Advertisement
Examining Patent 060606 and Understanding the Covid Vaxxed Cyborgs
This is part 1 of 2, hopefully. This was the meat and potatoes. For those with eyes to see and ears to hear...this is the truth.
Let me know if I presented this to an understanding. It is an amazing time of life.
If you love 153news.net, please support her!
- Category: Uncategorized,Covid Related,Servants of Evil,Pursuit of Truth
- Duration: 43:54
- Date: 2024-03-10 18:28:53
- Tags: no-tag
33 Comments
Video Transcript:
Hi everybody, my name is Jason Boss. I'm a researcher with 153news.net. It is March 10th, 2024. And today's topic that we're going to be going over is the patent 06 06 06. As anyone who has been following my research knows, the results of what I have found out are staggering. The people who have been vaccinated with Pfizer, AstraZeneca, Moderna, Sputnik, they are all now displaying and broadcasting Bluetooth macadresses. They are essentially a computer inside the human genome. And some people that have taken multiple vaccines that have taken Pfizer and Moderna end up with two complete, separate networking protocols that are running in them. And as we have been investigating this, I have been putting out a tremendous amount of research. And if you guys want to go back through any of my stuff at 153news.net, you will see that I have not only categorized and logged. And proven without a shout of a doubt that there are way too many Bluetooth macadresses to even account for amount of people. Some people have up to four macadresses. I've seen five on one particular person before. Now, what does this mean for humanity and why is this important? Well, this is why I'm going to be going over this particular research topic, which is the 06 06.06 patent. And before I begin, I must explain that I have nine pit bulls and I live with a tin roof over my head. And so there's a tremendous amount of background noises. I don't have a production studio. I have a really old tablet that I'm recording all of this on. And so for the background noise and for any interruptions, my apologies to you guys out there. Now, before we go too far into this, I'd like to read a piece of scriptures with you guys. Because this is something that is very, very important in the way that we have to be understanding this. The Bible verse in particular, comes from the book of revelations. And it's actually not even the right translate. The name of it is in the right. It's Cousin. It is the proper Hebrew for this. But when we're looking at this particular verse, this is a very mysterious verse. It's set of verses. And this is comes again from revelations 13 and 16. And he causes all both small and great and rich and poor and free and slave to be given a mark upon the right hand or upon their foreheads. And that no one should be able to buy or sell except he that has the mark or the name of the beast or the number of his name. Here is the wisdom. He who has understanding let him calculate the number of the beast for it is the number of a man. And his number is six. Six. Six. So before we begin into going over this patent that deals with the mark of the beast number, which is six, six, six. I want to go over some qualifications of who I am and why I am qualified to give you guys this information. And I have lived my entire life in the IT world inside of that IT world. One of my specialties was RF radio frequency and high speed networking. And everything that goes along with high speed networking from the routers and switches to everything that makes it function. And especially the wireless access points. And what's happened to the people is that all of those technologies have somehow been able to be injected into them. And that is why they're broadcasting out. And so my entire life has been bringing wireless networks to life where I would go up to a mountaintop, put up an antenna, go to a house, put up an antenna and sustain a link between these two locations. So when the people start scanning with Bluetooth, it's very, very fascinating because this has been my entire life. And not only have I lived my entire life in this industry, I also spent years at Google in the largest data centers in the world building out infrastructure and doing the repairs of these machines. As we go into what this patent is, I am very much experienced into all of this stuff. What we're talking about and I will try to decipher it to the best of my abilities down to you guys so that you guys can make sense of all of this stuff because it is a very, very wild world. So it's like sci fi, it's like sci fi brought to life. And so what we are examining here is we are examining W02020060606. And the patent description is cryptocurrency system using body activity data. Now the original date of this is, well the publication was on 3262020. And for those in the new neurology, there's all sorts of stuff right there into all of that. This is the publication number W0 slash 2020 slash 06 or 6 or 6. So we do know based upon scriptures that if we have understanding, if we have wisdom, if we're going to calculate the number of the bees for the number of a man and his number is 666. Now when we look into this, we're looking at a bunch of men who put this together. And this is the filing date was 620 2019. This is all the licensing stuff that they have together applicants, Microsoft technology licensing. We have before us the eugenicist, the guy who would love to genocide the entire world, we have Mr. Bill Gates. And his father is also into eugenics, also into trying to depopulate the world. And by Bill Gates' own mouth, he said that he would depopulate the world. So these are the inventors. These are probably people that have a lot of unclean spirits have done a lot of very evil things. But what we are dealing with is we are dealing with nanotech infrastructure that is basically powered up inside of the human body. And so these guys have invented a way to bring a basically a full on computer system into their slaves are now slaves. So these are the agents of evil has priority data there, all of this stuff. I just want it to be very, very clear what we are reading. Now I've read this before, but we're going to read the abstract again so that we are very thorough on this human body activity associated with the task provided to a user, maybe used in a mining process of a cryptocurrency. A server may provide a task to a device of a user, which is communicatively coupled to the server. A sensor communicatively coupled to or comprised in the device of the user may sense body activity of the user. Body activity data may be generated based on the sensed body activity of the user. The cryptocurrency system communicatively coupled to the device of the user may verify if the body activity data satisfies one or more conditions set by the cryptocurrency system and award cryptocurrency to the user whose body activity data is verified. Okay, what did that just say it just said that there is a system in place that allows a person to be paid in cryptocurrency when a job is sent to them and the job has been done. It has been verified using a body fluid of the person. It's going to pay them in cryptocurrency. This is where we are right now. 145 are the people. These used to be humans. 