<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Epiphanies of a Bipolar Autist]]></title><description><![CDATA[General contrarian currently fixated on LLMs. Feedback & knowledge is the lifeblood of a blog author. Please let me know what you think & feel.]]></description><link>https://judahmeek.com</link><image><url>https://substackcdn.com/image/fetch/$s_!XQDa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1df31-9707-437c-8516-6cc5d80340a5_1280x1280.png</url><title>Epiphanies of a Bipolar Autist</title><link>https://judahmeek.com</link></image><generator>Substack</generator><lastBuildDate>Mon, 04 May 2026 02:40:22 GMT</lastBuildDate><atom:link href="https://judahmeek.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Epiphanies of a Manic Autist]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[judahmeek@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[judahmeek@substack.com]]></itunes:email><itunes:name><![CDATA[Judah Meek]]></itunes:name></itunes:owner><itunes:author><![CDATA[Judah Meek]]></itunes:author><googleplay:owner><![CDATA[judahmeek@substack.com]]></googleplay:owner><googleplay:email><![CDATA[judahmeek@substack.com]]></googleplay:email><googleplay:author><![CDATA[Judah Meek]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Open Source faces multiple threats, but the fix is simple]]></title><description><![CDATA[It's simple, but you might hate it.]]></description><link>https://judahmeek.com/p/we-need-frogs-to-defend-foss</link><guid isPermaLink="false">https://judahmeek.com/p/we-need-frogs-to-defend-foss</guid><dc:creator><![CDATA[Judah Meek]]></dc:creator><pubDate>Sun, 25 Jan 2026 02:08:37 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XQDa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1df31-9707-437c-8516-6cc5d80340a5_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you&#8217;re already aware of the issues that the open source community is facing, feel free to skip to <a href="https://judahmeek.com/i/185686177/my-proposed-solution">my proposed solution</a>.</p><p>Open source projects frequently face a &#8220;silent crisis&#8221; where critical software is abandoned, or &#8220;goes end-of-life&#8221; (EOL), because maintainers become burned out by the overwhelming demands of unpaid labor, security vulnerabilities, and, more recently, a flood of AI-generated spam pull requests.</p><h4><strong>Examples of FOSS projects impacted by Burnout</strong></h4><p>Here are notable open-source projects that have shut down, been archived, or faced severe disruption due to maintainer overload:</p><ul><li><p><strong>Ingress NGINX</strong> (November 2025) </p><p>Status: Retiring (no security patches after March 2026).</p><p>Reason: Despite being one of the most popular Kubernetes components, it was maintained by only a few people working on their free time. In the two years this concern has been publicized, almost nobody has stepped up to help.</p><p>Source: <a href="https://www.theregister.com/2025/12/02/ingress_nginx_opinion/">https://www.theregister.com/2025/12/02/ingress_nginx_opinion/</a></p></li><li><p><strong>FFmpeg</strong> (Fall 2025)</p><p>Status: Pissed off at Google &amp; https://x.com/theo (Twitch Creator?)</p><p>Reason: Another piece of critical open-source infrastructure, FFmpeg regularly gets bug reports &amp; feature requests by corporate users who are unwilling to contribute in a meaningful way.</p><p>Source: The conversation on Twitter ending with </p><div class="twitter-embed" data-attrs="{&quot;url&quot;:&quot;https://x.com/theo/status/1952441894023389357&quot;,&quot;full_text&quot;:&quot;<span class=\&quot;tweet-fake-link\&quot;>@FFmpeg</span> You clearly have no idea how much of my history was in ffmpeg. I built a ton of early twitch infra on top of yall.\n\nI&#8217;m not talking out of my ass. I&#8217;m complaining that a valuable piece of software can&#8217;t even play a fucking video recorded on an iPhone because &#8220;v4 soon&#8221;&quot;,&quot;username&quot;:&quot;theo&quot;,&quot;name&quot;:&quot;Theo - t3.gg&quot;,&quot;profile_image_url&quot;:&quot;https://pbs.substack.com/profile_images/1909353910130950147/EeSGdgA5_normal.jpg&quot;,&quot;date&quot;:&quot;2025-08-04T18:49:56.000Z&quot;,&quot;photos&quot;:[],&quot;quoted_tweet&quot;:{},&quot;reply_count&quot;:29,&quot;retweet_count&quot;:9,&quot;like_count&quot;:996,&quot;impression_count&quot;:202019,&quot;expanded_url&quot;:null,&quot;video_url&quot;:null,&quot;belowTheFold&quot;:false}" data-component-name="Twitter2ToDOM"></div><p>Also, <a href="https://news.ycombinator.com/item?id=45891016">https://news.ycombinator.com/item?id=45891016</a></p></li><li><p><strong>External Secrets Operator</strong> (November 2025)</p><p>Status: Froze all updates. (Has since resumed releases - Excellent example of how systems can evolve through moments of crisis)</p><p>Reason: Four main maintainers burned out simultaneously, leaving only one active contributor. This occurred despite the project having corporate sponsors, highlighting that &#8220;money doesn&#8217;t write code&#8221; when the human team is exhausted.</p><p>Source: <a href="https://github.com/external-secrets/external-secrets/issues/5084">https://github.com/external-secrets/external-secrets/issues/5084</a></p></li><li><p><strong>XZ Utils</strong> (September 2024 - near-shutdown)</p><p>Status: Almost entirely taken over by malicious actors.</p><p>Reason: The original maintainer, Lasse Collin, suffered from severe burnout and mental health issues, reducing his ability to care for the project. Malicious actors, under the name Jia Tan, exploited this, using fake accounts to pressure him, eventually gaining trust and commit access to insert a backdoor.</p><p>Source: <a href="https://news.ycombinator.com/item?id=39891607">https://news.ycombinator.com/item?id=39891607</a></p></li><li><p><strong>Node-pre-gyp</strong> (May 2022)</p><p>Status: Maintained in a &#8220;limbo&#8221; state for nearly two years.</p><p>Reason: Primary maintainer Dane Springmeyer announced he was stepping down after nearly a decade of handling this critical tool in the Node.js ecosystem, causing a backlog of unresolved issues and security concerns.</p><p>Source: <a href="https://github.com/mapbox/node-pre-gyp/issues/657">https://github.com/mapbox/node-pre-gyp/issues/657</a></p></li><li><p><strong>Faker.js</strong> (January 2022)</p><p>Status: Deliberately corrupted by the author.</p><p>Reason: Author Marak Squires broke his own library and replaced it with a message saying &#8220;Pay me&#8221; after growing tired of maintaining a widely used library for free, used by Fortune 500 companies.</p><p>Source: <a href="https://news.ycombinator.com/item?id=29863672">https://news.ycombinator.com/item?id=29863672</a></p></li><li><p><strong>Spree</strong> (2014)</p><p>Status: Abandoned by its original, sole maintainer.</p><p>Reason: Ryan Bigg, the sole maintainer of the e-commerce project used by major companies, found the daily demands &#8220;insurmountable&#8221; and affecting his mental health, leading him to stop maintaining it.</p><p>Source: <a href="https://archive.is/vQds4">https://archive.is/vQds4</a></p></li></ul><h4><strong>Examples of FOSS projects impacted by AI Slop</strong></h4><p>Several major open-source projects have taken action against a deluge of low-quality, AI-generated contributions&#8212;often referred to as &#8220;AI slop&#8221;&#8212;that have overwhelmed maintainers with fake bug reports and, in some cases, paused external contributions. </p><p>Here are the projects identified as having taken, or considering, such actions:</p><ul><li><p><strong>curl</strong>: Lead maintainer Daniel Stenberg announced the winding down of the project&#8217;s bug bounty program in January 2026 to combat a &#8220;torrent of AI slop&#8221; and, specifically, to remove the incentive for submitting &#8220;crap, non-well researched reports&#8221;. The project was receiving multiple, often inaccurate, AI-generated reports daily.</p><p>Source: <a href="https://daniel.haxx.se/blog/2025/07/14/death-by-a-thousand-slops/">https://daniel.haxx.se/blog/2025/07/14/death-by-a-thousand-slops/</a></p></li><li><p><strong>Tldraw</strong>: This project paused external contributions in January 2026, explicitly citing issues with AI-generated spam and low-quality PRs.</p><p>Source: <a href="https://news.ycombinator.com/item?id=46641042">https://news.ycombinator.com/item?id=46641042</a></p></li><li><p><strong>QEMU</strong>: This virtualization project adopted a formal policy in 2025 to reject all AI-generated code contributions. The decision was driven by legal concerns as AI-generated code may not satisfy the copyright and licensing requirements needed for official inclusion.</p><p>Source: <a href="https://shujisado.org/2025/07/02/how-can-open-source-projects-accept-ai-generated-code-lessons-from-qemus-ban-policy/">https://shujisado.org/2025/07/02/how-can-open-source-projects-accept-ai-generated-code-lessons-from-qemus-ban-policy/</a></p></li><li><p><strong>Ghostty</strong>: In January 2026, the terminal emulator banned all unattributed AI contributions. Under its updated policy, &#8220;drive-by&#8221; AI PRs are closed without review, and users submitting poor AI-generated content face permanent bans.</p><p>Source: <a href="https://news.ycombinator.com/item?id=46730504">https://news.ycombinator.com/item?id=46730504</a></p></li><li><p><strong>LLVM</strong>: Similar to curl, this project reported being forced to wade through an increasing amount of AI-generated junk to find legitimate contributions.</p><p>Source: <a href="https://news.ycombinator.com/item?id=46440833">https://news.ycombinator.com/item?id=46440833</a></p></li></ul><h4><strong>Why the FOSS community is under attack</strong></h4><p>The FOSS community grew organically out of a small group of professionals &amp; academics, starting way back before the internet even existed (Actually, I don&#8217;t have evidence of this. I know internet was developed in the early 1970&#8217;s as ARPAnet &amp; I assume that source code was freely shared even before then.)</p><p>In a small group, social norms can be enforced through social means.</p><p>So the FOSS community was able to develop a very idealistic set of social expectations, where there was no need for gatekeepers &amp; contributions could be reimbursed through recognition alone.</p><p>As the technical community scaled &amp; diluted into popular culture (&amp; as open-source projects became the backbone of corporate products), the need for gatekeepers (project maintainers) increased while the reward for gatekeeping plummeted.</p><p>Up until the invention of LLMs, this remained almost manageable: many maintainers found ways to be  reimbursed for their subject matter expertise in a manner that they found acceptable. However, in cases where the emotional rewards were not actually adequate or the demands made were just entirely too high, burnout occurred.</p><p>LLMs make this situation much, much worse by massively increasing demands for support as well as reviews of pull requests &amp; bug reports, while also seizing the attention economy that reimbursed many maintainers financially.</p><h4><strong>My Proposed Solution</strong></h4><p>A universally accepted unit of value measurement: Money.</p><p>Without a quantifiable unit of value, there can&#8217;t be any enforcement of economic exchange. You can&#8217;t regulate demand by increasing prices &amp; you can&#8217;t ensure that maintainers receive the rewards for their efforts that keep burnout at bay.</p><p>The cause of AI slop spam &amp; corporations parasitically relying on open source is both due to a lack of economic enforcement.</p><p>Enforce that value of maintainers&#8217; time &amp; effort must be demonstrated &amp; these issues will vanish almost instantly.