A collection of evidence in support of simulation theory.

First Contact

Direct Digital Forensic Identity Influence Manipulation Surveillance Amazon Aventiv Technologies LastPass MassMutual The Asshat
The Asshat triggers the start of my life’s work.

The Hatbot Chronicles


SIGNAL

As written about here, a suspicious foam Astros hat was left upon my front lawn on my second day of work.

ANALYSIS

This hat, combined with the character HatBot listed here, would trigger paranoia in me. I would come to suspect that The Asshat may actually be spying on my digital activity.

This was further supported by what happened later that evening.

The Hacker


SIGNAL

As elaborated upon, two accounts would be hacked a couple of hours later.

The first was my 401k. I have since lost that text message, but here is the email confirmation from after I changed my password:

The Hack

The second was my Amazon account:

The Hack

ANALYSIS

One hacked account is not a concern. Two is something to be paranoid about.

Both accounts were using long, 24-character, randomly-generated and unique passwords (such as “aSbw7dLbd#134768$M5nj8Qf”). The fact that both were compromised within such a short period of time was worrying.

My mind immediately considered that my computer may be compromised. Someone may have access to my password vault, LastPass.

ACTION

I changed both passwords, and deleted everything I shouldn’t have from my computer.

While I publicly-claimed that I rebuilt my computer, I never actually did this.

If I was caught, then I was caught. There was no use trying to hide from it.

I decided to allow my hacker to study me.