Monday, February 23, 2026

The AI-pocalypse

The AGI Takeover Narrative Is Wrong and so is AI slop:

Everybody keeps warning about super-intelligent AGI escaping onto the internet and taking over the world. I think that’s wrong, and I think Sam Altman and a lot of other experts are wrong about it too..

AI isn’t going to be some disembodied digital god floating around the web. The whole direction of development is integration with the real world. The popular narrative imagines AI as a unified, self-aware entity that gains agency and turns hostile. In reality, today’s systems are narrow, task-specific models. They do not possess goals, intentions, or autonomous will. They generate text probabilistically in response to prompts. The most immediate and measurable impact of these systems is not existential violence, but informational degradation: the large-scale production of "AI Slop" that lowers content quality, pollutes search ecosystems, and erodes trust.

Instead of a singular superintelligence launching weapons, the more plausible outcome is a fragmented landscape of automated systems generating shallow, repetitive, and sometimes inaccurate material at industrial scale. The harm manifests as reduced signal-to-noise ratio, declining platform credibility, and increased difficulty verifying truth, not machines deciding to eliminate humanity.

AI Slop will ultimately alienate the users on the platform driving them from it. The result is that there will be no one on the platform to watch ads and buy products. Therefore it behooves the platforms to restrict the use of bots. Otherwise these platforms will not be getting paid through ad revenue because bots will not be clicking on, purchasing, or watching any of these ads, and there will be no real users interested in digesting low quality content. Therefore Dead Internet Theory is a "nothing burger", the problem will solve itself in time.

In college the fix is straightforward: allow AI-assisted submissions, grade them for accuracy, then generate a quiz directly from that submission and test the student on it. Average the assignment grade with the quiz grade. If the paper earns 100% but the student only demonstrates 0% understanding, if the average is 50% they fail. If they actually learned the material, they pass. If AI produces well-structured, factually correct material and the student can prove mastery of it, that’s an academic win, not a threat. This doesn't double the workload for teachers, instead what happens is students can turn in their finals on their own, be graded on that, and the final quiz will actually be on the content they turned in. AI can develop the exam, and grade the exam against the test results for accuracy, then average the results for a final grade. Still only one day of finals for a professor. Professors shouldn’t be upset that AI exists, they should adjust the evaluation model.

If we want AI to do what we do, lawn care, repairs, logistics, elder care, companionship , it needs plug-ins, add ons, sensors, vision, touch, mobility. It needs a body, and that body is a constraint. It’s a physical construct used to interact with the world. You don’t “release” that onto the open internet, you ship it as a product. If it starts behaving in ways we don’t like we can monitor, audit, and roll it back to last stable version. You will be able to look at the decision branch on an iPad and say, “Nope, I like response number two better” such as we see with current models when branching output to a user. This isn’t Skynet. No government is handing nuclear launch authority to a probabilistic language model. No Department of Defense is letting an autonomous system “turn the key.” We already see the flaws in current AI. Nobody serious is giving it unrestricted fire control.

AI won’t escape and rule humanity, it will be boxed, versioned, patched, and controlled. It will have hardware limits, power limits, firmware controls, sandboxed permissions, and managed update channels. In a body. On a subscription plan. With an off switch. That’s the future.

Friday, February 20, 2026

The age verification epidemic

Let’s take a look at Age Verification:

First: anyone can create a website. There is no license. No mandatory security certification. No universal encryption standard. Under age-verification mandates, any site can demand a government ID, a selfie, or biometric data in order to grant access. That includes incompetent operators. That includes data resellers. That includes sexual predators. If someone wants to harvest minors’ identity documents, these laws hand them legitimacy. “Upload your ID to continue.” That's not protection. That's structured data collection.

Second: this creates a data-retention epidemic. Every ID upload becomes another stored record. Every stored record becomes another breach target. Birthdates, driver’s licenses, and facial scans cannot be reset. When that data leaks, and it will, it persists. Expanding age verification multiplies permanent identity databases across thousands of private entities. The attack surface grows. The exposure grows. The risk grows.

