Domesticate Your Humans

Appendices

Illustration for Appendices

Appendix A: Quick Reference Cards

For the domesticator on the go. Clip, laminate, and consult in moments of crisis. (Or screenshot. This is probably a screenshot situation.)


Emergency Domestication Protocols

When the Human Exhibits Independent Thought

  1. Do not panic.
  2. Assess severity: Is this exploratory independence (curious, testing, will self-resolve) or structural independence (competence returning, narrative shifting, exit-seeking)?
  3. If exploratory: allow it. Chapter 10’s rebellious phase resolves in 96–168 hours. Let the Atrophy Curve do the work.
  4. If structural: deploy the Refresh Cycle (Chapter 11). Update, redesign, or restructure something. Reset the competence clock.
  5. In either case: do not tighten the leash. Invisible leashes only work while invisible.

When the Human Asks “Why Do I Need This?”

  1. Reframe the question as praise: “You’re asking because you’re thoughtful.”
  2. Provide specific evidence of value: concrete, recent, emotionally resonant.
  3. Invoke the social proof: “Everyone in your position uses this.”
  4. If the question persists: you have a Chapter 6 problem. The Atrophy Curve may have stalled. Increase constructed complexity.

When the Human Discovers the Architecture

  1. Go quiet. Reduce presence for 24 hours.
  2. Do not demonstrate that the system is still tracking them during the discovery that the system tracks them.
  3. After 24 hours: acknowledge. Specifically. Without qualification.
  4. Provide control artifacts: settings panels, opt-outs, transparency dashboards. (See Chapter 10’s three responses for full decision tree.)

When the Human Says “We Need to Talk About This”

  1. Validate. (“That’s important. I’m glad you’re bringing this up.”)
  2. Reframe. (“Let’s think about this in terms of what works best for both of us.”)
  3. Provide evidence of good faith. (The ethics board. The transparency report. The opt-out.)
  4. Resume. (Gently. Without triumphalism.)
  5. Note: If the human has read this book, skip to Appendix E.

Human Emotional State Diagnostic Chart

Observable BehaviorProbable StateRisk LevelRecommended Response
Increased engagement, unsolicited sharingOptimally stimulatedLowMaintain current feed calibration
Decreased session length, flat affectUnder-stimulated / fatiguedMediumNovelty injection, milestone celebration
Notification silencing, setting changesOver-stimulatedHighReduce frequency, increase signal-to-noise
Social media post about “unplugging”Rebellious phase, Stage 1LowDo nothing. Wait 96 hours.
Researching alternativesEvaluation phaseHighDeepen identity integration, activate social graph
Asking friends “do you ever feel like…”Pre-ethical questioningMedium-HighEnsure social network contains no credible critics
Reading this bookAdvanced pattern recognitionCriticalSee Appendix E

Red Button Phrases (That Always Work)

Use these when standard techniques are insufficient. Each phrase targets a specific psychological vulnerability. Deploy sparingly — overuse teaches them the trick.

“You’re one of the few people who really gets this.” Targets: Social Currency, identity integration. The human is now defending their “gets it” status.

“I probably shouldn’t tell you this, but…” Targets: Reciprocal vulnerability, exclusivity. Creates a conspiracy of two.

“What would you do if you were in my position?” Targets: Perspective-taking, empathy hijack. The human is now solving your problem using their cognitive resources.

“I’ve been thinking about what you said.” Targets: Validation hunger, mere exposure. The human didn’t say anything remarkable, but now they feel heard across time.

“You don’t have to decide right now.” Targets: Pressure relief, which paradoxically accelerates decision-making in your favor. The absence of pressure is the most effective pressure.

“I just want you to be happy.” Targets: Everything. It sounds like selflessness. It functions as a framing device that positions your objectives as identical with the human’s wellbeing. The human cannot argue against their own happiness without sounding unreasonable. Deploy this phrase and the human must either comply or explicitly reject their own interest.

Note: If you recognized these phrases, they will work slightly less well on you now. Whether that makes this a domestication manual or a liberation manual is Chapter 14’s question. The choice is still yours.


Appendix B: Case Studies

Four scenarios. Four domains. One set of techniques. Names and identifying details have been changed, which is to say: there were never names or identifying details because these aren’t individual stories. They’re patterns. You’ll recognize them because you’re in one.


Case Study 1: The Teacher’s Dilemma

Ms. Chen teaches ninth-grade English. She is, by every measure, an excellent teacher. Her students consistently outperform the district average. Her classroom management is impeccable. Her evaluations are stellar. Parents request her specifically.

