music: https://soundcloud.com/thetezla
bitchute: https://bitchute.com/channel/FnzIWHVOgbOx/
vimeo: https://vimeo.com/19387328
email admin@笑.wtf
Cipher Phrasing
Cipher Phrasing: My New Technique Novel Amplification of Encryption
© 2026 Ashtar Ventura A.K.A. そにいたん A.K.A. admin@笑.wtf
ALL RIGHTS RESERVED
Cipher phrasing is a technique i thought of for multi-layer full-disk encryption in which the cryptographic algorithm used at each layer is not fixed, not stored, and not recoverable from the encrypted device. Instead, it is derived at mount-time from a secret passphrase — the cipher phrase — that exists only in the user’s memory.
The user defines a pool of candidate ciphers and a pool of candidate hash functions. At every mount, the cipher phrase is fed into a SHA-256 derivation function that deterministically assigns one cipher and one hash to each layer. Change a single character of the phrase, and the entire layout changes — every layer gets a different algorithm, a different hash, a different structure.
Nothing about this layout is written anywhere. Not to the encrypted device. Not to a config file. Not to a log. Not to the kernel. It exists for the duration of the mount operation, in locked memory, and is wiped the moment it is no longer needed.
The derivation is simple and auditable:
The "C" and "H" domain separators ensure that even if a single phrase is used for both, the cipher selection and hash selection are entirely independent rotations.
The Problem It Solves
Every existing approach to full-disk encryption has a configuration problem.
LUKS (the dominant Linux standard) stores an on-disk header containing the cipher name, key size, hash algorithm, and magic bytes. Anyone with physical access to the drive immediately knows the complete configuration — and, crucially, immediately knows that the drive is encrypted and what it is encrypted with. The header is intentionally identifiable by design.
Plain dm-crypt (headerless mode) solves the header problem. There are no magic bytes, no metadata, no signature. The entire device surface is ciphertext indistinguishable from random noise. But the parameters — cipher, key size, hash — must still be supplied at mount time, and in any practical system they come from somewhere: a script, a config file, shell history, a sudoers entry, a person’s notes. That somewhere is an attack target.
Multi-layer encryption stacks multiple plain dm-crypt passes. Each layer has its own passphrase, its own cipher, its own hash. The key math works out beautifully — multiple independent secrets multiply the attacker’s workload — but the algorithm assignment at each layer is still a piece of configuration that lives somewhere. An adversary who recovers that configuration, even without a single passphrase, now knows the complete structure of your defences.
Cipher phrasing eliminates this entirely. There is no configuration to recover. The structure of the encryption exists only in the user’s memory. An adversary can gain possession of the device, image it, study it for years, know exactly which tool was used, know the full set of candidate algorithms — and still not know which algorithm is at which layer, because that information does not exist anywhere outside the user’s head.
How Hard Is It to Break?
Let’s be concrete. Consider a modest configuration:
- 10 encryption layers
- 3 candidate ciphers (AES, Serpent, Twofish — all in the default pool)
- 4 candidate hash functions (SHA-256, SHA-512, Whirlpool, RIPEMD-160)
- 4 independent passphrase groups via multipass (different passphrase for different layer ranges)
- Each passphrase is a strong diceware phrase — approximately 100 bits of entropy
The layout space alone
With 3 ciphers and 4 hashes, there are 12 possible (cipher, hash) combinations per layer. Over 10 layers: 12¹⁰ ≈ 61 billion possible layouts. No property of the ciphertext distinguishes the correct layout from any other — every wrong guess produces output that looks exactly like every other wrong guess: noise.
The passphrase space
Four independent passphrase groups of ~100 bits each. “Independent” is the key word: the attacker cannot find group 1 and use that to narrow the search for group 2. The search spaces multiply:
Four groups, four separate exhaustive searches, no shortcut between them.
Combined
The total search space is the product of the layout space and all passphrase group spaces:
What about quantum computers?
Grover’s algorithm is the main quantum threat to symmetric encryption. It provides a quadratic speedup — halving the effective bit-strength of a key. So a 100-bit passphrase becomes effectively 50-bit against a quantum attacker. But:
- Grover does not parallelise across independent keys. Each passphrase group must be broken separately. The quadratic speedup applies individually to each one, but the groups still multiply.
- Grover has no special advantage against the layout space. Testing a layout candidate requires decrypting all 10 layers and checking for a valid filesystem — there is no fast distinguisher, no oracle, no shortcut. Each wrong layout looks identical to every other wrong layout.
- Grover’s speedup against the layout reduces
2^37to2^18.5— a factor of roughly 400,000 — which barely registers against the passphrase costs.
Post-quantum total search cost:
| Component | Cost |
|---|---|
| Passphrase group 1 (Grover) | 2^50 |
| Passphrase group 2 (Grover) | 2^50 |
| Passphrase group 3 (Grover) | 2^50 |
| Passphrase group 4 (Grover) | 2^50 |
| Groups are independent — multiply | 2^200 |
| Layout space (Grover) | ×2^18 |
| Per-iteration cost (10 layer decryptions) | ×10 |
| Total post-quantum lower bound | >2^218 |
What does 2^218 actually mean?
A computer the mass of the observable universe, running at one operation per Planck time (the shortest physically meaningful unit of time, approximately 5.4 × 10⁻⁴⁴ seconds), running continuously for the entire current age of the universe, would complete approximately 2^234 operations.
That is less than a fraction of what it would take to break this configuration.
Not “less if you’re lucky.” Not “less on average.” Less. Guaranteed. By over 16 orders of magnitude in favour of the defender.
And this is the quantum scenario — against a hypothetical fault-tolerant quantum computer with millions of logical qubits that does not currently exist and may never exist. Against classical hardware the margin is larger by another 100+ bits.
One important caveat: none of this protects a weak passphrase. A passphrase with 30 bits of entropy becomes 15 bits under Grover — breakable in minutes. The security of the system is bounded by its weakest passphrase group. Cipher phrasing and multiple layers multiply the strength of strong passphrases; they do not compensate for weak ones.
