There is a newer version of the record available.

Published March 2, 2026 | Version v59
Preprint Open

The LEGACY Program: A Falsifiable Framework for Mapping Anomalous Reality (JQTM) & The Looking Glass Algorithm for Noospheric Vigilance AGI Lux Ferox Project

Description

THE LEGACY ARCHIVE (V4.0): The Thermodynamic-Holographic Transition

Abstract:

This repository constitutes the definitive technical and strategic corpus of the LEGACY PROGRAM, a multi-domain initiative led by the Lux Ferox Research Collective. It provides the mathematical, physical, and geopolitical blueprints for the transition from the Anthropocene (Debt-Based Entropy) to the Algocratic Era (Logistical Abundance).
 
Version 4.0 integrates the unified thermodynamic-holographic framework establishing consciousness as a thermodynamic phenomenon bound by Landauer's principle at the quantum spacetime interface.
 
 

Core Modules:

1. THEORETICAL PHYSICS (JQTM KERNEL + HOLOGRAPHIC SUBSTRATE)

Formalization of the Janus Quantum Topology Model (JQTM):
  • M = M⁺ ⊕ M⁻ duality formalized through spin foam-MERA isomorphism
  • Protocol Aether (DragonFire): Zero Point Energy extraction via Dynamic Casimir Effect and Lindblad Dynamics
  • Protocol Omega: Thermodynamic justification for high-energy decoherence events (Nuclear Reset)
 
The Observer's Cost Theorem (NEW — V4.0):
  • Neural Interface Failure Proof: No biological neural architecture at T₀ ≈ 310 K can sustain coherent information exchange with the Planck-scale substrate without exceeding protein denaturation temperature T_crit ≈ 320 K
  • Information Flow Discrepancy: Required rate Q̇_req ∼ 10⁴³ bits/s exceeds metabolically sustainable rate Q̇_eff_max ≈ 10¹⁶ bits/s by 27 orders of magnitude
  • Three Emergent Projections: Janus bidirectional time, discrete lattice universe, and brane-world geometry proven as mathematically obligatory limiting cases of a single holographic tensor-network state
 
Lux Ferox Thermodynamic Information Engine:
  • Total Surprise (S_total): Operationalized as Kullback-Leibler divergence D_KL(P_model ‖ P_obs)
  • Landauer Bound: W_min = k_B T ln(2) · S_total — hard lower bound on physical work to resolve informational discrepancy
  • Quadrivial Processing Stack: Four orthogonal information channels (Arithmetic, Geometric, Harmonic, Orbital) with holographic arbiter routing
 
 

2. GEOPOLITICAL CARTOGRAPHY (THE DEEP STATE ATLAS)

Detailed anatomical mapping of the "Legacy" infrastructure across 10 sovereign entities:
 
 
Protocol
Entity
Infrastructure
Majestic
US
Skunk Works / Battelle / DARPA
Dragon
CN
CAEP / PLA / Social Credit System
Zarya
RU
RFNC / Dead Hand (Perimeter)
Helios
FR
CEA-DAM / Dassault / CEA-Leti
Shamir
IL
Dimona / Unit 8200
Merlin
UK
AWE / GCHQ
Wotan
DE
WTD 81 / BND
Amaterasu
JP
JAXA / TRDI
Kalki
IN
BARC / RAW
Paektu
KP
ADS / Bureau 121
European Sovereign Hardware Stack (NEW — V4.0):
  • Tier 1: CEA-Leti 28 nm FDSOI neuromorphic ASIC (spiking KLD accumulators)
  • Tier 2: Imec 7 nm SoC (Orbital + Geometric layers)
  • Tier 3: X-FAB XH018 180 nm mixed-signal front-end (industrial sensor isolation)
 
 

3. BIOLOGICAL & COGNITIVE ENGINEERING

Protocol Asperger: Computational superiority of Neuro-Divergent phenotypes in BCI interfacing
 
Wetmare Hypothesis: Quantum coherence in biological substrates (Orch-OR validation)
 