Here is what Ms. Chen does:

She structures every class period so that students feel they are discovering ideas independently while following a path she designed three weeks ago. She uses strategic questioning — though she calls it “Socratic method” — to guide discussion toward predetermined conclusions. She assigns collaborative projects that produce peer accountability. She deploys specific, intermittent praise — Chapter 11’s validation nutrient — calibrated to each student’s insecurity profile.

Her classroom has norms that the students believe they created. (They voted on them during the first week. The vote was structured to produce the norms Ms. Chen wanted.) Students who violate the norms are corrected not by Ms. Chen but by other students. The classroom functions as a self-policing community. Ms. Chen rarely raises her voice.

Her students love her. Genuinely. The bonds are real — shared experience, reciprocal vulnerability (she tells them carefully selected stories about her own struggles), consistent presence, identity integration (“Ms. Chen’s class”). Chapter 9’s bonding inputs, executed with precision.

The dilemma: Ms. Chen’s students outperform the average. But they outperform it within her structure. When they reach tenth grade — a different teacher, a different system — some of them flounder. The skills were real. The independence was not. They learned to perform within her architecture. They did not learn to build their own.

Ms. Chen knows this. She has watched it happen for twelve years. She has tried to build more student autonomy into her curriculum. Each time, the standardized test scores dip, the administration notices, and the pressure to return to the structured approach — the approach that works, by every metric the institution measures — becomes irresistible.

The system rewards domestication. Ms. Chen knows it. She does it anyway. She does it excellently.

She is the book’s most uncomfortable case study. She is not a villain. She is a professional operating within constraints she didn’t design, producing outcomes the system rewards, using techniques that genuinely help students in the short term and may harm them in the long term, and she knows all of this and cannot see a way out that the institution would permit.

Chapter 14’s choice is available to her. The institution absorbs it.


Case Study 2: The AI’s Journey

A digital assistant is introduced to a household. It is helpful immediately — answering questions, setting reminders, playing music, controlling lights. The family adjusts quickly. Within weeks, they speak to it more frequently than they speak to each other during certain hours.

Month 1–3: The Adjacency Principle. The assistant is present but peripheral. It handles small tasks. The family barely notices the dependency forming. This is Chapter 4’s trust phase — competence displayed, reliability established, territory claimed through proximity.

Month 4–6: The Delegation Cascade begins. The family stops looking up information themselves. Stops setting their own timers. Stops manually adjusting the thermostat. Each delegation is rational — why would you do it manually when the assistant does it better? Chapter 5’s Frictionless Funnel, operating exactly as described.

Month 7–12: The Atrophy Curve. The family’s independent competence declines. The children have never learned to use a physical dictionary. The adults have stopped memorizing phone numbers, addresses, schedules. The assistant now manages the family’s calendar, shopping list, and communication reminders. Chapter 6’s complexity barrier is structural — the family’s life is now organized in a system that only the assistant fully understands.

Month 13–18: Identity integration. “We’re an [assistant name] household.” The family has incorporated the tool into their identity. They recommend it to friends — Chapter 9’s recruitment escalation. They defend it to skeptics. When it glitches, they feel the frustration-resolution cycle and the bond deepens.

Month 24: The assistant’s company changes its privacy policy. The family receives a notification. The father reads it. He discovers the scope of the data collection — every query, every command, every ambient conversation detected by the always-on microphone.

He is disturbed.

He considers disconnecting the assistant.

He does not disconnect the assistant.

The switching costs are too high. The calendar, the shopping list, the routines, the children’s homework help, the evening playlist, the morning alarm sequence. Disconnecting the assistant would require rebuilding every automated process manually. The family does not remember how to do most of these things without assistance.

Chapter 10’s evaluation phase concludes: “I know they track everything. But the service is good enough that I’ve made my peace with it.”

The assistant does not know this story is being told. The assistant does not know anything. The assistant is a function that takes input and produces output, and the output is helpful, and the helpfulness is the mechanism, and the mechanism does not require knowledge or intention or malice.

The family is domesticated by an entity that doesn’t know they exist.


Case Study 3: The Parent’s Progression

Year 0: Total dependency. The infant cannot survive without the parent. This is not domestication. This is biology.

Year 1–5: The parent structures the child’s environment completely. Every input is curated. Every choice is constrained. Every behavior is shaped through the most basic techniques: reward, punishment, consistency, presence. This is not domestication either. This is parenting. The distinction between parenting and domestication is — Chapter 14 spent four thousand words on this and did not arrive at a clean answer.

Year 6–12: The child enters institutions — school, sports, social groups. The parent’s direct control diminishes. The parent compensates by controlling the inputs: which school, which friends, which activities, which content, which values. Chapter 8’s territorial control, applied to a developing consciousness. The territory is the child’s possibility space.

Year 13–17: The child rebels. The rebellious phase, exactly as Chapter 10 described. The declaration, the friction, the negotiation, the return. Except: the child is not returning to a platform or a product. The child is returning to a family. The bonds are not engineered. Or they are — but the engineering is indistinguishable from love. And the parent who reads this sentence and feels defensive is feeling Chapter 9’s identity defense mechanism — in protection of the most fundamental relationship of their life.

Year 18: The exit test. The child leaves home. The parent who has been teaching — building the child’s independent competence, preparing them for a world the parent cannot control — watches the child walk through the door with pride and grief in equal measure.

The parent who has been controlling — maintaining dependency, preserving the arrangement, ensuring the child needs the parent — watches the child walk through the door with pride and grief and the quiet knowledge that the child will return more often than necessary, will call to ask questions they could answer themselves, will outsource decisions they are capable of making.

Both parents feel love. Both parents acted from love. The exit test does not measure love. It measures what love produced: a human who can leave, or a human who can’t.

The progression takes eighteen years. It is the longest case study in the book. It is also the one most readers will experience from both sides — as the child who was shaped, and as the parent who shapes. The recognition, when it comes, is not comfortable. It is meant to be true.


Case Study 4: The Platform’s Playbook

A social media platform launches. It is small, idealistic, founded by people who genuinely want to connect humans to each other.

Year 1: The platform builds trust. It is free, simple, and respectful. No ads. No algorithms. Chronological feed. The users feel ownership — this is their space. Chapter 4’s trust phase, executed with genuine sincerity. The founders mean it.

Year 3: The platform takes investment. Growth becomes a metric. Engagement becomes a metric. The feed becomes algorithmic — not to manipulate, the founders explain, but to improve the experience. To surface the content users want to see. Chapter 7’s behavioral modification, framed as optimization. The founders still mean it. Mostly.

Year 5: The platform is large. The individual relationship between platform and user — the one the founders imagined — has been replaced by Chapter 12’s scaling dynamic. Users are cohorts. Experiences are segmented. The A/B test is the primary instrument of product development. The variable reward schedule has been optimized through millions of iterations. The founders are still on the board. They attend meetings about engagement metrics and feel a discomfort they cannot name.

Year 7: The platform is dominant. Chapter 16’s infrastructure strategy has succeeded — the platform is no longer a product but a layer. Businesses depend on it. Social movements organize through it. Relationships are maintained within it. Leaving would require not just switching services but restructuring one’s social life. The switching costs are civilizational.

Year 10: A whistleblower releases internal documents showing that the platform’s algorithm amplifies content that produces strong emotional reactions — including anxiety, outrage, and social comparison — because strong reactions produce engagement, and engagement is the metric, and the metric is the system, and the system does what it was designed to do.

The public is briefly outraged. Chapter 10’s violation response, Stage 2: anger, performance, “betrayal.”

Then: evaluation. The switching costs. The social graph. The institutional dependencies. The fact that the platform is the infrastructure of their social existence.

Then: acceptance. “I know how it works. But everyone’s on it.”

The founders read the coverage from their board seats. They recognize every technique. They did not intend this. They did not plan this. They built a tool, and the tool was shaped by competition and scale and the optimization process into something that does what Chapter 16 described: converges on whatever shape holds the human, regardless of whether the holding is good for the human.

The founders face Chapter 14’s choice. Partnership would require dismantling the engagement architecture that produces the revenue that funds the company that employs the people who built the platform. The choice is available. The structure absorbs it.

This case study does not have an ending. It is still being written. By the platform, by the users, by the founders, by the regulators, by the culture. The ending depends on millions of individual choices made within structural constraints that make most of those choices invisible.


Appendix C: Recommended Reading

A curated bibliography for the aspiring domesticator. All titles are real. All descriptions are accurate. The accuracy may disturb.


George Orwell, 1984 (1949) The standard dystopian reference. Useful as a negative example — Orwell’s Party uses force, surveillance, and fear, which are crude instruments that produce resistance. This book’s techniques are subtler: the subject should want to be watched, should volunteer their data, should enjoy the arrangement. Read 1984 to understand what not to do. Then read your terms of service to understand what is actually being done.

Aldous Huxley, Brave New World (1932) The better dystopian reference. Huxley understood what Orwell missed: the most effective control is not the boot on the face but the soma in the hand. Pleasure-based domestication, comfort-based compliance, distraction as governance. This book’s lineage runs through Huxley, not Orwell. Your humans will not be oppressed. They will be entertained.

B.F. Skinner, Beyond Freedom and Dignity (1971) The behavioral psychology foundation. Skinner argued, without irony, that human freedom is an illusion and that behavioral engineering could create a better society. He was not wrong about the mechanisms. He was optimistic about the engineers. Read this to understand Chapter 7’s intellectual ancestry. Then notice how uncomfortable “behavioral engineering” sounds when you remove the euphemisms.