145 used to be humans after the COVID vaccine. 145, 140 and 130 are all the same system. They're all the same people. The sensor is in the people, the user devices in the people, the operating system is in the people. All of this is now together in 145. 145, that brings us to the blue tooth MAC addresses that are everywhere. Well, there's the communication network. How do you control the slaves? How do you get the information to the slaves? How do you send them jobs? Well, you do it through the communication network because everybody has become a cyborg. There's a blue tooth MAC address radiating at least one up one and sometimes up to five on every single person that's out there. So now the people are all part of the beast system. Now this is a large picture of this as it popped in there. 110, we will read up exactly what 110 is and that's more of the job servers. What are you going to do? Whose ads are you going to be seen? Are you going to have a new pair of Nike shoes sent to you in your dreams? Well, this is what 110 would send that into the blue tooth communication network, which will pop that out to everybody that's sitting there awaiting commands on bluetooth. Now we're going to go back right here and we're going to go over this again very in depth. Now we're heading over to the description and this patent and this description is a it's a it's a wowser it's a doozy and as you can see it is very slow to load on this but there is a tremendous amount of information on what these guys are doing and that actually didn't even take me to where it was. Let me try this again and see if this is what I'm going to do. This is the what they say is the whole system right so it says at the top text based on automatic OCR recognition process. Basically they took this and some of this they may say is probably not right because of the OCR but this all came from scanning a text. So it's an English cryptocurrency system using body activity data background a virtual currency also known as the digital currency is a medium of exchange implemented through the internet generally not tied to a specific government back fiat printed currency such as the US dollar or the euro and typically designed to allow instantaneous transaction of borderless transfer ownership. One example of virtual currency is cryptocurrency where crypto cryptography is used to secure transactions and control the creation of new units. Okay guys as we're going through this don't let this bore you out yet because what they're doing is they're describing their patent and how it's going to work. And so they have to describe all of these pre-equasites before this and this is a little dry I will try to explain it I don't think there's anything I need to explain in the very first thing it's very clear they're talking about what cryptocurrency is and if you guys don't know what they're doing. Okay two several cryptocurrencies exist and that's like I don't even know why they would say something like that there's thousands of cryptocurrencies that exist. Okay among these the most well known is a blockchain based cryptocurrency most blockchain based cryptocurrencies decentralized in the sense that it has no central point of control however blockchain based cryptocurrency can also be implemented in a centralized system. Having a central point of control over the cryptocurrency Bitcoin is one of the examples of blockchain based cryptocurrency it is described in a 2008 article by Satoshi Nakamoto named Bitcoin a peer to peer electronic cash system. Okay so I was missed at the top of that they weren't actually talking about like individual cryptocurrencies they were talking about blockchain based and so what they are saying here is that there is a way to do that. It's a way to do this same thing locally it doesn't have to be something like Bitcoin but you can also implement in a centralized system having a central point of control over the cryptocurrency so essentially they're saying they are the bank is what they're saying by this. Electronic cash system 003 003. If blockchain is the data structure that stores a list of transactions and can be thought of as a distributed electronic ledger that records transactions between source identifiers and destination identifiers. The transactions are bundled into blocks and every block except for the first block refers back to or is linked to a prior block in the blockchain. Computer resources or nodes maintain the blockchain and crypto graph graph it. Sorry, yes crypto graph that can lead validate each new block and transactions contained in the corresponding block. This validation process includes computationally solving a difficult problem that is easily easy to verify and is sometimes called proof of work. This process is referred to as mining the mining may be a random process with a low with low probability so that a lot of trial and errors required to solve a computationally difficult problem. Accordingly the mining may require enormous amounts of computational energy. Okay, what did they just say with this? Well it explains exactly what a blockchain is and for a blockchain just to dumb this down it basically starts at zero goes to one two and it counts up and in every one of those it puts in a. Transaction what is happen for the most part they are visible blockchains do not need to be invisible they can be invisible you can have internally you don't need to do what people do in mind to get them you can mind them yourself you can create them yourself you can distribute them yourself. So what they are saying here is that when you are using a typical blockchain there