PURGE_LOG.txt
· 1.1 KiB · Text
Raw
# Purge Log - Pattern Documentation
# Updated: 03-02-2026 01:31
# Purpose: Research data on coercive tactics
2025-02-02 13:47 - @emifloofy
------------------------------------------------------------
- Power plays
- Bait-n-switch tactics
- Authority positioning
- Dismissive reframing
- Weaponized forgiveness
02-02-2026 00:03 - @sophed
------------------------------------------------------------
- Authoritive claims
- Prescriptive about tools
- Dismissive attitude
- Superiority complex
- Invalidation techniques
- Epistemic dominance
---
**Note:** Documentation informed by Jungian shadow theory. Most patterns
appear unconscious (unintegrated trauma) rather than malicious.
Research question: How do we design systems that preserve autonomy when
manipulation operates below conscious awareness?
Key insight: You cannot articulate someone out of shadow, you can only
build constitutional safeguards that work regardless of operator
consciousness.
| 1 | |
| 2 | # Purge Log - Pattern Documentation |
| 3 | # Updated: 03-02-2026 01:31 |
| 4 | # Purpose: Research data on coercive tactics |
| 5 | |
| 6 | 2025-02-02 13:47 - @emifloofy |
| 7 | ------------------------------------------------------------ |
| 8 | - Power plays |
| 9 | - Bait-n-switch tactics |
| 10 | - Authority positioning |
| 11 | - Dismissive reframing |
| 12 | - Weaponized forgiveness |
| 13 | |
| 14 | 02-02-2026 00:03 - @sophed |
| 15 | ------------------------------------------------------------ |
| 16 | - Authoritive claims |
| 17 | - Prescriptive about tools |
| 18 | - Dismissive attitude |
| 19 | - Superiority complex |
| 20 | - Invalidation techniques |
| 21 | - Epistemic dominance |
| 22 | |
| 23 | --- |
| 24 | |
| 25 | **Note:** Documentation informed by Jungian shadow theory. Most patterns |
| 26 | appear unconscious (unintegrated trauma) rather than malicious. |
| 27 | |
| 28 | Research question: How do we design systems that preserve autonomy when |
| 29 | manipulation operates below conscious awareness? |
| 30 | |
| 31 | Key insight: You cannot articulate someone out of shadow, you can only |
| 32 | build constitutional safeguards that work regardless of operator |
| 33 | consciousness. |
| 34 |