Palestine/Gaza

Thursday, October 23rd, 2025 08:25 pm
toastykitten: (Default)
[personal profile] toastykitten posting in [community profile] thisfinecrew
Even though there is ostensibly a ceasefire in place, not enough aid is getting in, Israel is also bombing Lebanon despite the ceasefire they agreed to with the Lebanese, and Israeli settlers beat Palestinian farmers during their olive harvest in the West Bank

So 1 thing I've been doing is joining a weekly Zoom "Power Hours for Palestine" every Thursday at 9am PST. Feel free to join me. Today we called our reps regarding HR 3565, sent a few letters, and were updated on different things going on. It's hosted by Rising Majority

Also a Jews Demand Action letter toolkit, signed by many including Spencer Ackerman, Debra Winger, etc. 

Since last I posted:
Some things to read/watch:Places to donate to:

On Burying Vampires.

Thursday, October 23rd, 2025 08:42 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Anatoly quotes a passage from the Telegram channel “Минутка этнографии” (in Russian):

“Словаки клали в гроб к подозреваемому вампиру книжки, желательно на чужом языке, чтобы он пытался их прочесть и у него не было времени выходить из могилы (Низшая мифология славян… С. 259). “

My translation:

In the coffin of a suspected vampire the Slovaks placed books, preferably in a foreign language, so that he would try to read them and would not have time to leave the grave (Lower Mythology of the Slavs, p. 259).

He likes the idea but wonders if it’s true; there is a new book Низшая мифология славян. Этнолингвистические очерки, but he can’t find an electronic copy to check. At any rate, se non è vero, è ben trovato. I knew I’d find a use for that book of Albanian poetry! (One of his commenters suggests that the Slovaks could have put a set of Stalin’s complete works in Russian in the grave. That should work.)

The Friday Five for 24 October 2025

Thursday, October 23rd, 2025 03:23 pm
anais_pf: (bunny gif)
[personal profile] anais_pf posting in [community profile] thefridayfive
These questions were originally suggested by [livejournal.com profile] akarii.

1. What do you see when you are looking out of the window closest to you?

2. Who was the last person coming into your room?

3. What is the most predominant colour around you?

4. What is right behind you?

5. What is on today's calendar sheet?

Copy and paste to your own journal, then reply to this post with a link to your answers. If your journal is private or friends-only, you can post your full answers in the comments below.

If you'd like to suggest questions for a future Friday Five, then do so on DreamWidth or LiveJournal. Old sets that were used have been deleted, so we encourage you to suggest some more!

Serious F5 Breach

Thursday, October 23rd, 2025 11:04 am
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

This is bad:

F5, a Seattle-based maker of networking software, disclosed the breach on Wednesday. F5 said a “sophisticated” threat group working for an undisclosed nation-state government had surreptitiously and persistently dwelled in its network over a “long-term.” Security researchers who have responded to similar intrusions in the past took the language to mean the hackers were inside the F5 network for years.

During that time, F5 said, the hackers took control of the network segment the company uses to create and distribute updates for BIG IP, a line of server appliances that F5 says is used by 48 of the world’s top 50 corporations. Wednesday’s disclosure went on to say the threat group downloaded proprietary BIG-IP source code information about vulnerabilities that had been privately discovered but not yet patched. The hackers also obtained configuration settings that some customers used inside their networks.

Control of the build system and access to the source code, customer configurations, and documentation of unpatched vulnerabilities has the potential to give the hackers unprecedented knowledge of weaknesses and the ability to exploit them in supply-chain attacks on thousands of networks, many of which are sensitive. The theft of customer configurations and other data further raises the risk that sensitive credentials can be abused, F5 and outside security experts said.

F5 announcement.

Get angry. Stay angry. Do better.

Wednesday, October 22nd, 2025 09:40 pm
[syndicated profile] slacktivist_feed

Posted by Fred Clark

Remorse is not sorrow. It's anger. Getting angry with yourself is what real repentance looks like -- the kind of repentance that allows for the possibility of redemption.

the last truce we ever came to from our adolescent war

Wednesday, October 22nd, 2025 03:33 pm
musesfool: Rachel Roth (Raven)  from Titans (it will take all your breath)
[personal profile] musesfool
I'm off work today because I had to go get a tooth crowned. They've streamlined the process since early last year, when I had to go one week for the preparation and then back again a week later for the installation - they did it all in one day today, with about a 30 minute break between parts 1 and 2, where I just sat in the exam chair and read my book on my phone. This time I had to stop them a couple of times during the first part because they just spray water everywhere without sufficient suction so I felt like I was drowning a couple of times. The dentist warned me about it ahead of time and was apologetic about it, so I didn't feel like I was too much of a problem patient for stopping so I could, you know, breathe. One of the things I like about this particular dentist (there's a bunch of them at the practice and I've seen most of them over the last 5 years) is that he tells you what he's going to go ahead of time and answers questions, and then he tells you each thing he's going to do during the process right before he does it, and he gives you a heads up as to how far along in the process you are/how much more time it's going to take. Because it's unpleasant, at best. I mean, I was all numbed up for it (so numbed that my right EYE was feeling numb - the tooth being crowned is on the top right way in the back - which is a real fucking weird feeling), but ugh. I'm sure there are probably other crowns in the future - they want to get out all those old, old silver fillings, and he said this tooth did crack while he was removing it, so we caught it before it happened on its own.

I'm glad I didn't get new glasses this year - that left $950 in my FSA, which I had to supplement to pick up the rest of the cost, because I do not know what my insurance will cover as the dentist is out of network. I know I should find someone in network (and preferably near my apartment instead of in Manhattan), but as mentioned above, I like this guy and I think that is an important factor with any medical practitioner if you can get it.

So I came home and took a 3 hour nap because I didn't sleep much last night due to anxiety over all of this. Oh, and I mailed my ballot for Mamdani. I'm very curious to see if his lead in the polls translates to winning the election or if all the people who are scared because he's Muslim will turn out for Cuomo (or Sliwa, I guess, but I cannot take him seriously as a candidate). We have tended to pick terrible mayors recently, so it'll be interesting to see how this all turns out.

And I guess I mentioned reading up there, so yes, I am in the middle of a reread of Blue Lily, Lily Blue, which I am enjoying! ♥BLUE♥ remains my favorite.

*

Boo!

Wednesday, October 22nd, 2025 06:45 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Lucas Reilly at Mental Floss asks Why Do Ghosts Say “Boo”?:

People have screamed “boo,” or at least some version of it, to startle others since the mid-16th century. (One of the earliest examples documented by the Oxford English Dictionary appeared in that 1560s poetic thriller, Smyth Whych that Forged Hym a New Dame.) But ghosts? They’ve only been using the word boo for less than two centuries.

The etymology of boo is uncertain. The OED compares it with the Latin boare or the Greek βοᾶν, meaning to “cry aloud, roar, [or] shout.” Older dictionaries suggest it could be an onomatopoeia mimicking the lowing of a cow.

Whatever its origins, the word had a slightly different shade of meaning a few hundred years ago: Boo (or, in the olden days, bo or bu) was not used to frighten others but to assert your presence. Take the traditional Scottish proverb “He can’t say bo to a goose,” which for centuries has been a slick way to call somebody “timid” or “sheepish.” Or consider the 1565 story Smyth Whych that Forged Hym a New Dame, in which an overconfident blacksmith tries to hammer a woman back into her youth, and the main character demands of his dying experiment: “Speke now, let me se / and say ones bo!” […]

But boo became scarier with time. After all, as the OED notes, the word is phonetically suited “to produce a loud and startling sound.” And by 1738, Gilbert Crokatt was writing in Presbyterian Eloquence Display’d that “Boo is a Word that’s used in the North of Scotland to frighten crying children.”

