The New Golden Age of Decipherment (and What Shakespeare Has to Do With It)
Cryptology is commonly understood as the science of how to correctly create one's own ciphers and how to effectively crack those of others. But there are times when, based on this science, we need to reconstruct our own encrypted history...
One of the very first issues of the journal Cryptologia – nearly half a century ago – was opened by the remarkable article "Age Of Decipherment" [o1]. What made this publication particularly noteworthy was that it was devoted not so much to ciphers (in fact, not to ciphers at all) but rather to the importance of the science of cryptology in matters of restoring the true historical picture.
For the methods and tools of cryptology, developed not only for the secrecy of information but also for cracking ciphers hiding someone's secrets, are practically ideal for scholars in unearthing the truth about the darkest secrets of history.
This straightforward idea, in general, was demonstrated through the example of decrypting ancient Egyptian hieroglyphic writing in the first half of the 19th century. That is, in an era when the language of the ancient Egyptians had long been dead, and no one on the planet knew how to speak it or read-write hieroglyphs. Yet, the budding science of Egyptology was accumulating more and more texts and documents preserved from the times of this great ancient civilization.
The stories of the discovery of the Rosetta Stone and the scientific feat of François Champollion, who returned to humanity not only the meanings of the hieroglyphic script but also the sound of the ancient Egyptian language, are now quite well known. Since shortly after the Egyptian hieroglyphs, scientists managed to decrypt-read the cuneiform texts of other ancient cultures, the Sumerian-Akkadian and Babylonian civilizations, the article in "Cryptologia" had every reason to call that era the "golden age of decipherment."
Much less remembered nowadays is the confusion that reading the multitude of decrypted documents, which have come down to us from ancient times, caused in the minds of 19th-century European historians. For all these documents from different cultures and eras concordantly told of a history of humanity that, according to the biblical version of events, simply could not have existed in principle.
Given the immense authority of the Old Testament texts at that time, historians at the beginning of the 19th century were obliged to construct the chronology of human history such that it began from the moment of "creation of the world" and Adam and Eve. Moreover, these events, according to the most authoritative church interpreters of the Bible, occurred about 4,000 years before the birth of Christ. Yet, the texts of the ancient Egyptians and the cuneiform tablets of Mesopotamia told of the history of their gods, kings, and heroes, living much earlier than the Christian "creation of the world"...
These matters, however, are considered quite ancient, and by the present time, they have long been successfully overcome by historical science. Seemingly overcome, to phrase it more precisely.
If one looks closer, some of the very serious, undeniably authentic, and oldest documents of Egyptian history continue to be ignored by historians. For the interesting reason that they radically diverge not only from the dogmas of the Christian religion but also from the generally accepted views of modern science. That is, they undermine established scientific views on the religion and history of the Egyptians, as well as on the nature of the human body and consciousness. Not to mention the structure of reality as a whole.
Among such "actively silenced" documents of Ancient Egypt is, first and foremost, the most valuable CHAPTER LXIV from The Egyptian Book of the Dead, as it is now commonly called. Or "The Chapter Of Knowing All The “Chapters Of Ascension to the Light” In A Single Chapter" as the ancient Egyptians themselves called it. Incidentally explaining the importance of this text in their papyri thus: "If this chapter be known by the deceased he shall come forth by day, and he shall not be repulsed at any gate of the Tuat (underworld), either in going in or in coming out." [i1]
Here, however, the conversation will not be about the "secrets of Light and darkness of Egypt." But about that new golden age of decipherment, which is now flourishing thanks to powerful computers and artificial intelligence systems based on them. About entirely different from those ancient secrets of history, which are only now beginning to be unveiled thanks to the advanced tools of modern cryptologists. And finally, about how closely the darkest of the secrets of the Shakespearean era are connected with the omissions of science around the texts of Ancient Egypt...
To clearly illustrate the significant process currently unfolding in the field of historical science under the influence of cryptologists and their achievements, it's useful to employ a method of parallel comparisons. In other words, in the chronology of changes happening now, two streams of events are chosen for comparison, which at first glance seem completely unrelated to each other.
