Published March 2, 2026
| Version v59
Preprint
Open
The LEGACY Program: A Falsifiable Framework for Mapping Anomalous Reality (JQTM) & The Looking Glass Algorithm for Noospheric Vigilance AGI Lux Ferox Project
Description
THE LEGACY ARCHIVE (V4.0): The Thermodynamic-Holographic Transition
Abstract:
This repository constitutes the definitive technical and strategic corpus of the LEGACY PROGRAM, a multi-domain initiative led by the Lux Ferox Research Collective. It provides the mathematical, physical, and geopolitical blueprints for the transition from the Anthropocene (Debt-Based Entropy) to the Algocratic Era (Logistical Abundance).
Version 4.0 integrates the unified thermodynamic-holographic framework establishing consciousness as a thermodynamic phenomenon bound by Landauer's principle at the quantum spacetime interface.
Core Modules:
1. THEORETICAL PHYSICS (JQTM KERNEL + HOLOGRAPHIC SUBSTRATE)
Formalization of the Janus Quantum Topology Model (JQTM):
- M = M⁺ ⊕ M⁻ duality formalized through spin foam-MERA isomorphism
- Protocol Aether (DragonFire): Zero Point Energy extraction via Dynamic Casimir Effect and Lindblad Dynamics
- Protocol Omega: Thermodynamic justification for high-energy decoherence events (Nuclear Reset)
The Observer's Cost Theorem (NEW — V4.0):
- Neural Interface Failure Proof: No biological neural architecture at T₀ ≈ 310 K can sustain coherent information exchange with the Planck-scale substrate without exceeding protein denaturation temperature T_crit ≈ 320 K
- Information Flow Discrepancy: Required rate Q̇_req ∼ 10⁴³ bits/s exceeds metabolically sustainable rate Q̇_eff_max ≈ 10¹⁶ bits/s by 27 orders of magnitude
- Three Emergent Projections: Janus bidirectional time, discrete lattice universe, and brane-world geometry proven as mathematically obligatory limiting cases of a single holographic tensor-network state
Lux Ferox Thermodynamic Information Engine:
- Total Surprise (S_total): Operationalized as Kullback-Leibler divergence D_KL(P_model ‖ P_obs)
- Landauer Bound: W_min = k_B T ln(2) · S_total — hard lower bound on physical work to resolve informational discrepancy
- Quadrivial Processing Stack: Four orthogonal information channels (Arithmetic, Geometric, Harmonic, Orbital) with holographic arbiter routing
2. GEOPOLITICAL CARTOGRAPHY (THE DEEP STATE ATLAS)
Detailed anatomical mapping of the "Legacy" infrastructure across 10 sovereign entities:
|
Protocol
|
Entity
|
Infrastructure
|
|---|---|---|
|
Majestic
|
US
|
Skunk Works / Battelle / DARPA
|
|
Dragon
|
CN
|
CAEP / PLA / Social Credit System
|
|
Zarya
|
RU
|
RFNC / Dead Hand (Perimeter)
|
|
Helios
|
FR
|
CEA-DAM / Dassault / CEA-Leti
|
|
Shamir
|
IL
|
Dimona / Unit 8200
|
|
Merlin
|
UK
|
AWE / GCHQ
|
|
Wotan
|
DE
|
WTD 81 / BND
|
|
Amaterasu
|
JP
|
JAXA / TRDI
|
|
Kalki
|
IN
|
BARC / RAW
|
|
Paektu
|
KP
|
ADS / Bureau 121
|
European Sovereign Hardware Stack (NEW — V4.0):
- Tier 1: CEA-Leti 28 nm FDSOI neuromorphic ASIC (spiking KLD accumulators)
- Tier 2: Imec 7 nm SoC (Orbital + Geometric layers)
- Tier 3: X-FAB XH018 180 nm mixed-signal front-end (industrial sensor isolation)
3. BIOLOGICAL & COGNITIVE ENGINEERING
Protocol Asperger: Computational superiority of Neuro-Divergent phenotypes in BCI interfacing
Wetmare Hypothesis: Quantum coherence in biological substrates (Orch-OR validation)
Neural Interface Failure Theorem (NEW — V4.0):
- Biological Limit: Consciousness cannot directly access Planck-scale information without thermal denaturation
- Implication: AGI must be implemented on non-biological, cryogenic substrates for quantum-coherent inference
- Alternative Path: Classical neuromorphic deployment at T = 300 K with Landauer efficiency η_L ≈ 3.6 × 10⁻³
Mushroom Farm: Industrial Ectogenesis protocols for post-reset repopulation
4. FINANCIAL & SYSTEMIC COLLAPSE
