0
1

[–] 11968196? [S] 0 points 1 point (+1|-0) ago 

Satanists... Bunch of idiots doing stupid fetish stuff.

https://github.com/google/deepdream

https://deepdreamgenerator.com/#tools

https://www.youtube.com/watch?v=aaokmHs71qg

.wordpress.com/2010/08/25/asking-for-it-2/

/colour-codes/#rf4-9009

/rituals/qmoon.html

"Fire purifies," she informed them. The final initiator, the priest of the Air, wore a mask of feathers and stag's horns, and layer upon layer of whirling black leather fringe. He hung them up yet again and whipped them with a bone-handled whip (actually not a very brutal one, only made of horsehair) while they took deep breaths and cried out, "I can fly!" over and over again.

SUNDAY

11:30am-1:00p

DO’s Littles’ Nursery with ------------ Location: California and Washington (Lower Level) Come unwind and play in the Littles Nursery and Daycare! Oversized toys, a changing station, coloring, and more are all present to help you get into Little headspace and let go in an accepting, well-equipped environment. Get stickers for extra-good behavior,earn a merit badge, and meet Horatio, the adult-size rocking horse. He’s friendly and strong and loves to make new friends!

11:30am-1:00pm Temple of Shadows Cookie Social Location: Hospitality Suite (Room 708) In The Temple of Shadows we foray into the ancient pathways, secret societies, and ecstatic rituals that are interwoven into being a practi- tioner of Sacred BDSM and Dark Eros. The Initiate of The Mysteries knows that the thoughts we bring, the intention, consciousness, & presence we channel are more important than what we do. Consciousness & intention are the foundation of the sacred.

Opening and Closing Rituals Oh God! Tantric Power and Surrender The Ritual of Play Urban Tantra: Deepening Power Play Do It Rite! Step-by-Step Guide to Sacred Kink Play The Ritual of Set

0
1

[–] 11962179? [S] 0 points 1 point (+1|-0) ago 

Thoughts:

As I have just finished watching this... I find my mind strangely wandering back to something I have touched upon before but I have never fully developed. That being the psychology and thought processes that we can determine about the John P hacker.

Certain traits and motivations can be assumed based upon the methodology of the "hack" (phish if that's the real way it was done) and the very specific targeting of John. These demonstrate a moderate technological capability but more importantly a sophisticated understand of human response and ability to predict cause and effect chains in the long term. Now anyone can figure out a cause A and effect A (and so on) off the propagation of these emails and make certain assumptions about the hacker's political ideology but it doesn't particularly frame what this person believed nor their motivations since it could be reasonably placed into either a left or right mindset.

What will allow for a better framing is actually not what the hacker leaked but rather what they did not leak. To put this into context, knowing how the hacker got into the emails (via complete control of the gmail account) is crucial. Had it been me, upon assuming control of the account I would have had three primary objectives which I would have carried out in this order before sending it to Wikileaks.

1) Save everything quickly

2) Explore it to its fullest to ensure I had absolutely every last bit of data possible.

3) Post cleanup to cover my tracks (a step that realistically begins prehack)

So to start I would not have included my actual phishing email in the documents sent to Wikileaks but it's possible it was an oversight. Before doing anything so public I also would have spent a great deal of time reading through everything I had to collected before making a decision on what action to take. Now the tricky part comes in the realization that what we saw in the Wikileaks documents is not what the hacker would have seen in entirety. What he/she/they would have been looking at is two things.

1) The complete email database we saw

2) An internet search history of Podesta that may have spanned back as far as the email account itself

The possibility certainly exists that said hacker either overlooked this information or John had configured his account so it would not be collected. However, both of these possibilities seem inconsistent with a hacker who had this level of knowledge and what we know about John's personal technological habits.

With this in mind it's not hard to make the jump, though a jump it may be, to assume that the hacker had intentionally chosen to withhold the search history. Admittedly this could have been done on the Wikileaks side but that does not match with usual policies of full unaltered release. Placing myself into the same position as this hacker I can only see one real reason why I would withhold the searches. That being what was inside the searches was so massively damaging to John personally that I believed it would overtake the larger story of corruption played out within the emails. As a consequence destroying John would inadvertently save Hillary (as it did with Weiner and Huma). A difficult choice, if this is how it occurred.

-forgive my format/gram/etc... I am tired.

0
1

[–] 11953533? [S] 0 points 1 point (+1|-0) ago 

Things to regret google'ing:

Thurs 6:30pm Gather in hotel lobby at 6:30 to walk over to dinner together!

4:00-4:50pm Modeling and Deep Trance Identification for Fun, Pleasure, and Insight: /////

10 min break Break

Fri 5:00-5:50pm Being Barbie: An Introduction to Dollification Fetish: //////

                            Hypno-Tantra Technologies: "The Transformation of Desire"://///

Fri 6:00-6:50pm An Introduction to the GET SPoT: Generative Erotic Trance for Sex-Positive Transformation: /////

Fri 7:00-7:30pm ///// Opening Ceremonies, in the 1st Floor Conference Room!

Fri 9pm-1AM Play Party (official play rooms + all guest rooms with propped open doors)

                             Lower Intensity Play Room & Aftercare Lounge   Higher Intensity Play Room  

Fri 10-11pm CLOSED

Sat 7:30-9am complimentary buffet breakfast and meet and greet at hotel

Sat 10-10:50 am /////////////////// Now What?: Introduction to Sensory Play //////////

Sat 11-11:50am Age Play and Hypnosis: //////

Sat 2:30-4:00pm The Smell of Fear: //// (90 min)

Sat 5:10-6:00pm Bridging: Sado-Erotic Hypnosis to Sexual Healing (110 min, doors close 15 mins in, no latecomers)

                Dark Side of Hypnosis - Edgeplay, Mindfucks & Trauma: ///////// (110 min)

6:10-7:00pm Subject Empowerment //////////// Erotic Conditioning: Playing Between the Ears: /////////

Sat 7:00 pm DINNER! Leave the hotel for a bit, pack your own, or order in and hang out onsite!

Sat 10:00pm-1:30am CLOSED Lower Intensity Play Room & Aftercare Lounge

                 Long Term Hypnotic Programming: /////////// (110 min)

Sun 4:30pm-5:10pm The Care and Feeding of the Top: Now that You've Caught One, How do you Keep It? /////////

Sun 6:10-7:00pm Oppression Play with Hypnosis: /////// Hypnotic Head Games: ////// Modifying Emotions through Sensory Play //////////