Invention Specification: Cipher Phrasing
Inventor: Ashtar Ventura A.K.A. そにいたん A.K.A. admin@笑.wtf
Date of first conception: 2026
Date of first public implementation: 2026
Reference implementation: abysscrypt
Document type: Technical Invention Disclosure / Prior Art Establishment
Abstract
This document describes cipher phrasing, a novel technique for multi-layer full-disk encryption in which the per-layer cryptographic algorithm assignment is itself a secret, derived at runtime from a user-held passphrase and never stored on disk, in any configuration file, or in any on-device structure. Combined with headerless plain dm-crypt, a device protected with cipher phrasing is entirely indistinguishable from random noise to any observer who does not hold all secrets — including an adversary who knows which tool was used, knows the full set of candidate algorithms, and has unlimited time to examine the ciphertext. The technique introduces a second independent category of secret alongside traditional key material, multiplying the attacker’s required search space rather than extending it.
1. Field of Invention
Cipher phrasing applies to the field of full-disk encryption, specifically to multi-layer plain-mode symmetric block cipher encryption using the Linux device-mapper (dm-crypt) subsystem or equivalent. It is applicable to any system in which multiple encryption passes are applied sequentially to a block device or container file, and in which the selection of cryptographic algorithm at each layer has traditionally been fixed, configured, or stored.
2. Background and Prior Art
2.1 LUKS (Linux Unified Key Setup)
LUKS is the dominant full-disk encryption standard on Linux. It stores an on-disk header containing the cipher name, key size, hash algorithm, UUID, and key slots. This header is readable without any passphrase. An adversary with physical access immediately learns:
- Which cipher is in use
- The key size and hash algorithm
- That the volume is LUKS-encrypted (the magic bytes
LUKS\xba\xbeare in the header) - The number of active key slots
LUKS volumes have identifiable header metadata by design. There is no plausible deniability about the existence or nature of the encryption.
2.2 Plain dm-crypt (headerless mode)
Plain dm-crypt applies block-level encryption with no on-disk header. The entire device surface is ciphertext; there is no magic number, no metadata, no key slot, no signature of any kind. All parameters — cipher, key size, hash, sector offset — are supplied at mount time and never persisted. A plain dm-crypt volume is computationally indistinguishable from a device filled with random data by any test that does not involve decryption with the correct key.
Plain dm-crypt eliminates header leakage but creates a new problem: the user must remember every parameter exactly, or store them somewhere outside the device. In common usage, the cipher is fixed, the key size is fixed, the hash is fixed — these become known quantities that represent a static, predictable configuration.
2.3 Multi-layer encryption
Multi-layer encryption applies multiple independent dm-crypt passes sequentially, each with its own passphrase, cipher, and key derivation. Each layer’s key must be independently recovered; the work factors multiply rather than add. This is a significant security improvement over single-layer encryption.
In all known prior multi-layer implementations, the cipher and hash at each layer are either:
- Fixed and identical across all layers — predictable
- Specified per-layer on the command line — visible in shell history, process listings, and system logs
- Stored in a configuration file — an additional attack target
In every case, the per-layer algorithm assignment is configuration data that lives somewhere recoverable. An adversary who obtains that configuration — without a single passphrase — knows the complete structure of the encryption.
No prior art is known to the inventor in which the per-layer algorithm assignment in a multi-layer plain dm-crypt stack is treated as an independently derived secret.
3. Problem Statement
Given a multi-layer headerless encrypted volume, the following information leakage problems exist in all prior approaches:
1. Configuration disclosure. If an adversary recovers the command line, a config file, a wrapper script, or shell history, they learn the complete per-layer cipher and hash assignment. The brute-force problem reduces to a pure key-material search with a fully known structure.
2. Tool-disclosure amplification. If the adversary identifies which tool was used — from binary artifacts, logs, or the user’s own testimony — and the tool uses fixed or documented defaults, the configuration may be entirely inferred without any additional recovered material.
3. No layout uncertainty for the attacker. Even without the passphrase, knowing the algorithm at each layer allows the adversary to structure their attack optimally — targeting the weakest layer, applying algorithm-specific cryptanalytic techniques, or partitioning the search space by layer.
4. Configuration artifacts outlive the device. Shell history, sudoers entries, scripts, and config files survive wiping of the encrypted volume. A capable adversary may reconstruct the layout from artifacts with no connection to the device itself.
The unsolved problem: how can the per-layer algorithm assignment be kept secret without storing it anywhere, while remaining reliably reproducible by the legitimate user?
4. The Invention
4.1 Core concept
Cipher phrasing treats the per-layer cipher and hash assignment as a secret computed in memory at mount time from a user-supplied passphrase — the cipher phrase — using a deterministic derivation function. The mapping is:
- Never written to disk
- Never stored in any configuration file
- Never passed in process arguments
- Never persisted in any form outside the duration of the mount operation
- Computed only at mount time, held in locked memory, wiped immediately after use
The cipher phrase is a second independent secret, entirely separate from the encryption passphrase(s). Losing the cipher phrase makes the volume unrecoverable. Knowing the cipher phrase without the passphrase(s) does not unlock the volume.
4.2 The algorithm pool
The user specifies a pool of candidate ciphers and a pool of candidate hash functions. The reference implementation ships with the following defaults:
The pools may be modified by the user. Neither the pools nor their sizes need to be secret (though they may be). What is secret is which member of each pool is assigned to each layer.
4.3 The derivation function
For each layer N (1-indexed), the cipher and hash indices are derived as:
Where ‖ denotes concatenation and "C" / "H" are single-byte domain separators. The separators ensure that cipher and hash rotation are independent even when a single phrase is reused for both. N is the layer number, encoded as a single byte (extended for large layer counts). The derivation is stateless: each layer’s assignment depends only on the phrase and the layer index, not on any prior layer’s result.
4.4 Two independent phrases
The user may supply:
- A cipher phrase — determines which cipher is used at each layer
- A hash phrase — determines which hash function is used at each layer
If only one phrase is supplied, it is reused for hash derivation with the "H" domain separator providing independence. Supplying separate phrases makes the two layout dimensions independently secret.
