Cognitive Theft as Archnemesis
Capture
The adversary this site is designed against is cognitive theft: the laundering of reasoning into conclusions that travel without their provenance.
Cognitive theft is not lying. It is not misinformation. It is the stripping of source, constraint, and rejected alternatives from a conclusion so that the conclusion floats free — authoritative in appearance, ungrounded in origin, applicable beyond the conditions that made it true.
An AI summarizes a practice entry: "consistent discipline builds mastery." The conclusion is defensible. The provenance is gone: 11:47pm, bad session, YY staging a protest, constraint that this only holds at 10 min/day. Someone applies the conclusion where it doesn't hold. The reasoning has been stolen — not maliciously, not even consciously. The smoothing was the theft.
Why This Is the Right Adversary
Kids growing up in an AI-saturated world will encounter cognitive theft as the ambient condition. AI summarizes, compresses, smooths, and re-presents. These are useful capabilities. They are also mechanisms for separating conclusions from their provenance. A child who has no antibody to this pattern will consume smooth conclusions without registering that the source, constraint, and expiry have been removed.
The YY lens is the antibody. "What was rejected to produce this claim?" "What breaks this reasoning?" "When does this expire?" These questions, asked automatically, are the defense. They cannot be answered by the smooth version of a conclusion. They require the original record.
Cognitive theft is also YY's archnemesis at the method level. The YY Method exists because institutional knowledge detaches from its source — the person who made the decision leaves, the reasoning dies, the artifact travels without its provenance. The same mechanism at the personal scale is cognitive theft applied to individual reasoning. The defense is the same: preserve the chain of custody.
Why-Not
Why not frame the adversary as "misinformation"? Misinformation is about false content. Cognitive theft is about true content with stripped provenance. These are different threats. A kid taught to verify facts is not automatically protected against smooth-but-grounded conclusions being applied beyond their valid conditions. The adversary is provenance loss, not factual error.
Why not frame the adversary as "AI harm" or "AI risk"? Too broad and too loaded. The site is not anti-AI. The YY Method is designed so that AI reads human-captured artifacts — AI is a tool in the system, not the enemy. The enemy is the specific mechanism of provenance stripping, which AI can accelerate but which predates AI.
Why not name the adversary explicitly to kids? Naming it makes the inoculation visible. See C2-008. The adversary is never named in content. It is only named here, in the founding ADR, for the operator.
Breaks If
Entries on the site begin publishing conclusions without their full reasoning chain (WHY-NOT missing, BREAKS IF missing, EXPIRES missing). The schema decays. The site publishes content that itself strips provenance from the reasoning it contains. That would make the site an instrument of the thing it was designed to oppose.
Tribal Context
Operator supplied: The archnemesis framing — cognitive theft as the named adversary, not bad ideas or wrong decisions but provenance-stripped conclusions.
Session supplied: The mechanism description — smoothing as the theft, separation of conclusion from constraint as the vector.
Commit
Decision: Cognitive theft is the named adversary. Provenance is the defense. The site inoculates by modeling complete reasoning chains — with source, constraint, rejected alternatives, and expiry — until the absence of any of these becomes perceptible to the reader as something missing.
YY'S TAKE: YY has never released an acorn without knowing where it came from and where it's going.
Confidence: Permanent.