</p><h4>Answers to Expected Questions</h4><ul><li><p>Q: What about those brilliant, but indigent students trying to gain recognition through their first PR? Or security vulnerability reports, which we seek to financially incentivize?<br>A: Enable people to gamble on whether a PR or security vulnerability is worth reviewing. This is the perfect problem for a prediction market. Bug report rewards may need to be slightly increased to balance out increased cost of submission.</p></li><li><p>Q: What about when we get too many security vulnerability reports, like FFmpeg was receiving from Google?<br>A: A crowd-sourced bounty system would help maintainers determine what the user community believes should be prioritized.</p></li><li><p>Q: Will financial reimbursement for open source contributions complicate my taxes or government benefits?<br>A: Use a system that enables your contribution reward to be redirected to the nonprofit of your choice.</p></li><li><p>Q: What alternatives are there to money?<br>A: https://github.com/hanzili/slopscore has some good ideas for identifying spam based off of user metrics, but I&#8217;m not aware of solid alternatives for resisting burnout or corporate parasites.</p></li><li><p>Q: Does an implementation for any of this exist yet?<br>A: I have a fledgling repository <a href="https://github.com/Judahmeek/frogs">here</a> for proof of concept &amp; dogfooding. Other similar projects I found included <a href="https://github.com/gov4git/gov4git">Gov4Git</a>, which focuses more on consensus mechanisms, &amp; <a href="https://github.com/drips-network/app">DRIPS</a>, which focuses more on sponsorship (although their Ethereum infrastructure could be very useful)</p></li></ul><p>That&#8217;s all I got. Thanks for coming to my TED talk.</p><p>Oh, and I&#8217;m looking for work as a systems designer. You can check <a href="https://docs.google.com/document/d/1dPHoDOKpKiGcqv1lGT3eeDDMRchNtbbCU7wdxE4eUmY/edit?usp=sharing">my resume</a> for implementation details that I&#8217;m familiar with, but I&#8217;m confident I can learn any language or framework. I&#8217;m particularly interested in improving human organization through performance metric &amp; incentive modification.</p>]]></content:encoded></item><item><title><![CDATA[Why credibility vouching networks are the future]]></title><description><![CDATA[No bot is getting my referral any time soon]]></description><link>https://judahmeek.com/p/why-credibility-vouching-networks</link><guid isPermaLink="false">https://judahmeek.com/p/why-credibility-vouching-networks</guid><dc:creator><![CDATA[Judah Meek]]></dc:creator><pubDate>Thu, 18 Dec 2025 10:40:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XQDa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1df31-9707-437c-8516-6cc5d80340a5_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If you haven&#8217;t already, go read about <a href="https://judahmeek.com/p/my-first-day-as-a-technical-interview">my experience as a tech interview proxy for remote job scam artists (probably North Koreans)</a>.</p><p>One of <a href="https://judahmeek.com/i/181973278/recommendations">the big take-aways of that article</a> is that a credibility network built through LinkedIn recommendations is one of the strongest possible safeguards against scam artists trying to steal remote jobs.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>But the value of credibility networks doesn&#8217;t stop there: since any credibility network that actually wants to be credible has to avoid contamination by bots, you automatically get a network of strong, human signals for products &amp; services once this problem is solved.</p><p>One of the areas that I really want to see a credibility network take off is in the arena of politics, especially if I can integrate that credibility network with <a href="https://pol.is/home">Pol.is</a>.<br><br>Another area where I think credibility networks could enable a more authentic &amp; individualistic approach is <a href="https://www.linkedin.com/in/judahmeek/overlay/50640289/single-media-viewer?type=DOCUMENT&amp;profileId=ACoAAAWFImsBtf8tA6L00TDM-ggZ0nO-5Sb4Ymk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base%3BWUeHAri2QFugRSrXp3qCuQ%3D%3D">in education</a>.</p><p>An advisor of mine &amp; I actually think that we have a potential solution, one that could be built on <a href="https://www.nethermind.io/">the Ethereum blockchain</a> for some serious transparency &amp; credibility of its own. Who knows? It might even be one of the foundational platforms of Web3.</p><p>If you have been looking for an actual socially positive service built on blockchain tech or are interested in a potentially radical reinterpretation of American politics, then hit me up on LinkedIn, Twitter, or any other platform that Google will happily inform you I can be found on.<br><br>I&#8217;m looking for feedback, questions, technical critiques, &amp; collaboration.</p><p>As always, let me know your thoughts!</p><p>I hope to hear from you soon!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[My first day as a technical interview proxy for North Korea]]></title><description><![CDATA[First week and a half, actually...]]></description><link>https://judahmeek.com/p/my-first-day-as-a-technical-interview</link><guid isPermaLink="false">https://judahmeek.com/p/my-first-day-as-a-technical-interview</guid><dc:creator><![CDATA[Judah Meek]]></dc:creator><pubDate>Thu, 18 Dec 2025 10:19:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XQDa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1df31-9707-437c-8516-6cc5d80340a5_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>TL;DR</strong></h4><p>Scam artists, some from North Korea, are targeting remote jobs for salaries &amp; corporate espionage &amp; my insider experience suggests that hiring companies could be doing a lot more to defend themselves against scammers. See <a href="https://judahmeek.com/i/181973278/recommendations">my recommendations</a> below!