ICECUT

intrusion countermeasures electronics

online

attention firewall // v0

Cut through.
On the record.

icecut doesn't block the net. It logs every cut you make through it — the sites that flatline your focus, witnessed instead of fought.

A 5-second breach protocol and a required reason kill the impulse open. What stays is the log: your own words, counted back to you.

request access

breach_log // last 24h

6 cuts

23:58:11

instagram.com

"just checking"

×14

22:40:03

x.com

"quick look at notifications"

21:12:55

reddit.com

"just checking"

×14

20:05:39

youtube.com

"one video then back to work"

19:47:22

instagram.com

"just checking"

×14

18:30:08

tiktok.com

"just checking"

×14

You wrote "just checking" 14 times this week. That is the intervention.

// the protocol

What happens when you reach for it

01

detect

ICE detected

You navigate to a flagged daemon. icecut takes the screen before the page renders.

02

delay

Breach protocol

A forced countdown runs — longer for the daemons that hurt most. No skip. No trusted-domain escape hatch.

03

log

Intrusion log

Jack in only after typing a real reason. icecut shows you how many times you have typed it before.

04

witness

On the record

The cut is logged with its duration. Disable the extension and that gap shows too. Nothing is hidden.

// live capture

replaying breach

Watch a cut

No video, no voiceover — this is the breach protocol itself, reconstructed. Every visit to a daemon runs exactly this: intercept, delay, confront, log.

breach_log // today

14 cuts

// protocol stages

01

DETECT

icecut takes the screen before the page renders.

02

DELAY

a forced countdown — no skip, no trusted-domain escape.

03

LOG

type a real reason. it shows how often you have typed it.

04

CUT

jack in only once armed. the cut is deliberate.

05

WITNESS

logged with its duration. nothing is hidden.

// protocol

Four rules. No exceptions.

These are commitments, not features. Break one and icecut stops being honest about what it is. So we don't.

01

The wall is a witness, not a lock

You can always cut through. icecut makes the cut deliberate, timed, and permanent in your log. It never pretends to stop you.

02

Friction over force

A forced delay and a required typed reason kill more impulse opens than a hard block ever will. The block invites a fight. The friction invites a pause.

03

The breach log is the product

Seeing your own reason — "just checking" — appear forty times in a week is the intervention. Everything else is scaffolding around that mirror.

04

Honest about the metaphor

The cyberpunk framing names attention-attackers as hostile. But we never lie about the software: it logs visits to sites you flagged yourself, nothing else.

// last transmission

The log is the intervention

No streaks to protect, no points to chase — nothing to win. Just your own reasons, timed and counted back to you. icecut goes live when the wall is ready.

request access