Protocol Library

10 core mental security protocols for psychological defense.

PLC

Pause-Label-Choose

3 steps

Interrupt automatic reactions by pausing, naming the emotion, and consciously choosing a response.

When you feel a strong urge to respond i...When emotions are running high
SVP

Source Verification Protocol

4 steps

Systematically verify information before accepting or sharing it.

Before sharing any news or claimWhen information triggers strong emotion...
BCP

Boundary Check Protocol

4 steps

Assess whether a request or situation violates your personal boundaries.

When feeling pressured to make quick dec...When someone makes you feel guilty for s...
AAP

Attention Audit Protocol

4 steps

Reclaim your attention from unwanted hijacks.

When you "come to" and realize you've lo...When you notice you're doom-scrolling
NCP

Narrative Check Protocol

4 steps

Identify when you're being pulled into a predetermined story.

When content creates clear good/evil div...When you feel righteous indignation
IAP

Identity Anchor Protocol

4 steps

Reconnect with your core identity when it feels threatened or co-opted.

When agreeing with "them" feels like bet...When your group demands ideological puri...
EDP

Emotion Decode Protocol

4 steps

Understand what your emotions are telling you before acting on them.

When feeling overwhelmed by emotionWhen the same emotion keeps recurring
PCP

Precommitment Protocol

4 steps

Set decision rules before you're in a compromised state.

Before entering tempting environmentsWhen you know your future self will rati...
MMP

Meta-Moment Protocol

4 steps

Step outside your experience to observe your own thinking.

When thoughts are racingWhen you feel certain about something co...
SPC

Social Proof Check Protocol

4 steps

Evaluate whether social proof is valid or manufactured.

When popularity is used as evidenceWhen facing "everyone agrees" pressure