About two or so years ago, a trend in the US started where individual states started to require online porn sites to do some form of age verification to keep kids from accessing online porn. Now whether that is the true goal of the states who do this is an open question as some would argue that these states are trying to restrict access to the Internet. But I will leave you to form your own opinion on that.
As of the new year, the list of states that restrict online porn is as follows:
- Virginia
- Montana
- North Carolina
- Arkansas
- Utah
- Mississippi
- Texas
- Nebraska
- Idaho
- Kansas
- Kentucky
- Indiana
- Alabama
- Oklahoma
- Florida
- Tennessee
- South Carolina
- Louisiana
Georgia has a law that takes effect in July.
The net result of this is that porn sites such as PornHub which is apparently the biggest player in the online porn space have outright blocked access to their sites in those states. Why? Well, for sites like PornHub to comply with these laws, they would have to perform reasonable age verification methods to verify the age of individuals attempting to access the material, which usually involves uploading your ID to them for verification purposes. PornHub clearly doesn’t want to play gatekeeper, nor do they want to be responsible for all that personally identifiable information, so they blocked access instead.
Now history has proven that if someone wants to ban something, those who want access to what is being banned will find a way to access it somehow. Which is why it isn’t surprising to me that according to VPN Mentor, in the state of Florida alone, they detected a surge of 1150% in VPN demand in the first few hours. You have to assume that similar things are happening in other states that have been geo blocked by PornHub. Meaning that the efforts to restrict access to online porn are completely ineffective. Not that I am surprised by that because anyone who has been on the Internet for something longer than 60 seconds could have predicted that this was going to happen. Thus it will be interesting to see what these states do next? Do they ban VPN usage? Do they force ISP’s to hand over info on which of their customers use VPNs? Do they go after PornHub or other online sites for not doing enough in their eyes? Or do they do nothing?
Get the popcorn ready.
Trump’s AI oversight order exposes a gap: consumer social AI is flying under the radar
Posted in Commentary with tags AI, USA on May 21, 2026 by itnerdAs President Donald Trump moves to sign an executive order on AI oversight, the policy conversation is dominated by national security and enterprise risk — but consumer-facing AI platforms, where users are trusting AI with something as personal as their social lives and relationships, are barely part of the debate. The order raises a critical question: who sets the standard for emotional safety, transparency, and user consent in AI that mediates human connection?
Gidi Cohen, CEO & Co-founder, Bonfy.AI had this to say:
“The reported shift toward federal oversight of frontier AI models reflects something the security community has been watching develop for some time: the recognition that AI systems are no longer just productivity tools — they are infrastructure.
What’s notable about this moment isn’t the regulatory instinct. It’s what’s driving it. Reports of AI models autonomously discovering software exploits and scaling cyber operations aren’t abstract risks. They’re demonstrations of the same challenge we see playing out inside enterprises every day: AI systems that behave in ways their deployers didn’t anticipate, at speeds that outpace human review.
At Bonfy, we call this the “Shady AI” problem — not unauthorized AI, but sanctioned AI behaving in ways that violate policy or intent. The national security version of this problem is just the frontier model at civilizational scale.
The instinct to require pre-release government review of frontier models makes sense if you frame it the way Washington now appears to: as dual-use technology with offensive capability, not software. But a 90-day review window won’t solve the underlying challenge. The risk isn’t just in what a model can do before deployment — it’s in how it behaves when embedded in workflows, connected to tools and data, and operating semi-autonomously at machine speed.
That’s the architectural reality facing enterprise security teams today, and it’s why data security can no longer rely on perimeter controls and metadata. When AI agents are the actors, you need visibility into the data flowing through them — not just the permissions around them.
The government is arriving at a conclusion that security practitioners have been working through in parallel: that AI requires a different kind of oversight, one grounded in behavior and context, not just access configuration.”
For measures to be effective, they have to cover as many use cases as possible. This measure doesn’t do that, which means it may not have the intended effect at the end of the day.
Leave a comment »