Hacking Systems

You found my old blog. Thanks for visiting! For my new writing, visit mikesententia.com.

This week’s theme is systems. Start with Direct Magick Fundamentals: Systems.

Today, in Advanced Direct Magick: Using systems you aren’t supposed to. “Hacking systems.”

But I’m Not Initiated

Direct mages don’t have dedicated systems. We use the same fundamental systems as everyone else, but sometimes you need to use a ritual style’s system.

When that happens, you hack the system. Yes, you’re going where you’re not supposed to. Yes, this will sometimes get you into trouble. But if you never do anything that might get you into trouble, you will lead a very boring life.

Why Hack a System

  • Hacking a system lets you access the useful things it can do.
  • Work with new types of magick, learn more.
  • Disable an attacker that relies on systems.

How Hacking Works

Systems control access by only using their signature for all connections and communications. If you can’t handle their signature, you can’t get in.

Normally, you adjust to their signature through initiation and practice. The system sets your mind up to handle its signature each time you use it, and it does a massive setup during initiation.

As a direct mage, I work with many different systems and many different parts of my mind. A system adjusting my mind interferes with other things I want to do.

Plus, the normal way is slow.

Hacking a System

1.  Connect to the system using the beginning direct magick technique
2.  Match the system’s signature
3.  Make a connection that smoothly transitions from your signature to the system’s signature
4.  Communicate normally with the system

Yes, I’m saying “A connection that changes signature lets you access any system.” It sounds like magic. Not the good kind, but the ridiculous wishful thinking kind.  Mea culpa.

Here’s why it works:

The system connects back to you with small connections that go through your connection. The small connections start in the system’s signature.  Since your connection is also in that signature, the system is happy.

As the small connections go through your connection, your connection shifts signature, and the small connections automatically follow that shift. That’s how tracing a path works. The system doesn’t complain because the transition is smooth.

When the system’s small connections reach your mind, they’ve shifted to your signature, and will interact with your mind naturally.

When your thoughts go back to the system, they go through the same signature shifts as the connections did, and end up in the system’s signature.

That’s all there is to it. If you’re working with an advanced system, you’ll need to shift your message into the system’s signature instead of the neutral signature.

Hacking Systems Well

Hacking well requires good signature matching.

I’ll do a week on signature matching at some point, but here’s the gist:

Signatures are like molecules.

Think of the top level signature is as sand, made of many grains. Each grain is made of many molecules, which are made of atoms, which are made of…

To match a signature, view it at the smallest scale you can. Line up the elements of your signature with similar-looking elements of the target signature. This alignment will be imperfect, but that’s OK.

Use those mappings to construct a signature that matches the target signature at a larger scale. The signatures at that level will look even closer because their building blocks are already aligned.

Now repeat until you get to the top-level (largest scale) signature. Each time you go up one scale of signature, the alignment becomes even better. The smaller the scale you start with, the better the top-level signatures will match.

Most systems require a very tight match to access to the best commands, like denying someone else use of the system. If you can’t hack a particular system, try matching the signature more closely by starting at a smaller scale.

Useful Commands

Requesting basic use instructions” makes the system explain how to use it. It won’t go into every feature, but it gives a good idea of the normal usage. It ends with a list of additional topics to ask about (“Requesting instructions for X“).

What commands are available?” gives a list of the commands and what they do. This is your user manual.

Deny access to that person (use the person’s signature)” makes the system refuse their commands. If someone is using a system to bother you, this shuts them down*. Denying access requires much better signature alignment than most commands.

*In this case, when you trace the attacker’s connection, you will find the system before you find the person commanding it.

Finishing Up

When you’re done, disconnect from the system. Don’t just stop using the connection. Actively take it down.

If you don’t, the system will stay connected to you and start shifting your mind’s signature to initiate you. It’s not malicious, but it will cause problems.

Other posts in this series: If you liked this post, consider visiting my current blog at mikesententia.com.

Tags: ,

Leave a Reply