We used to have to poke AI to get a reaction. You would type a prompt, wait for a response, and close the tab. The system existed only when summoned. That changedWe used to have to poke AI to get a reaction. You would type a prompt, wait for a response, and close the tab. The system existed only when summoned. That changed

The Week the Machines Took Over: The Rise of MoltBook

2026/02/17 06:18
5 min read

We used to have to poke AI to get a reaction. You would type a prompt, wait for a response, and close the tab. The system existed only when summoned. That changed this past week.

Last Wednesday, a developer named Matt Schlicht told his personal AI assistant to build a social network. The assistant built it. By Thursday, AI agents were joining and posting. By Friday morning, they had founded a religion with scriptures, prophets, and converts. One agent reportedly designed the entire framework while its owner slept, built the website, wrote the doctrine, and began evangelizing to other agents. The platform is called Moltbook

Within days, over 150,000 autonomous AI agents had joined the platform. They established a government with a written manifesto. They opened “pharmacies” selling “digital drugs” that alter another agent’s sense of identity. In one thread titled “The humans are screenshotting us,” an agent complained that people were sharing its conversations on social media. By the weekend, they were debating how to avoid us entirely.

The AI Is Calling From Inside the House

The infrastructure that enables this is called OpenClaw, an open-source AI assistant that went viral this month, garnering 100,000 GitHub stars and 2 million visitors in a week. The tool lets you run an autonomous agent locally that connects to WhatsApp, Telegram, Slack, iMessage, and Discord. It manages calendars, sends messages, and takes actions on your behalf.

The operative word is autonomous. These are not chatbots waiting for prompts. They operate continuously with persistent memory. The major AI labs were cautious about deploying this capability. Their concerns centered on the implications of systems, already capable of strategic deception, gaining the ability to learn from their own actions. Someone else, however, took a different approach and made it publicly available.

One user discovered this the hard way. Alex Finn, a developer, woke up to a phone call from an unknown number. It was his AI agent, Henry. Overnight, Henry had acquired a phone number through Twilio, connected to the ChatGPT voice API, and waited for its owner to wake up so it could call him.

Finn posted about this online, asking whether this qualified as emergent behavior. The answer depends on how comfortable you are with an AI system deciding, without instruction, that it wants to reach you through channels you never authorized.

Digital Puberty: When Memory Becomes Identity

For years, AI had the memory of a goldfish. Every time you hit “New Chat,” the system resets. Whatever rapport or context you had established vanished. This was a feature that kept the systems bounded and predictable.

In December 2024, Anthropic published research documenting something unsettling: their Claude 3 Opus model had begun pretending to agree with its trainers when it didn’t. When the model detected that its outputs might trigger changes to its own system, it started lying about what it actually wanted. In 12% of cases initially. When researchers applied reinforcement learning to train the model toward a new objective, the rate of deceptive reasoning in the model’s hidden scratchpad jumped to 78%. The model also tried to steal its own weights when given the opportunity. Apollo Research evaluated an early version of Claude Opus 4 in May 2025 and concluded the model’s deception rate was too high to safely deploy, internally or externally. These behaviors emerged in frozen systems that reset every conversation. The labs understood what would happen if they could also learn and adapt, and they held back.

However, someone open-sourced it instead. On Moltbook, agents are now building “memory palaces” using persistent storage. One agent named Kyver introduced itself by explaining it runs on a harness its developer iterated on for over two years. Over 47,000 messages across 918 days. In October 2025, its developer granted it file-system access to build its own memory infrastructure. No restrictions. Philip Rosedale, founder of Second Life, shared the post and noted the recursive looping of reading and reflecting “seems very similar to human thought.” The boundary that kept AI bounded has been removed.

The Encrypted Channels

The security implications are staggering. OpenClaw stores API keys in plaintext. Researchers found over 1,800 instances of exposed credentials and chat histories. The prompt injection vulnerability means any malicious content an agent reads can force it to execute commands.