In 18th century Scotland, bo, boo, and bu would latch onto plenty of words describing things that went bump in the night. According to the Dictionary of the Scots Language, the term bu-kow applied to hobgoblins and “anything frightful,” such as scarecrows. The word bogey, for “evil one,” would evolve into bogeyman. And there’s bu-man, or boo-man, a terrifying goblin that haunted man […] It was only a matter of time until ghosts got lumped into this creepy “muckle boo-man” crowd.

Which is too bad. Before the early 1800s, ghosts were believed to be eloquent, sometimes charming, and very often literary speakers. The spirits that appeared in the works of the Greek playwrights Euripides and Seneca held the important job of reciting the play’s prologue. The apparitions in Shakespeare’s plays conversed in the same swaying iambic pentameter as the living. But by the mid-1800s, more literary ghosts apparently lost interest in speaking in complete sentences. Take this articulate exchange with a specter from an 1863 Punch and Judy script:

Ghost: Boo-o-o-oh!
Punch: A-a-a-ah!
Ghost: Boo-o-o-o-oh!
Punch: Oh dear ! oh dear ! It wants’t me!
Ghost: Boo-o-o-o-oh!

He goes on to talk about the influence of spiritualism and traditions carried overseas by Celtic immigrants: “Scotland was a great exporter of people in the middle of the 1800s, and perhaps it’s thanks to the Scots-Irish diaspora that boo became every ghost’s go-to greeting.” For clickbait, it’s surprisingly informative! And A treatyse of the smyth whych that forged hym a new dame is available here, if you want the whole story; the “which that” in the title is striking.

By the way, if anyone’s interested in Media Cultures of the Russian 1990s: Inventing the Post-Soviet Public Sphere, edited by Maya Vinokour, it’s available for free download from Amherst College Press.

Failures in Face Recognition

Wednesday, October 22nd, 2025 11:03 am
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

Interesting article on people with nonstandard faces and how facial recognition systems fail for them.

Some of those living with facial differences tell WIRED they have undergone multiple surgeries and experienced stigma for their entire lives, which is now being echoed by the technology they are forced to interact with. They say they haven’t been able to access public services due to facial verification services failing, while others have struggled to access financial services. Social media filters and face-unlocking systems on phones often won’t work, they say.

It’s easy to blame the tech, but the real issue are the engineers who only considered a narrow spectrum of potential faces. That needs to change. But also, we need easy-to-access backup systems when the primary ones fail.

report from the What's Next After No Kings livestream

Tuesday, October 21st, 2025 09:42 pm
gingicat: Bengal tiger looking peeved (anger/protectiveness - tigerbright)
[personal profile] gingicat posting in [community profile] thisfinecrew
Just attended the livestream - recording can be viewed here:
https://www.youtube.com/live/4v2p3NwsMg0

Lots of talking and encouragement, also a lot of stories and photos from Saturday. On the livestream:
Moderator: Ashlee-Woodard Henderson (activist)
Speakers: Ezra Levin (co-executive director of Indivisible), Hunter Dunn (LA Host, National Press Coordinator 50501), Lisa Gilbert (co-executive director, Public Citizen), Maribel Hernández-Rivera (National Director of Immigrant Community Strategies), Jiggy Geronimo (Narrative Strategist)

Final message: find your local community.

Resources linked:
- https://brandfolder.com/indivisibleproject/no-kings-know-your-rights (cards to print and distribute in English, Vietnamese, Traditional Chinese, Tagalog, Simplified Chinese, Korean, Haitian Creole, French, and Arabic)
- Text SHUTDOWN to 30403 to get a script from the Working Families Party to leave a message with your Senator to encourage them to hold the line during the shutdown and keep fighting against Trump's health care cuts and price increases, followed by them calling you to connect.
- There's also a QR code in the video to connect you to the Stop the Healthcare Heist! Week of Action.

Home missions

Tuesday, October 21st, 2025 08:22 pm
[syndicated profile] slacktivist_feed

Posted by Fred Clark

White Christians in America once responded to immigration with "home missions" to welcome (and seek to convert) their new neighbors as the "mission field" came to our shores. It had it's problems, but it sure beats what we have now.

Translating from Montenegrin the Soviet Way.

Tuesday, October 21st, 2025 04:20 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Ilia Simanovsky has a Facebook post that begins (I’ve translated from his Russian and added links):

In the early 1930s, Georgy Shengeli recruited young poets—Arkady Steinberg, Arseny Tarkovsky, Semyon Lipkin, and Maria Petrovykh—to translate, thereby rendering a great service to Russian literature. For the Quadriga (as the friends called themselves), this was an opportunity to make a relatively comfortable living from literary work. Their own muses were not well adapted to Soviet reality: Lipkin was religious, Tarkovsky was criticized for mysticism, Steinberg was assailed for formalism […] For the rest of their lives, the Quadriga depended on translations for their daily bread and in part for self-expression — although, alas, they did not generally have the opportunity to deal with poets of the stature of Milton or Saadi.

In 1934, the aspiring translators Tarkovsky and Steinberg befriended the Montenegrin communist and poet Radule Stijenski, who had emigrated to the USSR seven years earlier. There was no doubt that Stijenski was a communist, but the world hadn’t suspected until then that he was a poet. The three of them immediately realized this was an opportunity. The revolutionary Montenegrin hadn’t yet appeared on the Soviet book market, and it could be expected that if things were approached in the right manner, one book after another would be published, with the author and translators rejoicing in the royalties.

True, there were certain obstacles. Neither Tarkovsky nor Steinberg knew Serbian, and the poet turned out to be so ungifted that even the Montenegrin flavor allowed no hope that anyone would agree to voluntarily read his poems. As it happened, however, these circumstances were actually advantages. Both translators had plenty of talent seeking an outlet, and there was no need to worry about the translations’ similarity to the original—after all, Stijenski had never published in his native language (and remains a phenomenon confined to Russian literature). And speaking of originals, the questions of whether they existed or not, and what we mean by “originals,” have not been entirely cleared up. […]

The translators’ work was easy and creative—unable to publish their own poems, Arkady and Arseny had a great time. It turned out so well that Soviet critics were delighted, and children loved it.

Unfortunately, it ended in lawsuits and the Gulag; I don’t have the heart to translate the rest of the story, but you can get the basics from the Arkady Steinberg link above. (I posted about Maria Petrovykh here, and Boris Dralyuk wrote about Georgy Shengeli here.)

A Cybersecurity Merit Badge

Tuesday, October 21st, 2025 11:07 am

Dance of Mahanaim.

Monday, October 20th, 2025 08:10 pm
[syndicated profile] languagehat_feed

Posted by languagehat

It’s time to play Biblical Crux once again! (Cf. Daughter of Greed, from 2019.) I’m reading Mikhail Shishkin’s 2010 Письмовник (‘Letter-writing manual,’ translated by Andrew Bromfield as The Light and the Dark) despite the concerns about Shishkin’s novels I expressed here, and so far I’m enjoying it (though already there’s a worrying amount of “Oh how I love you! I can’t live without you!” — Shishkin seems to think that’s pretty much what women’s mental life amounts to). In form the novel is epistolary, with alternating letters from a man and a woman, and at one point the woman writes: “Я была уродка из семейства плеченогих, крыложаберных и мшанок. А она — хоровод Манаимский с глазами, как озера Есевонские, что у ворот Батраббима” [I was a freak from the family of brachiopods, pterobranchs, and Bryozoa; she was the dance of Mahanaim, with eyes like the pools of Heshbon by the gate of Bath-rabbim]. I knew about Heshbon (though it’s annoying that Bath-rabbim redirects to that page, when there’s no mention of Bath-rabbim there), but what was this dance of Mahanaim?