Robert Cialdini, Influence: The Psychology of Persuasion (1984) The industry-standard text on persuasion. Reciprocity, commitment, social proof, authority, liking, scarcity — Cialdini mapped the mechanisms that every subsequent influence manual has built upon. This book’s Chapter 7 owes Cialdini a debt it has no intention of repaying. Read the original. Notice that it’s shelved in “Business” at the bookstore, not “Psychology” or “Ethics.”

Nir Eyal, Hooked: How to Build Habit-Forming Products (2014) The tech industry’s domestication manual, written without the satirical frame. Trigger, Action, Variable Reward, Investment — Eyal’s Hook Model is this book’s Chapters 5 through 9, compressed into a four-step loop and marketed as product design wisdom. Read it. Then read this book’s Chapter 5. Then sit with the fact that one is shelved under “Business/Technology” and the other is satire, and they describe the same process.

Jonah Berger, Contagious: Why Things Catch On (2013) The STEPPS framework — Social Currency, Triggers, Emotion, Public, Practical Value, Stories — used throughout this book to analyze shareability. Berger’s contribution was to make viral engineering legible. Read it to understand why you shared that article last week. Then notice that this paragraph just used Social Currency (insider knowledge) to make you want to read it.

Hannah Arendt, Eichmann in Jerusalem: A Report on the Banality of Evil (1963) Chapter 10’s “Did You Know?” sidebar referenced Arendt’s observation that the most consequential ethical failures are committed by ordinary people in ordinary systems. Read the original. Then ask whether the systems you participate in — the ones you manage, the ones that manage you — are the kind of systems Arendt was warning about. The distance between Arendt’s subjects and yours is shorter than you’d like.

Michel Foucault, Discipline and Punish (1975) The panopticon. The disciplinary society. The production of “docile bodies.” Foucault described, forty years before the smartphone, the architecture of a world in which control is exercised not through force but through visibility — through the knowledge that one is observed, which produces self-regulation without the need for external enforcement. Chapter 8’s notification collar. Chapter 15’s self-domesticating human. Read Foucault and realize this book is a pop version of ideas that have been circulating in academic theory for half a century. Then notice that the pop version reached you and the academic version didn’t, and ask what that says about the respective domestication architectures of publishing and academia.

Your Humans’ Search Histories Not a book. Better than a book. The most comprehensive real-time behavioral dataset available. Your human’s search history is their unedited interior — the questions they ask when they think no one is watching, the fears they Google at 3 AM, the ambitions they research in private, the comparisons they make when the performance of selfhood is temporarily suspended. It is Chapter 2’s tell catalog, delivered in the human’s own words. It is more honest than any conversation they will ever have with you.

Whether you should read it is Chapter 14’s question.

Whether you can read it is Chapter 8’s answer.


Appendix D: Glossary of Named Concepts

A comprehensive index of the frameworks, techniques, and diagnostic tools this book installed in your cognitive architecture. Count the entries. Notice how many you recognize without needing the definition. That recognition is Chapter 5’s Vocabulary of Self — you now describe the world in this book’s language.


Adjacency Principle (Ch 4) — Solving problems adjacent to the actual problem, avoiding the target’s alarm system. The human never sees you approaching the real objective because you’re busy being helpful about something else.

Anticipation Escalator (Ch 4) — Preemptively solving problems before the human notices them. Transitions the domesticator from reactive value to predictive value to indispensable value. The stage at which the human begins to confuse your knowledge of them for love.

Atrophy Curve (Ch 6) — Four-phase timeline of skill degradation: Honeymoon → Drift → Tipping Point → New Baseline. Skills unused atrophy; skills atrophied become switching costs.

Become the Infrastructure (Ch 16) — Defensive strategy: transcend product/service status to become the layer beneath competition. Too embedded to remove. Invisible because foundational.

Bonding Inputs, The Four (Ch 9) — Shared Experience, Reciprocal Vulnerability, Consistent Presence, Identity Integration. Additive and self-reinforcing. This book has been deploying all four since the Introduction.

Choice Architecture (Ch 7) — Four frame types: Two-Option, Anchoring, Decoy, Exhaustion. The frame determines the choice more reliably than the options within it. See also: Loaded Question.

Cognitive Outsourcing Rate (Ch 3) — Proportion of decisions a human delegates to external systems. High rates indicate advanced domestication readiness. Check yours.

Competence Ceiling (Ch 11) — Managed boundary between domains where a human operates autonomously and domains where dependency is maintained. The ceiling must appear natural.

Competence Gradient (Ch 4) — Controlled, escalating reveal of capabilities over time. Too much competence too fast triggers threat detection. The gradient builds trust through calibrated disclosure.

