Didn't sleep. Attacked cipher instead.
This email could have been a paper. And maybe it will be.
https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/8cNYhg23B9k
@jrose the trick is that on decapsulation, you recover the entropy used by the encapsulator, and can use that to rerun the encapsulation algorithm. If the encapsulator was honest, you return the shared key, if the encapsulator lied you return pseudorandom garbage.
So while the original scheme could be attacked via adaptively chosen ciphertexts, this transform forces the attacker to not have any choice in the ciphertexts they produce, making the whole construction IND-CCA