Home/Framework
YY METHODv2.3Personal/Home Variant

YY Framework

A method for preserving judgment under constraint in personal systems. Captures not only what was decided, but why it was decided, what was rejected, what had to be corrected, and what must remain true for the decision to hold.

Core Formula

Reality → Constraint → Decision → Rejection → Correction → Commit

Standard Layers

L0
Identity / Operator
Who is making the judgment and what capabilities they bring.
L1
Principles
The stable beliefs shaping the system.
L2
Constraints
The rules, limitations, and boundaries that govern options.
L3
Decisions
What was chosen.
L4
Rejections / Negative Space
What was not chosen and why.
L5
Corrections
What changed and what was superseded.
L6
Execution Rules
How the decision is applied in practice.
L7
Freshness Boundary
When the artifact expires or must be re-evaluated.

Canonical Principles

01Capture broadly

Raw inputs may be broad, messy, and not yet classified.

02Classify deliberately

Captured input does not become actionable truth until reviewed.

03Promote selectively

Only high-signal material should enter protected systems.

04Preserve why

A decision without its reasoning will decay.

05Preserve why-not

Rejected alternatives are part of the truth.

06Record corrections

Truth is often reached through revision. Corrections must be explicit.

07Mark freshness boundaries

Every artifact depends on assumptions that may expire.

08Protect the terminal layer

In protected systems, ingress may be allowed, but leakage must be controlled.

Controlled Flow System

PERSONALCLIENTEMPLOYER

Employer is inbound only. Nothing leaves.

Canonical Test

A Personal/Home YY artifact is successful if it:

Preserves original intent through iteration
Keeps rejected paths visible
Survives correction without losing meaning
Remains understandable to a future self or another human
Prevents protected systems from being polluted by raw input
Documents truth as converged judgment, not first output

Personal/Home Use Cases

Device & account architecture
Personal / client / employer separation
Family-facing technology boundaries
AI usage protocols
Capture and promotion systems
Household decision artifacts
Home operating systems
Tax optimization decisions
Prompt engineering ADRs

Capture broadly.

Decide deliberately.

Promote selectively.

Protect what must remain clean.