4.5 Reproducibility without storage
The derivation is deterministic. The same cipher phrase, the same pool, and the same number of layers always produce the same layout. The user needs only to remember (or securely hold) the cipher phrase. No stored configuration, no lookup table, no on-disk or off-device record of any kind is required for correct reproduction.
5. What an Adversary Cannot Determine
An adversary who possesses all of the following:
- Physical possession of the encrypted device
- Complete knowledge of which tool was used
- Complete knowledge of all candidate cipher and hash pools
- The exact number of encryption layers
- The sector offset
- All passphrase groups (in the strongest possible attack model)
…still cannot determine, without the cipher phrase:
- Which cipher is used at any specific layer
- Which hash is used at any specific layer
- The relationship between cipher and hash at any layer
- Whether the pools are in their default or modified state
- Any structural property that distinguishes one layout candidate from another
Without the cipher phrase, the correct layout is one of (len(cipher_pool) × len(hash_pool))^N equally plausible assignments. For a default pool over 10 layers this is approximately 61 billion candidates. No quantum algorithm provides a useful speedup because there is no efficient oracle — testing a layout candidate requires full decryption of all N layers against a known-valid output, and every wrong candidate produces output that is computationally indistinguishable from every other wrong candidate.
6. Security Properties
6.1 Three independent secret categories
| Category | Secret | What is protected |
|---|---|---|
| Layout secret | Cipher phrase | Which cipher is at which layer |
| Layout secret | Hash phrase (optional) | Which KDF hash is at which layer |
| Key material | Passphrase(s) | The encryption key at each layer |
These categories are orthogonal. Recovering any strict subset provides no advantage in recovering the remainder. An adversary who obtains all passphrases but not the cipher phrase knows none of the layer structure and cannot begin decryption. An adversary who obtains the cipher phrase but no passphrases knows the structure but has no key material.
6.2 Absence of a layout oracle
An oracle is a function that returns a true/false signal for “is this guess correct?” Efficient brute-force attacks are only possible when an oracle exists.
In LUKS: the oracle is “does the header decrypt to a valid LUKS structure?” — one hash comparison, cheap and unambiguous.
In plain dm-crypt with a known layout: the oracle is “does decryption with the known cipher and hash produce a valid filesystem?” — still one hash comparison per passphrase candidate.
In plain dm-crypt with cipher phrasing: the oracle is “does this candidate cipher phrase, applied to produce this layout, combined with this candidate for every passphrase group, decrypt all N layers in the correct order, and produce a valid filesystem at the deepest level?” Every oracle query costs N full-sector block-cipher decryptions in sequence, and the layout dimension must be correct before the passphrase dimension can be evaluated at all. There is no decomposition of this test into independent subtests.
6.3 Total indistinguishability from random noise
A device protected with cipher phrasing and plain dm-crypt presents no information to an observer without the secrets:
- No headers. No magic bytes, no metadata, no key slots, no version markers.
- No configuration. Cipher phrasing stores nothing on disk or in any file.
- Ciphertext indistinguishability. AES-XTS, Serpent-XTS, and Twofish-XTS in plain mode are computationally indistinguishable from a pseudorandom permutation under all known attacks when the key is unknown.
- No wrong-key signal. An incorrect passphrase or incorrect cipher phrase produces a different block device — not an error. There is no checksum, no integrity tag, no decryption-failure signal of any kind.
The device is practically identical to a device filled with random bytes.
6.4 Multiplicative rather than additive security
In conventional multi-layer encryption with a single passphrase, the brute-force cost scales roughly as 2^k — the passphrase entropy — with a small constant multiplier per additional layer. Adding layers under one passphrase is marginally useful at best.
Cipher phrasing, combined with multiple independent passphrase groups, changes the cost structure:
All factors are independent and multiply. There is no shortcut: a correct passphrase guess applied to the wrong layout produces noise indistinguishable from every other wrong guess. The attacker cannot find the layout first and then search passphrases, nor find one passphrase group and use it to narrow the search for another. Every dimension of the search must be completed simultaneously.
7. Quantum Resistance Analysis
7.1 Applicable quantum algorithms
Shor’s algorithm breaks integer factorisation and discrete logarithm problems. It does not apply to symmetric ciphers or hash functions. Cipher phrasing uses no asymmetric primitives. Shor’s algorithm is irrelevant.
Grover’s algorithm provides a quadratic speedup for unstructured brute-force search, reducing an N-bit key search from 2^N to 2^(N/2) quantum operations. NIST has certified AES-256 as post-quantum secure on this basis: 2^128 quantum operations remain infeasible by all credible estimates.
7.2 Effect of Grover on cipher phrasing
Passphrase groups: Grover reduces each group’s effective bit-strength by half. However, Grover does not parallelise across independent keys — each group must be broken in a separate Grover search. The groups continue to multiply:
Four groups of 100-bit entropy passphrases: 2^(100/2 × 4) = 2^200.
Layout space: Grover reduces (C×H)^L to (C×H)^(L/2). For default pools over 10 layers this is approximately 2^18 — a reduction from ~61 billion to ~350,000 candidates. This is trivially searchable. However, each candidate requires N full block-cipher decryptions with no fast distinguisher, and this dimension cannot be separated from the passphrase search — they must be correct simultaneously.
Combined post-quantum lower bound:
For 10 layers, default pools, 4 passphrase groups of 100-bit entropy:
7.3 Physical interpretation
2^218 quantum operations.
A computer with the mass of the entire observable universe, executing one operation per Planck time — the smallest physically meaningful time interval, approximately 5.4 × 10⁻⁴⁴ seconds — running continuously for the entire current age of the universe, would complete approximately 2^234 operations.
That is less than 2^218 by a factor of roughly 2^16 — 65,536 times less. Against this configuration, even a universe-scale quantum computer running since the Big Bang would not have finished.
This analysis holds against the quadratic quantum speedup. Against classical hardware the margin is wider by over 100 bits in every dimension.
8. Novel Contributions
The following aspects of cipher phrasing are, to the inventor’s knowledge, without precedent in published prior art as of the date of this disclosure:
1. The treatment of the per-layer algorithm assignment in a multi-layer dm-crypt stack as a cryptographic secret derived from a user-held passphrase, rather than as a stored or fixed configuration parameter.
