Hermeticulture

Exploring the intersection of magic, culture, spirituality, and humanity

Page 6 of 7

On Ritual Purity

Whenever I hear magicians talking about spirit evocation, particularly from a grimoiric standpoint, there is inevitably a discussion of ritual purity.  I always find myself a bit surprised by the degree of ritual purity a number of other magicians observe, because I have had positive and effective results while doing very little in that regard:  my purity routine for ritual generally involves little more than bathing/showering while saying the Asperges Me.  I have my own take on ritual purity as a result, which seems to differ from that of a number of other practitioners.

I’ve often heard magicians express the viewpoint that ritual bathing is necessary because our natural smell is offensive to the spirits.  I find that this notion ignores a key bit of history.  While bathing was much more common in medieval Europe than popular culture leads us to believe (bathhouses were plentiful and often frequented), the general hygiene of the populace was still less well-maintained than it is in our present day of private showers.  As late as 1558, deodorant was still considered the realm of magic, as we can see from della Porta’s Magia Naturalis where he gives a method “to correct the ill scent of the Arm-pits” (Book 9, Ch. XXVIII).  I strongly doubt that many of us in the industrialized world today smell offensive compared to the average medieval European, so from a logical standpoint the argument that ritual bathing is necessary to avoid offending the spirits with our human stench holds little water for me when applied to the modern day.

The other two big elements of ritual purity I generally hear about are fasting and sexual abstinence.  Early on in my practice, one might say that I observed fasting fastidiously.  But I found it more distracting than I did helpful, so I ultimately abandoned the practice.  My focus and concentration during ritual, and therefore the quality and efficacy of my magic, increased as a result.  Asceticism in general has never resonated with me, and I’ve never personally found much value in it.

Similarly, I find that a lot of the prescriptions for sexual abstinence derive from an Augustinian, sex-negative cultural lens that equates abstinence with saintliness.  Sexual abstinence may also have been related to the aforementioned hygiene considerations.  It also appears to operate on the tacit principle that the continence of sexual energy can be channelled into the efficacy of one’s magic, which may be true for some but has always felt like an entirely separate and unrelated energy for me.  Again, that sort of asceticism may do it for some, but it doesn’t do it for me.  I find it unnecessary at best, and counterproductive to my practice at worst.  I’ve never experienced my conjuring work to be ineffective as a result.

I also don’t much hold to the idea of following grimoires to the letter.  While the rubrics have long histories in some cases, we must keep in mind that the grimoires were originally the working journals of magicians.  They may have been using recipes passed down to them, or they may have been creating their own, but I find inherent in the idea of magic itself is the act of creation and creativity.  As a result, I look at the rubric from a functional standpoint rather than one of orthopraxy, and I substitute and adapt to fit what resonates best with me.

Generally speaking, rather than drawing a circle I’ll perform the LBRP, and follow it up with asperging the quarters with water and censing them with incense after the Golden Dawn style.  Occasionally I’ll use my sword to trace a physical circle, but I tend to find it unnecessary.  And that’s all the preamble I generally use before the starting invocation.  I use a standard license to depart.  I’ve never particularly seen the need for more than that.

One caveat here is that thus far I’ve only communicated with deities and with the planetary spirits and archangels.  I can’t speak to other classes of spirits and their own preferences, and if I find myself impaired in my work at some point I may ultimately experiment with ritual purity after I rule out other factors.  But thus far, freeing myself of the shackles of prescriptive asceticism has been nothing but positive to my own practice.

Bottom line: If it works, use it.  If you don’t need more than that, why overcomplicate things?  If the grimoiric prescriptions for ritual purity work for you, I wish you well and encourage you to keep doing what you’re doing.  But if they don’t resonate with you, if you find them more of an impediment than an enhancement to your practice, I encourage you to start scaling back and experimenting with whether those elements are truly necessary or whether they prove a hindrance to you like they did to me.

Communication with the Spirits: A Guide for the Perplexed

In the world of magic, there are fewer things more divisive it seems than the ideas around invocation/evocation of spirits and what it means to interact with them.  This isn’t a matter of any small or trivial difficulty, even for those who have experienced such phenomena themselves.  The difficulty is even greater for those who have not achieved such communication, and who are often left wondering what exactly they should expect or how things are supposed to work.  As with many things in magic, nothing is going to look exactly the same from one practitioner to the next, and our current subject is no different.  While I can only provide my own perspective on the issue, I am doing so in the hopes that it can clear a bit of the confusion around the topic and bring practitioners (and aspiring practitioners!) together with some more productive dialogue.
Much of the perplexity seems to surround exactly what should be expected in terms of the encounter with the spirits.  Joseph Lisiewski famously put forward the idea that evoked spirits must be conjured to physical manifestation, which has probably done more to provoke doubt and contribute to imposter syndrome among magicians who work with such spirits than any other statement in the past century.
The simple fact is, the vast majority of people who work with spirits, no matter how intimately, do not experience them as physical manifestations.  Much like the person who looks into magic expecting to figure out how to teleport and hurl fireballs, one who begins working with spirits anticipating that they will appear in a grandiose poof! of smoke and celestial light will very quickly find themselves disappointed.
And this, dear reader, is why I am writing today:  to help dispel some of those faulty beliefs and expectations that we all inherit over the course of our lives, and to encourage you to live the magical life you want to be living.