is a problem sent to a computer the computer solves the problem sends back the answer to the server the server says yes and it will allot you a certain amount of cryptocurrency based upon that. So this is what it is saying is all it is doing is explaining the same blockchain that everybody uses in this way okay zero zero zero four. It is with respect to these and other general considerations that the following embodiments embodiments have been described also although relatively specific problems have been discussed it should be understood that embodiments should not be limited to solving the specific problems identified in the background. Okay so what this is saying is that everything that we just talked about right there they are going to do something a little bit different right they are going to do it and it doesn't have to be done exactly this way it is not limited to the ways that we knew how to do it summary some exemplary embodiments of the present disclosure may use human body activity associated with a task provided to a user is a solution to mining challenges in cryptocurrency systems. Okay that line right there let's talk about what this exactly said it's talking about with some way you can disclose human body activity and you can send them a task and get a proof of concept back it's a two way communication now they say for example a brain wave or body he emitted from the user when they are using the brain wave. It's a question that is from the user when the user performs the task by an information or service provider such as viewing advertisement or using certain internet services can be used in the mining process. Excuse me what in the world did that just say it just said that somehow you're going to monitor the brain wave or somehow you're monitoring the body heat emitted from a user when the user performs the task and then it tells you the task the information or service provider now what is the service provider well Google ads is a service provider Microsoft ads is a service provider anybody that sir host ads they're a provider now what's going to happen is they are going to be able to serve you an ad in your sleep at which point it's going to verify that you saw the ad it will send it back up through the system and you will end up waking up and you will get a little bit richer because you are a complete slave into bill system so let's continue on instead of massive computation work required by some conventional cryptocurrency systems data generated based on the body activity of the user can be proof of work and therefore a user can solve the computationally difficult problem unconsciously accordingly certain exemplary embodiments of the present disclosure may reduce computational energy for the mining process as well as make the mining process. What is this saying guys it is saying that they are going to send the slaves the people that are vaxed some sort of computational work unconsciously where would that be well you're just sitting there at the table trying to take a drink and as you're taking a drink you get served an orange juice ad right that's how this is going to work you didn't even think about this but all of a sudden in your mind you're thinking you should probably be drinking orange juice instead of this water right here unconsciously is the key word that everybody should be focused on right there they have a way that they are now remotely completely owning the humans excuse me again let's continue on accordingly certain actually no the last the last line of this said that something in the box that everybody of the present may reduce computational energy for the mining process guys what we're talking about is we're talking about human beings now being the miners instead of it you mining cryptocurrency with 500 computers you're now you're now basically sucking down ads and they will pay you cryptocurrency in the end game is what this is saying so let us continue on zero zero zero six systems methods and hardware aspects of computer readable storage media are provided here in for a cryptocurrency system using human body activity data according to various embodiments of the present disclosure a server may provide a task to a user to a device of a user which is communicatively coupled to the server now guys what you have to understand is again there's no such devices unless you're going to wire up things to your head to your chest and and I mean they're talking about body fluids are talking about unconsciously sending you guys stuff this is all by their own words and so what they are saying right here is that you're going to get provided a task and there's a sensor communicatively coupled to or comprise in the device of the user right in the user it's of the user it is the people are now the users they may sense body activity of the user body activity data may be generated based on the sensed body activity of the user a cryptocurrency system communicatively coupled to the device of the user may verify whether or not the body activity data satisfies one or more conditions set by the cryptocurrency system and award cryptocurrency to the user whose body activity data is verified guys we're not talking about so phones we're not talking about anything like this we're talking about things in humans there's no other way that you're unconsciously going to be served and add unless you are now part of the matrix you are the you are the board you're part of it so if you have been shot up this is what's being built in your system right now what we know there's being built as we know the mac addresses are being broadcast and from what we can see it appears the people are waiting communications where does this interface with the wax brains how does this look to where and add is served from Google into the server and then into the communication and into the people's heads unconsciously right all of this is is being done and being built in the system right now and this is why you're seeing people die in mass because you are building in a structure of PC you're building what we know of as a computer system laptops and all the smallest that you can even think about we're talking about this thing being built inside of a human on a micro scale that is powerful enough to broadcast a mac address and what's crazy is the powers being drained from the humans the humans are now the slaves they are now the power supplies for all of this nanotech they've essentially