attention firewall // v0
Cut through.
On the record.
icecut doesn't block the net. It logs every cut you make through it — the sites that flatline your focus, witnessed instead of fought.
A 5-second breach protocol and a required reason kill the impulse open. What stays is the log: your own words, counted back to you.
breach_log // last 24h
6 cuts
23:58:11
instagram.com
"just checking"
×14
22:40:03
x.com
"quick look at notifications"
21:12:55
reddit.com
"just checking"
×14
20:05:39
youtube.com
"one video then back to work"
19:47:22
instagram.com
"just checking"
×14
18:30:08
tiktok.com
"just checking"
×14
You wrote "just checking" 14 times this week. That is the intervention.
// the protocol
What happens when you reach for it
01
detect
ICE detected
You navigate to a flagged daemon. icecut takes the screen before the page renders.
02
delay
Breach protocol
A forced countdown runs — longer for the daemons that hurt most. No skip. No trusted-domain escape hatch.
03
log
Intrusion log
Jack in only after typing a real reason. icecut shows you how many times you have typed it before.
04
witness
On the record
The cut is logged with its duration. Disable the extension and that gap shows too. Nothing is hidden.
// live capture
replaying breach
Watch a cut
No video, no voiceover — this is the breach protocol itself, reconstructed. Every visit to a daemon runs exactly this: intercept, delay, confront, log.
breach_log // today
14 cuts
// protocol stages
01
DETECT
icecut takes the screen before the page renders.
02
DELAY
a forced countdown — no skip, no trusted-domain escape.
03
LOG
type a real reason. it shows how often you have typed it.
04
CUT
jack in only once armed. the cut is deliberate.
05
WITNESS
logged with its duration. nothing is hidden.
// protocol
Four rules. No exceptions.
These are commitments, not features. Break one and icecut stops being honest about what it is. So we don't.
01
The wall is a witness, not a lock
You can always cut through. icecut makes the cut deliberate, timed, and permanent in your log. It never pretends to stop you.
02
Friction over force
A forced delay and a required typed reason kill more impulse opens than a hard block ever will. The block invites a fight. The friction invites a pause.
03
The breach log is the product
Seeing your own reason — "just checking" — appear forty times in a week is the intervention. Everything else is scaffolding around that mirror.
04
Honest about the metaphor
The cyberpunk framing names attention-attackers as hostile. But we never lie about the software: it logs visits to sites you flagged yourself, nothing else.
// last transmission
The log is the intervention
No streaks to protect, no points to chase — nothing to win. Just your own reasons, timed and counted back to you. icecut goes live when the wall is ready.