My Backstory

For a long time I thought that I was a “squib”, incapable of scrying with any meaningful success.  Like John Dee, I could be the magical operator in such a working, but felt that in order to make any progress with spirit work I would need to find a talented scryer to work with if I were to see any results from it.  Then I had some encounters that were too intense to ignore–and it not only gave me a new understanding of what it meant to converse with spirits, but also showed me that many of my previous assumptions about the nature of that conversation were utterly incorrect.  Moreover, I came to recognize that I had already been experiencing the spirits, but had failed to recognize it at the time because of my self-imposed conceptual blinders.
The greatest irony of all is that it was precisely such an experience, back when I was 12 years old, that ultimately led me to the path I walk today.  The way that I have described the experience ever since is that it was like being hit upside the head with a brick wrapped in velvet.  I experienced a thought in my head that not only was not my own, but came into my head all at once, fully formed, rather than word by word as my own thoughts are generally produced.  To quote Philip K. Dick, speaking of his own life-changing experience, it was as if “my mind was invaded by a transcendentally rational mind”.  The message brought peace and clarity in a moment when I felt in crisis.  Not only was the thought not my own; but whatever its source, it seemed to be benevolent and caring.  At the time I believed it was the voice of God that I was hearing.  My desire to understand what happened to me, and even more so my desire to achieve that communication again, led me to make a lifelong study of religion and mysticism, and to tread down the magical path as soon as I discovered that it existed.
You might think that having had that encounter once I would experience it again in short order, but I didn’t.  Not until twenty-seven years had passed, more than 25 of which were spent in the pursuit of magic.  But I don’t claim that my results are typical.  I had to spend a long time wandering in the dark before I realized that a lot of my benightedness was self-inflicted.  And that didn’t happen for me until I had another encounter–one that felt less like a velvet-wrapped brick and more like a nuclear warhead.
I never said that I was the most perceptive person, and apparently it takes rather a lot to get my attention.  Oops.
Over the past several years, I’ve had a number of very successful scrying sessions, as well as some more spontaneous contacts with the gods and spirits–which leads me to believe that my previous issues were less to do with my own innate capabilities (or lack thereof), and more to do with faulty beliefs and expectations leading me not to try my hand at actually doing the thing and being persistent at it.  
It was only after my nuclear wake-up call (and an embarrassingly long amount of time after that, I might add) that I started to realize I did have spirit contact before that.  I just didn’t recognize it, because I didn’t understand that those interactions generally happen inside your own head and can sometimes feel more like a part of you than something external.  Of course, at the time I was still working within the confines of the Golden Dawn system, which intrinsically puts the magical contact on rails in order to make it safer by confining it to a specific form in order to introduce budding magicians more gradually to the things they will experience once they step out on their own as Adepts and begin to do more advanced workings solo.  But I did notice that, especially after my Adeptus Minor initiation, things started to feel different.  When I was assuming the godform of a temple office, I would connect with it emotively in ways that felt new and curious to me.  I allowed the feelings to guide my voice, informing the tones and facial expressions and other mannerisms that I adopted in speaking my ritual parts.  It just felt right.  And while I heard no voices and saw no visions during those times, I’ve come to recognize since that those connections I had with the godforms were real contacts.  I simply didn’t realize it at the time, because I’m so used to verbal communication that it didn’t occur to me that spirit communication can also be emotive and nonverbal.  And the middle of a scripted ceremony isn’t an especially inviting context in which to have a two-way conversation.  Gotta read those lines, after all, and the ritual isn’t any more conducive to communication between a magician and a spirit than it is to side-chatter between the various ritual participants.
So while much is made of visions and voices, there’s more to it than just that.  Communication can very easily (perhaps more easily) be emotive or otherwise nonverbal as well.  But what of the visions and the voices?