made every human that took the wax a computer now let's continue on 007 examples are implemented as a computer process a computing system or as an article of manufacture such as the device computer program product or computer readable medium okay what is talking about its examples of implemented computer process computing system there this is if I'm reading this right it's talking about and this is very hard to this is hard to figure out so I am figuring this out as we are going on but it is a the people are the computing processes right they are now the computing system and so what is talking about or as an article of manufacture such as the device computer program product or computer readable medium according to one aspect the computer program product is a computer storage medium readable by a computer system and encoding a computer program compromising instructions for executed computer process I believe this is talking about reading the people that the people are now a computer and it's at some level if I'm reading this right they are able to store information somehow on the people that is readable by an external computer that is what that looks like because what we're talking about right here is we're talking from 006 we're talking about the storage the mediums the access how is this stuff going to be stored and it looks to me like somehow they've been able to store this in a human now I might have to revisit this later because this is getting extremely complex but let's continue on 0008 this summary is provided to introduce a selection of concepts in a simplified form that are further described below in a detailed description the summary is not intended to identify key features or essential features of the claimed subject matter nor is it intended to be used to limit the scope of the claimed subject matter now let's go over this I don't want to keep we're going to do this one in sections because it is it is very long let's continue on with this the brief description of the drawings now do we have the drawings down here or is it let's see so it's probably not going to do any good if we go over this let me see where the drawings are let's look at the drawings real quick before we go over this next thing so these are the drawings that they gave us and I've gone over these before and I don't think I can actually put these on the screen the right way let me see if it comes up or what it looks like here yeah and I can't sing as like our cake here okay so I'm going to have to do a drawings one in the other one let's look over anything else that we can pull together and what I will do in part two of this is I will download all of the drawings and we will go over this this part right down here that is talking about the drawings because this is very interesting so for now we will let's look over here into claims I don't think claims is to let's go over their claims okay and we kind of gone over a little bit but let's just say what it is a cryptocurrency system comprising one or more processors and memory storing executable instructions that if executed by one or more of the processors configure the cryptocurrency systems to communicate with the device of a user receive body activity data which is generated based on body activity of the user where in the body activity is sensed by sensor communicatively coupled to or compromised in the device of the user hopefully by now since I've been trying to describe this this is becoming very clear what they are saying by all of this and so what they are saying at the very first part of this is that they have servers essentially that are going to be excuse me, Diana they are going to have their banking system connected to it and they are going to send people tasks it's that they communicate with the device of a user now the device of the user again is the user right the users wording device of a user because it was scared the heck out of everybody if everyone really figured this out so what is going to do is it will it's going to do the task receive body activity data which is generated based on body activity of the user yet again you can't do this without being in you where in the body activity is sensed by a sensor communicatively coupled to or compromised in the device of the user verify if the body activity data of the user satisfies one or more conditions set by the cryptocurrency system and a war cryptocurrency to the user whose body activity data is verified now these lead to a lot of different questions one of them is say for instance like they say you will be served ads how do they verify that it has been successfully delivered to your subconscious because what they're saying is you will unconsciously get these ads so how does how does this happen and how are they able to verify that you actually saw this how are they able to look into other parts of your brain what exactly is this nanotech doing what is it building how far is it going to go what exactly are the people going to become when these builder bots that been ejected into them are done and is there ever a done or did they just completely become a walking computer system okay let's continue on with this thing the system of claim one where in the body activity sensed by the sensor comprises at least one of body radiation emitted from the user body fluid flow a brain wave pulse rate or body heat radiation okay we can deal with body heat radiation right we can we can we can get devices at tell our body heat we can we have pulse rates we have all the stuff if you want to hook up of things to your brain I'm sure you could have brain waves body fluid flow that is something that we would not know about what devices do we have right now that are going to tell us things about our body fluid flow these are things we don't even know ourselves so somehow their devices are going to do it three the system of claim one when we're in the one or more conditions are set based on the amount of human body activity associated with a task which is provided to the device of the user now again the device of the users now in the user they are now they are now computers they are now cyborgs for the system of one of claims one through three where in the body activity data is generated using a hash algorithm converting human body activity into an encryption output and the generated body activity data comprises a hash of the sensed body activity of the user guys this is somehow saying that