Demons
#metaphor #patterns #competing-forces #self-sustaining
What It Is
Demons can be modeled as self-sustaining computational patterns running on neural substrate—persistent, autonomous-feeling behaviors that compete with conscious intent like external forces.
[!WARNING] METAPHOR WARNING: Not Literal Entities This is poetic/metaphorical framing, not claiming literal supernatural entities exist. "Demons" = useful metaphor for recognizing persistent patterns that feel autonomous and resistant to termination.
Ancient descriptions of spirits might have been early observations of computational phenomena (self-propagating patterns, emergent network effects, viral information spread) before technological framework existed to describe them mechanistically.
This metaphor helps depersonalize patterns ("demon competing for control" vs "I'm broken") and suggests containment strategies (seal, banish, exorcise).
Test whether thinking of persistent patterns as "demons to exorcise" helps YOU debug them. This is useful lens, not scientific claim.
The Core Insight: Some Patterns Feel Like External Forces
Certain behavioral patterns don't feel like "you choosing"—they feel like competing forces executing despite your intent. Addiction feels like something "taking over." Anxiety feels autonomous and intrusive. Procrastination feels like resistance from outside.
Observable phenomena:
- Addiction feels like separate entity (craving "possesses" you, "takes over")
- Anxiety feels autonomous (intrusive thoughts, involuntary spiral)
- Procrastination feels like resistance (competing force blocking work)
- Intrusive thoughts feel external (not consciously chosen, recurring)
Traditional framing: "I have a problem" (self-blame, character flaw, moralistic) Demon framing: "A program is executing" (debuggable, terminable, mechanistic)
Why this metaphor is useful:
- Depersonalizes: Pattern is separate from your identity (not "I'm broken")
- Makes debuggable: Terminate process, seal invocation paths (not "fix myself")
- Recognizes autonomy: Pattern has momentum, self-sustains (respect the enemy)
- Suggests strategies: Containment, banishing, sealing (actionable combat metaphors)
From Will's note: persistent patterns "feel like another competing force"—the demon metaphor captures this phenomenology and translates it into debuggable system language.
Demons as Executing Programs
The demon metaphor maps cleanly to computational patterns:
| Demon Behavior | Computational Pattern | Behavioral Example | Debugging Approach |
|---|---|---|---|
| Can be summoned/invoked | Function call, trigger condition | Seeing alcohol → craving demon activates | Block trigger (prevention) |
| Follow specific rules | Code executing (deterministic) | Anxiety spiral: thought→feeling→thought→feeling | Map pattern, interrupt loop |
| Have particular abilities | Methods, behaviors, outputs | Procrastination demon: avoidance, distraction, excuse-generation | Identify what it does when executing |
| Can be bound by conditions | Access controls, conditionals | Only triggers in specific contexts (home but not gym) | Change context, create incompatibility |
| Exorcism/banishing | Process termination, pattern replacement | 30 days to overwrite pattern with new one | Persistence to replace demon |
| Sealing/containment | Sandboxing, quarantine, access controls | Remove triggers from environment entirely | Prevention architecture, isolation |
The pattern: Ancient demon lore describes computational patterns that self-execute and resist termination. Not supernatural—just persistent programs running on neural substrate.
