Authentic photos of Usha Vance without her wedding ring?
Nov. 22nd, 2025 12:59 amIs this photo of Trump wearing a bathrobe across bed real?
Nov. 22nd, 2025 12:16 amGoogle AI can access some content from Gmail and chats. Here's how to opt out
Nov. 21st, 2025 11:27 pmFriday Squid Blogging: New “Squid” Sneaker
Nov. 21st, 2025 10:08 pmI did not know Adidas sold a sneaker called “Squid.”
As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered.
What we know about Coast Guard's policy update on swastikas, other hate symbols
Nov. 21st, 2025 10:32 pmBeware rumor Obama was participant in 'ritualistic orgy empire' on Epstein's island
Nov. 21st, 2025 09:00 pmHappy Birthday, WordPress
Nov. 21st, 2025 08:25 pm

WordPress, which is the blog software and hosting service Whatever is on (and has been since October 2008) is celebrating its 20th anniversary today, a fact that I found out thanks to a lovely call-out from them in their own blog post about the day. Speaking as someone whose blog was buckling under traffic and technical issues before it migrated to WordPress, I am both happy it has lasted this long, and also that it is still thriving and continues to be an excellent home for and partner to this site. And from a technical point of view, I’m glad it continues to be a platform for innovation beyond just the “post text on a page” functionality that it provides on a surface level. It takes a fair amount of tech at this point to keep even a relatively simple site like this one up and running every day, and I’m happy WordPress takes care of that, leaving me and Athena to do what we’re actually good at: Writing and community stuff.
So happy birthday, WordPress. Here’s to another 20 years, at least. I’ll be here if you are.
— JS
More on Rewiring Democracy
Nov. 21st, 2025 07:07 pmIt’s been a month since Rewiring Democracy: How AI Will Transform Our Politics, Government, and Citizenship was published. From what we know, sales are good.
Some of the book’s forty-three chapters are available online: chapters 2, 12, 28, 34, 38, and 41.
We need more reviews—six on Amazon is not enough, and no one has yet posted a viral TikTok review. One review was published in Nature and another on the RSA Conference website, but more would be better. If you’ve read the book, please leave a review somewhere.
My coauthor and I have been doing all sort of book events, both online and in person. This book event, with Danielle Allen at the Harvard Kennedy School Ash Center, is particularly good. We also have been doing a ton of podcasts, both separately and together. They’re all on the book’s homepage.
There are two live book events in December. If you’re in Boston, come see us at the MIT Museum on 12/1. If you’re in Toronto, you can see me at the Munk School at the University of Toronto on 12/2.
I’m also doing a live AMA on the book on the RSA Conference website on 12/16. Register here.
Saturday Morning Breakfast Cereal - Blame
Nov. 21st, 2025 11:20 am
Click here to go see the bonus panel!
Hovertext:
The important thing is that net happiness goes up.
Today's News:
Has Biden's $42B broadband equity program connected no one to the internet?
Nov. 21st, 2025 02:00 pmLBCF: Lunch with Dad
Nov. 21st, 2025 12:00 pmAI as Cyberattacker
Nov. 21st, 2025 12:01 pmFrom Anthropic:
In mid-September 2025, we detected suspicious activity that later investigation determined to be a highly sophisticated espionage campaign. The attackers used AI’s “agentic” capabilities to an unprecedented degree—using AI not just as an advisor, but to execute the cyberattacks themselves.
The threat actor—whom we assess with high confidence was a Chinese state-sponsored group—manipulated our Claude Code tool into attempting infiltration into roughly thirty global targets and succeeded in a small number of cases. The operation targeted large tech companies, financial institutions, chemical manufacturing companies, and government agencies. We believe this is the first documented case of a large-scale cyberattack executed without substantial human intervention.
[…]
The attack relied on several features of AI models that did not exist, or were in much more nascent form, just a year ago:
- Intelligence. Models’ general levels of capability have increased to the point that they can follow complex instructions and understand context in ways that make very sophisticated tasks possible. Not only that, but several of their well-developed specific skills—in particular, software coding—lend themselves to being used in cyberattacks.
- Agency. Models can act as agents—that is, they can run in loops where they take autonomous actions, chain together tasks, and make decisions with only minimal, occasional human input.
- Tools. Models have access to a wide array of software tools (often via the open standard Model Context Protocol). They can now search the web, retrieve data, and perform many other actions that were previously the sole domain of human operators. In the case of cyberattacks, the tools might include password crackers, network scanners, and other security-related software.
