I was recently asked about Minus33 Merino wool clothing. I wrote about it in my Layers – Shelter article but I didn’t mention specific clothing items for a base layer. Thought it might be a g…
Source: Minus33 Merino Wool for Winter
This article from Live Action News lists 5 main points that describe Planned Parenthood.
- Abortion is Planned Parenthood’s number one priority.
- Planned Parenthood doesn’t have mechanisms in place to help pregnant women who want to stay pregnant and need prenatal care.
- Planned Parenthood has never done a mammogram, and the self-breast exams can be done by women at home for free.
- Planned Parenthood routinely gets caught breaking the law.
- They charge more for the services they do provide than you would pay for the same service at a real health clinic. And they over-bill the government for it, too.
Here is a short video on the first point, for those who cannot read the whole article:
Even those who are pro-abortion should be concerned about the last two points.
Let’s see the details on the fourth one – breaking the law:
One Live Action…
View original post 414 more words
One of the things we consistently teach in classes is that what is a good solution today may not be tomorrow. The tech landscape—and by default, the threat landscape within it—is constantly changing. It’s our job to stay on top of those changes, so we can make the necessary adjustments to how we operate and stay ahead of the curve. Today it was announced that Signal, one of the best apps out there for ‘secure comms’ (nothing is completely secure) has been found to have certain vulnerabilities in it. For the detailed techie description of those vulnerabilities and how they were found,you can look at this article. For the basics, read on:
Welcome to the first installment of TOWR Guides, handy infographics that you can save, share, and refer to. This first foray deals with open source alternatives to the software that we’ve all been using for years—the Microsofts and Googles and Facebooks of the world. These companies are the go-to for so many types of things that we do on our computers every day, and yet they’ve become data collection platforms and festering cesspools of personal data, just waiting to be purchased or subpoenaed or even stolen…and that’s not even counting the warrantless searches and worse that are occurring. There’s good news, though—you have options.