Does a Magick Ritual = A Computer Login?

by Mike Sententia on June 3, 2012

You found my old blog. Thanks for visiting! For my new writing, visit mikesententia.com.

Andrew Watt asks:

So, to continue the software analogy… doing the LBRP [Lesser Banishing Ritual of the Pentagram] is kind of like going through a secure login procedure? You’re setting up your secure connection to a particular set of ethereal software, and getting it ready to accept your next command lines?

First, the simple answer: Yes, you can think of it that way. Particularly if you’re just trying to get the gist of my model, that’s close enough.

Now, for the thorough answer: This question pushes the limits of the analogy. Which I love, but it means this post is going to be a little advanced.

The ethereal software connects to you near the start of the ritual. So, I’d say that focusing on the symbols or starting the ritual is like entering the URL* for your web browser (or SSH software).

*URL = The web address at the top of the screen, like http://magickofthought/NameOfArticle.

The login — how the software knows to trust you — happens when the software connects to you and sees that your mind is capable of working with the software’s signature. That really seems to be how ethereal software authorizes users: If it can connect to you in its signature and your mind can accept those connections, you can use the software. Additionally, if you can package a message (like a spirit does when the spirit sends you a message), and send it in the software’s signature, then the software will accept you as a high-level user. I’ve done this to use many softwares without initiation, including software for Enochian, Thelema, Reiki, OTO’s public mass, and various softwares used by draining spirits and unfriendly mages (to shut down their attack).

I’d initially imagined that ethereal software would have a list of authorized users, and verify that your signature is on that list. I’ve never seen any software where this is the case, though. Read more about this in my series on hacking ethereal software (which I called “systems” at the time).

As far as a secure connection, there is a command to have the software shield its connection, so other people can’t connect to you through the software’s connection. That setting should make it more difficult for someone to listen in on your messages, too. But the shielding only comes on if you specifically request it; it’s off by default for most software. Personally, I’ve listened in on conversations with ethereal software while training people, but can’t see a reason to listen in secretly, so I wouldn’t worry too much about a secure vs insecure connection if you’re using it briefly, like for a ritual. (I use shielded connections when I’m having software connect to me permanently, like for psychic intuitions.)

Does that answer you?

(Also, see more on the LBRP, and details on connecting to the Enochian ethereal software.)

If you liked this post, consider visiting my current blog at mikesententia.com.

{ 4 comments… read them below or add one }

MrBlack June 4, 2012 at 11:52 AM

This post reminded me of this post…..
http://vonfaustus.blogspot.ca/2011/03/ii-in-brief.html

I tend to agree that systems/traditions are generally OS and that these OS has apps that are generally a copy or variation from other software.

I tend to see “direct magick” as binary or assembly though (lol).

Reply

Mike Sententia June 4, 2012 at 2:13 PM

I hadn’t read that article. It’s great. Thanks for the link.

I actually see direct magick as the assembly language of magick, too. If using a pre-packaged ritual is like using an existing command from a menu, and building your own ritual is like programming in some modern language like Ruby, then direct magick falls somewhere between assembly and C++.

(C++ is my strongest programming language, by the way.)

Reply

Andrew B. Watt June 15, 2012 at 2:25 PM

That’s pretty good. I read your reply on a mobile device, and couldn’t then get my comment to appear properly. Hence the long delay in responding…

There IS the example of the Golden Dawn equinox ritual, which includes the concept of a password of the term… the password to access the system’s magic is changed every six months, in theory to prevent interlopers. But what you’re saying is that you can attach the correct ‘energy signature’ to your ‘login’ procedure, and it doesn’t matter if you have the right password or not — the message is in the correct format; but no watchful, wary ethereal bits have confirmed that the signal is accurate. Hmmm.

Reply

Mike Sententia June 15, 2012 at 2:42 PM

That’s neat. I wasn’t familiar with that ritual. Thanks.

Here’s what I’d expect: If you’re using that ritual, it will check your password. But if you simply connect to the ethereal software the way a skilled spirit would, and use the right signature, the software will respond to you like it would respond to the spirits that made it, and you won’t need the ritual or the password. Of course, there are a lot of steps to making that sort of connection and communicating like those skilled spirits, so this isn’t just a matter of building the right energy in your body and then doing a ritual. But I’ve had ethereal software respond like this many times, including while attending an OTO mass, which ought to be similar ethereal software (with similar protections) as used by the Golden Dawn.

Reply

Leave a Comment

Previous post:

Next post: