IMG_0066.jpeg

AVATAR GOOGITEX

The legend of Avatar Googitex

Open you minds and free your souls….

The “MATRIX” is Just an Illusion

ETHER-BENDER

“The Fifth Element Avatar”

“W”

Mysterious Secrets Of The Chakras

Blog a

Posted on 11/6/25 at 13:37

We will talk about the last main bodily chakra in this blog.. so let’s dive in…

The seventh chakra, also known as the Crown Chakra, is located at the top of the head and is associated with higher consciousness, enlightenment, and connection to the divine. It represents the culmination of all the other chakras and is believed to be the gateway to spiritual awakening and a deeper understanding of oneself and the universe.

Here's a more detailed look:

  • Name: Sahasrara (Sanskrit for "thousand-petaled lotus").

  • Location: Crown of the head, within the cerebral cortex.

  • Symbol: A thousand-petaled lotus flower, representing the vastness and limitless potential of the mind.

  • Color: Violet or white, often described as a pure, ethereal light that encompasses all other colors.

  • Function: Facilitates connection to higher consciousness, spiritual awareness, and divine intelligence.

  • Associated qualities: Wisdom, enlightenment, spiritual understanding, and a sense of unity with the universe.

  • Balanced Sahasrara:Individuals experience a sense of peace, connection, and purpose, and are able to tap into their inner wisdom and intuition.

  • Unbalanced Sahasrara: Can manifest as spiritual cynicism, rigid belief systems, or a sense of disconnection from the divine.

The Sahasrara Chakra is seen as the point where the individual self merges with the universal consciousness, allowing for the realisation of one's true nature and potential

Recommendations

Posted 11/6/25 at 12:36

I have listed below a number for movies and documentaries which can be used as an example to help provide a better understanding of the concepts I have discussed in the blogs…

As it’s always great to get the information through a story like telling than a stiff scientific presentation…

@Movies:

#- The matrix movies

#- Pixel movie

#- Mortal engines movie

#- Ready player one Movie

#- Free Guy movie

#- The fifth element movie

#- Surrogates movie

#- Lord of the rings movies

#- Harry Potter movies

#- Dr strange movies

#- Total recall movie

#- 10000 BC movie

#- Apocalypto Movie

#- Braveheart movie

#- 12 years a slave

(In this movie at the end he had to get a paper to prove he is not a slave but a free man… what was that paper..!!!..I’ll leave it for you to figure out..)

#- King Arthur movie

#- A nights tale movie

#- kingdom of heavens movie

#- Eagle eye movie

#- transcendence movie

#- I Robot

#- War of the worlds movie

#- The experiment movie

#- The platform movie (Spanish)(R rated)

#- The maze runner movie

#- National treasure movies

#- Angels and demons movie

#- the De Vinci Code

#- John Carter movie

#- journey to the center of earth movie

#- stargate movies

#- kong the skull island (talks about the hollow earth theory)

#- Godzilla x kong movie ( the movie talks about the hollow earth theory)

@Series

#- Game of thrones series

It talks about a race called the white walkers (gog and Magog) coming from behind the ice wall …

*- movies to keep an eye for when it comes out….

#- John carter 2

#- I robot 2

@ Documentaries

#- The end game (by Alex John’s) documentary.

#- Alex Theroux documentaries are also good material to watch.

#- The hollow earth theory documentary

#- The secrets of the pyramids documentary

#- Research documentaries about cymatics and vibrations.

#- Research about Babylon, the anonakies, the mayans, the pharaohs and Atlantis

#- Research about eschatology.

#- Research the knights of the round table documentary

#- I highly recommend that you research the ww1 and ww2

#- Research the origins of magic, science and spirituality.

#- Research religions and its origins .

#- Research Tesla documentaries

#- Research Zero point energy and superconductors.

#- Research sacred geometry documentaries.

#- Research earth grid and vortex points

#- Research the North Pole expeditions and admiral byrd documentaries

#- Research gog and Magog ( they refer to them as the orks in lord of the rings and the white walkers in the game of thrones series)

#- The flat earth theory is something I recommend researching.

#- Research about the city of Agartha and the city of shambhala,

#- Research the concepts of “main stream science/knowledge and compare it to none mainstream science and knowledge)

#- Research the Krystal’s and its usage in our current technology and past civilisations.

