This file is designed for research into 3d glyphs. It contains the two-hexagon calibration grid expressed as a truncated and rotated cube, with the center point as the origin. This geometry has the advantage of being unambiguous- from this position, each glyph node as expressed in our current 2d methods can be seen to have a clean 3d spatial analog. Included in the file are all glyphs currently known, both those with theorized meanings and those without. Use this file to experiment with views and configurations. It is a Rhinoceros file, and the demo version can be had for free at rhino3d.com (the demo can view files freely.) https://www.dropbox.com/s/n1l6ll96bhh5ju6/Glyphtionary%203D.3dm
The power button for the Obsidian Shield! Press it! Quick! Bring the XM back!
ReplyDeleteOpen it
ReplyDeleteAfaik - Old media. Together with the other media decoded gave details of battles. Don't recycle unless someone confirms
ReplyDeletewhat happened when you pressed open?
ReplyDeleteIt opens.
ReplyDeleteOpen it, follow the link, post the intel in Operation Essex.
ReplyDeleteJesse Threlkel thats smart
ReplyDeleteGraham Watt <--- do what he said! ;)
ReplyDeleteAs Vivek Krishnan says, these where part of the obsidian series intel hacks which provided sections of the primary site impact zones for the April 2nd anomalies.
ReplyDeleteI've got another media [Torr-w5q] before the Anomaly in Vienna at the Millenium Tower Portal, but was told that it was already decoded
ReplyDeletehttps://storage.googleapis.com/truthseeker/obisidian0402fragments/torrw5qc33trbspnc.png
Daniel Scherrer it'll may have the same image but link to a different map fragment. All hacks were from tall buildings in the host cities.
ReplyDeleteRichard Jennings and do you have connected these tall buildings with straight lines and found the truth at the intersection?
ReplyDeleteWando Waiato nope
ReplyDelete