Spirit Communication:  How It Works for Me

As I’ve already recounted, one way that spirits can communicate is emotively:  via emotional impressions directly upon the psyche.  We can call this clairsentience, or the ability to feel that communication on an emotive or affective level.
Generally speaking, however, I experience the spirits in visions and/or voices.  As with emotive communication, one of the greatest points of confusion is that those who have written about such experiences have not been especially detailed about what this experience is actually like.  Consequently, people who are new to spirit conjure may assume that a spirit will appear to the physical apparatus of their eyes, like a concrete object.  Or they may assume that the voice of a spirit will sound much like the voice of another person in the room with them.  This may happen in some instances for some people, but it has not been my experience; nor have I encountered any other spirit workers describing it as theirs to the best of my recollection.
We may term the seeing of visions clairvoyance if we so choose.  The distinction between a daydream and a vision is a fine one when describing the difference in how the two work; but when I experience a vision, I generally find that I am not the one in the driver’s seat.  Instead I’m viewing a tableau unfolding in my head, consistent with the nature of the spirit that I am conjuring.  Sometimes it is a static image, sometimes it is a moving one; but when the image moves, it does so of its own accord–not mine.  I am cognizant of what I am seeing, I can shift my focus from one portion of the image to another, but the way it unfolds is much like a (non-lucid) dream in that I appear to have little conscious agency in the process.
Similarly for voices.  When I hear the voice of a spirit, it takes place entirely within my head.  We can call this clairaudience.  Studies have shown that there are some people who don’t have internal monologues, but I am not one of them.  My internal monologue is constant.  As a result, I have a pretty good handle on what “my” internal voice sounds like, in the same way that other people can recognize me by the sound of my voice.  When I have the voice of a spirit inside my head, however, it is not that same voice.  It “sounds” different, for lack of a better word.  Additionally, those messages generally tend to enter my head fully-formed, whereas my internal monologue is created word by word as I think to myself in phrases and sentences.  To borrow a term from computer science, my internal monologue is processed in serial, one word or piece of data after another; whereas the voices of the spirits almost always come to me in a manner that feels more parallel, in which the various words are transmitted all at once and are received at the same time.
When I have had two-way communication with spirits, they also seem to be able to receive my thoughts telepathically in the same way that they transmit their own.  In one notable encounter with the archangel Cassiel, he answered a question that I had barely begun to formulate in my head, much less “voiced” to him.  Some spirit workers insist that spirits only respond to verbal communication, believing that it draws firmer boundaries if one chooses to speak messages aloud rather than doing so in one’s head.  There is certainly something disconcerting about having another entity inside your head; but whereas the explanation I heard for this choice was that spoken communication doesn’t allow for a spirit to “get inside your head”, I for one am unconvinced that it makes any practical difference whether one chooses to communicate verbally or telepathically with the spirits.  In any case, if you are working with an entity you do not wish to communicate as intimately with, you should have all of the requisite protections of a circle and a magical weapon and names of power at your disposal:  this should provide sufficient protection for the operator regardless of how the operator chooses to communicate from their own end, and will generally make little difference as to how the communication from the spirit itself comes across.
One thing I have noticed about both visions and voices in spirit communication is that if you poke at the message (whether the vision you are seeing or the message that the voice has spoken), it will demonstrate resiliency.  That is to say, when I am engaging in my own internal monologue, I can choose to derail that monologue in any number of different directions whenever I want.  When I receive a vision or a message, however, and look askance at it in my head and start questioning it, I will feel a push back in my direction, reasserting the original content.  This is much like pushing at a flexible membrane, feeling the equal and opposite pressure against your finger, and seeing the membrane spring back to its original form when you withdraw.  This usually feels very gentle, but definite.  During one encounter I was receiving a message which I understood was to be delivered to another person.  I recall being surprised by the wording of the message, and thought to myself, “maybe I should soften that a bit.”  To my surprise, the spirit gently poked me in the forehead with her finger as if to say “nope!” and I felt the words come again the same as before.  While the pushback isn’t generally quite that tactile in my experience, it is nonetheless a commonality.
These properties of spirit communication are very jarring at first, but I quickly grew accustomed to them–and to recognizing them as signs of a potential spirit contact, as opposed to a mere misfire of the brain.
Finally, you’ll notice I didn’t title this section “Spirit Communication: How It Works”.  I’ve spoken with enough other spirit conjurers, read enough works by them, and have listened to enough interviews with them, that I believe my experience of spirit communication is fairly typical.  That doesn’t mean others don’t experience them differently, or that my experience is somehow normative.  Moreover, atypical is not synonymous with incorrect.  Polyphanes has written before about his experiences coming predominately in taste and smell (clairgustance and clairalience, respectively) whereas he experiences little in the way of vision.  It may not be the most common method of experiencing, but it’s pretty damn cool nonetheless, and I don’t doubt his results as a magician.