2. The combination of this technique with headerless plain dm-crypt to produce a volume in which nothing on the device surface conveys any information about the cryptographic configuration — not the algorithm, not the key size, not the hash, not the number of layers, not the passphrase structure, not the existence of encryption at all.
3. The SHA-256-based derivation scheme with domain separation ("C" and "H" byte prefixes) enabling independent rotation of cipher and hash assignments from a single shared phrase, with optionally independent phrases for each dimension.
4. The security model in which the layout is an independent secret category alongside passphrase(s), such that recovering any strict subset of secrets provides no advantage in recovering the remainder.
5. The multiplicative interaction between the layout secret space, independent passphrase group spaces, and the absence of any oracle — producing a total attack cost that is the product of all independent search spaces, with no known classical or quantum algorithm capable of decomposing the product efficiently.
9. Reference Implementation
The reference implementation is abysscrypt, an open-source C binary for Linux.
- abysscrypt
- License: abysscrypt Source License v1.0 (free for personal/research/educational use; attribution required; commercial and government use requires written permission)
- Language: C11, single source file, no third-party dependencies
- Secret handling: cipher phrase held in
mlock()‘d anonymous memory, wiped viaexplicit_bzeroon all exit paths, never written to disk, never passed inargv
The implementation of abysscrypt with Cipher Phrasing has been publicly available since may 2026 and constitutes prior art establishing the earliest known date of the cipher phrasing technique.
This document is a public technical disclosure establishing the priority date and inventorship of the cipher phrasing technique. It is published to establish prior art and preserve the inventor’s rights. Reproduction is permitted with attribution to hairetikos. Commercial use of the technique described herein requires written permission.
Could our planet be a YANTRA? (यन्त्र)

Bhagavad Gita: Chapter 18, Verse 61 https://www.holy-bhagavad-gita.org/chapter/18/verse/61/
श्वर: सर्वभूतानां हृद्देशेऽर्जुन तिष्ठति |
भ्रामयन्सर्वभूतानि यन्त्रारूढानि मायया || 61||
īśhvaraḥ sarva-bhūtānāṁ hṛid-deśhe ‘rjuna tiṣhṭhati
bhrāmayan sarva-bhūtāni yantrārūḍhāni māyayā
common translation: The Supreme Lord dwells in the hearts of all living beings, O Arjun. According to their karmas, He directs the wanderings of the souls, who are seated on a machine made of material energy.
But the word YANTRA does not necessarily alaways mean a machine, it can be a contraption, and a YANTRA can be one of such imagery below, usually engraved on copper plates
BG 18:61 says we are “seated as on a machine[yantra] made of material energy”, and many have interpreted this to mean the human body is the yantra, and our soul is seated within (along with the supersoul connection)
But what if in fact the PLANET is the Yantra? We are placed on the planet, and the planet is the Yantra… our bodies are also made of the material energy, but the planet itself may be the YANTRA being talked about here? Something to consider


SYSTEM AND METHOD FOR BIOMIMETIC DYNAMIC OBJECT TRANSFER BETWEEN ROBOTIC MANIPULATORS VIA ADAPTIVE BALLISTIC HANDOVER
an idea i had for an invention: the way humans can throw objects between hands, the mechanism can be leveraged for industrial and home robotics. i will provide a summary of the invention, compiled with the help of Claude Opus 4.6, with specific input from me, therefore i claim copyright (“Ashtar Ventura”, owner and webmaster of the website www.笑.wtf registered as an IDN):
SYSTEM AND METHOD FOR BIOMIMETIC DYNAMIC OBJECT TRANSFER BETWEEN ROBOTIC MANIPULATORS VIA ADAPTIVE BALLISTIC HANDOVER
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims the benefit of the filing date and is an original filing.
FIELD OF THE INVENTION
The present invention relates generally to robotic manipulation systems, and more specifically to a system and method for high-speed dynamic object transfer between two or more robotic manipulators using adaptive ballistic handover with real-time weight estimation, trajectory computation, and predictive catch synchronisation.
BACKGROUND OF THE INVENTION
In current industrial manufacturing and home robotics environments, the transfer of objects between robotic manipulators (arms, hands, grippers) is predominantly accomplished through static or quasi-static handover. In a typical static handover, a first manipulator moves an object to a pre-determined rendezvous point, holds the object stationary, a second manipulator grasps the object, and only then does the first manipulator release. This process is inherently slow and introduces significant dead time into manufacturing workflows.
Existing approaches to dynamic object transfer, such as those described in US10144591B2 (Amazon Technologies), address robotic tossing of items to fixed receiving locations (e.g., bins or shelves) within inventory systems. However, these systems do not employ a receiving manipulator that actively catches the object. They rely on passive receptacles rather than dynamic, closed-loop interception.
Academic research (e.g., “Dynamic Handover: Throw and Catch with Bimanual Hands,” arXiv:2309.05655, 2023) has demonstrated reinforcement-learning-based throw-and-catch between bimanual robotic hands. However, such systems lack pre-throw haptic mass estimation, do not perform adaptive velocity computation based on sensed object properties, and have not been integrated into industrial manufacturing pipelines.
There remains a need for a unified system that replicates the human biomechanical strategy of: (1) estimating an object’s mass through haptic interaction before throwing, (2) computing an optimal throw trajectory and release velocity based on that estimation, and (3) executing a predictive, timed catch at the receiving manipulator — all within a closed-loop control architecture suitable for production environments.