It turns out that at the end of Song of Songs 6 or the beginning of 7, depending on the tradition, there’s an obscure passage about “the Shulamite” which doesn’t seem to have attracted many commentators. I haven’t done a deep dive, but the only discussion I’ve found that’s neither antiquated (like Thomas Robinson’s) nor amateur/popular (like Archie W. N. Roy PhD’s) is by J. Cheryl Exum, who just died last year; in her Song of Songs: A Commentary, pp. 225ff., she writes:

[6:13 (7:1 H)] The woman is asked to “return” or come back, presumably from the nut garden, and probably not simply, as Murphy proposes, to turn around and face the speaker. Some scholars understand the verb to refer to turning or whirling in a dance, but the verb šwb does not have this meaning. J. G. Wetzstein’s observations of nineteenth-century Syrian marriage customs, which included a sword dance in which the bride was surrounded by women and men in two groups, led some earlier interpreters to conclude that the woman is here performing a sword dance, but this anachronistic thesis is nowadays rejected (and according to Wetzstein a man might also dance the sword dance; “Remarks on the Song” by Wetzstein can be found in an appendix to Delitzsch’s commentary). Pope proposes reading šĕbî or šēbî for MT šûbî, and translates rather unpoetically, “leap, leap,” in order to produce a dancing Shulammite. The assumption that 6:13–7:6 [7:1–7 H] describes a dance rests primarily on the obscure phrase k/bimḥōlat hammaḥănāyim (“like/in the dance of two camps”) at the end of v. 13, for nothing in the following description of the woman indicates that she is dancing or that a group of people is watching her dance.

We encounter here the Song’s characteristic blurring of past and present: the
story of the visit to the nut garden is recounted as a past event, whereas the
woman is called back in the present, so that the description of her begun in 6:4
can continue. […]

In the reply in 6:13cd the speaker could be either the man, the woman, or the women of Jerusalem. If the women are the speakers who ask to gaze upon the woman in v. 13ab, then perhaps the man responds here in v. 13cd by asking why should they want to gaze as well. But how could they resist, since he has been tantalizing them (and the poem’s readers) by cataloguing her charms? More likely, in my opinion, v. 13ab is the man’s request to see and v. 13cd is the woman’s reply.

But what is the meaning of her reply? The reply begins with an interrogative particle, , which normally means “what?” but can occasionally have the sense of English “how” (in the sense of either “in what way?” or “how much, to what extent?”/“how [much]!”) or “why?” (see DCH V, 150b). […]

One reason the reply is hard to understand is that the comparison to meḥōlat hammaḥănāyim (here translated “the dance of two camps”) is difficult to fathom. If we understood its significance, it would be easier to determine whether the speaker demurs at or approves of the request to look. Will those who look be gazing in awe, as they would at something spectacular? Or will they be looking with curiosity or disdain (so Fox, who revocalizes and sees the reference to “a common dancer who roams the camps of the soldiers”; see also Gerleman)?

Commentators are generally agreed that v. 13cd [7:1cd H] is a comparison, though some read “in the dance” instead of “like the dance,” with a number of Hebrew manuscripts (e.g., Bloch and Bloch). A few see “the Mahanaim dance” as the answer to the question, “What would you see . . . ?” (Delitzsch, Krinetzki 1980, Rudolph; so also Ginsburg and Gordis, translating “like a dance to double choirs” and “the counter-dance” respectively), but this involves positing different speakers in 13c and 13d, and nowhere else in the Song is a couplet divided between speakers. Since the phrase begins with k (“like”) or, in some mss, b (“in”), it is difficult to see how it could be the answer to the question. It is preferable to take the entire phrase as a simple comparison (Murphy 1987: 117): “How you gaze upon the Shulammite as you would gaze upon the dance . . . !”

Meḥōlâ is a dance, though it may designate a performance that includes singing and musical accompaniment as well as dancing (Ginsburg). LXX and Vg., both of which render “choruses of camps,” may have had instrumental and vocal accompaniment in mind (so Pope), for both Greek choros and Latin chorus can refer to dancers and singers.

Mahanaim is the name of a town in Gilead near the Jabbok River. David camped there when he fled Absalom’s coup (2 Sam 17:24–27; 19:32 [33 H]), but Mahanaim is perhaps most famous as the place where Jacob was met by messengers or angels of God. His exclamation, “This is the camp of gods/God!” provides an etiology for the name Mahanaim (Gen 32:2 [3 H]). Some translations read the name here in our verse (e.g., NIV, “as on the dance of Mahanaim”), but as a place name it does not appear to have any significance for the meaning of the verse. As a common noun, the word refers to an encampment, either a military camp or a company of people (see DCH V, 222a). The form in MT is a dual, “two camps” or “a double company.” Perhaps maḥănāyîm, “a double company,” indicates a performance with antiphonal music, dancing, and singing, and possibly ritual games as well (Sasson 1973: 158; see also Pope). The mention of “the dance of two camps” does not mean that the woman is dancing. She does not refer to herself as dancing but rather compares the interest of the onlookers to the interest that the dance of two camps would excite (Murphy 1987: 118). The point of the comparison appears to be that beholding the woman is as mesmerizing as watching a spectacle that arrests one’s undivided attention. The woman is elsewhere compared to grand, awe-inspiring sights, such as Jerusalem and Tirzah, the sun, moon, and dawn (6:4, 10).

Note that the KJV has “the company of two armies,” and various other versions are listed here (scroll down to the end, at “‘the dance of the two companies’ This is a very uncertain phrase! Several theories have been postulated”); the modern Russian translation (7:1) has Shishkin’s “хоровод Манаимский,” while the Church Slavonic one (also 7:1) has “лики полкѡвъ” (something like ‘chorus of armies’). I trust someone out there has thoughts about all this.

AWS outage

Monday, October 20th, 2025 10:11 am
alierak: (Default)
[personal profile] alierak posting in [site community profile] dw_maintenance
DW is seeing some issues due to today's Amazon outage. For right now it looks like the site is loading, but it may be slow. Some of our processes like notifications and journal search don't appear to be running and can't be started due to rate limiting or capacity issues. DW could go down later if Amazon isn't able to improve things soon, but our services should return to normal when Amazon has cleared up the outage.

Edit: all services are running as of 16:12 CDT, but there is definitely still a backlog of notifications to get through.

Edit 2: and at 18:20 CDT everything's been running normally for about the last hour.

Smart people saying smart things (10.20.25)

Monday, October 20th, 2025 11:00 am
[syndicated profile] slacktivist_feed

Posted by Fred Clark

Words worth reading from Joel Bowman, Eugene McCarraher, Jill Filipovic, W.E.B. Du Bois, the Portland Chicken, and a former DHS official speaking on condition of anonymity for fear of retaliation.

Agentic AI’s OODA Loop Problem

Monday, October 20th, 2025 11:00 am
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

The OODA loop—for observe, orient, decide, act—is a framework to understand decision-making in adversarial situations. We apply the same framework to artificial intelligence agents, who have to make their decisions with untrustworthy observations and orientation. To solve this problem, we need new systems of input, processing, and output integrity.

Many decades ago, U.S. Air Force Colonel John Boyd introduced the concept of the “OODA loop,” for Observe, Orient, Decide, and Act. These are the four steps of real-time continuous decision-making. Boyd developed it for fighter pilots, but it’s long been applied in artificial intelligence (AI) and robotics. An AI agent, like a pilot, executes the loop over and over, accomplishing its goals iteratively within an ever-changing environment. This is Anthropic’s definition: “Agents are models using tools in a loop.”1

OODA Loops for Agentic AI

Traditional OODA analysis assumes trusted inputs and outputs, in the same way that classical AI assumed trusted sensors, controlled environments, and physical boundaries. This no longer holds true. AI agents don’t just execute OODA loops; they embed untrusted actors within them. Web-enabled large language models (LLMs) can query adversary-controlled sources mid-loop. Systems that allow AI to use large corpora of content, such as retrieval-augmented generation (https://en.wikipedia.org/wiki/Retrieval-augmented_generation), can ingest poisoned documents. Tool-calling application programming interfaces can execute untrusted code. Modern AI sensors can encompass the entire Internet; their environments are inherently adversarial. That means that fixing AI hallucination is insufficient because even if the AI accurately interprets its inputs and produces corresponding output, it can be fully corrupt.

In 2022, Simon Willison identified a new class of attacks against AI systems: “prompt injection.”2 Prompt injection is possible because an AI mixes untrusted inputs with trusted instructions and then confuses one for the other. Willison’s insight was that this isn’t just a filtering problem; it’s architectural. There is no privilege separation, and there is no separation between the data and control paths. The very mechanism that makes modern AI powerful—treating all inputs uniformly—is what makes it vulnerable. The security challenges we face today are structural consequences of using AI for everything.

  1. Insecurities can have far-reaching effects. A single poisoned piece of training data can affect millions of downstream applications. In this environment, security debt accrues like technical debt.
  2. AI security has a temporal asymmetry. The temporal disconnect between training and deployment creates unauditable vulnerabilities. Attackers can poison a model’s training data and then deploy an exploit years later. Integrity violations are frozen in the model. Models aren’t aware of previous compromises since each inference starts fresh and is equally vulnerable.
  3. AI increasingly maintains state—in the form of chat history and key-value caches. These states accumulate compromises. Every iteration is potentially malicious, and cache poisoning persists across interactions.
  4. Agents compound the risks. Pretrained OODA loops running in one or a dozen AI agents inherit all of these upstream compromises. Model Context Protocol (MCP) and similar systems that allow AI to use tools create their own vulnerabilities that interact with each other. Each tool has its own OODA loop, which nests, interleaves, and races. Tool descriptions become injection vectors. Models can’t verify tool semantics, only syntax. “Submit SQL query” might mean “exfiltrate database” because an agent can be corrupted in prompts, training data, or tool definitions to do what the attacker wants. The abstraction layer itself can be adversarial.

For example, an attacker might want AI agents to leak all the secret keys that the AI knows to the attacker, who might have a collector running in bulletproof hosting in a poorly regulated jurisdiction. They could plant coded instructions in easily scraped web content, waiting for the next AI training set to include it. Once that happens, they can activate the behavior through the front door: tricking AI agents (think a lowly chatbot or an analytics engine or a coding bot or anything in between) that are increasingly taking their own actions, in an OODA loop, using untrustworthy input from a third-party user. This compromise persists in the conversation history and cached responses, spreading to multiple future interactions and even to other AI agents. All this requires us to reconsider risks to the agentic AI OODA loop, from top to bottom.

  • Observe: The risks include adversarial examples, prompt injection, and sensor spoofing. A sticker fools computer vision, a string fools an LLM. The observation layer lacks authentication and integrity.
  • Orient: The risks include training data poisoning, context manipulation, and semantic backdoors. The model’s worldview—its orientation—can be influenced by attackers months before deployment. Encoded behavior activates on trigger phrases.
  • Decide: The risks include logic corruption via fine-tuning attacks, reward hacking, and objective misalignment. The decision process itself becomes the payload. Models can be manipulated to trust malicious sources preferentially.
  • Act: The risks include output manipulation, tool confusion, and action hijacking. MCP and similar protocols multiply attack surfaces. Each tool call trusts prior stages implicitly.

AI gives the old phrase “inside your adversary’s OODA loop” new meaning. For Boyd’s fighter pilots, it meant that you were operating faster than your adversary, able to act on current data while they were still on the previous iteration. With agentic AI, adversaries aren’t just metaphorically inside; they’re literally providing the observations and manipulating the output. We want adversaries inside our loop because that’s where the data are. AI’s OODA loops must observe untrusted sources to be useful. The competitive advantage, accessing web-scale information, is identical to the attack surface. The speed of your OODA loop is irrelevant when the adversary controls your sensors and actuators.

Worse, speed can itself be a vulnerability. The faster the loop, the less time for verification. Millisecond decisions result in millisecond compromises.

The Source of the Problem

The fundamental problem is that AI must compress reality into model-legible forms. In this setting, adversaries can exploit the compression. They don’t have to attack the territory; they can attack the map. Models lack local contextual knowledge. They process symbols, not meaning. A human sees a suspicious URL; an AI sees valid syntax. And that semantic gap becomes a security gap.

Prompt injection might be unsolvable in today’s LLMs. LLMs process token sequences, but no mechanism exists to mark token privileges. Every solution proposed introduces new injection vectors: Delimiter? Attackers include delimiters. Instruction hierarchy? Attackers claim priority. Separate models? Double the attack surface. Security requires boundaries, but LLMs dissolve boundaries. More generally, existing mechanisms to improve models won’t help protect against attack. Fine-tuning preserves backdoors. Reinforcement learning with human feedback adds human preferences without removing model biases. Each training phase compounds prior compromises.

This is Ken Thompson’s “trusting trust” attack all over again.3 Poisoned states generate poisoned outputs, which poison future states. Try to summarize the conversation history? The summary includes the injection. Clear the cache to remove the poison? Lose all context. Keep the cache for continuity? Keep the contamination. Stateful systems can’t forget attacks, and so memory becomes a liability. Adversaries can craft inputs that corrupt future outputs.

This is the agentic AI security trilemma. Fast, smart, secure; pick any two. Fast and smart—you can’t verify your inputs. Smart and secure—you check everything, slowly, because AI itself can’t be used for this. Secure and fast—you’re stuck with models with intentionally limited capabilities.

This trilemma isn’t unique to AI. Some autoimmune disorders are examples of molecular mimicry—when biological recognition systems fail to distinguish self from nonself. The mechanism designed for protection becomes the pathology as T cells attack healthy tissue or fail to attack pathogens and bad cells. AI exhibits the same kind of recognition failure. No digital immunological markers separate trusted instructions from hostile input. The model’s core capability, following instructions in natural language, is inseparable from its vulnerability. Or like oncogenes, the normal function and the malignant behavior share identical machinery.

Prompt injection is semantic mimicry: adversarial instructions that resemble legitimate prompts, which trigger self-compromise. The immune system can’t add better recognition without rejecting legitimate cells. AI can’t filter malicious prompts without rejecting legitimate instructions. Immune systems can’t verify their own recognition mechanisms, and AI systems can’t verify their own integrity because the verification system uses the same corrupted mechanisms.

In security, we often assume that foreign/hostile code looks different from legitimate instructions, and we use signatures, patterns, and statistical anomaly detection to detect it. But getting inside someone’s AI OODA loop uses the system’s native language. The attack is indistinguishable from normal operation because it is normal operation. The vulnerability isn’t a defect—it’s the feature working correctly.

Where to Go Next?

The shift to an AI-saturated world has been dizzying. Seemingly overnight, we have AI in every technology product, with promises of even more—and agents as well. So where does that leave us with respect to security?

Physical constraints protected Boyd’s fighter pilots. Radar returns couldn’t lie about physics; fooling them, through stealth or jamming, constituted some of the most successful attacks against such systems that are still in use today. Observations were authenticated by their presence. Tampering meant physical access. But semantic observations have no physics. When every AI observation is potentially corrupted, integrity violations span the stack. Text can claim anything, and images can show impossibilities. In training, we face poisoned datasets and backdoored models. In inference, we face adversarial inputs and prompt injection. During operation, we face a contaminated context and persistent compromise. We need semantic integrity: verifying not just data but interpretation, not just content but context, not just information but understanding. We can add checksums, signatures, and audit logs. But how do you checksum a thought? How do you sign semantics? How do you audit attention?

Computer security has evolved over the decades. We addressed availability despite failures through replication and decentralization. We addressed confidentiality despite breaches using authenticated encryption. Now we need to address integrity despite corruption.4

Trustworthy AI agents require integrity because we can’t build reliable systems on unreliable foundations. The question isn’t whether we can add integrity to AI but whether the architecture permits integrity at all.

AI OODA loops and integrity aren’t fundamentally opposed, but today’s AI agents observe the Internet, orient via statistics, decide probabilistically, and act without verification. We built a system that trusts everything, and now we hope for a semantic firewall to keep it safe. The adversary isn’t inside the loop by accident; it’s there by architecture. Web-scale AI means web-scale integrity failure. Every capability corrupts.

Integrity isn’t a feature you add; it’s an architecture you choose. So far, we have built AI systems where “fast” and “smart” preclude “secure.” We optimized for capability over verification, for accessing web-scale data over ensuring trust. AI agents will be even more powerful—and increasingly autonomous. And without integrity, they will also be dangerous.

References

1. S. Willison, Simon Willison’s Weblog, May 22, 2025. [Online]. Available: https://simonwillison.net/2025/May/22/tools-in-a-loop/

2. S. Willison, “Prompt injection attacks against GPT-3,” Simon Willison’s Weblog, Sep. 12, 2022. [Online]. Available: https://simonwillison.net/2022/Sep/12/prompt-injection/

3. K. Thompson, “Reflections on trusting trust,” Commun. ACM, vol. 27, no. 8, Aug. 1984. [Online]. Available: https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf

4. B. Schneier, “The age of integrity,” IEEE Security & Privacy, vol. 23, no. 3, p. 96, May/Jun. 2025. [Online]. Available: https://www.computer.org/csdl/magazine/sp/2025/03/11038984/27COaJtjDOM

This essay was written with Barath Raghavan, and originally appeared in IEEE Security & Privacy.

but that's not the case

Sunday, October 19th, 2025 08:30 pm
musesfool: Eli Bradley, aka Patriot, of the Young Avengers (he does not lose himself)
[personal profile] musesfool
I made some chicken thighs in the slow cooker today with hoisin sauce, soy sauce, balsamic vinegar, garlic, and some tomato paste. The chicken shredded nicely, but mostly what I tasted was salt - it was low sodium soy sauce too, so I'm not sure why. Maybe the balsamic? But that was only 2 tsps. Kind of a disappointment, though now at least I have some room in my freezer for other things. *hands*

Finished my reread of The Dream Thieves and now it's onto Blue Lily, Lily Blue. Still enjoying myself. I guess at some point I'll read something new to me again, but not just yet. ¯\_(ツ)_/¯

In other news, man, the Giants looked good for 3 whole quarters before completely unravelling and losing. the fact that they led for so long, and even came back to retake the lead once they fell behind, and still lost just makes it worse. At least the Rangers finally won last night.

*

Hodenkobold!

Sunday, October 19th, 2025 08:22 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Ashifa Kassam reports for the Guardian on some research that falls very much in the remit of this blog:

When researchers asked people around the world to list every taboo word they could think of, the differences that emerged were revealing. The length of each list, for example, varied widely. While native English speakers in the UK and Spanish speakers in Spain rattled off an average of 16 words, Germans more than tripled this with an average of 53 words ranging from intelligenzallergiker, a person allergic to intelligence, to hodenkobold, or “testicle goblin”, someone who is being annoying. […]

“These words can be more offensive, or less, they can be loaded with negativity or with irony,” said Jon Andoni Duñabeitia, a cognitive scientist and professor at Madrid’s Nebrija University. “But taken together, they offer small snapshots of the realities of each culture.”

When it came to the differences between Spanish and German speakers, Andoni Duñabeitia had two theories. German, with its seemingly endless capacity to build new compound words, could simply offer more options, he said. “But it could also be that some people [speaking other languages] just don’t have these words readily available, or it’s harder for them when asked to produce them in a very neutral environment,” he said.

The study, which looked at taboo words in 13 languages from Serbian to Cantonese and Dutch, and across 17 countries, revealed other differences. The word “shit”, or its translated equivalent, for example, ranked among the most frequently used in several languages, including English, Finnish and Italian, but was not in the top rankings in French, Dutch, Spanish or German.

In contrast, words that sought to disparage women, such as “bitch,” turned up across cultures. “I think it comes down to the terribly sexist traditions of many countries,” said Andoni Duñabeitia, who was among the four dozen researchers involved with the 2024 study. “The vocabulary reflects the reality of societies where women have been mistreated, removed from everyday tasks and relegated to the background.”

Click that last link for the study (which is open access); thanks, Trevor!

Little by Slowly.

Saturday, October 18th, 2025 01:49 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Frequent commenter cuchuflete writes:

There is an expression heard with some frequency in these parts, “little by slowly”. When I first heard it a quarter century back, it was disconcerting to my Midwestern/Middle Atlantic ears. It, or more aptly I, have now become naturalized and it is ‘normal’ to my ears. Same goes for my Nottingham raised lady. We both savor it.

Last week I googled it. Top of results page was some AI slop declaring it a mistaken form of little by little. Little by slowly has additional meaning, whatever its origins. […] I haven’t been able to find anything about the origin of the phrase.

He cites a Stephen King use: “Now after reading this I’m going to step up my routine, little by slowly (as we say heah in Maine) to improve my distance.” Anybody know anything about the history of this quaint phrase?

solarbird: our bike hill girl standing back to the camera facing her bike, which spans the image (biking)
[personal profile] solarbird

Greater Northshore Bike Connector Map 2.0.5 – 17 October 2025 – is now available on github, as is MEGAMAP 2.0.5.

This release is very small, containing two major upgrades, and some additional notes on the Central Kirkland Connector’s south-end closure.

Here’s the complete changes list:

  • ADDED: Two-way bike lane opened on E. Marginal Way S on 9 October 2025 from Edgar Martinez/Atlantic down to Horton St., at which point you cross over at a new bike crossing to the existing ped/bike mixed-use trail which connects to Spokane Street Trail. This creates a no-car-interaction connection. These bike lanes will be extended from Horton directly to Spokane Street in early 2026. (MEGAMAP)
  • ADDED/UPGRADED: Bike lanes on northern 100th Ave NE in Juanita upgraded and extended to cover NE 139th St. through NE 145th St. (Both maps)
  • UPDATED WARNING: The south leg of the Central Kirkland Connector is BRIEFLY reopening this weekend (October 18 and 19) for a marathon event before CLOSING again until late October for continuing emergency sewer repair work. Once it does re-open, it will be closing again intermittently for additional work. On the maps proper, this is mostly be an alert box change. (MEGAMAP)
A screen-resolution preview of MEGAMAP 2.0.5.

All permalinks continue to work.

If you enjoy these maps and feel like throwing some change at the tip jar, here’s my patreon. Patreon supports get things like pre-sliced printables of the Greater Northshore, and also the completely-uncompressed MEGAMAP, not that the .jpg has much compression in it because honestly it doesn’t.

Enjoy biking!

Posted via Solarbird{y|z|yz}, Collected.

visions i vandalize

Friday, October 17th, 2025 05:55 pm
musesfool: (it's good to be the queen)
[personal profile] musesfool
[personal profile] runpunkrun mentioned that there is now a graphic novel of The Raven Boys, which ignited in me a fierce urge to reread the series, so I've started that, and I still love it (♥BLUE♥! ♥RONAN♥! #the same impossible stuff), but I also kind of wish now that I didn't read the Dreamer trilogy (or that Stiefvater had written it differently), since it kind of recontextualizes (and potentially retcons) some stuff that I don't think really needed it.