A Final Note

If you haven’t yet read Polyphanes’ post “Beginner’s Practices” (also linked above), I strongly suggest you hasten to read it.  He echoes much of what I have said here, while providing some truly sage advice for people starting out–especially those who are trying to work with spirits.
Additionally, please note that just because an entity is discarnate and capable of communicating with you telepathically, that does not mean you should implicitly trust any information or advice that you may be given.  Always verify any information given, and always test the spirits.  By their fruits ye shall know them.

(This post was prompted by a conversation I had with my friend “linceoui” whom I know from the Hermetic Agora Discord server–which you should check out if you haven’t already!  Shout-out to you, and thanks for always giving me good conversations and a lot to think about.)

A Method for Cryptographic Sigil Creation

Inspired by my recent conversations with Erik ArnesonTres Henry, and Taylor Bell, I’ve been thinking a lot of late about the potential uses for cryptographic hashes in the creation of magical sigils.  After playing around with the ideas a bit and making a few false starts, I’ve developed a proof of concept to share with the wider community.

Background: What’s a Cryptographic Hash?

In the world of cryptography, a hash function is a one-way encryption operation.  This means that source data (plaintext) can be encrypted with a hash function, but once encrypted it cannot be decrypted.  This doesn’t sound especially useful at first glance, but in truth these hash functions play a vital role in the world of information security.  Because the same input will always give the same hashed output, the hash of a file or other piece of data serves as a unique signature of that input.  This has many uses in file integrity checking, authentication, and other arenas, but from a magical perspective it gives us an output which is very much like a sigil or seal, in that it provides a uniquely identifying signature which also serves as a representation in miniature of the spirit whose sigil it is.  Because the output of a cryptographic hash function uniquely represents the essence of the input (i.e. if even one bit of data in the input is changed, the resulting hash will be drastically different), we can treat a hash value as a true symbol for the underlying data and interact with it semantically at that level.

While the above may all sound good on a theoretical level, it doesn’t give you much of a feel for what a hash actually is.  Although it may sound complex, from an operator perspective taking the hash of a piece of data is very easy.  To illustrate, let’s generate an MD5 hash.  Mac and Linux users have it easy here, with the built-in md5 and md5sum commands, respectively; Windows users can make use of the certutil command or use a third-party program to perform the same function.So let’s say we’ve created a large file named data.fil, and now we want to compute the hash.  From the command line, we’ll do the following:

Mac:  md5 data.fil
Linux:  md5sum data.fil
Windows:  certutil -hashfile data.fil MD5

The output of an MD5 hash function will always be a 128-bit value, given in 32 hexadecimal characters, similar to the following: d0dcbadbba85a2e1ca7cf53d64bd7728

Easy enough, right?  Now that you know what this looks like in practice, let’s talk about how we can leverage this output in a magical operation.

Proof of Concept: Steps and Missteps

Having recognized the relationship between a hash value and a sigil, my first inclination was simply to sigillize the hash value itself.  While the hexadecimal value itself may indeed be the signature of the data it represents, I don’t find long strings of hex especially compelling from a magical-aesthetic standpoint.  Magic relies on the affective dimension of experience to connect with our non-rational minds, and visual representations of sigils are far more effective in my experience at doing this.

Fortunately, turning the hex output into a visual sigil seemed to be an easy matter.  Given that hexadecimal values use 16 characters, there appeared to be a relatively clean mapping onto the 4×4 magic square traditionally ascribed to Jupiter.  I wrote out a petition and saved it to a text file, then took the MD5 hash of the file.  When I began to draw out the sigil, however, two significant problems presented themselves.

The first problem is that while the 4×4 magic square represents a 16-value symbol set, it does so using the numerals from 1 to 16.  Hexadecimal, on the other hand, uses the values 0 to 15.  This meant that the math on the magic square that works in decimal fundamentally does not work for hex.  I considered working around the problem by reassigning 16 to 0, but ultimately this was an unsatisfying solution.  Some preliminary googling turned up no results on any prior work done to create a hexadecimal magic square, so in the interests of developing a proof of concept I set this issue aside for the time being.

As it turns out, the second problem was much more of a showstopper.  Namely, when you try to create a sigil with 32 nodes, especially in a 4×4 magic square, it turns out ugly.  There simply seems to be no way to cram in that much data visually without it turning into a jumbled mess.

That escalated quickly…

The crux of the issue here wasn’t the fundamental approach, however, but rather the sheer length of the hash value to be sigillized.  There are common hash algorithms other than MD5, but these have outputs that are even longer–I needed to go in the other direction.