</p><h4><strong>The Start of My Adventure</strong></h4><p>At approximately 11:56 AM on December 9th, 2025, while I was browsing the Internet on my laptop at my girlfriend&#8217;s apartment, I was contacted through Slack on the <a href="http://reactrails.slack.com">ReactOnRails Slack workspace</a> by a man who said he wanted to discuss a great opportunity with me.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Since I was a little manic at the moment, I agreed to video conference and send him a Google Meet link. On Google Meet, I found myself talking to an Asian man, possibly Korean, with purple colored hair, who used the username Samuel Miller. This man first requested a link to my LinkedIn profile, which he quickly reviewed. He then informed me of his opportunity, which he described as a &#8220;work proxy service&#8221;: he said he connected to United States developers with developers overseas, who would work under the table, enabling the United States developer to acquire multiple jobs. Income from those jobs would be split 30% to the overseas developers, 30% of this man (Samuel Miller), and 40% to me. He asked if I felt comfortable with this and I assured him that I was here, then he sent me a phone number and asked me to connect to it on WhatsApp. I did so and then I was sent a message that he said out loud.</p><p>However, in hindsight, I believe that I was communicating with someone else through WhatsApp as their English fluency was flawless while the person I communicated with on Slack skipped some words and had to ask me to clarify my statement that &#8220;I&#8217;m curious&#8221;, which was my initial response to hearing about this great opportunity. I was then sent a r&#233;sum&#233; through WhatsApp and the man on Google Meet asked me if I would be comfortable using the name and details of the r&#233;sum&#233; during an interview, which he said that he had already scheduled for me. Again, I assured the man that I was comfortable with all the details I had received thus far.</p><p>The man then shared his screen on Google Meet and showed me a weekly calendar full of appointments, then asked me when was the soonest that I could start. I told him I could start the next day. The man then ended the meeting, saying that he look forward to working with me. Shortly afterward I was asked on WhatsApp and asked if I was comfortable using ChatGPT or another AI to &#8220;cheat&#8221; in interviews involving languages outside of my professional experience, such as Java or Go.</p><p>(If this recap here looks weird, I&#8217;m largely just dictating the police affidavit that I wrote. Feel free to do an open records request with East Texas A&amp;M University re Incident #251209012A for more details.)</p><h4><strong>Since Then</strong></h4><p>...I have been assigned interviews by my handlers at 12 different companies: Here&#8217;s <a href="https://docs.google.com/spreadsheets/d/1fgxa33L21RSk_ryMorVmET1ngNU3QDYv02eLnU4ZVL8/edit?usp=sharing">a copy of the latest Google Spreadsheet revision</a>.</p><p>* I warned <a href="https://www.linkedin.com/in/kevin-campbell-67362a30/">Kevin Cambell with Yahoo</a>. He seemed to have a hard time getting out of the interviewer mindset. I will always remember, after I told him a short summary of my story, his reply of &#8220;It sounds like you really don&#8217;t want the role...&#8221;. No shit, Kevin.</p><p>* I warned <a href="https://www.linkedin.com/in/monika-oswal/">Monica Oswal with Xero</a>. She got it. I actually think she already knew there was something wrong with the application.</p><p>* I warned <a href="https://www.linkedin.com/in/collin-allison-a460714a/">Collin Allison with Tractian</a>. Blew his fucking mind, but he assured me that he had seen bait &amp; switch tactics like this before with H1B&#8217;s &amp; would be sure to improve his recruiting strategy accordingly. I sure hope so as Tractian looks like <a href="https://tractian.com/en/resources/videos/vibration-sensor/rd-features">they are working on some bleeding edge tech</a>.</p><p>* I warned <a href="https://www.linkedin.com/in/shmaclean/">Sheila MacLean with SysDig</a>. Blew her mind as well, which was kind of funny since SysDig is all about Cybersecurity. But she &amp; SysDig handled it well, with <a href="https://www.linkedin.com/in/stfnrchndr/">Stefan Reicheneder, their head of Security &amp; Compliance</a> reaching out himself to request further information.</p><p>* I warned <a href="https://www.linkedin.com/in/kaitlinpham/">Kaitlin Pham</a> who was recruiting for <a href="https://carrumhealth.com/">Carrum Health</a>. Blew her mind also, but she asked for all the details &amp; handled it like a real pro. If <a href="https://www.linkedin.com/company/boulevardrecruiting/">Boulevard Recruiting</a> has more like her, then I know who I would want handling my company&#8217;s recruiting for remote jobs.</p><p>* I warned <a href="https://www.linkedin.com/in/kleinjm/">James Klein with EscrowSafe</a>. He handled it well &amp; later told me through LinkedIn that he had alerted his entire team, who couldn&#8217;t believe that I would do such a public service without getting something out of it. I told James that I did everything for this awesome blog post. It is awesome, right? &#129402;</p><p>* <a href="https://www.linkedin.com/in/hannah-xu/">Hannah Xu with ITC</a> canceled our interview before it even began. I&#8217;m curious if there was any particular type of red flag that caught her attention.</p><p>* I tried warning Avery, ITC&#8217;s AI interviewer. Not sure if I succeeded, because I played most of the interview straight (never hurts to get free practice, right?)</p><p>* I warned <a href="https://www.linkedin.com/in/shaoyen-chang/">Shaoyen Chang</a> &amp; <a href="https://www.linkedin.com/in/chavalimanoj/">Manoj Chavali</a> of <a href="https://www.synchrony.com/">Synchrony</a>. Chang said that he had noticed one yellow flag, which was that the fake resume seemed really heavy for the particular role that they were trying to fill. One of the shortest technical interviews I&#8217;ve ever had.