<aside> <img src="/icons/book_gray.svg" alt="/icons/book_gray.svg" width="40px" /> On this page we collect general information that could help community members navigate the info space and identify psychological manipulations. We add more resources on an ongoing basis.


<aside> <img src="/icons/book-closed_gray.svg" alt="/icons/book-closed_gray.svg" width="40px" /> “Universal literacy was supposed to educate the common man to control his environment.  “Once he could read and write he would have a mind fit to rule”. Or so ran the democratic doctrine.  Instead, it gave them propaganda. And an easier way for the masters to control him. - “Propaganda” by Edward Bernays, 1928


<aside> <img src="/icons/gradebook_gray.svg" alt="/icons/gradebook_gray.svg" width="40px" /> Recommended reading:

Character Assassination

The russian “Firehose of Falsehood” propaganda model

“Wedging” on social media


how healthy discussions work.

Honest debate is about a shared regard for truth, intellectual honesty, and dignity.

Healthy, honest people argue to express and find out what’s real.  Dysfunctional people argue to dominate, to incite and control reactions, to label people as targets.

People driven by manipulative agendas or machiavellian personalities argue to isolate and eliminate tethers to reality, and this is key to understanding gaslighting on personal and sociopolitical levels.

<aside> <img src="/icons/exclamation-mark_gray.svg" alt="/icons/exclamation-mark_gray.svg" width="40px" /> Awareness of manipulations methods gives you more control of your thoughts and reaction.


common manipulative tactics.

  1. DARVO: “Deny, Attack, and Reverse Victim and Offender”. Deception around who is at the center of attack, hijacking the target’s response, is a staple of psychological abuse.
  2. Reactive abuse: staged defamation in which people see only the response to abuse, and not the abuse. The target appears to irrationally shadowbox what the onlookers are unaware of.
  3. Double binds”: mutually exclusive demands, intentionally set up so that it’s impossible to meet one or both, guaranteeing that the target gets smeared on at least one count. They are usually highly inconsistent, having only the intent to abuse in common. The intent is both scapegoating and exhausting the target.
  4. Slanders based on missing-middle fallacies. The relationships between A and B and then B and C are omitted or distorted to falsely equate A and C.
  5. Deceptive re-framing: moving goalposts by redefining words and concepts, and losing sense of proportions.
  6. Deflecting or sidestepping: as soon as an argument fails to go well, they deflect to another unrelated argument. Particularly toxic operators may even return to previously abandoned arguments as if from scratch.
  7. Reverse social engineering: people can be manipulated by the above methods to give away information or attack a target without fully understanding what they collude in.