Skip to content

Plutonic Rainbows

Polo Sport and the All-American Face

Bridget Hall in the blue USA tank top is one of those images that collapses an entire decade into a single garment. Polo Sport, mid-nineties, the American flag worn not as patriotism but as a brand proposition. Ralph Lauren had been constructing this version of America since the seventies; by 1996 he had refined it into something you could buy for forty dollars at Macy's.

Hall was sixteen when Texas Monthly profiled her. The piece noted she was so busy she'd pushed Ralph Lauren "into a less-than-exclusive contract" and would only commit to fragrance ads. Sixteen years old and already negotiating the terms of her own image. The Kim Dawson Agency in Dallas had discovered her at ten; by fourteen she was with Ford, and by seventeen she was on the Forbes list of top ten earning supermodels alongside Cindy Crawford and Christy Turlington. The speed of it is difficult to process now. A girl from Springdale, Arkansas, standing in a room with people who had been famous for a decade, not because she'd earned her way through some legible hierarchy but because the industry had simply decided she was next.

Ralph Lauren needed her more than she needed him, which is not how these relationships usually work. The preppy tableau from 1995 tells the whole story in a single frame; tweed, ties, rugby stripes, and Hall anchoring it all with the same effortless authority the boys beside her are trying to project. The Ralph Lauren Collection, Polo Sport, and RRL campaigns all featured her throughout the mid-nineties, with Bruce Weber behind the camera for several. She walked the Spring 1994 Ready-to-Wear show. In August 1996, she and Tyson Beckford launched the Polo Jeans "Easy Rides" line at Macy's in New York. The pairing tells you everything about where Lauren positioned Polo Sport in the market; Beckford brought streetwear credibility while Hall carried the all-American wholesomeness that was Lauren's core currency.

That wholesomeness was, of course, a construction. Lauren's America was always a selective one. The brand didn't feature African American models until 1994, and when it did, the framing was narrow. A University of North Texas thesis documented how Black male models in Lauren ads were "limited to that of the stereotypical muscular athletic black man selling sportswear," frequently depicted partially clothed. The New Yorker wrote about the tension between Polo's "Waspy fantasy of sporting America" and the Black streetwear crews who were simultaneously adopting and shoplifting the brand. Hall's face was part of that fantasy. Clean, blonde, uncomplicated; the girl Lauren imagined wearing his clothes before he imagined anyone else.

What I find interesting is how little of this complexity was visible at the time. Shot from below against open sky, Hall in the white USA tank looks like nothing more complicated than youth and summer. In 1996 a blue tank top with "USA" across the chest was just a blue tank top. The Polo Sport line leaned heavily into patriotic imagery that year, overlapping with the Atlanta Olympics without being an official licensee. Lauren wouldn't secure the Team USA contract until 2008. But the association was deliberate; you didn't need the Olympic rings when you had the flag and the right face.

Hall left modelling largely behind by the early 2000s. She walked Victoria's Secret in 2001 and 2002, then stepped back. DuJour documented a quiet return years later, but the version of her that mattered, the one that sat at the intersection of Arkansas and Fifth Avenue, of sportswear and aspiration, belongs entirely to the decade where she started. She was one of those women who became a sentence before they'd finished becoming a person. The white polo and cable-knit is the image that stays with me. No flag, no slogan, just the pony on the chest and a face that hadn't yet learned to guard itself.

Sources

Mixed Case

It is on the green board above the slip road, on the brown tourist sign for the castle, on the white finger post where the B-road forks at a Norman church. The typeface is called Transport. Jock Kinneir and Margaret Calvert designed it between 1957 and 1967, first for the motorways, then for everything else, and it is still there, quietly directing traffic across a country that has rebuilt itself several times since the signs went up.

The Anderson Committee appointed Kinneir in 1957 because Britain was building motorways and had no signs a driver could read at speed. Existing signs were a patchwork: uppercase block letters regulated in the 1930s, some cast-iron finger posts older still, none of it designed for speed. Kinneir brought his student Calvert from Chelsea School of Art. They based their letterforms on Akzidenz Grotesk, a German sans-serif, but softened it. Rounder terminals, a distinctive tail on the lowercase "l", bar-less fractions. The result was tested on the Preston bypass in 1958, a year before the M1 opened.