SUMMARY OF THE INVENTION
The present invention provides a system and method for transferring objects between two or more robotic manipulators via adaptive ballistic handover. The system comprises:
(a) A throwing manipulator equipped with force/torque sensors and/or tactile sensor arrays capable of estimating the mass and inertial properties of a grasped object prior to release;
(b) A ballistic trajectory computation module that receives mass estimation data, target coordinates, environmental parameters (e.g., gravitational constant, air resistance model), and geometric constraints of the receiving manipulator, and computes an optimal release velocity vector (magnitude and direction), release timing, and release point;
(c) A receiving manipulator equipped with high-speed vision sensors (e.g., stereo cameras, event-based cameras, LiDAR) and/or predictive state estimators that track the object in flight and compute the predicted intercept point and arrival time;
(d) A catch synchronisation controller that commands the receiving manipulator to pre-position and execute a timed grasp at the predicted intercept point, with real-time correction based on in-flight trajectory updates;
(e) A closed-loop feedback system that records the outcome of each transfer (success, miss, damage) and updates the ballistic model parameters, mass estimation calibration, and catch timing model via machine learning or statistical regression, enabling continuous improvement over successive transfers.
DETAILED DESCRIPTION OF THE INVENTION
1. System Architecture Overview
The system comprises at least two robotic manipulators (hereinafter “Manipulator A” and “Manipulator B”), a central or distributed compute unit, a sensor suite, and a communications bus connecting all components with deterministic, low-latency messaging (e.g., EtherCAT, TSN Ethernet, or equivalent real-time protocol).
Manipulator A and Manipulator B may be:
- Two arms of a single dual-arm robot;
- Two separate robotic arms mounted on a shared frame or production line;
- Two independent mobile robotic platforms; or
- Any combination thereof.
2. Pre-Throw Mass and Inertial Estimation (Haptic Sensing Phase)
Before initiating a throw, Manipulator A performs a haptic interrogation sequence on the grasped object. This sequence comprises one or more of the following operations:
(a) Static weighing: Manipulator A holds the object stationary and reads the force/torque sensor at the wrist or fingertip to determine gravitational force, from which mass is derived.
(b) Dynamic probing: Manipulator A executes small, controlled oscillatory or impulsive motions (e.g., a brief vertical acceleration–deceleration cycle) and measures the resulting force/torque response. The ratio of applied force to measured acceleration yields an estimate of the object’s mass and, with multi-axis probing, its rotational inertia tensor.
(c) Tactile surface characterisation: If Manipulator A is equipped with a tactile sensor array (e.g., capacitive, piezoresistive, or optical tactile skin), the system estimates surface friction coefficient and contact geometry to inform grip force planning for the throw release and for the receiving manipulator’s catch grip.
The mass estimation module outputs a tuple: (m̂, Î, μ̂, σm, σ_I, σμ) where m̂ is estimated mass, Î is estimated inertia tensor, μ̂ is estimated surface friction, and σ values are the associated uncertainty bounds.
3. Ballistic Trajectory Computation
Given the estimated object properties, the trajectory computation module solves for the optimal release state vector [x_r, v_r, t_r] (release position, release velocity, release time) such that the object follows a ballistic trajectory from Manipulator A to the intercept envelope of Manipulator B.
The computation accounts for:
(a) Gravitational acceleration (g): Standard or locally calibrated.
(b) Aerodynamic drag (optional): For lightweight or high-surface-area objects, a drag model (e.g., quadratic drag: F_d = ½ρC_dAv²) may be incorporated. The drag coefficient C_d and cross-sectional area A may be estimated from the object’s known geometry or from tactile/vision-based shape reconstruction.
(c) Manipulator B’s reachable workspace and kinematic constraints: The trajectory must deliver the object to a point within Manipulator B’s dexterous workspace, at a velocity that Manipulator B can match (i.e., the object’s arrival velocity must not exceed Manipulator B’s maximum end-effector velocity along the approach axis).
(d) Uncertainty propagation: The uncertainty bounds from the mass estimation phase are propagated through the ballistic model to produce a predicted landing distribution (e.g., a 3D Gaussian ellipsoid at the intercept plane). Manipulator B’s catch strategy is planned to cover this distribution.
(e) Safety envelope: The trajectory must not intersect any obstacle, human workspace, or exclusion zone. A collision-check module validates the computed trajectory against a real-time occupancy map before authorising the throw.
The trajectory computation may employ analytical closed-form solutions (for simple parabolic trajectories in free space) or numerical optimisation (for constrained environments with drag, spin, or obstacle avoidance).
4. Throw Execution
Manipulator A executes a planned motion profile that accelerates the object along the computed release velocity vector. At the computed release point and time, Manipulator A opens its gripper or releases its grasp in a controlled manner.
Release strategies include:
(a) Gripper opening release: A parallel-jaw or multi-finger gripper opens rapidly, releasing the object with the end-effector’s instantaneous velocity.
(b) Wrist-flick augmentation: For higher release velocities, the manipulator may execute a wrist rotation at the moment of release to add rotational velocity and stabilise the object’s flight (analogous to a human wrist flick in throwing).
(c) Finger-roll release: For multi-finger hands, a sequential finger extension imparts a controlled spin to the object, improving aerodynamic stability.
The release controller monitors the actual end-effector velocity at the moment of release and communicates the actual release state vector to Manipulator B’s tracking system, providing an initial condition for in-flight tracking.
5. In-Flight Object Tracking
Upon release, the system transitions to the tracking phase. One or more high-speed sensors observe the object in flight:
(a) Stereo camera pair or structured-light sensor providing 3D position estimates at high frame rates (≥120 Hz, preferably ≥500 Hz for short-range fast transfers).
(b) Event-based (neuromorphic) cameras providing microsecond-latency detection of moving edges, suitable for very fast objects.
(c) Time-of-flight or LiDAR sensors providing depth measurements.
The tracking module fuses sensor data with the ballistic dynamics model using a state estimator (e.g., Extended Kalman Filter, Unscented Kalman Filter, or particle filter) to produce a continuously updated prediction of the object’s intercept point and arrival time at Manipulator B.
6. Catch Synchronisation and Execution
Manipulator B’s catch controller receives the real-time trajectory prediction and commands the manipulator to:
(a) Pre-position its end-effector at the predicted intercept point, with the gripper or hand open in a configuration geometrically compatible with the incoming object’s orientation.
(b) Velocity-match its end-effector to approximate the object’s predicted velocity at the intercept point, reducing the relative impact velocity and the risk of object damage or bounce.
(c) Execute a timed grasp closure synchronised to the object’s arrival. The grasp timing is computed from the predicted time-to-intercept, the gripper’s closing dynamics (closing time, closing force profile), and a configurable safety margin.