As events unfold, however, and thanks to simultaneous discoveries in both streams, previously hidden connections become increasingly evident. In other words, not only are the very deep interrelations between the mysteries of history and cryptography visible, but also the fact that what previously seemed like two very different, parallel streams of events actually reflect the same process – just from two different sides. Once this is understood, the streams merge, and the whole picture becomes more comprehensive, incidentally opening up opportunities for even more remarkable scientific discoveries...
What are these historical-cryptological streams and where do they originate and flow to? Although the history of each of these lines goes significantly deeper into the past, for the sake of brevity, their comparative chronology here is conveniently started from the first months of 2020.
This is convenient for two main reasons. Firstly, in February 2020, the journal Cryptologia hosted an article announcing the DECRYPT project [o2] to the cryptography-interested public. This project was initiated by enthusiast researchers from Sweden, Hungary, Germany, Spain, and other countries, who combined their efforts based on open computer technologies to decrypt the vast amount of historical documents that are still stored in archives and library collections in an encrypted, i.e., inaccessible for study, form.
Secondly, on a much less known website, kiwi arXiv, in that same February 2020, a large analytical article "Total Hagelin, or Finita la commedia" [i2] was published. This material was also dedicated to ciphers and their decryption, naturally, but in the context of entirely different, much more modern affairs. Such as the big business of commercial cipher machines, serious spy operations around the artificial weakening of these cipher devices, and the grand deception of global scale directly associated with these tricks, affecting over a hundred states on the planet.
At the core of this greatest espionage deception of the 20th century were two individuals. One was the Swedish-Swiss entrepreneur Boris Hagelin, the founder and owner of the world's largest manufacturer of encryption machines, Crypto AG. The other was the American cryptographer and spy, William Friedman, previously widely known as the "father of scientific cryptology" and, as it has now suddenly emerged, also the very intelligence officer who recruited Hagelin. As a result, Crypto AG, "as reliable as Swiss watches and banks," secretly provided U.S. and West German intelligence services with very convenient access to the encrypted correspondence of a vast number of states that mass-purchased Hagelin devices throughout its history…
By the end of that same year, specifically in November 2020, a substantially different kind of publication on the topic of ciphers and their decryption appeared on the kiwi arXiv website [i3] — an article about General François Cartier and his notable book "The Problem of Cryptography and History". The special significance of this book lies in the fact that it was written and published quite some time ago [o3], in 1938, but until the present day, any mention of it in the academic community has been strictly taboo.
The reason for such an odd taboo is essentially General Cartier's professional integrity. As a highly authoritative French army cryptographer general, who admittedly had absolutely no connection to literature and history but encountered a significant cryptographic mystery in historical-literary texts, he did something "truly outrageous" and forbidden.
Firstly, General Cartier, acting as an experienced professional expert, unequivocally confirmed the authenticity of secret messages found and decrypted in ancient printed books from the Shakespearean era. Secondly, in his book, Cartier published a large selection of these decrypted messages, collectively titled "Bacon's life as he tells it in the biliteral cipher". And thirdly, Cartier's book thoroughly and in detail, with real examples from ancient books, explains how anyone interested can engage in decrypting secret messages from the Shakespearean era.
But what could be "outrageous and forbidden" about this for modern science? Quite a lot, actually. Starting with the fact that in his encrypted autobiography, Francis Bacon describes himself as the secret son of Queen Elizabeth, and thus the legitimate heir to the English throne. And ending with the revelation that Bacon, according to the decrypted texts, turns out to be the true author of all works attributed to Shakespeare. Not to mention his secret authorship of a whole series of other masterpieces that celebrated the literature of the Elizabethan era through such famous authors as Spenser, Greene, Marlowe, Burton, and Peele.
General Cartier in his book particularly emphasized that he does not possess other equally reliable documents and evidence to confirm such uncomfortable testimonies for historians from the decrypted texts of the 16th and 17th centuries. But the fact that these testimonies indeed exist in the books; that they are signed with Bacon's name and encrypted with Bacon's biliteral cipher; and finally, that these messages have been largely correctly decrypted, was confirmed by this most experienced military cryptographer with all responsibility.
Hence, the scientific community, having no way to convincingly refute the facts and arguments of the general, chose to simply ignore his work. And to impose the strictest taboo even on any mention of such an inconvenient book for the scientific consensus by François Cartier.