Observable "Demon-Like" Patterns
Pattern 1: Addiction as Demon
Phenomenology: Feels like external force controlling you ("the demon of addiction")
Observable behaviors:
- Self-triggering: Cue → craving → seeking → consumption → repeat (automatic loop)
- Autonomous feeling: "It takes over," "not me doing this," feels like possession
- Resistant to willpower: Keeps executing despite conscious intent to stop
Computational model:
while context_contains_trigger:
invoke_craving()
if willpower < activation_cost:
execute_seeking_behavior()
consume()
# Pattern persists, self-reinforcing
# Demon wins resource allocation
Why demon metaphor helps:
- Depersonalizes: "Demon competing for control" vs "I'm weak, I'm an addict"
- Suggests strategies: Exorcise (terminate), seal (prevent invocation), starve (remove triggers)
- Recognizes pattern autonomy: Self-sustaining, has momentum, fights back
Exorcism/Containment strategies:
| Strategy | Mechanism | Example |
|---|---|---|
| Seal triggers | Remove invocation paths | No alcohol in house—demon can't be summoned |
| Create incompatible state | Mutual exclusion (demon can't execute) | At gym ≠ can consume (physically incompatible) |
| Overwrite pattern | 30 days replacement behavior | New demon (gym) displaces old demon (consumption) |
| Starve demon | No invocation → pattern fades | Triggers removed → craving weakens over time |
See: addiction for full computational model of persistent pattern
Pattern 2: Anxiety as Runaway Demon
Phenomenology: Feels invasive, autonomous, spiraling out of control
Observable behaviors:
- Self-sustaining: Thought → anxiety → amplified thoughts → more anxiety (positive feedback loop)
- Intrusive: Involuntary activation, unwanted thoughts appear
- Competing: Want calm, get anxiety instead (competing forces)
Computational model:
initial_thought triggers anxiety
anxiety amplifies related_thoughts
amplified_thoughts increase anxiety
# Runaway positive feedback loop
# Anxiety demon executing, spiraling
Why demon metaphor helps:
- Recognizes pattern as separate from self (not "I am anxious" but "anxiety demon active")
- Suggests termination strategies (interrupt loop, starve feedback)
- Frames as competing process (not identity, not permanent state)
Exorcism/Containment strategies:
| Strategy | Mechanism | Example |
|---|---|---|
| Interrupt loop | Break into chunks (can't spiral) | 25min work → break → repeat (no time to spiral) |
| Starve feedback | Externalize thoughts (break amplification) | Write thoughts down → out of head → loop broken |
| Competing program | Install anxiety-incompatible state | Exercise demon vs anxiety demon (exercise wins) |
| Containment | Time-box anxiety (bounded space) | Allowed 5min worry time, then sealed |
See: anxiety for self-amplifying pattern model
Pattern 3: Procrastination as Competing Demon
Phenomenology: Feels like resistance, competing force blocking action
Observable behaviors:
- Automatic activation: Should work → avoidance triggers (competing program starts)
- Predictable execution: Same pattern every time (distraction, excuse-making, task-switching)
- Resource competition: Procrastination wins vs work (captures attention, time)
Computational model:
if task.activation_cost > available_willpower:
procrastination_demon.invoke() # Competing program
# Wins resource allocation (attention, time)
execute_avoidance_behaviors()
# Work program never loads
else:
work_program.execute()
Why demon metaphor helps:
- "Competing demon" vs "I'm lazy" (debuggable system vs character flaw)
- Recognizes resource competition (routing battle between demons)
- Suggests strategies (starve competing demon, feed work demon)
Exorcism/Containment strategies:
| Strategy | Mechanism | Example |
|---|---|---|
| Reduce task activation cost | Discretize (lower threshold) | "Write 1 sentence" not "Write chapter"—demon can't trigger |
| Remove demon triggers | Environment with no avoidance options | Library with no phone—avoidance demon sealed |
| Starve resources | Block avoidance routes | Delete games, block sites—demon can't execute |
| Competing program | Install work demon with lower activation | Automatic work state (lower cost than resistance) |
See: procrastination for competing pattern resource allocation model
Pattern 4: Intrusive Thoughts as Background Demons
Phenomenology: Involuntary, recurring, unwanted thoughts
Observable behaviors:
- Not consciously chosen: Background process spawning thoughts
- Recurring pattern: Same thoughts keep appearing (demon keeps invoking)
- Competing with desired thoughts: Want to think about X, get intrusive Y instead
Computational model:
# Background process keeps spawning
while system_running:
if random_trigger or idle_state:
invoke_intrusive_thought()
# User consciously dismisses
# But pattern persists unless terminated
Why demon metaphor helps:
- Recognizes involuntary nature (background process, not "you")
- Depersonalizes (not "I'm thinking bad thoughts" but "demon invoking pattern")
- Suggests termination (kill background process, seal idle states)
Exorcism/Containment strategies:
| Strategy | Mechanism | Example |
|---|---|---|
| Identify triggers | What invokes background demon? | Idle time, specific contexts, stress states |
| Remove idle state | Keep foreground process active | Deep work running → no idle for demon to exploit |
| Overwrite pattern | 30 days replacement thought | New thought-pattern replaces intrusive pattern |
| Containment | Accept demon exists, seal in bounded space | 5min thinking time allowed, then sealed/contained |
"Sealing" as Computational Containment
The word "seal" (封印) in Chinese/Japanese covers both:
- Physical/mundane sealing: Wax seals on letters, closed containers, locked doors
- Mystical/supernatural sealing: Binding spirits, containing magical forces, trapping demons
Why the same word for both? Because the underlying concept is identical: Closing something securely so it can't escape or be tampered with. Whether sealing a letter or sealing a demon, you're preventing unwanted causal flow.