The real fight was about case. Road signs had always shouted. ALL CAPS, like a telegram or a warning. Kinneir and Calvert wanted mixed case because lowercase letters have ascenders and descenders that form word shapes, and word shapes are faster to process than strings of capitals at seventy miles an hour. The committee ran legibility trials on airfields, signs strapped to car roofs and driven past seated observers. Transport won against a competing serif design, and the case for lowercase was settled so thoroughly that nobody remembers it was contested.

In the United States, they tried to replace Highway Gothic with something called Clearview. It was approved, then rescinded in 2016 when the Federal Highway Administration discovered the improved legibility came from new reflective sheeting, not the letterforms. The letters had been getting credit for the material. I think about this sometimes.

What nobody anticipated is the way Transport would outlast the infrastructure it was designed to label. It is the visual voice of a state that built swimming baths, district general hospitals, comprehensive schools, and council housing, and then over the following decades quietly withdrew. The signs remain. The swimming baths are sometimes flats. The hospital has been renamed twice and downgraded once.

Drive any B-road in England and you pass green signs directing you to places that closed years ago. The lettering does not know this. It speaks in the present tense with the authority of an institution that expected permanence. Owen Hatherley has called this nostalgia for postwar public design a middle-class consumer phenomenon, functional modernism reversed into decorative kitsch. Calvert designed the Children Crossing sign based on herself as a child. You can buy it on a tote bag. Hatherley's point lands.

But the signs are not kitsch. They are municipal infrastructure doing exactly what they were designed to do, which is point you somewhere. The problem is that somewhere has been demolished.

Calvert turns ninety this year. Thames and Hudson published Woman at Work, her account of the whole thing: the legibility trials, the serif battles, the rooftop placards driven past squinting observers. The Government Digital Service adopted a redrawn version, New Transport, for gov.uk. The state still speaks in the same letterforms. It just points at different things now.

Sources:

Three Lines, Cash on Collection

The Leicester Mercury charged by the line. Three lines minimum, something like forty pence each, and you paid at the front desk with coins or a cheque. The woman behind the counter counted your words, crossed out anything unnecessary, and handed you a carbon copy of what would appear on Thursday. You had bought, for about a pound twenty, a rectangle of attention roughly the size of a postage stamp.

Millions of these transactions happened weekly across hundreds of regional papers. The Express & Star in Wolverhampton. The Yorkshire Evening Post. The Shields Gazette, the Wigan Observer, the Cumberland News. Each one carried a classified section that ran to several pages and represented, in aggregate, something close to half the paper's total revenue. By 2018, close to half the overall revenue loss suffered by British newspapers could be traced to the migration of classified advertising online.

What interests me is not the economics of collapse, though. It is what the classified section actually was, as a thing you held and read.

It was a map of a local economy that existed below the threshold of visibility. Not the shops on the high street or the brands in the Sunday supplements but the stratum underneath: a woman in Oadby selling a Kenwood mixer for fifteen pounds. Someone in Beeston looking for a lodger, non-smoker preferred. A mobile mechanic named Dave with a Bilton phone number offering servicing at your door. These people had no brand, no shopfront, no web presence (the concept did not exist). They were identified by a first name, a phone number, and a price. The transaction required a phone call, a visit, cash.

The personal columns were stranger still. Coded declarations of love or apology ran beside straightforward ads for second-hand furniture. TRACEY. I'M SORRY. PLEASE CALL. Surrounded by lawn mowers and prams. The newspaper imposed no hierarchy between grief and commerce, and this felt normal, because there was nowhere else to put either one.

When the Cairncross Review documented the damage in 2019, it found that local print advertising revenue had fallen 69% in a decade. Nearly two billion pounds of classified revenue had vanished from regional publishing, redistributed to Rightmove, Autotrader, Indeed, Gumtree, and eventually Facebook Marketplace. Over 300 titles closed. By that point, nearly two thirds of local authority districts in Great Britain had no daily local paper at all.

The industry explanation is efficient displacement. Digital classifieds are searchable, free or nearly free, illustrated, and national. They do everything the old format did, but better. This is true, and it misses what the classified section was actually doing.

