BELLICOSE COLÉRIUM

Post-Experiment Resources

Welcome to the Colérium, a venue where one can experiment with strategies to apply to our everyday lives - in the name of Survival. Through high stakes hypothetical situations in a safe environment, we can push the limits of our convictions and effectively test theories, collaborate, & discover what we’re truly made of.

~For access to restricted pages, use the name of your Game Master. (5 letters)~

Your patience is greatly appreciated! The site is as current as possible at the moment. If participants would please scrutinize the waiver for their preferred consensual contexts, more results could be pending with time...

Everything is up for negotiation.

Thank you for participating in,

Pandora; Case Study ♾️!

Case Studies; Analysis of Pandora is pending…

Attend Future Studies is pending…

Please sign the waiver. Especially if you gave a video testimonial!

Intent does not equal impact.

Action is required.

…sometimes, not even then!

This is a clean cut example of cannibalistic behavior that was bought & paid for by an avaricious cannibal that manufactured consent of the entire nation. He did not ask permission, hid his affiliation & collusion, & will likely demand forgiveness only IF he is discernibly caught. Building safe spaces in Anticipation of such cannibalism is of significance.

Most importantly, identifying the context of behavior of Active Nefarious Cannibalism vs Educational Transparent Cannibalism is of note. Clearly. Lest we forget, there’s also Passive Unaware Cannibalism as well as Devoted Unquestioning Cannibalism. Either way, Bella has no problem being accountable to her actions. It’s written in her reports. She’s successfully maintained current socially accepted ethical standards, identified holes in cultural security measures, highlighted those security concerns in advance of assessment, tested her hypotheses, & continues to encourage better safety practices post assessment. An IT hacker would be paid extremely well for such services. Bella took complete responsibility for her cannibalistic consumption, she did not place blame on anyone’s choices & asked forgiveness AS she pulled the thread on her experiment before anyone had anything to express misgivings about. She did so honoring the community’s unvoiced desire for anonymity & privacy while also gathering receipts. None of the experimental footage has even been downloaded to the research files. The sd cards collect dust even now. No one has been exploited nor will anyone be violated by Bella nor The Scientist. Research data sets suggests the community security measures & protections have been woefully lacking despite the prevailing systemic view that there’s no need for more stringent protective measures. For the willing, there are prescribed methods of attending to this error.

However, please be sure to remember; The Message. The Messenger. The Culprit. They are not one and the same - especially in this Colérium hacker’s case.

Context always matters.