In the fall of 2020, however, this long-forgotten book somehow miraculously "resurfaced" on the kiwi arXiv investigation site [i3], providing materials for a new interesting investigation as well as for the general acquaintance of contemporary readers with the decrypted mysteries of history. That is, with documentary stories not only about the secrets of the life and works of Francis Bacon but also about the hidden pages of the entire English history during the reign of Queen Elizabeth that remain concealed to this day.
Understandably, the theme of this and subsequent publications about General Cartier's book was already quite clearly linked with the materials on the kiwi arXiv site about ciphers to the goals and work of the international DECRYPT project. An additional signal reflecting the interconnection of the two independent streams was that it was then, at the end of 2020, a print, November-December issue of the Cryptologia journal (volume 44 no 6) was released with the article by enthusiast scientists about the launch of their open historical-cryptographic project DECRYPT, announced earlier in the year. [o2]
About half a year later, in March 2021, one of the active participants of the DECRYPT project, named George Lasry (a French computer scientist working in the Israeli branch of Google corporation), became particularly interested in a new publication on the site of crypto-historical puzzles, Cryptiana. This website is maintained by Japanese physicist Satoshi Tomokiyo, who in his free time enthusiastically searches for and analyzes historical ciphers in the archives of national libraries.
Tomokiyo posts his findings on the Cryptiana site in the "unsolved" section. One of such recent finds, which attracted special attention from George Lasry, was discovered by the Japanese colleague in the archival collections of the BNF, the National Library of France. In the BNF catalog, this bundle of documents was simply marked as "encrypted messages" and was stored among letters related to France's foreign affairs with Italy in the first half of the 16th century. Nothing more could be said about these messages, as not only the sender or recipient of the letters was unknown, but even the language in which the texts were written was not known.
After some time, the preliminary results of the joint computer cryptoanalysis by the scientists will show that this next encrypted mystery of history leads Lasry and Tomokiyo to a really great, seemingly, discovery. However, their discovery will occur somewhat later.
Meanwhile, in the same month of March 2021, a publication of another episode [i4] from a completely different crypto-historical investigation appeared on the kiwi arXiv site – in the form of the article "Bacon, Shakespeare, and General Cartier's Book". Although here the investigation was not so much concerned with the mysteries of historical ciphers (since in this case they were already well known and long decrypted) as with analyzing the circumstances around the scientific taboo on the obtained decryptions, interesting discoveries happened in this direction as well.
The most important tool, with the help of which the community of Shakespeare scholars "cancelled and forgot" such an inconvenient book by the French general-cryptographer, was another important monograph. Promptly prepared soon after Cartier's death by completely different authoritative cryptographers from the USA and published in 1957 under the title "The Shakespearean Ciphers Examined" [o4].
Taking advantage of the fact that the deceased general could no longer respond to their attack, the authors of this monograph categorically rejected all of Cartier's conclusions, constructing their own system of "scientific-cryptographic proofs." Essentially based on the claim that the authors of "The Shakespearean Ciphers Examined" – as highly experienced professionals of the state cryptanalytic service – did not see any cases of Baconian ciphers being used in ancient printed books at all.
The authors of such a notable expert book – still first and foremost cited in any debates about cryptographic proofs in the texts of Shakespeare – are interesting for our story for several reasons. Firstly, the main author of the monograph was William F. Friedman, already known to us as the "father of American cryptology" and "father of the greatest crypto-deception of the century" (another co-author was his wife Elizebeth Smith Friedman, also a celebrated state cryptographer).
Secondly, the cryptographer couple prepared this work for publication in 1955-57, precisely the same period when William F. Friedman, on behalf of the NSA and CIA, made multiple visits to Switzerland to arrange the secret mutually beneficial deal with Boris Hagelin. Because it is from there that the cryptographic grand-deception named "Crypto AG cipher machines" began.
Thirdly – and this is one of the most important discoveries of the investigation "Bacon, Shakespeare, and General Cartier's Book" – the Friedman couple in their early youth did not simply transition into major state cryptology from a private research project entirely dedicated to Bacon's ciphers in Elizabethan-era books (which was previously known). Moreover, as documents from 1916 now emerging from old archives attest, William Friedman personally prepared educational materials and tests that helped novices identify and decrypt the Baconian cipher in ancient books. And philologist Elizebeth Smith (then not yet Friedman) for her employment in interesting cryptographic work successfully solved these control tests, independently decrypting Bacon's secret messages in the texts of Shakespeare's First Folio…
Throughout the following months of 2021-22, in the parallel investigations of two independent projects, numerous new crypto-historical discoveries were made.
