from Granular

An interesting article in the Telegraph today, arguing that Trump is now in partnership with a kleptocracy. While Maduro is gone, his corrupt government remains in place, and there seems to be little sign that Trump will attempt to impose democracy on Venezuela.

The various factions within that benighted country are no doubt jockeying for position, and I wouldn't be at all surprised if in the next couple of months civil war breaks out.

 
Read more...

from The happy place

I had a creepy nightmare

I was eaten by a sand worm (shai hulud) from dune, but in my dream it was a face hugger — I had the wrong name for it in my dream.

I was inside of the sand worm. In a tubular room with fluorescent walls coloured yellowish brown.

And there was a dying child with a knife stuck vertically embedded in his flesh, in the stomach with the ivory shaft Pointing upwards, near his chin.

Like he grew into the knife, the ways trees sometimes embed things stuck to them, rather than was stabbed with it.

The wound looked infected, because the red outlines were yellowed, but there was no blood running from it.

Unable to remove the knife, I wanted to kill us both to end his suffering, although he didn’t say a word or act like he was in pain, despite this knife.

(The knife is of steel — not stainless so a greyish matte colour — and sized of a normal cutlery, but very sharp. I have it in my kitchen drawer, a family heirloom —inherited to me by my late grandmother — but here it was in my dream. )

Next to the tormented child in the belly of the beast there was a laptop. By shutting it down I could somehow remove the suffering from him, and I wanted to do that first, before killing us, but instead I accidentally pushed him so he folded forward (he was sitting next to me), burrowing the knife further into him.

Then when I finally was able to shut the computer down, it started applying windows updates.

And then I awoke

 
Read more... Discuss...

from digital ash

I'll be the first person to admit that when the word sovereign gets thrown around that I quickly think of an armed white American from a limited gene pool refusing to show their driving license to a police officer. But digital sovereignty in Europe isn't about tin foil hats or mistrust of the government. It's about not putting all of our digital resources including finance and government in the hands of a select few foreign companies. So I suppose before we continue on this adventure of open source and European alternatives to foreign technology it's important to define what we mean with digital sovereignty.

Sovereignty as a concept is the authority of a state or nation to govern itself without outside interference. In the context of digital sovereignty, it refers to a nation's or individual's ability to exercise control over its own digital activities, data, and infrastructure. Already, it is noticeable that digital sovereignty diverges from the central concept in that the individual becomes more important.

Why is the individual important in this case? Well, unlike in some countries like China where the government has strict approval over what can and can't be accessed via the internet (there are some limitations in Europe granted but it's pretty lax comparatively), we for the most part have freedom to choose how we live our digital lives. This has unfortunately led to us mostly choosing foreign companies and the vast majority of our digital lives being controlled by companies outside of our borders.

But individuals aren't the only ones at risk. European governments, institutions, and companies are all dependent on foreign technology companies. This makes digital sovereignty significantly more complex as it plays out on various levels.

And theoretically this isn't an issue. In fact one might argue that in a global economy it's perfectly normal to depend on another nation to handle certain aspects of your society. However, when this ultimately makes an entire continent dependent on external companies and countries, we no longer control the terms. Slowly we become a digital vassal state.


#digitalsovereignty

 
Read more... Discuss...

from Iain Harper's Blog

Sam Peckinpah (1925-84) directed 14 pictures in 22 years, nearly half of them compromised by lack of authorial control due to studio interference. The Deadly Companions (1961), Major Dundee (1965), The Wild Bunch (1969), Pat Garrett & Billy the Kid (1973), Convoy (1978) and The Osterman Weekend (1983) were all taken off him in post-production and released to the public in what the director considered a corrupted form.

The Wild Bunch was pulled from its initial release and re-edited by Warner Bros, with no input from the director. Even his first great success, Ride the High Country (1962), saw him booted out of the editing suite, though it was in the very latter stages of post, with no serious damage done.

Director, Sam Pechinpah

An innovative filmmaker enamoured with the myths of the old west, if Peckinpah was (as Wild Bunch producer Phil Feldman believed) a directorial genius, he was also a worryingly improvisational one. Along with his extraordinary use of slow motion, freeze-frame and rapid montage, he liked to shoot with up to seven cameras rolling, very rarely storyboarded and went through hundreds of thousands of feet of celluloid (just one of the reasons he alarmed and irked money-conscious studio bosses).

His intuitive method of movie-making went against the grain of studio wisdom and convention. Peckinpah was like a prospector panning for gold. The script was a map, the camera a spade, the shoot involved the laborious process of mining material, and the editing phase was where he aimed to craft jewels.

The Wild Bunch

Set in 1913 during the Mexican revolution, The Wild Bunch sees a band of rattlesnake-mean old bank robbers, led by William Holden’s Pike Bishop, pursued across the US border by bounty hunters into Mexico, a country and landscape that in Peckinpah’s fiery imagination is less a location and more a state of mind.

It’s clear America has changed, and the outlaw’s way of living is nearly obsolete. “We’ve got to start thinking beyond our guns, those days are closing fast,” Bishop informs his crew, a line pitched somewhere between rueful reality check and lament.

The film earned widespread notoriety for its “ballet of death” shootout, where bullets exploded bodies into fireworks of blood and flesh. Peckinpah wanted the audience to taste the violence, smell the gunpowder, be provoked into disgust, while questioning their desire for violent spectacle. 10,000 squibs were rigged and fired off for this kamikaze climax, a riot of slow-mo, rapid movement, agonised, dying faces in close-ups, whip pans and crash zooms on glorious death throes, and a cacophony of ear-piercing noise from gunfire and yelling.

Steve McQueen

His first teaming with Steve McQueen in Junior Bonner (1972) is well worth checking out, even though it’s missing the trademark Peckinpah violence. The story of a lonely rodeo rider reuniting with his family is an ode to blue-collar living, a soulful and poetic work proving that SP could do so much more than mere blood-and-guts thrills.

Bring Me the Head of Alfredo Garcia

Studio Poster for Bring me the Head of Alfredo Garcia

A nightmarish south-of-the-border gothic tale in which a dive-bar piano player (Warren Oates), sensing a scheme to strike it rich, sets off to retrieve the head of a man who got a gangster’s teenage daughter pregnant. It’s the savage cinema of Peckinpah in its purest form: part love story, part road movie, part journey into the heart of darkness – and all demented.

As with his final masterwork, Cross of Iron (1977), a war movie told from the German side, these films can appear alarmingly nihilistic, or as if they’re wallowing in sordidness. But while Peckinpah’s films routinely exhibit deliberately contradictory thinking and positions, he was a profoundly moral filmmaker. The “nihilist” accusation doesn’t wash. What we see in his work is more a bitterness toward human nature’s urge to self-destruction.

 
Read more... Discuss...

from An Open Letter

E just left, and I was doing my gratitude list. I would have dreamed of this life and given a lot to get it even just a year ago. I’m just grateful to have it, since I know that I gave a lot for it along the way.

 
Read more...

from DrFox

Avancer dans la vie n’est pas un acte de courage. On s’est raconté cette histoire trop longtemps. Le courage suppose un danger identifié, un effort musculaire de l’âme, une poussée contre la peur. Avancer dans la vie, vraiment avancer, n’obéit pas à cette logique. C’est autre chose. C’est plus nu. Plus fragile. C’est un acte de foi.

La foi n’est pas ici religieuse au sens étroit. Elle n’est pas une adhésion à un dogme ni une soumission à un récit sacré. Elle est un état de conscience. Une posture intérieure face à l’impossibilité de savoir. Une manière de dire oui à quelque chose que l’on ne peut ni prouver, ni contrôler, ni même pleinement imaginer depuis le niveau où l’on se tient.

Le courage agit à l’intérieur d’un monde déjà balisé. On sait à peu près ce qui est possible, ce qui est risqué, ce qui est attendu. La foi, elle, commence là où les cartes s’arrêtent. Là où il n’est plus possible de construire brique après brique en s’appuyant sur ce qui existe déjà. Parce que ce qui vient n’est pas une extension du connu. C’est un saut de niveau.

C’est là que beaucoup se trompent. Ils veulent fabriquer l’avenir avec les matériaux du passé. Reproduire des structures, améliorer des systèmes, optimiser des comportements. Ils pensent que le progrès est cumulatif. Qu’il suffit d’empiler. Or certaines transformations ne s’empilent pas. Elles traversent. Elles obligent à lâcher ce qui faisait sens avant. Elles exigent une autre logique.

C’est pour cela que les grandes transitions humaines ne sont jamais purement rationnelles. Elles passent toujours par une zone d’illusion assumée. On accepte de croire à quelque chose qui n’est pas encore là. On accepte de se raconter une histoire suffisamment crédible pour avancer ensemble. Sans cette illusion partagée, rien ne tient.

Les relations humaines reposent sur ce même mécanisme. Aimer quelqu’un, faire confiance, coopérer, construire à deux ou à plusieurs, ce n’est jamais une démonstration logique. C’est un acte de foi envers l’autre. Une décision silencieuse de suspendre le soupçon. De faire comme si l’autre n’allait pas trahir au premier virage. De faire comme si la parole avait encore un poids.

Nous savons pourtant que l’humain peut être violent, lâche, prédateur. L’histoire entière le prouve. Chaque crise le rappelle. La peur de l’autre n’est pas une pathologie. Elle est fondée. Elle est rationnelle à un certain niveau. L’épisode du papier toilette lors des confinements l’a montré de façon presque comique et presque tragique. À la première pénurie symbolique, chacun pour soi. Alors oui, on peut légitimement se demander ce qu’il resterait de solidarité à la première vraie famine.

Et pourtant, nous continuons. Nous vivons dans des villes de millions d’individus. Nous prenons le métro. Nous confions nos enfants à des écoles. Nous mangeons des aliments préparés par des inconnus. Nous dormons pendant que d’autres veillent. Cette organisation dépasse largement l’humain tel qu’il a été façonné par l’évolution. Notre cerveau n’a pas été conçu pour une telle densité, une telle abstraction, une telle interdépendance.

Nous avons créé quelque chose qui nous dépasse. Une méga structure sociale, économique, symbolique, technologique. Elle produit des bénéfices immenses. Espérance de vie, confort, accès au savoir. Mais elle produit aussi une fragilité systémique. Un déséquilibre permanent. Une tension constante entre coopération et effondrement.

À ce niveau là, la peur n’est plus individuelle. Elle devient diffuse. Elle flotte dans l’air. Elle se traduit par des discours sécuritaires, des replis identitaires, des radicalisations. L’humain sent confusément que ce qu’il a bâti tient sur quelque chose de très fin. Que la confiance est le vrai pilier. Et que ce pilier n’est pas rationnel.

C’est là que la foi réapparaît. Non pas comme une naïveté, mais comme une nécessité structurelle. Une civilisation ne tient pas uniquement par des lois, des contrats et des forces armées. Elle tient parce qu’une majorité de ses membres fait comme si l’autre allait respecter la règle même quand il pourrait la contourner. C’est une illusion collective. Mais une illusion fonctionnelle.

La religion et la spiritualité émergent précisément à cet endroit. Elles ne sont pas des erreurs primitives destinées à disparaître avec la science. Elles sont des dispositifs de stabilisation de la foi collective. Des récits qui disent, malgré tout, que le monde a un sens suffisant pour continuer. Qu’il existe un ordre au delà du chaos immédiat. Même si cet ordre est symbolique.

Dire que c’est une illusion n’est pas une critique. Toute conscience humaine fonctionne avec des illusions opérantes. La valeur de la dignité humaine est une illusion. Les droits de l’homme sont une illusion. L’idée que demain mérite d’être vécu est une illusion. Mais ce sont des illusions nécessaires. Sans elles, l’effondrement psychique et social serait immédiat.

L’erreur consiste à croire que l’illusion doit être vraie pour être valable. Elle doit seulement être suffisamment partagée et suffisamment porteuse pour permettre le passage à un niveau supérieur d’organisation. La foi n’est pas la négation du réel. Elle est la condition pour ne pas être écrasé par lui.

Le dernier acte humain n’est donc pas le courage. Le courage reste dans le champ de l’effort. Le dernier acte est la foi. Accepter de continuer sans garantie. Accepter de tendre la main en sachant qu’elle pourrait être lâchée. Accepter de croire qu’une humanité de millions peut encore se réguler sans se dévorer entièrement.

C’est une apothéose discrète. Pas héroïque. Pas spectaculaire. Une décision intérieure répétée chaque jour. Se lever. Sortir. Parler. Aimer. Construire. Comme si cela avait un sens. Comme si cela valait la peine. Comme si l’autre n’était pas seulement un danger.

Ce n’est pas une certitude. C’est un pari. Mais c’est le seul qui permette à quelque chose de plus grand que nous d’exister.

 
Read more... Discuss...

from FEDITECH

WiFi 8 : débits, performances, innovations, tout savoir sur le successeur  du Wi-Fi 7

Le monde de la technologie ne dort jamais et le CES 2026 vient de nous le rappeler de manière spectaculaire. Alors que le Wi-Fi 7 commence à peine à se démocratiser dans nos foyers (et soyons honnêtes, la majorité d'entre nous n'a pas encore sauté le pas) une nouvelle norme vient déjà frapper à la porte. Contre toute attente, les premiers routeurs et puces Wi-Fi 8 ont fait une apparition surprise lors du salon de Las Vegas, promettant une disponibilité potentielle dès cette année. Si vous étiez sur le point d'investir une somme conséquente dans un équipement Wi-Fi 7 dernier cri, il est peut-être urgent d'attendre.

Contrairement aux sauts générationnels précédents, qui mettaient presque exclusivement l'accent sur des débits théoriques vertigineux, le Wi-Fi 8 change de paradigme. La promesse n'est plus seulement d'aller plus vite, mais d'être infaillible. Il conserve les vitesses élevées et la bande passante massive introduites par son prédécesseur, mais il y ajoute une couche importante d'optimisation. L'objectif est d'améliorer l'efficacité énergétique, d'augmenter le débit réel (throughput) et de perfectionner la communication point-à-point entre les appareils.

Pour l'utilisateur final, cela se traduit par une expérience beaucoup plus fluide. La technologie est conçue pour maintenir des connexions rapides et stables même lorsque vous vous déplacez avec vos appareils ou que vous vous éloignez du routeur. Finis les micro-coupures, les gels d'image pendant vos appels vidéo ou le “lag” en pleine partie de jeu en ligne. Le Wi-Fi 8 s'attaque à l'instabilité, la bête noire des réseaux modernes.

Asus et le concept fragile du futur

L'une des présentations les plus intéressantes nous vient d'Asus. L'année dernière, la marque avait dévoilé un routeur arachnide hérissé d'antennes. Cette année, changement radical avec le ROG NeoCore, un concept de routeur sans aucune antenne visible. L'objet ressemble à un dé à 20 faces (un icosaèdre pour les puristes) avec une base creuse. Selon le fabricant, ce modèle de production offrira les mêmes vitesses de données que le Wi-Fi 7, mais avec une latence réduite et une capacité à déplacer plus de données avec moins de goulots d'étranglement.

ROG NeoCore_WiFi 8 concept router

Tout n'était pourtant pas parfait sur le stand. Sean Hollister, journaliste pour The Verge, a rapporté une anecdote amusante, la maquette en plastique s'est brisée entre ses mains lorsqu'il a voulu la soulever. “Parfait”, a ironisé Nilay Patel, rédacteur en chef du média. Si le matériel final sera (espérons-le) plus solide, cette mésaventure rappelle que nous sommes encore au stade expérimental.

Les puces sont déjà prêtes

Au-delà des coques en plastique, la technologie interne est bien réelle. Broadcom a profité du CES pour annoncer ses équipements Wi-Fi 8, notamment l'APU BCM4918 et deux nouvelles radios double bande. Ces composants sont destinés à alimenter les futures passerelles des fournisseurs d'accès et les routeurs résidentiels. De son côté, MediaTek a dévoilé lundi sa famille de puces Filogic 8000. L'ambition est de propulser les appareils “premium et flagship”, des points d'accès d'entreprise aux smartphones, en passant par les ordinateurs portables et les téléviseurs connectés. Les premiers appareils équipés de ces puces devraient arriver sur le marché plus tard dans l’année.

Une course contre la montre (et les standards)

C'est ici que la situation se complique. Ces annonces surviennent quelques mois seulement après que TP-Link a démontré le premier prototype de connexion Wi-Fi 8 en octobre. Les marques foncent tête baissée, mais il y a un hic. La spécification officielle IEEE 802.11bn n'est pas finalisée. Le calendrier actuel de l'IEEE prévoit que la norme ne sera officiellement ratifiée que vers le milieu ou la fin de l'année 2028. Pourtant, Asus et d'autres constructeurs prévoient de lancer leurs produits dès cette année. Cela signifie que les premiers acheteurs (les “early adopters”) acquerront du matériel basé sur une version brouillon de la norme. Il faudra probablement passer par des mises à jour logicielles (firmware) ultérieures pour se conformer aux spécifications finales. Le Wi-Fi 8 est prometteur, axé sur la fiabilité et arrive très vite. Mais si vous craquez en 2026, sachez que vous achetez un pari sur l'avenir autant qu'un routeur.

 
Lire la suite... Discuss...

from thinklever

Things I love about posting on social media

One of the best parts about posting on social media is the constant feedback you get. Whether it's notifications for likes, comments, or replies, or checking the analytics to see how many people have viewed your content, there's always something to track your impact.

Watching your account metrics rise, such as impressions, engagement, and followers, is genuinely satisfying. There's a real thrill in seeing those numbers climb steadily, or even spike dramatically.

If I only wrote privately, I'd miss out on this intense dopamine rush. Posting publicly feels a bit like gambling: every time you refresh your feed, there's that exciting uncertainty about new likes, comments, or views waiting for you.

Another big advantage is that knowing others will read my work makes me write more seriously and thoughtfully. I have plenty of good ideas, but when they're just sitting in a private document on my computer, I often lack the motivation to finish them. On social media, the public audience holds me accountable, and over time, I end up producing far more than I would in isolation.

For example, you'll see short, straightforward posts like these: (1) “Everyone talks about grinding. Nobody talks about the friction they removed. I didn't become more disciplined. I just made doing the work 10x easier than doing nothing. That's the real shift.” (2) “The difference between successful people and others isn't ability.”

These posts are brief and imperfect, yet they are acceptable on social media platforms. Seeing them makes it much easier to post something similar without feeling overwhelmed. As a result, regular exposure to others' work consistently boosts my creativity and overall output.

 
Read more... Discuss...

from thinklever

My frustrating experience with X

I recently started posting on X, but I've had a few highly frustrating experiences that left me quite annoyed.

