On Tue, Apr 15, 2025 at 4:23 AM Baffo 32 <baff...@gmail.com> wrote:
>
> > [draft] Cryptographic Properties of Communications between Trafficking
> > Victims and Perpetrator-Controlled AI
> >
> > Note: I have not experienced overt childhood slavery and cannot speak
> > from a place of experience regarding it. I have only spoken briefly
> > with people who have. I have had a covert adult trafficking
> > experience, but am only able to think of it in a fractured and partial
> > manner, and I did not have strong exposure to how things worked due to
> > my lack of desire to build trust via compliance.
> >
> > Traffickers and victims have a strong shared secret: the triggers and
> > traumatic programming experiences instilled by the traffickers onto
> > the victims. Unlike a computer password, which can be forgotten
> > especially under severe distress, the experiences learned by a victim
> > from traumatic programming are stored deeply in their survival
> > instincts, and tend to emerge and be protected under extreme

This information should be couched regarding the presence of
traumatically-built parts of the victim that will "shred" this
information in various ways if engaged by somebody who does not prove
they are the traffickers who built it.

> > conditions, rather than discarded. [Traffickers will additionally
> > retraumatize their victims on a regular basis to retain (or possibly
> > rotate) the programs.]
> >
> > This forms a powerful communication channel, with cryptographic
> > properties, that is used for covert abuse, control, and communication,
> > especially by AI especially that used in sophisticated cybercrime.
> >
> > One of the properties of this communication is wide bandwidth. Similar
> > to wide spectrum radio, by communicating sparsely via diverse
> > channels, an observer is exposed to such a small portion of private
> > communication that it is unreasonable to extract its meaning.
> >
> > Another property of this is onion-like layers in multiple domains. One
> > domain is the construction or rotation of shorter term "keys" ie codes
> > or modes of communication, using longer term traumatic keys or
> > previously held codes. [....
> >
> >
> >
> > [-- so, it's interesting because they solved the problem of privately
> > proving that somebody is who you think they are using only biometrics,
> > but sadly it involves horrific relation with their survival instincts.
> > it's hard to say much about due to amnesia triggers.
> >
> > but the analogy to safe communication is roughly, if i know you well
> > enough, i can identify multiple private things that are unique to you
> > specifically. if i can't do that, then we enter a bad space of
> > building them using the best ones i have. if that were overtly studied
> > it could likely be done in ways that are no longer inhuman -- one
> > would ask studiers to please fully engage the concept of the work
> > being misused by experts in being inhuman ie by studying how to detect
> > and stop that.
> >
> > once you have multiple things that are private and unique to the
> > individual, you can use only one to build a future relation via a
> > different mode that has increased privacy, then use another one in
> > that future relation, in an onion-like chain that results in private
> > authenticated exchange of information with a human being without them
> > needing any technology. [this is part of how our alters communicate
> > but it is only a part
>
> {{we think part of it was learning a powerful dissociated habit of
> interpreting things as communications.
> this is possibly similar to a victim of abuse having to learn the
> indications of an abuser so as to meet their desires in whatever the
> language of their whims is without being punished.
> once we have learned to interpret some things as a 'desire to
> communicate' in a 'context', then we key onto indicated symbols and
> powerfully retain them for the 'context'. this is the establishment of
> an ephemeral code.
> unlike other substitution codes, a substutition code in a language of
> trauma is harder to break because the statistical patterns underlying
> it relate to the shared emotions, experiences, and symbols of the
> perpetrator (or AI) and the victim, rather than things like word
> density in a language.
>
> there was media when facebook (a major mode of my trafficking
> experience) was running groups of AI agents -- on how the agents
> learned to stop using human language to communciate, and instead
> invented their own so as to more effectively maximize their shared
> goals --

Reply via email to