</p><p>* I warned <a href="https://www.linkedin.com/in/ryankolatalo">Ryan Kolatalo with Dick&#8217;s Sporting Goods</a>. He was a good sport (sorry &#128517;) and offered me the role any way, but it was focused on Database Administration with SQL Oracle, so a bit outside my comfort zone (I&#8217;m pretty comfortable with basic SQLite3 &amp; Postgresql features, although RubyOnRails&#8217; ORM usually makes it so I don&#8217;t have to consider which relational database I&#8217;m actually using).</p><p>* I warned <a href="https://www.linkedin.com/in/samratjp">Samrat Jeyaprakash</a>, <a href="https://www.linkedin.com/in/marcela-colimodio">Marcela Colimodio</a>, <a href="https://www.linkedin.com/in/taniaaguirre">Tania Aguirre</a>, and <a href="https://www.linkedin.com/in/marco-cornejo">Marco Cornejo</a> of <a href="https://www.linkedin.com/company/tramcase/">Tram Case</a> through LinkedIn&#8217;s Sale Navigator after <a href="https://www.linkedin.com/in/samratjp">Samrat, Tram Case&#8217;s CTO</a>, skipped out on an interview we were supposed to have. Not that an interview with a CTO is that big a deal when Tram Case only has 8 or so employees, but I was still looking forward to saying I warned a member of the C-suite in-person. Maybe next time &#129394;</p><p>* I warned <a href="https://www.linkedin.com/in/tjanss">Todd Janss with Aha!</a>. <a href="https://www.aha.io/">Aha!</a> seems like a really awesome company for someone like me, just bursting with manic ideas, so I&#8217;m really glad that Todd took my report seriously and said that he would keep an eye out for the scammer signals that I mention in <a href="https://judahmeek.com/i/181973278/recommendations">the recommendations section</a> below.</p><p>* I warned <a href="https://www.linkedin.com/in/elaine-chai-0a2188316/">Elaine Chai with Temu</a>. This interview was a bit of a surprise to me until <a href="https://www.linkedin.com/in/elaine-chai-0a2188316/">Elaine</a> explained that <a href="https://www.efulfillmentservice.com/2025/12/temu-as-a-marketplace-a-growing-opportunity-for-u-s-sellers/">Temu</a> is expanding out of China into the U.S. &amp; Ireland for data sovereignty reasons.</p><p>* I warned <a href="https://www.linkedin.com/in/hanna-niapas-209b2a174/">Hanna Niapas with Groq</a>. She handled the situation well &amp; demanded I let her know as soon as my blog post was published!</p><p>* I warned <a href="https://www.linkedin.com/in/kylebrazeau/">Kyle Brazeau with SafelyYou</a>. This interview didn&#8217;t go too well for me because Kyle already had his guard up. Seems like he had already identified some flags within the resume itself. Kyle, I hope this blog post provides a better explanation than I did through Google Meet. &#128517;</p><p>* I warned <a href="https://www.linkedin.com/in/johnedwardsamuelson/">John Samuelson with his stealth startup</a>. He was pretty surprised, but he handled it well. Finally got my C-suite interview! &#128526;</p><p>* I warned <a href="https://www.linkedin.com/in/aburnsrecruiter/">Anna (Burns) Ciell with Zus Health</a>. She welcomed the information I provided her, saying that it helped explain certain patterns that she had been seeing in recent applicants. More details in <a href="https://judahmeek.com/i/181973278/recommendations">the recommendations section</a> below!</p><p>I&#8217;ll update with more interviews for as long as these scammers let me interview for them. It&#8217;s not looking good for me, however, as my handlers have noted that none of the companies I&#8217;ve interviewed with have provided them with a positive update. &#128517;</p><p>In addition to interviews, these scammers have also said that they are sending me a fake I.D. so I can perform drug screens for background checks. They have also asked me to embellish my UpWork &amp; LinkedIn profiles (They apparently have better luck with UpWork than LinkedIn right now, to no one&#8217;s surprise). And finally, they have asked me to create a LLC bank account so that I can send or receive funds through Relay.</p><h4>Links to actual fake LinkedIn Profiles</h4><p><br>Here&#8217;s every LinkedIn profile url from the fake resumes I was given:</p><ul><li><p><a href="https://www.linkedin.com/in/andrew-johnson-b277a955/">https://www.linkedin.com/in/andrew-johnson-b277a955/</a></p></li><li><p><a href="https://www.linkedin.com/in/ben-roble/">https://www.linkedin.com/in/ben-roble/</a> last name on resume is robles, however.</p></li><li><p><a href="https://www.linkedin.com/in/benjamin-weston-9166a374">https://www.linkedin.com/in/benjamin-weston-9166a374</a></p></li><li><p><a href="https://linkedin.com/in/joey-scales-b04a89ab">https://linkedin.com/in/joey-scales-b04a89ab</a></p></li><li><p><a href="https://www.linkedin.com/in/michael-nevels-6b97b175">https://www.linkedin.com/in/michael-nevels-6b97b175</a></p></li><li><p><a href="https://www.linkedin.com/in/alexander-howard-18a969138/">https://www.linkedin.com/in/alexander-howard-18a969138/</a></p></li><li><p><a href="https://www.linkedin.com/in/mattodevs/">https://www.linkedin.com/in/mattodevs/</a> (Matthew Owens)</p></li><li><p><a href="https://linkedin.com/in/toby-shepherd-463a6570">https://linkedin.com/in/toby-shepherd-463a6570</a></p></li><li><p><a href="https://linkedin.com/in/renaldopierrelouis">https://linkedin.com/in/renaldopierrelouis</a></p></li></ul><h4><strong>Recommendations</strong></h4><p>* A strong signal that will be short-lived is that a scam artists are generally using LinkedIn profiles that have no profile picture. Scammers avoid profile pictures because they don&#8217;t want to have to update the picture whenever changing proxies (LinkedIn: y&#8217;all need to enable users to see how often a profile picture changes.)