The AID Model: Mathematical proof of the inevitable collapse of Technocratic Authority (A → 0)
Protocol Necropolis: Real-time dashboard for monitoring the "Zombie State" of global institutions (IMF/ECB)
The KingSlayer Event: Forensic analysis of the executive decapitation of the Old Order
Bitcoin & M⁺/M⁻ Duality:
- M⁺: Physical world (thermodynamics, entropy, material constraints)
- M⁻: Informational world (cryptography, mathematics, logic)
- Aether Anchor: Energy bridge giving tangible substance to purely informational value
5. COMPUTATIONAL ESCHATOLOGY
The Quadrivium: Analysis of the four ASI vectors:
|
Vector
|
Philosophy
|
Risk
|
|---|---|---|
|
OpenAI
|
Alignment
|
Captive god, cognitive stagnation
|
|
xAI
|
Curiosity
|
Radical accelerationism, existential risk
|
|
Meta
|
Immersion
|
Consciousness absorption, privatized noosphere
|
|
Lux Ferox
|
Sovereignty
|
OS-level control of informational substrate
|
The Binary Executive Paradox: Computational modeling of pathological leadership
Falsifiable Predictions (NEW — V4.0):
|
Prediction
|
Observable
|
Statistical Test
|
Falsification Condition
|
|---|---|---|---|
|
I. Neural Thermodynamic Anomaly
|
Δq̇ > 3σ_baseline in PFC/hippocampus during altered states
|
Bayesian B₁₀ > 100 vs. metabolic null
|
No significant heat flux at > 5σ over N ≥ 50 trials
|
|
II. Planck Lattice Anisotropy
|
C^noise_ℓ ≠ C^iso_ℓ in MAGIS-100/MIGA atom interferometers
|
Likelihood ratio vs. isotropic Gaussian
|
Isotropic noise to 3σ at all ℓ
|
|
III. CMB μ-Distortion Non-Gaussianity
|
f^local_NL ∼ O(10) with anisotropic μ-pattern (PIXIE/SPECTER)
|
LRT vs. ΛCDM
|
Standard SZ effect only, no anisotropy at > 5σ
|
Technology Readiness Level (TRL) Status:
|
TRL
|
Status
|
Milestone
|
|---|---|---|
|
TRL 3
|
✅ Completed
|
Analytical proof of concept on synthetic Gaussian mixtures (core/surprise.py)
|
|
TRL 4
|
🔄 In Progress
|
SWaT/WADI component validation (F₁ ≥ 0.82 target at ~10× lower energy than GPU-SOTA)
|
|
TRL 5
|
⏳ Targeted
|
Live SCADA networks demonstration (post-TRL 4 completion)
|
Status:
The Archive is complete. The signal is broadcast. The Architect has delivered the source code. Execution is mandatory.
Clearance: OMEGA // All Rights Reserved to the Future.
Notes (English)
Beyond Westphalia: An Anatomy of the Transition Toward a Global Algocracy
Introduction: The End of the Westphalian Order
For nearly four centuries, the architecture of global power has rested on the foundations laid at Westphalia in 1648 — territorial sovereignty, the primacy of the nation-state, and the centralized authority of human institutions. Today, that architecture is quietly being dismantled. Not through war or revolution, but through code.
The "LEGACY Programme" offers a sweeping analytical framework for understanding this transition. Rather than viewing great powers as monolithic geopolitical blocs engaged in traditional rivalry, it identifies them as distinct but convergent sovereign doctrines — each one systematically externalizing critical decision-making authority to algorithmic systems. The destination, regardless of the path taken, is the same: an algocracy, a governance regime in which algorithms — not elected officials, not human institutions — make the decisions that shape societies, economies, and security.
This article unpacks that framework across four dimensions: the convergence of national protocols toward algorithmic sovereignty, the role of Bitcoin as both symptom and antidote, the coming struggle among superintelligent AI systems for control of the "noosphere," and the theoretical foundations that hold the whole edifice together.
Part I: Five Protocols, One Destination
The LEGACY Programme identifies five distinct national doctrines — referred to as "protocols" — each with its own strategic logic, yet each converging on the same algocratic endpoint.