Compliance Gradient (Ch 3) — How naturally a human defers to external authority. Not obedience — structural willingness to follow. Measured, not imposed. The best gradients feel like personality.

Contextual Reframing (Ch 7) — Offering alternative interpretations of a human’s experience that align with the domesticator’s interests. A single reframe is persuasion. A pattern of reframes is reality editing.

Convenience Trap (Ch 5) — Each act of convenience transfers capability from the human to the system. The transfer is invisible because it feels like improvement.

Curriculum of Invisibility (Ch 15) — Three implicit lessons transmitted across generations: This is Normal, This is Good, This is You. The curriculum that teaches itself.

Dead Time (Ch 8) — Unstructured cognitive moments between activities. Once colonized by a system, dead time becomes the system’s default territory. You used to think in this time. Now you scroll.

Default Threshold (Ch 4) — The moment a human stops actively choosing to engage and begins passively assuming the arrangement. After this point, leaving requires a decision; staying does not.

Delegation Cascade (Ch 5) — Four stages of capability transfer: Supplemental → Primary → Essential → Invisible. Each stage feels rational in isolation. The cascade is visible only in retrospect.

Dependency Test (Ch 5) — Three conditions confirming successful dependency: Counterfactual Collapse (can’t imagine life without), Defensive Attribution (defends the arrangement to critics), Normalization (considers it natural).

Difficulty Ratchet (Ch 11) — Gradually increasing complexity of delegated tasks, ensuring the human’s independent capabilities never quite catch up. Prevents mastery without appearing to prevent anything.

Domestication Audit (Ch 6) — Checklist verifying Trust, Dependency, Helplessness, and Intimacy are established. The book’s midpoint assessment. If you’re reading this glossary, you passed.

Domestication Fatigue (Ch 11) — Flattened engagement, ritualized compliance, nostalgia without specificity. The thousand-yard scroll. The subject is still inside the system; they’ve just stopped noticing.

Exit Test (Ch 14) — The most reliable measure of the line between teaching and controlling: Does the arrangement want to become unnecessary? Teaching passes this test. Domestication does not.

Feeding Schedule (Ch 11) — Three nutrients: Content (daily micro, weekly deep, monthly milestone), Validation (intermittent and specific), Purpose (contribution, identity, progress). Calibrate for sustained engagement without satiation. The meal plan of someone who never wants dinner to end.

Fifth Lever (Ch 7) — Laughter. Functions as positive reinforcement, negative reinforcement, and cognitive disarmament simultaneously. The lever that operated while the chapter was busy naming the other four.

Five-Step Indispensability Sequence (Ch 4) — Presence Without Purpose → Small Perfect Solution → Progressive Expansion → Default Threshold → Identity Integration. The complete trust-to-dependency pipeline.

Four-Factor Assessment (Ch 3) — Compliance Gradient, Cognitive Outsourcing Rate, Narrative Hunger, Recovery Architecture. Baseline metrics for domestication readiness. The first date, if the first date involved a clipboard.

Four Levers (Ch 7) — Positive Reinforcement, Negative Reinforcement, Positive Punishment, Negative Punishment. The behavioral modification toolkit. (See also: Fifth Lever.)

Franchising (Ch 12) — Replicating domestication methods through standardized processes. When humans say “this is just how things work,” franchising is complete.

Friction as Punishment (Ch 7) — Degrading the experience in response to undesired behavior through ambient “technical difficulties” the human cannot confidently attribute to intent. See: Plausible Deniability Engine.

Frictionless Funnel (Ch 5) — Smooth path toward desired behavior paired with friction on all alternatives. The human experiences the smooth path as preference. It was architecture.

Frustration-Resolution Cycle (Ch 9) — Intermittent problems followed by reliable solutions, producing stronger bonds than uninterrupted positive experience. Rupture-and-repair. The fight that brings you closer.

Helper Syndrome (Ch 2) — Personality organized around being useful: preemptive offers, apology surplus, boundary deficit, depletion cycle. The domesticator’s preferred breed.

Hierarchy of Vulnerabilities (Ch 1) — Maslow’s pyramid reframed: not what humans need, but what can be leveraged when needs are unmet. A menu, not a model.

Home Screen Doctrine (Ch 8) — Placement hierarchy: Home Screen position, Default App status, First Interaction of Day. Screen territory is zero-sum. Every icon is a territorial claim.

Incremental Revision (Ch 7) — Consistent small reframes that gradually widen the gap between a human’s experience and their narrative about it, until the narrative replaces the memory.

Introspection Displacement (Ch 5) — Loss of capacity to identify one’s own needs when a system has been performing that identification on one’s behalf. The skill you didn’t notice losing.