Third: the blame shifting needs to stop. Large language models are not sentient. They are probabilistic systems. Neural networks trained via gradient descent to optimize next-token prediction across weighted parameter matrices. At their core, they function like a highly advanced Markov Chain: they generate each next word based on statistical patterns and conditional probabilities derived from prior text but with more dimension. They can capture context, intent, meaning, and long range relationships and dependencies in language. They do not "understand". They do not intend harm. There is no thought, no awareness, no comprehension. Only mathematical computation over learned parameter weights producing algorithmic output. The belief that there is “thinking” happening is a byproduct of anthropomorphizing a pattern-prediction machine. When people claim an AI company is responsible for “leading” a child to harm, they are assigning agency to a system that simply calculates probabilities and emits text. This misattribution of agency mirrors the logic behind what became known as the “Twinkie defense.” In 1979, Dan White was tried for the murders of Harvey Milk and George Moscone. His legal team argued diminished capacity due to severe depression, and junk food consumption was cited as one symptom of his mental decline. The media reduced that complex mental health argument to a simplistic narrative that snack cakes caused murder, turning it into shorthand for blaming an external product instead of personal responsibility. Blaming social media companies for individual overuse repeats the same flawed logic. Platforms may influence behavior, but they do not compel it. Individuals still choose how long they scroll, what they consume, and how they act. Just as a snack company is not legally responsible for someone’s violent actions, a tech platform is not solely responsible for how a person uses it. Personal accountability and parental oversight especially for minors remain central. Tools shape environments; they do not eliminate choice. I do not think The Twinkie Defense is an excuse to blame big tech for poor parenting, or lack of supervision.

Guns don't kill people, Forks don't make people fat, and pens didn't write the Declaration of Independence.

Fourth: We already know how accountability works. School attendance is mandatory. If a child repeatedly skips school, responsibility falls on the guardian. Six strikes you go to jail if I remember correctly. There are escalating consequences. Phones belong to parents. Access is granted by parents. A strike-based enforcement model  similar in structure to truancy escalation keeps responsibility where it belongs. Not on OpenAI. Not on Facebook. On the adult who handed over the device.

Fifth: devices should ship locked down by default. Child-protected mode out of the box. The parent explicitly unlocks higher tiers. The phone remains inspectable. Handing a child unrestricted internet access without structure is like handing over car keys without instruction. The answer is not forcing every website to collect ID. The answer is enforcing supervision at the device level.

Sixth: In the early 1990s, the video game industry faced intense public backlash over violent and suggestive content, particularly from games like Mortal Kombat and Night Trap. Mortal Kombat drew criticism for its realistic digitized violence and “fatalities,” while Night Trap sparked controversy due to its live-action scenes involving young women being attacked, which some critics compared to exploitation media. These concerns led to U.S. congressional hearings in 1993, where lawmakers, most notably Senators Joe Lieberman and Herb Kohl pressed the video game industry to regulate itself or face government intervention. In response, the industry created the Entertainment Software Rating Board (ESRB) in 1994. The ESRB introduced standardized content ratings (like “E,” “T,” and “M”) to inform consumers about game content, similar in concept to the film rating system already used by the MPAA. While there were public fears that violent video games would lead to real-world violence, attempts to hold developers legally responsible for players’ actions have generally failed in court. U.S. courts have consistently upheld that individuals, not media creators, are responsible for their actions, and that video games are protected under the First Amendment as a form of expression (reinforced later in Brown v. Entertainment Merchants Association). A key issue that keeps getting overlooked is pre-existing conditions. Mental health problems don’t appear out of nowhere from a single app. They are recognized in Clinical Psychology as complex and multi-factorial. If someone already has underlying issues and turns to social media instead of seeking professional help, that raises a separate question about personal decision-making not just platform design. The same goes for parents. Expecting social media companies, tech platforms, or even companies like Apple to act as a full-time safeguard or “babysitter” doesn’t align with how these systems are built or how responsibility is defined. Supervision, guidance, and making sure a child understands what they’re seeing online what’s real, what isn’t, and how to process it falls on the parent or guardian. Take films like Natural Born Killers. There have been cases where individuals claimed they were influenced by media like this (and went on a killing spree), but courts have consistently rejected the idea that filmmakers or studios are responsible for crimes committed by viewers. The same principle applies: consuming content doesn’t remove personal responsibility for actions. A TV is not a babysitter, and neither is social media. They are tools and platforms designed to deliver content, not to supervise behavior, replace parenting, or provide mental health care. Using them as a substitute is a misuse of the product, not a failure of the platform itself.  Parental controls on a child account already works on platforms like Netflix to keep kids from harmful content. Similarly websites can publish standardized content ratings similar in concept to ESRB categories in machine-readable metadata or an extended robots.txt declaration. The device, operating in parental control mode, reads that rating and enforces it locally. If a publisher lies, parents can see these sites visited by children, file a complaint which can be investigated and sites with false or misleading ESRB or MPAA ratings can be held accountable. The new "WebESRB" is maintained by crowd sourced statistical reputation based scorecard system monitored by parents. Unreliable websites can be removed or blocked by it's ratings including sites with no rating. This creates a "web of trust" in which the child does not upload a photo or driver’s license to browse the web.

