Tazzlie
@tazziedaze.bsky.social
6.7K followers 8.2K following 2.5K posts
I didn't badmouth you. I spoke the truth about what happened. If the truth makes you uncomfortable..that's a you problem, not a me problem. I defend myself and who I am.
Posts Media Videos Starter Packs
Pinned
tazziedaze.bsky.social
Since I see over 20 accounts reposting these accounts for attacking people on their account I am going to also repost to spread awareness for these harassers and I bet more accounts they own
tazziedaze.bsky.social
Katies obsessive online behavior with me is consistent with documented patterns of narcissistic abuse. Being blocked cuts off her supply and injures her fragile ego, causing her to escalate her tactics to regain a sense of power by making new secret accounts showing online she she still watches me.
tazziedaze.bsky.social
Deny, Attack, and Reverse Victim and Offender. The person first denies your legitimate claim, then attacks you for making it, and finally reverses the roles by portraying themselves as the victim. Accusing you of "weaponizing" is part of the "attack" and "reverse" stages.
tazziedaze.bsky.social
The defense mechanism for narcissists involves unconsciously attributing one's own undesirable traits to someone else. For example, a person who is intentionally manipulative may accuse you of "weaponizing" a genuine emotion to distract from their own harmful behavior.
tazziedaze.bsky.social
Triggered narcissist will accuse you of weaponizing is a true oversimplification of a complex psychological dynamic. People with narcissistic traits use this accusation as a form of manipulation language for various reasons, including learned behavior, fear, or a desire to avoid conflict.
tazziedaze.bsky.social
A narcissist may log out of accounts they own and then lie about owning them to manipulate others and control the narrative. If they used an account for abusive or manipulative behavior, they will deny ownership to avoid being held responsible for the harm they caused.
tazziedaze.bsky.social
it is a significant red flag for narcissistic to demands access to your personal accounts and passwords. This is a form of abuse used to gain control, isolate you, and strip you of your autonomy. A narcissist's demand for account names is not about trust; it is about power and control.
tazziedaze.bsky.social
The assertion that narcissists use insults like "dumb" and "retarded" to elevate their own self-esteem is accurate. Just to making others feel small and insignificant. This behavior is a projection of the narcissist's own deep-seated insecurities and self-loathing.
tazziedaze.bsky.social
Presenting Katie with accurate information will not prevent her from calling me misinformed. This is a common and predictable defense mechanism she uses to control a narrative, protect her pretend life's ego, and maintain power over her lies she spreads.
tazziedaze.bsky.social
Lying and spreading false information are common and defining characteristics of narcissistic behavior, which is supported by psychological research. Narcissists frequently use manipulation, deceit, and false narratives to protect their fragile self-image, gain control, and serve their own interests
tazziedaze.bsky.social
Narcissists demand access to your phone or passwords while hiding their own device, even asking you to show proof of their stuff. If blocked, they might use fake accounts to continue monitoring your social media activity, then assume lies about you get hoping you respond to get what they demand.
tazziedaze.bsky.social
Encrypted and private group chats can be used to spread rumors and misinformation about a person to others, a tactic known as a smear campaign. This is often used during the "discard" phase of a manipulation to turn mutual friends or family against the victim.
tazziedaze.bsky.social
Manipulative individuals use encrypted apps and secrecy to control the flow of information. This includes planting seeds of doubt with "micro-manipulations," such as sending a cryptic message intended for someone else before quickly deleting it.
tazziedaze.bsky.social
Narcissists often need a "narcissistic supply" of attention from multiple people. Encrypted apps, alternative social media accounts, and even second phones or "burner" phones allow them to cultivate side relationships or carry out gossip without their primary target's knowledge.
tazziedaze.bsky.social
Encrypted platforms, secret folders within apps, and disappearing messages allow narcissists to conceal conversations with other people. A common example is using calculator apps that reveal a hidden photo vault after a specific PIN is entered.
tazziedaze.bsky.social
Narcissists use encrypted apps to hide lies and spread gossip, its a established tactic of digitally manipulative and abusive individuals. Encryption and hidden features offer privacy that can be weaponized to deceive strangers and manipulate others without accountability.
tazziedaze.bsky.social
Never in my life have I met anyone like Katie who now openly threatens her own stepmother and is proudly posting it to social media if i saw that and lived in that house id have her locked away
tazziedaze.bsky.social
Katie's gloating "smugness" is a desperate attempt to reassert control after her ego has been threatened. For a narcissist like her, taking something from another person is an act of power, and my exposure has just proven that her act had no effect on me.
tazziedaze.bsky.social
Catching Katie in a lie or malicious act, especially with proof, triggers profound shame. Her aggression rage is a defense mechanism to deflect this unbearable feeling of worthlessness. By proving she stole it, I am invalidating her reality and sense of self, which she cannot tolerate.
tazziedaze.bsky.social
a narcissist would be triggered and enraged by being caught and exposed for stealing someone's identity. The subsequent gloating is a tactic to regain a sense of control and superiority after experiencing a "narcissistic injury".
tazziedaze.bsky.social
And there is nothing im going to do to stop others from showing me everything you do to others even your own family turn on you so you use the internet to bully to stress and make others miserable
tazziedaze.bsky.social
Here since your so OCD on dates and stamps dont worry I have way more you c9nfessed to on facebook everyone responds to
tazziedaze.bsky.social
So funny to claim im blocked as soon as I speak up the guilty can respond fast then lie more saying im blocked yet proof is im not im watched
tazziedaze.bsky.social
So its ok for you to steal others identity including mine make fake accounts and admit it but if you claim others do it to you they are in the wrong your so stupid if anyone does make fake accounts about you now you deserve it your OCD over dates and stamps is more mental by the day get help
tazziedaze.bsky.social
Disgusting people like this Katie girl can steal others identity then admit they make fake accounts then admit it on social media but claim they dont when she even did it to me and here is the confession proof
tazziedaze.bsky.social
Normalize teaching young boys to:
Open doors for women
Offer your jacket when she’s cold
Walk her to her car at night
Speak gently, listen deeply
Protect, don’t pressure.