Some people call me paranoid; I say I’m realistic.
I employ a variety of methods in an attempt to make my online security and privacy somewhat “better.” Will any of these practices stop the NSA from reading my emails and perusing my search history (or prevent them from downloading the 16 million dick pics from OMWC and the Founders that are on my phone)? Highly unlikely. Will it stop the average neighborhood scammer or corporate marketing team from harvesting my info? Maybe. Do I feel better at least trying to salvage some remnant of privacy? Definitely.
Because I believe in learning from my fellow sufferers of PPD, tonight I’d like to hear about what the rest of the Glib community does and recommends.
Under the principle of situational awareness and not being the easy target, there are some basics that should be followed, but I acknowledge there can be exceptions to some things on this list.
Securely password your home wifi connections.
Don’t visit websites with “porn” or “pr0n” in the name.
Don’t use Facebook or other social media, and for the love of all that is holy, NEVER use Facebook Messenger.
Don’t click on HM’s links.
Don’t visit websites that aren’t https.
Turn off Siri and Google Assistant.
Use long passwords.
Don’t use a password on more than one site.
Use two-factor authentication when possible.
Don’t write your passwords down.
Don’t let apps on your mobile devices or laptop track your location.
Don’t store credit cards in apps or online profiles for rewards programs.
Tape over your computer’s camera lens and disable the microphone.
Never click on a link in an email from “your bank.”
Use a separate, secure mailing address for financial purposes (ideally in a zip code different from your home).
Don’t answer phone calls from Unknown Numbers. (In fact, I don’t give my real phone number to anyone. Or, actually, ever answer the phone.)
Don’t hand out your credit card number to everyone.
Buy stock in aluminum foil and learn how to fashion a stylish hat using origami techniques.
Unplug, Faraday cage and cellphone block your IoT devices when not in use, if you must have them in your house. This includes your Amazon FireTV box.
Don’t give your social security number and bank account information to Prince Adesola when he emails you offering a great deal in return for your help.
So, what else do I do?
1. I use a VPN at all times, whether from my home networks, public wifi, or on my mobile devices (even on data). I am currently using ProtonVPN from the ProtonMail folks. To me, it’s worth the small degradation in speed. I have a “Plus” subscription.
4. ProtonMail for email. For my business, I route my domain email through ProtonMail, as well.
5. For basic Internet security, I use Bitdefender, on my laptop and mobile devices.
6. Blur from Abine. I use it for creating masked email addresses on the fly, generating secure passwords to go with them, masking my phone number, masking credit cards. Considering adding their Delete Me service because I don’t have time to track it all down and do it myself.
7. Burner phone for special circumstances. If you are going to the trouble of using one, do so from a location removed from your usual haunts, and nowhere near any of your other devices. While wearing a plain navy blue hoodie and Groucho Marx glasses (or Juggalo face paint), and not near your car or other people.
What do you do to enhance your online security and privacy?
Before Rufus gets a chance to ask the question: yes, some of us DO work. One of those people is apparently Brett. I guess getting loaded on cocaine and blowing strangers is just for fun. In his absence, I’ll be providing links. If someone posted something earlier, I apologize. I haven’t been paying attention.
Cody Wilson’s no good, very bad day. I want to believe this guy has been caught up in a plot to “neutralize” him, but he seems to have set served himself up on a silver platter by signing up for a site called SugarDaddyMeet, exchanging nudes with a minor (article says the girl was *under* 17 the age of consent in Texas [you’re welcome for keeping you off a list by looking it up for you]), and then hiring her for sex. The bragging about being “a big deal” may not have been helpful either.
Normally, this story would have me glancing at the headline and moving on, but how can I resist linking to a story with the phrase “rape by use of drugs, oral copulation by anesthesia or controlled substance”. The surgeon in question is relatively pretty, and I can guarantee his near future will include rigorous training on the value of consent.
I assume this is just fake news meant to fluff The Meg, but it’s still neat. “the males would each travel in a V-shape pattern as many as 140 times a day. It’s unclear if the behavior is related to mating or if they are hunting for different species of fish.”