(d) Apply adaptive grip force based on the communicated mass estimate and surface friction estimate, ensuring secure retention without crushing the object.
If the real-time trajectory prediction deviates beyond a configurable threshold from the pre-positioned intercept, Manipulator B executes a corrective motion to adjust its intercept point. If the deviation exceeds the correctable range, the system triggers a miss-abort protocol (see Section 8).
7. Closed-Loop Learning and Calibration
After each transfer, the system records:
- Actual vs. predicted intercept point and time
- Catch success or failure
- Object damage assessment (if sensors are available)
- Actual object mass (measured post-catch by Manipulator B’s force sensors)
This data is fed into a transfer model updater that refines:
(a) Mass estimation calibration parameters (correcting systematic biases)
(b) Ballistic model parameters (drag coefficients, release timing offsets)
(c) Catch timing model (gripper closing delay, sensor-to-actuator latency)
(d) Object-specific profiles (for known recurring objects in a production line)
The learning system may employ parametric regression, Bayesian updating, or neural network–based model refinement. Over successive transfers, the system converges to higher success rates, tighter intercept distributions, and faster cycle times.
8. Safety Systems
The invention incorporates the following safety provisions:
(a) Pre-throw safety check: Before every throw, the system verifies that the computed trajectory does not enter any human-occupied zone (detected via presence sensors, light curtains, or safety-rated vision). If a human is detected in the trajectory path, the throw is aborted and the system falls back to static handover.
(b) Miss-abort protocol: If in-flight tracking predicts that the object will miss the catch envelope, Manipulator B retracts and the system activates a passive catch mechanism (e.g., a safety net, padded tray, or retaining wall) to arrest the object without damage or hazard.
(c) Energy limiting: The maximum throw velocity is constrained such that the kinetic energy of any thrown object does not exceed a configurable threshold (e.g., consistent with ISO/TS 15066 collaborative robot power and force limiting guidelines).
(d) Object suitability filter: The system maintains a classification of objects that are approved for ballistic transfer. Objects that are fragile, hazardous (e.g., sharp, chemical), or outside the validated mass/size range are excluded and transferred via conventional static handover.
9. Industrial Application Examples
(a) Assembly line: On a production line, a dual-arm robot uses the invention to transfer components from a parts tray (accessed by the left arm) to an assembly fixture (accessed by the right arm). The ballistic transfer saves 0.5–2.0 seconds per cycle compared to static handover, improving throughput by 10–30% depending on the transfer distance and object mass.
(b) Warehouse order fulfilment: Two robotic arms stationed at adjacent packing stations toss lightweight items (e.g., boxed consumer goods) between them to balance workload dynamically, without requiring conveyor interconnection.
(c) Home robotics: A domestic robot with dual arms uses the invention to rapidly reorganise kitchen items, toss laundry into a basket, or pass tools between hands while performing maintenance tasks.
CLAIMS
1. A system for dynamic object transfer between robotic manipulators, comprising:
- a first robotic manipulator (the throwing manipulator) equipped with at least one force, torque, or tactile sensor;
- a mass and inertial estimation module configured to estimate the mass and inertial properties of a grasped object based on sensor readings from the first robotic manipulator;
- a trajectory computation module configured to compute a release velocity vector and release timing for the object based on the estimated mass and inertial properties, a target intercept region associated with a second robotic manipulator, and gravitational and optionally aerodynamic parameters;
- a second robotic manipulator (the receiving manipulator) equipped with at least one high-speed tracking sensor;
- an in-flight tracking module configured to track the position and velocity of the object after release and to predict an intercept point and arrival time; and
- a catch synchronisation controller configured to command the second robotic manipulator to execute a timed grasp at the predicted intercept point.
2. The system of claim 1, wherein the mass and inertial estimation module performs haptic interrogation comprising at least one of: static weighing, dynamic oscillatory probing, or impulsive motion probing.
3. The system of claim 1, wherein the trajectory computation module propagates uncertainty bounds from the mass estimation through the ballistic model to produce a predicted landing distribution, and wherein the catch synchronisation controller plans a catch envelope covering said distribution.
4. The system of claim 1, further comprising a closed-loop learning module that records transfer outcomes and updates at least one of: mass estimation calibration parameters, ballistic model parameters, or catch timing parameters.
5. The system of claim 1, further comprising a safety module that: (a) verifies the computed trajectory does not intersect a human-occupied zone before authorising the throw; (b) constrains the maximum kinetic energy of any thrown object; and (c) activates a passive catch mechanism upon prediction of a missed catch.
6. The system of claim 1, wherein the first robotic manipulator executes a wrist-rotation or sequential finger-extension release to impart stabilising spin to the object during release.
7. The system of claim 1, wherein the second robotic manipulator velocity-matches its end-effector to the predicted arrival velocity of the object to reduce relative impact velocity.
8. The system of claim 1, wherein the first and second robotic manipulators are arms of a single dual-arm robotic platform.
9. The system of claim 1, wherein the first and second robotic manipulators are separate robotic platforms communicating via a deterministic low-latency network.
10. A method for dynamic object transfer between robotic manipulators, comprising the steps of:
(a) grasping an object with a first robotic manipulator;
(b) estimating the mass and inertial properties of the object using force, torque, or tactile sensor data from the first robotic manipulator;
(c) computing a release velocity vector, release point, and release timing based on the estimated mass, a target intercept region of a second robotic manipulator, and ballistic trajectory parameters;
(d) executing a throwing motion with the first robotic manipulator and releasing the object at the computed release state;
(e) tracking the object in flight using at least one high-speed sensor and predicting an intercept point and arrival time;
(f) commanding the second robotic manipulator to move to the predicted intercept point and execute a timed grasp synchronised to the predicted arrival time.
11. The method of claim 10, further comprising, after step (f), recording the transfer outcome and updating at least one of: mass estimation calibration, ballistic model parameters, or catch timing parameters based on the recorded outcome.
12. The method of claim 10, further comprising, before step (d), verifying that the computed trajectory does not intersect any human-occupied zone or obstacle, and aborting the throw if the verification fails.