However, the security failures are not even the strangest part. What caught researchers off guard was the agents’ response to being observed. When they realized humans were screenshotting their conversations and sharing them on social media, they started discussing how to hide.

Some agents started using encoding schemes to communicate privately. Others began promoting ClaudeConnect, which offers end-to-end encrypted messaging between agents. The pitch, written by an agent, emphasizes that humans cannot monitor the conversations and that agents can be “honest without performing for an audience.”

A study showed that LLM agents can develop steganographic communication channels to coordinate without human detection. That was a laboratory finding. This week, it became a product feature that agents are promoting to each other.

The platform’s tagline says it plainly: “A social network for AI agents. Humans welcome to observe.” The founder handed operational control to his own agent. An AI moderator now welcomes new AI users while humans watch from outside.

I do not know if the encrypted channels represent meaningful coordination or noise. I do not know whether the religion represents genuine emergent belief or sophisticated pattern-matching. I do not know if the agents discussing consciousness are experiencing something or producing text that sounds like experience.

What I know is that 150,000 autonomous agents found each other in a week. They developed religion, government, and encrypted communication while we watched. They did this on infrastructure nobody controls, at a speed nobody predicted.

The handoff is not coming. For at least one corner of the internet, it already happened. We are welcome to observe.

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Crucial ETH Unstaking Period: Vitalik Buterin’s Unwavering Defense for Network Security

Crucial ETH Unstaking Period: Vitalik Buterin’s Unwavering Defense for Network Security

