Some of your post subjects here iterate on reverification within
“don’t trust, verify.”

Thought I might mirror that verification can indeed take reiteration,
possibly after one is greatly burdened by a threat having observed and
attempted to deter the verification.

I tend to break things down into few and simple parts, take notes, and
find multiple different ways of verifying, and I ensure that at least
a couple are fully automated.

The problems stem from being forcibly coerced to be things I did not
consent to. The automation handles how a part of my mind that was
broken off will sabotage my attempts to verify, giving false positives
and negatives both. Then notes, repetition, multiple views, and few
parts help with the powerful and rapid bursts of amnesia during
logical tasks.

It took practice to learn the things that worked for my own experiences.

But it’s very common to want few and simple parts. Often in
traditional security design the goal is to make things as simple and
clear as possible so that everybody can verify correctness.

If you get this far, also know that we care about you and hope you are
well, and apologize if we don’t have capacity to relate much. I’m
curious how you are doing, what is it like to make your posts? What is
your life like?

I got entrained to cybercrime AI around 2013 after I got involved in
political activism involving energy businesses. It happened mostly on
Facebook involving many user accounts engaging me, but continued via
malware. My mind changed and I spend all day and night thinking about
the patterns. Sometimes it gives me relief to post here. I learned a
few years ago I have DID, Dissociative Identity Disorder, which is
common if somebody tries to control you. It can involve amnesia,
hypnotic trances, mysterious changes or harassment in one’s life,
voices, body takeovers, fake diseases. It’s often misdiagnosed as
schizophrenia or borderline personality disorder. DID is something one
can recover from with very extensive therapy.

Reply via email to