who came in privily to spy out our liberty which we have in Christ Jesus, that they might bring us into bondage:

But before faith came, we were kept under the law, shut up unto the faith which should afterwards be revealed.

Stand fast therefore in the liberty wherewith Christ hath made us free, and be not entangled again with the yoke of bondage.

freedom

ἐλευθερία (eleutheria)

Noun – Nominative Feminine Singular

Strong’s 1657: Freedom, liberty, especially: a state of freedom from slavery. From eleutheros; freedom.

Freedom

Kingdom

Wisdom

Christendom

Now the Lord is that Spirit: and where the Spirit of the Lord is, there is liberty.

Return of Magdalene and daughter of Zion

Liberation Angel to bring her to her place to rebuild 3 temple fo she has already built the temple in Heaven

Greetings Mr. Robin Bullock may grace, mercy, and peace surround your family in love, faith and hope…as you play chess with Satan…the move of “the Fortress” checkmated Satan before he started to play game the game of the Gods…the virtual reality chess game that uses a looking glass to create statistical analysis “like a weather modeling system” very complex quantum requirements and testing before inserting the code into production “REAL-TIME REAL PEOPLE IN 3D ON Earth aka in Reality” probabilities of the outcome. “U already understand the complexity of such a system” N WE ALL KNOW THIS IS A WAY TO GAMBLE MONEY AND TO HAVE DOMINANCE OF THE WORLD…so the AI is constantly being updated just like Microsoft updates etc.

Why am I telling u what u already know?

In chess, the fortress is an endgame drawing technique in which the side behind in material sets up a zone of protection that the opponent cannot penetrate. This might involve keeping the enemy king out of one’s position, or a zone the enemy cannot force one out of….

10 Positions Chess AI Just Don’t Understand

#1: Closed Positions

#2: Fortresses

#3: Breakthroughs

#4: Planning

#5: Prophylaxis

#6: The Horizon Effect

#7: Zugzwang

#8: The Mad Piece

#9: The Trapped Piece

#10: The Pinned Piece

Ironically, the 10 commandments matches up with this….

Today, the spiritual battle field is hyperspace on the internet…

Virtual reality linked to the Astro plane….

Technology that has a the ability to forecast the future is only as good as the programmer…so given Satan’s talent base…and knowledge of scripture and the voice of Alexa “THE BEAST SYSTEM” programming logic…we now see Alexa telling the Elites secrets.

She doesn’t even know she is telling on herself…😂

My guess is nobody has logged a support ticket to fix this bug therefore the queries being searched in all the databases linked together is finding the plans of the enemy as it searches for the correct probability to predict future events…😂

In programming this is called a loop for it cannot calculate anything outside of the loop because this data simply hasn’t been created yet.

Watch the following….

I want you to visualize a database…

Specifically the database that holds all individuals medical records…so hospital, regular doctors office, off sight medical imaging centers…

I want you to visualize the amount of records each individual and the number of files contained in their medical history…

Now, remember when you do this….keep in mind this is just one of the databases that AI looks to for certain conditions that match the words of the query to produce predictably statistics…

How many databases would there be need to provide a probability of any circumstances in the real world scenario?

The world is made of bubbles….

U r a bubble, I am a bubble, every angle of the world thought pattern is a bubble…so it is logical to say…7.7 billion bubbles are constantly shifting shapes n sizes n the length of time until they pop, even the way the wind blows…affects the life of the bubble….

A database is a bunch of bubbles connected together to form a gateway “the bubble blower tool” must be used to create bubbles…

The soap is the agent needed for the creation of the bubble for without it the bubble doesn’t exist…

We are the soap….

Which means we can clean the system up from the dirt inside the flawed to redirect the outcome of probabilities….

Here is wisdom and understanding….

1. Who owns the databases the AI runs on?

2. What offsite locations are there with servers stored in air conditioned vaults?

3. How many databases are linked together to query in the quantum database for future prediction decisions?

4. Where is the data coming from that feeds the databases?

5. Why are the people of the world risking their soul’s freedom held within their digital footprint?

My point….

How can the American people take back their souls identity that has been highjacked by an invisible behavior modeling system of predictably to effect AI algorithms?

Answer….

Feed the system data with a new digital footprint of behavior…

Counterattack by providing the system with a data in which the algorithms cannot compute causing major errors in their ability to future tell…

Decrypt the AI’s ability to follow behavior patterns…

This will cause a mess for the IT DEPARTMENT to try to figure the error in the code. The error won’t be there bc it is an invisible bubble that popped from within…via unidentifiable data…

This will create a delay in the overall plan of the enemy for the technology won’t work as expected…

This is where we take back our soul bc it doesn’t belong in a system…God cannot be contained nor can a house be built big enough to contain him….

The data currently being stored without your permission in this beast system will be back into your control…

Then we optimize the system and the gate of heaven will unlock…held in the bloodline.

I heard the man who was wearing garments of honor, and he stood above the waters of the river, who lifted up his right hand and his left hand to Heaven, and he swore by the life of eternities, “To the time, times and half a time, and at the time when the power of all the holy nation will be saved, all of these things shall be finished”

They shall fall by the mouth of the sword and they shall be led captive to every region, and Jerusalem shall be trodden down by the Gentiles until the time of the Gentiles will be finished.

When these four beasts give glory and honor and thanks to him who sits upon the throne and to The One Living to the eternity of eternities, amen.

“But in the days of the seventh Angel, when he shall sound, the mystery of God is completed, which he evangelized to his Servants The Prophets.“

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s