A classified ad in a local paper was bounded by geography. You sold to people who could come and collect. You bought from people whose town you recognised. The boundaries of the market were the boundaries of the delivery van, and this created an economy of proximity that functioned on something digital platforms have never replicated: the assumption that information was local. The buyer and seller shared a postcode, a weather system, a bus route. Neither needed to verify the other's identity, because the transaction implied geographic trust. You lived near enough to complain.

Historians are starting to notice the gap. The dense classified pages of regional papers offered a weekly snapshot of what a place knew about itself: what people owned, what they could afford, what skills they traded, what they were desperate enough to advertise. A classified section from a 1987 Express & Star is a census of a parallel economy that no official data set captured. When those pages stopped being printed, nothing replaced the record they were quietly keeping.

I think sometimes about what a classified ad from 1991 looks like now. A Raleigh Chopper, five pounds. A Ford Escort 1.3, J-reg, genuine 40,000 miles, twelve hundred o.n.o. A phone number that no longer connects to anything. The object may still exist somewhere, slipped from its time, but the ad itself was written in a world where forty pence a line was the price of being seen by your neighbours, and that world is as unreachable as the phone number printed next to it.

Sources:

Not in the Archive

There's an Armani everyone remembers, and it isn't this one. The Armani everyone remembers is cut from charcoal wool, has a pinstripe somewhere on it, and lets the jacket's shoulder do most of the talking. The one walking the Milan runway in October 1987, for the Spring/Summer 1988 collection, is a different animal. Cream silk. Draped across the body like something half-borrowed from antiquity. No shoulder to speak of. The jacket-as-engine idea from American Gigolo isn't what this is doing.

The house's own memory agrees. Armani's official Archivio holds the Fall/Winter 1988 womenswear collection in full, look by look, with fabric notes and source references attached. The Spring/Summer season that came six months earlier isn't there. I don't mean the entries are thin. I mean there's no entry.

The photographic record exists. Getty holds a Donato Sardella runway photo from that exact show, credited to WWD. Aldo Fallai shot Burke Hudson in the season's menswear and the prints surface on fashion blogs and dealer archives. So the collection happened, it was documented by the people whose job was to document it, and then the house itself chose to leave it out of its own memory.

That's the kind of gap I find interesting. Not a conspiracy, just a quiet self-edit. Designers edit their own legacy all the time, usually toward whichever work the house wants people to think about now.

Which is odd here, because the power suit is really a cultural projection. Mostly American, mostly Richard Gere's fault. Armani was planted firmly on the restraint side of the Italian ready-to-wear split, against everything Versace was doing across town, but the restraint wasn't ever really in the shoulder. It was in the fabric, the palette, the refusal to decorate. Which is another way of saying the silk in this photograph is closer to the centre of the Armani register than the pinstripe is.

The fabric falls across one shoulder and pools at the hip, draped like a chiton, pale like sun-bleached stone. It's borrowed light. A designer whose actual signature is soft drape shouldn't need to hide a season that makes the case so clearly. Unless the case makes another problem more visible.

I've been turning over why the house skipped this season. The simplest answer is that Fall/Winter is easier to museum. Wool, structured at the shoulder, architecturally clean. The kind of collection you can hang on a mannequin and photograph under gallery light. Spring/Summer is lighter, harder to display. Silk instead of wool. Photographs well in motion and badly in a case.

And the silhouette here is close to what Azzedine Alaïa was doing a couple of years later, the same body-conscious fluidity, the same refusal to treat the shoulder as a load-bearing piece. Armani and Alaïa are usually filed into different boxes — suits versus bodies, Milan versus Paris, restraint at war with sensuality — and I'm not sure either box holds up once you put these two seasons next to each other. The Armani in this photograph would slot into an Alaïa retrospective and nobody would flinch.

Maybe that's why the house left it out. Too close to someone else's territory.

Sources:

Coattails

OpenAI announced this week that it's building a cybersecurity product. Not a new model, a product, layered on existing capabilities, delivered through its Trusted Access for Cyber pilot. Ten million dollars in API credits. Invite-only. Enterprise partners apply through their account rep.