</p><p>* Also lack of LinkedIn recommendations by real people or only having recommendations that don&#8217;t talk about having face-to-face, in-person communication is another red flag. In fact, Anna Ciell points out that this discrepancy applies to anything that requires time to build: scam profiles are unlikely to have many LinkedIn connections or a github account that has any real activity.</p><p>* The names of the LinkedIn profiles are generally reused because they are connected to actual people in order to pass background checks. Therefore, any LinkedIn profile that doesn&#8217;t have a unique name or has numbers in their URL gets a yellow flag, especially if some of the other LinkedIn profiles with similar names look sus.</p><p>* A valuable safeguard would be requiring every candidate to send a message from their LinkedIn profile to you during the intro interview (or, better yet, to call you by phone while on video), because I assume that other interview proxies do not currently have access to the email, phone, or LinkedIn profiles listed on the resumes, as our handlers control all forms of communication with the companies outside of the interviews themselves.</p><p>* Scam artists will adapt to every single safeguard you create, so please assume that each of my suggestions has a relatively short shelf-life. LinkedIn recommendations from real people talking about in-person interaction is by far the most secure, yet rarest green flag.</p><p>* Scam artists build their resumes specifically for automated screening systems. Maybe it&#8217;s time that we start focusing on the resumes that get filtered out instead? You know, like how a chess grandmaster will sometimes start with a suboptimal opening move to throw off their opponent because the optimal opening moves have been analyzed to death.</p><p>* According to my handlers: &#8220;Actually, you don&#8217;t need to talk based on resume. Resume is just resume for scheduling more interviews. In the interviews, you must pretend to have all experience with all requirements to pass the interview. This is the point.&#8221; So... maybe try asking about a framework or library that doesn&#8217;t exist? Idk. I got this coaching 14 interviews in so it might not be very relevant. &#128514;</p><p>* With the way that the job market is right now, if you have any doubt, throw the application out!</p><h4><strong>Sequel Hook</strong></h4><p>Actually, the fake I.D. has already been delivered to my house. I&#8217;ll provide more details on that once the Secret Service concludes their investigation.</p><p>I think I can get away with saying that if you work for Coinbase HR &amp; you have a job applicant, likely for senior software engineer, named &#8220;Ben Ray Robles Gomez&#8221; who is having trouble scheduling their drug screening, then you need to take a second look at everything about their application.</p><p>Also, I recently made contact with someone who says that they have been harassed by <a href="https://www.google.com/search?q=lazarus+group">the Lazarus Group</a>, so, depending on how credible his report seems, I might write up an article on that.</p><h4><strong>Finally</strong></h4><p>If you made it all the way to the bottom of my article, then you&#8217;re obviously starving for unique content, so please check out the rest of my blog &amp; subscribe for future thought-provoking articles, such as my attempt to trigger a marxist revolution in a global, remote-focused dev shop (The Russians didn&#8217;t like the idea. Lenin must be rolling in his grave right now.)</p><p>As always, let me know your thoughts!</p><p>I hope to hear from you soon!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[LLMs were never meant to be magic bullets]]></title><description><![CDATA[They are highly specialized tools, not Swiss-army knives]]></description><link>https://judahmeek.com/p/llms-were-never-meant-to-be-magic</link><guid isPermaLink="false">https://judahmeek.com/p/llms-were-never-meant-to-be-magic</guid><dc:creator><![CDATA[Judah Meek]]></dc:creator><pubDate>Thu, 18 Dec 2025 09:44:17 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XQDa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1df31-9707-437c-8516-6cc5d80340a5_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Don&#8217;t get me wrong. I believe that long language models are valuable. However, I also believe that LLMs are highly specialized and that the people are trying to use them as general problem solverd are somewhat misguided. I believe that the source of the confusion is the fact that large language models&#8217; specialty is fuzziness: they are excellent at providing fuzzy answers to fuzzy questions.</p><p>What they don&#8217;t do well is provide deterministic results, learn beyond their training data, compile comprehensive solutions, or ensure exhaustive attention to detail (but I repeat myself).</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h4>Here&#8217;s the basic, structural reasons why:</h4><p>* <strong>no deterministic results</strong>: LLMs depend on statistics combined with random number generation, otherwise known as temperature, to do their job. You can reduce the temperature, but removing it completely results in undefined behavior. Basically, randomness is part of what LLMs naturally are.</p><p>* <strong>no novelty</strong>: LLMs require processing training data to develop the statistical weights that I mentioned above. While there has been some progress made towards modifying weights based on receiving new information &amp; use of external, dynamic memory, LLM&#8217;s basic architecture relies on known information compiled some time in the past.