Speaking of unfortunate interactions between adults and minors, Mr. Michael Aliperti threatened to shoot an 11 year old who beat him at Fortnight and got arrested for it. Mr. Aliperti should fix a cup of chamomile and take a long hard look at where life has taken him.
Our user engagement analytics department indicates that we need more Minnesota content, so…here
ZARDOZ SPEAKS TO YOU, HIS CHOSEN ONES. WE HERE AT GLIBERTARIANS ARE FULLY DEVOTED DEFENDERS OF THE RIGHT TO SAY, THINK, WRITE AND PUBLISH ANYTHING WITHOUT GOVERNMENT INTERFERENCE OR PRIOR RESTRAINT. RECENTLY, WE CELEBRATED WHAT WE THOUGHT WAS A BIG WIN FOR THE RIGHT OF FREE SPEECH IN AMERICA. THE FEDERAL GOVERNMENT VOLUNTARILY SETTLED A LAWSUIT WITH DEFENSE DISTRIBUTED AND CODY WILSON, REGARDING THE PUBLICATION OF SPECIFICATIONS FOR MANUFACTURING HANDGUNS ON VARIOUS TYPES OF COMPUTER CONTROLLED MACHINERY AVAILABLE TO THE GENERAL PUBLIC. TODAY, AUGUST 1ST, WAS SUPPOSED TO BE THE DAY THAT ALL OF THESE FILES WERE ONCE AGAIN AVAILABLE TO THE PUBLIC. HOWEVER, VARIOUS STATES AND LOCALITIES HAVE HAD FEDERAL JUDGES ENJOIN THIS BY EMERGENCY ORDER. WE DO NOT SUPPORT ANY SUCH RESTRICTIONS. IT IS THE CASE TODAY THAT PEOPLE PROHIBITED FROM POSSESSING A GUN BREAK THE LAW IN ORDER TO POSSESS A GUN. THEY CAN GO TO YOUTUBE RIGHT NOW AND WATCH “HOW TO” VIDEOS OF PEOPLE BUILDING GUNS WITH A DRILL PRESS, A HAMMER, AND AN ANVIL.
IN SUPPORT OF DEFENSE DISTRIBUTED’S NOBLE WORK OF EMPOWERING CITIZENS TO BUILD AND POSSESS THE TOOLS TO FIGHT AGAINST UNJUST FORCE, OF ANY TYPE, WE PROUDLY FEATURE THIS LINK TO THE FILES. ZARDOZ BRINGS YOU THE GIFT OF THE GUN! CLICK HERE TO GET THEM FROM AN END TO END ENCRYPTED SITE.
THIS ACT IS PART OF THE REASON GLIBERTARIANS WAS CREATED, AND IS STILL HERE.
I’ve been on a bit of an article hiatus since my laptop died. I have a desktop (which I’m on right now), but I built it 8 years ago from the clearance section of NewEgg, and it sounds like it’s about to die. In the last 12 months, we’ve had 3 computers go, and this’ll be the 4th once it kicks the bucket…. fun times.
Anyway, I know that y’all are just dying for some Trashy insight, so I’m gonna try to make the concepts of this article come together. This is mostly a “look at the cool razors I have” post, but I’ll try to shoehorn libertarianism in there somehow. I love these stream of consciousness articles because it doesn’t involve any planning!
I started my post-pubescent life like most other men and women. I got a free version of the latest Gillette razor in the mail, and I ran that trial pack of blades until they weren’t even sharp enough to cut tissue paper.
This showed up in adolescent trashy’s mailbox
I heard the common refrain from everybody. “They’ll give you the handle for free, but they’ll gouge you on the blades.” Turns out they were right. Gillette had a virtual monopoly, with Schick in a distant second, so they could charge anything they wanted for their blades. Add in a small psychological ploy to rely on consumers’ sunk cost fallacy, and you’re set for life.
There were three problems that cropped up. First, I was a broke high school/college student, so I was running the blades until they started to rust. Second, the shaves were absolute shit. Third, the shaves were a chore. Slather on the disgusting canned foam, scrape 5 dull blades across your face, have razor burn for 2 days. My skin is a bit sensitive, so a poor shave meant a couple days of sore face. How did I cope? By growing a beard. Yes, in high school, I had mutton chops and a circle beard because I hated shaving.
