Thanks. (e) is very important: that’s a large part of why my special-purpose pen name ended up being a mere “differential visibility” pseudonym (for a threat-model where the first page of my real-name Google results matters because of casual searches by future employers) rather than an Actually Secret pseudonym. (There are other threat models that demand more Actual Secrecy, but I’m not defending against those because I’m not that much of a worthless coward.)
I currently don’t have a problem with (d), but I agree that it’s probably true in general (and I’m just lucky to have such awesome friends).
I think people underestimate the extent to which (c) is a contingent self-fulfilling prophecy rather than a fixed fact of nature. You can read the implied social attack in (a) as an attempt to push against the current equilibrium.
Thanks. (e) is very important: that’s a large part of why my special-purpose pen name ended up being a mere “differential visibility” pseudonym (for a threat-model where the first page of my real-name Google results matters because of casual searches by future employers) rather than an Actually Secret pseudonym. (There are other threat models that demand more Actual Secrecy, but I’m not defending against those because I’m not that much of a worthless coward.)
I currently don’t have a problem with (d), but I agree that it’s probably true in general (and I’m just lucky to have such awesome friends).
I think people underestimate the extent to which (c) is a contingent self-fulfilling prophecy rather than a fixed fact of nature. You can read the implied social attack in (a) as an attempt to push against the current equilibrium.