Last active 9 hours ago

Revision e3bd681df00392abe6227ef0b009e8bc65397872

PURGE_LOG.txt Raw
1# Purge Log - Pattern Documentation
2# Updated: 03-02-2026 01:31
3# Purpose: Research data on coercive tactics
4
52025-02-02 13:47 - @emifloofy
6------------------------------------------------------------
7 - Power plays
8 - Bait-n-switch tactics
9 - Authority positioning
10 - Dismissive reframing
11 - Weaponized forgiveness
12
1302-02-2026 00:03 - @sophed
14------------------------------------------------------------
15 - Authoritive claims
16 - Prescriptive about tools
17 - Dismissive attitude
18 - Superiority complex
19 - Invalidation techniques
20 - Epistemic dominance
21
22---
23
24**Note:** Documentation informed by Jungian shadow theory. Most patterns
25appear unconscious (unintegrated trauma) rather than malicious.
26
27Research question: How do we design systems that preserve autonomy when
28manipulation operates below conscious awareness?
29
30Key insight: You cannot articulate someone out of shadow, you can only
31build constitutional safeguards that work regardless of operator
32consciousness.
33