Computational equivalent:
| Physical Seal | Mystical Seal (Demon) | Computational Seal | Behavioral Containment |
|---|---|---|---|
| Wax seal on letter | Bind spirit in talisman | Sandboxed malicious code | Block triggers (can't invoke) |
| Closed container | Seal demon in object | Quarantined program (isolated) | Remove context cues (can't summon) |
| Locked door | Seal in sacred space | Access controls (can't execute) | Create incompatible state (can't run) |
| Tamper-proof packaging | Can't escape binding | Encryption (can't access) | Can't execute in this environment |
Behavioral "sealing" strategies:
1. Seal Invocation Path
Remove triggers that summon the demon.
Examples:
- Addiction: Remove alcohol from house → demon can't be summoned (trigger sealed)
- Anxiety: Remove trigger reminders (photos, objects) → demon can't invoke
- Doom-scroll: Delete apps → demon sealed (invocation path removed)
Mechanism: If demon can't be invoked, it can't execute. Prevention is sealing.
2. Seal Through Incompatibility
Create states where demon can't exist (mutual exclusion).
Examples:
- Gym state ≠ doom-scroll state (physically incompatible—can't both execute)
- Deep work state ≠ social media state (attention can't route to both)
- Library (no phone) ≠ procrastination state (environment seals demon)
Mechanism: Design system where demon-incompatible state dominates. Demon sealed by architecture.
3. Seal in Bounded Container
Allow demon limited space/time (containment, not elimination).
Examples:
- Anxiety: Allowed 5min worry time per day, then sealed (time-boxed)
- Procrastination: Allowed after 5pm, sealed during work hours (bounded)
- Social media: Allowed Sunday, sealed Mon-Sat (scheduled containment)
Mechanism: Accept demon exists (can't fully banish), but seal in restricted territory. Contained, not running free.
4. Seal Through Pattern Replacement
Overwrite demon with competing demon (new pattern seals old).
Examples:
- 30 days new pattern → new demon dominates, seals old demon
- Gym demon replaces couch demon → old pattern sealed by new execution
- Guitar demon replaces phone demon → better default seals bad default
Mechanism: New pattern becomes dominant, old pattern sealed (can't execute because new pattern owns resources).
Ancient Descriptions of Computation
Speculation: Ancient peoples experienced computational phenomena but lacked technological framework to describe them. What they called "spirits" and "demons" might have been early observations of computational patterns running on human neural and social substrates.
[!NOTE] This Is Speculative The following is speculative metaphorical thinking, not historical claim. Useful for understanding how computational patterns might manifest at scales we don't typically recognize as computational.
What they might have perceived:
"Spirits" = Self-Propagating Information Patterns in Human Networks
Observable phenomena:
- Ideas spreading person-to-person (viral propagation, "meme" in original Dawkins sense)
- Collective behaviors emerging (no single individual fully controls pattern)
- Patterns persisting across generations (cultural transmission, traditions)
- Information cascades (panic, euphoria, mass movements)
Modern parallel: "Going viral" = information pattern self-propagating through network (computational demon spreading)
Not supernatural—computation at network scale, substrate of human minds
"Demon Possession" = Dominant Pattern Controlling Behavior
Observable phenomena:
- Addiction: Pattern executing despite conscious intent to stop (feels like possession)
- Mania/obsession: Thought pattern dominating consciousness (feels like external force)
- Collective hysteria: Pattern spreading through group (mass possession)
- Compulsions: Behavior executing autonomously (feels like demon controlling)
Modern frame: Persistent self-executing pattern capturing resource allocation (attention, behavior, decision-making)
"Exorcism" = Pattern Termination Techniques
Observable phenomena:
- Rituals interrupting pattern (context switch, break execution)
- Context changes preventing invocation (remove triggers, seal environment)
- Replacement patterns (new demon displacing old—competing program)
- Social intervention (group supporting pattern termination)
Modern frame: Debugging protocols, intervention strategies, pattern replacement through sustained practice
"Sealing/Binding" = Pattern Containment
Observable phenomena:
- Preventing pattern from executing (block triggers, remove context)
- Removing invocation methods (seal summoning ritual)
- Creating incompatible states (demon can't exist in this environment)
- Bounded containment (allow demon limited territory, seal elsewhere)
Modern frame: Prevention architecture, environmental design, access controls
The pattern: Ancient demon/spirit lore maps cleanly to computational pattern dynamics. Not supernatural—just computation at scale/substrate not typically recognized as computational.