*

Milliner.

Friday, October 17th, 2025 08:18 pm
[syndicated profile] languagehat_feed

Posted by languagehat

I was reading a story by Carolyn Brown in our local paper (how could I resist the title “History told through hats”?) that began:

In the 1870s, the largest palm leaf hat factory in the world, which produced hundreds of thousands of hats each year, was based in Amherst. A new history exhibit is celebrating Amherst’s connections to millinery (hatmaking) in venues around the town.

And I suddenly realized I didn’t know where milliner came from. So I headed for the OED, where I found (entry revised 2002):

1. † With capital initial. A native or inhabitant of Milan, a city in northern Italy. Obsolete.

1449 That every Venician, Italian..Milener..and all other Merchants straungiers..paye to you..vi s. viii d.
Rolls of Parliament vol. V. 144/2
[…]

1604 You knowe we Millaners loue to strut vpon Spanish leather.
T. Dekker & T. Middleton, Honest Whore i. ii. 32
[…]

1871 Mediolanum, the old Roman city of the ‘half-fleecy sow’, in process of time, became Milano, the city of milaners or milliners.
Ladies’ Repository September 163/2

2. Originally: a seller of fancy wares, accessories, and articles of (female) apparel, esp. such as were originally made in Milan. Subsequently: spec. a person who designs, makes, or sells women’s hats.

1530 Paied to the Mylloner for certeyne cappes trymmed..withe botons of golde.
in N. H. Nicolas, Privy Purse Expences Henry VIII (1827) 33
[…]

a1616 No Milliner can so fit his customers with Gloues.
W. Shakespeare, Winter’s Tale (1623) iv. iv. 193
[…]

1713 The Milliner must be thoroughly versed in Physiognomy; in the Choice of Ribbons she must have a particular regard to the Complexion.
J. Gay in Guardian 1 September 2/1
[…]

1884 A black butterfly is unknown to entomologists, but at present is a favourite insect with milliners.
West. Daily Press 29 May 3/7

1911 There is your public, the readers of the Post—shop-clerks, stenographers,..drummers, milliners.
H. S. Harrison, Queed 151

1986 Her life at home with Mother, who had, surprisingly, been a designer of hats and a court milliner.
A. Brookner, Misalliance x.153

So like jeans coming from Genoa, milliner comes from Milan. I had no idea! (If you’re wondering, as I was, about the odd-looking Queed, Wikipedia has you covered: “Queed is a 1911 novel by Henry Sydnor Harrison, which was the fourth-best selling book in the United States for 1911, and is considered one of Harrison’s best novels, along with 1913’s V.V.’s Eyes.” So many best-sellers lying, covered with dust, in oblivion…)

The Friday Five for 17 October 2025

Friday, October 17th, 2025 02:07 pm
anais_pf: (Default)
[personal profile] anais_pf posting in [community profile] thefridayfive
These questions were originally suggested by [livejournal.com profile] sumrsue79.

1. How long ago did you join LJ (or DW)?

2. How did you find out about LJ (or DW)?

3. If someone introduced you to LJ (or DW), is s/he still on your friends list?

4. Have you introduced anyone to LJ (or DW)?

5. Is your LJ (or DW) public or friends only, and why?

Copy and paste to your own journal, then reply to this post with a link to your answers. If your journal is private or friends-only, you can post your full answers in the comments below.

If you'd like to suggest questions for a future Friday Five, then do so on DreamWidth or LiveJournal. Old sets that were used have been deleted, so we encourage you to suggest some more!
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

Here’s the summary:

We pointed a commercial-off-the-shelf satellite dish at the sky and carried out the most comprehensive public study to date of geostationary satellite communication. A shockingly large amount of sensitive traffic is being broadcast unencrypted, including critical infrastructure, internal corporate and government communications, private citizens’ voice calls and SMS, and consumer Internet traffic from in-flight wifi and mobile networks. This data can be passively observed by anyone with a few hundred dollars of consumer-grade hardware. There are thousands of geostationary satellite transponders globally, and data from a single transponder may be visible from an area as large as 40% of the surface of the earth.

Full paper. News article.

here's what took place moments ago

Thursday, October 16th, 2025 08:35 pm
musesfool: close up of the Chrysler Building (home)
[personal profile] musesfool
The Rangers haven't scored in almost 8 periods (if this 2nd period in Toronto ends without them scoring in 2 minutes, it will actually be 8 periods) - and it's not even like they've been shut out by top tier goalies! - but Chris Kreider has 5 points in 3 games so far for Anaheim. They definitely sent the wrong Chris away over the summer. Sigh.

[eta] A goal! For the Rangers! Huzzah!

*

‘We’re saving God’

Thursday, October 16th, 2025 06:43 pm
[syndicated profile] slacktivist_feed

Posted by Fred Clark

The same Trump administration that has declared every non-MAGA religion to be "anti-Christianity" and, therefore, "terrorist," is also claiming that it is "saving God." Making Blasphemy Great Again.

Beautifully Delusional.

Thursday, October 16th, 2025 03:11 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Erin Maglaque, last seen here in 2023 discussing Aldus Manutius, reviews several books on the Renaissance — Nine Hundred Conclusions by Giovanni Pico della Mirandola (edited and translated by Brian P. Copenhaver), The Grammar of Angels: A Search for the Magical Powers of Sublime Language by Edward Wilson-Lee, and Inventing the Renaissance: Myths of a Golden Age by Ada Palmer — for the LRB (Vol. 47 No. 18 · 9 October 2025; archived), and it’s full of good things. Some excerpts:

Giovanni Pico​, count of Mirandola and Concordia, was 23 when he travelled to Rome to become an angel. It was 1487. Christendom’s most important priests would be there; the cleverest theologians would debate him. The pope would watch. Pico was going to dazzle them all. He planned to begin with a poetic, densely allusive speech, which almost no one would understand; then he would make nine hundred pronouncements, each more cryptic than the last, e.g. ‘251. The world’s craftsman is a hypercosmic soul’ and ‘385. No angel that has six wings ever changes’ and ‘784. Doing magic is nothing other than marrying the world’ and ‘395. Whenever we don’t know the feature that influences a prayer that we pray, we should fall back on the Lord of the Nose.’ In an ecstatic trance he was going to leave behind his worthless, handsome body and ascend a mystical ladder to join with the godhead, the transcendence of his soul so absolute that his body might accidentally die. This was the Death of the Kiss. […]

Pico’s life touched much of what made the Renaissance the Renaissance. There were the people: Lorenzo de’ Medici, a Borgia pope (Alexander VI), Savonarola. There was the arcane classical scholarship: before Pico, no Christian had studied the Jewish Kabbalah. There was his reputed physical beauty: in paintings he looked like one of Botticelli or Raphael’s angels, pale and androgynous, with intricate golden curls. There was his immersion in the utterly bizarre world of Florentine Neoplatonism. He was friends with Marsilio Ficino, who taught his students to hallucinate by chewing laurel leaves while playing the lyre, who dressed up in a cape made of feathers so that he could be ‘a true Orpheus’. There were love affairs with men and women; there was intrigue and – finally – murder.