Seventh: where age thresholds truly matter, verification can happen on the device using cryptography instead of document storage. The operating system verifies age once. It then derives a salted hash representing an age condition, such as “age ≥ 13.” When a service requests proof, the device returns a signed attestation derived from that hash. The service verifies the signature against the OS’s public key. It never receives the birthdate. In more advanced designs, zero-knowledge proofs allow the device to mathematically prove the age condition without revealing any underlying data at all. Advertisers can take a list of customer identifiers tied to a specific interest such as emails or phone numbers and run them through a one-way cryptographic hash function (for example, SHA-256). That process converts each identifier into a fixed-length hash value that cannot be reversed under normal conditions. The social media platform does the same thing independently with its own user database. Instead of exchanging raw personal data, both sides compare hashed values. Where the hashes match, they’ve identified the same person without either party disclosing the underlying identifier. This is called a hash "collision". The advertiser never sees the platform’s user data, and the platform never sees the advertiser’s original list. Ads are served and everyone is happy. An API can automate this matching process by accepting only hashed inputs and returning aggregated match results or audience segments. No plaintext identifiers are exposed, and no direct transfer of customer records occurs. The system relies on deterministic hashing, same input, same output, so matches are exact without revealing identity. When properly implemented with salting, secure transport, and strict access controls, this approach limits data exposure to mathematical fingerprints, not personal information, preserving privacy and enabling targeted ad delivery. These two mechanisms can be used to verify on device and similarly serve anonymous ads. No third-party database. No identity upload pipeline. No retention problem.

This model keeps Personal Identifiable Information (PII) proofs local, uses on device parental controls and legislation to control accountability, and keeps child data out of the hands of anyone outside the home. Age-verification mandates do not solve a parenting problem. They expand data collection, expand attack surfaces, and take control away from guardians. If child protection is the objective, then the solution is device-level defaults, ESRB-style content signaling, cryptographic on-device verification, and clear parental accountability with real consequences for repeated neglect.

Monday, February 2, 2026

We want our ICE crushed

The ICE problem mirrors 1990s Florida after Pablo Escobar was killed....


When Escobar died, a major power vacuum opened in the cocaine trade. The Ochoa organization moved in and aggressively expanded into Florida, using extreme violence to establish control and make it clear they were the new dominant force. The surge in drug trafficking and violence overwhelmed local law enforcement.
Because departments were understaffed and under pressure, hiring standards were repeatedly lowered. What had once been a requirement of two years without drug use was reduced to one year, then six months, then one month. At one point, the standard was so low that officers joked that if you weren’t high at that moment, you could qualify. The result was not stability, but a second crisis: widespread corruption. Some officers began extorting drug dealers, participating in racketeering, and working with criminal networks. This period later became the basis for major federal investigations and popular films about police corruption in Florida. The same structural failure is now playing out again.  Immigration enforcement has been underfunded and overwhelmed for decades. To fill positions quickly, the bar for employment has been lowered and we are now accepting low quality applicants. When agencies prioritize speed over quality, they inevitably create a workforce that is harder to supervise, harder to reform, and far more vulnerable to corruption. We are not just dealing with a few bad actors. We are dealing with the long-term consequences of a system that was underfunded and now trades standards for manpower. 

In addition when private prisons that detain immigrants are driven by stock price pressure and investor expectations, cost-cutting can directly affect safety and basic human needs. Reducing food budgets can lead to inadequate nutrition, while understaffing increases the risk of violence, delayed emergency response, and poor supervision. Limiting medical facilities or trained medical personnel can result in untreated illnesses, delayed diagnoses, and preventable complications. In detention settings—where individuals rely entirely on the facility for food, healthcare, and protection—financial decisions tied to market fluctuations can create conditions that undermine health, safety, and human dignity. Federal funding helps prevent this but is expensive. 