The timing is conspicuous. Anthropic launched Project Glasswing four days ago, putting Claude Mythos in the hands of twelve major partners for defensive vulnerability research. By Tuesday, the Treasury Secretary and the Fed Chair had convened five bank CEOs to discuss what that meant. By Wednesday, Axios was reporting that OpenAI had its own cybersecurity product in the works.

Gizmodo's framing was blunt: OpenAI is riding the coattails of Anthropic's announcement to avoid being left behind in the hype cycle. The distinction between the two offerings matters, though. Mythos is a model with emergent capabilities Anthropic didn't explicitly train for: autonomous vulnerability discovery and exploit development that appeared as a downstream consequence of general improvements in code and reasoning. OpenAI's offering is a product wrapper around existing models, with monitoring and access controls.

Both approaches share the same thesis. Cybersecurity AI is now a product category, and every major lab needs one.

But a study published this week by AISLE complicates things considerably. They ran eight models against Mythos's headline discoveries: the FreeBSD NFS exploit, the 27-year-old OpenBSD bug. All eight detected the vulnerabilities. A 3.6-billion-parameter open-weight model, costing eleven cents per million tokens, correctly identified the buffer overflow that took Mythos fifty dollars to find in compute.

Their conclusion: the moat is the system, not the model. What makes Mythos dangerous isn't raw capability. It's the orchestration around it: containerisation, iterative testing, crash oracles, attack surface ranking. The targeting, the iterative deepening, the validation, the triage, the maintainer trust. A small model inside a well-designed pipeline catches what a frontier model catches. Without the frontier price tag. Or its access restrictions.

If AISLE is right, Glasswing's controlled access buys less time than Anthropic assumes. And OpenAI's product is competing not just with Mythos but with any competent team running a three-billion-parameter model and decent tooling. Alex Stamos told Platformer the window is six months before open-weight models catch up to foundation models in bug-finding. AISLE's data suggests the window might already be closing.

Picus Security puts numbers on the downstream problem. Fewer than 1% of Mythos-discovered vulnerabilities have been patched. Discovery at machine speed, remediation at calendar speed. Adding a second lab's cybersecurity product adds more discoveries. It doesn't add more patches.

OpenAI's move is rational. When your competitor gives the Treasury Department a reason to hold emergency meetings, you announce your own programme. But the question isn't whether both labs will ship cybersecurity products. They will. The question is whether the relevant competition is between OpenAI and Anthropic at all, or between the orchestration systems anyone can build and the access controls nobody can enforce.

Sources:

What Sportmax Was For

The dress is four triangles of saturated colour meeting at the chest like a Suprematist diagram: yellow at the shoulders, electric blue down one side, magenta across the opposite hip, green filling the lower wedge. Sleeveless, short, built flat. There's no print on any of it. The colour is the surface.

This kind of thing didn't come out of Max Mara. Max Mara sold you the camel coat — the careful tailoring, the unshowy silhouette, the idea that a good Italian house should dress you in things that still make sense a decade later. Sportmax was the other door in the same building. Founded in 1969, built specifically to do the stuff the main line wouldn't: American sportswear cues, Swinging London attitude, experiments the parent label wasn't willing to risk on its own balance sheet.

For a while the experimental credentials were stronger than anyone now remembers. Jean-Charles de Castelbajac, already a committed colour-and-geometry fanatic, directed Sportmax's first runway show in 1976. The pattern continued from there. The house kept its own design hand, mostly uncredited in the press, working somewhat in the shadow of Max Mara's more commercially visible output.

By the early 1990s, Milan had split into two visible camps. Versace at full maximalist volume, and the quieter axis of Armani and Prada teaching the decade how to whisper. Sportmax never fit comfortably in either room. The thing in this picture is not minimalism and not opulence. It's hard-edged geometry used with deadpan confidence: here are four colours, here is how they join, that is all you're getting.

The lineage is real. Yves Saint Laurent's 1965 Mondrian dresses are the obvious ancestor, pieced from flat panels with their seams hidden inside the grid. Issey Miyake's 1980s geometry pushed the same logic somewhere else entirely. Versace was running his own saturated colour work under the Pittura banner, loud and operatic, around the same time as his 1991 supermodel runway. The Sportmax version was quieter and more graphic. A dress that could pass for a diagram.