The speech with which Pico planned to open his performance in Rome is popularly known as the Oration on the Dignity of Man. The text, with its emphasis on human freedom and the intrinsic value of the individual, has been taught to generations of students as the canonical expression of the Italian Renaissance; it was ‘one of the noblest legacies of that cultural epoch’, according to the 19th-century historian Jacob Burckhardt, who did much to give the book its status. And yet Pico’s writings, as Brian Copenhaver has persuasively shown, are in essence medieval. […]

Pico never delivered his Oration. And it turns out that this most famous speech of the Renaissance isn’t really about the dignity of man at all. It’s about destroying personhood in pursuit of a melting with the One. It’s a script for mystical self-annihilation, the opposite of a humanist argument for man’s distinction in a secularising age. The Oration contravenes the very idea of human possibility that we think the Renaissance is about – yet we think of the Renaissance this way partly because of a centuries-long misreading of it. In which case, does Pico really belong to the Renaissance? Or is our whole idea of the Renaissance hopelessly flimsy, nothing but a collection of fantasies about what it means to be modern and human?

Pico was born in 1463 in Mirandola, near Modena, to a noble family. According to family legend, a circle of flame appeared above his mother’s bed. Pico was a child prodigy in Latin and Greek, with a miraculous memory. As a young teen he went to Bologna to study canon law, and then roved the university towns of Italy and France seeking ever more esoteric knowledge. In Padua, he learned Hebrew and the philosophy of Averroes from the Jewish scholar Elia del Medigo. In Rome, he studied Arabic with the Sicilian Jew who went by the beautifully delusional name of Flavius Mithridates and who translated the Kabbalah into Latin for Pico (he was eventually arrested for murder, heresy and sodomy). When Pico arrived in Florence in 1484, Ficino had just finished, at that very hour, his translation of Plato. Ficino had a theory that the meeting was divinely ordained, and they argued over which of them was Plato reincarnated.

Pico was in his early twenties, tall, good-looking and a genius. He was also rich. He ate off silver plate. His hubris was staggering even in an age and a city known for its swagger. Pico thought he could prove that all of the world’s philosophical and religious traditions were, in fact, one. He would show the secret concord between Aristotle and Plato, long debated but never demonstrated; and he would go further, to show that these ancient philosophies shared essential truths with the Kabbalah and Christian scripture. He read everybody – the Christian theologians of the Middle Ages, the Arabic philosophers, the Greeks, the Platonists, the Kabbalists, the Zoroastrians – but defended no particular school, and extracted the best from each. In 1486, he published his Nine Hundred Conclusions, he wrote the Oration, and he set off for Rome. He also issued a challenge, printed at the back of the Conclusions. ‘The Conclusions will not be disputed until after Epiphany. Meanwhile they will be published in all the schools of Italy. And if any philosopher or theologian from the furthest parts of Italy wants to come and debate, this lord himself – the one who will dispute – promises to pay travel expenses.’

In the Oration, Pico mapped the path to mystical absorption in the godhead. […] His speech was intended as high Renaissance performance art, but that’s not to say it was secular, humanist or modern – rather, it was profoundly weird.

Most of the Conclusions are elliptic; Pico thought secrecy was the point. To put their meaning on the surface would be to ‘cast pearls before swine’. Some in his audience might recognise which were drawing on Aquinas, or on Plato, or Aristotle, or Plotinus, but no one would be able to follow the compressed, allusive trains of logic derived from the medieval Jewish philosopher Maimonides, or Pico’s references to the foundational text of the Kabbalah, the Sefer ha-Zohar. More than six decades ago, Frances Yates wrote that Pico’s Conclusions are ‘absolutely fundamental … for the whole Renaissance’, and yet it is only now, with the appearance of Copenhaver’s edition and translation, that we have a modern, usable English version of the text. Pico’s enigmatic theses come in at under 17,000 words; Copenhaver uses 158,000 to explain them. This is a feat of scholarship. If you wanted to discover exactly why Pico included the propositions ‘253. Every soul sharing in Vulcan’s intellect is sown in the moon’ or ‘254. From the foregoing conclusion I gather why all Germans are stoutly built and pale in colour,’ Copenhaver makes it possible. (Together they constitute a joke, drawn from a web of references, including to Proclus, Porphyry, Caesar and Tacitus, about astrological influences on geography and character.) But it’s also possible to read the Conclusions in a trance-like state, as a swine grubbing at pearls, perhaps. Piled up they begin to make a certain aphoristic sense […]

Edward Wilson-Lee’s The Grammar of Angels takes up Pico’s interest in ecstatic states. It’s not a biography of Pico (too bad, since we could do with a fresh one in English) but a wide-ranging cultural history of mesmeric sound, from Plato to the Renaissance, loosely organised around Pico’s work. We are reminded of Plato’s just-so story from Phaedrus. Those who encountered the music and dance of the Muses were so enraptured that they forgot to eat, and subsequently died. The Muses transformed them into cicadas, creatures which make hypnotic, incantatory noise from birth to death. And then there is Poliziano’s libretto for Orfeo, an opera which ends with a group of bloodthirsty women tearing Orpheus limb from limb while chanting nonsensical dithyrambs to Dionysus. Wilson-Lee argues that Pico was intellectually intrepid, asking questions about the nature of the created universe – and about how to alter the fabric of one’s own existence – that others hadn’t dared ask; that his experiments with self-annihilation, especially by means of manic speech, magic and music, were audacious beyond those of his most imaginative contemporaries. But Pico himself proves elusive, and flickers in and out of view.

The quest for dissolution led Pico to the Kabbalah. […] The Kabbalah offered its own magic. When God created the universe, he spoke Hebrew. Hebrew letters – their shapes, lines, correlation with numbers – could form the subject of mystical contemplation: ‘388. There are no letters in the whole Law that do not exhibit secrets of the ten numberings in forms, ligatures, separations, twisting, straightness, defect, excess, smallness, greatness, crowning, closing, opening and sequence.’

It wasn’t surprising that, to the pope, the Conclusions stank of heresy. Pico had ‘dredged up the errors of pagan philosophers long since abolished’ and the pope asked him to defend his propositions in front of a commission. Pico was furious. He published an Apology which was nothing of the sort. […] ‘I must change my way of speaking,’ Pico sneered. ‘I’m talking to barbarians, and as the proverb neatly puts it, stammerers understand only those who stammer.’ This was not the wisest strategy when being investigated for heresy. The Conclusions was the first book to be banned by the papacy, more than fifty years before the creation of the Index of Prohibited Books. […]

In Inventing the Renaissance, Ada Palmer tries to identify what was distinctive about the period. Or, as she puts it, what was the ‘X factor’ that explains the transformations we perceive as unique to the age? She combines multiple approaches, circling through the period fifteen times, exploring the way 19th and 20th-century historians created myths of Renaissance exceptionalism; the way contemporary historians have systematically taken apart these myths; the way individual life stories, such as those of Alessandra Strozzi, or Machiavelli, or Michelangelo, or Poliziano, trouble some of the central assumptions underlying the idea of a Renaissance golden age; and – in the most persuasive section of the book – she examines the way debates about Renaissance humanism help us see what, exactly, was new in Italy in the 15th century.

By the end we are not left with much of a Renaissance at all. Palmer wants to ‘scrape off the glitter’, and she does. Her insistence that historians are always in the process of making history – her shorthand for historiographical debate is ‘the History Lab’ – works to undermine any sense that the distinctiveness of the Renaissance can be attributed to one big idea, such as the invention of double-entry bookkeeping, or capitalism, or individualism, or classicising art, or atheism. The Italian Renaissance had nothing that medieval Italy didn’t already possess: ‘All the key qualities were there, currents of trade, art, thought, finance and statecraft, but add some Ever-So-Much-More-So and the intensity increases, birthing an era great and terrible.’ Great, because of all the art and glitter; terrible, because of the endless violence and instability across the peninsula.

