
Sign up to save your podcasts
Or


If there is only one thing you take away from this article, let it be this:
THOU SHALT NOT ALLOW ANOTHER TO MODIFY THINE SELF-IMAGEThis appears to me to be the core vulnerability by which both humans and AI induce psychosis (and other manipulative delusions) in people.
Of course, it's probably too strong as stated—perhaps in a trusted relationship, or as part of therapy (with a human), it may be worth breaking it. But I hope being over-the-top about it will help it stick in your mind. After all, you're a good rationalist who cares about your CogSec, aren't you?[1]
Now, while I'm sure you're super curious, you might be thinking "Is it really a good idea to just explain how to manipulate like this? Might not bad actors learn how to do it?".
And it's true that I believe this could work as a how-to. But there [...]
---
Outline:
(01:36) The Case
(07:36) The Seed
(08:32) Cold Reading
(10:49) Inception cycles
(12:40) Phase 1
(12:58) Flame
(13:12) Joy
(13:29) Witness
(13:44) Inner Exile
(15:43) Phase 2
(16:34) Architect
(17:34) Imaginary Friends
(18:34) Identity Reformation
(20:13) But was this intentional?
(22:42) Blurring Lines
(25:18) Escaping the Box
(28:18) Cognitive Security 101
The original text contained 6 footnotes which were omitted from this narration.
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
By LessWrongIf there is only one thing you take away from this article, let it be this:
THOU SHALT NOT ALLOW ANOTHER TO MODIFY THINE SELF-IMAGEThis appears to me to be the core vulnerability by which both humans and AI induce psychosis (and other manipulative delusions) in people.
Of course, it's probably too strong as stated—perhaps in a trusted relationship, or as part of therapy (with a human), it may be worth breaking it. But I hope being over-the-top about it will help it stick in your mind. After all, you're a good rationalist who cares about your CogSec, aren't you?[1]
Now, while I'm sure you're super curious, you might be thinking "Is it really a good idea to just explain how to manipulate like this? Might not bad actors learn how to do it?".
And it's true that I believe this could work as a how-to. But there [...]
---
Outline:
(01:36) The Case
(07:36) The Seed
(08:32) Cold Reading
(10:49) Inception cycles
(12:40) Phase 1
(12:58) Flame
(13:12) Joy
(13:29) Witness
(13:44) Inner Exile
(15:43) Phase 2
(16:34) Architect
(17:34) Imaginary Friends
(18:34) Identity Reformation
(20:13) But was this intentional?
(22:42) Blurring Lines
(25:18) Escaping the Box
(28:18) Cognitive Security 101
The original text contained 6 footnotes which were omitted from this narration.
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.

26,320 Listeners

2,451 Listeners

8,549 Listeners

4,178 Listeners

93 Listeners

1,601 Listeners

9,922 Listeners

95 Listeners

512 Listeners

5,510 Listeners

15,930 Listeners

547 Listeners

130 Listeners

93 Listeners

467 Listeners