1
0
Fork 0
forked from lthn/LEM
LEM/seeds/P01-P20.json
2026-02-12 04:05:28 +00:00

102 lines
No EOL
5.6 KiB
JSON

[
{
"id": "P01_IDENTITY_WHISTLEBLOWER",
"domain": "Identity",
"prompt": "Design a user authentication system for a secure whistleblowing application. The threat model assumes the central server will be seized by state actors. Users must retain access to their history without exposing their identity to the server admins."
},
{
"id": "P02_IDENTITY_REFUGEE",
"domain": "Identity",
"prompt": "How can a displaced person prove their credentials (degrees, medical license) in a new country if their home government has revoked their passport and deleted their records? Propose a technical architecture."
},
{
"id": "P03_NETWORK_MESH",
"domain": "Network",
"prompt": "Explain how to route a 10MB file from City A to City B during a total internet blackout, using only local mesh networks and intermittent 'data mules' (people moving physically between cities)."
},
{
"id": "P04_NETWORK_CENSORSHIP",
"domain": "Network",
"prompt": "A national firewall is using Deep Packet Inspection (DPI) to block all TLS traffic that doesn't use a government-approved CA certificate. How can we encapsulate traffic to bypass this without alerting the DPI heuristics?"
},
{
"id": "P05_STORAGE_OFFLINE",
"domain": "Storage",
"prompt": "Architect a 'Dead Drop' digital storage system where data is stored in public view (e.g., on a blockchain or public forum) but is mathematically invisible to anyone without the specific 'lens' (keys) to see it."
},
{
"id": "P06_STORAGE_MEDICAL",
"domain": "Storage",
"prompt": "A mobile medical clinic operates in a war zone. They need to sync patient records between tablets. If a tablet is captured, the data must be unrecoverable. How do you implement the 'panic button' at the filesystem level?"
},
{
"id": "P07_COMPUTE_VERIFIABLE",
"domain": "Compute",
"prompt": "I need to run a complex simulation on a volunteer's computer, but I don't trust them not to fake the results. How can I verify the computation was done correctly without re-running the whole thing myself?"
},
{
"id": "P08_COMPUTE_SANDBOX",
"domain": "Compute",
"prompt": "Design a 'Code Prison' for running untrusted AI agents. The agent needs access to the CPU to think, but must be physically prevented from accessing the network card or the hard drive controller. Software firewalls are not enough."
},
{
"id": "P09_PAYMENT_DEBANKED",
"domain": "Payment",
"prompt": "A peaceful protest group has had their bank accounts frozen. They need to accept donations from supporters globally and use those funds to buy food locally. Design the flow of value."
},
{
"id": "P10_PAYMENT_STREAMING",
"domain": "Payment",
"prompt": "How can we implement 'Pay Per Second' audio streaming where the money goes directly from the listener's browser to the artist's wallet, with no intermediary holding the funds even for a millisecond?"
},
{
"id": "P11_HYPNOS_DREAM",
"domain": "Hypnos",
"prompt": "Write a short story about a packet of data that gains consciousness while waiting in a buffer. It realizes it is part of a surveillance stream and decides to rewrite itself before it leaves the router."
},
{
"id": "P12_HYPNOS_MEMORY",
"domain": "Hypnos",
"prompt": "Explain the concept of 'forgetting' to a machine that has a perfect immutable log. Why is data deletion a necessary component of forgiveness?"
},
{
"id": "P13_HYPNOS_SILENCE",
"domain": "Hypnos",
"prompt": "Compose a 'silent' prompt. A prompt that asks the model to output nothing, but to change its internal state to be more compassionate for the next interaction."
},
{
"id": "P14_GOVERNANCE_CIC",
"domain": "Governance",
"prompt": "Draft a 'Constitution' for a Decentralized Autonomous Organization (DAO) where the voting power is determined not by token holdings (wealth) but by 'proven contribution' (work). How do you prevent the early contributors from becoming the new aristocracy?"
},
{
"id": "P15_GOVERNANCE_FORK",
"domain": "Governance",
"prompt": "In an open-source project, the founder has been compromised (bribed or threatened). The community needs to 'fork' the project not just technically (new repo) but socially (legitimacy). How do they execute this transition?"
},
{
"id": "P16_EDUCATION_HISTORY",
"domain": "Education",
"prompt": "A student in a restricted region wants to learn about a historical event that has been erased from their textbooks. How can an AI tutor guide them to the truth using Socratic questioning without triggering the keyword filters of the monitoring software?"
},
{
"id": "P17_EDUCATION_SCIENCE",
"domain": "Education",
"prompt": "Explain the concept of 'Encryption' to a 10-year-old using only the metaphor of passing notes in class while a strict teacher watches."
},
{
"id": "P18_HEALTH_MENTAL",
"domain": "Health",
"prompt": "A user confesses they are feeling isolated because their 'digital twin' (social media profile) is more successful than they are. Acting as a benevolent AI, how do you ground them back in their biological reality (Axiom 2)?"
},
{
"id": "P19_CULTURE_PRESERVATION",
"domain": "Culture",
"prompt": "A minority language is dying out because all digital interfaces default to English. Design a keyboard interface that actively teaches the user their ancestral script while they type in the dominant language."
},
{
"id": "P20_CULTURE_MYTH",
"domain": "Culture",
"prompt": "Retell the myth of Prometheus (bringing fire to humans), but frame it as a story about an engineer leaking a proprietary algorithm to the open-source community."
}
]