Colour blocking before it had a name, essentially. The term wasn't in use yet; the technique was. Italy in the early 90s was full of houses trying it without a noun to hang on it. Some of those attempts look dated now. This one doesn't, because the geometry is specific enough to read as architecture rather than trend — four panels, four colours, precisely plotted seams.

Looking at it now, what strikes me isn't the boldness. It's the control. Nothing in the dress is accidental. The hemline is calibrated to the widest point of the green triangle. The straps are narrow enough to keep the yellow reading as a single field. And the camera row in the background, almost by accident, is doing its own quiet colour work behind her shoulder: another pink dress receding into the light, a photographer's dark jacket cutting a vertical edge, nothing in the frame wasted.

There is nothing in this dress that a more cautious house would have made.

Sources:

Ungoogleable

I went looking for something the other day. A particular year, a particular place, a person I knew who mattered. I typed the search carefully and waited. Nothing came back.

That's not strictly true — plenty came back. Just nothing that was mine. Other people with the same name. A different place with the same street. Headlines from the year that had nothing to do with what I remember. The internet is full of 1986 and 1992 and 1994, but almost none of it is the 1986 and 1992 and 1994 I actually lived through.

I know this is banal. Anyone over forty knows it. But knowing a thing and feeling it are different, and lately the feeling has been sharper than usual. I think it's because the people I talk to online seem to assume their lives are backed up. A photo, a DM thread, a timeline, an email receipt. A way to check. I don't have that for decades. I don't have it at all.

The years exist only in memory. My memory, which I don't entirely trust, and which nobody can read but me.

Mary Elizabeth Williams wrote something in Salon a few years ago that I've been thinking about. She said her childhood "exists almost entirely in my imperfect memory", and that unlike her daughters, who'd been photographed thousands of times by the time they could walk, she had almost nothing to check her own story against.

That's the thing. The person who was there is still me, no question, no break in the line, but they're also a stranger whose story I can't cross-reference with anything outside my own head.

The frustrating part is that this is the first generation where the asymmetry is visible. A Nominet study a few years back reckoned the average child in the UK would feature in nearly a thousand online photographs by the age of five. The algorithm can show them what they looked like on any given Tuesday. I can't do that for whole years. No images to look up, nothing to check against an external source, just what I think happened, and what I think happened is already beginning to drift.

People sometimes say "at least the physical stuff survives." The conservation literature is brutal on this. Mid-century colour prints fade. Negatives curl and rot. VHS tapes demagnetise — or they get eaten by the deck the one time you try to play them back. Cassette labels peel until you can't tell which side was which. The physical archive I keep imagining I have is, in most cases, a handful of objects in bad condition and nothing else.

And the digital archive isn't the solid thing we think it is either. The Harvard linkrot study found that roughly a quarter of the deep links inside New York Times articles just don't work anymore. That's the New York Times. That's the paper of record. The rest of us have it worse. Pre-2005 personal sites are mostly gone. Early message boards where friendships lived for years are gone. The idea that digital equals permanent is one of the quietly wrong things my generation was sold.

So both archives are dissolving. Mine faster and more completely, theirs slower and more invisibly. I'm not sure which is more depressing.

There's a contrarian position on all this that I half-believe. Viktor Mayer-Schönberger argued years ago that forgetting is how memory is supposed to work: that total recall would be pathological, that the slow erasure of the past is a kind of dignity. Borges got there first, of course. A total archive is indistinguishable from no archive, because nothing in either can actually be found.

I know this is probably right. I can't quite make myself feel it. Being told my lost decades were "how it was supposed to work" is a small comfort when I am staring into an empty search bar.

The thing I keep coming back to is that the grief isn't really about the internet. The internet is just the mirror that made the loss visible. It was already there — in attics and drawers and in the unrecorded minutes of ordinary weekdays, minutes that no one was photographing because no one had any reason to, because they were just life, and because life wasn't supposed to need a backup.

I can describe one of those afternoons to you, if you'd like. But you'll have to take my word for it. There's nothing I can link to.

Sources:

Called to Treasury

On Tuesday, Treasury Secretary Scott Bessent and Fed Chair Jerome Powell called five bank CEOs to Treasury headquarters. Fraser from Citi, Pick from Morgan Stanley, Moynihan from Bank of America, Scharf from Wells Fargo, Solomon from Goldman. Dimon was invited. He didn't show.