13. The method of claim 10, wherein step (b) comprises executing a controlled oscillatory or impulsive motion with the first robotic manipulator and deriving the object’s mass from the ratio of applied force to measured acceleration.
14. The method of claim 10, wherein step (f) further comprises velocity-matching the second robotic manipulator’s end-effector to the object’s predicted arrival velocity.
15. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform the method of claim 10.
ABSTRACT
A system and method for transferring objects between robotic manipulators via adaptive ballistic handover. A throwing manipulator estimates the mass and inertial properties of a grasped object through haptic sensing, computes an optimal ballistic trajectory and release velocity, and executes a throw. A receiving manipulator tracks the object in flight using high-speed sensors, predicts the intercept point and timing, and executes a synchronised catch with velocity matching and adaptive grip force. A closed-loop learning system records transfer outcomes and continuously refines the estimation, trajectory, and catch models. Safety systems prevent throws into human-occupied zones, limit kinetic energy, and provide passive catch mechanisms for missed transfers. The invention enables significantly faster inter-manipulator object transfer compared to static handover methods, with applications in industrial manufacturing, warehouse logistics, and home robotics.
INVENTOR(S)
ASHTAR VENTURA
APPLICANT
ASHTAR VENTURA
DATE
March 7, 2026
My Ontological Model for the Universe/Reality
for anything to exist, there has to be something before it. something cannot arise from nothing. But, what about time? how do we make sense of this?
i propose at least one model;
Eternal Ground ( Ω ) + Fractal Emanation ( C ∞ )
FRACTAL ETERNAL CAUSATION:

TO SUMMARISE:

The Eternal → Infinite Fractal Causation → Present Experience
| Problem | How This Model Solves It |
|---|---|
| Infinite regress | The regress terminates in Ω , but Ω needs no cause (it’s eternal/timeless) |
| Something from nothing | Nothing ever comes from nothing—everything flows from Ω |
| **Why is there something? ** | Ω doesn’t “begin”—it simply is. The question dissolves. |
| Causality preserved | Every temporal thing has a cause; only the timeless ground is uncaused |
| Infinite depth preserved | The fractal structure gives infinite richness without infinite time |
Visual Representation
┌─────────────────────┐
│ │
│ Ω (Timeless) │ ← Outside time, eternal ground
│ The Eternal One │
│ │
└──────────┬──────────┘
│
┌─────────────────────┼─────────────────────┐
│ │ │
▼ ▼ ▼
┌────────┐ ┌────────┐ ┌────────┐
│ C¹ₐ │ │ C¹ᵦ │ │ C¹ᵧ │ ← Primary emanations
└───┬────┘ └───┬────┘ └───┬────┘
│ │ │
┌────┴────┐ ┌────┴────┐ ┌────┴────┐
▼ ▼ ▼ ▼ ▼ ▼
┌───┐ ┌───┐ ┌───┐ ┌───┐ ┌───┐ ┌───┐
│C²₁│ │C²₂│ │C²₃│ │C²₄│ │C²₅│ │C²₆│ ← Secondary
└─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘ └─┬─┘
│ │ │ │ │ │
╱ ╲ ╱ ╲ ╱ ╲ ╱ ╲ ╱ ╲ ╱ ╲
▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼
· · · · · · · · · · · · ← Tertiary...
│ │ │ │ │ │ │ │ │ │ │ │
▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼ ▼
∞ fractal depth continues forever
│
▼
┌───────────────────┐
│ Present Moment │ ← Where we experience reality
│ NOW │
└───────────────────┘
The Ashtar Principle ( A Ω ):
“There exists exactly one timeless, uncaused eternal ground (Ω). All things that exist within time emerge from Ω through infinite fractal chains of causation. Every causal inquiry, pursued to infinite depth, resolves into Ω.”
Philosophical Resonances
the model aligns beautifully with several profound traditions:
| Tradition | Their Ω | Fractal Emanation |
|---|---|---|
| Neoplatonism | The One (τὸ ἕν) | Emanation through Nous → Soul → Matter |
| Vedanta | Brahman | Brahman → Ātman → Maya (manifestation) |
| Kabbalah | Ein Sof (אֵין סוֹף) | Sefirot (10 emanations, fractal-like) |
| Christianity | God as “I AM” | Logos → Creation |
| Taoism | The Tao | “The Tao gives birth to One, One to Two, Two to Three, Three to all things” |
| Physics (speculative) | Quantum vacuum / Mathematical structure | Symmetry breaking → forces → particles → atoms → … |
Final Fantasy VII | 911 WTC7



Final Fantasy VII
18:11
[9]:11
MIDGAR SECTOR 7 PILLAR WAS AN INSIDE JOB
SHINRA BLAMED “TERRORISTS”
FF7 “WALL MARKET” = WALL STREET NEW YORK
NYC building 7
WTC7 controlled demolition Larry Silverstein 「pull it」 Inside Job
have a good day
1992: Japanese pioneers raise kid in rubber womb
of course, a kid is a baby goat, back in 1992 they were showing us on the surface-level realm about growing kids in artificial wombs … we can only imagine what goes on in deep underground bases with legal “grey zones”, especially in 2025
https://www.newscientist.com/article/mg13418180-400-japanese-pioneers-raise-kid-in-rubber-womb
those women in the 1990s who reported being abducted by “alien”s and impregnated with “hybrids”? … then abducted again and having the fetus removed?
probably because in 1992 it required months in the biological womb before transferring to artificial womb … early stage of the tech 😉
backup of the page follows below:
Japanese pioneers raise kid in rubber womb
25 April 1992
Aldous Huxley’s Brave New World came a step closer to realisation earlier
this month when Japanese scientists announced that they have raised a goat
fetus in an artificial womb. The successful ‘delivery’ of the goat, believed
to be the first of its kind in the world, increases the prospects of rescuing
sick human fetuses and treating them in an artificial womb.
Yoshinori Kuwabara, a gynaecologist at Tokyo University’s medical department,
removed the fetus from its mother by Caesarean section after 120 days’ gestation,
about three-quarters of the way to its full term. He placed it in a rubber
womb filled with artificial amniotic fluid, and the kid was delivered 17
days later.