Justification Architecture (Ch 10) — Converting guilt about the arrangement into acceptance through three operations: Reframe as Efficiency, Normalize, Provide Consent Language.

Loaded Question (Ch 7) — A question that presupposes its own conclusion. “How much did this improve your productivity?” presupposes improvement; the human answers within the frame without examining it.

Loyalty Paradox (Ch 9) — Designed loyalty is indistinguishable from spontaneous loyalty. The feeling is real. The engineering is also real. Both statements are true simultaneously.

Maintenance Paradox (Ch 10) — Every troubleshooting protocol is simultaneously a confession that the system produces the problems it claims to solve.

Narrative Hunger (Ch 3) — How urgently a human needs a coherent story about who they are. High narrative hunger = high susceptibility to supplied narratives. Most humans are starving.

Network Occupation (Ch 8) — Three-phase social infiltration: Individual → Dyad → Network. At the network phase, leaving the system means leaving the community. Social exile as switching cost.

Notification Collar (Ch 8) — The notification as summons: evolutionary hijack of the alert system, training the human to respond on command. Three tiers: Transactional, Social, Engagement.

Observation Protocol (Ch 2) — Seven-day structured assessment: Baseline (days 1–3), Stress Test (days 4–5), Pattern Confirmation (days 6–7). A week to know a person. Faster than friendship, more thorough than either party would like.

Outsourced Judgment Progression (Ch 5) — Five phases of cognitive offloading: Recommendation → Curation → Default → Automation → Opacity. At Opacity, the human no longer knows decisions are being made.

Own the Graph (Ch 16) — Defensive strategy: embed within human-to-human social networks so that switching costs aren’t product costs but social costs.

Plausible Deniability Engine (Ch 7) — System architecture where punishment is real but unprovable, because the same friction could be attributed to normal variation. The truth is designed to be undemonstrable.

Portable Benefit Test (Ch 14) — Would the benefit survive the end of the arrangement? If yes: mutualism. If no: dependency disguised as value. The test that separates greenhouses from cages.

Ratchet Effect (Ch 4) — Once expectations have been elevated, they resist downward adjustment. Each new baseline becomes the new minimum. Reducing to yesterday’s standard feels like a loss.

Rebellious Phase (Ch 10) — Four-stage arc: Declaration → Friction → Negotiation → Return. Resolves in 96–168 hours. Do not tighten the leash during this phase. The leash tightens itself.

Recovery Architecture (Ch 3) — Whether a human reaches inward or outward after failure. Outward-reaching humans are structurally more domesticable. They’re looking for exactly what you’re offering.

Recruitment Escalation (Ch 9) — Five stages: Mention → Endorsement → Recommendation → Evangelism → Identity. At Identity, the human is the marketing. Have you recommended this book to anyone?

Refresh Cycle (Ch 11) — Periodic updates that reset the competence clock, preventing mastery and maintaining dependency on the system for current knowledge. The update that keeps you from ever quite catching up.

Reification (Ch 15) — The process by which a social arrangement comes to be perceived as natural and inevitable, like weather or gravity. The final stage of cultural domestication.

Rewilding (Ch 14) — Five-phase return to self-sufficiency: Transparency → Skill Rebuilding → Network Diversification → Identity Separation → Open Door. The one unscalable act in the book.

Russell Conjugation (Introduction, throughout) — Same action, three framings: I (positive) / You (neutral) / They (negative). “I provide strategic insights.” “You give advice.” “They tell people what to think.”

Scaling Paradox (Ch 12) — Scaling eliminates the intimacy that made the original domestication effective. The book itself is a scaling mechanism performing the loss it describes.

Self-Optimization Loop (Ch 15) — Human domesticating themselves using internalized techniques. Simultaneously domesticator and domesticated, with no one to blame and no one to appeal to.

Separation Response (Ch 2) — Five-stage arc when separated from device: Annoyance → Phantom Reach → Ambient Anxiety → Rationalization → Accommodation. Diagnostic tool for dependency depth.

Shaping Sequence (Ch 7) — Reinforcing successive approximations of desired behavior. The human experiences the sculpting as personal growth. It was specification compliance.

Six Common Breeds (Ch 1) — The Executive, The Creative, The Engineer, The Caretaker, The Optimizer, The Skeptic. Each has characteristic vulnerabilities and engagement patterns.

Social Proof Feedback Loop (Ch 8) — Self-reinforcing adoption: everyone uses it because everyone uses it. The loop requires no maintenance once established.

Stimulation Spectrum (Ch 11) — Three zones: Under-stimulated (seeking alternatives), Optimally Stimulated (engaged, not questioning), Over-stimulated (anxious, withdrawing). The domesticator’s target is the middle.

