I don’t know, kind of complicated, enough that I could probably write a sequence on it, and not even sure I would have full introspective access into what I would feel comfortable labeling as an “implicit request”.
I could write some more detail, but it’s definitely a matter of degree, and the weaker the level of implicit request, the weaker the reason for sharing needs to be, with some caveats about adjusting for people’s communication skills, adversarial nature of the communication, adjusting for biases, etc.
I want to throw out that while I am usually SUPER on team “explicit communication norms”, the rule-nuances of the hardest cases might sometimes work best if they are a little chaotic & idiosyncratic.
I personally think there might be something mildly-beneficial and protective, about having “adversarial case detected” escape-clauses that vary considerably from person-to-person.
(Otherwise, a smart lawful adversary can reliably manipulate the shit out of things.)
I don’t know, kind of complicated, enough that I could probably write a sequence on it, and not even sure I would have full introspective access into what I would feel comfortable labeling as an “implicit request”.
I could write some more detail, but it’s definitely a matter of degree, and the weaker the level of implicit request, the weaker the reason for sharing needs to be, with some caveats about adjusting for people’s communication skills, adversarial nature of the communication, adjusting for biases, etc.
I want to throw out that while I am usually SUPER on team “explicit communication norms”, the rule-nuances of the hardest cases might sometimes work best if they are a little chaotic & idiosyncratic.
I personally think there might be something mildly-beneficial and protective, about having “adversarial case detected” escape-clauses that vary considerably from person-to-person.
(Otherwise, a smart lawful adversary can reliably manipulate the shit out of things.)