My inspiration came in the form of one-time pads.  If you’ve ever used Google Authenticator for two-factor authentication, or used 2FA recovery codes, you’re already familiar with them.  The TOTP and HOTP algorithms, respectively, specify a method of generating unique codes based on two parameter values.  One of these parameters is always the “seed”, which is a hashed message.  The other parameter is either an incrementing counter in the case of HOTP, or a time value in the case of TOTP.  Most valuable for my purposes, however, was the fact that both algorithms have a default output of six decimal numbers.  This means that all of the “signature” value of the hash function is maintained (as hashing is an integral part of both OTP algorithms), while giving us a far more manageable output to work with.

While I considered using HOTP for these purposes, ultimately I decided to go with TOTP instead.  Although the intended use of both OTP algorithms is to generate multiple unique codes, for the purposes of creating a magical sigil we only need one.  This means that HOTP adds no real value to the equation, because its counter parameter is entirely superfluous to our needs.  TOTP, however, allows us the additional benefit of incorporating magical timing as an integral part of the sigil itself–which is a significant advantage, as it gives us an additional layer of meaning to incorporate into the “payload” of the final result.

Creating the Sigil

For my proof of concept I wrote out a petition to Michael and Raphael as the archangels of Tiphereth/Sol.  The text contains an invocation with the relevant divine names and with specific requests.

Next it was time to hash the text file containing the petition.  Though I had used the MD5 hashing algorithm previously because it generates the shortest commonly-used output, this time I elected to use SHA-1 as this algorithm is also utilized by the TOTP protocol and it felt more important to maintain symmetry given that the size of the hash value would not have any bearing on the size of the final OTP value.

While not a part of the TOTP protocol, when hash algorithms are used for password authentication it is common to “salt” the hash by prepending the individual’s username to the plaintext password before hashing the two together as a single unit.  This is done to mitigate against certain types of password cracking attacks, and serves to uniquely tie a password (which may be used independently by any number of people) to a specific username.  It felt meaningful to me to “salt” the hash of my petition with my magical name, which I did before taking the SHA-1 hash of the combined name and petition.  Now that I had the hex value of my hash output, I entered this as the seed value (or “shared secret”) in the TOKEN2 Paper TOTP Token Generator and was given a list of time-based OTP values.  Looking at the first entry in the list gave me the six-digit OTP for the present time, in the day and hour of the Sun:  975844.  This was a significantly more manageable output to deal with.

It turns out that in resolving my second problem, I had also eliminated the first:  while the 4×4 magic square is not natively suitable for hexadecimal, the 3×3 magic square traditionally attributed to Saturn fits the character space of the OTP output perfectly.  Note that while this square corresponds to Saturn (and I have my own reasons for finding value in this correspondence with respect to this methodology), the Saturnian connotation is not a necessary part of the method itself.  The key point is that we are utilizing a magic square which is consonant with the format of our output; any other semantic shadings are merely a potential bonus.

All that was left at this point was to draw out the sigil.  This time, I was much more satisfied with the results.

Now this is a sigil I can use.

While I primarily intended this operation as a proof of concept, rather than as a magical operation with full force of intent, I have already observed several synchronicities around the working.  Combined with the results of a divinatory reading, my preliminary expectation is that this method will prove effective.  As with anything in magic, time will tell.

Walkthrough:  Creating Your Own Cryptographic Sigil

For those of you who might want to follow this process to create your own cryptographic sigil, here’s a step by step guide.

First, create your “payload”.  This can be a written petition, as in my case; or it can be an image file, a .zip of multiple files together, or anything else you like.Next, hash the payload.  If you wish to salt the hash with your magical name or motto, as I did, you can do so easily on Mac or Linux platforms.  If you are a Windows user, this is more difficult.  If you have a plain text file, you can simply type in the name/motto at the beginning of the text file and save it (do not insert a space between the name/motto and the beginning of the text in the file).  Otherwise, I recommend skipping this step and simply hashing the file as-is.  To salt and hash the file at the same time, you can do the following:

  • Mac:  cat “MAGICAL_NAME” data.fil | shasum
  • Linux:  cat “MAGICAL NAME” data.fil | sha1sum

If you do not wish to salt the hash with your magical name/motto and want to merely hash the file itself, or if you are on Windows, use these commands:

  • Mac:  shasum data.fil
  • Linux:  sha1sum data.fil
  • Windows:  certutil -hashfile data.fil SHA1

Once you have the hash value, paste it as the “Seed” on the aforementioned TOTP generator website (be sure to click the button to change the seed format from Base32 to hex).  Provide your time zone, and generate the six-digit TOTP value.  As you will only be using a single OTP code, the step increment value does not matter for these purposes.

From there, draw out the sigil on the 3×3 magic square to complete the work.

