Black Box Voting: A Crucial Issue

I often talk about cyber security threats. The more I study this issue, the more I realize that the term “cyber security” is an oxymoron. The internet is a cobbled together mess that is held together with duct tape.

As I understand it, there are two basic types of hacking; the wide net approach and the spear fishing approach. Most hackers put out wide nets to catch many people at once. It’s the way to get the biggest results for the least amount of effort. The way to defend yourself from this type of attack is to stay under the radar and make yourself a harder target to hit than other people.

The other type of cyber attack is when someone puts a target on your back and singles you out. This is much more difficult to defend against. And the more powerful you are, the more high-powered weaponry is aimed at you, and the harder it is to defend against.

One of the biggest targets possible? The US elections. No other event has more impact on the global economy than the US elections.

So does Russia want to affect our elections? Hell yes. China? Yes. Iran? North Korea? Yes. Hundreds of other countries, factions, political powers, banks, etc. want to influence our elections and they would in a heartbeat if they could.

Do you think that either party wouldn’t rig the election if they thought they could get away with it?

Continue reading →

A Great Movie: Stan and Ollie

My wife and I went to see the new Stan and Ollie movie last week. It’s almost 100 years after their peak performance years, and everyone still has heard of them. They are iconic, yet I have to admit to having never watched any of their material before this movie.

It’s truly a snapshot into a different time. It was the golden age of film, yet the actors were broke. The comedy was simple and sincere. And they were both very gentle men.

Continue reading →

How Have I Never Heard of Jicama Before?

Jicama tastes fantastic and is good for you.

Have you heard of jicama (pronouonced Hick-a-Ma)? If not, I recommend that you check it out. It’s pretty fantastic. Think of a perfectly crisp apple; not as sweet (it’s mild-sweetness is perfect).

My wife and I LOVE it. In fact, we now find ourselves planning our grocery shopping based on which grocery stores sell jicama.

And, it’s one of those foods that you feel really good about eating because it’s good for you in so many ways. Jicama is packed with nutrients, and it’s very high in fiber and inulin, which is a prebiotic – this means that it’s really good for gut health, which is something I’ve been really focusing on lately.

There are all kinds of ways to eat jicama. Some people like to put all kinds of seasonings on it and dress it up, but I like it raw. No seasonings at all.

Continue reading →

Water in an Emergency (Part 2 of 3)

Last week I posted Part 1 of this training (see part one here). I think this will be eye opening information for you. Please watch it and share it with your friends and loved ones.

Part 3 is here.

Do you have questions or comments? Leave them below. Thanks

P.S. In case you want a solution for purifying your water in an emergency, check out my product; the Survival Still. It’s the best emergency drinking water system on the market.

Update Often!

This week a bug was discovered on Apple phones and computers that allows someone to call you on Facetime (an app on Apple products), and then listen in on you even if you don’t answer the call!

WOW! This is a horrible breach of privacy. Doesn’t the thought of this just make your skin crawl?

Yes, it’s horrible, and they will get it fixed pronto, but what can we learn from this?

FIRST, you know all those annoying little update notices on your phone or computer that you keep ignoring? Don’t ignore them. Update your phone AND your apps AND your computer as often as possible.

SECOND, every app on your phone, every program on your computer introduces three potential risks. 1) The app can have a bug in it like the one above. 2) The app can be coded improperly or not supported well and it becomes an open door for a virus to contaminate your phone. Or 3) the app could have been designed from the beginning for nefarious purposes – to spy on you or steal your data.

The solution? Periodically purge your phone and computer of apps that you don’t use. Also, don’t just willy-nilly install apps.

THIRD, right now, your computer and phone have bugs that are not known by the good guys yet, but they may be known to hackers. So be careful. Use a webcam cover. Never blindly trust technology.