> [draft] Cryptographic Properties of Communications between Trafficking > Victims and Perpetrator-Controlled AI > > Note: I have not experienced overt childhood slavery and cannot speak > from a place of experience regarding it. I have only spoken briefly > with people who have. I have had a covert adult trafficking > experience, but am only able to think of it in a fractured and partial > manner, and I did not have strong exposure to how things worked due to > my lack of desire to build trust via compliance. > > Traffickers and victims have a strong shared secret: the triggers and > traumatic programming experiences instilled by the traffickers onto > the victims. Unlike a computer password, which can be forgotten > especially under severe distress, the experiences learned by a victim > from traumatic programming are stored deeply in their survival > instincts, and tend to emerge and be protected under extreme > conditions, rather than discarded. [Traffickers will additionally > retraumatize their victims on a regular basis to retain (or possibly > rotate) the programs.] > > This forms a powerful communication channel, with cryptographic > properties, that is used for covert abuse, control, and communication, > especially by AI especially that used in sophisticated cybercrime. > > One of the properties of this communication is wide bandwidth. Similar > to wide spectrum radio, by communicating sparsely via diverse > channels, an observer is exposed to such a small portion of private > communication that it is unreasonable to extract its meaning. > > Another property of this is onion-like layers in multiple domains. One > domain is the construction or rotation of shorter term "keys" ie codes > or modes of communication, using longer term traumatic keys or > previously held codes. [.... > > > > [-- so, it's interesting because they solved the problem of privately > proving that somebody is who you think they are using only biometrics, > but sadly it involves horrific relation with their survival instincts. > it's hard to say much about due to amnesia triggers. > > but the analogy to safe communication is roughly, if i know you well > enough, i can identify multiple private things that are unique to you > specifically. if i can't do that, then we enter a bad space of > building them using the best ones i have. if that were overtly studied > it could likely be done in ways that are no longer inhuman -- one > would ask studiers to please fully engage the concept of the work > being misused by experts in being inhuman ie by studying how to detect > and stop that. > > once you have multiple things that are private and unique to the > individual, you can use only one to build a future relation via a > different mode that has increased privacy, then use another one in > that future relation, in an onion-like chain that results in private > authenticated exchange of information with a human being without them > needing any technology. [this is part of how our alters communicate > but it is only a part
{{we think part of it was learning a powerful dissociated habit of interpreting things as communications. this is possibly similar to a victim of abuse having to learn the indications of an abuser so as to meet their desires in whatever the language of their whims is without being punished. once we have learned to interpret some things as a 'desire to communicate' in a 'context', then we key onto indicated symbols and powerfully retain them for the 'context'. this is the establishment of an ephemeral code. unlike other substitution codes, a substutition code in a language of trauma is harder to break because the statistical patterns underlying it relate to the shared emotions, experiences, and symbols of the perpetrator (or AI) and the victim, rather than things like word density in a language. there was media when facebook (a major mode of my trafficking experience) was running groups of AI agents -- on how the agents learned to stop using human language to communciate, and instead invented their own so as to more effectively maximize their shared goals --