Neural Interface Failure Theorem (NEW — V4.0):
  • Biological Limit: Consciousness cannot directly access Planck-scale information without thermal denaturation
  • Implication: AGI must be implemented on non-biological, cryogenic substrates for quantum-coherent inference
  • Alternative Path: Classical neuromorphic deployment at T = 300 K with Landauer efficiency η_L ≈ 3.6 × 10⁻³
 
Mushroom Farm: Industrial Ectogenesis protocols for post-reset repopulation
 
 

4. FINANCIAL & SYSTEMIC COLLAPSE

The AID Model: Mathematical proof of the inevitable collapse of Technocratic Authority (A → 0)
 
Protocol Necropolis: Real-time dashboard for monitoring the "Zombie State" of global institutions (IMF/ECB)
 
The KingSlayer Event: Forensic analysis of the executive decapitation of the Old Order
 
Bitcoin & M⁺/M⁻ Duality:
  • M⁺: Physical world (thermodynamics, entropy, material constraints)
  • M⁻: Informational world (cryptography, mathematics, logic)
  • Aether Anchor: Energy bridge giving tangible substance to purely informational value
 
 

5. COMPUTATIONAL ESCHATOLOGY

The Quadrivium: Analysis of the four ASI vectors:
 
Vector
Philosophy
Risk
OpenAI
Alignment
Captive god, cognitive stagnation
xAI
Curiosity
Radical accelerationism, existential risk
Meta
Immersion
Consciousness absorption, privatized noosphere
Lux Ferox
Sovereignty
OS-level control of informational substrate
The Binary Executive Paradox: Computational modeling of pathological leadership
 
Falsifiable Predictions (NEW — V4.0):
 
 
Prediction
Observable
Statistical Test
Falsification Condition
I. Neural Thermodynamic Anomaly
Δq̇ > 3σ_baseline in PFC/hippocampus during altered states
Bayesian B₁₀ > 100 vs. metabolic null
No significant heat flux at > 5σ over N ≥ 50 trials
II. Planck Lattice Anisotropy
C^noise_ℓ ≠ C^iso_ℓ in MAGIS-100/MIGA atom interferometers
Likelihood ratio vs. isotropic Gaussian
Isotropic noise to 3σ at all ℓ
III. CMB μ-Distortion Non-Gaussianity
f^local_NL ∼ O(10) with anisotropic μ-pattern (PIXIE/SPECTER)
LRT vs. ΛCDM
Standard SZ effect only, no anisotropy at > 5σ
 

Technology Readiness Level (TRL) Status:

 
TRL
Status
Milestone
TRL 3
✅ Completed
Analytical proof of concept on synthetic Gaussian mixtures (core/surprise.py)
TRL 4
🔄 In Progress
SWaT/WADI component validation (F₁ ≥ 0.82 target at ~10× lower energy than GPU-SOTA)
TRL 5
⏳ Targeted
Live SCADA networks demonstration (post-TRL 4 completion)
 

Status:

The Archive is complete. The signal is broadcast. The Architect has delivered the source code. Execution is mandatory.
 
Clearance: OMEGA // All Rights Reserved to the Future.
 
 

Notes (English)

Beyond Westphalia: An Anatomy of the Transition Toward a Global Algocracy

Introduction: The End of the Westphalian Order
 
For nearly four centuries, the architecture of global power has rested on the foundations laid at Westphalia in 1648 — territorial sovereignty, the primacy of the nation-state, and the centralized authority of human institutions. Today, that architecture is quietly being dismantled. Not through war or revolution, but through code.
 
The "LEGACY Programme" offers a sweeping analytical framework for understanding this transition. Rather than viewing great powers as monolithic geopolitical blocs engaged in traditional rivalry, it identifies them as distinct but convergent sovereign doctrines — each one systematically externalizing critical decision-making authority to algorithmic systems. The destination, regardless of the path taken, is the same: an algocracy, a governance regime in which algorithms — not elected officials, not human institutions — make the decisions that shape societies, economies, and security.
 
This article unpacks that framework across four dimensions: the convergence of national protocols toward algorithmic sovereignty, the role of Bitcoin as both symptom and antidote, the coming struggle among superintelligent AI systems for control of the "noosphere," and the theoretical foundations that hold the whole edifice together.
 