In particular, when Lasry and Tomokiyo discovered that the original texts of the messages were written in Old French, they enlisted the help of a third experienced colleague-cryptanalyst, German pianist and music historian Norbert Biermann, who had repeatedly dealt with the librettos of ancient French operas in his main job at the Berlin University of the Arts.
In the early stages of deciphering the cipher, researchers were able to establish that the letters were written by a woman in captivity, concerned about the fate of her son. When the name Walsingham, clearly related to the activities of Francis Walsingham, head of intelligence and minister in the Cabinet of Queen Elizabeth of England, appeared among the gradually decrypted words, analysts realized their hopes were justified, and they had discovered a genuine treasure.
Unknown to all, the BNF archive contained encrypted letters of Mary Stuart, Queen of Scots, and mother of James I, the future king of England and Scotland, united under his crown. Moreover, there turned out to be many such letters – after additional searches, over fifty with a total volume of about 50,000 words. In other words, a whole volume of previously unknown documents from the personal secret correspondence of Mary Stuart during the period 1578-84, when she was held captive by Queen Elizabeth, and several years before her execution on charges of conspiracy.
In the texts of Bacon's secret biography, published at the same time on the kiwi arXiv website, completely independently and unbeknownst to the Decrypt project, there is also a chapter on Elizabeth's enmity with Mary Stuart, her trial, and her execution. Here too, it mentions that Walsingham's spies intercepted and copied the encrypted letters of the Scottish queen, and Elizabeth asked Bacon to decrypt them (which he failed to do, citing the complexity of the cipher and the absence of a key).
For the Decrypt project's cryptanalysts, who had at their disposal not only a large array of letter data but also powerful computer support for their processing, the absence of a key did not pose any hindrance. According to the researchers, the main part of the time spent on analysis and decryption was devoted to the meticulous digitization of handwritten texts, containing a great number of exotic-looking symbols in a polyalphabetic cipher, incomprehensible to automatic recognition programs.
February and March 2023 became, one might say, a time of triumph and glory for the Decrypt project's cryptanalysts. The journal Cryptologia entirely dedicated its special issue to the extensive article by Lasry, Tomokiyo, and Biermann [o5] on the complete decryption of Mary Stuart's "lost" letters. The journal's editor-in-chief, Craig Bauer, as an introduction to their impressive work, published the article "The New Golden Age of Decipherment" [o6], providing an expanded overview of the current successes and prospects in the field of enthusiasts engaged in the computerized opening of historical ciphers.
Since the cryptanalytic work of Lasry and colleagues genuinely provided historians with a whole complex of important and previously unknown documents from the Elizabethan era, practically all reputable media outlets wrote about this discovery. [o7]
However, during the same period, other significant crypto-historical events also occurred, which remained virtually unnoticed by the mass media.
At the end of February or the beginning of March 2023 (the exact date is difficult to establish), a remarkable change occurred on the website of the Folger Shakespeare Library. This most famous library, which houses the largest collection of over 80 volumes of Shakespeare's First Folio from 1623, plus a rich collection of Bacon's and other Elizabethan authors' lifeworks, had formulated its position on the debates about the real author of Shakespeare's works in such interesting phrases [i5]:
The Folger has been a major location for research into the authorship question and welcomes scholars looking for new evidence that sheds light on the plays’ origins. How this particular man — or anyone, for that matter — could have produced such an astounding body of works is one of the great mysteries.
If the current consensus on the authorship of the plays and poems is ever overturned, it will be because new and extraordinary evidence is discovered. The Folger Shakespeare Library is the most likely place for such an unlikely discovery.
Now, essentially synchronously with the publication of the cryptanalysts' major discovery in the journal Cryptologia, all this text about the "most likely place" for the discovery of "extraordinary evidence" of new authorship quietly and tracelessly disappeared from the Folger Library's website. Without any explanation…
And around the same time, at the beginning of 2023, a new book on the origins, key figures, and early successes of U.S. military-intelligence cryptography was very quietly released: "From the Ground Up: American Cryptology during World War I" [o8]. Although the book had a very reputable publisher, the Center for Cryptologic History of the NSA, and the author was the well-known crypto-historical researcher Betsy R. Smoot, for all mass media, however, this voluminous monograph seemed as if it hadn't appeared at all. That is, it was practically not reported anywhere, by anyone, in any way (except, perhaps, for the journal Cryptologia, which professionally tracks all such matters).