Why I Love the Golden Dawn Tradition

 A little while ago, I wrote a post about some of the problems that I see in the present-day Golden Dawn tradition.  As I said at the time, I still hold the tradition dear to my heart even though I have issues with the temporal institutions that currently embody it.  To read my previous post, however, one might think I had nothing but criticism to offer.

This post is the other side of that coin.

For me, there is nothing else like the Golden Dawn.  Having spent about a decade doing magic in a temple setting, working through the grades and experiencing their energies and their impact in my life, it’s still difficult to imagine not working magic that way–even though I haven’t been in a working temple environment for a few years now.  While the A.’.A.’. is similar in structure, I’ve never been a fan of Crowley–though I have more empathy for him these days than I once did.  And there are various Masonic and para-masonic organizations which also share a lodge setting in common, but my journey is first and foremost a magical one.

But there is nothing that can take the place of working magic with a group of people who speak the same magical language.  Especially on an initiatory journey.  And even more so when those people become your chosen family, your brothers and sisters (and non-binary siblings!).

I love the Golden Dawn system because there is immense beauty in its complexity.  I only saw unnecessary overcomplication before I was first drawn to it, but as I learned to speak the language I began to uncover the many nested layers of symbolism in the ceremonies, like peeling away layers of an onion.  And as a system, while far from perfect, it is remarkably coherent and cohesive in its multifariousness.  To mesh layers of symbolic meaning together in harmonious and aesthetically pleasing ways is an art, and as a creator of such art I appreciate the skill and intelligence it takes to pull off such a work of creation.

It also works.  Having started down the path of self-initiation, and then an initiate of two orders, I’ve experienced the initiatory energies of the grades–in some cases multiple times.  And I can testify that the system does what it says on the tin.  It will absolutely throw your life out of balance in specifically directed ways, in order for you to overcome the challenges associated with those energies and grow as a magician and a human being by surmounting them.  Then the energies are re-balanced in the Portal Ceremony, having been equilibrated according to the formula of solve et coagula, whereupon the process starts all over again at a different valence with Adeptus Minor.  Lather, rinse, repeat.  This is the endless climb up the mountain of initiation, the journey that continues at least as long as this human life shall last.

And man, those energies will fuck your shit up.  But generally my experience is that it’s fucked my shit up in the best possible ways, at least when viewed over the long run.

Pedagogically I feel like the system is a bit of a dumpster fire by today’s educational standards, but the overall principle is still solid:  take people who want to do magic but don’t know how; give them a language and a set of tools to work with and some basic instruction; and then continue to provide guidance, peer support, and continuing education while those fledgling magicians take wing and learn to soar on their own.

On a personal note, I’m the kind of person who finds beauty in complexity.  I prefer cathedrals over natural environments.  I spent my teenage years in the Episcopal Church, so I learned to appreciate ritual and ceremony.  I conceptualize my belief system as a sort of experientially-based holographic model of reality, modelled at least in part after Thomas Kuhn’s idea of a scientific paradigm, for god’s sake.  If you’re the kind of person who prefers modern industrial aesthetics and IKEA furniture to the Victorian, or who is drawn to paths which emphasize the beauty and tranquility of simplicity, you may not find what you’re looking for here.  But if you’re like me, there’s a lot to appreciate.

Perhaps it’s just that as a person with ADHD, I need to be overwhelmed a bit by my sensory experience in order to get my rational-critical mind to shut up and let me do magic.  Like background music, it serves as a carrier wave for my focus and enables me to get in the right headspace.  And as much as I wish it weren’t the case, working in a temple environment with others helps me to be motivated, to be focused, and to be accountable–all things I frequently struggle with.

For me, at least, the Golden Dawn system is my home.  And I’m tired of being an unhomed magician.

To that end, I’m starting a Golden Dawn Minneapolis Working Group.  If you’re local to the area and want to study and/or work in the Golden Dawn system together, or if you’d like to follow the antics from afar, I look forward to seeing you there.

LVX, my siblings.  Let’s make some magic together.

Toward a Methodology for Reality Hacking

“Superstition is the tribute paid by ignorance to knowledge of which it recognises the value but does not understand the significance.”

Dion Fortune, Sane Occultism


If you have read my previous post on magic as hacking, you may find yourself persuaded by the similarities between the two activities, but asking yourself where exactly that leaves you as far as putting the information into action.  A set of techniques or processes gets us only so far as the use cases they were developed for:  continuing to slavishly rely on them in circumstances they were not intended to address seems superstitious at best (using Dion Fortune’s definition above), and potentially ineffectual or counterproductive at worst.  Nor does it help to understand what the tactics are unless you can also have some insight into where (and why) these can and should be applied.  With that in mind, I’ve been spending my time lately considering what a methodology would look like if we are to approach magic together in this way.