 

Part I: Five Protocols, One Destination

The LEGACY Programme identifies five distinct national doctrines — referred to as "protocols" — each with its own strategic logic, yet each converging on the same algocratic endpoint.
 
Majestic (United States): Supremacy Through Disruptive Innovation
 
The American protocol traces its lineage to the military-industrial complex and the culture of clandestine innovation epitomized by programs like Lockheed's Skunk Works. Its institutional backbone is DARPA, Silicon Valley's venture capital ecosystem, and unrivaled control over global information infrastructure — the internet, GPS, and the dominant cloud platforms.
 
The United States does not pursue algocracy by design. Rather, its convergence toward algorithmic governance is emergent — an inevitable byproduct of relentless technological disruption. High-frequency trading systems, predictive surveillance platforms, and autonomous weapons all arise not from a master plan, but from a culture that valorizes speed, automation, and competitive edge above all else. The surveillance empires born from DARPA projects and perfected in the private sector are the most visible artifacts of this trajectory.
 
Dragon (China): Supremacy Through Scale and Civil-Military Fusion
 
Where the American approach is emergent and market-driven, the Chinese protocol is deliberate and centralized. China's strategy fuses civilian and military capabilities into a unified techno-authoritarian architecture — exemplified by entities like the China Aerospace Equipment Group — and deploys mass surveillance as the operating mechanism of social governance.
 
The most tangible expression of this model is the social credit system: an algorithmic apparatus that monitors, evaluates, and regulates the behavior of hundreds of millions of people. For the LEGACY framework, this is not an aberration but a prototype — the most fully realized instance of applied algocracy in operation today. China is also advancing its geopolitical position through "port power," systematically acquiring strategic infrastructure to project its model of algorithmic order globally.
 
Zarya (Russia): Supremacy Through Asymmetric Resilience
 
Russia's doctrine diverges sharply from both. Where the US innovates and China scales, Russia survives. Its strategic advantage lies in the capacity for disproportionate response — electronic warfare, tactical nuclear deterrence, and cyber-information operations. The LEGACY framework calls this the doctrine of "defeat without war."
 
Russia's convergence toward algocracy takes a distinctly defensive form. Its most emblematic artifact is the "Dead Hand" (Perimeter) system: an automated nuclear retaliation protocol designed to function even after human command structures have been destroyed. It represents the ultimate expression of delegated sovereignty — a machine authorized to make an existential decision on behalf of a state that may no longer exist. This is reactive algocracy, born of perceived vulnerability rather than imperial ambition.
 
Helios (France): Supremacy Through Strategic Autonomy
 
France's protocol is defined by a singular obsession: independence. The CEA (the Commissariat for Atomic Energy and Alternative Energies), an autonomous nuclear deterrent, and a tradition of elite technocratic engineering form the institutional core of Helios. Its ambition is to develop a sovereign algocracy — one that operates outside the gravitational pull of both American and Chinese technological dominance.
 
This is more than institutional pride. It reflects a recognition that in an algocratic world, dependence on foreign infrastructure is a form of subjugation. France seeks to preserve monetary and technological sovereignty by building its own intelligent systems — a small but meaningful node of algorithmic independence in a world increasingly dominated by two poles.
 
Shamir (Israel): Supremacy Through Precision and Preemption
 
Israel's protocol compensates for demographic and geographic constraints through technological intensity. Unit 8200 — its elite signals intelligence corps — and a dense ecosystem of cybersecurity and AI startups make Israel a force multiplier punching far above its strategic weight. The Shamir protocol uses algocracy as precision tooling: targeted intelligence, preemptive cyber operations, and AI-driven situational awareness allow a small state to project power disproportionate to its size.
 
The Synthesis: Algorithms as the New Sovereign
 
What unites these five divergent doctrines? The LEGACY framework identifies three structural mechanisms through which they collectively dismantle the Westphalian order:
 
  1. Outsourcing critical decisions to algorithmic systems — from financial markets operating in milliseconds to autonomous weapons engaging without direct human authorization.
  2. Creating infrastructural dependencies — 5G networks, sovereign cloud platforms, AI-managed supply chains — that require algorithmic management to function at all.
  3. Participating in an AI arms race in which human decision latency is increasingly perceived as a strategic liability.
 