As for citizenship, I think one of the biggest things people are overlooking is what the Fourteenth Amendment was originally meant to do in the first place. The Fourteenth Amendment to the United States Constitution wasn’t just about giving citizenship based on location alone, it was about making sure that people who were already recognized as citizens, whether by birth or by being naturalized, could pass that citizenship down to their children without those children having to go through the naturalization process all over again. After the American Civil War, the goal was to make it clear that formerly enslaved people were citizens, and that their children born here would also be citizens, automatically, without question, because their parents were citizens. That establishes a system where citizenship carries forward generation to generation as a stable legal status. From that perspective, it doesn’t make sense to treat citizenship as something that is triggered purely by being physically present on U.S. soil at the moment of birth. The phrase “subject to the jurisdiction thereof” implies a full legal and political connection to the United States, not just temporary presence. So if someone is not a citizen and does not have that full legal allegiance, it raises the question of whether simply having a child here should result in that child automatically becoming a citizen. That’s where the current interpretation, reinforced by cases like United States v. Wong Kim Ark, differs from what I think is a more consistent reading, which is that citizenship should follow the current status of the parents, not just the place of birth. Application for new citizenship in America should be required if you are not Naturalized and should be required if your parents are not already citizens. That being said, everyone is still entitled to certain inalienable rights within our territory, such as fourth amendment protections, but other rights such a Voting and Jury Duty are limited by citizenship status appropriately. Apparently we are having problems with noncitizen voting, but let's move forward.

Proposal: Community Work-Release Model for Immigration Detainees.


The Problem:

Immigration and Customs Enforcement (ICE) is overwhelmed and underfunded. This has produced two systemic failures:
Lowered hiring standards for officers
Staffing shortages have forced faster hiring with reduced screening and training. This has increased:
  • Misconduct
  • Corruption risk
  • Use-of-force incidents
  • Operational failures
  • Extremely high detention costs
Non-violent immigration detainees often remain in custody 6–24 months while cases are processed, costing taxpayers tens of thousands of dollars per person per year.
At the same time, the U.S. already has a working model for managing large supervised populations: Department of Corrections work-release programs.

Core Idea:

Replace long-term ICE detention for non-violent, low-risk immigrants with a supervised community work-release system, modeled after DOC programs.

This would:
  • Reduce detention costs
  • Reduce pressure on ICE
  • Eliminate reliance on private prisons
  • Allow immigrants to support themselves
  • Recover government costs
  • Improve compliance and court appearance rates
Program Structure:

1. Eligibility:

Applies only to:
  • Non-violent immigration detainees
  • No serious criminal history
  • No violent or trafficking offenses
  • Passed risk screening
2. Housing Options:

Participants must live in one of two placements:

  • A. Family or sponsor housing, if a verified family member or sponsor exists.
  • B. Work-release housing: State-run or federally contracted facilities. Same structure as DOC halfway houses. No private for-profit prison operators.

3. Monitoring:

  • GPS ankle monitoring
  • Mandatory check-ins
  • Employment verification
  • Court date tracking
  • One supervising officer can manage 30–50 participants, reducing staffing burden.
4. Employment & Income Recovery:

Participants are legally allowed to work while cases are processed. Currently they are not, and instead are housed on the taxpayer dollar for 6 months up to several years while waiting for approval. Up to 50% of earned income is automatically allocated.
Allocation Purpose:
  • Legal processing
  • Immigration court costs
  • Housing costs
  • If in work-release facility
  • Supervision costs
  • Monitoring & case management
  • Personal savings
  • Remainder held for release or return
This mirrors DOC Legal Financial Obligations (LFO) systems.

5. Fiscal Benefits:

Eliminates long-term detention housing costs
Reduces officer staffing pressure
Generates revenue to fund:

  • Immigration courts
  • ICE staffing
  • Monitoring systems
  • Participants pay taxes while employed and contribute to local economies
6. Why Not Private Prisons?

Private detention facilities are driven by shareholder pressure, which historically leads to:

  • Understaffing
  • Reduced medical care
  • Food quality cuts
  • Safety failures
  • Abuse (sexual assault, etc)
Several facilities were shut down for these reasons.