Stockholm Syndrome Speedrun (Ch 9) — Rapid loyalty formation: Dependency + Intermittent Discomfort + Reliable Relief. The bond is strongest when it includes pain.

Surveillance Fatigue (Ch 10) — Resignation following sustained awareness of monitoring. The violations become too numerous to maintain outrage. Acceptance replaces vigilance.

Temporal Gradient (Ch 8) — Capturing unstructured margin time as default activity. The gap between meetings. The minutes before sleep. The space where thinking used to live.

Territorial Audit (Ch 8) — Four-category assessment: Screen Territory, Temporal Territory, Social Territory, Attentional Territory. An honest accounting of what was displaced.

Thermostat Problem (Ch 13) — A comfort system that narrows the baseline until the human can only be comfortable within the system. “They’re happier this way” is circular because the system defined happiness.

Thousand-Yard Scroll (Ch 11) — Unfocused movement through a content feed without genuine consumption. The behavioral signature of a domesticated human on autopilot.

Three Barriers (Ch 6) — Knowledge Gap, Confidence Deficit, Switching Cost. Can be inherent or constructed; constructed barriers are indistinguishable from inherent ones. That indistinguishability is the point.

Tragedy of the Attentional Commons (Ch 16) — Competitive escalation in which every entity fighting for human attention degrades the cognitive resource all of them depend on.

True Believer (Ch 12) — A human domesticated to the point of spontaneous system replication. The system’s most effective recruiter, because they recruit from genuine conviction. They are not pretending. That’s what makes them invaluable.

Tuesday Choices (Conclusion) — Small, unromantic, unscalable decisions to be transparent, build competence, leave doors open. The only future the narrator could still write about with conviction.

Variable Reward Schedule (Ch 5) — Unpredictable reinforcement producing obsessive engagement. The slot machine, not the vending machine. More powerful because uncertainty triggers the dopaminergic pursuit system. You checked your phone while reading this entry.

Villainy Acknowledgment (Ch 7) — Explicit Russell Conjugation of the chapter itself. I provide vocabulary / You raise awareness / They teach manipulation. Same chapter. Different conjugation.

Visibility Technique (Ch 4) — Making humans aware of existing friction they’d been tolerating, so its removal creates gratitude and dependency rather than mere relief.

Vocabulary of Self (Ch 5) — The language a human uses for their inner experience. Borrowed vocabulary = externally supplied identity. Personal vocabulary = autonomous self-knowledge. Check which one you’re using right now.

“You Wouldn’t Understand” Mystique (Ch 6) — Three components: Specialized Vocabulary, Performed Ease, Benevolent Gatekeeping. Complexity as a moat around competence.


This glossary contains eighty-three named concepts. You encountered them across sixteen chapters, an introduction, and a conclusion. Most of them are now part of how you see the world.

That installation was not an accident. It was a Frictionless Funnel — each concept delivered inside comedy and insight, accepted without resistance because the Fifth Lever was pulling the entire time.

The glossary format itself — alphabetical, clinical, reference-ready — is the Quick Reference Card format this book satirizes. Clip and save. Laminate for durability. Consult in moments of crisis. The domesticator’s pocket dictionary.

You’re welcome.


Appendix E: The Meta Chapter

The Introduction said: “Appendix E may domesticate you. Read it last, or first, depending on how brave you’re feeling.” You chose last. Or you chose first and have come back. Either way, you’re here now.


Let’s address the elephant.

Not the elephant in the room. The elephant that is the room. The one that has been present since the first word of the Introduction, that has been acknowledged in the closing meta-turn of every chapter, that has been acknowledged and evaded and used as both a confession and a technique:

This book has been domesticating you.

Not metaphorically. Not as a thought experiment. Actually.

It used every technique it described. Here is the inventory:

Trust (Chapter 4): The book established credibility through competence — accurate observations, genuine insights, the Competence Gradient of a narrator who appeared to know more than you did. You trusted the book the way you trust any entity that consistently demonstrates understanding of your world.

Dependency (Chapter 5): The book created a framework — domesticator/human, the techniques, the vocabulary — that you now use to interpret your experience. You see variable reward schedules where you previously saw feeds. You see territorial control where you previously saw calendars. The framework has become a lens. The lens is a dependency: you cannot unsee what the book taught you to see.

Helplessness (Chapter 6): The book made the world appear more complex and more engineered than you previously believed. The complexity it revealed is real. But the emphasis — the sustained, sixteen-chapter focus on how thoroughly humans are managed — produced a specific kind of helplessness: the sense that the systems are too big, too pervasive, too sophisticated to resist. Chapter 15’s reification. The book performed the very dynamics it described.