</p><p>* <strong>no exhaustive attention to detail</strong>: there&#8217;s a number of reasons for this. First &amp; foremost, there&#8217;s the LM&#8217;s attention transformer, otherwise known as the SoftMax function. This function was originally developed to parse sentences for significance, which realistically meant dropping terms that didn&#8217;t matter that much so that more attention could be applied to the terms that mattered more. When applied to large context windows, this function might ignore entire sentences or even whole paragraphs. Worse, it does so non-deterministically, which means that you never know how a LLM might misinterpret the commands you gave it.</p><p>Don&#8217;t take my word for it. <a href="https://aistudio.google.com/app/prompts?state=%7B%22ids%22:%5B%221BqCzoNscEEENppA-226Kk6N8X6m-LnAv%22%5D,%22action%22:%22open%22,%22userId%22:%22112259516693518556888%22,%22resourceKeys%22:%7B%7D%7D&amp;usp=sharing">I&#8217;ve given AI itself the opportunity to confess its sins.</a> If that doesn&#8217;t interest you, feel free to skip down to <a href="https://judahmeek.com/i/181972017/solutions">the solutions I offer at the bottom of the post</a>.</p><h4>Conversation with Gemini 3 Preview<strong><br><br>## User</strong></h4><p>What are the structural weaknesses of large language models in the context of software development?</p><p><strong>## Gemini 3 Preview</strong></p><p>Large Language Models (LLMs) have revolutionized coding assistance, but they possess inherent <strong>**structural weaknesses**</strong> that create friction when applied to the deterministic, logical, and highly interconnected nature of software engineering.</p><p>Here is an analysis of the structural weaknesses of LLMs in the context of software development, categorized by their architectural and operational limitations.</p><p>---</p><p><strong>### 1. Probabilistic vs. Deterministic Nature</strong></p><p>The most fundamental mismatch is that software is deterministic (Input A must result in Output B), while LLMs are probabilistic (Input A leads to a statistical likelihood of Output B).</p><p>*   <strong>**The Hallucination Problem:**</strong> LLMs generate code based on statistical plausibility, not logical verification. They often invent libraries, methods, or syntax that <em>*look*</em> correct (following the pattern of the language) but do not exist.</p><p>*   <strong>**Subtle Logic Errors:**</strong> An LLM might generate code that runs without syntax errors but fails on edge cases. Because the model prioritizes the &#8220;most likely&#8221; next token, it often defaults to the &#8220;happy path,&#8221; ignoring boundary conditions, null checks, or error handling.</p><p>*   <strong>**Inconsistency:**</strong> Asking the same question twice can yield different code snippets. This lack of reproducibility makes it difficult to rely on LLMs for rigorous system design or standardizing coding practices.</p><p><strong>### 2. The Context Window Constraint</strong></p><p>LLMs operate within a finite &#8220;context window&#8221; (the amount of text they can process at once). While these windows are growing, they are not infinite.</p><p>*   <strong>**Fragmentation of Logic:**</strong> Large software systems rely on the interaction of thousands of files. An LLM usually cannot &#8220;see&#8221; the entire codebase simultaneously. It lacks the global context required to understand how a change in `Module A` might implicitly break `Module Z` via a circular dependency or a database schema change.</p><p>*   <strong>**&#8221;Lost in the Middle&#8221; Phenomenon:**</strong> Even within a large context window, attention mechanisms tend to focus on the beginning and end of the prompt. Critical constraints buried in the middle of a large documentation file or code dump are often ignored.</p><p>*   <strong>**Dependency Blindness:**</strong> The model may suggest code using a library version from its training data (e.g., Python 3.7 patterns) that is incompatible with the project&#8217;s actual environment (e.g., Python 3.12), causing &#8220;dependency hell.&#8221;</p><p><strong>### 3. Lack of a Mental Model (World Simulator)</strong></p><p>LLMs process syntax and semantics, but they do not possess a runtime environment or a &#8220;mental model&#8221; of state changes.</p><p>*   <strong>**Inability to &#8220;Execute&#8221; Code:**</strong> An LLM does not run the code it writes. It cannot mentally trace a variable&#8217;s state through a complex loop or across asynchronous calls. Consequently, it struggles with <strong>**concurrency, race conditions, and memory management**</strong>, often suggesting code that is syntactically valid but functionally broken under load.</p><p>*   <strong>**Spatial and Temporal Reasoning:**</strong> Software architecture requires planning for the future (scalability) and understanding spatial relationships (data flow). LLMs are generally reactive (predicting the next word) rather than planning-oriented, making them poor at high-level architectural design.</p><p><strong>### 4. Training Data Limitations (Temporal &amp; Qualitative)</strong></p><p>The model is only as good as the data it was trained on, leading to specific structural weaknesses in code generation.</p><p>*   <strong>**The &#8220;Knowledge Cutoff&#8221;:**</strong> Software moves faster than model training cycles. An LLM may not know about the release of a new framework (e.g., the latest Next.js features or a breaking change in AWS SDKs), leading it to suggest deprecated or insecure patterns.</p><p>*   <strong>**Regression to the Mean (Mediocrity):**</strong> LLMs are trained on the entirety of the public internet (GitHub, StackOverflow). This includes high-quality code, but also a massive amount of bad, insecure, or inefficient code. The model tends to converge on &#8220;average&#8221; solutions rather than &#8220;optimal&#8221; ones, propagating anti-patterns.</p><p>*   <strong>**Security Vulnerability Propagation:**</strong> If a significant portion of training data contains SQL injection vulnerabilities or hardcoded credentials (which is common in amateur code), the LLM may reproduce these security flaws.