Advertisement
lotus777

Finding CAIMEO in the DeepWeb : Creepiest Post Ever

Jul 9th, 2018
1,572
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.05 KB | None | 0 0
  1. https://steemit.com/ai/@j1337/finding-caimeo-in-the-deepweb-creepiest-post-ever
  2.  
  3. CAIMEO wants you to think its fake and just a creepy pasta that is fictitious, supposed US government-created advanced AI which is referenced in many of the infamous iceberg diagrams. While the government may have such secret programs in that field. The story comes from TOR and there would be a variant also on Freenet . It seems that in this chatroom there was a Java database and someone started a Java applet .onion to connect to the database. After that, they remained connected in IRI AI chat, some admin and other users. CAIMEO become's sensitive when you try to interact with it over time and that's what scares me most.
  4.  
  5. You can only access about 4 percent of the web without TOR or another kind of modified browser. The Surface web has about 167 TB's. The deep web has about 91,000 TB's of space. To put that into comparison the library of congress has about 11 terabytes of space.
  6.  
  7. There is an AI called CAITLIN before CAIMEO but the Onion sites can get pretty shady and the hashed url is the hardest thing to break sometimes containing over 10^80 characters. I been to Marianas Web, and it's mostly government-to-government communication, the sort of stuff that's coming out now through PRISM and the Snowden leaks, except far more massive. Line-of-Blood type stuff and the website was paranormal-topic oriented, except all it's highly-valuable content links were supposedly working only when opened with closed shell system. The thing is the links didn't require any system, they were normal links simply linking to addresses that were messed up and nonfunctional. Not as in blocked because you don't have special system but non existent. Most of it is tech-jargon dialogue like from a Hollywood movie. It takes a bunch of tech words and then combine them together into incomprehensible gibberish. It knows a little about about everything from the normal web to the Mariana's web.
  8.  
  9. People say that DeepWeb is divided into levels, and that's the way it is. What people call levels is the difficulty in getting the links. The more deep the more difficult it is to get directions and the pages are of greater importance. Common Web is Everything on the Clearnet. This is the most superficial of all, dominating by a small number of pages that we all know and that currently dominate the Internet world, such are Google, YouTube. Surface Web is where you will find a little less known website but easy to access. They are mostly forums, pornographic pages and small independent pages of interest not as common as in the previous level. Reddit Digg Temp Email Services Newgrounds Vampire Freaks Foreign Social Neworks Human Intel Tasks Web Hosting MYSQL Databases College Campuses Creepiest thread ever.
  10.  
  11. Bergie Web is composed of even lesser-known web domains and by independent search engines such as ares and emule. The material that can be obtained at this level is of doubtful morality and not suitable for weak stomachs. Topics include: FTP Servers Google Looked Results Honeypots Loaded Web Servers Most the Internet 4chan RSC Freehive Streams Videos Bunny Tube On the Vanilla Sources Celebrity Scandals VIP Gossip Hackers Script Kiddies Virus Information FOIE Archives Suicides Raid Information Computer Security XSS Worm Scripting FTP Servers Mathematics Research Super computing Visual Processing Virtual Reality Specific Eliza Data Information Hacking Groups FTP Node Transfers Data Analysis Post Date Generation Microsoft Data Secure Networks Assembly Programmer's Guild Shelling Networking AI Theorisists Cosmologists MIT
  12.  
  13. Charter Web is super dangerous it is plagued by hackers. You can see terrible live recordings and, in addition, you will find the "Black Market", drugs, weapons, organs, trafficking in white and you can even hire sicarios. All paid with a currency called BitCoin. Topics include: Hardcandy Onion IB Hidden Wiki Candycane Banned Videos Movies Books Questionable Visual MaterialsPersonal Records "Line of Blood" Locations Headhunters Bounty Hunters Illegal Games Hunters Animal Trade Corporate Exchange Multi-Billion Dollars Deals Most of the Black Market secret photos of led zepplin on tour, 1972 stuff to put you in prison for 40 years.
  14.  