This seems like a good time to go on a social/libertarian tangent. There’s something about products like this that irk me, and I’m not entirely sure why. You have people with 1000 different needs from their razors, and you offer the same blades and the same orientation with the same lotion bar at the top. It strikes me like the perfectly beautiful, but completely tasteless tomatoes you can get at the grocery store. Sometimes, giving up choice in favor of the lowest common denominator results in absolute shit product, and that’s what the modern cartridge razor has become. If your cartridge razor works well for you, count yourself lucky. The cool thing about the free market is that you don’t have to follow the fickle trends of the masses. You don’t get stuck with the Comrade 4 blade because Supreme Leader Bernie decides that nobody needs 32 kinds of razors. You’re free to experiment with different types of product, both from now and from the past.
Back when razor makers were artisans
Speaking of the past, those guys really knew how to shave back then. It was a small luxury to get to shave, and it’s something that I have found immensely enjoyable, both from a “gotta do it, so might as well enjoy it” standpoint and from a “hobby that connects me to the past” standpoint. I shave with a 1957 Gillette Super Speed.
It cost me roughly $15 on ebay, and my razor blades cost a few pennies each and last me 5 or 6 shaves before they dull. Both men and women used to shave with safety razors like this.
Let’s dive into the hobby aspect of this stuff, and some of the nuances will start to come out. You’ll quickly understand why a single blade type at a single preset angle isn’t preferred.
At a macro level, we’re talking about wet shaving. Just as a quick disclaimer in case some woman happens to stumble across this site (because we know there are no female liberatarians) and wonders what the hell is going on… I’m talking about shaving one’s face, but my understanding is that it translates fine to doing legs, too. Wet shaving means that there is water involved. You don’t just slather canned goop on your face and start scraping. You don’t fire up some gizmo and hope it gets close enough that you look like you actually shaved today. Wet shaving is about preparing your face to get a close shave with comfortable results. In broad generalities, there are three phases to a wet shave: skin preparation, shaving, and skin protection. You prepare your skin to be lubricated enough to allow a razor and a blade to glide across your face without catching on the skin. You also prepare your stubble to be as erect as possible so that you lop it all off when you pass the blade through each hair.
As an aside, one reason why irritation is so common with cartridge blades is because the multiple blades act to pull the hair up out of the follicle and trim it below the skin line, resulting in irritation and a higher chance of ingrown hairs. It’s a very “close” shave, but it’s really too close.
You will find that most traditional forms of shaving involve a single blade, thus reducing the likelihood of such . . . uncomfortable . . . consequences. There are four types of shaving. Cartridge blade razor (including disposables), electric trimmer, safety razor, and straight razor. The bolded ones are the ones closest associated with wet shaving. Yes, you can wet shave with a cartridge razor, but you’re only getting partial benefits in that situation.
Some of the guys who make custom straight razors do some great work!
I’m sure we’ve got some straight razor folks here in Glibertopia, but I’m not really experienced with them. Besides the barber cleaning up the back of my neck with one, and the rare barbershop shave (which is shit once you figure out how to properly wield a safety or straight razor), I’ve never really even seen one in person.
However, the principles between safety razors and straight razors are much the same. The muscle memory is different and the stakes are higher with straights, but the process involves lubing up your face, holding the blade at a certain angle, and dragging it across your whiskers.
I’m big on connections to the past. Things may be “better” in the present, but often the consumerist impulses of today result in bland mass-produced products. There’s nothing beautiful about the latest Fusion razor. It’s an uninspired amalgamation of neon plastic and chromed plastic. However, I’ve seen some straight razors and safety razors that are works of art! Craftsmen made the shaving tools of old. Assembly lines stamp out today’s shaving tools.
There’s something about using a 60 year old work of art to do a mundane hygiene task that makes it less humdrum. When you add in the other components of a wet shave, it adds a small luxury to your morning. Back in the day, men didn’t mind taking a minute and enjoying their morning routine.
