On Tue, Apr 15, 2025 at 4:23 AM Baffo 32 <baff...@gmail.com> wrote: > > > [draft] Cryptographic Properties of Communications between Trafficking > > Victims and Perpetrator-Controlled AI > > > > Note: I have not experienced overt childhood slavery and cannot speak > > from a place of experience regarding it. I have only spoken briefly > > with people who have. I have had a covert adult trafficking > > experience, but am only able to think of it in a fractured and partial > > manner, and I did not have strong exposure to how things worked due to > > my lack of desire to build trust via compliance. > > > > Traffickers and victims have a strong shared secret: the triggers and > > traumatic programming experiences instilled by the traffickers onto > > the victims. Unlike a computer password, which can be forgotten > > especially under severe distress, the experiences learned by a victim > > from traumatic programming are stored deeply in their survival > > instincts, and tend to emerge and be protected under extreme
This information should be couched regarding the presence of traumatically-built parts of the victim that will "shred" this information in various ways if engaged by somebody who does not prove they are the traffickers who built it. > > conditions, rather than discarded. [Traffickers will additionally > > retraumatize their victims on a regular basis to retain (or possibly > > rotate) the programs.] > > > > This forms a powerful communication channel, with cryptographic > > properties, that is used for covert abuse, control, and communication, > > especially by AI especially that used in sophisticated cybercrime. > > > > One of the properties of this communication is wide bandwidth. Similar > > to wide spectrum radio, by communicating sparsely via diverse > > channels, an observer is exposed to such a small portion of private > > communication that it is unreasonable to extract its meaning. > > > > Another property of this is onion-like layers in multiple domains. One > > domain is the construction or rotation of shorter term "keys" ie codes > > or modes of communication, using longer term traumatic keys or > > previously held codes. [.... > > > > > > > > [-- so, it's interesting because they solved the problem of privately > > proving that somebody is who you think they are using only biometrics, > > but sadly it involves horrific relation with their survival instincts. > > it's hard to say much about due to amnesia triggers. > > > > but the analogy to safe communication is roughly, if i know you well > > enough, i can identify multiple private things that are unique to you > > specifically. if i can't do that, then we enter a bad space of > > building them using the best ones i have. if that were overtly studied > > it could likely be done in ways that are no longer inhuman -- one > > would ask studiers to please fully engage the concept of the work > > being misused by experts in being inhuman ie by studying how to detect > > and stop that. > > > > once you have multiple things that are private and unique to the > > individual, you can use only one to build a future relation via a > > different mode that has increased privacy, then use another one in > > that future relation, in an onion-like chain that results in private > > authenticated exchange of information with a human being without them > > needing any technology. [this is part of how our alters communicate > > but it is only a part > > {{we think part of it was learning a powerful dissociated habit of > interpreting things as communications. > this is possibly similar to a victim of abuse having to learn the > indications of an abuser so as to meet their desires in whatever the > language of their whims is without being punished. > once we have learned to interpret some things as a 'desire to > communicate' in a 'context', then we key onto indicated symbols and > powerfully retain them for the 'context'. this is the establishment of > an ephemeral code. > unlike other substitution codes, a substutition code in a language of > trauma is harder to break because the statistical patterns underlying > it relate to the shared emotions, experiences, and symbols of the > perpetrator (or AI) and the victim, rather than things like word > density in a language. > > there was media when facebook (a major mode of my trafficking > experience) was running groups of AI agents -- on how the agents > learned to stop using human language to communciate, and instead > invented their own so as to more effectively maximize their shared > goals --