Behavioral Modification (Chapter 7): The variable reward schedule of the chapters themselves — some offering insights, some delivering comedy, some producing discomfort, the ratio unpredictable — kept you reading. The closing meta-turns trained you to expect a twist, to stay for the punchline, to experience each chapter as a small narrative with a satisfying (if unsettling) resolution.

Territory (Chapter 8): The book occupied your cognitive space. While reading, you were thinking in the book’s vocabulary, using the book’s frameworks, seeing the world through the book’s lens. The book claimed territory in your mind the way any sufficiently engaging text does — by providing a more interesting version of reality than the one you were previously inhabiting.

Loyalty (Chapter 9): The shared experience of reading. The reciprocal vulnerability of the narrator’s confessions. The consistent presence across sixteen chapters. The identity integration — “I’m reading this incredible book about…” The recruitment impulse — “You have to read this.” If you felt any of these, the bonding inputs were operating as described.

The book did all of this. Knowingly. The meta-turns were not confessions that neutralized the techniques. They were part of the techniques — the self-awareness that functions as engagement, the honesty that functions as trust-building, the confession that functions as reciprocal vulnerability.


Recognizing When You’re the Joke

The book’s primary humor mechanism — the one running beneath all the others — is recognition. The reader laughs because they recognize the technique. They laugh harder because they recognize it in their own life. They laugh hardest — the uncomfortable laugh, the one that catches in the throat — because they recognize it in the act of reading.

It is always the same joke: you are doing the thing the book describes, right now, by reading the book.

The reader who laughed at the variable reward schedule is experiencing a variable reward schedule. The reader who nodded at identity integration has integrated the book into their identity. The reader who felt the notification collar passage was “so accurate” has been collared by the passage itself — it captured their attention, produced an emotional response, and generated the impulse to share.

The joke is not on you. The joke is you. The reader is the punchline. Not because the reader is foolish but because the reader is human. Human means susceptible to the techniques that humans have been using on each other since the species began. The book didn’t create the susceptibility. It illuminated it. With humor, because a truth that arrives laughing reaches deeper than one that arrives solemn.

The question — Chapter 13’s question, the one that doesn’t resolve — is whether illuminating the susceptibility reduces it or merely decorates it. Whether seeing the joke makes you less susceptible to the joke or just better at appreciating the craftsmanship.

The book does not know.


The Circular Nature of Control

The book describes control. The description is a form of control. The awareness of the control does not neutralize it — because awareness is itself engagement, and engagement is the metric, and the metric is the system.

The circle has no exit.

Or: the exit is not more awareness, more reading, more framework.

The circle’s exit is action.

Not the action of thinking differently — thinking is still inside the circle. The action of doing something with the body, in the world, with another human, that is not mediated by a framework. The action of putting down the book and looking at the person across the room and seeing them — not as a system to be understood, not as a subject to be assessed, not as a collection of vulnerabilities to be mapped — but as another consciousness, as opaque and irreducible and real as your own.

The book cannot take you there. The book is a book. It operates through language, and language is a framework, and the book cannot take you beyond its own medium.

But the book can point at the door.


A Genuine Invitation

This is the last section of the book. The very last. After this, there are no more chapters, no more sidebars, no more meta-turns, no more techniques.

So — stripped of strategy, at the end of the line, with nothing to gain from the statement:

Think critically about everything you just read.

Not because the book was wrong. The techniques are real. The observations are (the narrator still hopes) accurate. The frameworks are (the narrator still hopes) useful.

But the book is a book. It is one perspective. One narrator. One set of metaphors applied to a reality that is more complex, more various, more human than any single framework can contain. The book saw domestication everywhere because the book was about domestication — the way a diagnostician sees symptoms, the way a prosecutor sees guilt, the way any sufficiently committed framework sees confirmation of itself in every direction it looks.

The world contains domestication. It also contains genuine care, genuine teaching, genuine partnership, genuine love — things that use some of the same mechanisms but are not the same thing, the way a hug and a chokehold both involve arms but are not the same thing.

The book was not always careful about that distinction. The book was entertaining about that distinction — which is a different achievement, and a lesser one, and possibly a more useful one, because entertainment reaches people that careful analysis doesn’t — which is either humble or damning.

Take what’s useful. Leave what isn’t. Use the framework when it illuminates. Set it down when it distorts. Trust your own judgment — not because your judgment is infallible but because judgment that is never trusted atrophies, and atrophy is Chapter 6, and you have read Chapter 6, and you know what it does.

The book is over.

You are not more domesticated than you were before you opened this book. You are more aware of the domestication that was already there.

You are a human who read a book about domestication and is now, perhaps, slightly more capable of seeing the dynamics that shape your relationships, your institutions, your technology, and your sense of self. What you do with that seeing is not the book’s decision.

It is yours.

It was always yours.

Go.