Perceive distant or hidden targets through structured protocols used in decades of research at Stanford Research Institute and beyond
Remote viewing is a structured protocol for describing distant or hidden targets using only mental impressions. Originally studied under controlled conditions at SRI International, it remains one of the most documented anomalous cognition protocols.
Liminal’s Remote Viewing Lab uses cryptographically auditable target selection — every target is hashed before the session begins, ensuring blind conditions and verifiable fairness.
Multiple protocols for different skill levels and training goals
View the target mentally, then select the correct match from 4-6 candidate images. Scored against chance probability for objective performance measurement.
Sketch your impressions using the built-in drawing tool. Capture shapes, colors, textures, and spatial relationships before seeing the actual target.
Write detailed sensory impressions — colors, textures, sounds, emotions, spatial layout. Structured templates guide you through each perceptual dimension.
Track your hit rate over time with confidence intervals. See which target categories you perform best with and how your accuracy correlates with session conditions.
Based on Coordinate Remote Viewing methodology
A target is cryptographically selected and hashed (SHA-256). You receive only a session number — no information about the target leaks before your viewing.
A brief guided breathing exercise helps you enter a calm, receptive state. Optional HRV coherence pacer available for those with wearable devices.
Describe what comes to mind — sketches, words, sensory details. Take as long as you need. The app timestamps each entry for temporal analysis.
The target is revealed alongside the candidate set. For forced-choice, your rank-order selection is scored. For free-response, you self-rate the correspondence.
Cryptographically verifiable, statistically rigorous
Target selection uses cryptographic hashing to ensure blind conditions. All sessions are stored locally with verifiable audit trails.