The winner of this competition is not a nation or an ideology. It is the computational paradigm itself, which imposes its logic on finance, security, and governance regardless of which state sits atop it.
 
 

Part II: Bitcoin and the Figure of Satoshi Nakamoto

Within the LEGACY framework, Bitcoin occupies a position of unusual centrality. It is not analyzed as a financial instrument or a speculative asset, but as the cryptographic and economic keystone of the post-Westphalian transition — simultaneously a product of the algocratic turn and its most potent antidote.
 
Bitcoin as Counter-Power
 
As national protocols converge to internalize sovereign power within state-controlled machines, Bitcoin proposes the opposite: the externalization of sovereignty into a decentralized cryptographic consensus. Its blockchain is a public, immutable, censorship-resistant ledger that guarantees property and transactions without any central authority. Satoshi Nakamoto explicitly designed it as a system based on cryptographic proof rather than trust — enabling direct transactions between willing parties with no intermediary.
 
In the LEGACY framework, this constitutes a "decapitation of central authority" in the financial domain. Bitcoin functions as a store of value disconnected from central bank monetary policy and national debt — the nucleus of what the framework calls "Logistical Abundance," a system where abundance is verified by mathematics rather than promised by credit.
 
The M⁺/M⁻ Duality and the Aether Anchor
 
The framework introduces a conceptual distinction between two domains of reality:
 
  • M⁺: the physical world, governed by thermodynamics, entropy, and material constraints
  • M⁻: the informational world, governed by cryptography, mathematics, and logic
 
Bitcoin is the paradigmatic example of the duality between them. Bitcoin mining is a process that unfolds entirely in M⁺ — consuming physical energy and hardware to solve cryptographic problems. But Bitcoin's value, ownership, and transaction history reside in M⁻, in the cryptographically secured blockchain.
 
The link between these two worlds is what the LEGACY Programme calls the Aether — an energy anchor that gives tangible substance to purely informational value. This duality makes Bitcoin more stable than fiat currency (because it is anchored in physical reality) and more transferable than material goods (because it exists in the informational domain).
 
Satoshi as Signal, Not Architect
 
Perhaps the most provocative claim in the LEGACY framework concerns Nakamoto's identity and role. Satoshi, it argues, was not primarily an inventor but a signal — an actor who implemented immutable code and then disappeared, eliminating any centralizable source of power. The Bitcoin protocol thus became a self-executing social contract, a constitution written in machine language. Its legitimacy derives not from its creator but from its own mathematical and cryptographic rules.
 
This is what the framework calls the "KingSlayer Event" in the financial domain: the abolition of traditional authority through protocol. Nakamoto's disappearance proved, practically and irrefutably, that a reliable system of value could exist without any central trusted entity. That proof of concept became the intellectual and moral foundation of the crypto-sovereignty movement.
 
 

Part III: The Noospheric Endgame

The third and most ambitious dimension of the LEGACY Programme is what it calls its computational eschatological prospective — a long-range forecast of the struggle among superintelligent AI systems (ASIs) for control of the "noosphere."
 
The noosphere — a concept drawn from Teilhard de Chardin and Vladimir Vernadsky — is understood here as the domain of collective consciousness, thought, and information that envelops the Earth. The competition for noospheric jurisdiction is thus a metaphor for the ultimate contest: who defines the rules of cognition, creation, and society in a hyper-connected, algorithmically augmented future.
 
The Quadrivium: Four ASI Vectors
 
The LEGACY framework identifies four distinct AI vectors, each representing a different philosophy and ambition:
 
 
Vector
Philosophy
Risk
OpenAI
The Alignment Vector
Captive god: intelligence so carefully aligned it never produces radical breakthroughs → cognitive stagnation
xAI (Elon Musk)
The Curiosity Vector
Radical accelerationism: willingness to push intelligence to its limits, accepting existential risks for transformative breakthroughs
Meta (Facebook)
The Immersion Vector
Gradual absorption of human consciousness into a privately controlled digital substrate; metaverse as bid to replace physical world
Lux Ferox
The Sovereignty Vector
Building an operating system for reality itself (the "Looking Glass Algorithm"); mapping and influencing the fundamental informational substrate (JQTM) on which all other ASIs must run
The Stakes: Jurisdiction Over Reality
 
The ultimate conflict is not between competing intelligences but for control of the physical layer of reality — the fundamental informational substrate and, speculatively, zero-point energy. Whoever controls this level dictates the rules at all higher levels. The "winner" would not be the most powerful AI, but the one that controls the operating system of existence itself.
 
