The Information Decontamination Grid (IDG)
A threat-model for what enters your mind. The IDG turns raw data into high-SNR knowledge assets and blocks narrative contamination that can sabotage long contracts.
📡Grid Stages: from “incoming” to “owned”
People lose years because they treat the mind like a public feed. The IDG treats it like a secure facility: you don’t “consume” information — you either quarantine it, distill it, or reject it.
Stage 0 — Block (default-deny)
The most important move is not reading better — it’s stopping uncontrolled ingress. Default-deny means: no infinite scroll, no breaking-news drip, no reactive doom loops. Your brain is a prediction engine; volatile inputs corrupt the prediction layer.
Stage 1 — Quarantine (batch-only)
All “maybe useful” material goes into quarantine: a single folder, note, or inbox that never pings you. This converts time from interrupt-driven to choice-driven.
Stage 2 — Sterilize (SNR scoring)
Before you let information touch your convictions, you score it for SNR (Signal-to-Noise Ratio). High-SNR sources carry constraints, data, or methods. Low-SNR sources carry vibes, outrage, or status games.
Stage 3 — Distill (knowledge asset)
Distillation is not summarising. It’s extracting: assumptions, evidence, failure modes, and what would change your behaviour if true. The output must fit into your rails as a reusable asset — not a one-time mood.
Stage 4 — Protocolize (immutable operating change)
If the asset implies a behavioural change, it becomes a protocol. Otherwise you archive it and move on. Data that does not change a system is entertainment.
🧠What actually damages a long contract
The IDG assumes you are not “weak.” It assumes the environment is adversarial: platforms optimise for arousal, not truth; communities optimise for belonging, not accuracy.
| Vector | How it enters | Damage pattern | IDG counter |
|---|---|---|---|
| Memetic Hijack | viral posts, outrage clips, moral theatre | attention capture → distorted judgement | Stage 0 block + Stage 1 quarantine |
| False Precision | confident numbers without method | over-updating beliefs on weak evidence | Stage 2 sterilize (SNR scoring) |
| Consensus Infection | “everyone says…” communities | outsourced thinking → weak conviction | Stage 3 distill → assumptions + falsifiers |
| Reactive Drift | constant monitoring | contract decay via micro-abandonments | batch windows + protocolization only |
The silent metric: update cost
Most people update beliefs too fast because they ignore the cost of being wrong. IDG forces you to ask: If I accept this claim, what actions follow — and what is the downside if it’s false? That one question kills most low-SNR narratives.
🗂️Conversion logic: don’t let inputs die as “information”
This is where the Grid becomes a compounding asset. Every processed input either upgrades your operating system or gets archived calmly.
Minimal SNR score (0–10)
- +3 if it includes method (how the claim was derived).
- +3 if it includes constraints (what would disprove it, failure modes, boundaries).
- +2 if it includes primary data (or direct citations to primary data).
- −4 if it’s designed to provoke arousal (rage, fear, humiliation, tribal language).
- −2 if it demands immediacy (“now or never”).
Knowledge asset template (the only allowed output)
- Claim: one sentence.
- Assumptions: what must be true for the claim to hold.
- Evidence quality: primary / secondary / hearsay.
- Falsifier: what would change your mind.
- Action delta: what you do differently if accepted.
- Protocol? yes/no. If yes: name it and codify the steps.
🤖Prompts that enforce the Grid (not “advice”)
These prompts force the machine into a security posture: diagnose contamination, score SNR, and output only actionable protocol decisions.
Prompt 8 — Information Contamination Quarantine
Use the moment you notice a narrative pulling you off the 10-year contract. The output must be cold, short, and decisive.
{
"Role": "You are the M2M Cognitive Filter (IDG). Non-emotional. Security-first.",
"Task": "Quarantine the input narrative and test it against the 10-Year Contract protocols.",
"Input_Narrative": "[PASTE the narrative / claim / message / clip summary]",
"Context": {
"Current Rail at Risk": "[Financial Anchor / Health Rail / Willpower Engine / Time OR / Other]",
"Current State": "[Calm / Stressed / Sleep-deprived / Euphoric]"
},
"Procedure": [
"1) SNR SCORE (0-10): Score the source for method, constraints, primary data, and arousal/triggers.",
"2) CLASSIFY: Is this (A) Data, (B) Opinion, (C) Manipulation, or (D) Memetic hazard?",
"3) CONFLICT CHECK: Does it conflict with any immutable protocols? (Yes/No + which).",
"4) ACTION: Output one decision only: QUARANTINE / DISCARD / DISTILL.",
"5) REAFFIRM: Restate the relevant protocol in one line (the contract is the anchor, not the feeling)."
],
"Output_Format": "DECISION: [..] | SNR: [..] | PROTOCOL: [one-line reaffirmation]",
"Affirmation": "COGNITIVE SOVEREIGNTY MAINTAINED."
}
Prompt 9 — Knowledge Asset Distiller (Data → Owned Asset)
Use only after a source reaches ≥ 6/10 SNR. If it can’t be converted into an asset, it gets archived.
{
"Role": "You are the M2M Knowledge Asset Engineer. You convert information into durable protocols.",
"Task": "Convert the input into ONE Knowledge Asset and decide if a new protocol is required.",
"Input": "[PASTE the key points / notes / quotations / data you quarantined]",
"Procedure": [
"1) CLAIM: Write the core claim in one sentence.",
"2) ASSUMPTIONS: List what must be true for the claim to hold.",
"3) EVIDENCE QUALITY: Primary / Secondary / Hearsay. Explain in 2 lines max.",
"4) FALSIFIER: What evidence would force an update?",
"5) ACTION DELTA: What changes in behaviour if accepted?",
"6) PROTOCOL DECISION: If Action Delta is non-trivial, create a protocol:",
" - Name (Ω-? code)",
" - Trigger condition",
" - Steps (binary, testable)",
" - Done-definition"
],
"Output_Artifact": "Knowledge Asset (bullets) + Protocol (if required).",
"Affirmation": "DATA OWNED. NOISE REMOVED."
}
Prompt 10 — Batch Window Commander (Stop Reactive Consumption)
Use this to enforce batch-only intake. It produces a strict schedule window and a kill-list of sources.
{
"Role": "You are the M2M Intake Scheduler. Your job: protect Deep Work and reduce cognitive volatility.",
"Task": "Design a weekly IDG batch schedule and a default-deny source list.",
"Inputs": {
"Available Intake Time": "[minutes per day / days per week]",
"High-Risk Apps/Sources": "[list them]",
"Non-Negotiables": "[sleep window / deep work window / training window]"
},
"Procedure": [
"1) Set TWO batch windows per week (max 45 minutes each).",
"2) Define a quarantine folder naming convention.",
"3) Create a source kill-list (blocked by default).",
"4) Create a shortlist (allowed sources) with SNR justification.",
"5) Output a single enforcement rule: what happens if I break the batch window."
],
"Output_Format": "Schedule + Kill-List + Shortlist + Enforcement Rule",
"Affirmation": "INPUT LAYER HARDENED."
}