A long time ago I tried an experiment with a text counter and email. I first used the counter to generate text in what was to be email messages to my hard drive but I did not read them. The next day I sent a simple email to myself within the parameters of the counter I was running. Then I searched my hard drive to see if that email had been previously generated on my hard drive before the message was sent.
Well it had been generated before the email was sent. This was a test to see if counters could be used to find messages from the future in the past. Since then I have come up with the algorithm that if A in the past and B in the future both know the weak check-sum range (a check-sum is a number representing a computer file.) of their messages to each other then both A in the past and B in the future can data mine a counter for their messages to each other through space-time.
Well, it gets way more advanced from there. Before that I came up with a numerical system based on...
Time-Hacking with computers and algorithms
Well it had been generated before the email was sent. This was a test to see if counters could be used to find messages from the future in the past. Since then I have come up with the algorithm that if A in the past and B in the future both know the weak check-sum range (a check-sum is a number representing a computer file.) of their messages to each other then both A in the past and B in the future can data mine a counter for their messages to each other through space-time.
Well, it gets way more advanced from there. Before that I came up with a numerical system based on...
Time-Hacking with computers and algorithms