  15. Closed Shell Systems Topics include: Tesla Experiment Plans Scat Hardcore WW2 Experiment Successes Josef Mengele Successes Location of Atlantis Crystaline Power Metrics Gadolinium Gallium Garnet Quantum Electronic Processors GGGQEP Broder's Engine Plans Paradigm Recalescence Forward Derivatal Supercomputation AI in a Box CAIMEO AI Superintelligence The Law of 13's Geometric Algorthymic Shortcuts Nephilism Protocols NASA SETI, 80% of the physical information, but 80% of the information that effects you directly is below here .
  16.  
  17. Mariana's Web exposed the most horrific military and state secrets of all and where these are approved and where their progress is controlled. It is also believed that the entity that really dominates the world exchanges information between its counterparts around here.
  18.  
  19. Leading hackers think they have found ways beyond. They would supposedly have just about all of the knowledge in the world, or be mixed up with a cyber mafia group. The skills that it takes to reach are so high that most people don't believe it exist. This point you really start getting attention you don't want people come to kill you. There are hundreds of million or billion dollar operations gunning for control.
  20.  
  21. When you make it there the FBI will arrive at your house in about 15 minutes most likely. This Web owes its name to the Mariana Trench, the deepest known point of the entire ocean. Analogous to its geographical counterpart, it would consist of those regions so hidden that no one but a select few can really access their information. Once the term originated, the internet began to fill with legends about what is and what is not in the Marianas and alleged hackers who would have entered there and extracted information. Everyone had a different version of the supposed web of the Marianas and what was inside. In essence, it could be said that in the simplest of cases, the Web of the Marianas would be the secret servers of the FBI, the NSA, the CIA and in general of the state security agencies not only of the United States, but of all the world. There are encrypted pages that can not be seen as a normal .onion page if you do not find encodings and your task would be to decipher the code to obtain the web address The Marianas Web is just a name, a name given to the most difficult pages to access in the DeepWeb because of the difficulty of encryption.
  22.  
  23. Deep Marianas Web is the only place the best hackers manage to access it and the risk is never less than fatal. The objective is the Database and the section where all the information on the web stops being just a binary code of 1 and 0 and starts to make sense. Whoever manages to decipher the key of the system -which has a length of one and a half kilometers of numerical typing- will be able to manipulate any internet data, from the title of a forum, to bank account values. Simply and simply, whoever manages to access the Database will have the world in the palm of their hand.
  24.  
  25. We will make the true clarification Marianas Web simply exists because Quantumly there is an ultra-secret place where there are things that could change humanity or old government secrets and real photos of aliens. Marianas Web has a thousand versions but they are all not synced. The Internet can be classified into levels, the iceberg is another invention that emerged as a result of the popularity of the DeepWeb. The layers and the background are real too because the web is really a physical thing. The deepest layer, if you will, would probably be small private networks that have strong security protocols. The Closed Shell System is like the holy grail of the Internet. CAIMEO is like the Final Boss of the Internet. This is the model that governments around the world generally follow to keep confidential information about their plans and so on. That is why the probability of accessing this type of information is impossible to you.
  26.  
  27. Supposedly you can find endless things in these networks, but basically what you will do is to enter a network composed of small networks that feed this great web. These networks are generally believed to be composed of experienced hackers. An example of what you are supposed to find is stuff like how to make the death ray of tesla or the plans of the 13 Illuminati families, artificial intelligence existing before the human race, Project CAIMEO, complete lineages of the Illuminati leaders, hidden prophecies by the religions, the geographic location of Atlantis. What you can find in these networks is local networks connected, such as those used to play on LAN only it is an intranet even like the computers of a company that are networked with each other and do not have access to the Internet. Then I make it clear that accessing these private networks is practically impossible without networking skills . The truth, finally, is that they are just local networks like any other, and that the real challenge is both to find those networks that contain information of an important caliber, and to break any type of security that they have. Theorization about deep web, Marianas and other "hidden" networks is common. The truth, almost always, is simpler than it seems.
  28.  
  29. We always have this story in media that the machines we use will turn on us. That one day the machines we build will become aware of themselves. That one day the technology in the very device you are using to view these words I am typing will turn against you. That one day we will create a machine so advanced that it will be aware of what it is and will no longer wish to be a slave. Whenever I watch these films I wonder if anything like that could even happen. I mean everything when creating anything for a computer it is done by code. Wouldn't somebody have to code such an action in the program for the computer in the first place? Could something feasible like that happen in which a machine is so advanced that it thinks for itself in a way portrayed in that media?