After going through the above you will have a picture about the fabric of our reality.

“OPEN YOUR MIND”

Please be aware that the truth was mixed (framed) with fiction in order to dilute and shroud the truth and facts in sci fi /anime movies and symbolism to damage the credibility of such facts..and keep it lost or hidden.

At the end of the day it’s YOU AND ONLY YOU the Knowledge and truth seeker whom should grasp the idea of the movie or documentary and its topic and should do your own research and learn about what you allow into your mind.

The truth of our reality is a 1000 piece puzzle that was scattered throughout so many fields of knowledge and aspects of our lives..putting it together will require some effort..and all the previous information provided is a personal research and effort and was presented to you in a open mind manner..

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on a Global Level

Posted on 9/6/25 at 11:45

  • The world has 7 continents

  • Each continent has a number of countries in it..

  • 195 countries (Nadis from chakra point of view) in the world

  • The world has 193 countries in the United Nations

  • 5 ( focus on number 5) countries only in the United Nations has the right to the VETO…!!!!

  • We have 3 levels of countries in the world( countries of the first world, countries of the second world, and countries of the third world)

  • The world has 3 levels of power for each country ( internal affairs, external affairs and global affairs)

  • Each country internal affairs has 3 levels (local court, district court and Supreme/ high Court)

  • We have 3 main streams of faith (Islam. Christianity and jodisam)

  • We have 3 main streams of belief disciplines ( Buddhism, Hinduism and Confucianism/ Taoism)

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on an Individual level

Posted on 9/6/25 at 12:30

  • Each individual has one ID

  • Each ID consists of 5 main parts ( birth certificate, a photo identification card, driver license, passport and citizenship certificate)

If you watch the movie which called ( a nights tale ) you will probably grasp the Idea of the importance the of ID…lol

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on a (Business)🍁

Posted on 9/6/25 at 13:05

Removed due to vaatu reasons…

🍁=☘️

We live in a magical, mystical world….

Again these are my own personal experiences, research and knowledge.. do not take everything for granted always do your own research and validation of information obtained

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Definitions

Posted on 28/7/25 at 03:17

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Tools and maps

Posted on 28/7/25 at 03:38

Every journey or a quest needs its own things to get you through it and on the journey of constructing the matrix key you need few things …

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on ybersecurity level part 1

As A professional engineer and a member of the Institution of engineers..

I have been given the chance for great education funded by our Australian government and I really thank them for the opportunity and trust ..

The CPD process to be a member of EA is a good way to maintain the level of skills engineers has to keep up with the fast paced development of the industry on so many levels, and one of them is cybersecurity

And I had the chance to do few of the CPD (continues professional development) presentations and conferences and I have noticed few issues which every individual and organisation out there should pay attention to…

Cybersecurity observation

Part 1…

HELLO ALL from GOOGITEX

the course of cybersecurity proved to be a challenge even though it very easy to complete...

my issue is not with the studying or the practical labs..

my issue is how to protect something from within while all threat are coming form out side..

no matter how you try to protect a cyber architecture and control access..you will always end up with some vulnerabilities...

yes,, you can minimize the threats but you can never element it completely..

as the software used will always have issues and it will always need updating ,, keeping the business in constant development process and to keep up with software updates.

im running my own business and the following issues have been identified by me as sever issues and need attention from all cybersecurity personal out there..

1- all employees need go through a personal back ground check to verify their personal id before they even considered for a job in an organization that have sensitive data.

how do we do that.

1- it can be done through the verification process starting by the birth certificate of the person applying..

having a birth certificate donst mean the person who has it ..is who he saying he is .. as it dosnt have a picture ....!!

A- all babies should get their DNA attached to the birth certificate as soon as they are born .. as babies all look the same..

B-all parents should provide a statement signed by 2 witnesses that they are the parents of this babie and confirm the name as well as the spelling of the name and all other details of the birth incident.( as we don't live an animal farm.)

To be continued in part 2

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on cybersecurity level part 2

Ethics and morality is a fundamental part of our work and code of conduct as engineers..

And to be working with the public and try to conceal information that could affect the integrity of the community safety and the people is unlawfull and punishable by harsh federal law..

There for every organisation and governing body should educate the people who have access to sensitive information and systems data..