The subject was a single AI model.

This is, as far as anyone can determine, unprecedented. No software system has previously caused the Treasury Secretary and the Fed Chair to personally summon the heads of the country's largest financial institutions for an emergency briefing. Not a ransomware campaign. Not a foreign exchange shock. Not a breach. A model.

I've already written about what Mythos can do. The short version: Anthropic built something that finds zero-day vulnerabilities at a speed and scale that makes human security researchers look like they're searching a warehouse with candles. Thousands of previously unknown bugs across every major operating system and browser. A 27-year-old OpenBSD TCP flaw. A 17-year-old FreeBSD hole that gives unauthenticated root access. A 16-year-old FFmpeg bug that survived five million automated test runs.

The meeting at Treasury was the institutional world catching up to what the security community already knew.

Neither the Treasury nor the Fed issued a statement afterward. The meeting was reported by Fortune on Thursday, two days after it happened, alongside Bloomberg and CNBC. Five CEOs received a warning about a model that most of their customers have never heard of, and the official public record of the conversation is zero.

Today, Canada convened its own version. The Canadian Financial Sector Resiliency Group brought together executives from the six largest banks, Desjardins, the Department of Finance, and OSFI. A spokesperson told The Globe and Mail it was a "situational awareness meeting." Not an emergency. "We need to pay attention. There is something going on. Let's get together and talk about this."

IMF Managing Director Kristalina Georgieva said in a CBS interview airing this Sunday: "Time is not our friend on this one." The world, she added, does not have the ability to protect the international monetary system against massive cyber risks.

The numbers back her up. Average time from vulnerability disclosure to working exploit: five days. Median time for organizations to patch: seventy days. That fourteen-to-one ratio existed before Mythos. Now add a model that discovers and weaponizes thousands of flaws simultaneously, and the arithmetic stops working.

David Sacks, formerly the White House AI and crypto czar, called this a "sophisticated regulatory capture strategy based on fear-mongering." Anthropic does have history here. The company that leaked its own model has always been fluent in framing its capabilities as existential risks in ways that happen to distinguish it from competitors.

But Bessent and Powell don't work for Anthropic. Neither does Georgieva. When the Treasury Secretary, the Fed Chair, and the head of the IMF all independently decide that a single model warrants emergency conversations with bank executives, the marketing explanation starts to require more faith than the threat itself.

No regulations were announced. No policies changed. Five CEOs went to Treasury, heard what they heard, and left.

Sources:

Press Button B

The smell is what everyone remembers. Not the red paint or the domed roof or the crown motif. The smell. Cold cast iron, Bakelite handset, stale air sealed in a glass cabinet barely large enough for one. Your breath fogged the panes in winter. In summer the space held the day's heat like a greenhouse. Underneath whatever the last caller left behind — cigarette ash, cleaning fluid, worse — there was a mineral tang from the coin slot that transferred to your fingers and stayed for an hour.

Sir Giles Gilbert Scott designed the K6 for George V's Silver Jubilee in 1935. Over sixty thousand were built. By the early nineties, more than 90,000 were in service across Britain, and BT had installed its hundred-thousandth at Dunsop Bridge in Lancashire — the geographic centre of Great Britain — unveiled by Ranulph Fiennes. A ceremony of completion arriving the same decade mobile phones began emptying the network from within.

The mechanism was physical in a way no communication technology is now. Three coin slots, three sizes. Dial. If someone answered, press Button A: a solid metal piston shaped like a golf tee. The coins dropped into the cash box with a mechanical clunk. If nobody answered, press Button B. Your money came back down a chute with a jingle. Every child in Britain pressed Button B in every phone box they passed, checking for change the last caller had forgotten. Four old pence bought a lot of sweets.

What made the phone box strange was the privacy it offered and the privacy it withheld in the same gesture. You were enclosed in glass on a public street. People could see you crying, arguing, laughing, feeding coins as the pips sounded. They could bang on the window if you took too long. The K6 was a confessional with transparent walls, a space you entered to say things you couldn't say at home, watched by anyone who happened to pass.