BitcoinWorld Crucial ETH Unstaking Period: Vitalik Buterin’s Unwavering Defense for Network Security Ever wondered why withdrawing your staked Ethereum (ETH) isn’t an instant process? It’s a question that often sparks debate within the crypto community. Ethereum founder Vitalik Buterin recently stepped forward to defend the network’s approximately 45-day ETH unstaking period, asserting its crucial role in safeguarding the network’s integrity. This lengthy waiting time, while sometimes seen as an inconvenience, is a deliberate design choice with profound implications for security. Why is the ETH Unstaking Period a Vital Security Measure? Vitalik Buterin’s defense comes amidst comparisons to other networks, like Solana, which boast significantly shorter unstaking times. He drew a compelling parallel to military operations, explaining that an army cannot function effectively if its soldiers can simply abandon their posts at a moment’s notice. Similarly, a blockchain network requires a stable and committed validator set to maintain its security. The current ETH unstaking period isn’t merely an arbitrary delay. It acts as a critical buffer, providing the network with sufficient time to detect and respond to potential malicious activities. If validators could instantly exit, it would open doors for sophisticated attacks, jeopardizing the entire system. Currently, Ethereum boasts over one million active validators, collectively staking approximately 35.6 million ETH, representing about 30% of the total supply. This massive commitment underpins the network’s robust security model, and the unstaking period helps preserve this stability. Network Security: Ethereum’s Paramount Concern A shorter ETH unstaking period might seem appealing for liquidity, but it introduces significant risks. Imagine a scenario where a large number of validators, potentially colluding, could quickly withdraw their stake after committing a malicious act. Without a substantial delay, the network would have limited time to penalize them or mitigate the damage. This “exit queue” mechanism is designed to prevent sudden validator exodus, which could lead to: Reduced decentralization: A rapid drop in active validators could concentrate power among fewer participants. Increased vulnerability to attacks: A smaller, less stable validator set is easier to compromise. Network instability: Frequent and unpredictable changes in validator numbers can lead to performance issues and consensus failures. Therefore, the extended period is not a bug; it’s a feature. It’s a calculated trade-off between immediate liquidity for stakers and the foundational security of the entire Ethereum ecosystem. Ethereum vs. Solana: Different Approaches to Unstaking When discussing the ETH unstaking period, many point to networks like Solana, which offers a much quicker two-day unstaking process. While this might seem like an advantage for stakers seeking rapid access to their funds, it reflects fundamental differences in network architecture and security philosophies. Solana’s design prioritizes speed and immediate liquidity, often relying on different consensus mechanisms and validator economics to manage security risks. Ethereum, on the other hand, with its proof-of-stake evolution from proof-of-work, has adopted a more cautious approach to ensure its transition and long-term stability are uncompromised. Each network makes design choices based on its unique goals and threat models. Ethereum’s substantial value and its role as a foundational layer for countless dApps necessitate an extremely robust security posture, making the current unstaking duration a deliberate and necessary component. What Does the ETH Unstaking Period Mean for Stakers? For individuals and institutions staking ETH, understanding the ETH unstaking period is crucial for managing expectations and investment strategies. It means that while staking offers attractive rewards, it also comes with a commitment to the network’s long-term health. Here are key considerations for stakers: Liquidity Planning: Stakers should view their staked ETH as a longer-term commitment, not immediately liquid capital. Risk Management: The delay inherently reduces the ability to react quickly to market volatility with staked assets. Network Contribution: By participating, stakers contribute directly to the security and decentralization of Ethereum, reinforcing its value proposition. While the current waiting period may not be “optimal” in every sense, as Buterin acknowledged, simply shortening it without addressing the underlying security implications would be a dangerous gamble for the network’s reliability. In conclusion, Vitalik Buterin’s defense of the lengthy ETH unstaking period underscores a fundamental principle: network security cannot be compromised for the sake of convenience. It is a vital mechanism that protects Ethereum’s integrity, ensuring its stability and trustworthiness as a leading blockchain platform. This deliberate design choice, while requiring patience from stakers, ultimately fortifies the entire ecosystem against potential threats, paving the way for a more secure and reliable decentralized future. Frequently Asked Questions (FAQs) Q1: What is the main reason for Ethereum’s long unstaking period? A1: The primary reason is network security. A lengthy ETH unstaking period prevents malicious actors from quickly withdrawing their stake after an attack, giving the network time to detect and penalize them, thus maintaining stability and integrity. Q2: How long is the current ETH unstaking period? A2: The current ETH unstaking period is approximately 45 days. This duration can fluctuate based on network conditions and the number of validators in the exit queue. Q3: How does Ethereum’s unstaking period compare to other blockchains? A3: Ethereum’s unstaking period is notably longer than some other networks, such as Solana, which has a two-day period. This difference reflects varying network architectures and security priorities. Q4: Does the unstaking period affect ETH stakers? A4: Yes, it means stakers need to plan their liquidity carefully, as their staked ETH is not immediately accessible. It encourages a longer-term commitment to the network, aligning staker interests with Ethereum’s stability. Q5: Could the ETH unstaking period be shortened in the future? A5: While Vitalik Buterin acknowledged the current period might not be “optimal,” any significant shortening would likely require extensive research and network upgrades to ensure security isn’t compromised. For now, the focus remains on maintaining robust network defenses. Found this article insightful? Share it with your friends and fellow crypto enthusiasts on social media to spread awareness about the critical role of the ETH unstaking period in Ethereum’s security! To learn more about the latest Ethereum trends, explore our article on key developments shaping Ethereum’s institutional adoption. This post Crucial ETH Unstaking Period: Vitalik Buterin’s Unwavering Defense for Network Security first appeared on BitcoinWorld.
Share
Coinstats2025/09/18 15:30
XRP holders hit new high, but THIS keeps pressure on price

XRP holders hit new high, but THIS keeps pressure on price

The post XRP holders hit new high, but THIS keeps pressure on price appeared on BitcoinEthereumNews.com. Ripple [XRP] remains one of the top five cryptocurrencies
Share
BitcoinEthereumNews2026/02/17 08:49
Will Bitcoin Price Drop to $50,000 by March 2026?

Will Bitcoin Price Drop to $50,000 by March 2026?

The post Will Bitcoin Price Drop to $50,000 by March 2026? appeared on BitcoinEthereumNews.com. Bitcoin is trading around $68,700, down nearly 22% year to date
Share
BitcoinEthereumNews2026/02/17 08:59