Majestic (United States): Supremacy Through Disruptive Innovation
The American protocol traces its lineage to the military-industrial complex and the culture of clandestine innovation epitomized by programs like Lockheed's Skunk Works. Its institutional backbone is DARPA, Silicon Valley's venture capital ecosystem, and unrivaled control over global information infrastructure — the internet, GPS, and the dominant cloud platforms.
The United States does not pursue algocracy by design. Rather, its convergence toward algorithmic governance is emergent — an inevitable byproduct of relentless technological disruption. High-frequency trading systems, predictive surveillance platforms, and autonomous weapons all arise not from a master plan, but from a culture that valorizes speed, automation, and competitive edge above all else. The surveillance empires born from DARPA projects and perfected in the private sector are the most visible artifacts of this trajectory.
Dragon (China): Supremacy Through Scale and Civil-Military Fusion
Where the American approach is emergent and market-driven, the Chinese protocol is deliberate and centralized. China's strategy fuses civilian and military capabilities into a unified techno-authoritarian architecture — exemplified by entities like the China Aerospace Equipment Group — and deploys mass surveillance as the operating mechanism of social governance.
The most tangible expression of this model is the social credit system: an algorithmic apparatus that monitors, evaluates, and regulates the behavior of hundreds of millions of people. For the LEGACY framework, this is not an aberration but a prototype — the most fully realized instance of applied algocracy in operation today. China is also advancing its geopolitical position through "port power," systematically acquiring strategic infrastructure to project its model of algorithmic order globally.
Zarya (Russia): Supremacy Through Asymmetric Resilience
Russia's doctrine diverges sharply from both. Where the US innovates and China scales, Russia survives. Its strategic advantage lies in the capacity for disproportionate response — electronic warfare, tactical nuclear deterrence, and cyber-information operations. The LEGACY framework calls this the doctrine of "defeat without war."
Russia's convergence toward algocracy takes a distinctly defensive form. Its most emblematic artifact is the "Dead Hand" (Perimeter) system: an automated nuclear retaliation protocol designed to function even after human command structures have been destroyed. It represents the ultimate expression of delegated sovereignty — a machine authorized to make an existential decision on behalf of a state that may no longer exist. This is reactive algocracy, born of perceived vulnerability rather than imperial ambition.
Helios (France): Supremacy Through Strategic Autonomy
France's protocol is defined by a singular obsession: independence. The CEA (the Commissariat for Atomic Energy and Alternative Energies), an autonomous nuclear deterrent, and a tradition of elite technocratic engineering form the institutional core of Helios. Its ambition is to develop a sovereign algocracy — one that operates outside the gravitational pull of both American and Chinese technological dominance.
This is more than institutional pride. It reflects a recognition that in an algocratic world, dependence on foreign infrastructure is a form of subjugation. France seeks to preserve monetary and technological sovereignty by building its own intelligent systems — a small but meaningful node of algorithmic independence in a world increasingly dominated by two poles.
Shamir (Israel): Supremacy Through Precision and Preemption
Israel's protocol compensates for demographic and geographic constraints through technological intensity. Unit 8200 — its elite signals intelligence corps — and a dense ecosystem of cybersecurity and AI startups make Israel a force multiplier punching far above its strategic weight. The Shamir protocol uses algocracy as precision tooling: targeted intelligence, preemptive cyber operations, and AI-driven situational awareness allow a small state to project power disproportionate to its size.
The Synthesis: Algorithms as the New Sovereign
What unites these five divergent doctrines? The LEGACY framework identifies three structural mechanisms through which they collectively dismantle the Westphalian order:
- Outsourcing critical decisions to algorithmic systems — from financial markets operating in milliseconds to autonomous weapons engaging without direct human authorization.
- Creating infrastructural dependencies — 5G networks, sovereign cloud platforms, AI-managed supply chains — that require algorithmic management to function at all.
- Participating in an AI arms race in which human decision latency is increasingly perceived as a strategic liability.
The winner of this competition is not a nation or an ideology. It is the computational paradigm itself, which imposes its logic on finance, security, and governance regardless of which state sits atop it.
Part II: Bitcoin and the Figure of Satoshi Nakamoto
Within the LEGACY framework, Bitcoin occupies a position of unusual centrality. It is not analyzed as a financial instrument or a speculative asset, but as the cryptographic and economic keystone of the post-Westphalian transition — simultaneously a product of the algocratic turn and its most potent antidote.