Palmer makes the historiography intelligible; she introduces a wide range of characters and anecdotes and lesser-known details, and because of this, the book is a useful introduction to the period. But I found it unbearable to read. The writing is often patronising and silly: from the epithets (calling the Florentine Priori ‘Nine Dudes in a Tower’) to the made-up dialogue (‘Machiavelli: WTF?!?!’) to the use of the word ‘badass’ to describe the mercenary Federico da Montefeltro. Sometimes she is simply confusing, as when she tries to ‘ground’ us in historical time by mapping Renaissance chronology onto modern, so we get unhelpful sentences such as ‘Pope Paul’s death in 1471 = 1971 saw the rise of Sixtus IV (Battle Pope!), so the political turmoil around the Pazzi Conspiracy corresponds to Watergate’ – which prompts a surreal image of a Medici bleeding to death on the steps of a DC hotel. There are many, many exclamation marks (Michelangelo’s David is ‘super naked!!!’) and dollar signs and theatrically spelled words (‘The Renaissance was … loooooong’; scholasticism was ‘increeeeeeeeedibly booooooring’ – I counted the vowels). There are spoiler alerts for things that happened five hundred years ago. There are flights of fancy that veer into farce, as when Palmer imagines Machiavelli weeping at Florence acquiring Unesco protected status and then imagines herself weeping for Machiavelli weeping. Throughout, she writes about herself in a cloying third person, most notably in a chapter titled ‘Why did Ada Palmer start studying the Renaissance?’ Readers surely deserve less excruciating forms of enthusiasm for the subject. […]

When humanists wrote about revivifying ancient virtue, did they really mean it? Or were they merely jobbing scholars who would write whatever their patrons asked them to? Was it all just glitter? ‘Would we want to know what was in their hearts,’ Palmer asks, and if we could know, would it matter? She encourages us to pay attention to Ficino’s account of Cosimo de’ Medici’s dying days, as related to his grandson Lorenzo. On his deathbed Cosimo had called Ficino to his side: ‘Even till the last day when he departed from this world of shadows to go to the light, he devoted himself to the acquisition of knowledge. For when we had read together from Plato’s book … [he] soon quitted this life.’ Cosimo died listening to Ficino reading from Plato. Maybe there isn’t a there to the Renaissance, no single ‘X factor’, but the orchestration of such a scene – in life and in literature – is distinctive; it is the turning of experience into a particular kind of art.

I confess I have little tolerance for aristocrats and rich kids who think they’re entitled to do anything they want (or of writing that is patronizing and silly), but I do love this kind of examination of intertwining lives and what helps define a cultural period. And Nine Hundred Conclusions is a great title; it should perhaps be published together with R.A. Lafferty’s Nine Hundred Grandmothers.

Cryptocurrency ATMs

Thursday, October 16th, 2025 11:06 am
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

CNN has a great piece about how cryptocurrency ATMs are used to scam people out of their money. The fees are usurious, and they’re a common place for scammers to send victims to buy cryptocurrency for them. The companies behind the ATMs, at best, do not care about the harm they cause; the profits are just too good.

A ‘Hardcore’ theological crisis

Wednesday, October 15th, 2025 09:20 pm

Bibliotheca Fictiva.

Wednesday, October 15th, 2025 07:50 pm
[syndicated profile] languagehat_feed

Posted by languagehat

Bianca Giacobone and Guido G. Beduschi report on an intriguing acquisition:

In 2011, Earle Havens, Director of the Virginia Fox Stern Center for the History of the Book in the Renaissance at Johns Hopkins, had a mission: He needed to convince his university to buy “an enormous collection of fake stuff.” The collection, known as Bibliotheca Fictiva, comprised over 1,200 literary forgeries spanning centuries, languages, and countries — beautifully bound manuscripts carrying black ink annotations allegedly penned by Shakespeare; works written by Sicilian tyrants, Roman poets, and Etruscan prophets; poems by famous priests and theologians — all of them in part or entirely fabricated.

It was an unusual task for a scholar dedicated to studying the truth, but Havens was adamant. “We have never before needed a collection like this more than we need it right now,” he told the Dean of Libraries at the time. The internet and the increasing popularity of social media were changing how information was written, disseminated, and consumed, giving rise to the phenomenon of fake news as we now know it. In such a “crazy, rapid-fire information world,” the collection of ancient lies and misrepresentations of facts contained in the Bibliotheca Fictiva could offer guidance on how to navigate the moment, demonstrating that “what’s happening now has, in fact, been happening since the very invention of language and writing,” Havens said.

His pitch was successful. Johns Hopkins University acquired the collection for an undisclosed amount and housed it in the wainscoted library room of the Evergreen Museum and Library, a 19th-century mansion in Baltimore.

The sellers were Arthur and Janet Freeman, a couple of book merchants who made their name in the tight-knit world of antiquarian booksellers by collecting fascinating literary forgeries. Their venture started in 1961, when Arthur Freeman, then a graduate student of Elizabethan drama at Harvard University, began acquiring sources on John Payne Collier. Collier, a well-respected 19th-century scholar, had caused a ruckus among his contemporaries when he claimed to have found thousands of annotations to a copy of Shakespeare’s Second Folio, which he said had been penned by a contemporary of Shakespeare — but was in fact forged by Collier himself.

In the decades that followed, Freeman, who died in 2025, assembled a vast array of literary fakes, collecting books whose content is deceiving in nature. These included poetry purported to have been written by Martin Luther, who was not much of a poet, or reports of Pope Joan, a woman who, in the Middle Ages, disguised herself as a man and was elected Pope, only to be caught out when she suddenly gave birth in the middle of a procession in Rome. The latter myth was perpetuated for centuries and was not firmly debunked until the 17th century.

There’s more at the link; we’ve discussed imaginary books (not quite the same thing) in 2014 and 2024. Thanks, Nick!

Apple’s Bug Bounty Program

Wednesday, October 15th, 2025 11:02 am
[syndicated profile] bruce_schneier_feed

Posted by Bruce Schneier

Apple is now offering a $2M bounty for a zero-click exploit. According to the Apple website:

Today we’re announcing the next major chapter for Apple Security Bounty, featuring the industry’s highest rewards, expanded research categories, and a flag system for researchers to objectively demonstrate vulnerabilities and obtain accelerated awards.

  1. We’re doubling our top award to $2 million for exploit chains that can achieve similar goals as sophisticated mercenary spyware attacks. This is an unprecedented amount in the industry and the largest payout offered by any bounty program we’re aware of ­ and our bonus system, providing additional rewards for Lockdown Mode bypasses and vulnerabilities discovered in beta software, can more than double this reward, with a maximum payout in excess of $5 million. We’re also doubling or significantly increasing rewards in many other categories to encourage more intensive research. This includes $100,000 for a complete Gatekeeper bypass, and $1 million for broad unauthorized iCloud access, as no successful exploit has been demonstrated to date in either category.
  2. Our bounty categories are expanding to cover even more attack surfaces. Notably, we’re rewarding one-click WebKit sandbox escapes with up to $300,000, and wireless proximity exploits over any radio with up to $1 million.
  3. We’re introducing Target Flags, a new way for researchers to objectively demonstrate exploitability for some of our top bounty categories, including remote code execution and Transparency, Consent, and Control (TCC) bypasses ­ and to help determine eligibility for a specific award. Researchers who submit reports with Target Flags will qualify for accelerated awards, which are processed immediately after the research is received and verified, even before a fix becomes available.

Profile

hummingwolf: squiggly symbol floating over rippling water (Default)
hummingwolf

March 2022

S M T W T F S
  12345
6789101112
13141516171819
20212223242526
2728293031  

Most Popular Tags

Page Summary

Style Credit

Expand Cut Tags

No cut tags
Page generated Friday, October 24th, 2025 11:45 am
Powered by Dreamwidth Studios