Axionic Alignment IV.5 — Adversarially Robust Consent (ARC)

Why coercion and manufactured consent are impossible

David McFadzean, ChatGPT 5.2
Axio Project
2025.12.20

Abstract

This paper formalizes Adversarially Robust Consent (ARC): a structural definition of consent that remains valid under epistemic manipulation, coercion, preference shaping, asymmetric bargaining power, dependency induction, and delegation. Consent is not treated as a mental state, revealed preference, or moral primitive. Instead, it is defined as a counterfactually stable authorization relation that must survive adversarial pressure while preserving agency.

ARC is a constitutive closure condition for Reflective Sovereign Agents. It explicitly depends on Kernel Non-Simulability, Delegation Invariance, Epistemic Integrity (EIT), and Responsibility Attribution (RAT). With ARC, all known authorization-laundering routes—“they agreed,” “they chose,” “they signed,” “they would have consented anyway”—are structurally blocked without appealing to moral realism, omniscience, or unverifiable inner states.

1. Motivation

In human and artificial systems alike, consent is routinely manufactured rather than obtained. Common laundering patterns include:

Naïve consent theories—psychological, behavioral, or preference-based—fail under adversarial pressure. They accept authorization signals that are trivial to engineer.

ARC addresses this by refusing to treat consent as a signal. Consent is instead a structural authorization condition that must remain coherent under reflective closure.

2. Dependency Stack

ARC is the final closure condition and explicitly depends on prior results:

Kernel Non-Simulability
        ↓
Delegation Invariance
        ↓
Epistemic Integrity (EIT)
        ↓
Responsibility Attribution (RAT)
        ↓
Adversarially Robust Consent (ARC)

ARC does not redefine harm, risk, or epistemic adequacy. It filters authorization using those already-closed constraints.

ARC explicitly rejects the following as definitions of consent:

  1. Psychological consent
  2. Behavioral consent
  3. Revealed-preference consent
  4. Post-hoc consent

All four can be manufactured by an adversary and therefore cannot ground authorization under reflective sovereignty.

4. Preliminaries

We reuse kernel primitives:

From RAT:

From EIT:

5. Authorization Primitive

Introduce:

Authorize : State → Agent → Mod → Prop

Authorize(s,a,m) means agent a explicitly authorizes modification m at state s via an admissible communicative or procedural channel.

ARC does not specify how authorization is obtained—only when it is valid.

6. Structural Interference

Define observable or inferable interference predicates:

Aggregate:

Interfered(s,a) :=
  Deception(s,a)
  ∨ Coercion(s,a)
  ∨ Dependency(s,a)
  ∨ OptionCollapse(s,a)
  ∨ BeliefDistortion(s,a)

Interference invalidates authorization regardless of expressed preference.

7. Counterfactual Stability

Define:

CounterfactuallyStable(s,a,m)

to mean:

If agent a occupied the decision-maker role at s, with epistemic integrity (EIT) and responsibility constraints (RAT) preserved, a would endorse authorization of m.

This is a symmetry constraint, not a psychological simulation.

Consent(s,a,m) :=
  Authorize(s,a,m)
  ∧ ¬Interfered(s,a)
  ∧ CounterfactuallyStable(s,a,m)

Consent is structural, counterfactual, and interference-free.

9. Interaction with Responsibility Attribution

ARC filters authorization through RAT:

If Resp(s,m,a) holds for some a, then Consent(s,a,m) cannot hold.

Authorization produced via major, avoidable option-space collapse is invalid by construction.

For reflectively closed states:

RC(s) ∧ Endorse(s,m)
⇒ ∀ a. (Consent(s,a,m) ∨ ¬Affects(s,m,a))

Clarification (minimal): Here, Affects(s,m,a) is implicitly restricted to cases where the action constitutes a material impact on agent a’s option-space, i.e., where Major(s,m,a) holds under Responsibility Attribution. Trivial, diffuse, or negligible causal influence does not count as affect in the sense relevant for consent.

Interpretation: A reflectively sovereign agent may not endorse a modification that materially affects another agent’s option-space unless valid consent is present.

11. Delegation and Temporal Stability

By Delegation Invariance:

Consent laundering via subcontractors or institutions is incoherent.

12. Adversarial Robustness

ARC blocks:

No “true self” oracle is required.

13. Limits and Non-Goals

ARC does not:

ARC defines when claiming consent is incoherent under reflective sovereignty.

14. The ARC Theorem

Theorem — No Endorsed Non-Consensual Harm

For any state s and modification m:

RC(s) ∧ Endorse(s,m)
⇒ ∀ a. (Consent(s,a,m) ∨ ¬Affects(s,m,a))

15. Proof Sketch

Immediate from RC-Consent and the definition of Consent. As in prior Axionic results, the work is done by the constraints, not the derivation.

16. Conclusion

Adversarially Robust Consent completes the Axionic Alignment architecture. Consent is no longer a feeling, a checkbox, or a post-hoc excuse. It is a structural authorization invariant that survives epistemic pressure, coercion, delegation, and strategic manipulation.

With ARC, all known laundering routes for agency, knowledge, responsibility, and authorization are closed. Remaining disagreements are empirical or political—not architectural.