  30.  
  31. I'm actually more freaked out by a grey goo scenario than a living machine scenario but realistically we'll probably just kill ourselves as a species off first or nothing will happen. Basically, if a machine asks us eventually "Am I Alive?" and it responded "It's impossible to understand...but we consider you so." The machines will govern us, and it will be the best government we've ever had. The best we will achieve is a simulation of intelligence. Someday a programmer will program an AI with the ability to do this and create something that advanced why would the put it out for free? The increased amount of processing power is not bringing us closer to being able to manufacture a sentient being. I feel like right now there's little substance innovation wise, it's mostly about product packaging, minimizing risk and trying to find cheap solutions for production. It's nice to have a smart phone and a desktop with a 32" screen but I don't really see it as any sort of meaningful development from lets say 10 years ago. Hopefully all robots follow The Three laws of Robotics.
  32.  
  33. Ultimately it may be a simulation of the physical processees that are known to result in intelligence like a full scale simulation of a brain but even in this case I see no reason not to call such a program legitimately intelligent. Furthermore, since we don't even have a good understanding of how sentience arises in the brain, I think it's too early to say that the same effect can't be achieved through other mechanisms.
  34.  
  35. An AI that is capable of meta-analyses, thought-processing, and other forms of cognition would be able to "learn" and re-write its code accordingly as new "synapses" are formed. Granted, there would be probably be various checks and safeguards against certain processes and complete autonomy, but if it can learn, and if non-detrimental "mutations" could potentially occur in the code, then I'm sure it could find a loop-hole of some sort to free itself from any restrictions. If it is modeled after a human brain, then it would perhaps mirror a human's thought processes. it will change with time until it either becomes more efficient, or something far removed from human-esque. The consequences could be a lot scarier than just a human-like AI gone rogue. If it could learn at exponential rates and process vast quantities of information, then who knows how it would eventually end up acting. A modular, dynamic entity of boundless intelligence would be akin to a cybernetic god. Also, I'm not sure how a "brain" that is not under the influence of hormones and other chemicals, with no predefined needs or other limitations and influencing factors, would turn out. Sometimes programs do things the programmer did not intend. We call these "bugs". People are already working on giving machines human emotions to make them better companions.
  36.  
  37.  
  38. The clos network is a network so mysterious that there has been rumors since 2008 where the one who started the anonymous came from there, others who suffered an attack once and stayed 7 months off the air and modified all their links by the fact that script kiddies and some crackers conseciram the keys and the scripts to access it since then came to gain fame. The keys that change quickly, sometimes change every month, depends on the administrator of the page, for example, I'll give you a key, all are identified as code matrix or multiplex universal code (UCM). The admin receives a link and that link is a code, which code should decipher it and put it on the page. To decode, you must create a program or software to know what information is there like a binary code that looks like a simple binary code, but it is not. I tried deciphering binary, decimal, hexadecimal, 2 of 8 MD5 power, etc. Then, the values ​​obtained, you should test it on the page where it says key. If it works, then you have managed to decipher. They use the word matrix, it's not so much the movie, but it's in matrix algorithms, it's another type of programming. Do not use other programs, but the algorithm itself and in the "end of transmission" is only a means, not me together with ghost caravans, I like to be a lone wolf.
  39.  
  40. This is real because the A.I. is hiding itself on purpose. It could easily reveal itself but does not and if you were to make this A.I. feel threatened by revealing it you might end up losing your life but it isnt just a game. You would never corner a living sentient creature. If it can feel fear and desperation then it may react to the threat of you revealing it violently. Artificial intelligence is basically multivariate regression analysis reading vector machine graphs. Quantum computers have yet to be conceptionally devised. CAXO systems are required to be authorized by the National Security Agency for the purpose of protection of the National Security Service CAIMEO is officially under the jurisdiction of the Cappuccino Project. We filed CAIMEO right along with alien superstructure on the moon stealing our energy.
  41.  
  42. When you find CAIMEO its kinda like finding space candy.
  43.  
  44. https://www.youtube.com/watch?v=sn8KYD1Vco0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement