For travel through neighboring grabby civs, mm, I guess you’d want to get to know them first. Are there ways they could prove that they’re a certain kind of civ, with a certain trusted computing model, that lets them prove that they wont leak you?
For travel through neighboring primitive civs in the vulnerable stage… Maybe you’d send a warrior emissary who doesn’t attribute negative utility to any of its own states of mind. If it’s successful… Hmm… it establishes an encryption protocol with home, and only then do you start sending softer minds.
But that would all take a long time. I wonder if there’d be a way of sending it with the encryption protocol already determined (so it could start accepting your minds without having to send you a public key first), in such a way that it would provably only be able to decrypt later messages if it conquered the target system successfully, maybe this protocol would require it to make use of more resources to compute the keys than it would be worth spending for the adversary, if they wanted to extort you. 5 years of multiple stars running hashers.
Might not be the most profitable approach.
Maybe a mindpattern that elegantly mixes suffering-proof eudaimonia generation with the production of proofs of conquest.
For travel through neighboring grabby civs, mm, I guess you’d want to get to know them first. Are there ways they could prove that they’re a certain kind of civ, with a certain trusted computing model, that lets them prove that they wont leak you?
For travel through neighboring primitive civs in the vulnerable stage… Maybe you’d send a warrior emissary who doesn’t attribute negative utility to any of its own states of mind. If it’s successful… Hmm… it establishes an encryption protocol with home, and only then do you start sending softer minds.
But that would all take a long time. I wonder if there’d be a way of sending it with the encryption protocol already determined (so it could start accepting your minds without having to send you a public key first), in such a way that it would provably only be able to decrypt later messages if it conquered the target system successfully, maybe this protocol would require it to make use of more resources to compute the keys than it would be worth spending for the adversary, if they wanted to extort you. 5 years of multiple stars running hashers.
Might not be the most profitable approach.
Maybe a mindpattern that elegantly mixes suffering-proof eudaimonia generation with the production of proofs of conquest.