Sufficiently clear explanations for what's happening and how closely these two quiet-unnoticed events might be related emerged in the fall of 2023. In a pair of synchronous and independent publications – about the Decrypt project and the investigations on kiwi arXiv.
In the early days of September 2023, an article titled "History Science as an Art of Cutting Out" [i6] appeared on the kiwi arXiv site, detailing the essence and importance of the new book by NSA historian Betsy R. Smoot. The essence of "From the Ground Up..." lies primarily in a significant reassessment of the contributions of the outstanding cryptographers we already know about. As a result, the "great deceiver" William F. Friedman has now lost his honorary title of "father of American cryptology," while General Cartier, on the contrary, is depicted as one of the main and respected mentors of early U.S. military cryptology.
The significance of Smoot's monograph for the field of historical ciphers boils down to the fact that modern Shakespeare studies can no longer rely on the Friedman couple's book as any serious argument in debates about cryptographic proofs of authorship. Because their book "The Shakespearean Ciphers Examined" represents a provably deceptive fabrication. On the other hand, Shakespeare scholars and all other truth-seekers now have again for study and analysis the book by the authoritative professional, General Cartier. It presents powerful and verifiably checkable cryptographic evidence indicating Bacon as the genuine author of Shakespeare's works…
A couple of weeks later, in the same September 2023, the well-known science-popular weekly New Scientist [o9] devoted its extensive review article to the crypto-historical successes of activists in the international Decrypt project. Thus, this story was not only – and not so much – about the recent sensation of deciphering the long-lost letters of the Scottish queen, but also about other successes and expanding plans of the project.
For example, there's the extensive work organized by linguist Beata Megyesi on deciphering a considerable collection of encrypted letters from the Vatican Library's archives. Or the story about the powerful cryptographic analysis computer program CrypTool 2, created by Nils Kopal, which at least partially allows for the automatic breaking of ciphers. Or about another team of computer scientists, led by Alicia Fornés, testing and training various AI systems with the aim of finding the optimal tool for automatic text recognition in ancient manuscripts and ciphers.
In short, by comparing this pair of synchronous publications, it's already possible to see that two previously parallel and completely independent streams of crypto-historical research have nearly merged into a single flow... The matter here is almost complete.
For the Decrypt project activists, it would be enough just to pay attention to the guidebook by General Cartier [o3] and the already accumulated collection at the Folger Shakespeare Library of all the necessary 16th-17th-century books and documents hiding not only "extraordinary evidence" in establishing the true author behind the mask of S., but much more than that. A secret and still unknown to science history of the Elizabethan era, written and encrypted personally by Francis Bacon.
Moreover, the work on fully revealing and newly deciphering the secret Baconian messages is necessary and useful not only for history but also for another very important cause.
What's meant here under another useful necessity is just three short words: lifting the taboo.
Or, to put it a bit more elaborately, lifting the great taboo on the knowledge of who we are...
But this will happen gradually.
Aside from restoring important pages of real history, it's precisely the crypto-analytic enthusiasts with their open computer toolset who can lift another, quite strange but persistently maintained taboo to this day. This taboo forbids both historians of philosophy or Shakespeare scholars, on one hand, and historians of cryptography on the other, from dealing with the true picture of the origin of the "Riverbank Acoustical Laboratories," which continue to exist to the present day.
The only field of science that this taboo did not extend to was acoustics. So, it was exclusively thanks to physicists that the remarkable story of how millionaire and patron George Fabyan, who introduced the Friedmans to cryptography at his "estate-institute" Riverbank in 1916, also created there the best acoustical laboratory in the USA at that time for reproducing the amazing phenomenon of levitation with sound. A phenomenon Fabyan learned about from the decrypted texts of Francis Bacon, describing the secret experiments of the Rosicrucians with nature... [i7]
For some very mysterious reasons, never explained by anyone, the decrypted Bacon's information about these secret Rosicrucian experiments remains unpublished to this day and is essentially completely lost. That is, there is absolutely nothing about it either in the books by Elizabeth Gallup, who first told of the Bacon cipher she had uncovered, nor in Riverbank's publications about Baconian ciphers, nor in François Cartier's book, based on Gallup's decryptions that he received from Fabyan.
