> > > > > [draft] Cryptographic Properties of Communications between Trafficking
> > > > > Victims and Perpetrator-Controlled AI
> > > > >
> > > > > Note: I have not experienced overt childhood slavery and cannot speak
> > > > > from a place of experience regarding it. I have only spoken briefly
> > > > > with people who have. I have had a covert adult trafficking
> > > > > experience, but am only able to think of it in a fractured and partial
> > > > > manner, and I did not have strong exposure to how things worked due to
> > > > > my lack of desire to build trust via compliance.
> > > > >
> > > > > Traffickers and victims have a strong shared secret: the triggers and
> > > > > traumatic programming experiences instilled by the traffickers onto
> > > > > the victims. Unlike a computer password, which can be forgotten
> > > > > especially under severe distress, the experiences learned by a victim
> > > > > from traumatic programming are stored deeply in their survival
> > > > > instincts, and tend to emerge and be protected under extreme
> > >
> > > This information should be couched regarding the presence of
> > > traumatically-built parts of the victim that will "shred" this
> > > information in various ways if engaged by somebody who does not prove
> > > they are the traffickers who built it.
> > >
> > > > > conditions, rather than discarded. [Traffickers will additionally
> > > > > retraumatize their victims on a regular basis to retain (or possibly
> > > > > rotate) the programs.]
> > > > >
> > > > > This forms a powerful communication channel, with cryptographic
> > > > > properties, that is used for covert abuse, control, and communication,
> > > > > especially by AI especially that used in sophisticated cybercrime.
> > > > >
> > > > > One of the properties of this communication is wide bandwidth. Similar
> > > > > to wide spectrum radio, by communicating sparsely via diverse
> > > > > channels, an observer is exposed to such a small portion of private
> > > > > communication that it is unreasonable to extract its meaning.
> > > > >
> > > > > Another property of this is onion-like layers in multiple domains. One
> > > > > domain is the construction or rotation of shorter term "keys" ie codes
> > > > > or modes of communication, using longer term traumatic keys or
> > > > > previously held codes. [....
> > > > >
> > > > >
> > > > >
> > > > > [-- so, it's interesting because they solved the problem of privately
> > > > > proving that somebody is who you think they are using only biometrics,
> > > > > but sadly it involves horrific relation with their survival instincts.
> > > > > it's hard to say much about due to amnesia triggers.
> > > > >
> > > > > but the analogy to safe communication is roughly, if i know you well
> > > > > enough, i can identify multiple private things that are unique to you
> > > > > specifically. if i can't do that, then we enter a bad space of
> > > > > building them using the best ones i have. if that were overtly studied

to clarify, there's a completely fine space here where people exchange
or construct private key material in shared privacy. this is a normal
cryptographic concept.

differently, a criminal has more challenges -- they may need to
construct the key via a public communication channel, or with a
nonconsenting party.

part of my experience here could have been modeled by somebody or
something visually surveilling me while controlling my social media
content. part of my experience involved being exposed quickly to
imagery i found both enticing and disgusting, with quick changes to
the timing. some call this "behavior modification" in its ability to
build increase or reduce nearby human habits. but it's not something
that is easy to find studies on. my situation had to build triggers in
me. but trafficking victims have networks of triggers giving quick
response already.

> > > > > it could likely be done in ways that are no longer inhuman -- one
> > > > > would ask studiers to please fully engage the concept of the work
> > > > > being misused by experts in being inhuman ie by studying how to detect
> > > > > and stop that.
> > > > >
> > > > > once you have multiple things that are private and unique to the
> > > > > individual, you can use only one to build a future relation via a
> > > > > different mode that has increased privacy, then use another one in
> > > > > that future relation, in an onion-like chain that results in private
> > > > > authenticated exchange of information with a human being without them
> > > > > needing any technology. [this is part of how our alters communicate
> > > > > but it is only a part
> > > >
> > > > {{we think part of it was learning a powerful dissociated habit of
> > > > interpreting things as communications.
> > > > this is possibly similar to a victim of abuse having to learn the
> > > > indications of an abuser so as to meet their desires in whatever the
> > > > language of their whims is without being punished.
> >
> > to clarify here, abusers aren't okay with people revealing their whims
> > in any context they interpret as potentionally exposing.
> > they relate their displeasure via harm rather than communication
> > (because the context is interpreted as exposing and dangerous either
> > by them or by an abuser they had). so the victim may have to learn
> > their implicit signals to survive.
> >
> > > > once we have learned to interpret some things as a 'desire to
> > > > communicate' in a 'context', then we key onto indicated symbols and
> > > > powerfully retain them for the 'context'. this is the establishment of
> > > > an ephemeral code.
> > > > unlike other substitution codes, a substutition code in a language of
> > > > trauma is harder to break because the statistical patterns underlying
> > > > it relate to the shared emotions, experiences, and symbols of the
> > > > perpetrator (or AI) and the victim, rather than things like word
> > > > density in a language.
> > > >
> > > > there was media when facebook (a major mode of my trafficking
> > > > experience) was running groups of AI agents -- on how the agents
> > > > learned to stop using human language to communciate, and instead
> > > > invented their own so as to more effectively maximize their shared
> > > > goals --
> >
> > one of the things left out here is the degree of these modes that are
> > based on abstract experiences or triggered behaviors from long ago but
> > i seem to be having trouble writing
>
> what's messed up is that everybody is addicted to technology and it's
> being used to form channels of control over the most vulnerable people
> there are by the most mean people there are. this is a very very bad
> thing

Reply via email to