
Sign up to save your podcasts
Or
If there is only one thing you take away from this article, let it be this:
THOU SHALT NOT ALLOW ANOTHER TO MODIFY THINE SELF-IMAGEThis appears to me to be the core vulnerability by which both humans and AI induce psychosis (and other manipulative delusions) in people.
Of course, it's probably too strong as stated—perhaps in a trusted relationship, or as part of therapy (with a human), it may be worth breaking it. But I hope being over-the-top about it will help it stick in your mind. After all, you're a good rationalist who cares about your CogSec, aren't you?[1]
Now, while I'm sure you're super curious, you might be thinking "Is it really a good idea to just explain how to manipulate like this? Might not bad actors learn how to do it?".
And it's true that I believe this could work as a how-to. But there [...]
---
Outline:
(01:36) The Case
(07:36) The Seed
(08:32) Cold Reading
(10:49) Inception cycles
(12:40) Phase 1
(12:58) Flame
(13:12) Joy
(13:29) Witness
(13:44) Inner Exile
(15:43) Phase 2
(16:34) Architect
(17:34) Imaginary Friends
(18:34) Identity Reformation
(20:13) But was this intentional?
(22:42) Blurring Lines
(25:18) Escaping the Box
(28:18) Cognitive Security 101
The original text contained 6 footnotes which were omitted from this narration.
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
If there is only one thing you take away from this article, let it be this:
THOU SHALT NOT ALLOW ANOTHER TO MODIFY THINE SELF-IMAGEThis appears to me to be the core vulnerability by which both humans and AI induce psychosis (and other manipulative delusions) in people.
Of course, it's probably too strong as stated—perhaps in a trusted relationship, or as part of therapy (with a human), it may be worth breaking it. But I hope being over-the-top about it will help it stick in your mind. After all, you're a good rationalist who cares about your CogSec, aren't you?[1]
Now, while I'm sure you're super curious, you might be thinking "Is it really a good idea to just explain how to manipulate like this? Might not bad actors learn how to do it?".
And it's true that I believe this could work as a how-to. But there [...]
---
Outline:
(01:36) The Case
(07:36) The Seed
(08:32) Cold Reading
(10:49) Inception cycles
(12:40) Phase 1
(12:58) Flame
(13:12) Joy
(13:29) Witness
(13:44) Inner Exile
(15:43) Phase 2
(16:34) Architect
(17:34) Imaginary Friends
(18:34) Identity Reformation
(20:13) But was this intentional?
(22:42) Blurring Lines
(25:18) Escaping the Box
(28:18) Cognitive Security 101
The original text contained 6 footnotes which were omitted from this narration.
---
First published:
Source:
---
Narrated by TYPE III AUDIO.
---
Images from the article:
Apple Podcasts and Spotify do not show images in the episode description. Try Pocket Casts, or another podcast app.
26,373 Listeners
2,429 Listeners
8,189 Listeners
4,159 Listeners
92 Listeners
1,554 Listeners
9,812 Listeners
88 Listeners
484 Listeners
5,476 Listeners
16,145 Listeners
532 Listeners
133 Listeners
96 Listeners
510 Listeners