A collection of evidence in support of simulation theory.

Rootkit

Corroborating Digital Testimonial Influence Legal Leverage Man-in-the-middle Manipulation Surveillance FBI
The FBI installs a back door into my computer.

What could be the harm?


SIGNAL

As alluded to here, I once watched as a YouTube advertisement automatically spit-out a file named “temp.txt.”

ACTION

I clicked it. “What harm could come from a text file?” I thought.

ANALYSIS

At this point, I had already committed crimes that may have landed me on the FBI’s watch list.

Several moments after clicking this file, I heard a woman’s voice come from my computer speakers, “He clicked it.

I now know that this was no mistake. They wanted me to hear them.