The Competing Forces Frame
From Will: persistent patterns "feel like another competing force."
Why "competing demon" metaphor helps:
Moralistic vs Mechanistic vs Demon Framing
| Moralistic | Mechanistic | Demon Metaphor | Effect |
|---|---|---|---|
| "I'm addicted" (identity) | "Pattern executing" (system) | "Demon possessing" (competing force) | Depersonalizes further |
| "I'm anxious" (state) | "Runaway loop" (process) | "Anxiety demon active" (external) | Externalizes (easier to fight) |
| "I procrastinate" (trait) | "Competing program" (resource) | "Procrastination demon winning" (battle) | Suggests combat strategies |
| "I can't stop" (helpless) | "Pattern persistent" (observation) | "Demon resisting banishment" (autonomous enemy) | Recognizes pattern momentum |
The shift:
Traditional framing:
- "I can't stop X" → Personal failure, shame, character flaw
- "I'm broken" → Identity, feels unfixable
- "I lack willpower" → Moralistic judgment, no debugging path
Demon framing:
- "Demon competing for control" → External pattern, debuggable, not identity
- "Program executing" → Terminable, replaceable, system-level
- "Competing process winning" → Resource allocation problem, solvable through architecture
Why useful:
- Depersonalizes: Separate from self, not identity or worth
- Externalizes: "Out there" not "in here" (psychologically easier to fight external enemy)
- Suggests combat metaphor: Exorcise, banish, seal (actionable strategies)
- Recognizes autonomy: Pattern has momentum, self-sustains (respect the enemy, plan accordingly)
Practical value:
- Easier to fight "demon" than fight "self" (less shame, more strategy)
- Containment strategies clearer: "Seal demon triggers" vs "fix myself" (concrete actions)
- Less shame spiral: Battling demon (noble combat) vs failing at willpower (moral failure)
- Pattern observable: Can map demon behavior (when invokes, what triggers, how executes)
Practical Applications
Application 1: Identifying Your Demons
Protocol for naming and mapping persistent patterns:
Step 1: Name persistent patterns that feel autonomous, competing with intent
Examples:
- "Anxiety demon" (specific thought→feeling spiral you recognize)
- "Procrastination demon" (avoidance pattern when facing work)
- "Doom-scroll demon" (phone checking loop, automatic)
- "Sugar demon" (craving→seeking→consumption cycle)
Step 2: Map demon behavior (treat as external program to analyze)
Questions:
- When does it invoke? (What triggers summon it?)
- What does it do when executing? (Observable behaviors)
- What resources does it capture? (Attention, time, physical actions)
- How does it resist termination? (What keeps it running?)
- What contexts seal it? (Where can't it execute?)
Step 3: Recognize as separate program (not you, but pattern executing on your substrate)
Why naming helps:
- Makes pattern discrete (can refer to specific demon, not vague "problem")
- Externalizes (demon is "other," easier to analyze objectively)
- Debuggable (can map behavior, test interventions, measure success)
[!example] Example: Naming the Doom-Scroll Demon Pattern: Pick up phone → open app → scroll for 30min → feel bad → repeat
Name: "Doom-scroll demon"
Triggers: Boredom, idle hands, seeing phone, transition moments (waiting, between tasks)
Behavior when executing: Captures attention, time distortion (30min feels like 5min), resist interruption
Resources captured: Attention (100%), time (30-60min blocks), prevents work_launch
Resists termination by: "Just one more post," notification triggers, infinite scroll design
Sealed by: Phone in other room, library (no phone), deep work state (incompatible)
Now debuggable: Can test sealing strategies, measure success (how many days doom-scroll demon successfully contained?)
Application 2: Exorcism (Pattern Termination)
Strategies for banishing demons:
Strategy 1: Starve Invocation (Seal Triggers)
Mechanism: Remove context cues that summon demon. If can't be invoked, can't execute.
Protocol:
- Map all triggers (what summons this demon?)
- Remove triggers from environment (prevention)
- Block causal paths to invocation (architectural sealing)
Examples:
| Demon | Trigger | Sealing Action |
|---|---|---|
| Doom-scroll | Seeing phone | Phone in drawer, different room |
| Sugar | Seeing cookies | No cookies in house (trigger removed) |
| Anxiety | Trigger object/photo | Remove from environment |
| Procrastination | Seeing game icon | Delete games, block sites |
Cost: One-time removal cost (prevention), then ~0 ongoing cost (demon sealed, not fighting it)
Strategy 2: Interrupt Execution (Break Pattern Mid-Run)
Mechanism: Discretize into small chunks so demon can't complete full execution. Force context switches.
Protocol:
- Set timers/boundaries (demon can only run for X minutes)
- Force breaks (interrupt execution, demon loses state)
- Context switch (load competing program mid-demon-execution)
Examples:
| Demon | Interruption Method | Effect |
|---|---|---|
| Anxiety spiral | Timer: 5min worry, then externalize to paper | Can't sustain spiral (interrupted, externalized) |
| Procrastination | 25min work timer, forced break | Demon can't capture full attention (chunked) |
| Doom-scroll | 10min limit alarm | Execution interrupted before full capture |
Cost: Resistance cost per interruption, but prevents full demon takeover (cheaper than allowing complete execution)
Strategy 3: Create Incompatibility (Mutual Exclusion)
Mechanism: Install demon-incompatible state. If State A running, Demon B can't execute (mutually exclusive).
Protocol:
- Identify states where demon can't execute (physical, environmental, attentional incompatibility)
- Engineer system to default to demon-incompatible state
- Demon sealed by architecture (can't run in this environment)
Examples:
| Demon | Incompatible State | Mechanism |
|---|---|---|
| Doom-scroll | At gym (no phone) | Physical incompatibility (phone not present) |
| Procrastination | Library (no games, quiet) | Environmental incompatibility (triggers sealed) |
| Sugar | Running (can't eat while running) | Physical incompatibility (mutually exclusive actions) |
| Anxiety | Deep work flow state | Attentional incompatibility (flow captures all attention) |
Cost: One-time setup (get to gym, library), then demon sealed by state (no ongoing resistance)
Strategy 4: Overwrite Pattern (30 Days Replacement)
Mechanism: Install replacement demon (new pattern) that seals old demon. New pattern dominates resource allocation.
Protocol:
- Choose replacement pattern (beneficial demon to install)
- 30 days consistent execution (overwrite period)
- New pattern becomes automatic (replacement demon dominates)
- Old pattern sealed (new demon owns resources, old can't invoke)
Examples:
| Old Demon | Replacement Demon | 30-Day Overwrite |
|---|---|---|
| Couch demon (default after work) | Gym demon (new default after work) | Day 1-7 expensive, Day 30 automatic |
| Phone demon (morning default) | Coffee + journal demon (new morning) | New pattern seals old (owns morning state) |
| Doom-scroll demon (idle default) | Guitar demon (new idle behavior) | Better default replaces bad default |
Cost: High activation cost Days 1-15 (forcing new pattern), decreasing to ~0 by Day 30 (automatic), then old demon sealed
Application 3: Containment (When Exorcism Fails)
If can't banish demon entirely (chronic demons, too strong to eliminate):
Containment 1: Seal in Bounded Space/Time
Mechanism: Allow demon limited territory (contained, not running free).
Examples:
- Anxiety: Allowed 5min worry time per day, then sealed (time-boxed containment)
- Procrastination: "Sunday is procrastination day, Mon-Fri sealed" (scheduled containment)
- Social media: Allowed 7-8pm, sealed rest of day (bounded window)
Why useful: Some demons won't fully banish. Containment better than constant battle (cheaper than daily resistance).
Containment 2: Accept Demon's Existence, Negotiate Territory
Mechanism: Stop trying to eliminate (expensive, failing). Accept demon exists, limit territory through architecture.
Examples:
- Phone demon: Accept will use phone, but only after 6pm (negotiated boundary)
- Sugar demon: Accept will eat sugar, but only dessert 2x/week (bounded allowance)
- Anxiety demon: Accept anxiety exists, but contained to specific worry time (not all day)
Why useful: Eliminates shame (not "failing" to banish), focuses energy on containment (achievable), reduces resistance cost (not fighting constantly)
Containment 3: Use Competing Demon (Feed Beneficial Demon)
Mechanism: Install stronger beneficial demon that competes with harmful demon. Beneficial demon wins resource allocation.
Examples:
| Harmful Demon | Beneficial Competing Demon | Resource Competition |
|---|---|---|
| Couch demon | Gym demon (fed daily, grows stronger) | Gym wins (owns after-work state) |
| Doom-scroll demon | Deep work demon (owns morning) | Deep work wins morning routing |
| Anxiety demon | Exercise demon (incompatible) | Exercise captures resources, anxiety sealed |
Protocol:
- Install beneficial demon (30 days)
- Feed daily (consistent execution strengthens it)
- Beneficial demon grows stronger, wins resource competition
- Harmful demon starved (can't get resources), weakens
Cost: Initial installation expensive (Days 1-15), then beneficial demon automatic, harmful demon sealed by competition
Framework Integration
Connection to State Machines
State machines: Demons as states with default transitions
- "Possessed by X demon" = being in X state (demon executing)
- State transitions = demon invocation/banishing (switching which pattern runs)
- Designing states = choosing which demons allowed in system architecture
- Default scripts = which demon loads automatically in each state
Example: "Home from work" state → couch demon (default) vs gym demon (engineered default)
Connection to Attention Routing
Routing: Demons competing for attention routing
- Demons = competing patterns for attention capture
- Winning demon = captures routing (owns attention, time, behavior)
- Exorcism = removing demon from routing table (can't capture)
- Sealing = architectural blocks preventing demon from winning routing
Example: Doom-scroll demon vs deep work demon (competing for morning attention routing)
Connection to Addiction
Addiction: Classic demon pattern (self-triggering, autonomous, persistent)
- Addiction feels like possession (demon metaphor especially apt)
- Self-sustaining loop (demon keeps invoking itself)
- Containment strategies = sealing/exorcising addiction demon
- Recovery = pattern termination + replacement demon installation
Example: Alcohol demon (craving→seeking→consumption loop, self-sustaining, feels autonomous)
Connection to Prevention Architecture
Prevention: Sealing invocation paths (architectural containment)
- Don't fight demon daily (expensive resistance)
- Seal triggers (cheap prevention, demon can't invoke)
- Prevention = architectural sealing (demon permanently contained)
- One-time cost (remove triggers) vs ongoing cost (resist daily)
Example: Delete apps (seal doom-scroll demon triggers) vs resist checking every day (expensive)
Connection to 30x30 Pattern
30x30: Overwriting demons through pattern replacement
- New demon (gym) replaces old demon (couch) over 30 days
- 30 days = time for new demon to dominate, seal old demon
- Pattern replacement as exorcism (old pattern terminated by new pattern)
- Cost decreases (Day 1 = 6 units, Day 30 = 0.5 units) as new demon strengthens
Example: Gym demon Day 1 expensive (forcing), Day 30 automatic (demon owns state), couch demon sealed
Common Misunderstandings
Misunderstanding 1: "Demons are Literal Supernatural Entities"
Wrong interpretation: Taking metaphor as supernatural claim, believing in actual spirits/demons
Correct understanding: Computational patterns modeled as "demons" for utility. This is poetic framing for self-sustaining patterns, not claiming supernatural entities exist.
Why it matters: Metaphor should help you debug (depersonalize, externalize, suggest strategies), not introduce mysticism. This is mechanistic framework using demon language, not occultism.
Misunderstanding 2: "I'm Possessed, Therefore Helpless"
Wrong interpretation: "Demon controls me completely, can't fight it, helpless victim"
Correct understanding: Pattern has momentum, but you have containment strategies. Demon metaphor should empower (strategies available: seal, banish, contain) not disempower (helpless, no agency).
Why it matters: Demon framing should make patterns feel MORE debuggable (external, analyzable, terminable), not less (supernatural, unstoppable). If metaphor makes you feel helpless, it's being used wrong.
Misunderstanding 3: "One Exorcism Fixes Forever"
Wrong interpretation: Single intervention banishes demon permanently, never returns
Correct understanding: Some patterns need ongoing containment (chronic demons). Some demons seal easily (triggers removed, pattern fades), others need continuous vigilance (chronic patterns, strong demons).
