A collection of evidence in support of simulation theory.

Evidence

Catalog


This website is an attempt to catalog the most compelling pieces of public evidence I’ve been able to find.

All evidence is cataloged by a simple system of taxonomies. If a detail is important, it will be tagged. All tags can be found below.

Common

By Type of Evidence

The following criteria was based upon the types of evidence listed here.

By Threat

The following criteria is based upon common digital attack methods, as well as several of my own creation.

  • (002) Censorship - The suppression of free speech.
  • (001) Clickjacking - The interception of a clicked link's behavior.
  • (016) Identity - The abuse of a user's digital identity.
  • (143) Influence - An action that attempts to modify user behavior.
  • (013) Legal - Any attack that could be weaponized in a court of law.
  • (024) Leverage - A threat of disclosure that is used to modify user behavior.
  • (009) Man-in-the-Middle - A third party manipulating communications on-the-fly.
  • (115) Manipulation - The modification and/or erasure of records after disclosure.
  • (009) Misinformation - The spread of lies.
  • (001) Phishing - Fake emails intended to deceive the user.
  • (006) Supernatural - Unexplained and outrageous events.
  • (085) Surveillance - The monitoring of user behavior.

By Organization

All organizations fall under one of three buckets: The Resistance, The Machine, or HollowPoint Organization.

By Confidant

All confidants are listed in further detail here.