Your Ex Does Not Send Messages.
They Deploy Payloads.
Each message is engineered to exploit a specific vulnerability in your emotional operating system. This free scanner teaches you to read the code underneath the words — so you can name the malware before it executes.
Run the scanner below. Then get the full PDF to keep on your phone.
The Emotional Malware Scanner
7 Malware Types. Read all of them.
Highlight the 2 or 3 your ex uses most.
Click each malware type to expand it. Read the detection signals. Note which ones you recognise in your own message history. That recognition is the beginning of the firewall.
What it is
Pure bait has no logistical purpose. It exists to provoke a defensive or emotional response — giving your ex proof that they can still reach you. Once you respond, they’ve won.
Live samples
“I can’t believe you think it’s okay to parent that way.”
“Everyone knows what you’re really like.”
Firewall response
What it is
Guilt injection reframes normal parenting decisions as evidence of your cruelty or failure. It makes an emotional argument designed to destabilize your confidence until you give in.
Live samples
“You used to care about this family. Now I don’t even recognize you.”
Firewall response
What it is
False urgency manufactures a crisis to bypass your rational vetting system. Most crises from a high-conflict ex are not emergencies. They are control attempts with an expiration date attached.
Live samples
“Something happened with the kids and you need to call me immediately.”
“If you don’t respond in the next hour I’m calling my lawyer.”
Firewall response
What it is
History rewriting presents a distorted version of past events as established fact — and dares you to correct it. The trap is in the correction. They will never agree. The argument is the goal.
Live samples
“I have texts proving you agreed to this. You always do this.”
Firewall response
What it is
Veiled threats produce fear while maintaining plausible deniability. Your ex isn’t threatening you — they’re “just expressing concern.” The intimidation is the message; the civilized wrapper is the disguise.
Live samples
“I hope you’re keeping records, because I certainly am.”
Firewall response
What it is
Love bombing reverses the pattern suddenly — kindness, nostalgia, apparent reasonableness. It feels like a breakthrough. It is a tactic to lower your firewall. The warmth evaporates the moment it achieves its purpose.
Live samples
“I think we actually make a great team when we try.”
Firewall response
What it is
Message flooding uses sheer volume to overwhelm your vetting system. When messages come in rapid succession, you stop reading carefully and start reacting. The goal is to keep you permanently on their schedule.
Live samples
“Why aren’t you responding? I know you’re seeing these.”
Firewall response
Quick Scan Checklist — Mark which ones your ex uses
Your ex has a focused playbook. Knowing the specific types they use means you can build a targeted firewall. The Firewall Protocol gives you the full VAULT system and the exact response library for each of these tactics.
Your ex cycles between tactics depending on which gets the best response. The VAULT method in the Firewall Protocol is specifically designed for this — it works across all 7 types because it addresses the mechanism, not just the tactic.
Your ex deploys most or all of the toolkit. This level of tactics is exhausting precisely because no single response strategy works across all of them. The Firewall Protocol gives you the unified system that handles all 7 types with one framework: the VAULT method.
Inside The Course
Everything in The Firewall Protocol
One course. One payment of $97. The complete communication firewall system for high-conflict co-parenting.
You can now name the code.
The protocol teaches you to block it.
Naming the malware type is the beginning of the firewall. The Firewall Protocol gives you the full VAULT system, the 52 response library, the exchange scripts, the audit, the field guide cards, and the evidence archive. Everything you need to make their messages produce no spike at all.
Full course and all 7 parts included: $97
Get Instant Access for $97 →Secure checkout. Instant access on purchase. 30-day money-back guarantee.