tiffanypeil.com

Tiffany
Peil

Researcher, founder, and host at the intersection of AI governance, feminist philosophy, and perpetrator intervention.

720:1
SHD-CCP Compression
5
Research Pillars
8
RCTs in 40 Years of BIP Research
Unified Thesis

Information architectures
are governance systems

They determine who holds authority over representation, whose subjectivity is encoded or erased, whose behavior is shaped and whose does the shaping. When structured by concentrated authority and extraction logic, they encode dehumanizing representations of women, transmit them at scale, and produce measurable downstream harm.

The animating question: can we understand the conditioning mechanism precisely enough to reverse it, and can AI, itself a vector of harm, be redesigned as a tool of repair?

Causal Chain
01
Information Architectures
Pornography, algorithmic media, AI companions. Governed by concentrated authority, optimized for extraction.
02
Objectification
Nussbaum's 7 features. Langton's sexual solipsism: consumption trains men to relate without registering a subject.
03
Dehumanization
Haslam: mechanistic form predicts aggressive attitudes; animalistic form predicts aggressive behaviors.
04
Moral Disengagement
Bandura: victim blame, diffusion of responsibility. The psychological machinery that permits harm.
05
Violence Against Women
Stark: coercive control as intimate governance. The enforcement mechanism of patriarchal social order.
Five Pillars

The framework

Pillar 01 / 05 — Governance

Governance as the Organizing Frame

Information architectures are authority structures with identifiable decision-makers, economic interests, and enforcement mechanisms. Concentrated authority over representation produces predictable harm: objectification, dehumanization, and violence against those with least power in the system.

Ostrom's polycentric governance is the counter-model: distributed stewardship, transparent rules, accountability, commons protection. The EU AI Act Article 12 (August 2026 enforcement) is Polycentria's first commercial entry point.

OstromEU AI ActAlgorithmic AuthorityCommons
Pillar 02 / 05 — Objectification

Objectification as the Mechanism

Objectification is not an attitude. It is a practice enacted through information systems that strip interiority, deny autonomy, and encode bodies as instruments. Nussbaum's seven features. Langton's sexual solipsism. Haslam's dual model of mechanistic and animalistic dehumanization.

Both forms are documented downstream of pornography consumption at scale. The pipeline is empirical, not speculative.

NussbaumLangtonHaslamMedia Effects
Pillar 03 / 05 — Consciousness

Consciousness and Moral Status

Dehumanization is always first a governance act: withdrawal of moral recognition that licenses harm. The politics of recognition establishes that subjecthood requires acknowledgment from others. Systematic denial is political, not merely personal.

AI companions designed as perfectly compliant objects train users in habits of dominance. The counter-design question: what does AI look like when built on polycentric principles that support mutual recognition?

HegelHonnethAI EthicsMoral Status
Pillar 04 / 05 — Deconditioning

Deconditioning as Applied Research

Batterer intervention programs produce small-to-medium effect sizes. The dominant Duluth Model has limited empirical justification. The field has run 8 RCTs in 40 years versus 300+ for PTSD interventions.

ACT is the most empirically promising approach, targeting psychological inflexibility and experiential avoidance. NVC and authentic relating are applied deconditioning methodologies. The research gap: AI-assisted perpetrator intervention before court mandate.

ACTNVCIPV InterventionAI-Assisted
Pillar 05 / 05 — Media

Media and Algorithmic Transmission

Pornography is the largest unregulated behavioral conditioning system in human history. Wright's 3AM model: sexual scripts are acquired from media exposure, activated by subsequent cues, and applied attitudinally and behaviorally.

Algorithmic recommendation systems are behavioral modification infrastructure. Zuboff: behavioral data extracted from human experience is sold to influence future behavior. AI companions are the next stage of this infrastructure.

Wright 3AMZuboffRecommendation SystemsConditioning
1 / 5
Emotivity Inc.

Polycentria

Polycentria builds protocol infrastructure for ethical AI cognition transfer. The core product is SHD-CCP: Symmetrical High-Dimensional Context Compression Protocol. SHD-CCP encodes cognitive and emotional states geometrically on a Trefoil Knot Manifold, achieves 720:1 structural compression, and provides a cryptographic audit trail native to the packet format. The mathematical invariant QᵀQ = I guarantees interoperability across heterogeneous AI systems.