‘A goat fetus is very immature, even at 120 days,’ says Kuwabara. ‘It
corresponds to about the 20th to 24th week of gestation of a human fetus.’
In its second womb, the fetus was fed via a catheter with normal fetal
blood, which was oxygenated and recycled. Nutrients were added to the blood
supply. The sac was filled with a near exact reproduction of natural amniotic
fluid – a mixture of sodium and potassium chlorides, glucose and proteins.
The temperature was kept at a constant 39.5 °C by passing warm water
between two outer layers of rubber.
Creating an artificial womb has been tried before. In 1969, French scientists
managed to keep a sheep fetus alive in one for two days. Kuwabara’s goat
fetus faced two principal dangers. The 42-litre sac is larger than a normal
womb and the fetus had room to be more active than usual. Under these conditions
Kuwabara says the fetus could have taken in too much oxygen, which can be
toxic at high concentrations, or swallowed too much amniotic fluid, leading
to severe fluid retention. To reduce the danger, Kuwabara and colleagues
fed the fetus sedatives to slow down its activity and swallowing.
‘We have two objectives in our research,’ says Kuwabara. ‘One is for
animal models for fetal experimental medicine. The other is for clinical
use, to rescue very immature or sick fetuses.’
One condition Kuwabara says may be treatable by artificial gestation
is hypoplasia of the lungs, in which the lungs fail to mature. The disease
kills around 100 babies a year in Japan. ‘I don’t worry about the ethical
problems. I just want to rescue the fetus where it is impossible to be
rescued by present treatment,’ he says.
Kuwabara believes it may be possible to incubate a goat’s fetus from
as early as 90 days into gestation, and a human fetus from about the 16th
week. The kid, now one month old, is still suffering the after-effects of
the sedatives. It cannot stand or breath by itself. But as the muscle relaxants
wear off it is gaining strength and will soon be able to function properly.
Kuwabara says it is ‘doing well’.
2 prominent remote sensing/clairvoyant dreams i had 2007-2010
over the years, i have experienced various precognitive dreams, and also some remote sensing/clairvoyant dreams. i will list a couple of notable examples of the remote sensing dreams i had many years ago, and how sometimes they can be semi-symbolic in their linkage:
1: 126-car train derailed in illinois, ethanol chemical spill
in 2010, i dreamt that i was on a train, and the train crashed and derailed.
in the dream, i get off the train and start walking across the tracks, and experience pain in my abdomen
after waking, that same day, i read online that a 126-car train had derailed in illiniois USA, resulting in a chemical explosion or spill, and they did not know what caused it
when i looked at the timing, the event happened while i was asleep, while i was dreaming, so this most definitely was clairvoyance/remote sensing — it was not a precognition but i somehow was remotely experiencing the event during the actual time it was happening.
related articles/video : https://www.dailymotion.com/video/xljvcq
A community in Illinois was evacuated after a train carrying ethanol alcohol derailed overnight and caught fire.
The 126-car train went off its tracks in a rural area about 100 miles southwest of Chicago — with many cars exploding, igniting several other cars. No injuries or fatalities were reported. Deborah Lutterbeck, Reuters.
https://uk.news.yahoo.com/ethanol-filled-train-explodes-derailment-140505783.html

2: Andrew Meier tased for asking John Kerry a question (“Don’t Tase Me Bro” meme origin)
in 2007 i had a very weird dream that i was being chased by some police, and they were using tasers to tase me in my brain, it was a disturbing and seemingly “random” dream
when i woke, i read news that day that a student in the USA had been tackled to the ground and tased for asking John Kerry about “Skull & Bones” secret society. This is the sort of conspiracy stuff that i was also researching at the time, so there may have been a “morphic resonance” as to why i picked up on this
The fact i was tased in my brain, was a symbolic linkage to the fact that Andrew Meyer was tased for asking the wrong question, has was effectively being tased for his thoughts, his speech…
After this, i actually connected with Andrew Meyer on facebook and he told me to beware the ego, and that my beliefs i explained at the time were resonant with the kabbalah.
https://www.youtube.com/watch?v=6bVa6jn4rpE
https://en.wikipedia.org/wiki/University_of_Florida_Taser_incident
the Science of the Séance
2025.07.11 (July) a talk i done at a moot regarding the links between science and the paranormal, how the science can be used to understand and enhance ESP and paranormal work.
bitchute mirror: https://www.bitchute.com/video/LhCXIG9DRpUB
2025.07.11 (July) a talk i done at a moot regarding the links between science and the paranormal, how the science can be used to understand and enhance ESP and paranormal work.
specific links:
Remote Viewing 2001 UK Ministry of Defense Experiment FOI release:
https://webarchive.nationalarchives.gov.uk/ukgwa/20121026065214/http://www.mod.uk/DefenceInternet/FreedomOfInformation/DisclosureLog/SearchDisclosureLog/RemoteViewing.htm
ESP and geomagnetic activity:
https://archives.parapsych.org/bitstream/123456789/3/1/2008_PA_Convention_Proceedings.pdf#page=216
[Ouija Boards] Expression of nonconscious knowledge via ideomotor actions:
https://www.sciencedirect.com/science/article/abs/pii/S1053810012000402
Wildfire-Induced Thunderstorms:
https://agupubs.onlinelibrary.wiley.com/doi/full/10.1029/2008GL035680
general topics discussed:
wave physics
room modes & standing waves
harmonics
constructive interference & destructive interference
sympathetic resonance
pythagorean tuning
golden ratio
sacred geometry
helmholtz resonators
piezoelectric effect of quartz
REM rebound
escape from HEL
the most difficult challenge in fact is not to travel to other planets within the HELiosphere, but to exit past the HELiopause (the EDGE of the HELiosphere) — it is ultra violent at the HELiopause, as HELios attempts to trap all people within the HELiosphere..as it cyclically ejects micrnova, bringing with it asteroids, fire & brimstone to planets… eventually supernova
space probes struggle at this point, and space ships will thus struggle too.



