fully hacked

we are fully hacked from the external world , all of our moves , thoughts , behaviors , impressions , sights , dreams , even our eyes , words , flows , degrees of situations , intentions , involvements , pictures , also every step we make , every decision we take , all of these are set for us in some " known before " lines and sets , we accept and have more of the acceptance to obey some parts of this external world , and we just obey in joy without any logical criticize , if you think that you made any revolutionary behavior - in the egyption or non egyption style - then your behavior's roots come from the same " external world " , so you're hacked from it , " and fully hacked in the worst case " , if you have any degree of " trust " upon any thing , then this degree of trust must came - at first - from the external world and - secondly - from your troubled misguided internal world , even the highest degrees of trust upon some " entity " or " somewhat being " - even if you didn't meet it before and just heard about it , why are we hacked ? , why this external world just " hack " us ? , even if this external world doesn't benefit us , somethings like " culture - religion - ethics - society " and even who stand on the main gates of these " 4 somethings " , for them we can say : are you afraid from our internal worlds so that you take previous decisions to made your big hack on our weak fresh internal worlds ? ,,
to seek a good quality of harmonic in the internal world is maybe considered as a crime from these men who stand on these gates of the " 4 somethings " and from there supporters - of course - , don't forget that the majority of them are sending to you and to all of other audience and victims that they hold and maintain the highest degrees of ethics , religion and seeking the good for society .
our main goal , 1st is to gain information about the methodologies of hacking people that these men applied on us and on the same poor victims who are like us , and we can simply know a little about them - these probable victims - on social media sites and tv shows , look to the repetitive behaviors from these victims , made your circle of searching and focusing gets closer and wider at the proper times - a dynamic circle - to raise yous odds of gaining needed information .
2nd , after reaching to the critical amount of knowledge and information , just develop your techniques to overcome these threats and spams that come from the " external world " from its branches " the 4 somethings men " and the other hacked people who still obey the orders of the external world elements .
.................
enjoy
.............
seeking 4 the best

Comments

Popular posts from this blog

هل السببية استقرائية أم استنباطية

هل ما هو ميتافيزيقي يعتبر ضمن المعرفة؟

حرب سرقة الأرواح