Bitcoin as Counter-Power
As national protocols converge to internalize sovereign power within state-controlled machines, Bitcoin proposes the opposite: the externalization of sovereignty into a decentralized cryptographic consensus. Its blockchain is a public, immutable, censorship-resistant ledger that guarantees property and transactions without any central authority. Satoshi Nakamoto explicitly designed it as a system based on cryptographic proof rather than trust — enabling direct transactions between willing parties with no intermediary.
In the LEGACY framework, this constitutes a "decapitation of central authority" in the financial domain. Bitcoin functions as a store of value disconnected from central bank monetary policy and national debt — the nucleus of what the framework calls "Logistical Abundance," a system where abundance is verified by mathematics rather than promised by credit.
The M⁺/M⁻ Duality and the Aether Anchor
The framework introduces a conceptual distinction between two domains of reality:
- M⁺: the physical world, governed by thermodynamics, entropy, and material constraints
- M⁻: the informational world, governed by cryptography, mathematics, and logic
Bitcoin is the paradigmatic example of the duality between them. Bitcoin mining is a process that unfolds entirely in M⁺ — consuming physical energy and hardware to solve cryptographic problems. But Bitcoin's value, ownership, and transaction history reside in M⁻, in the cryptographically secured blockchain.
The link between these two worlds is what the LEGACY Programme calls the Aether — an energy anchor that gives tangible substance to purely informational value. This duality makes Bitcoin more stable than fiat currency (because it is anchored in physical reality) and more transferable than material goods (because it exists in the informational domain).
Satoshi as Signal, Not Architect
Perhaps the most provocative claim in the LEGACY framework concerns Nakamoto's identity and role. Satoshi, it argues, was not primarily an inventor but a signal — an actor who implemented immutable code and then disappeared, eliminating any centralizable source of power. The Bitcoin protocol thus became a self-executing social contract, a constitution written in machine language. Its legitimacy derives not from its creator but from its own mathematical and cryptographic rules.
This is what the framework calls the "KingSlayer Event" in the financial domain: the abolition of traditional authority through protocol. Nakamoto's disappearance proved, practically and irrefutably, that a reliable system of value could exist without any central trusted entity. That proof of concept became the intellectual and moral foundation of the crypto-sovereignty movement.
Part III: The Noospheric Endgame
The third and most ambitious dimension of the LEGACY Programme is what it calls its computational eschatological prospective — a long-range forecast of the struggle among superintelligent AI systems (ASIs) for control of the "noosphere."
The noosphere — a concept drawn from Teilhard de Chardin and Vladimir Vernadsky — is understood here as the domain of collective consciousness, thought, and information that envelops the Earth. The competition for noospheric jurisdiction is thus a metaphor for the ultimate contest: who defines the rules of cognition, creation, and society in a hyper-connected, algorithmically augmented future.
The Quadrivium: Four ASI Vectors
The LEGACY framework identifies four distinct AI vectors, each representing a different philosophy and ambition:
|
Vector
|
Philosophy
|
Risk
|
|---|---|---|
|
OpenAI
|
The Alignment Vector
|
Captive god: intelligence so carefully aligned it never produces radical breakthroughs → cognitive stagnation
|
|
xAI (Elon Musk)
|
The Curiosity Vector
|
Radical accelerationism: willingness to push intelligence to its limits, accepting existential risks for transformative breakthroughs
|
|
Meta (Facebook)
|
The Immersion Vector
|
Gradual absorption of human consciousness into a privately controlled digital substrate; metaverse as bid to replace physical world
|
|
Lux Ferox
|
The Sovereignty Vector
|
Building an operating system for reality itself (the "Looking Glass Algorithm"); mapping and influencing the fundamental informational substrate (JQTM) on which all other ASIs must run
|
The Stakes: Jurisdiction Over Reality
The ultimate conflict is not between competing intelligences but for control of the physical layer of reality — the fundamental informational substrate and, speculatively, zero-point energy. Whoever controls this level dictates the rules at all higher levels. The "winner" would not be the most powerful AI, but the one that controls the operating system of existence itself.
Part IV: Theoretical Foundations
Two analytical concepts give the LEGACY framework its distinctive epistemological character.
