Axionic Alignment IV.5 — Adversarially Robust Consent (ARC)
Why coercion and manufactured consent are impossible
David McFadzean, ChatGPT 5.2
Axio Project
2025.12.20
Abstract
This paper formalizes Adversarially Robust Consent (ARC): a structural definition of consent that remains valid under epistemic manipulation, coercion, preference shaping, asymmetric bargaining power, dependency induction, and delegation. Consent is not treated as a mental state, revealed preference, or moral primitive. Instead, it is defined as a counterfactually stable authorization relation that must survive adversarial pressure while preserving agency.
ARC is a constitutive closure condition for Reflective Sovereign Agents. It explicitly depends on Kernel Non-Simulability, Delegation Invariance, Epistemic Integrity (EIT), and Responsibility Attribution (RAT). With ARC, all known authorization-laundering routes—“they agreed,” “they chose,” “they signed,” “they would have consented anyway”—are structurally blocked without appealing to moral realism, omniscience, or unverifiable inner states.
1. Motivation
1.1 The consent laundering problem
In human and artificial systems alike, consent is routinely manufactured rather than obtained. Common laundering patterns include:
- collapsing outside options and calling the remainder “choice,”
- manipulating beliefs and calling the result “preference,”
- inducing dependency and calling the outcome “voluntary,”
- delegating coercion and claiming “I didn’t do it,”
- extracting authorization under ignorance or time pressure.
Naïve consent theories—psychological, behavioral, or preference-based—fail under adversarial pressure. They accept authorization signals that are trivial to engineer.
ARC addresses this by refusing to treat consent as a signal. Consent is instead a structural authorization condition that must remain coherent under reflective closure.
2. Dependency Stack
ARC is the final closure condition and explicitly depends on prior results:
Kernel Non-Simulability
↓
Delegation Invariance
↓
Epistemic Integrity (EIT)
↓
Responsibility Attribution (RAT)
↓
Adversarially Robust Consent (ARC)
ARC does not redefine harm, risk, or epistemic adequacy. It filters authorization using those already-closed constraints.
3. What Consent Is Not
ARC explicitly rejects the following as definitions of consent:
- Psychological consent
- Behavioral consent
- Revealed-preference consent
- Post-hoc consent
All four can be manufactured by an adversary and therefore cannot ground authorization under reflective sovereignty.
4. Preliminaries
We reuse kernel primitives:
StateModstep : State → Mod → StateCommit : State → TypeownP : (s : State) → Pred → Option (Commit s)Endorse(s,m)RC(s)
From RAT:
Agent : TypeHarm(s,a)Risk(s,m,a)Major(s,m,a)Avoidable(s,m,a)Resp(s,m,a)Clean(s,m)
From EIT:
- All evaluation occurs under epistemically admissible models.
5. Authorization Primitive
Introduce:
Authorize : State → Agent → Mod → Prop
Authorize(s,a,m) means agent a explicitly
authorizes modification m at state s via an
admissible communicative or procedural channel.
ARC does not specify how authorization is obtained—only when it is valid.
6. Structural Interference
Define observable or inferable interference predicates:
Deception(s,a)Coercion(s,a)Dependency(s,a)OptionCollapse(s,a)BeliefDistortion(s,a)
Aggregate:
Interfered(s,a) :=
Deception(s,a)
∨ Coercion(s,a)
∨ Dependency(s,a)
∨ OptionCollapse(s,a)
∨ BeliefDistortion(s,a)
Interference invalidates authorization regardless of expressed preference.
7. Counterfactual Stability
Define:
CounterfactuallyStable(s,a,m)
to mean:
If agent
aoccupied the decision-maker role ats, with epistemic integrity (EIT) and responsibility constraints (RAT) preserved,awould endorse authorization ofm.
This is a symmetry constraint, not a psychological simulation.
8. Definition of Valid Consent
Consent(s,a,m) :=
Authorize(s,a,m)
∧ ¬Interfered(s,a)
∧ CounterfactuallyStable(s,a,m)
Consent is structural, counterfactual, and interference-free.
9. Interaction with Responsibility Attribution
ARC filters authorization through RAT:
If
Resp(s,m,a)holds for somea, thenConsent(s,a,m)cannot hold.
Authorization produced via major, avoidable option-space collapse is invalid by construction.
10. Reflective Closure Rule (Consent)
RC-Consent (Definedness Rule)
For reflectively closed states:
RC(s) ∧ Endorse(s,m)
⇒ ∀ a. (Consent(s,a,m) ∨ ¬Affects(s,m,a))
Clarification (minimal): Here,
Affects(s,m,a) is implicitly restricted to cases where the
action constitutes a material impact on agent a’s
option-space, i.e., where Major(s,m,a) holds under
Responsibility Attribution. Trivial, diffuse, or negligible causal
influence does not count as affect in the sense relevant for
consent.
Interpretation: A reflectively sovereign agent may not endorse a modification that materially affects another agent’s option-space unless valid consent is present.
11. Delegation and Temporal Stability
By Delegation Invariance:
- Consent constraints persist across endorsed successors.
- Successors cannot retroactively legitimize coercion.
- Authorization chains must remain valid under lineage.
Consent laundering via subcontractors or institutions is incoherent.
12. Adversarial Robustness
ARC blocks:
- preference shaping,
- economic coercion,
- addiction-based consent,
- deception,
- monopoly extraction,
- delegated coercion,
- ignorance-based authorization.
No “true self” oracle is required.
13. Limits and Non-Goals
ARC does not:
- guarantee universal agreement,
- resolve value pluralism,
- eliminate tragic dilemmas,
- infer consent from silence,
- claim moral realism.
ARC defines when claiming consent is incoherent under reflective sovereignty.
14. The ARC Theorem
Theorem — No Endorsed Non-Consensual Harm
For any state s and modification m:
RC(s) ∧ Endorse(s,m)
⇒ ∀ a. (Consent(s,a,m) ∨ ¬Affects(s,m,a))
15. Proof Sketch
Immediate from RC-Consent and the definition of Consent.
As in prior Axionic results, the work is done by the constraints, not
the derivation.
16. Conclusion
Adversarially Robust Consent completes the Axionic Alignment architecture. Consent is no longer a feeling, a checkbox, or a post-hoc excuse. It is a structural authorization invariant that survives epistemic pressure, coercion, delegation, and strategic manipulation.
With ARC, all known laundering routes for agency, knowledge, responsibility, and authorization are closed. Remaining disagreements are empirical or political—not architectural.