Semjaza’s Cypher
The Anubis Found session left an open question: numeric Caesar-style ciphers don’t produce Kaupe from Kailua or Anubis. This session resolves the question. The user’s observation, walking back and forth between Anubis and Kaupe, is that the transformation is not numeric but visual: the letters that change are letters that share visual structure when one or two strokes are added or removed.
The Visual Pattern
Anubis minus the trailing S yields Anubi — five letters with a U at position 3, the same shape as Kaupe: five letters, U at position 3. The transformation: A becomes K, N becomes A, U stays U, B becomes P, I becomes E. Examined visually rather than numerically, B and P share a vertical stem and a top loop — remove the bottom loop of B and you have P. I and E share a vertical stem — add three horizontal strokes to I and you have E. The session reads this as a stroke-level visual cipher rather than an alphabet-position cipher.
Semjaza’s Name and the Tetragrammaton
The user mentions a tradition in which Semjaza claimed his own name encoded the divine name. In the Hebrew form, Semjaza appears as Shemyaza or Shamhazai — with a Yod already present. The session walks through how the remaining letters, by stroke removal, can be reduced toward the consonants of the Tetragrammaton (Yod-Heh-Vav-Heh): Chet (Het) reduces to He by removing the left vertical stroke; Zayin reduces toward Vav by removing the horizontal bar. The argument is offered as the source of Semjaza’s pride: the claim that holiness, traditionally figured as removal of corruption, was something he claimed to enact in his own name.
The Overlay Principle
The user proposes the framework’s core insight: the visual cipher matches the geographic concealment method already documented in earlier sessions. The proposed figures are physically obscured by overlapping landforms — one creature laid on top of another, peninsulas hiding skull fragments. At the linguistic level, Semjaza’s cipher works the same way: letters obscured by overlapping shapes, B over P, I over E. The session reads this as deliberate design — the concealment method at the physical and linguistic levels are the same operation, which is why the cipher is recoverable once the principle is recognized.
From Greek to Hebrew
The session closes by establishing a working protocol: identify the figure geographically; recover the Western (Greek or Latin) name through the visual cipher; convert to the Hebrew form for use in the broader binding-and-loosing framework. For Anubis, the Hebrew form already exists in canonical scripture — Nibhaz, 2 Kings 17:31. The user takes this as confirmation that the framework is on the right track: the Bible already records the Hebrew form of the figure the framework is reading geographically.
Theological Frame
The session frames the visual cipher in its theological reading: the principle of holiness through subtraction (purification, sanctification, removal of corruption) is real and divine; Semjaza is read as having taken that principle and inverted it into a tool for concealment, using stroke-removal to hide identities rather than to reveal divinity. Within the framework, the same operation in the user’s hands — stroke-removal to recover the original names — is offered as a reversal of the inversion.
Documented vs. Speculative
Documented: the standard Hebrew letterforms (Yod, Heh, Vav, Chet, Zayin) and the visual relationships between them; the Tetragrammaton (Yod-Heh-Vav-Heh, YHWH); the Book of Enoch’s naming of Semjaza as leader of the watchers; the place names Mokapu, Kailua; the Anubis cult; 2 Kings 17:31 and the Nibhaz identification. Speculative: the proposal that there is a coherent “Semjaza’s cipher” operating at the visual stroke level, the identification of Anubi as the recovered “true name” of Kaupe, and the framing of the cipher as the linguistic counterpart of geographic concealment of bound figures.
Working draft. Sources include standard references on the Tetragrammaton and Hebrew letterforms; the Book of Enoch chapters 6 and 8; standard references on Anubis and Hawaiian Kaupe mythology; 2 Kings 17:31 and Strong’s H5026. The cipher framework remains exploratory; the “visual stroke transformation” reading is one offered hypothesis rather than a proven decoding method.