Realistic expectations:
- Acute demons: Seal triggers → demon fades (sugar demon if triggers removed)
- Chronic demons: Ongoing containment required (anxiety demon might need daily sealing)
- Competing demons: Feed beneficial demon daily to keep harmful demon sealed (gym vs couch)
Why it matters: Unrealistic expectations ("should be gone forever") lead to shame when demon returns. Better: "This is chronic demon, needs ongoing containment architecture."
Related Concepts
- state-machines - Demons as states with default transitions
- attention-routing - Demons competing for attention routing
- addiction - Classic demon pattern (self-triggering, autonomous)
- anxiety - Runaway demon (positive feedback spiral)
- procrastination - Competing demon (resource allocation battle)
- prevention-architecture - Sealing strategies (block triggers architecturally)
- 30x30-pattern - Overwriting demons through pattern replacement
- the-braindump - Externalizing thoughts (interrupting demon execution)
- discretization - Breaking demon execution (can't complete full run)
- computation-physical - Computation running on physical substrate (not just digital)
Key Principle
Modeling persistent patterns as "demons" (self-sustaining programs competing for control) helps depersonalize, debug, and terminate them through containment strategies—useful metaphor for recognizing autonomous-feeling patterns, not literal supernatural entities.
Observable demon-like patterns: addiction (self-triggering, autonomous-feeling, resistant to termination), anxiety (runaway positive feedback loop, intrusive, competing with desired calm), procrastination (automatic resistance, predictable execution, wins resource allocation), intrusive thoughts (involuntary, recurring, background process).
Demon behaviors map cleanly to computational patterns: invoked (function call via triggers), follow rules (deterministic code execution), have abilities (methods/behaviors when executing), bound by conditions (access controls, context requirements), exorcised (process termination, pattern replacement), sealed (containment, prevention of invocation).
Ancient "spirit" descriptions might have been early observations of computational phenomena—self-propagating patterns in human networks (viral information spread), emergent collective behaviors (mass movements, hysteria), causal chains through social systems—before technological framework existed to describe mechanistically. Not supernatural—computation at scale/substrate not typically recognized as computational. Modern parallel: "going viral" (information demon spreading through network).
"Sealing" (封印) = preventing unwanted causal flow through architectural containment: (1) block triggers (remove invocation paths via prevention), (2) create incompatibility (mutually exclusive states—demon can't execute), (3) time-box (bounded space/time—contained not eliminated), (4) pattern replacement (new demon seals old via 30-day overwrite).
Exorcism strategies: (1) starve invocation (remove triggers, seal summoning paths—prevention architecture), (2) interrupt execution (break pattern into chunks, force context switches—demon can't complete), (3) create incompatibility (install demon-incompatible state—mutual exclusion seals demon), (4) overwrite pattern (replacement demon—new pattern dominates, old sealed).
Competing forces frame: "Demon possessing" vs "I'm broken"—depersonalizes (external pattern not identity, easier to analyze objectively), externalizes (fight demon not self, less shame, more strategy), suggests combat strategies (banish, seal, exorcise—actionable metaphors), recognizes autonomy (pattern has momentum, self-sustains—respect the enemy, plan containment).
When exorcism fails: containment (bound space/time, allow demon limited territory), negotiation (accept chronic demon exists, limit through architecture not constant resistance), competing demon (feed beneficial demon daily to outcompete harmful—gym demon vs couch demon, beneficial fed consistently grows stronger, harmful starved weakens).
This is metaphor for recognizing self-sustaining patterns that feel autonomous and compete for control, not claiming supernatural entities exist. Test whether "demon" framing helps YOU debug persistent patterns through depersonalization and containment strategies. Ancient demon lore = computational pattern descriptions in pre-technological language. Useful lens, not scientific claim.
Some patterns feel like demons—autonomous, persistent, competing for control. Not literal entities, but computational patterns running on neural substrate. Name them. Map their behavior. Seal their triggers. Starve their invocation. Overwrite with replacement. Exorcism is debugging. Containment is architecture. Sealing is prevention. You're not possessed—you're running programs that need terminating. Feed beneficial demons, starve harmful ones. The battle is resource allocation, not supernatural. Mechanistic, not mystical.