Friday, December 19, 2008
Saturday, December 06, 2008
Friday, December 05, 2008
Thursday, November 27, 2008
Wednesday, November 26, 2008
Friday, November 21, 2008
Monday, November 17, 2008
Saturday, November 01, 2008
Thursday, October 23, 2008
Wednesday, September 24, 2008
Tuesday, September 23, 2008
Monday, September 22, 2008
Sunday, September 21, 2008
Saturday, September 20, 2008
Tuesday, September 09, 2008
Friday, August 15, 2008
Wednesday, August 13, 2008
Friday, August 08, 2008
Saturday, August 02, 2008
Tuesday, July 22, 2008
Saturday, July 19, 2008
Friday, July 18, 2008
Sunday, July 13, 2008
Saturday, July 12, 2008
This continues to work for the iPhone 3G and iTunes 7.7
Yay!
Sunday, July 06, 2008
- Perpetrate a massive hack involving botnets, memory cards, corrupt elections officials and anyone else to give the victory in a major election to a write-in candidate: Mr. Election Fraud.
- Or, marginally more positive, change the entire system so that all votes are inherently public and published for any to see. This would allow John Q. Public of Philadelphia to verify that his vote was recorded properly. It also allows any number of independent organization to count all the published votes themselves.
The key aim is to ensure the voter records a sincere choice by forestalling attempts to influence the voter by intimidation or bribery.
Secret ballot. (2008, July 5). In Wikipedia, The Free Encyclopedia. Retrieved 15:48, July 6, 2008, from http://en.wikipedia.org/w/index.php?title=Secret_ballot&oldid=223651522
I have never been asked to vote for anyone and I'm curious to see if this has happened at all in America in the last few decades. There is so much press and exposure that such cases would instantly be brought out into the open. I can see that in places like Zimbabwe people need secret ballots to avoid severe intimidation, but at the same time, they have such a big problem with poll fraud. Is it the reward of an industrialized nation to forgo secret ballots in favor of full disclosure? Here's my imagined public election:
Each voter is registered and votes at a polling place. This is to ensure one vote per voter like to does now. Then the vote is cast in a Internet connected machine. This can be done out in the open, or in private if there actually is the threat of intimidation at the polling place. That vote will then be counted four ways. The machine will record an encrypted vote. Two paper records will be given with unique numbers for each vote; one stays with the machine, the other with the voter. lastly, the vote is instantly published in the Internet with that person's name and vote number. That way the voter can go home and double check that his vote counted. There could even be machines set up by independent authorities outside a polling place to double check a vote.
I can also imagine a system where everyone has a GPG key that they use to encrypt their vote and only the election board can decrypt it. They could get a copy of their encrypted vote to check later. Only the voter or the election board could decrypt the vote, so the voter's indentity is sealed. This is still a secret ballot, but it would require everyone make a private GPG key. (PS. My public key is here.)
Well anyway, watch Hacking Democracy and get a little fired up.
Sunday, June 15, 2008
Saturday, June 14, 2008
Friday, June 13, 2008
Tuesday, June 03, 2008
Monday, June 02, 2008
I just sought wikipedia for the proper usage; and now I know how it rolls.
You should learn too.
Sunday, June 01, 2008
Wednesday, May 28, 2008
A few weeks ago, Val and I heard some racket coming from in the wall.
Upon further investigation, we found this dude:That's the young squirrel that had fallen down the chimney space from the attic. I almost got him with Val's butterfly net, but he got out of reach.
A few weeks and a party later I com into the kitchen to see his scurry away under the counter. The next day I found my butter in this state:
That does not make me happy,
So I put together a little DIY humane trap:
If you can see, the trap is baited with tortilla chips and later peanut butter. When Little Squirrel steps on the board, it pulls out the lid support, and the block keeps it closed. Brilliant! But it didn't work.
Today, I noticed bait missing and nothing was tripped. I decided to get a little more aggressive. I went to his hideout by the window and took away the insulation. He ran out and led me on a good long chase though the basement. Eventually he went for his old getaway, the chimney, but I cut him off. He was stuck in a dead end against the wall. I got in there with the net and pinned him against it. It took a little persuasion to get him to fall into the net, but it was done.
He's a bit hard to see, but there's the squirrel seeing the light of day for the first time in weeks. And here he is running away
Goodbye Squirrel! It was fun, but don't come back!
Monday, May 26, 2008
Brooklyn
This message was sent using the Picture and Video Messaging service from Verizon Wireless!
To learn how you can snap pictures and capture videos with your wireless phone visit www.verizonwireless.com/picture.
To play video messages sent to email, QuickTime� 6.5 or higher is required. Visit www.apple.com/quicktime/download to download the free player or upgrade your existing QuickTime� Player. Note: During the download process when asked to choose an installation type (Minimum, Recommended or Custom), select Minimum for faster download.
Saturday, May 24, 2008
Know It Alls
This message was sent using the Picture and Video Messaging service from Verizon Wireless!
To learn how you can snap pictures and capture videos with your wireless phone visit www.verizonwireless.com/picture.
To play video messages sent to email, QuickTime� 6.5 or higher is required. Visit www.apple.com/quicktime/download to download the free player or upgrade your existing QuickTime� Player. Note: During the download process when asked to choose an installation type (Minimum, Recommended or Custom), select Minimum for faster download.
Friday, May 23, 2008
Tuesday, May 20, 2008
Monday, May 19, 2008
Wednesday, May 14, 2008
Amway Christian Fellowship
Multi-level marketing
downline
Ponzi scheme
Isagenix
"make money, quickly and easily"
What do you say to a family member thats asks you to be in a pyramid scheme?
Saturday, May 10, 2008
Monday, May 05, 2008
Friday, April 25, 2008
Thursday, April 24, 2008
No Access
To learn how you can snap pictures and capture videos with your wireless phone visit www.verizonwireless.com/picture.
To play video messages sent to email, QuickTime® 6.5 or higher is required. Visit www.apple.com/quicktime/download to download the free player or upgrade your existing QuickTime® Player. Note: During the download process when asked to choose an installation type (Minimum, Recommended or Custom), select Minimum for faster download.