Dream Hackers


When describing the modern hacker subculture, psychologists often call us “obsessed programmers” – people who perceive the real world as a kind of “operating system of a universal supercomputer.” This flattering remark needs a slight correction. In reality, we are convinced of the opposite: every program is a “world” living and operating according to its own laws and principles. Wandering through these “worlds,” a hacker gains the ability to enter rather complex information structures and protected systems. He explores them, enjoys their beauty, and sometimes uses certain developments for his personal goals. Nevertheless, the psychologists’ error in defining hackers was perceived by some as a challenge, and their findings may serve as an answer to the current moment’s demand. I will try to describe to you the experience of a hacker group that decided to “break into” one of the most complex “programs” of the human brain – the world of our Dreamings.

The project, initiated about eight years ago, led the developers to interesting results, some of which I will describe in subsequent letters. This information is being disclosed for only one reason: due to a ridiculous oversight by our Novosibirsk colleague, materials on “hacking” Dreamings fell into the hands of the Russian FSB and are currently being reviewed by experts from two classified institutions. We do not know how the special services will use the tricks (triks) we invented. We do not know what direction their further research will take. Therefore, in hopes of leveling the playing field and giving those who wish the opportunity to escape the tutelage of “Big Brother,” our group is “leaking” the main part of its findings for public use.

This material will not contain computer programs, algorithms, or sparkling phrases from hacker jargon. The situation is serious, and I consider it inappropriate to burden unfamiliar people with my “kitchen” and nonlinear humor. Moreover, to understand this information, you will not need in-depth computer knowledge or even a superficial acquaintance with them. This material is adapted for ordinary people who enjoy mysteries and discoveries. Our “know-how” lies solely in the fact that we applied the hacker method of “cracking” protected programs and several concepts of artificial space construction to Dreamings.

Dreams as a Protected Program

That Dreamings are a “protected program” you know from your own experience. People spend a third of their lives asleep. For five thousand years, dreams have been objects of scientific research. And what has it yielded? Practically nothing. Imagine the volume of knowledge about the everyday world that humanity has accumulated over 50 centuries, and then compare this amount of information with the factual material about Dreamings obtained over the same period. What a strange discrepancy!

Dreams are a “protected program.” We became convinced of this in the most lamentable way. In the world of Dreamings, there are forces hostile to humans. They can be viewed from various perspectives depending on one’s creed and ideology, but for us, they remained a kind of faceless template for all the security and repressive structures we encounter in the real world.

Structure of the Material

This material will therefore be divided into three parts, each implying its own degree of danger.

Part One: Introduction and Lucid Dreaming

In the first introductory stage, you risk nothing. Here I will introduce you to our theory of sleep and Dreamings, give you a fulcrum to turn your world upside down, and tell you about a simple and effective method for entering Lucid Dreams.

If you follow our example and engage in the development of such states of consciousness, you will eventually fall under the pressure of “negative forces of fate.” At this first level of danger, you risk your health and the well-being of your loved ones. Some of you may perceive such “karmic racket” as a “test of maturity” or as “obstacles that temper the spirit.” For us, however, this wrath of cosmic forces was a complete surprise. We suffered great losses.

Part Two: Exploring the Dream World and Traps of Attention

In the second part of the material, in addition to describing further steps in mastering the dream world, you will receive a detailed report on the traps of attention we discovered. Furthermore, we will discuss the use of Lucid Dreams and the integrity of our consciousness. I will tell you about my experiences, encounters with personifications of friendly and hostile forces, and also about the merging of the world of dreams with the world of everyday reality, which is currently happening in the lives of many Dream Hackers.

Part Three: Advanced Discoveries

The third part of the material will be dedicated to the latest achievements of our group. Experience and increased skill in avoiding direct contacts have allowed us to come into contact with forces which, being neutral and universal in both worlds, nevertheless allow no mistakes in dealing with them. These are boundary forces – death and knowledge. Beyond them lie spaces of which we have no concept – as yet, no concept.

True knowledge is absolute. Its fragments, settling in the consciousness of one of the hackers, revealed to us several lines of predecessors, whose existence we previously did not suspect. The story of them will be the point where I close the circle of my intention, tying it to the present and the past.

Notes on Terminology and Approach

It should be noted that the group of “Dream Hackers” was two-thirds comprised of followers of Carlos Castaneda, therefore I will use his terminology. I promise not to retell C.C.’s books. This position is dictated by two points – firstly, no one can say it better than he did; and secondly, I know with what disgust Castaneda’s fans treat fake “Naguals” who merely echo his developed themes.

So, I offer you a fascinating and effective method of self-knowledge that has not yet been explained by anyone, not poked at by teachers’ pointers, and not worn out by the greasy fingers of authorities. Before you is a guide to action, somewhat like a traveler’s guide. You can consider it a portal to a multidimensional world that awaits your insights and discoveries. On this path, anyone who walks it is the first. And it is precisely up to you to develop this method and its philosophical justification.

← Back to Archive