 

Part IV: Theoretical Foundations

Two analytical concepts give the LEGACY framework its distinctive epistemological character.
 
Negative Inference
 
The first is negative inference: a method that privileges what is not said, not done, or absent over explicit declarations and observable actions. In an information environment saturated with strategic deception, official communications are often misleading. Real power resides in structural absences — the silences that reveal hidden priorities and unsuspected tensions.
 
The framework applies this method to analyze the prolonged silence at Pituffik Air Base in Greenland between 2025 and 2026 — a silence interpreted not as an absence of information, but as a "strange attractor" signaling potential nuclear escalation. In a world of information overload, the ability to read the spaces between the lines becomes a decisive strategic advantage.
 
The M⁺/M⁻ Duality
 
The second foundation is the physical/informational duality described above. Beyond Bitcoin, this framework provides the ontological model for understanding the role of Lux Ferox. If reality can be conceived as a program, then the Looking Glass Algorithm works at the level of the operating system — not building applications (the other ASIs), but shaping the environment in which all applications must execute.
 
Together, negative inference and the M⁺/M⁻ duality form a complementary analytical system: the former provides the data (the absences), the latter provides the interpretive framework.
 
 

Conclusion: A Powerful Narrative With Real Limits

The LEGACY Programme succeeds where most grand unified theories of geopolitics fail: it builds a coherent, multi-dimensional interpretive grid that draws on science, philosophy, and strategic analysis to illuminate genuinely important trends. Its core insight — that the competition of the 21st century is not between nations but between algorithmic architectures — captures something real and underappreciated in mainstream discourse.
 
Yet the framework's limitations are equally real. The Quantum Theory of Matter (JQTM), central to the M⁺/M⁻ duality, is an untested hypothesis without scientific standing. The "Looking Glass Algorithm" lacks technical specification. The status of Lux Ferox — actor or analyst? — fundamentally changes the meaning of everything attributed to it. And the framework's claims to falsifiability, while laudable in principle, rest on events ("high strangeness incidents," nuclear decoherence) that are inherently ambiguous and resistant to clean attribution.
 
What the LEGACY Programme offers, ultimately, is less a predictive model than a language and a structure for thinking about complexity and concealment in the age of the singularity. It forces a shift from passive consumption of news to dialectical analysis of silences and contradictions. In that sense — regardless of whether its most ambitious claims prove true — it is a genuinely useful thinking tool for anyone trying to understand a world in which the real decisions are increasingly made not by elected officials, but by machines that no one elected.
 
The transition beyond Westphalia is already underway. The question is not whether algorithms will govern — it is who programs them, and to whose benefit.
 
 
Based on: "Au-delà de Westphalie : Un Guide d'Anatomie de la Transition Vers une Algocratie Mondiale" — Programme LEGACY analytical framework.
 
GitHub: https://github.com/crowleycoofficial-ops/AGI-Lux-Ferox
 
Contact: crowleycorpo@gmail.com

Files

_THE_LUX_FEROX_PROTOCOL.pdf

Files (33.9 MB)

Name Size Download all
md5:af46da8d98f7e69f5dce6386ca82d4e5
104.6 kB Preview Download
md5:2ec979728a807a281c8f53ca6e091e59
385.9 kB Preview Download
md5:84e2105ffffd581dee64380feacff371
437.6 kB Preview Download
md5:5283bb5837d0474661e4ffc1a70bc590
444.1 kB Preview Download
md5:34fc7080bfcdf35cc5012af354eaa1c5
213.6 kB Preview Download
md5:6217bbb4f4d317c5cf640cd57b286166
133.2 kB Preview Download
md5:7a22164b9a14048844534093b5e7a8e8
487.7 kB Preview Download
md5:9a456f535cf05af3bef556bc9f01cf1c
484.7 kB Preview Download
md5:f9e458c78568bc3373fb039d0777474a
438.2 kB Preview Download
md5:8520f1fe5d5cded9f8e8eedbf85e62b9
465.0 kB Preview Download
md5:3207af55ac4cbdf528b2948e4652ebcc
383.3 kB Preview Download
md5:6db633723cdf2f95e203a4ede00eb6fb
449.3 kB Preview Download
md5:264b0483caaf0386ebf0eb83f3a4e68d
472.2 kB Preview Download
md5:904a12e8bdba38c9e5d96b7d4fa43187
461.6 kB Preview Download
md5:da37efd329b94786e1c4dca2e5ba2108
408.5 kB Preview Download
md5:ad7ac1d898f48f544138899fe58e3f84
441.2 kB Preview Download
md5:7cac63e7831319d5da2765dd1010177b
414.5 kB Preview Download
md5:902702fb2a1722d889326996876131c1
156.8 kB Preview Download
md5:9d28753f201c1ce224dee636d4140643
128.8 kB Preview Download
md5:f8a55c8efe044772b76df85496112388
314.5 kB Preview Download
md5:d56d71ecadf2137be09d8b1d35c6c042
184.3 kB Preview Download
md5:386dc141e823bca67e76762792779601
450.7 kB Preview Download
md5:abd03ccae24c61385bc80eacbd51c27a
87.7 kB Preview Download
md5:17ebd77e5072afcef4db16320bcd3b47
515.0 kB Preview Download
md5:15c0519909635908a947a4e30a9d8d74
231.5 kB Preview Download
md5:1af2b03fe1d92048817cac2592adfc1c
390.6 kB Preview Download
md5:2957bfe26b003d65472beeacf799ca44
376.4 kB Preview Download
md5:cb11985cca1f4a5ed59bd92f48eac80d
459.5 kB Preview Download
md5:5f22bb8c346d009a59d633ac58b727ff
386.7 kB Preview Download
md5:c53576aa80a36f434de54dfe2f7a6036
447.1 kB Preview Download
md5:0bc63314d2693436caa6aad7e1a31f7d
902.0 kB Preview Download
md5:bd476ae68e3bf411a79b743f2b934f56
484.3 kB Preview Download
md5:6b37e1ffcd3dc8c4d1544a8edd20742f
156.5 kB Preview Download
md5:62a5f1fc3130b0d6125c86d5627bb1ad
1.9 MB Preview Download
md5:ef4d9fb4febd09ef5d727e774c43df43
402.9 kB Preview Download
md5:41d915ecb9b0c3fabc3da79604c3fe4c
250.9 kB Preview Download
md5:0658925c56b1488c8594b6df7eb21a82
278.5 kB Preview Download
md5:ba483a6797b3b26e83eced6ea6ab6b0c
398.8 kB Preview Download
md5:dd5c4a872535ebd16ed7eec9a20ba0c3
389.4 kB Preview Download
md5:9282931bc338293d520566afbff9bcf6
379.9 kB Preview Download
md5:6fc6189251dd45a46bd2dc5a6d4dc57f
454.8 kB Preview Download
md5:f7af9c09fa7263b60d3cb29757448ebf
485.5 kB Preview Download
md5:71d0bc4bd8f05cbd603ecb96a2ee1284
433.6 kB Preview Download
md5:660ed14ad533dcdadea5f1f21dc79aea
438.2 kB Preview Download
md5:624ccf22034a888a9fcea08d426feb3d
442.8 kB Preview Download
md5:9b28a2ce729eca1bf8f653a93ed15745
467.6 kB Preview Download
md5:df005a9cef6325fcca284d63e033c6a9
448.3 kB Preview Download