Why methodology?  Because without it, you’re sunk.  As a fledgling hacker, you don’t have the real-world experience to know what the paths of least resistance are likely to be, to know what techniques are likely to work, or what threads are worth pulling on and which are more trouble than they’re worth and likely to bear little in the way of fruit.  That wisdom is gained only with time and experience, and no matter how experienced one becomes there’s always more to learn.  There’s also more to forget, which is why methodologies help experienced professionals just as much as they do inexperienced novices.  It isn’t sufficient to bang blindly on the door when the person behind the door is expecting a password and a secret handshake.  You need a method, or what you’re left with is just madness.  Techniques and procedures give you tools to open the door, but in order to know how to open that door effectively you need a way of determining which tool to use in a given situation.  You need a methodology.

In order to apply that methodology, however, it all begins with intent.  This is step zero.  In the real world, criminal hackers don’t just break into systems for the thrill of it:  they have motivations and operational goals.  And while a computer’s attack surface may be finite, when you’re talking about an infinite playing field the arena is equally unbounded.  Like a threat actor, you need to be clear about what your goals are when it comes to doing a particular magical working.  While the playing field may be infinite, our human time and energy and attention is not; so this clarity of intention is necessary to provide the focus you need to start scoping out the problem you’re attempting to solve–even if that problem is messing around with some variable (e.g. astrological timing) simply for the sake of determining what you can get away with.

After you’re clear on your goals and intentions, the first phase of the work is recon.  In order to leverage a particular attack path, hackers will generally look at what tools or techniques are out there in order to achieve the goals they have in mind.  The first part of this process is surveying the field to find preexisting tools and to better understand the problem at hand.  Research may or may not be your favorite thing, but proper research can greatly enhance your understanding and thereby the efficacy of your practice.  With this in mind, research your topic.  How have others historically approached this or similar problems?  Gather together your sources of data and compare them.  What commonalities stand out?  If different people across different periods of time, and especially across diverse cultures, have used similar methods this can generally be used as a heuristic to infer that the methods have proven effective.  That said, today’s world is very different from that in previous centuries, and we cannot take this assumption for granted.

The second phase of the methodology is reverse engineering.  Assuming you have found relevant tools and techniques in your research, dive into them to better understand what makes them work.  Examine the methods and approaches, looking less at the particular forms (which are like the raw source code of a program) and instead paying attention to how they are intended to function in order to achieve the desired results.  This part of the process is what transforms the raw data of history into information, and finally into insight.  But don’t mistake this insight for understanding:  insight can be had in the realm of theory, but understanding can only come from experience.

The third phase is execution.  Now that you possess some insight into the subject matter, and have a menu of techniques to choose from, take one of those procedures and try it.  Alternatively, adapt pieces of different procedures to assemble a set of functional “code blocks” which work together in a cohesive manner to serve the intention you have in mind.

Fourth comes debrief.  Observe the results of your working.  Did you get results?  Did you find anything about the outcome surprising?  By examining your outcomes, especially with respect to anything unexpected that comes up, you can begin to identify assumptions that may be worth testing and identify threads to pull on in the future.

Finally, experiment.  Adjust your methods and/or your hypotheses, and try again.  There’s no substitute for experience, and practice makes perfect.  Consider your failures as valuable as your successes, because they provide you with opportunities for learning and growth.  Challenge your assumptions.  If your workings get results, see how far you can bend the procedures and methods without breaking the efficacy of the working itself.  Be persistent and keep trying, until you can determine with some degree of confidence that you’ve found something which works for you, or until you’ve determined that the approach you’re trying is simply not viable enough to bear further experiment.

Just like an exploit program, you can’t necessarily guarantee that everything will run smoothly the first time, even if you do everything right.  You may be looking for results, but you’re also looking for data.  And should all else fail, you still have a data point.  Again, be persistent in trying to obtain results.

Finally, this should go without saying–but once you do find something that works, let it work.  That doesn’t mean you stop experimenting, but turn your focus to a different problem.  Relegate the solved problems to the realm of play, where you can continue to make discoveries but are spending the majority of your attention on the areas that are going to gain you the most beneficial experience.

Reality Hacking Methodology

    0.  Clarify Goals & Intentions
    1.  Reconnaisance
    2.  Reverse Engineering
    3.  Execution
    4.  Debrief
    5.  Experimentation

On Magic and Hacking

We look hard
We look through
We look hard to see for real

Sisters of Mercy, “Lucretia My Reflection”

Inspired by my recent conversation with the delightful Erik Arneson, I decided to take some time and write up a more cohesive set of my thoughts on the interrelationship of magic and computer hacking.