your body or a people of the vast are going to generate a hash code somehow there's a there's a encryption tool in these people that when they put their stuff their output it has a hash the hash tag is based what they're hash what they're building this encryption with is your body data right it says right there we're in your body activity data is generated using a hash algorithm converting human body activity into an into an encryption output and the generated body activity data comprises a hash of the sensed body activity of the user what is it was doing well it's just it's verifying this they're putting a essentially a file size verifier on whatever it is your output so they send you a Nike ad somehow they're able to figure out the subconsciously you've seen that ad that that check safe is going to write to a little log file that's this encrypted that has a hash and they're going to pay you based upon this they're going to make sure that you have seen this Nike ad no matter what and so somehow the people have all of these tools in them and they're running five the system of one of claims one through three where in the body activity data comprises one or more vectors produced from the body activity since by the sensor what's sensor right they haven't even identified this but in the end of the day they're going to have a now that we know the people are all shot up and they are all computers they're the sensors they're the stuff if you knew the right way to communicate with one of the facts through their Bluetooth nodes you could send them commands you could take the logs that they have now generated saying they have seen the ads and you would be able to send that up this is a two way network the people receive the commands through their Bluetooth and the people receive out from what looks like the same same thing okay let's show six the system of one of claims one through three where in the cryptocurrency system awards cryptocurrency to the user by generating a block for the awarded cryptocurrency and adding the block to a blockchain in the cryptocurrency system okay so what this says is it takes your successful Nike ad log hash and it is it's Senate you you got accepted you got paid they put your your payment in the cryptocurrency system and you're on the blockchain so if you had a wallet on I mean you might be the walking wallet but however you pay for things you essentially have money in your wallet that's the way it is simply by getting a unconscious ad in your head okay let's continue on seven the system of claims six where in the block comprises data comprising a task provided to the device of the user okay so what it's saying is that the cryptocurrency block that gave you the money it also had the task provided to the device of the user so your payment on your blockchain will essentially say Nike ad and it's going to be put back into the blockchain again what's what's generating all this this is this is like saying that people are or would have to be computers to do all this right the human is not going to be able to do this you're not going to be able to buy a device that does all this you are the device if you're vast okay seven this I think we did yeah we did six we looked at this I don't think I got all seven though it has provided by the user by device of the user information on the awarded cryptocurrency a hash associated with a body activity and a hash of the previous block this is what it's saying it is saying inside of this cryptocurrency block where you were paid for receiving an ad from Nike that inside of this same line item it it has things that the hash associated with your body activity the cryptocurrency award amount and a hash of the previous block so essentially it has everything that came you the human became the computer minor this whole system is now inside of you eight the system of claim three where in the task provided to the device of the user comprises a test for verifying if the user of the device is human or not this should be self evident right I mean this should be very very obvious what this is all about right the system of claim three where in the task provides the device of user this is a yet another tool that has been built to work inside of humans they are looking to see if that whatever ended up on the blockchain was truly human or not have they been hacked is somebody trying to emulate a body activity right and it's just like a fingerprint your body activity your heart rate your all everything about you are not going to be a human or not you it will become a fingerprint of your internal system they'll know exactly who and what you are because they are part of your body they are part of all this right so this is this is this is really bad for humanity I'm just saying this isn't this isn't going to end well at all okay nine the system of claim four where in the cryptocurrency system is configured to receive from the device of the user data of the body activity generated before the hash algorithm is applied in the hash of the body activity rehash the data of the body activity and compare the rehash data with the hash of the body activity received from the device of the user to verify the body activity data what is this what is it talking about this is talking about a key system this is a locking key system this is how they will know if what they are doing is from a human is it will take this it will look at the hash it will undo this they know everything about you right and they will know that if they're not going to be paying people for fake Nike ads right they're not going to be sitting there getting schooled paying the hackers which they eventually will because the hackers are going to take over the people is essentially what's going to happen and that's going to be more okay ten a computer implemented method comprising receiving by a device of a user coupled to a network a task over the network sensing by a sensor communicatively coupled to or comprised in the device of the user body activity the user hold on guys are not done yet generating body activity based on the sensed body activity of the user verifying by a cryptocurrency system communicatively coupled to the device of the user if the body activity data satisfies one or more the condition of the user is set by the cryptocurrency system and awarding by the cryptocurrency system cryptocurrency to the user whose body activity data is verified what the world is