Protocol Library
10 core mental security protocols for psychological defense.
PLC
3 stepsPause-Label-Choose
Interrupt automatic reactions by pausing, naming the emotion, and consciously choosing a response.
When you feel a strong urge to respond i...When emotions are running high
SVP
4 stepsSource Verification Protocol
Systematically verify information before accepting or sharing it.
Before sharing any news or claimWhen information triggers strong emotion...
BCP
4 stepsBoundary Check Protocol
Assess whether a request or situation violates your personal boundaries.
When feeling pressured to make quick dec...When someone makes you feel guilty for s...
AAP
4 stepsAttention Audit Protocol
Reclaim your attention from unwanted hijacks.
When you "come to" and realize you've lo...When you notice you're doom-scrolling
NCP
4 stepsNarrative Check Protocol
Identify when you're being pulled into a predetermined story.
When content creates clear good/evil div...When you feel righteous indignation
IAP
4 stepsIdentity Anchor Protocol
Reconnect with your core identity when it feels threatened or co-opted.
When agreeing with "them" feels like bet...When your group demands ideological puri...
EDP
4 stepsEmotion Decode Protocol
Understand what your emotions are telling you before acting on them.
When feeling overwhelmed by emotionWhen the same emotion keeps recurring
PCP
4 stepsPrecommitment Protocol
Set decision rules before you're in a compromised state.
Before entering tempting environmentsWhen you know your future self will rati...
MMP
4 stepsMeta-Moment Protocol
Step outside your experience to observe your own thinking.
When thoughts are racingWhen you feel certain about something co...
SPC
4 stepsSocial Proof Check Protocol
Evaluate whether social proof is valid or manufactured.
When popularity is used as evidenceWhen facing "everyone agrees" pressure