Article: This 23-year-old’s open-source project, a server running on Raspberry Pi, gives the middle finger to Google

This 23-year-old’s open-source project, a server running on Raspberry Pi, gives the middle finger to Google

http://venturebeat.com/2013/11/10/arkos-secure-google-alternative/

I may need to investigate this further.   Seems promising.

Following My Blog Via Email

I’m writing this “how to” article for those members of my family (who shall remain anonymous) that resist the urge to create an account for every website they happen to frequent.  There is a way to follow my blog without creating a WordPress account.

Here’s how in four easy steps.

Continue reading “Following My Blog Via Email”

Article: How Working Remotely Changed My Life (and Can Change Yours, Too)

How Working Remotely Changed My Life (and Can Change Yours, Too)

http://thenextweb.com/entrepreneur/2013/11/01/working-remotely-changed-life/

If only … snowball’s chance in … well you know where.

The single most dangerous activity I do every workday is commute.  I’d live longer if I could eliminate that 2 hr 20 min black hole in my daily routine.

Article: NSA reportedly collecting millions of email address books and IM contact lists worldwide

NSA reportedly collecting millions of email address books and IM contact lists worldwide

http://www.theverge.com/2013/10/14/4838966/nsa-reportedly-collecting-millions-of-email-address-books-and-im

Reminds me of the days of my youth and the party-line telephone our family shared with about four of our neighbors. Only this time it’s not the farmer’s wife next door that’s eavesdropping … it’s good old not-so-trustworthy Uncle Sam.

Article: US and UK spy agencies defeat privacy and security on the internet

US and UK spy agencies defeat privacy and security on the internet

http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security

Couldn’t sleep so I thought I’d increase my insomnia by worrying about Big Brother authoring encryption standards and inserting weak links and back doors to nearly every purportedly secure communication stream.