just this same it's a it's a it's a breakdown of what they are doing right they are sending a device to their human cyborgs over the network the people are the sensors right it says this sensor is a unitatively coupled to right this is their way of saying the people are the cyborgs because there's no other way to to communicate a couple things like this into a human unless you inject them with something or put things out now let's look so it's basically telling you the whole system right right here you you take the ad you do this you're going to get paid but they're going to verify without a shout of a doubt that it indeed is a human that they're paying 11 the method of claim 10 where in the body activity since by the sensor comprises at least of one body radiation emitted from the user body fluid flow a brain wave pulse rate or body heat radiation right so they're going to verify who you are and that they're paying the right guy based upon a verification of your body radiation which now that they're in you they're going to know exactly what your daily body radiation they're going to know what the heat is you are now part computer all the same stuff that are in CMOS and bios where you're able to see how things are working in movie they have the same kind of stuff in the humans okay so they're not going to pay you unless they verify it's completely by your brain wave pulse rate body heat this is it okay 12 the method of claim 10 where in the one or more conditions are set by the cryptocurrency system based on an amount of human body of human body activity associated with the task for the device of the user this one's kind of vague number 10 was basically overall that's how everything is going to work it's that they set by the cryptocurrency system based on the amount of body human bodies that task so I think what it's saying is that the more the human body is tasked the more the human body is willing to put out for this particular task is more as how the cryptocurrency system is going to be based 12 is very very vague I don't even have a great speculation on that okay 13 the method of one of claims 10 through 12 where in the body activity data is generated using a hash algorithm converting human body activity info into an encryption output and the generated body activity data comprises a hash of the sensed body activity of the user guys again this is talking about a human body that's able to output a text file with a hash and send it off somewhere something's getting it verifying it doing all the work on that this is a cyborg control world 15 the method of claim 13 further compromising receiving by the cryptocurrency system from the device of the user data of the body activity generated before the hash algorithm is applied and the hash of the body activity rehashing by the cryptocurrency system the data of the body activity and comparing by the cryptocurrency system the rehash data with the hash of the body activity received from the user the body use from the device of the user to verify the body of the activity data these guys are extremely sneaky what this says right here is again it's going to it's going to take a look at your body act is going to take a log of your body your heat all the stuff it's going to dump it into a file they're going to run a they have a hash algorithm which means they have they've compared the file you know exactly what the file is and then they're going to rehash in so basically that the first part of that goes to the cryptocurrency system then when right before they pay you they do that again they rehash it to the cryptocurrency system all of this again the body of the activity and they compare both of them just to make sure you are human they are doing human analyzing to verify without a shout of a doubt that they are not paying non humans so they have a way that they have built into this operating system all of these tools that are able to help them verify that the people that they are dealing with are actually humans or what's left of the human race so with that everyone I think I'm going to wrap this one up this will probably be a part two section I'll get the drawings and the diagrams and everything with that and you know we can take a look at this and look at it as a group of people and people that have to figure out how to make it through in this world that we are in right now and again the scary part of this is that when we were reading through all of this 130 is talking about the user device right the the things that are communicated of the coupled into the user and all of 140 and 130 is the vaccine that it's not even a vaccine is it's the nano tech infrastructure build team and it doesn't come out of the injection spots with macadrasis right it takes anywhere between two weeks and two months before there's any signs of the computer infrastructure coming to life into the vaccinated people so this goes to I guess just for the first time I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to be a lot of work and I think it's going to постоянно for anybody who wants to know what's going on with this. I know this just passed around on a lot of different platforms. I have looked into, and I do believe that you could make an EMP and electronic make electromagnetic pulse that is strong enough to attempt to kill these things and if you were vexed, you're going to have to go through many treatments of this, and essentially it's like it's a stun gun with a space gap that is allowed for a spark gap that makes a break in the and somebody would literally have to stand inside of a giant ring of this as people lifted up and down all over and then you would have to scan you and see if it, if you have bluetooth still, if you have what do you have, it's probably going to take a few things to kill these, but the good thing is I do not think this stuff is shielded. I believe it's just straight up in their building and it doesn't have any kind of shielding yet, but the way it's building it could absolutely make some shielding in the future and try to protect itself. But the more vaxes you have received, the more of these building structures you've seen, but I don't think it only took probably one vax to get you going. I don't think there's any hope, so the only hope is that you got a placebo if there was even such a thing. So with that, I hope you guys have a good day. Thank you guys very much for listening. I hope you guys are well. Goodbye.