In other words, thanks to the memoirs of acoustic physicists – and the preserved model of the (non-functioning) acoustic levitator at Riverbank – we definitively know the fact that texts by Bacon on this matter existed for Gallup and Fabyan for sure. But it's equally certain that none of such decryptions were published for some reason. Nor were there any indications of which ancient books researchers could independently find this information in.
There were no direct and explicit indicators, it must be emphasized. But if one analyzes the material carefully, implicit indicators can indeed be found.
Both in the publications by Elizabeth Gallup and especially in the detailed monograph by General Cartier, where a list of forty books printed during Bacon's time and containing his encrypted messages is meticulously enumerated, one can identify a very interesting detail.
In the decrypted texts of Bacon, there are repeatedly fragments where he lists fellow literati who agreed, for a fee, to publish under their own names those of Bacon's works which it was either unseemly or simply dangerous for the author himself to print. Among these well-known literati, who became "masks" for Bacon, especially in the early period of his work, the names of Spenser, Burton, Greene, Peele, and Marlowe are mentioned.
Almost all of these authors also appear in Cartier's list of 40 books, on the pages of which — usually in texts printed in italic — Bacon's secret messages are embedded in cipher, communicating both the name of the true author and fragments of his biography. The words "almost all of these authors" imply the absence of only one notable name from the list —Christopher Marlowe.
The exceedingly intricate and colorful biography of this bright individual — a playwright and adventurer, spy, and occultist, who was killed under extremely mysterious circumstances at the age of 29 — continues to attract the keen interest of historical researchers. Now, to the numerous mysteries surrounding the life of Christopher Marlowe, one can confidently add another unsolved mystery, a cryptographic one.
Because if Francis Bacon himself informs in his biography that Marlowe published Bacon's texts under his own name, then such book(s) must certainly contain secret messages from the true author. If we consider that among the accusations leveled against Marlowe by the authorities was his involvement in some secret occult society experimenting with magic, then truth seekers only need to connect the dots identified here.
In other words, cryptanalyst historians have clear facts indicating that Marlowe and Bacon were involved in common literary-dramatic affairs, that both were engaged in magical experiments with nature, and that Bacon described these experiments in encrypted texts of one or several books published under other names. There are also other facts according to which works published in the 20th century about decrypted messages of Bacon talk about almost everything – except for Bacon's magical experiments with nature. And at the same time, there is nothing about Marlowe's books...
One of the main features of the "new golden age of decipherment" that has now arrived is the powerful computer tools available to modern researchers. In the context of the task described here – when the analysis and decryption need to be done not on a handwritten cipher but on a text printed in typography – systems based on artificial intelligence with neural networks, trained for image recognition tasks, are practically ideal for decryption tasks.
Such systems have long and convincingly outperformed humans in identifying subtle features and differences in roughly similar images. And interestingly, this ability is the main factor for the effective detection and easy subsequent decryption of Bacon's biliteral cipher.
For these reasons, as soon as researchers from the Decrypt project pay attention to the "Problem of Cryptography and History" long indicated by General Cartier but still considered a taboo topic in science, interesting and significant changes will begin to occur immediately.
For modern cryptanalysts and their AI computer systems, it will not be particularly difficult to reproduce and confirm already known decryptions of secret Baconian messages. Most importantly – even if it might be somewhat more challenging – they will also be able to find and decrypt those texts of Bacon that have never been published and remain unknown to this day.
Given that all this knowledge is still in a status of being "forbidden," the outcomes of this fully open work – in the style of Decrypt – will, in any case, present very big surprises to the scientific community.
Reaching the final part of this story, it's time to remember where the narrative began and to pose a natural question: But what is the connection between the complete decryption of Baconian messages in ancient books and the secrets of Ancient Egypt that are still hidden today?
The connection here is direct and immediate.