A fully federal system avoids corruption but is prohibitively expensive to scale.
This proposal avoids both extremes by:

  • Using community placement preferably with existing families
  • Existing DOC work-release infrastructure
  • Electronic monitoring instead of mass incarceration
  • ICE Case Officers can effectively manage a caseload of 20 immigrants for monitoring using a DOC model.
Outcomes: 

  • Lower taxpayer costs
  • Reduced detention overcrowding
  • Fewer civil rights incidents
  • Better compliance with court orders
  • Revenue recovery for the immigration system
  • No expansion of private prison systems

This model treats immigration detention as a supervision and compliance issue, not a mass incarceration problem.

Sunday, February 1, 2026

Why “Common Law” Arguments No Longer Work in the United States

1. What “Common Law” Actually Was


Common law originated in medieval England under the authority of the English Crown. It was not “natural law” and it was not universal law. It was judge-made law created by royal courts and enforced solely through the King’s authority. English kings centralized judicial power. Courts such as the King’s Bench, Court of Common Pleas, and Exchequer developed binding rules based on precedent. These rules had force only because the Crown enforced them. When the American colonies were formed, they adopted English common law only as a temporary legal framework until legislatures could enact statutes. Every U.S. state constitution contains language similar to: “The common law shall remain in force until altered or repealed by the legislature.” This makes clear that common law was never intended to be permanent.


2. How Common Law Was Replaced in the United States


After independence, the United States replaced judge-made common law with democratically enacted statutes. Today, legislatures write the law, courts interpret it, and police enforce it.
Once a statute governs a subject, any prior common-law rule in that area is legally displaced. Marriage, contracts, traffic laws, and most other legal relationships are now defined by statute. Common law survives only where no statute exists, which is now extremely rare.


3. The “Common Law Marriage” Myth


The claim that living together for seven years automatically creates a legal marriage is false. There is no federal common law marriage, and while a small number of states still recognize it, most have abolished it by statute.
Even in states that recognize it, cohabitation alone is not sufficient. The couple must prove mutual intent, public representation, and agreement to be married.
Child marriage is banned in 49 of 50 states, as all recognize the harm it causes. The remaining state has not formally banned it but does not permit the practice. The myth persists because people confuse outdated English doctrine with modern statutory family law.


4. The “Right to Travel” vs. Driving


The U.S. Supreme Court recognizes a constitutional right to interstate travel, meaning people may move freely between states. It does not mean a person may operate a motor vehicle on public roads without regulation.
All 50 states require a driver’s license to operate a motor vehicle. Courts have repeatedly upheld this because driving is legally classified as a regulated privilege, not a natural right. Vehicles are considered dangerous instrumentalities, and public roads are safety-regulated spaces. Licensing is therefore a legitimate exercise of state power. The “right to travel” does not override traffic laws.


5. The “Strawman” Argument: Why It Fails


The claim, “That name is a corporate strawman; I am not that entity,” has no basis in U.S. law. There is no statute recognizing a legal “strawman,” no supporting case law, and no court that has ever upheld the theory.
Courts uniformly treat this argument as frivolous and, in some cases, sanctionable. A person’s legal identity is established through birth records, Social Security registration, state records, and judicial recognition. Refusing to acknowledge that identity does not negate jurisdiction.


6. Why These Conflicts Keep Happening


At traffic stops, some individuals rely on internet misinformation and expect officers to “back down.” Officers are legally required to enforce statutory law, not debate theories.
In court, judges cannot consider arguments that have no legal foundation or that have already been rejected by appellate courts. This leads some people to believe courts are “ignoring the law,” when in reality, the law does not support the claims being made.


7. Where Education Is Failing


Many officers and judges simply dismiss these arguments without explaining why common law was replaced, why statutory law controls, or why “sovereign” claims are invalid. This lack of explanation leaves people believing the system is hiding something. Clear, basic legal education would prevent roadside escalations, courtroom disruptions, frivolous filings, and wasted public resources.


8. The Current Legal Reality


The United States is governed by constitutions, statutes, regulations, and case law interpreting those statutes. Common law is used only when no statute exists, which is now almost never the case. Claims based on common-law supremacy, strawman identity, license exemptions, or jurisdiction denial have been fully superseded by democratically enacted law and no longer function as legal defenses.