Prefatory note:  “Hacking” is a very broad term, which covers not only intrusion into computer systems, but also their defense, engineering, and an entirely vast array of non-computer-related tinkering, making, and puzzling.  Here, however, I’m talking specifically about the offensive side of hacking:  the approach to breaking into computers and networks.

In my day job, I’m a professional computer hacker.  I work on an internal red team, which means that I’m paid by my employer to break into our own systems before criminal threat actors can do so, and serve as a sparring partner for our network defenders.  In recent years I’ve seen a great many parallels between hacking and magic, and ways in which the former can inform the latter.  In doing so, I’ve also found myself viewing magic through the lens of a hacker more and more frequently.

By and large, my experience is that most people who become magicians are drawn to it by a common set of motivations.  We are people who are drawn to understand why and how reality works, and who have glimpsed beyond the common assumptions to know that there are secrets waiting to be discovered.  Those secrets captivate us, and we want to uncover them.  We see a closed door, and we want to know what’s behind it.  When the door is closed to us, we can choose to walk away–or we can start learning how the lock works and figure out how to pick it or otherwise bypass it so we can see what’s on the other side of that door ourselves.

Hacking is no different from magic in this regard.  In both cases, we want to dig beneath the assumptions to see how things actually work, regardless of how we think they’re supposed to work.  We find threads to pull on, we explore, we investigate, we play with the puzzles.  And with a certain amount of skill and luck, we can leverage our findings to give us the ability to do things we would ordinarily be unable to do otherwise.

Hacking and magic are, at their core, both systems of control.  They are both pursuits which involve approaching a system that appears to have a consistent set of rules and behaviors, and then trying to break those rules (or otherwise circumvent them) in ways that serve to our advantage.  And in both cases, the systems that we are exploring have seemingly denied us access.  When hacking computers, these can be access controls (like not having a valid password, or not having the right permissions to get at the data we want); or they can be technical limitations, such as having to figure out how an unknown program communicates over the network so we can learn how to speak with it.  In the case of magic, we are trying to achieve goals and accomplish effects that appear to be otherwise impossible given what we understand of the world around us and how it works.  Through magic, we attempt to exert some agency and gain leverage in order to achieve our desired effects.  Similarly, hacking is also fundamentally about control.  In both cases, the universe appears to tell us “no”, and we aren’t prepared to accept that answer.  So instead we go digging, we research, we experiment, and–like the velociraptors in Jurassic Park–we test those controls which appear to lock us in place.

The key in both cases is experimentation.  You can research and study works of magic all you like, but that isn’t the same as actually doing magic.  You can read as much as you want about the offensive uses of PowerShell or Python, or how to exploit a vulnerability in a piece of software, but doing so doesn’t make you a hacker.  For both the magician and the hacker, it’s putting that knowledge into action that defines the pursuit.

Magic, like hacking, is fundamentally both an art and an experimental science.  It should be noted that when I refer to magic as a “science”, I’m using the term in the earlier sense of scientia:  a body of knowledge, experience, and expertise.  In this sense I am speaking more to the pre-20th century meaning of the word, before the influences of Karl Popper and logical positivism crept in, and before we became ensconced in an epistemology of scientific materialism.  Instead, when I use the word I’m referring the pursuit of knowledge itself.  Because the terrain in both cases is so vast, however (infinite, in the case of magic), and because magic—like hacking—isn’t merely a domain of knowledge but rather the skill of putting knowledge into action in ways that achieve a desired result, the necessity for experimentation and experiential learning is unavoidable.
Like hackers, we as magicians must make room for what Aidan Wachter refers to as “serious play”.  We must cultivate our curiosity and follow it down the rabbit hole.  Rather than being content with established methods, we should be seeking to get at the root of what makes those methods work, and see how far we can stretch and bend them until they break–teaching us in the process what our palette of options is, what shortcuts we may safely take, and ever expanding our repertoire and our experience.  This is what makes someone a true hacker, and it is equally what makes a person a true magician.

Podcast Interviews, Part Three

I recently had the pleasure of being interviewed by Erik Arneson, host of the outstanding Arnemancy podcast.  We had a delightful conversation on the relationship of magic and computer hacking, the esoteric uses of cryptography, and a great deal about the philosophical underpinnings of magic–including some of the big questions that arise when you begin to explore the nature of magic itself.

Mercifully, we did not talk about the Kybalion.

Big thanks to Erik for having me on the podcast!

Listen now:  Anything but the Kybalion

« Older posts Newer posts »

© 2025 Hermeticulture

Theme by Anders NorenUp ↑