The book "4in1" [i8], which compiled the main materials of a large investigation around the encrypted secrets in the biographies of Bacon and Shakespeare, the taboo on Cartier's book, and the secrets of the NSA's crypto-service, began with the following lines:
In the foundations of cryptography as a solid scientific computer-mathematical discipline there lies a big Mystery of the occult-mystical sense. By a long-standing tradition, it is forbidden to talk about this Mystery. But by whom it is forbidden and on what grounds, actually, no one knows…
And this book ends with the acknowledgment that it was not possible to unveil this great Mystery during the investigation, alas.
Now, as one delves deeper into the materials of this highly intricate, murky, and deliberately hidden history, one thing becomes increasingly clear.
Decrypted among all other hieroglyphic texts, the "The Chapter Of Knowing All The “Chapters Of Ascension to the Light” In A Single Chapter" (also known as Chapter 64 of the ancient Egyptian Book of the Dead) was immediately, in effect, hidden from the people. Because it revealed the great and wondrous mystery of our true nature. Of the human as "the divine hidden soul, who createth the gods, and who giveth celestial meals to the divine hidden beings".
Decrypted among all the chapters of Bacon's secret autobiography, the chapter on the Rosicrucians' magical experiments with nature was also immediately, in effect, hidden from the people. Because this chapter too unveiled a great and wondrous mystery about the real – literally superhuman – capabilities of Humanity.
In other words, the main Gnostic mystery of the ancient Egyptians and the main mystery at the foundation of the science of cryptography, which allows the extraction of knowledge from historical documents through strict mathematical methods, are in fact the same Mystery.
And today – in this new golden age of decipherment – humanity and its science already possess everything necessary and sufficient to fully access the Knowledge hidden by this ancient mystery. [i9]
All that remains is to dare to do so...
Additional Reading
[i1] For details about "The Chapter Of Knowing All The “Chapters Of Ascension to the Light” In A Single Chapter" and the unusual story of its discovery by the ancient Egyptians, see the text: TZO_Chapter 64 (rus.). For discussion on modern science's avoidance of this Chapter, see the text on Thoth's Mathematics (rus.).
[i2] Total Hagelin, or Finita la commedia (February 2020, rus.)
[i3] General Cartier, "The Problem of Cryptography and History" (November 2020, rus.)
[i4] Bacon, Shakespeare, and General Cartier's Book (March 2021, rus.)
[i5] Undermining the authorities' credibility and Shakespeare as "Our Everything"
[i6] History Science as an Art of Cutting Out. See also the text Bacon, Shakespeare, and the NSA's "Cut the Ends!" Reflex
[i7] Bacon, Rosicrucians and Levitation (rus.)
[i8] 4in1: Mask of Shakespeare, Mysteries of Bacon, Book by Cartier, Secrets of the NSA (rus.)
[i9] Cryptography as a Universal Model for Science (rus.); CIA, The Mystery of 25th page and The Universe as a Hologram (rus.)
Main Sources
[o1] Age Of Decipherment. By Blanchard Hiatt. Cryptologia (1977), Vol 1 — Issue 2, pp 101-105, DOI: 10.1080/0161-117791832841
[o2] Decryption of historical manuscripts: the DECRYPT project. By Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker & Michelle Waldispühl. Cryptologia (2020), 44(6), pp. 545-559, DOI: 10.1080/01611194.2020.1716410
[o3] François Cartier, Un problème de Cryptographie et d’Histoire. Paris: Editions du Mercure de France, 1938
[o4] Friedman, William F. & Elizebeth S., The Shakespearean Ciphers Examined. Cambridge: Cambridge University Press, 1957
[o5] George Lasry, Norbert Biermann & Satoshi Tomokiyo. Deciphering Mary Stuart’s lost letters from 1578-1584. Cryptologia, Volume 47, 2023 — Issue 2, pp. 101-202. DOI: 10.1080/01611194.2022.2160677
[o6] Craig P. Bauer. The new golden age of decipherment. Cryptologia, Volume 47, 2023 — Issue 2. pp. 97-100. DOI: 10.1080/01611194.2023.2170158
[o7] See, for example, publications Scientific American; Smithsonian Magazine; The Guardian; Ars Technica; History Today
[o8] Betsy Rohaly Smoot. From the Ground Up: American Cryptology during World War I. Ft. George G. Meade, MD: National Security Agency, Center for Cryptologic History, 2023
[o9] How scientists are cracking historical codes to reveal lost secrets. By Joshua Howgego. New Scientist, 18 September 2023