The first issue began with registration. I used a VPN to sign up and requested verification codes multiple times because they never arrived. Once I finally logged in and subscribed to Premium, my account was suddenly suspended without any explanation. I submitted an appeal, but after three days there was still no response, and my subscription fee was effectively lost. I felt quite angry. It honestly seemed like my money had been wasted unfairly.

I didn't give up, however, because I wanted to try again. I created a new account and initially enjoyed seeing my impressions grow. I developed a strategy of replying to mid-sized accounts with fewer responses to increase visibility. This worked well for a couple of days, but then my impressions dropped sharply. After investigating for some time, I discovered that my account had been ghost banned without any notification.

I searched for “ghost ban” on X and found many users reporting similar issues. This is disappointing because ghost banning appears to be quite common, yet the platform provides no warnings about it. As a result, the emphasis on “free speech” feels misleading.

I watched several YouTube videos on the topic, and they suggest that relying too frequently or excessively can trigger restrictions. This frustrates me a lot. I'm a paying Premium user, so why am I limited in this way? If such rules exist, the platform should either refund the subscription or make the restrictions clear upfront.

It seems like X encourages paid subscriptions to attract users, but then imposes hidden limits when people try to grow their accounts legitimately. That feels deceptive.

 
Read more... Discuss...

from Roscoe's Story

In Summary: * Have spent several hours this afternoon / evening setting up a new Facebook & Messenger account. This was much more complicated than I remember it being before when I had such. At any rate, now it'll be easier getting pictures and news from the family back in Indiana.

Prayers, etc.: My daily prayers

Health Metrics: * bw= 220.90 lbs. * bp= 140/85 (67)

Exercise: * kegel pelvic floor exercise, half squats, calf raises, wall push-ups

Diet: * 06:00 – 1 peanut butter sandwich * 08:00 – fried bananas * 10:30 – 1 fresh banana * 12:00 – pizza

Activities, Chores, etc.: * 04:30 – listen to local news talk radio * 05:30 – bank accounts activity monitored * 06:00 – read, pray, follow news reports from various sources, surf the socials, nap * 12:00 – watch old games shows and eat lunch at home with Sylvia * 13:00 – listen to news reports from various sources * 19:00 – have spent hours setting up a new Facebook / Messenger account * 19:30 – listen to The Joe Pags Show * 20:00 – listening to The Lars Larson Show

Chess: * 13:25 – moved in all pending CC games

 
Read more...

from SmarterArticles

The internet runs on metadata, even if most of us never think about it. Every photo uploaded to Instagram, every video posted to YouTube, every song streamed on Spotify relies on a vast, invisible infrastructure of tags, labels, categories, and descriptions that make digital content discoverable, searchable, and usable. When metadata works, it's magic. When it doesn't, content disappears into the void, creators don't get paid, and users can't find what they're looking for.

The problem is that most people are terrible at creating metadata. Upload a photo, and you might add a caption. Maybe a few hashtags. Perhaps you'll remember to tag your friends. But detailed, structured information about location, time, subject matter, copyright status, and technical specifications? Forget it. The result is a metadata crisis affecting billions of pieces of user-generated content across the web.

Platforms are fighting back with an arsenal of automated enrichment techniques, ranging from server-side machine learning inference to gentle user nudges and third-party enrichment services. But each approach involves difficult tradeoffs between accuracy and privacy, between automation and user control, between comprehensive metadata and practical implementation.

The Scale of the Problem

The scale of missing metadata is staggering. According to research from Lumina Datamatics, companies implementing automated metadata enrichment have seen 30 to 40 per cent reductions in manual tagging time, suggesting that manual metadata creation was consuming enormous resources whilst still leaving gaps. A PwC report on automation confirms these figures, noting that organisations can save similar percentages by automating repetitive tasks like tagging and metadata input.

The costs are not just operational. Musicians lose royalties when streaming platforms can't properly attribute songs. Photographers lose licensing opportunities when their images lack searchable tags. Getty Images' 2024 research covering over 30,000 adults across 25 countries found that almost 90 per cent of people want to know whether images are AI-created, yet current metadata systems often fail to capture this crucial provenance information.

TikTok's December 2024 algorithm update demonstrated how critical metadata has become. The platform completely restructured how its algorithm evaluates content quality, introducing systems that examine raw video file metadata, caption keywords, and even comment sentiment to determine content categorisation. According to analysis by Napolify, this change fundamentally altered which videos get promoted, making metadata quality a make-or-break factor for creator success.

The metadata crisis intensified with the explosion of AI-generated content. OpenAI, Meta, Google, and TikTok all announced in 2024 that they would add metadata labels to AI-generated content. The Coalition for Content Provenance and Authenticity (C2PA), which grew to include major technology companies and media organisations, developed comprehensive technical standards for content provenance metadata. Yet adoption remains minimal, and the vast majority of internet content still lacks these crucial markers.

The Automation Promise and Its Limits

The most powerful approach to metadata enrichment is also the most invisible. Server-side inference uses machine learning models to automatically analyse uploaded content and generate metadata without any user involvement. When you upload a photo to Google Photos and it automatically recognises faces, objects, and locations, that's server-side inference. When YouTube automatically generates captions and video chapters, that's server-side inference.

The technology has advanced dramatically. The Recognize Anything Model (RAM), accepted at the 2024 Computer Vision and Pattern Recognition (CVPR) conference, demonstrates zero-shot ability to recognise common categories with high accuracy. According to research published in the CVPR proceedings, RAM upgrades the number of fixed tags from 3,400 to 6,400 tags (reduced to 4,500 different semantic tags after removing synonyms), covering substantially more valuable categories than previous systems.

Multimodal AI has pushed the boundaries further. As Coactive AI explains in their blog on AI-powered metadata enrichment, multimodal AI can process multiple types of input simultaneously, just as humans do. When people watch videos, they naturally integrate visual scenes, spoken words, and semantic context. Multimodal AI changes that gap, interpreting not just visual elements but their relationships with dialogue, text, and tone.

The results can be dramatic. Fandom reported a 74 per cent decrease in weekly manual labelling hours after switching to Coactive's AI-powered metadata system. Hive, another automated content moderation platform, offers over 50 metadata classes with claimed human-level accuracy for processing various media types in real time.

Yet server-side inference faces fundamental challenges. According to general industry benchmarks cited by AI Auto Tagging platforms, object and scene recognition accuracy sits at approximately 90 per cent on clear images, but this drops substantially for abstract tasks, ambiguous content, or specialised domains. Research on the Recognize Anything Model acknowledged that whilst RAM performs strongly on everyday objects and scenes, it struggles with counting objects or fine-grained classification tasks like distinguishing between car models.

Privacy concerns loom larger. Server-side inference requires platforms to analyse users' content, raising questions about surveillance, data retention, and potential misuse. Research published in Scientific Reports in 2025 on privacy-preserving federated learning highlighted these tensions. Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants' data.

Gentle Persuasion Versus Dark Patterns

If automation has limits, perhaps humans can fill the gaps. The challenge is getting users to actually provide metadata when they're focused on sharing content quickly. Enter the user nudge: interface design patterns that encourage metadata completion without making it mandatory.

LinkedIn pioneered this approach with its profile completion progress bar. According to analysis published on Gamification Plus UK and Loyalty News, LinkedIn's simple gamification tool increased profile setup completion rates by 55 per cent. Users see a progress bar that fills when they add information, accompanied by motivational text like “Users with complete profiles are 40 times more likely to receive opportunities through LinkedIn.” This basic gamification technique transformed LinkedIn into the world's largest business network by making metadata creation feel rewarding rather than tedious.

The principles extend beyond professional networks. Research in the Journal of Advertising on gamification identifies several effective incentive types. Points and badges reward users for achievement and progress. Daily perks and streaks create ongoing engagement through repetition. Progress bars provide visual feedback showing how close users are to completing tasks. Profile completion mechanics encourage users to provide more information by making incompleteness visibly apparent.

TikTok, Instagram, and YouTube all employ variations of these techniques. TikTok prompts creators to add sounds, hashtags, and descriptions through suggestion tools integrated into the upload flow. Instagram offers quick-select options for adding location, tagging people, and categorising posts. YouTube provides automated suggestions for tags, categories, and chapters based on content analysis, which creators can accept or modify.

But nudges walk a fine line. Research published in PLOS One in 2021 conducted a systematic literature review and meta-analysis of privacy nudges for disclosure of personal information. The study identified four categories of nudge interventions: presentation, information, defaults, and incentives. Whilst nudges showed significant small-to-medium effects on disclosure behaviour, the researchers raised concerns about manipulation and user autonomy.

The darker side of nudging is the “dark pattern”, design practices that promote certain behaviours through deceptive or manipulative interface choices. According to research on data-driven nudging published by the Bavarian Institute for Digital Transformation (bidt), hypernudging uses predictive models to systematically influence citizens by identifying their biases and behavioural inclinations. The line between helpful nudges and manipulative dark patterns depends on transparency and user control.

Research on personalised security nudges, published in ScienceDirect, found that behaviour-based approaches outperform generic methods in predicting nudge effectiveness. By analysing how users actually interact with systems, platforms can provide targeted prompts that feel helpful rather than intrusive. But this requires collecting and analysing user behaviour data, circling back to privacy concerns.

Accuracy Versus Privacy

When internal systems can't deliver sufficient metadata quality, platforms increasingly turn to third-party enrichment services. These specialised vendors maintain massive databases of structured information that can be matched against user-generated content to fill in missing details.

The third-party data enrichment market includes major players like ZoomInfo, which combines AI and human verification to achieve high accuracy, according to analysis by Census. Music distributors like TuneCore, DistroKid, and CD Baby not only distribute music to streaming platforms but also store metadata and ensure it's correctly formatted for each service. The Digital Data Exchange Protocol (DDEX) provides a standardised method for collecting and storing music metadata. Companies implementing rich metadata protocols saw a 10 per cent increase in usage of associated sound recordings, demonstrating the commercial value of proper enrichment.

For images and video, services like Imagga offer automated recognition features beyond basic tagging, including face recognition, automated moderation for inappropriate content, and visual search. DeepVA provides AI-driven metadata enrichment specifically for media asset management in broadcasting.

Yet third-party enrichment creates its own challenges. According to analysis published by GetDatabees on GDPR-compliant data enrichment, the phrase “garbage in, garbage out” perfectly captures the problem. If initial data is inaccurate, enrichment processes only magnify these inaccuracies. Different providers vary substantially in quality, with some users reporting issues with data accuracy and duplicate records.

Privacy and compliance concerns are even more pressing. Research by Specialists Marketing Services on customer data enrichment identifies compliance risks as a primary challenge. Gathering additional data may inadvertently breach regulations like the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA) if not managed properly, particularly when third-party data lacks documented consent.

The accuracy versus privacy tradeoff becomes acute with third-party services. More comprehensive enrichment often requires sharing user data with external vendors, creating additional points of potential data leakage or misuse. The European Union's Digital Markets Act (DMA), which came into force in March 2024, designated six companies as gatekeepers and imposed strict obligations regarding data sharing and interoperability.

From Voluntary to Mandatory

Understanding enrichment techniques only matters if platforms can actually get users to participate. This requires enforcement or incentive models that balance user experience against metadata quality goals.

The spectrum runs from purely voluntary to strictly mandatory. At the voluntary end, platforms provide easy-to-ignore prompts and suggestions. YouTube's automated tag suggestions fall into this category. The advantage is zero friction and maximum user autonomy. The disadvantage is that many users ignore the prompts entirely, leaving metadata incomplete.

Gamification occupies the middle ground. Profile completion bars, achievement badges, and streak rewards make metadata creation feel optional whilst providing strong psychological incentives for completion. According to Microsoft's research on improving engagement of analytics users through gamification, effective gamification leverages people's natural desires for achievement, competition, status, and recognition.

The mechanics require careful design. Scorecards and leaderboards can motivate users but are difficult to implement because scoring logic must be consistent, comparable, and meaningful enough that users assign value to their scores, according to analysis by Score.org on using gamification to enhance user engagement. Microsoft's research noted that personalising offers and incentives whilst remaining fair to all user levels creates the most effective frameworks.

Semi-mandatory approaches make certain metadata fields required whilst leaving others optional. Instagram requires at least an image when posting but makes captions, location tags, and people tags optional. Music streaming platforms typically require basic metadata like title and artist but make genre, mood, and detailed credits optional.

The fully mandatory approach requires all metadata before allowing publication. Academic repositories often take this stance, refusing submissions that lack proper citation metadata, keywords, and abstracts. Enterprise digital asset management (DAM) systems frequently mandate metadata completion to enforce governance standards. According to Pimberly's guide to DAM best practices, organisations should establish who will be responsible for system maintenance, enforce asset usage policies, and conduct regular inspections to ensure data accuracy and compliance.

Input validation provides the technical enforcement layer. According to the Open Web Application Security Project (OWASP) Input Validation Cheat Sheet, input validation should be applied at both syntactic and semantic levels. Syntactic validation enforces correct syntax of structured fields like dates or currency symbols. Semantic validation enforces correctness of values in the specific business context.

Precision, Recall, and Real-World Metrics

Metadata enrichment means nothing if the results aren't accurate. Platforms need robust systems for measuring and maintaining quality over time, which requires both technical metrics and operational processes.

Machine learning practitioners rely on standard classification metrics. According to Google's Machine Learning Crash Course documentation on classification metrics, precision measures the accuracy of positive predictions, whilst recall measures the model's ability to find all positive instances. The F1 score provides the harmonic mean of precision and recall, balancing both considerations.

These metrics matter enormously for metadata quality. A tagging system with high precision but low recall might be very accurate for the tags it applies but miss many relevant tags. Conversely, high recall but low precision means the system applies many tags but includes lots of irrelevant ones. According to DataCamp's guide to the F1 score, this metric is particularly valuable for imbalanced datasets, which are common in metadata tagging where certain categories appear much more frequently than others.

The choice of metric depends on the costs of errors. As explained in Encord's guide to F1 score in machine learning, in medical diagnosis, false positives lead to unnecessary treatment and expenses, making precision more valuable. In fraud detection, false negatives result in missed fraudulent transactions, making recall more valuable. For metadata tagging, content moderation might prioritise recall to catch all problematic content, accepting some false positives. Recommendation systems might prioritise precision to avoid annoying users with irrelevant suggestions.

Beyond individual model performance, platforms need comprehensive data quality monitoring. According to Metaplane's State of Data Quality Monitoring in 2024 report, modern platforms offer real-time monitoring and alerting that identifies data quality issues quickly. Apache Griffin defines data quality metrics including accuracy, completeness, timeliness, and profiling on both batch and streaming sources.

Research on the impact of modern AI in metadata management published in Human-Centric Intelligent Systems explains that active metadata makes automation possible through continuous analysis, machine learning algorithms that detect anomalies and patterns, integration with workflow systems to trigger actions, and real-time updates as data moves through pipelines. According to McKinsey research cited in the same publication, organisations typically see 40 to 60 per cent reductions in time spent searching for and understanding data with modern metadata management platforms.

Yet measuring quality remains challenging because ground truth is often ambiguous. What's the correct genre for a song that blends multiple styles? What tags should apply to an image with complex subject matter? Human annotators frequently disagree on edge cases, making it difficult to define accuracy objectively. Research on metadata in trustworthy AI published by Dublin Core Metadata Initiative notes that the lack of metadata for datasets used in AI model development has been a concern amongst computing researchers.

The Accuracy-Privacy Tradeoff in Practice

Every enrichment technique involves tradeoffs between comprehensive metadata and user privacy. Understanding how major platforms navigate these tradeoffs reveals the practical challenges and emerging solutions.

Consider facial recognition, one of the most powerful and controversial enrichment techniques. Google Photos automatically identifies faces and groups photos by person, creating immense value for users searching their libraries. But this requires analysing every face in every photo, creating detailed biometric databases that could be misused. Meta faced significant backlash and eventually shut down its facial recognition system in 2021 before later reinstating it with more privacy controls. Apple's approach keeps facial recognition processing on-device rather than in the cloud, preventing the company from accessing facial data but limiting the sophistication of the models that can run on consumer hardware.

Location metadata presents similar tensions. Automatic geotagging makes photos searchable by place and enables features like automatic travel albums. But it also creates detailed movement histories that reveal where users live, work, and spend time. According to research on privacy nudges published in PLOS One, default settings significantly affect disclosure behaviour.

The Coalition for Content Provenance and Authenticity (C2PA) provides a case study in these tradeoffs. According to documentation on the Content Authenticity Initiative website and analysis by the World Privacy Forum, C2PA metadata can include the publisher of information, the device used to record it, the location and time of recording, and editing steps that altered the information. This comprehensive provenance data is secured with hash codes and certified digital signatures to prevent unnoticed changes.

The privacy implications are substantial. For professional photographers and news organisations, this supports authentication and copyright protection. For ordinary users, it could reveal more than intended about devices, locations, and editing practices. The World Privacy Forum's technical review of C2PA notes that whilst the standard includes privacy considerations, implementing it at scale whilst protecting user privacy remains challenging.

Federated learning offers one approach to balancing accuracy and privacy. According to research published by the UK's Responsible Technology Adoption Unit and the US National Institute of Standards and Technology (NIST), federated learning permits decentralised model training without sharing raw data, ensuring adherence to privacy laws like GDPR and the Health Insurance Portability and Accountability Act (HIPAA).

But federated learning has limitations. Research published in Scientific Reports in 2025 notes that whilst federated learning protects raw data, metadata about local datasets such as size, class distribution, and feature types may still be shared, potentially leaking information. The study also documents that servers may still obtain participants' privacy through inference attacks even when raw data never leaves devices.

Differential privacy provides mathematical guarantees about privacy protection whilst allowing statistical analysis. The practical challenge is balancing privacy protection against model accuracy. According to research in the Journal of Cloud Computing on privacy-preserving federated learning, maintaining model performance whilst ensuring strong privacy guarantees remains an active research challenge.

The Foundation of Interoperability

Whilst platforms experiment with enrichment techniques and privacy protections, technical standards provide the invisible infrastructure making interoperability possible. These standards determine what metadata can be recorded, how it's formatted, and whether it survives transfer between systems.

For images, three standards dominate. EXIF (Exchangeable Image File Format), created by the Japan Electronic Industries Development Association in 1995, captures technical details like camera model, exposure settings, and GPS coordinates. IPTC (International Press Telecommunications Council) standards, created in the early 1990s and updated continuously, contain title, description, keywords, photographer information, and copyright restrictions. According to the IPTC Photo Metadata User Guide, the 2024.1 version updated definitions for the Keywords property. XMP (Extensible Metadata Platform), developed by Adobe and standardised as ISO 16684-1 in 2012, provides the most flexible and extensible format.

These standards work together. A single image file often contains all three formats. EXIF records what the camera did, IPTC describes what the photo is about and who owns it, and XMP can contain all that information plus the entire edit history.

For music, metadata standards face the challenge of tracking not just the recording but all the people and organisations involved in creating it. According to guides published by LANDR, Music Digi, and SonoSuite, music metadata includes song title, album, artist, genre, producer, label, duration, release date, and detailed credits for writers, performers, and rights holders. Different streaming platforms like Spotify, Apple Music, Amazon Music, and YouTube Music have varying requirements for metadata formats.

The Digital Data Exchange Protocol (DDEX) provides standardisation for how metadata is used across the music industry. According to information on metadata optimisation published by Disc Makers and Hypebot, companies implementing rich DDEX-compliant metadata protocols saw 10 per cent increases in usage of associated sound recordings.

For AI-generated content, the C2PA standard emerged as the leading candidate for provenance metadata. According to the C2PA website and announcements tracked by Axios and Euronews, major technology companies including Adobe, BBC, Google, Intel, Microsoft, OpenAI, Sony, and Truepic participate in the coalition. Google joined the C2PA steering committee in February 2024 and collaborated on version 2.1 of the technical standard, which includes stricter requirements for validating content provenance.

Hardware manufacturers are beginning to integrate these standards. Camera manufacturers like Leica and Nikon now integrate Content Credentials into their devices, embedding provenance metadata at the point of capture. Google announced integration of Content Credentials into Search, Google Images, Lens, Circle to Search, and advertising systems.

Yet critics note significant limitations. According to analysis by NowMedia founder Matt Medved cited in Linux Foundation documentation, the standard relies on embedding provenance data within metadata that can easily be stripped or swapped by bad actors. The C2PA acknowledges this limitation, stressing that its standard cannot determine what is or is not true but can reliably indicate whether historical metadata is associated with an asset.

When Metadata Becomes Mandatory

Whilst consumer platforms balance convenience against completeness, enterprise digital asset management systems make metadata mandatory because business operations depend on it. These implementations reveal what's possible when organisations prioritise metadata quality and can enforce strict requirements.

According to IBM's overview of digital asset management and Brandfolder's guide to DAM metadata, clear and well-structured asset metadata is crucial to maintaining functional DAM systems because metadata classifies content and powers asset search and discovery. Enterprise implementations documented in guides by Pimberly and ContentServ emphasise governance. Organisations establish DAM governance principles and procedures, designate responsible parties for system maintenance and upgrades, control user access, and enforce asset usage policies.

Modern enterprise platforms leverage AI for enrichment whilst maintaining governance controls. According to vendor documentation for platforms like Centric DAM referenced in ContentServ's blog, modern solutions automatically tag, categorise, and translate metadata whilst governing approved assets with AI-powered search and access control. Collibra's data intelligence platform, documented in OvalEdge's guide to enterprise data governance tools, brings together capabilities for cataloguing, lineage tracking, privacy enforcement, and policy compliance.

What Actually Works

After examining automated enrichment techniques, user nudges, third-party services, enforcement models, and quality measurement systems, several patterns emerge about what actually works in practice.

Hybrid approaches outperform pure automation or pure manual tagging. According to analysis of content moderation platforms by Enrich Labs and Medium's coverage of content moderation at scale, hybrid methods allow platforms to benefit from AI's efficiency whilst retaining the contextual understanding of human moderators. The key is using automation for high-confidence cases whilst routing ambiguous content to human review.

Context-aware nudges beat generic prompts. Research on personalised security nudges published in ScienceDirect found that behaviour-based approaches outperform generic methods in predicting nudge effectiveness. LinkedIn's profile completion bar works because it shows specifically what's missing and why it matters, not just generic exhortations to add more information.

Transparency builds trust and improves compliance. According to research in Journalism Studies on AI ethics cited in metadata enrichment contexts, transparency involves disclosure of how algorithms operate, data sources, criteria used for information gathering, and labelling of AI-generated content. Studies show that whilst AI offers efficiency benefits, maintaining standards of accuracy, transparency, and human oversight remains critical for preserving trust.

Progressive disclosure reduces friction whilst maintaining quality. Rather than demanding all metadata upfront, successful platforms request minimum viable information initially and progressively prompt for additional details over time. YouTube's approach of requiring just a title and video file but offering optional fields for description, tags, category, and advanced settings demonstrates this principle.

Quality metrics must align with business goals. The choice between optimising for precision versus recall, favouring automation versus human review, and prioritising speed versus accuracy depends on specific use cases. Understanding these tradeoffs allows platforms to optimise for what actually matters rather than maximising abstract metrics.

Privacy-preserving techniques enable functionality without surveillance. On-device processing, federated learning, differential privacy, and other techniques documented in research published by NIST, Nature Scientific Reports, and Springer's Artificial Intelligence Review demonstrate that powerful enrichment is possible whilst respecting privacy. Apple's approach of processing facial recognition on-device rather than in cloud servers shows that technical choices can dramatically affect privacy whilst still delivering user value.

Agentic AI and Adaptive Systems

The next frontier in metadata enrichment involves agentic AI systems that don't just tag content but understand context, learn from corrections, and adapt to changing requirements. Early implementations suggest both enormous potential and new challenges.

Red Hat's Metadata Assistant, documented in a company blog post, provides a concrete implementation. Deployed on Red Hat OpenShift Service on AWS, the system uses the Mistral 7B Instruct large language model provided by Red Hat's internal LLM-as-a-Service tools. The assistant automatically generates metadata for web content, making it easier to find and use whilst reducing manual tagging burden.

NASA's implementation documented on Resources.data.gov demonstrates enterprise-scale deployment. NASA's data scientists and research content managers built an automated tagging system using machine learning and natural language processing. Over the course of a year, they used approximately 3.5 million manually tagged documents to train models that, when provided text, respond with relevant keywords from a set of about 7,000 terms spanning NASA's domains.

Yet challenges remain. According to guides on auto-tagging and lineage tracking with OpenMetadata published by the US Data Science Institute and DZone, large language models sometimes return confident but incorrect tags or lineage relationships through hallucinations. It's recommended to build in confidence thresholds or review steps to catch these errors.

The metadata crisis in user-generated content won't be solved by any single technique. Successful platforms will increasingly rely on sophisticated combinations of server-side inference for high-confidence enrichment, thoughtful nudges for user participation, selective third-party enrichment for specialised domains, and robust quality monitoring to catch and correct errors.

The accuracy-privacy tradeoff will remain central. As enrichment techniques become more powerful, they inevitably require more access to user data. The platforms that thrive will be those that find ways to deliver value whilst respecting privacy, whether through technical measures like on-device processing and federated learning or policy measures like transparency and user control.

Standards will matter more as the ecosystem matures. The C2PA's work on content provenance, IPTC's evolution of image metadata, DDEX's music industry standardisation, and similar efforts create the interoperability necessary for metadata to travel with content across platforms and over time.

The rise of AI-generated content adds urgency to these challenges. As Getty Images' research showed, almost 90 per cent of people want to know whether content is AI-created. Meeting this demand requires metadata systems sophisticated enough to capture provenance, robust enough to resist tampering, and usable enough that people actually check them.

Yet progress is evident. Platforms that invested in metadata infrastructure see measurable returns through improved discoverability, better recommendation systems, enhanced content moderation, and increased user engagement. The companies that figured out how to enrich metadata whilst respecting privacy and user experience have competitive advantages that compound over time.

The invisible infrastructure of metadata enrichment won't stay invisible forever. As users become more aware of AI-generated content, data privacy, and content authenticity, they'll increasingly demand transparency about how platforms tag, categorise, and understand their content. The platforms ready with robust, privacy-preserving, accurate metadata systems will be the ones users trust.

References & Sources


Tim Green

Tim Green UK-based Systems Theorist & Independent Technology Writer

Tim explores the intersections of artificial intelligence, decentralised cognition, and posthuman ethics. His work, published at smarterarticles.co.uk, challenges dominant narratives of technological progress while proposing interdisciplinary frameworks for collective intelligence and digital stewardship.

His writing has been featured on Ground News and shared by independent researchers across both academic and technological communities.

ORCID: 0009-0002-0156-9795 Email: tim@smarterarticles.co.uk

 
Read more... Discuss...

from The Poet Sky

It's really cool that I can knit. I take a bundle of stuff and turn it into love to keep people warm of body and heart.

This might turn into a poem, but for now, have a random thought.

Have a lovely day, friend!

#RandomSkyThoughts #Knitting

 
Read more... Discuss...

from Plain Sight

Part 2: Three Strategic Pathways and the Closing Window

By Publius (of the 21st Century)

This is Part 2 of a two-part analysis. Part 1 examined the collapse of NATO, Europe's power asymmetries, and why France-UK-Germany alignment cannot form quickly enough to address the immediate crisis. Part 2 examines concrete strategic options that remain available—if Europe has the political courage to pursue them.

Beyond Performative Protest: Three Concrete Strategic Options

Part 1 painted a bleak picture: Europe cannot respond militarily, cannot unify politically, and cannot align its major powers quickly enough. But this assessment assumes Europe remains trapped in its current strategic framework—attempting to preserve the transatlantic order while lacking the capability to do so. What if Europe abandons that framework entirely? What if, instead of seeking to restore American protection or forge autonomous military capability on American timelines, Europe pursues asymmetric strategies that exploit American vulnerabilities?

Three options exist that are politically achievable, economically powerful, and strategically disruptive. None requires immediate military buildup. All require political courage to break with Atlanticist orthodoxy. And all must be executed within a narrow window before geopolitical conditions foreclose these possibilities.

Option 1: Playing the “China Card” — The Economic Pivot Europe possesses a $19 trillion economy—comparable to the United States and far larger than Russia's or any individual Asian power. This economic mass is leverage. The question is whether Europe has the political will to use it.

The Mechanism

The 2025 NSS explicitly seeks to force Europe into “sole-source contracts” with U.S. firms, excluding Chinese competitors from European markets in critical sectors: telecommunications (5G/6G), semiconductors, AI systems, electric vehicles, battery production, and green energy infrastructure. The NSS frames this as “burden-shifting”—forcing allies to pay premium prices for American technology while foreclosing alternatives.

Europe plays the “China card” by refusing this exclusivity. Instead of treating Chinese technology as a security threat (the American framing), Europe treats it as market competition. By keeping European markets open to Chinese investment and technology, Europe forces the United States to compete for European market access rather than demanding it as tribute.

Strategic Leverage

If Europe aligns its regulatory standards with Chinese systems—or creates a third standard compatible with both but controlled by neither—it breaks the U.S. technological containment strategy. The United States cannot afford to lose the entire European market to Beijing. This makes Washington's threat of abandonment less credible because American firms depend on European consumers, industrial partners, and research collaboration.

The risk, of course, is Chinese technological dependency replacing American dependency. But dependency on two competing powers is qualitatively different from dependency on one hegemon. Europe gains bargaining leverage by making both the United States and China compete for European alignment. This is classic non-aligned movement strategy applied to the 21st-century technological domain.

Political Feasibility

This is the most politically achievable option because it does not require constitutional change, defense budget increases, or public mobilization. It requires only that European regulatory bodies—which already possess significant autonomy—refuse American demands for Chinese exclusion.

Germany's automotive industry already operates Chinese production lines and battery technology. France has attracted Chinese investment in green energy. Italy participates in Belt and Road Initiative projects. The infrastructure for economic non-alignment already exists. What's missing is political coordination to resist American pressure.

The Greenland crisis provides the justification. If the United States annexes the territory of a NATO ally, European leaders can credibly argue that blind Atlanticism is no longer tenable. Economic diversification becomes not betrayal but prudence.

Option 2: Open-Source AI vs. Closed-Source Technological Serfdom

The 2025 NSS lists maintaining U.S. dominance in artificial intelligence and enforcing “U.S. standards” as core strategic interests. This is not about innovation—it is about control. Proprietary AI systems function as technological serfdom: Europe pays for access to intelligence it cannot inspect, modify, or control.

The Dependency Trap

American AI systems (dominated by firms like OpenAI, Google, Microsoft, Anthropic) operate as black boxes. European industries—automotive, pharmaceutical, defense, logistics—integrate these systems into critical infrastructure without understanding their decision-making processes, data handling, or vulnerability to remote manipulation.

This creates multiple dependencies:

— Operational dependency: European industries cannot function without American AI services — Data dependency: Sensitive European industrial and personal data flows to American servers subject to U.S. legal jurisdiction — Strategic dependency: The United States can “switch off” European AI access through export controls, sanctions, or simply service denial

The NSS explicitly intends this outcome. Technological dependency ensures European subordination even without military occupation.

The Open-Source Alternative

China has pursued a different model: open-source AI development that creates accessible ecosystems specifically to dilute U.S. hegemony. Models like DeepSeek, open-weight large language models, and transparent training datasets allow any actor to build sovereign AI infrastructure without dependency on proprietary American systems.

Europe should adopt and extend this approach—not by copying Chinese systems, but by building European open-source AI infrastructure. This means: — Sovereign compute clusters: European data centers running European-controlled AI models — Open-weight development: Transparent models that European researchers and firms can inspect, modify, and deploy without licensing restrictions Interoperable standards: Systems designed to work with both Chinese and American platforms while controlled by neither — France's Mistral AI represents a start, but is still insufficient. What i's required is coordinated European investment in open-source AI at scale—matching or exceeding American proprietary development budgets.

Strategic Impact

This neutralizes American ability to “switch off” European economic or defense systems. It also makes European AI infrastructure attractive to Global South nations seeking alternatives to both American and Chinese dominance. Europe becomes a technological pole rather than a vassal.

Timeline

AI infrastructure can be built faster than conventional military capability. With aggressive investment, Europe could establish sovereign AI systems within 3-5 years—precisely the window before Russia reconstitutes offensive capability (see Option 4). This is achievable if treated as strategic priority equivalent to Cold War space programs.

Option 3: The Ukrainian Asymmetric Advantage — AI-Based Drone Warfare

While Ukraine has suffered enormously, its defense capabilities have transformed in ways that fundamentally alter European strategic calculations. As C.J. Chivers documents in his December 31, 2025 New York Times article “The Dawn of the A.I. Drone,” Ukrainian forces have pioneered AI-based autonomous drone warfare that represents a potential game-changer for European defense.

The Capability Gap That Ukraine Fills

Europe's conventional military weakness—depleted ammunition stocks, slow procurement, limited industrial base—makes symmetrical competition with either Russia or the United States impossible. But AI-driven drone warfare is asymmetric. It does not require the massive industrial infrastructure of traditional armaments. It requires: — Rapid prototyping and iteration (Ukraine's wartime innovation model) — Software development and AI integration (European tech capacity) — Commercial off-the-shelf components (globally available) — Distributed production (resilient to targeting)

Ukraine has developed precisely these capabilities under combat conditions. Ukrainian drone manufacturers produce thousands of units monthly using 3D printing, commercial electronics, and open-source flight control systems. More critically, they have integrated AI targeting, autonomous swarm coordination, and adaptive countermeasures—technologies that neutralize much of Russia's conventional advantage.

Integration into European Defense

A European security architecture that integrates Ukrainian drone warfare expertise gains several strategic advantages: Immediate capability: Unlike conventional rearmament (which takes years), drone production can scale rapidly. Ukraine's industrial model can be replicated across Europe within months. Cost asymmetry: AI drones cost thousands of dollars but can destroy targets worth millions—tanks, artillery, command posts, logistics nodes. This inverts the cost-exchange ratio that has historically favored large militaries. Deterrence credibility: Russia's military reconstitution assumes it will face the same European weaknesses it exploited in 2022. A Europe armed with tens of thousands of AI-coordinated drones presents an entirely different threat calculus. Technological sovereignty: Drone warfare technology can be developed independently of American systems. Ukraine has demonstrated this by necessity—European adoption would extend that independence.

The Political-Military Framework

Integrating Ukraine into a European defense structure accomplishes multiple objectives:

(1) Secures Ukrainian capability: Ensures Ukrainian military innovation continues even if U.S. support ends (2) Provides European asymmetric deterrence: Makes Russian conventional superiority less decisive (3) Bypasses Franco-German-British alignment paralysis: Poland, the Baltics, and Nordic states can integrate with Ukraine directly, creating an eastern defense axis that does not depend on Western European consensus (4) Accelerates timeline: Drone warfare capacity can be operational within 1-2 years, not the 5-10 years conventional rearmament requires

The Open Question

This option requires European powers—especially Germany and France—to accept Ukraine as a full security partner, not merely an aid recipient. It requires treaty-level commitments to joint defense production, technology sharing, and mutual defense guarantees. It requires treating Ukrainian military innovation as a strategic asset rather than a wartime expedient.

The question is whether European political culture can overcome its instinct to view Ukraine as a problem requiring management rather than a capability offering leverage. If Europe fails to integrate Ukrainian drone warfare expertise, Russia will eventually neutralize it—and Europe will have squandered its most significant asymmetric advantage.

Option 4: The Russia Recovery Window — A Closing Opportunity

The timeline for European strategic action is not indefinite. A specific window exists, defined by Russian military exhaustion and reconstitution timelines. If Europe does not act within this window, the opportunity forecloses permanently.

Current Phase: Russian Exhaustion

Russia's military is currently degraded by three years of high-intensity warfare in Ukraine. Equipment losses, personnel casualties, ammunition depletion, and economic strain have reduced Russian offensive capability to levels not seen since the 1990s. The 2025 NSS seeks an “expeditious cessation of hostilities in Ukraine” precisely to “reestablish strategic stability”—meaning to allow Russia to recover while redirecting American focus to China and the Western Hemisphere.

The Reconstitution Timeline

Military analysts estimate 5-10 years for a major power to reconstitute a shattered land army to pre-war proficiency. This requires: — Rebuilding equipment stocks (tanks, artillery, aircraft) — Training new personnel to replace casualties — Reconstituting command structures — Restoring ammunition production and logistics — Recovering economically from sanctions and war costs

Russia will emerge from this process with lessons learned from Ukraine: improved tactics, modernized systems, and clear understanding of NATO weaknesses. The reconstituted Russian military will be more dangerous than the force that invaded Ukraine in 2022.

The Strategic Trap

The American strategy attempts to freeze the conflict now to achieve two objectives:

(a) Free Russia to serve as a counterbalance to China (b) Free American resources to focus on the Western Hemisphere (Greenland, Panama, Venezuela)

If Europe does not unify its defense and economic structures within the 5-year Russian recovery window, it will face a reconstituted Russian threat without American protection. This is not hypothetical—it is the explicit logic of the 2025 NSS.

The Greenland annexation accelerates this timeline by demonstrating that NATO is already dead. If Denmark cannot rely on alliance protection against the United States itself, no European state can rely on alliance protection against Russia.

What Europe Must Do Within the Window

The 5-year timeline is non-negotiable. Within this period, Europe must:

(1) Integrate Ukrainian drone warfare capacity into a European defense production system (2) Deploy open-source AI infrastructure immune to American cutoff (3) Leverage the China card to break exclusive U.S. technological dependence (4) Federalize critical defense production: Harmonize procurement, standardize equipment, integrate supply chains (5) Establish minimal command integration: Joint operational coordination for drone warfare and air defense (achievable faster than full conventional force integration) (6) Expand industrial capacity: Scale drone production, ammunition manufacturing, air defense systems (7) Extend French nuclear deterrence through binding treaties (even if limited to specific scenarios)

This is revolutionary transformation compressed into a brief window. It requires treating European security as an existential crisis—which it is.

The Closing Window

If Europe fails to act within this window, the outcome is foreordained. Russia recovers offensive capability. The United States continues withdrawing security guarantees. European states, unable to defend themselves individually and unable to coordinate collectively, negotiate separate accommodations with Moscow and Washington. European unity fractures. Strategic autonomy becomes impossible.

The window exists now because Russia is exhausted and the American betrayal is undeniable. In five years, neither condition will obtain. Russia will have recovered. European publics will have normalized American domination. The possibility of independent European action will have passed.

The Integration of Options: A Coherent Strategy

These options are not alternatives—they are components of a single strategic framework. The China card provides economic leverage to resist American coercion without requiring military confrontation. It breaks Europe's exclusive dependence on American technology and capital. Open-source AI provides technological sovereignty, ensuring that European industries and defense systems cannot be remotely disabled by American export controls or service denial. Ukrainian drone warfare provides immediate asymmetric military capability that does not require the decade-long conventional rearmament Europe cannot achieve. The Russia recovery window provides the timeline within which these options must be executed. After Russian reconstitution, Europe faces threats on two fronts without the capability to defend itself. The window for building that capability is now.

Politically, these options are more feasible than immediate massive military buildup or rapid France-UK-Germany alignment because they do not require:

— Constitutional amendments — Massive defense budget increases that trigger domestic political backlash (drone warfare is cost-effective) — Surrender of national sovereignty to supranational command structures — Public mobilization for military service

They require only:

— Regulatory courage to resist American technological exclusivity demands — Investment in European AI infrastructure (substantial but economically viable) — Integration of Ukrainian military innovation into European production — Political coordination among European leaders to treat the 5-year window as a hard deadline

The Greenland crisis provides the political justification for all four. If European leaders lack the courage to exploit this justification now—when American betrayal is undeniable—they will never find it.

Conclusion: The Tragedy of Hesitation

The tragedy is not that Europe lacks options. The tragedy is that Europe has four concrete strategic pathways—economic leverage through the China card, technological sovereignty through open-source AI, military asymmetry through Ukrainian drone warfare, and a 5-year window to execute before Russian reconstitution—and will almost certainly fail to pursue any of them.

The obstacles are not material. They are psychological and political. European leaders remain psychologically trapped in Atlanticist frameworks even as those frameworks collapse. They continue treating American demands as legitimate even after territorial annexation of a NATO ally. They prioritize fiscal orthodoxy over existential security. They refuse to communicate honestly with their populations about costs, timelines, and trade-offs.

Germany, in particular, cannot escape its guilt-pride paralysis. It will not accept Ukrainian military partnership as equal collaboration. It will not defy American technological exclusivity demands. It will not invest in open-source AI at necessary scale. It will not subordinate fiscal rules to security imperatives.

France will not extend nuclear deterrence without guarantees no one can provide. Britain will not rupture Five Eyes unless forced. Eastern Europe will not trust Western Europe's commitment. The EU will not transform into a strategic actor because transformation requires surrendering the illusion of consensus.

The four options outlined above remain available. But the political will to execute them does not exist. And in five years, when Russia has recovered and the United States has fully withdrawn, Europeans will ask themselves why they did not act when they had the chance.

The answer, tragically, is already clear: because acting would have required admitting that the comfortable assumptions of the postwar era were illusions. And illusions, once cherished, are harder to abandon than territory.

Reference:
 Chivers, C.J. (2025, December 31). “The Dawn of the A.I. Drone.” The New York Times.

End of Part 2

 
Read more...

from The happy place

There was a troll in the mirror today when I went to the bathroom, looking back at me with a sad smile.

It’s the type of medium size bathroom you might find on a ferry boat, in one of the better cabins. Still too small for a wash machine. Renovated maybe in the nineties.

I grew attached to it once when I was cleaning it throughoutly while listening to some Clive Barker novel which took place on a boat, coincidentally.

A horror novel, of course. Everybody dies. But still…

To go there cleaning on a fine autumn evening with a hot cup of black coffee in one hand, the toilet brush in the other: Isn’t that what it’s all about?; the autumn sun shining through the windows of the room outside…

And of course with the family nearby giving the bathroom a wide berth, as the floor is wet from the mop.

But today there was a troll in there. Handsome for a troll, but still…

Trolls are pretty resilient and often gather treasure. They regenerate, and even the small ones are strong like gorillas.

 
Read more... Discuss...

from Plain Sight

Part 1: The Collapse of Transatlantic Alliance

By Publius (of the 21st Century)

Within 48 hours, the operational doctrine of the 2025 U.S. National Security Strategy has moved from text to action. The extraction of Nicolás Maduro from Venezuela and Stephen Miller's announcement that the United States intends to acquire Greenland from Denmark represent not provocations or negotiating tactics, but the unveiled logic of a new American hemispheric policy. For Europe—and especially for its three major powers—these events mark the definitive collapse of assumptions that have structured transatlantic relations for seventy years.

The Trump Corollary in Action

Miller's CNN appearance on January 5, 2026 was remarkable not for its bluntness but for its precision. His statement that “nobody's going to fight the United States militarily over the future of Greenland” was not bravado. It was threat assessment. His question—”by what right does Denmark assert control over Greenland?“—delegitimizes a NATO ally's territorial sovereignty using language borrowed from anti-colonial discourse. His conclusion—”the United States is the power of NATO”—reduces alliance to hierarchy.

This tracks directly with the 2025 NSS framework. The “Trump Corollary to the Monroe Doctrine” explicitly authorizes unilateral action to secure “key geographies” in the Western Hemisphere. Greenland—though formally under Danish sovereignty—is treated as falling within this expanded American sphere. The successful Maduro extraction demonstrates operational capability. Miller's announcement demonstrates strategic intent.

The message to Europe is clear: American protection now comes with a price. That price may include territorial concessions.

Europe's Asymmetric Power Structure

Before the Danish Prime Minister warned that a U.S. occupation of Greenland would effectively end NATO, the structural fragility of the alliance was already evident. The crisis now exposes what has long been obscured: Europe's dependence on American security guarantees has produced not partnership but subordination.

Yet Europe is not uniformly paralyzed. France and the United Kingdom—though vastly different in their relationship to the EU—have maintained credible independent military capability. France possesses an autonomous nuclear deterrent, expeditionary capacity, and a strategic culture that never fully accepted American hegemony. Britain, despite Brexit, retains significant intelligence capabilities (Five Eyes legacy), a professional military, and naval power projection. Both nations, critically, never psychologically disarmed.

Germany is different. For decades, Germany built policy on assumptions that no longer obtain: that security could be delegated to the United States, that economic interdependence would pacify adversaries, that economic weight and moral posturing could substitute for military capability, and that institutional processes would constrain great power behavior.

This reflects a deeper psychological trap. Germany derives a sense of moral authority from rigorous acknowledgment of past crimes—what the philosopher Hans-Georg Moeller terms “guilt pride.” This creates an inverted nationalism: Germans feel entitled to lecture others while simultaneously refusing the material responsibilities of power. Hopeful pacifism becomes not merely preference but identity. Hard power is treated as morally illegitimate—a position Germany can maintain only because American power has subsidized its security for three generations.

The result is structural asymmetry. Germany—Europe's economic center and industrial base—cannot function as a strategic actor. It is psychologically incapable of realpolitik. France and Britain possess military capability but lack Germany's economic scale. No individual European power can stand alone. But the three together—if they could align—would constitute a formidable bloc: French nuclear deterrence, British intelligence and naval power, German industrial capacity.

The question is whether such alignment is even possible. And if so, whether it can be forged quickly enough to matter.

The Alignment Question: Can France, Britain, and Germany Forge a Credible Core?

The logic is straightforward. France provides nuclear deterrence and expeditionary capability. Britain provides intelligence architecture, naval power, and operational military culture. Germany provides industrial base, logistics capacity, and economic weight. Together, these three powers could constitute a credible European security core independent of American guarantees. The obstacles, however, are formidable—and not merely technical.

Obstacle 1: Incompatible Strategic Cultures

France has never fully accepted the logic of Atlanticism. Its strategic culture emphasizes autonomy, nuclear independence, and global power projection. French defense policy is presidential, centralized, and capable of rapid decision-making unencumbered by parliamentary constraint.

Britain's strategic culture remains fundamentally Atlanticist despite Brexit. The “special relationship” with the United States is not merely sentimental; it is embedded in intelligence sharing (Five Eyes), nuclear weapons cooperation, and interoperable military systems. Britain's defense establishment views France with professional respect but strategic wariness.

Germany's strategic culture is institutional, consensus-driven, and psychologically averse to power projection. Its political system requires coalition governance that makes rapid strategic pivots nearly impossible. Its public remains deeply pacifist. Its military has been underfunded for decades.

These are not merely differences of emphasis. They reflect incompatible assumptions about what power is for, how it should be wielded, and who decides its use.

Obstacle 2: The Nuclear Question

France's force de frappe is the cornerstone of any credible European deterrence. But integrating it into a tripartite security framework raises questions France has historically refused to answer: Under what circumstances would French nuclear weapons defend German or British territory? Who controls targeting decisions? What triggers escalation? How are costs shared?

France has jealously guarded nuclear autonomy precisely to avoid being drawn into conflicts not of its choosing. Extending that deterrent to Germany and Britain means accepting constraints on French sovereignty—constraints no French president has yet been willing to accept.

Britain possesses its own nuclear capability but one operationally dependent on American technology. Any attempt to integrate British and French nuclear forces would require Britain to disentangle from American systems—a step that would rupture the “special relationship” and compromise intelligence access.

Germany lacks nuclear weapons and, more importantly, lacks political will to participate meaningfully in nuclear strategy. German Greens and Social Democrats remain ideologically opposed to nuclear deterrence. Hosting French or British nuclear weapons on German soil would trigger domestic political crisis.

Obstacle 3: The Speed Problem

Even if political will existed, the timeline required for meaningful France-UK-Germany integration is measured in years, not months.

Industrial integration requires harmonizing procurement systems, standardizing equipment, and building joint supply chains. European defense contractors currently compete rather than cooperate. Consolidation requires overcoming national industrial policies designed to protect domestic champions.

Command integration requires building joint operational headquarters, establishing clear chains of command, and developing interoperable communications systems. NATO provided this infrastructure for seventy years. Replicating it independently requires time, funding, and trust.

Political integration requires treaty-level commitments with enforcement mechanisms—not aspirational declarations. This means binding obligations to deploy forces, share intelligence, and defend common interests. No European public is prepared for this.

The Greenland crisis demands response now. France-UK-Germany alignment, even if politically possible, cannot materialize quickly enough to affect this crisis.

Obstacle 4: The Trust Deficit

France and Britain do not trust Germany to follow through. Germany's decades-long pattern of promising defense spending increases and then failing to deliver has created deep skepticism. The Zeitenwende announced by Scholz in 2022 was supposed to represent fundamental change. Three years later, procurement remains slow, ammunition stocks remain low, and German public support for rearmament remains tepid.

Why would France or Britain subordinate their nuclear deterrence or commit their militaries to joint command structures with a partner that has repeatedly demonstrated inability to prioritize defense?

Germany, meanwhile, does not trust France or Britain to prioritize German interests. German strategic culture emphasizes multilateralism and institutional process precisely because it fears great power domination. Accepting French or British leadership feels, to German sensibilities, like trading American hegemony for Franco-British hegemony.

This is not trust that can be built quickly through summit meetings and joint declarations. It requires demonstrated commitment over years—commitment the current crisis does not allow time to develop.

Could Emergency Accelerate Alignment?

In theory, existential crisis can override political obstacles. The Greenland situation is unprecedented: a NATO member state facing territorial annexation by the alliance guarantor. This should trigger collective mobilization.

In practice, the pathologies run too deep. Germany's political system cannot pivot quickly enough. France will not surrender nuclear autonomy without ironclad guarantees Germany cannot credibly provide. Britain will not rupture Five Eyes intelligence sharing unless European alternatives are already functional—which they are not.

The most likely outcome is that France and Britain pursue closer bilateral defense cooperation while keeping Germany at arm's length as an economic partner but not a strategic equal. This perpetuates exactly the asymmetry that makes Europe vulnerable: military capability without economic scale, economic scale without military capability, and no power possessing both.

France-UK-Germany alignment remains the only path to genuine European strategic autonomy. But the obstacles—cultural, institutional, technical, and temporal—make rapid integration effectively impossible. Europe will not forge this alignment before the Greenland crisis resolves. It may not forge it at all.

European Response Options: An Inventory of Weakness

What can Europe do in the immediate term? The short answer is: very little. An honest assessment of European options reveals constraints so severe that the crisis may already be decided.

(1) Unified EU Response: Structurally Impossible

There will be no coherent EU response. The 2025 NSS explicitly aims to fracture European unity by cultivating bilateral ties with governments that prioritize American protection over European solidarity.

Eastern Europe—Poland, the Baltics, possibly Hungary—will remain silent or issue carefully tepid statements. They cannot afford to alienate Washington while Russian forces remain on their borders. Their strategic calculation is binary: American protection is existential; Greenland is not.

Western Europe—Germany, France, the Nordic states—will condemn the action forcefully. But they will speak as a coalition of the willing, not as “the EU.” This exposes what has long been true: the EU is not a geopolitical actor. It is a regulatory body with a common market and aspirational foreign policy rhetoric.

(2) Hard Power: Militarily Impossible

Europe possesses zero credible military options in the immediate term. Naval power projection into the Arctic against the U.S. Navy is fantasy. Europe has depleted its ammunition stocks supporting Ukraine and lacks the industrial base to sustain high-intensity operations. Mobilizing against the United States while simultaneously deterring Russia is logistically and financially impossible.

Invoking NATO Article 5 against the United States—the alliance guarantor—is a legal and political absurdity. NATO effectively ends the moment the United States annexes the territory of a member state. The Danish Prime Minister's warning understates the case: NATO is already over. It simply has not yet been officially dissolved.

The deeper strategic trap is Ukraine. Any European attempt at hard retaliation—denying airspace, imposing sanctions, withdrawing from joint operations—risks an American withdrawal from Eastern Europe entirely. The NSS has already signaled intent to “negotiate an expeditious cessation of hostilities in Ukraine.” A hostile European response accelerates a unilateral U.S.-Russia accommodation that leaves Europe isolated and exposed.

Europe needs American protection from Russia more than America needs European cooperation. This asymmetry is total.

(3) Symbolic and Economic Warfare: Performative and Futile

Lacking hard power, Europe will resort to moral theater and economic asymmetric actions—tools that align with European political culture but achieve little strategically.

Boycotting the 2026 FIFA World Cup is highly plausible. It is low-risk, high-visibility, appeals to public outrage, and costs nothing materially. It will also achieve nothing strategically.

Targeted sanctions and fines on U.S. corporations through the “Brussels Effect” regulatory power will be attempted. However, the NSS anticipates this and threatens counter-tariffs and economic escalation. A recession-prone, energy-dependent Europe cannot win a trade war with the United States.

Diplomatic expulsions would be dramatic but hollow, severing the channels needed to negotiate anything at all.

International legal action will produce a ruling the United States will ignore, further demonstrating the impotence of institutions Europe prizes.

These are not strategies. They are consolations. They allow European governments to signal outrage to domestic audiences while accepting the underlying reality: the United States has decided, and Europe cannot prevent it.

The Trap: Between West and East

Europe now faces predatory powers on two fronts. In the east, Russia wages attrition warfare in Ukraine and probes Baltic vulnerabilities. In the west, the United States no longer pretends alliance means partnership. It means hierarchy—and hierarchy means deference.

Europe's lack of “strategic autonomy”—a phrase repeated endlessly without corresponding action—leaves it with no viable path. The structural dependencies are too deep. European militaries cannot operate without American logistics, intelligence, and command infrastructure. European economies depend on access to American markets and technology. European security depends on the American nuclear umbrella.

Germany, in particular, has no exit. Its “peace dividend” economy was built on cheap Russian energy and guaranteed American security. Both pillars have collapsed. Its political culture remains trapped in hopeful pacifism and institutional faith. Its industrial base—once Europe's strength—now faces Chinese competition, American protectionism, and self-imposed energy constraints.

But France and Britain also face constraints. France's nuclear deterrent protects France—extending it to cover all of Europe requires political commitments France has never been willing to make. Britain's intelligence capabilities depend on American cooperation that would evaporate the moment Britain prioritizes European over Atlantic ties.

The fantasy was that Europe could remain a great economic power without becoming a strategic power. The fantasy was that moral posturing and institutional process could substitute for deterrent capability. The fantasy was that the “rules-based international order” was a fact rather than a preference that obtained only so long as the United States chose to uphold it.

That fantasy has ended.

The Likely Outcome

The most probable scenario is continued European fragmentation, rhetorical outrage, and gradual accommodation to American demands. Eastern Europe remains silent. Western Europe protests loudly but ineffectively. Economic sanctions are attempted and then quietly dropped when counter-escalation begins. Symbolic gestures—FIFA boycotts, diplomatic posturing—allow European publics to feel virtuous while changing nothing.

Greenland becomes American territory through a combination of coercion, inducement to Greenlandic authorities, and Danish capitulation disguised as “negotiated settlement.” NATO is not formally dissolved but becomes meaningless. The United States maintains a skeletal presence in Europe sufficient to monitor but not defend. European states scramble for bilateral arrangements with Washington, competing to offer concessions in exchange for minimal security guarantees.

France and Britain may deepen bilateral defense cooperation, but without Germany's industrial base and economic weight, this remains insufficient. Germany, paralyzed by its psychological contradictions and institutional constraints, cannot transform quickly enough to become a credible security partner. The alignment that could save European autonomy does not coalesce.

The transatlantic era has ended. Not with formal declaration, but with the demonstration that alliance has become extraction. Europe is learning what subordinate powers always learn: sovereignty is not a legal status. It is a condition maintained by capability. When capability is absent, sovereignty is fiction.

Continued in Part 2: Three Strategic Pathways and the Closing Window Part 2 examines concrete strategic options available to Europe—the China card, technological sovereignty through open-source AI, Ukrainian drone warfare capabilities, and the narrow 5-year window before Russian military reconstitution forecloses these possibilities.

End of Part 1

 
Read more...

Join the writers on Write.as.

Start writing or create a blog