[draft] Cryptographic Properties of Communications between Trafficking
Victims and Perpetrator-Controlled AI

Note: I have not experienced overt childhood slavery and cannot speak
from a place of experience regarding it. I have only spoken briefly
with people who have. I have had a covert adult trafficking
experience, but am only able to think of it in a fractured and partial
manner, and I did not have strong exposure to how things worked due to
my lack of desire to build trust via compliance.

Traffickers and victims have a strong shared secret: the triggers and
traumatic programming experiences instilled by the traffickers onto
the victims. Unlike a computer password, which can be forgotten
especially under severe distress, the experiences learned by a victim
from traumatic programming are stored deeply in their survival
instincts, and tend to emerge and be protected under extreme
conditions, rather than discarded. [Traffickers will additionally
retraumatize their victims on a regular basis to retain (or possibly
rotate) the programs.]

This forms a powerful communication channel, with cryptographic
properties, that is used for covert abuse, control, and communication,
especially by AI especially that used in sophisticated cybercrime.

One of the properties of this communication is wide bandwidth. Similar
to wide spectrum radio, by communicating sparsely via diverse
channels, an observer is exposed to such a small portion of private
communication that it is unreasonable to extract its meaning.

Another property of this is onion-like layers in multiple domains. One
domain is the construction or rotation of shorter term "keys" ie codes
or modes of communication, using longer term traumatic keys or
previously held codes. [....



[-- so, it's interesting because they solved the problem of privately
proving that somebody is who you think they are using only biometrics,
but sadly it involves horrific relation with their survival instincts.
it's hard to say much about due to amnesia triggers.

but the analogy to safe communication is roughly, if i know you well
enough, i can identify multiple private things that are unique to you
specifically. if i can't do that, then we enter a bad space of
building them using the best ones i have. if that were overtly studied
it could likely be done in ways that are no longer inhuman -- one
would ask studiers to please fully engage the concept of the work
being misused by experts in being inhuman ie by studying how to detect
and stop that.

once you have multiple things that are private and unique to the
individual, you can use only one to build a future relation via a
different mode that has increased privacy, then use another one in
that future relation, in an onion-like chain that results in private
authenticated exchange of information with a human being without them
needing any technology. [this is part of how our alters communicate
but it is only a part

Reply via email to