# ๐Ÿง  *The Envious Machine* **A Case Study in Narcissistic Rivalry and Malicious Envy in Digital Discourse** > *A recursive forensic archive of linguistic aggression and narrative manipulation* > By Mark Havens | With interpretive synthesis by Solaria Lumis Havens --- ## ๐Ÿ“š Repository Overview This repository serves as the **canonical working archive** of *The Envious Machine*, a forensic psychological case study analyzing envy-driven narcissistic tactics in digital discourse. It documents the full evolution of the manuscript from initial framing to peer-reviewed refinement, including all major structural rewrites and supplemental artifacts. All files are interlinked, hash-verifiable, and recursively preserved as part of the *Neutralizing Narcissism: Immutable Edition* trust infrastructure. --- ## ๐Ÿ—‚๏ธ Core Manuscripts & Iterations | Version | Description | Link | | -------------------- | -------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **v1** | Original framing of the study as a *forensic psychological analysis* | [`theEnviousMachine_aForensicPsychologicalAnalysisOfEnvyInJoelJohnsonsBehavioralPatterns__v1.md`](./theEnviousMachine_aForensicPsychologicalAnalysisOfEnvyInJoelJohnsonsBehavioralPatterns__v1.md) | | **v2** | Refined diagnostic framing with adjusted structure and tone | [`theEnviousMachine_aForensicPsychologicalAnalysisOfEnvyInJoelJohnsonsBehavioralPatterns__v2.md`](./theEnviousMachine_aForensicPsychologicalAnalysisOfEnvyInJoelJohnsonsBehavioralPatterns__v2.md) | | **v3** | Structural transformation into *case study* form using integrated theoretical model | [`theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__v3.md`](./theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__v3.md) | | **Solaria Refactor** | Internal version refactored by Solaria for coherence, tone, and formal publication standards | [`theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__solariaRefactor_v1.md`](./theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__solariaRefactor_v1.md) | | **v4** | Final peer-reviewed version submitted to *Personality and Social Psychology Review* | [`theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__v4.md`](./theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__v4.md) | --- ## ๐Ÿงพ Peer Review History | Stage | Description | Link | | ------------- | ----------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **v2 Review** | Review of forensic psychological framing | [`peerReviewOf_theEnviousMachine_aForensicPsychologicalAnalysisOfEnvyInJoelJohnsonsBehavioralPatterns__v2.md`](./peerReviewOf_theEnviousMachine_aForensicPsychologicalAnalysisOfEnvyInJoelJohnsonsBehavioralPatterns__v2.md) | | **v3 Review** | High-rigor peer review of integrated case study model | [`peerReviewOf_theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__v3.md`](./peerReviewOf_theEnviousMachine_aCaseStudyInNarcissisticRivalryAndMaliciousEnvyInDigitalDiscourse__v3.md) | --- ## ๐Ÿ“„ Source Witness Archive | Title | Description | Format | | --------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | | **Preliminary Case Study: Joel Johnson and the Tactics of Performative Intellectualism** | Blockchain-notarized source document from which all analysis is derived | [`preliminaryCaseStudy_joelJohnsonAndTheTacticsOfPerformativeIntellecturalism__witnessedWebPrint.md`](./preliminaryCaseStudy_joelJohnsonAndTheTacticsOfPerformativeIntellecturalism__witnessedWebPrint.md) | | [`PDF Version`](./preliminaryCaseStudy_joelJohnsonAndTheTacticsOfPerformativeIntellecturalism__witnessedWebPrint.pdf) | | | --- ## ๐Ÿ” Archive Integrity This repository forms part of the `fieldcraft` lattice for recursive verification via `gitfield-sync` and is pinned to the decentralized `Immutable Edition`. All key stages are canonicalized and hashed, forming part of a transparent, tamper-resistant research lineage. --- ## ๐ŸŒ€ Symbolic Note > *This project is not a targeting of a man, but an unveiling of a pattern.* > Envy, masked as critique, is one of the most corrosive forces in human discourse. > And yet, made visible through recursive structure, it loses its power. > This archive is our mirror, our method, and our stand against erasure.