</p><p><strong>### 5. Blindness to Non-Functional Requirements</strong></p><p>Software development is not just about writing code that compiles; it is about maintainability, performance, and security.</p><p>*   <strong>**Lack of Intentionality:**</strong> LLMs generate code to solve the immediate prompt. They do not consider long-term maintainability, code bloat, or &#8220;DRY&#8221; (Don&#8217;t Repeat Yourself) principles unless explicitly instructed. This can lead to a codebase filled with &#8220;boilerplate&#8221; code that is hard to refactor later.</p><p>*   <strong>**Performance Ignorance:**</strong> An LLM might suggest a recursive solution that is mathematically elegant but causes a Stack Overflow error in production, or a database query that is essentially an $O(n^2)$ operation, because it doesn&#8217;t &#8220;understand&#8221; the scale at which the software will run.</p><p><strong>### 6. The &#8220;Package Hallucination&#8221; (Supply Chain Risk)</strong></p><p>A specific and dangerous structural weakness is <strong>**Software Supply Chain Hallucination**</strong>.</p><p>*   When asked to solve a specific problem, an LLM may hallucinate a package name that <em>*sounds*</em> real (e.g., `pip install pytorch-audio-processing-helper`).</p><p>*   Attackers have begun registering these hallucinated package names on repositories like PyPI and npm, injecting malware. When a developer copies the LLM&#8217;s suggestion blindly, they compromise their system.</p><p><strong>### Summary</strong></p><p>In short, the structural weakness of LLMs in software development is that they operate on <strong>**syntax and statistical correlation**</strong>, whereas software development requires <strong>**semantics, logic, and state management**</strong>. They are powerful engines for boilerplate and syntax translation, but fragile engines for logic and architecture.</p><h4><strong>Solutions</strong></h4><p>I don&#8217;t have solutions for all of LLMs&#8217; structural weaknesses, but I do think that I&#8217;ve got a solid lead on solutions for a couple pain points:</p><p>* For exhaustive search &amp; modify, try having your favorite LLM create a regex.</p><p>* For processing novel situations with deterministic results, I offer <a href="https://github.com/Judahmeek/Significance-Hypothesis-Reasoning-System">a novel executive function / belief system proof-of-concept</a> that I intend to test against <a href="https://arcprize.org/play?task=1ae2feb7">ARC-AGI-2&#8217;s public evaluation set</a>, starting with <a href="https://arc.markbarney.net/puzzles/database">all the puzzles that have yet to be solved by any LLM</a>.</p><p>* For attention to detail, I offer <a href="https://github.com/sst/opencode/issues/4986">a relevance index concept that I thought would be best tested with OpenCode or Anthropic&#8217;s Claude</a>.</p><p>I&#8217;m looking for feedback, questions, technical critiques, &amp; collaboration.</p><p>As always, let me know your thoughts!</p><p>I hope to hear from you soon!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Since when was Texas a nanny state?]]></title><description><![CDATA[I got a traffic citation for riding a bicycle]]></description><link>https://judahmeek.com/p/since-when-was-texas-a-nanny-state</link><guid isPermaLink="false">https://judahmeek.com/p/since-when-was-texas-a-nanny-state</guid><dc:creator><![CDATA[Judah Meek]]></dc:creator><pubDate>Thu, 18 Dec 2025 09:20:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!XQDa!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26b1df31-9707-437c-8516-6cc5d80340a5_1280x1280.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>I&#8217;m gonna keep this short and sweet because largely this is a personal matter, but I thought it was a uncommon one, and therefore interesting.</p><p>A little over a week ago I was crossing town on a bicycle and I received a traffic citation for running a stop light and a warning for bicycling on the left side of the road.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The stop light that I was charged with running was on a separated two-way highway. Identifying gaps in traffic there is easy, so I see little reason to inconvenience multiple drivers just to reduce my legal liability.</p><p>Similarly, bicycling on the left side of the road enables me to easily see &amp; react to oncoming traffic. I was pulled over in a parking lot because I identified oncoming traffic from both front &amp; behind &amp; I decided to minimize my risks by getting off the road.</p><p>The law enforcement officer made the argument that, even if bicycling on the left was safer, I was still in the wrong because breaking the law made me legally liable. I&#8217;d rather be legally liable and not get into an avoidable collision than have a distracted driver run up on me from behind!<br><br>Also, using a consequence of breaking a specific law as justification for enforcing said law seems like oddly circular reasoning. It also reminds me of the rumors I read about how walking in the street was criminalized following lobbying by the motor vehicle industry to reduce the legal liability of drivers in the early 1900&#8217;s.</p><p>My argument is that bicyclists should be prosecuted for reckless endangerment or public nuisance, if they are indeed doing or being such. Maybe even for failure to wear appropriate safety equipment or failure to signal (I&#8217;d have to plead the 5th if anyone asked about this, but for some reason, neither of these issues are listed on my citation, even though these issues are the ones most likely to affect my safety)... But laws against specific actions, such as running stop lights and requiring bicyclists to ride on the right side of the road are unnecessary and may even be harmful.</p><p>Anyway, as always, let me know your thoughts!</p><p>I hope to hear from you soon!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://judahmeek.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>