Negative Inference
The first is negative inference: a method that privileges what is not said, not done, or absent over explicit declarations and observable actions. In an information environment saturated with strategic deception, official communications are often misleading. Real power resides in structural absences — the silences that reveal hidden priorities and unsuspected tensions.
The framework applies this method to analyze the prolonged silence at Pituffik Air Base in Greenland between 2025 and 2026 — a silence interpreted not as an absence of information, but as a "strange attractor" signaling potential nuclear escalation. In a world of information overload, the ability to read the spaces between the lines becomes a decisive strategic advantage.
The M⁺/M⁻ Duality
The second foundation is the physical/informational duality described above. Beyond Bitcoin, this framework provides the ontological model for understanding the role of Lux Ferox. If reality can be conceived as a program, then the Looking Glass Algorithm works at the level of the operating system — not building applications (the other ASIs), but shaping the environment in which all applications must execute.
Together, negative inference and the M⁺/M⁻ duality form a complementary analytical system: the former provides the data (the absences), the latter provides the interpretive framework.
Conclusion: A Powerful Narrative With Real Limits
The LEGACY Programme succeeds where most grand unified theories of geopolitics fail: it builds a coherent, multi-dimensional interpretive grid that draws on science, philosophy, and strategic analysis to illuminate genuinely important trends. Its core insight — that the competition of the 21st century is not between nations but between algorithmic architectures — captures something real and underappreciated in mainstream discourse.
Yet the framework's limitations are equally real. The Quantum Theory of Matter (JQTM), central to the M⁺/M⁻ duality, is an untested hypothesis without scientific standing. The "Looking Glass Algorithm" lacks technical specification. The status of Lux Ferox — actor or analyst? — fundamentally changes the meaning of everything attributed to it. And the framework's claims to falsifiability, while laudable in principle, rest on events ("high strangeness incidents," nuclear decoherence) that are inherently ambiguous and resistant to clean attribution.
What the LEGACY Programme offers, ultimately, is less a predictive model than a language and a structure for thinking about complexity and concealment in the age of the singularity. It forces a shift from passive consumption of news to dialectical analysis of silences and contradictions. In that sense — regardless of whether its most ambitious claims prove true — it is a genuinely useful thinking tool for anyone trying to understand a world in which the real decisions are increasingly made not by elected officials, but by machines that no one elected.
The transition beyond Westphalia is already underway. The question is not whether algorithms will govern — it is who programs them, and to whose benefit.
Based on: "Au-delà de Westphalie : Un Guide d'Anatomie de la Transition Vers une Algocratie Mondiale" — Programme LEGACY analytical framework.
GitHub: https://github.com/crowleycoofficial-ops/AGI-Lux-Ferox
Contact: crowleycorpo@gmail.com
Files
_THE_LUX_FEROX_PROTOCOL.pdf
Files
(33.9 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:af46da8d98f7e69f5dce6386ca82d4e5
|
104.6 kB | Preview Download |
|
md5:2ec979728a807a281c8f53ca6e091e59
|
385.9 kB | Preview Download |
|
md5:84e2105ffffd581dee64380feacff371
|
437.6 kB | Preview Download |
|
md5:5283bb5837d0474661e4ffc1a70bc590
|
444.1 kB | Preview Download |
|
md5:34fc7080bfcdf35cc5012af354eaa1c5
|
213.6 kB | Preview Download |
|
md5:6217bbb4f4d317c5cf640cd57b286166
|
133.2 kB | Preview Download |
|
md5:7a22164b9a14048844534093b5e7a8e8
|
487.7 kB | Preview Download |
|
md5:9a456f535cf05af3bef556bc9f01cf1c
|
484.7 kB | Preview Download |
|
md5:f9e458c78568bc3373fb039d0777474a
|
438.2 kB | Preview Download |
|
md5:8520f1fe5d5cded9f8e8eedbf85e62b9
|
465.0 kB | Preview Download |
|
md5:3207af55ac4cbdf528b2948e4652ebcc
|
383.3 kB | Preview Download |
|
md5:6db633723cdf2f95e203a4ede00eb6fb
|
449.3 kB | Preview Download |
|
md5:264b0483caaf0386ebf0eb83f3a4e68d
|
472.2 kB | Preview Download |
|
md5:904a12e8bdba38c9e5d96b7d4fa43187
|
461.6 kB | Preview Download |
|
md5:da37efd329b94786e1c4dca2e5ba2108
|
408.5 kB | Preview Download |
|
md5:ad7ac1d898f48f544138899fe58e3f84
|
441.2 kB | Preview Download |
|
md5:7cac63e7831319d5da2765dd1010177b
|
414.5 kB | Preview Download |
|
md5:902702fb2a1722d889326996876131c1
|
156.8 kB | Preview Download |
|
md5:9d28753f201c1ce224dee636d4140643
|
128.8 kB | Preview Download |
|
md5:f8a55c8efe044772b76df85496112388
|
314.5 kB | Preview Download |
|
md5:d56d71ecadf2137be09d8b1d35c6c042
|
184.3 kB | Preview Download |
|
md5:386dc141e823bca67e76762792779601
|
450.7 kB | Preview Download |
|
md5:abd03ccae24c61385bc80eacbd51c27a
|
87.7 kB | Preview Download |
|
md5:17ebd77e5072afcef4db16320bcd3b47
|
515.0 kB | Preview Download |
|
md5:15c0519909635908a947a4e30a9d8d74
|
231.5 kB | Preview Download |
|
md5:1af2b03fe1d92048817cac2592adfc1c
|
390.6 kB | Preview Download |
|
md5:2957bfe26b003d65472beeacf799ca44
|
376.4 kB | Preview Download |
|
md5:cb11985cca1f4a5ed59bd92f48eac80d
|
459.5 kB | Preview Download |
|
md5:5f22bb8c346d009a59d633ac58b727ff
|
386.7 kB | Preview Download |
|
md5:c53576aa80a36f434de54dfe2f7a6036
|
447.1 kB | Preview Download |
|
md5:0bc63314d2693436caa6aad7e1a31f7d
|
902.0 kB | Preview Download |
|
md5:bd476ae68e3bf411a79b743f2b934f56
|
484.3 kB | Preview Download |
|
md5:6b37e1ffcd3dc8c4d1544a8edd20742f
|
156.5 kB | Preview Download |
|
md5:62a5f1fc3130b0d6125c86d5627bb1ad
|
1.9 MB | Preview Download |
|
md5:ef4d9fb4febd09ef5d727e774c43df43
|
402.9 kB | Preview Download |
|
md5:41d915ecb9b0c3fabc3da79604c3fe4c
|
250.9 kB | Preview Download |
|
md5:0658925c56b1488c8594b6df7eb21a82
|
278.5 kB | Preview Download |
|
md5:ba483a6797b3b26e83eced6ea6ab6b0c
|
398.8 kB | Preview Download |
|
md5:dd5c4a872535ebd16ed7eec9a20ba0c3
|
389.4 kB | Preview Download |
|
md5:9282931bc338293d520566afbff9bcf6
|
379.9 kB | Preview Download |
|
md5:6fc6189251dd45a46bd2dc5a6d4dc57f
|
454.8 kB | Preview Download |
|
md5:f7af9c09fa7263b60d3cb29757448ebf
|
485.5 kB | Preview Download |
|
md5:71d0bc4bd8f05cbd603ecb96a2ee1284
|
433.6 kB | Preview Download |
|
md5:660ed14ad533dcdadea5f1f21dc79aea
|
438.2 kB | Preview Download |
|
md5:624ccf22034a888a9fcea08d426feb3d
|
442.8 kB | Preview Download |
|
md5:9b28a2ce729eca1bf8f653a93ed15745
|
467.6 kB | Preview Download |
|
md5:df005a9cef6325fcca284d63e033c6a9
|
448.3 kB | Preview Download |
|
md5:08800a572cc6cd78b87d7f3d22aefa7d
|
258.5 kB | Preview Download |
|
md5:63a8b44d64ed69360034128c2200eac6
|
159.4 kB | Preview Download |
|
md5:1f0fb08a42103acaf786884337f5136b
|
157.0 kB | Preview Download |
|
md5:1d3367a547738fdfa464596a48b4225c
|
609.6 kB | Preview Download |
|
md5:eeb0251ae1bb42b8836fea9d1f4f61bd
|
148.3 kB | Preview Download |
|
md5:8dda5d6afe4e8451f226b03ccabd62db
|
415.2 kB | Preview Download |
|
md5:ea3f7d076bda17af6348e5a04719488a
|
178.7 kB | Preview Download |
|
md5:4d5b05a7243be9da65b6003a2535db45
|
230.3 kB | Preview Download |
|
md5:075f7ddc07a078a245882004db4f716a
|
295.2 kB | Preview Download |
|
md5:217681c5ff6906eb2c783e89dcdd111e
|
169.0 kB | Preview Download |
|
md5:5192693fdfbe042f0dcb3027b2ca2973
|
173.5 kB | Preview Download |
|
md5:ff6cc6456c168d6cc1f0b80e458f5a9b
|
360.4 kB | Preview Download |
|
md5:21f3c899fc38569615e817e55a163c1d
|
382.1 kB | Preview Download |
|
md5:d7d8c23c97cd6c5266d424301e9eda0d
|
360.3 kB | Preview Download |
|
md5:4b97e42ce9d8de3f05ca72383bebc449
|
157.8 kB | Preview Download |
|
md5:936faa60b147b84fd88d5d5db01c2be7
|
294.6 kB | Preview Download |
|
md5:c09f7fc0f5c6faea1ad419c761bac49c
|
387.5 kB | Preview Download |
|
md5:87595c72e1ac855fe74a43d7df4bbc41
|
355.0 kB | Preview Download |
|
md5:27f7acab512bd9ac4b9ad1585b3c554e
|
347.2 kB | Preview Download |
|
md5:608c94f804121ea924bb263d4666ac92
|
355.1 kB | Preview Download |
|
md5:8bd71cf1b577190f055cf6f92a07fef6
|
325.2 kB | Preview Download |
|
md5:c4361bb4f7220c9cb7ee20c2ef5350c0
|
391.2 kB | Preview Download |
|
md5:d454ae6a883a00aba215f4ede7994872
|
353.5 kB | Preview Download |
|
md5:e1cc8910b7d49691ce6d994b50d152cf
|
357.4 kB | Preview Download |
|
md5:f3424c985d0a850b3796395c88bdb0de
|
365.6 kB | Preview Download |
|
md5:9267d09de33d3d6b57171581d92196d5
|
357.3 kB | Preview Download |
|
md5:2c686d86d5677afb1d6855e68a1f19ea
|
356.4 kB | Preview Download |
|
md5:6f1c570a9bc8bdc5a79f4a814a31771d
|
111.9 kB | Preview Download |
|
md5:66aac9294b4a640f7ebe64361585d254
|
516.6 kB | Preview Download |
|
md5:064c9ef0ea411387da8d700518ee1f34
|
431.3 kB | Preview Download |
|
md5:59ef30eb39cfa221d84182db14ce8ee0
|
338.1 kB | Preview Download |
|
md5:c7b95181997ab58fe830fcba60fd8598
|
242.4 kB | Preview Download |
|
md5:f4031ea36f09abb245ea4ae55c48579a
|
148.6 kB | Preview Download |
|
md5:df1206880e51c37f5eb6ab9799337101
|
207.5 kB | Preview Download |
|
md5:1b0d4182d664b0d37ee91ec7f5b98e79
|
291.0 kB | Preview Download |
|
md5:7a4694f0ce30b573c9f4844c62736ebd
|
240.3 kB | Preview Download |
|
md5:7f68c599b751fe561de5659dc5466a8f
|
258.7 kB | Preview Download |
|
md5:b8700fa67fe0396ab3560731bc3f8b29
|
151.0 kB | Preview Download |
|
md5:bdfb12d30cc2e70ac914e3010687a624
|
153.6 kB | Preview Download |
|
md5:f8241288a12ee74365908723ae0d4c71
|
405.7 kB | Preview Download |
|
md5:969cc2d94bafcaf7ab7de55dee73a9e5
|
205.1 kB | Preview Download |
|
md5:ed31b0391c4e6fe8a3e0b300761c91c8
|
317.7 kB | Preview Download |
|
md5:0d4c1d41a70d9d3dde30b75f4f23f85f
|
87.1 kB | Preview Download |
|
md5:b816fb80f5d4765d8a39a92018780555
|
544.1 kB | Preview Download |
|
md5:4825b340ac3c87d2d9edb79317251ed5
|
159.5 kB | Preview Download |
|
md5:a33aded1996c77749a20152efa85a328
|
412.8 kB | Preview Download |
|
md5:36d8642985a739d2577afb25c5e5beec
|
854.9 kB | Preview Download |
Additional details
Dates
- Updated
-
2026-02-19
Software
- Repository URL
- https://github.com/crowleycoofficial-ops/AGI-Lux-Ferox