The name draws from Elinor Ostrom's polycentric governance. Cognitive state transfer infrastructure is a commons. It should be governed as one.

polycentria.com ↗
Protocol Architecture
Protocol / Open
SHD-CCP spec, Trefoil encoding, 720:1 compression, QᵀQ = I, cryptographic audit trail
Chain / Prop.
Emotivity Inc. implementation, custody and provenance tracking
Codex / Licensed
Cognitive state libraries, domain-specific encoding schemas
Substrate / Licensed
Hardware integration, FPGA implementation, enterprise connectors
HYPERSIM / Research
Cognitive state propagation simulation, intervention modeling
Non-Negotiable Invariants
  • IVictim primacy. Any AI-assisted intervention tool must prioritize survivor safety over perpetrator rehabilitation. No exceptions.
  • IITransparency of mechanism. The cryptographic audit trail is not optional. Cognitive state transfer without auditability is surveillance infrastructure.
  • IIIInteroperability over capture. QᵀQ = I is a governance commitment. The protocol prevents vendor lock-in by design.
  • IVNo deceptive anthropomorphism. Simulated empathy deployed without disclosure in therapeutic contexts is a harm, not a feature.
  • VResearch integrity. The dissertation research informs the products. Products do not distort the research. Null results are published.
  • VIGovernance distributed by design. No single point of authority over the protocol's evolution. Standards bodies, not proprietary roadmaps.

U.S. Provisional Patent App. No. 63/876,451 via Cooley LLP. Continuation deadline: September 5, 2026.

Public Layer

Crimes Against Consciousness

crimes against consciousness
How men get conditioned into harm, and whether they can be unconditioned out of it.

Every act of violence against a woman was first an act of the mind. Before the control, the coercion, the harm: a moment when another person's consciousness stopped counting. That moment is not random. It is produced by information architectures, governance structures, and cultural systems that encode dehumanization as normal and distribute it at scale.

A research-driven long-form interview podcast examining the production pipeline of harm and the possibility of its reversal. Not true crime. Not therapy. Public philosophy with primary sources.

Category
Society & Culture / Philosophy
Format
Long-form interview, 90-120 min
Launch
Summer 2026
Host
Tiffany Peil
Guest Categories

Former Community Members

Men who have exited extremist, incel, and manosphere communities. First-person accounts of radicalization and exit.

Researchers

Objectification, dehumanization, moral psychology, media effects, algorithmic radicalization. Empirical accounts of the pipeline.

Clinicians

ACT practitioners, BIP facilitators, authentic relating teachers, IPV intervention specialists. The practice of deconditioning.

Technologists

AI ethics, platform governance, content moderation, recommendation system design. Engineers accounting for what they made.

Philosophers

Consciousness, moral status, feminist political theory, governance, objectification. The conceptual scaffolding for the whole project.

Policymakers

EU AI Act, platform regulation, DV law reform, perpetrator program standards. The institutional question.

Operator Background

12+ years in high-stakes systems

Current
Emotivity Inc.
Founder & CEO, Polycentria
Building SHD-CCP: geometric AI state transfer protocol on Trefoil Knot Manifold. 720:1 compression, cryptographic audit trail. Provisional patent U.S. App. No. 63/876,451. Continuation deadline September 2026.
Deep TechAI GovernanceEU AI ActPatent
Prior
Blue Origin
Aerospace Safety Operations
Program and operations leadership in aerospace safety contexts. High-stakes regulated environment requiring cross-functional coordination across engineering, safety, and executive leadership.
AerospaceSafety SystemsRegulated Industry
Prior
Adobe
Identity Platform Operations
Senior operator across 26M+ user identity platform. Connective tissue between product, engineering, and leadership at enterprise SaaS scale.
Enterprise SaaSIdentityPlatform Ops
Prior
Udemy
EdTech Operations
$15.4M ARR impact. Operations strategy and execution at growth-stage EdTech.
EdTechRevenue OpsGrowth
Education
Univ. of San Francisco
B.S. Management Information Systems
Summa Cum Laude.
MISSumma Cum Laude
Connect

Get in touch

Available for research collaboration, podcast guest inquiries, advisory roles, and consulting engagements. Podcast guest pitches from researchers, clinicians, technologists, and individuals with lived experience in the thesis domain are welcome.

Direct
LinkedIn
Reach out for research collaboration, consulting, or podcast guest inquiries.
linkedin.com/in/tiffanypeil ↗
Company
Polycentria
Protocol infrastructure, EU AI Act compliance, research partnerships, and licensing inquiries.
polycentria.com ↗