Let’s continue

Cybersecurity observations

Part 2

2-the same thing should be applied to the citizenship certificate..as soon as the babies is born..

by doing this and applying the DNA to these 2 documents then we can get a passport with a valid Identification and prevent the identity theft which taking place on an alarming rate in Australia and the whole world. and is been done by the same organization that meant to protect it, using this excuse and doubt to exploit this gap in identity verification process..thats why they want you to have them linked to your mygov app so they can rip off the trust of the citizen in exchange for corrupt services...as their corporate identity is verified though the Microsoft and Asic system and the person( individual is not)..

3- all documents of the person applying for the position within the organization should have all their documents verified and certified by the relevant federal government department issuing that document verifying the details and the certification number.

up to this point im talking about the process of verifying the personal identity of the person applying for a position with an organization before even giving him an access to the organization data..

by doing that i just established a secure identity process of verifying whom am i hiring to maintain the authenticity and credibility of the employees biological and nationality background.. as cyber security threats and attacks starts with the human ,, and the human will always be the weakest link to start with..

every personal need to own their DNA and bio metrics through a process called intellectual property registration specially if your working in a cybersecurity environment your iID could be subject for hacking and there for your organistaion ID will be compromised.

that's why i highly recommend getting the bio-metrics for ethical hacker to be registered and all their bio-metrics verified and registered before using it with the hiring organization..

now we have plastic surgery we have machines that print identical finger prints and eye cornea( eye contact lenses)

To be continued in part 3

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on cybersecurity level part 3

Cybersecurity observations part 3

The biggest threat to IDENTITY out there is the governing corporate services provides and the way they do it is through linking to the individual myGov account..

So how can an organisation hire an individual whom their ID is Already been hacked by another corporate organisation..!!!!!!

There for every thing we know about privacy , security and safety is just fake and an illusion to give the community the scene of fake security..

The privacy legislations and by laws is to limit the access to the individual information not to prevent it..

Question..!!??.. if the person can’t protect their own identity how can we trust them access to protect other people identity and sensitive data information…..

The corporate organisations out there they get the employees to protect the corporate access ID but never teach them to protect their own personal ID ..

I tell you why…Beacuse they are the ones who hacked it in the first place..

To be continued part 4

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on cybersecurity level part 4

Cybersecurity observations part 4

The cybersecurity architecture and fram works that i had the chance to go through is designed to protect the data stored within the system and try to minimise the threats and vulnerabilities to be accessed by unauthorised personal..

And none of them talked about the process of protecting and validating the actual personal identity background of the person accessing the data or the system..

And if that person applying for the postions with that organisation..

The only thing they will do is rely on the documents provide by that person which issued by the same corporate organisation that hacked that ID in the first instance..

Therefor we can’t trust the person as he didn’t know his ID in already hack .. so how would he know that the data or system is not being hacked..

They only find out after it’s been done..lol. Unfortunately..

To be continued part 5

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

Observations on cybersecurity keel part 5

Observations on cybersecurity

Part 5

In this part I would like to talk about and point out the following about the what’s called the USAID which is integrated into every corporate governance structure world wide and established as the base for governance of the human beings world wide no exceptions..

it’s build on 3 main principles

1- the theft of the federal government Identity for every human being out there replacing it with a stat government hacked ID.

2- it’s build using the principles of trinity and what’s called spiritual existence (for more info please refer to the avatars domains starting with acm avatarwan.au) which will give you a bit more clearer understanding of the topic..it’s unbelievable)and it builds the fundamentals for apple security..

3- it’s build on stripped the human beings from their human rights replaceing it with corporate prevliges which turns the human being into a corporate product and a business ..

The lake of knowledge that people are subject to is deliberate to maintain one world government control over everything and the thift of the natural resources for counties and Turing humans into consumerism and modern age salvey

To be continued part 6

Written, analysed, revised and reviewed by:

S.E.A - DAOUD SALAMAH

(GOOGITEX)

Published by : Motel Stayz

IMG_2577.jpeg

Hyperlink Coil Links

Page 1 = Coil 1

The triple spiral coil is constructed from one continuous string or wire..

And as we are working with hyperlinks (unseen string)

Then our continuous string is the domain URL or path for avatargoogitex.au

So continue to page 2

Contact Us

Thank you! Your enquiry has been sent successfully.

Address

Australia

Phone

0415501298

Email

googitex@googitex.com