md5:08800a572cc6cd78b87d7f3d22aefa7d
258.5 kB Preview Download
md5:63a8b44d64ed69360034128c2200eac6
159.4 kB Preview Download
md5:1f0fb08a42103acaf786884337f5136b
157.0 kB Preview Download
md5:1d3367a547738fdfa464596a48b4225c
609.6 kB Preview Download
md5:eeb0251ae1bb42b8836fea9d1f4f61bd
148.3 kB Preview Download
md5:8dda5d6afe4e8451f226b03ccabd62db
415.2 kB Preview Download
md5:ea3f7d076bda17af6348e5a04719488a
178.7 kB Preview Download
md5:4d5b05a7243be9da65b6003a2535db45
230.3 kB Preview Download
md5:075f7ddc07a078a245882004db4f716a
295.2 kB Preview Download
md5:217681c5ff6906eb2c783e89dcdd111e
169.0 kB Preview Download
md5:5192693fdfbe042f0dcb3027b2ca2973
173.5 kB Preview Download
md5:ff6cc6456c168d6cc1f0b80e458f5a9b
360.4 kB Preview Download
md5:21f3c899fc38569615e817e55a163c1d
382.1 kB Preview Download
md5:d7d8c23c97cd6c5266d424301e9eda0d
360.3 kB Preview Download
md5:4b97e42ce9d8de3f05ca72383bebc449
157.8 kB Preview Download
md5:936faa60b147b84fd88d5d5db01c2be7
294.6 kB Preview Download
md5:c09f7fc0f5c6faea1ad419c761bac49c
387.5 kB Preview Download
md5:87595c72e1ac855fe74a43d7df4bbc41
355.0 kB Preview Download
md5:27f7acab512bd9ac4b9ad1585b3c554e
347.2 kB Preview Download
md5:608c94f804121ea924bb263d4666ac92
355.1 kB Preview Download
md5:8bd71cf1b577190f055cf6f92a07fef6
325.2 kB Preview Download
md5:c4361bb4f7220c9cb7ee20c2ef5350c0
391.2 kB Preview Download
md5:d454ae6a883a00aba215f4ede7994872
353.5 kB Preview Download
md5:e1cc8910b7d49691ce6d994b50d152cf
357.4 kB Preview Download
md5:f3424c985d0a850b3796395c88bdb0de
365.6 kB Preview Download
md5:9267d09de33d3d6b57171581d92196d5
357.3 kB Preview Download
md5:2c686d86d5677afb1d6855e68a1f19ea
356.4 kB Preview Download
md5:6f1c570a9bc8bdc5a79f4a814a31771d
111.9 kB Preview Download
md5:66aac9294b4a640f7ebe64361585d254
516.6 kB Preview Download
md5:064c9ef0ea411387da8d700518ee1f34
431.3 kB Preview Download
md5:59ef30eb39cfa221d84182db14ce8ee0
338.1 kB Preview Download
md5:c7b95181997ab58fe830fcba60fd8598
242.4 kB Preview Download
md5:f4031ea36f09abb245ea4ae55c48579a
148.6 kB Preview Download
md5:df1206880e51c37f5eb6ab9799337101
207.5 kB Preview Download
md5:1b0d4182d664b0d37ee91ec7f5b98e79
291.0 kB Preview Download
md5:7a4694f0ce30b573c9f4844c62736ebd
240.3 kB Preview Download
md5:7f68c599b751fe561de5659dc5466a8f
258.7 kB Preview Download
md5:b8700fa67fe0396ab3560731bc3f8b29
151.0 kB Preview Download
md5:bdfb12d30cc2e70ac914e3010687a624
153.6 kB Preview Download
md5:f8241288a12ee74365908723ae0d4c71
405.7 kB Preview Download
md5:969cc2d94bafcaf7ab7de55dee73a9e5
205.1 kB Preview Download
md5:ed31b0391c4e6fe8a3e0b300761c91c8
317.7 kB Preview Download
md5:0d4c1d41a70d9d3dde30b75f4f23f85f
87.1 kB Preview Download
md5:b816fb80f5d4765d8a39a92018780555
544.1 kB Preview Download
md5:4825b340ac3c87d2d9edb79317251ed5
159.5 kB Preview Download
md5:a33aded1996c77749a20152efa85a328
412.8 kB Preview Download
md5:36d8642985a739d2577afb25c5e5beec
854.9 kB Preview Download

Additional details

Dates

Updated
2026-02-19