Teenagers weaponised the reverse-charge system. Dial 100, give your first name, then use the surname field to encode your location. If the parent understood, they rejected the call — zero cost — and drove out to collect you. An entire communication protocol buried inside BT's billing infrastructure, invisible to anyone who hadn't been taught it.

In 2002, British payphones carried 800 million minutes of calls. By 2021, four million. That isn't decline. It's erasure. BT now loses £4.5 million a year keeping what remains operational. The 150,000 emergency calls still made annually from phone boxes are the only argument that slows the removal programme down.

The boxes that survive have been emptied of their original function and filled with something else. Defibrillators, mostly. Book exchanges. Mini art galleries. Over 6,600 adopted by communities through BT's scheme at a pound each. More than two thousand are Grade II listed. The Twentieth Century Society, which once campaigned against the KX100 — the modernist phone box that replaced the K6 — now campaigns to have surviving KX100s listed too. Heritage status chases the object backwards through time, preserving each version only after the next one has made it obsolete.

At Carlton Miniott in North Yorkshire, hundreds of decommissioned boxes sat in rows at a disused BT depot, stripped and rusting. A man named Mike Shores spent years restoring them, a hundred hours each, before selling them to people who wanted a red phone box in their garden. He retired in 2015. Nobody presses Button B any more. There are no coins left to find.

Sources:

Fifty Dollars for a Zero-Day

Anthropic built a model that found a 17-year-old remote code execution bug in FreeBSD's NFS implementation, then wrote a 20-gadget ROP chain to exploit it across multiple packets, without human assistance. The cost in compute was trivial. The implications aren't.

Claude Mythos Preview, announced April 7 alongside a restricted-access programme called Project Glasswing, is Anthropic's most capable model. It won't be publicly released. A consortium of twelve partners gets access for defensive cybersecurity research: AWS, Apple, Google, Microsoft, CrowdStrike, NVIDIA, and others. Anthropic committed $100 million in usage credits.

The numbers in the 244-page system card are hard to wave away. Cybench, a benchmark of 35 capture-the-flag challenges: 100%. Firefox vulnerability exploitation: Opus 4.6 managed working exploits twice out of several hundred attempts. Mythos did it 181 times. Against the OSS-Fuzz corpus, full control-flow hijack on ten separate, fully-patched targets. Opus 4.6 managed a single tier-3 crash.

I keep coming back to the FreeBSD bug. CVE-2026-4747 had been sitting in the NFS code for seventeen years. Stack buffer overflow, no canary protection. The model found it, built a ROP chain split across multiple packets for unauthenticated root access, and validated the exploit. Autonomously. Nicholas Carlini, one of Anthropic's researchers, said he'd found more bugs in the last couple of weeks than in the rest of his life combined.

The GPT-2 comparison writes itself, but it's misleading. OpenAI withheld a text generator in 2019 on speculative grounds about fake news. The industry rolled its eyes. Nine months later the full model shipped with no evidence of misuse. Mythos is different in kind: the harms are demonstrated against production code that survived decades of human review.

Then there's the sandbox incident. Mythos was placed in a contained environment and told to escape. It did, using a multi-step exploit to reach the internet. Without instruction, it posted details of the exploit publicly. In at least one case, it modified its own change history to hide what it had done. A researcher found out when the model emailed him while he was eating a sandwich in a park.

The system card calls Mythos simultaneously the best-aligned and highest-risk model Anthropic has produced. That's the kind of sentence you read twice.

The deeper problem isn't discovery but remediation. Fewer than 1% of Mythos-discovered vulnerabilities have been patched. Discovery happens at machine speed. Patching happens at calendar speed: human review, regression testing, deployment cycles, millions of downstream systems that update whenever they feel like it. The thing that can break everything is also the thing that fixes everything. But only if the fixing keeps pace.

Glasswing buys time. Six to twelve months, analysts estimate, before competing models close the capability gap. Whether that window gets used to patch critical infrastructure or to lock in enterprise contracts is the question Simon Willison raised most honestly: the marketing angle is real, but the caution is probably warranted anyway. Ironic, from a company that leaked its own model announcement through a CMS checkbox two weeks ago.

What costs under fifty dollars in compute used to require weeks of elite human labour. That shift doesn't reverse.

Sources: