The gun rights movement’s foundational argument for forty years: registration leads to confiscation. The NRA has fought every attempt at a federal gun registry on exactly this basis. Know who has guns, and you can take them.
The DOJ just mandated registration in the loudest way possible. Americans are specifically forced to register guns based on birth sex, on federal purchase forms, under penalty of felony charges.
Whenever law-abiding gun owners’ constitutional rights are violated, the Trump Administration will fight back in defense of freedom and the Constitution.
Same announcement, same document.
Lose rights by claiming them.
The right formally exists. Exercising it is suicide, and therefore not a shared right; rather a self-incrimination test for a targeted population.
The twist is that actual threats to society were being pushed as grounds for disclosure or denial. Domestic violence, for example. Trump uses this logic to make gender a class of threat, only a short hop away from registering political view.
This principle has a history. The history is one of selective application for purposes of oppression.
In 1967, Black Panther Party members carried firearms to the California State Capitol—a straightforward exercise of Second Amendment rights identical to what white gun owners did routinely. The response was immediate: Governor Reagan signed the Mulford Act restricting open carry, with bipartisan legislative support and NRA endorsement. The constitutional principle didn’t change. Who counted as a rights-bearing citizen did.
Ronald Reagan lied in order to inflame tension that would remove gun rights for Blacks. Source: Sacramento Bee
Prohibition operated through the same logic. The Eighteenth Amendment nominally banned alcohol production for everyone. Enforcement told a different story. Black distillers were primary targets—the same people forced to learn the craft under slavery who might now build prosperity from that coerced expertise. German brewers, Italian winemakers, Irish and Mexican producers faced similar targeting. Connected saloons continued operating for the right clientele. The law existed not to eliminate alcohol but to determine who could legally build wealth from it.
Japanese internment followed the same pattern. California interned its Japanese-American population; Hawaii, actually attacked and with a far larger Japanese population, did not. The difference: California’s Japanese-American farmers had built successful agricultural operations. They returned from the camps to find their land seized, their businesses transferred to local white competitors who had called for their registration and incarceration. National security was an obviously bogus rationale, but white businessman knew they could smash and grab. Economic elimination was the function.
Black distillers were criminalized to prevent post-slavery prosperity. Japanese farmers were interned to transfer their land. Black gun owners were legislated into felony, by the NRA politicians, the moment they carried openly. Now Americans are being forced to choose between disarmament and federal registration intended to disarm them.
The constitutional language never changes. Who counts as a rights-bearing citizen does.
Take the DOJ’s stated principle seriously: constitutional violations justify armed defense. Apply it universally—to First Amendment violations, Fourth Amendment violations, due process violations currently occurring through federal enforcement actions. The principle cannot survive that application, which reveals its actual function: not legal doctrine but white nationalist signaling.
The quiet part of Reagan or Wilson is out loud under Trump. The DOJ has put in writing the unjust and unequal effects that always operated in practice. It’s the “again” part of MAGA.
The question is what happens when people marked for exclusion take the stated principle at face value.
Americans seem unable to speak the truth about what’s happening to them. They dance around and wave their hands, like in a comforting trance that prevents accuracy, avoiding science. Oh Lord, give me strength, for I can not judge and must appear happy all the time with it.
Warzel and Gilbert frame “the internet was built to objectify women” in The Atlantic but focus almost entirely on Musk or Trump as the villain of the moment—which lets Zuckerberg’s origin story decades ago (let alone Epstein) slide into background noise.
It feels like everything is peaking. I don’t know if this is actually the peak, or if we have a way to go. But I mean, one thing, I think, is that so much of our culture has sort of learned from, and is responding to, the example of the president. Who is not, I would say, the most decent person when it comes to talking, thinking about, talking to, treating women.
Apparently they’re operating within constraints that prevent naming the full pattern. Their pop-culture framing gestures at structural critique while the analysis stays biographical—Musk as individual bad actor, this moment as unprecedented crisis.
Nope.
The infamous Facemash incident isn’t really even in the past. It barely qualifies as history as an October 2003 proof of the modern concept: Zuckerberg scrapes women’s photos from Harvard house facebooks without consent, builds a “hot or not” online abuse platform, crashes Harvard’s network from traffic. Women of color step up to report and hold him accountable. The disciplinary board calls it a “breach of security, copyright, and individual privacy.” He calls it the “most important thing“ he built. Four months later he launches TheFacebook, where Harvard becomes one of the biggest investors.
The Association of Harvard Black Women and Fuerza Latina were the organizations that formally complained. The Crimson reported it at the time. That detail matters because it establishes who actually drew the line—and who Harvard ignored.
Harvard incubated the misogyny platform by declining to hold Zuckerberg accountable, then bought stock once the surveillance business model proved profitable. The women of color who complained were completely erased. The institution that failed them later held $242 million in Meta stock.
The business model that followed—surveillance-based engagement optimization—didn’t accidentally discover that objectifying content drives engagement. That was the founding insight. The algorithm learned what the founder already knew. Harvard didn’t pressure or pursue protection of women, it rolled out abuse of women for profit as an extension of their “business” ethics.
What’s striking is how the “masculine energy” rebrand at Meta and the installation of former Trump officials (Joel Kaplan as Chief Global Affairs Officer, Dana White joining the board, let alone Dina Powell McCormick as a state-sanctioned censor) coincides now perfectly with Musk making explicit what Facebook always kept implicit. Meta can now artificially claim to not be Facebook and position itself as the “responsible” platform while implementing the same exact structural incentives with slightly better PR.
Gilbert’s framing about this being a “red line moment” assumes we haven’t already been crossing that line for fifteen decades, let alone the prior two. I warned everyone here that the rebrand to X was an explicit expression of Nazism.
The Grok undressing feature on a Swastika themed site is just the explicit, unmasked version of what engagement-optimized platforms have always incentivized. The difference is in plausible deniability, not kind.
If we had more historians in America, perhaps we would engage in the discussion about “breeding” before 1808, because that’s one of the best examples of red lines crossed. After 1808 women in America suffered widespread state-sanctioned rape in a cruel “babies for profit” scheme not unlike what Elon Musk promotes.
Virginia slaveholders eliminated import of slaves, a protectionist move that drove domestic markets into an explosion of human “breeding” operations. Enslaved people were securitized and mortgaged to banks, who then packaged those mortgages into bonds sold to investors in London, Amsterdam, New York, Paris. Investors in countries where slavery was judged immoral and illegal didn’t own individual slaves, just bonds from America backed by their value. Slave-backed securities.
The Sublettes explained in 2015 (The American Slave Coast: A History of the Slave-Breeding Industry):
In a land without silver, gold, or trustworthy paper money, enslaved women’s children and their children’s children into perpetuity were used as human savings accounts that functioned as the basis of money and credit.
That sounds a lot like hundreds of millions of women and children who say they can’t get off Facebook/Instagram/Whatsapp, while Zuckerberg announces more and more billions in profit. The through line of American capital is women’s bodies as extractable productive resource, the financialization of that extraction, the genteel distance between the violence and the profit-taking.
Breeding economics is the theory within Musk’s public natalism. His dozens of children from concubine operations (one of whom is suing Grok, radical right wing activist Ashley St. Clair), his public advocacy for high birth rates, his “womb” attack rhetoric, his funding of pronatalist movements all form a contemporary “babies for profit” platform. The parallel isn’t metaphorical.
The technology changes a little. The architecture doesn’t.
Owens wrote in 2017 (Medical Bondage: Race, Gender, and the Origins of American Gynecology) that consent could not exist for enslaved women, like how consent doesn’t exist in Grok or Facebook. Owners push experiments on teenage women because of financial interest. In the 1800s that meant doctors restoring reproductive capacity to continue state-sanctioned rape for profit, while today it means “pedophile protector“—Musk’s failure to remove CSAM, X’s documented child safety failures, the Grok feature generating exploitation images of minors.
Such precision gets far less engagement than outrage at the villain of the moment. Grab your pitchfork, stay inside the crowd and avoid thinking about it—that’s the American pattern. The origin story as a fight against the British King was colonial elites joining forces to prevent the obvious end of slavery, not freedom for anyone else. America was created to reverse a global trend toward emancipation, turning itself into a white male engine of misogyny and exploitation. It extended slavery where it was ending, producing the worst version of it in history, which is foundational to understanding why Facebook was even launched during Epstein’s heyday; built out from the Harvard observation of harm to teenage girls. Grok emerged from this huge shadow, if not extending it.
Americans never, ever reflect appropriately on Lord Mansfield’s ruling in Somerset v. Stewart (1772), which created fear and loathing that Britain was moving toward abolition. Lord Dunmore’s Proclamation (1775) offered freedom to enslaved people who joined British forces. That’s why colonial leaders—especially Washington—used fear of Black freedom as their “revolution” recruiting tool. Washington’s own letters show anxiety about Dunmore’s proclamation inspiring enslaved people to flee. Yeah, 1776. Think about it. Today, Silicon Valley calls such entrapment a “digital moat” plan for value.
Americans never, ever reflect appropriately that George Washington recruited his soldiers by saying it was to preserve white rule, or that he started legal battles to avoid emancipation even after it became law. Washington rotated his enslaved workers from Philadelphia back to Virginia every few months through an inhumane loophole, specifically to prevent them from gaining freedom under Pennsylvania’s 1780 gradual emancipation law, which freed enslaved people after six months. He even pursued Ona Judge for years after she escaped him, writing to authorities trying to recapture her all the way to his death trying to prevent freedom.
She escaped in 1796, he pursued her until his death in 1799, and even sent his nephew to try to kidnap her back from New Hampshire after she’d settled as free, married and had children. He never stopped trying to prove women are property. Zuckerberg and Musk aren’t new as much as what happens when you refuse to see the shoulders and escalators they have been standing upon to succeed.
The dollar bill’s unmistakable face of “white men rule and women’s bodies are for profit” remains foundational to American “Big Tech” today.
General Grant crushed the white nationalists in Civil War. Then he crushed them at the ballot box too, becoming President. They rebranded in late 1800s as nativist “America First”, which foreign-born “businessman” (i.e. South African apartheid money from Thiel and Musk) just drove all the way to Vance and Trump in the White House
Structural critique implicates the readers and institutions they want to trust. The saccharin and comforting frame (“this is new, this is Musk, this is the red line”) performs a ritual of observation while protecting the underlying architecture, allowing it to grow past red lines without accountability.
Judgement time has passed, again and again. Red lines repeatedly were crossed, begging their use and definition. Those unable or unwilling to judge overt Nazism in 2026, let alone 2023, are about to find out where that leaves them if they don’t take real action in these last six months of democracy.
We’re a few weeks into 2026 and the G7 Cyber Expert Group has released their roadmap for post-quantum cryptography transition in the financial sector. While it’s framed as non-binding guidance this document signals regulatory timelines are tight.
Six Phases
The roadmap uses phases to describe the migration pattern: Awareness & Preparation, Discovery & Inventory, Risk Assessment & Planning, Migration Execution, Migration Testing, and Validation & Monitoring.
The visual timeline on page 5 puts “non-critical” system Discovery & Inventory squarely in 2025-2027.
G7 calls this their “sample, illustrative visual summary of the quantum-resistant transition of a notional non-critical system at a financial entity.”
Since we already are in January 2026, your cryptographic inventory for non-critical systems now should be looking at its final year, which means critical ahead of that. And algorithms should be migrating before 2030. Note that their diagram begs the question of a cycle, rather than a linear approach, perhaps as a blog post topic for another day.
More pointedly, the G7 suggests prioritizing critical systems for migration by 2030. A later date is for a comprehensive migration, which means the nearest deadline is for data that actually matters, most likely 2027.
Three Requirements
Comprehensive cryptographic inventory. The document calls for mapping “cryptographic assets, communication protocols, and relevant third-party dependencies.” Not just your certificates. Not just your endpoints. Everything that touches cryptography across your infrastructure.
Quantifiable metrics to track progress. The roadmap emphasizes “mechanisms for ongoing monitoring and recalibration” and metrics that “demonstrate accountability.” Point-in-time assessments won’t cut it. You need to know whether you’re getting better or worse over time.
Third-party visibility. Financial institutions are “highly dependent upon and interconnected with information technology products, vendors and other third-party providers.” Your migration plan is only as good as your visibility into your supply chain’s cryptographic posture.
Beyond Finance
The roadmap is for financial institutions, and these principles apply universally. If you handle sensitive data with long retention requirements the “harvest now, decrypt later” threat cited in the document applies to you today. Anything that is useful five years from today is vulnerable right now. Data encrypted with targeted algorithms and intercepted now can be stored and then broken by quantum computers.
The G7’s complete migration target date of 2035 is when they expect no more classical algorithms in use. The threat window opens much, much earlier. Technically it started years ago.
What To Do
Hello discovery. You can’t plan a migration without knowing what you’re migrating. I speak with a lot of organizations and they are surprised by what they find and where—legacy protocols in production systems, certificates with longer validity periods than their algorithms will remain secure, third-party integrations using deprecated cryptography.
The G7 roadmap explicitly calls for tools for “quantifiable metrics to track progress.” That means every discovery process needs to be repeatable, far beyond manual and one-time audits.
Everyone needs right now to measure their quantum migration velocity, not just document current state risks. The G7 gave us another roadmap, saying what we already should know: the quantum clock has been running.
French Admiral Brueys anchored his fleet in a defensive line he considered unassailable at Aboukir Bay in 1798. Armed broadsides faced anyone approaching from the sea. The landward side went largely ungunned.
Mind the gap.
Along came Admiral Nelson who simply sailed the gap and unloaded cannons into the vulnerable French broadside. L’Orient exploded so massively everyone paused in awe at the catastrophic miscalculation.
Perhaps France’s infamously aggressive “move fast, break things” dictator should be referenced today more often as being Mr. Napoleon Blownapart? The gargantuan French warship L’Orient explodes at 10PM. Source: National Maritime Museum, Greenwich, London
Fast forward to France in 1992 when banks deployed chip-and-PIN nationally. They were a decade ahead of others with a celebrated “secure” alternative. Apparently Bernard Vian, then interning at Gemplus, stared into the gap. He says he watched engineers extract PINs from these cards in under ten minutes.
I believed my card was secure. I believed the system worked. But watching strangers casually extract something that was supposed to be secret and protected was a shock. It was also the moment I realized how insecure security actually is, and the devastating impact security breaches could have on individuals, global enterprises, and governments.
The gap was known. The cards shipped anyway, vulnerable like a modern day L’Orient.
Lucky for him he was an intern who calmly sipped espresso while watching the world go up in flames, instead of being a sad conscript of Napoleon blown to bits off the coast of Egypt.
Vian writes that he sees “counterintuitive wisdom” in breaking your own systems. He frames that as philosophical rigor, instead of admitting it’s the norm for survival. In context, we are talking about ancient gap management discipline: document the weaknesses, deploy them anyway, position knowledge asymmetry as a sophistication that nobody should be able to exploit.
The way he uses history, however, gives me some worry about his new product that claims post-quantum readiness. The threat is real. The structure is old.
Brueys knew where his ship was vulnerable. Boom.
Vian knew where his payment card PIN was vulnerable. Boom.
The best question today of quantum readiness and security is more about routine work than any secret squirrel lab and revolution, like do you know which systems rely on classic asymmetric encryption? See the obvious gaps? Vian isn’t asking that.
The engineers who built and work on them… must.
a blog about the poetry of information security, since 1995