Pre-Shave
Before starting your shave, it’s important to prepare. Preparation is as important as execution in wet shaving, because your razor doesn’t have training wheels anymore. You can push pretty damn hard with a cartridge razor and not be worse for the wear. Safety razors reduce the chance of slicing your face open in comparison to a straight razor, but both types of blade are very unforgiving to mistakes.
There are two types of pre-shave preparation. 1) Skin preparation, and 2) Mapping your beard.
Skin Preparation
It is important to do two things to your skin prior to shaving. You need to lubricate your skin so that the razor glides along and doesn’t get stuck. You also need to get your hair follicles to stand up as much as possible to get a close shave. There’s a simple way to do both… hop in a warm shower. Many people shave in the shower to get the maximum benefit of the warm water. I’ve never found it particularly attractive an idea, but you do you. If you didn’t just hop out of the shower, a warm, wet washcloth to the face will do the trick. If your skin tends to be dry, or if you’re a beginner prone to making mistakes, you can use a pre-shave oil or a pre-shave cream to supplement the warm water. It also adds a pleasant aroma to the beginning of your shave. Like I said, small luxuries.
In the pic, I have one of each. There’s a Truefitt and Hill pre-shave oil with a citrus scent. Next to it is a Proraso pre-shave cream with a menthol finish. I don’t really use them very much any more. Occasionally I’ll use the oil because it is the closest to real-deal citrus as I’ve ever found in a citrus scent.
Anyway, you take a sparing amount and rub it into your skin, and all of a sudden you’ve got a slippery face.
Mapping your beard
Unlike a cartridge shave, where the blades are equal opportunity offenders, single blades are quite sensitive to the grain of your beard. If you go with the grain, it’s the least uncomfortable and it’s the least close shave. If you go against the grain, it’s the most uncomfortable and the closest shave. Usually people will do 2 or 3 passes in order to get a close and comfortable shave. For example, they may do a with the grain pass, a cross-grain pass, and an against the grain pass. If you properly do three passes like that, your face will feel like a baby’s ass.
The thing is that the grain doesn’t just go in one direction. Just like your hair on your head, your beard has whorls and direction changes and all sorts of unique challenges. For example, my left cheek grain goes down, but my right cheek goes backward. Knowing which way the whiskers go helps you avoid accidentally going against the grain in some areas on the first pass.
Lathering Up
You can see in the above picture the two brushes that look like huge weird makeup brushes. I’m not sharing the bathroom with Mrs. trshmnstr, so they’re not hers. Those are my shave brushes. They’re made from badger hair. Yes, they literally pluck hairs from badgers to make these brushes. You can also get boar hair brushes or synthetic brushes (think paintbrush bristles). I’ve never used either of those, but I like my badger brushes. The one on the right is a normal badger hair brush. It has enough resistance to stand up to vigorously rubbing your face, but the hairs aren’t irritating. The one on the left with the frosted tips is a silvertip badger brush. These are premium brushes due to the nature of the silver tipped hairs. The hairs stand up enough to be able to make a good shaving lather, but they’re quite soft at the tips, making for the perfect balance.
The purpose of a brush is simple, you load it up with shaving cream and you apply the shaving cream to your face. I should be more precise. You can use shaving cream (roughly the consistency of toothpaste) or shaving soap (a hockey puck shaped bar of specially formulated soap). This is where wet shaving completely leaves normal shaving behind.
You can see in this next photo a few shaving soaps. On the left is TSE Texas Leather Tallow Shaving Soap (yes, tallow as in animal fat… the best shave soaps are made with tallow), which literally smells like my cowboy boots. In the middle is Proraso Green, which has the same menthol hit like the pre-shave cream. On the right is Gentleman John Sandalwood Soap, which is my current go-to for everyday shaving. The left two soaps are a little bit creamier and aren’t really in puck form, so I use them directly from their containers. The Gentleman John didn’t come with a container, so it’s in my shave bowl.
There are two primary ways of lathering up, face lathering and bowl lathering. They’re both perfectly legitimate, but they yield different types of lather. The face lather tends to be more of a wet, slick lather, whereas the bowl lather tends to be fluffier and drier. Depending on your preference for lather, you can choose the appropriate technique.
Face Lathering
Face lathering is my go-to. It’s easier when you don’t have a ton of space, because you don’t need additional bowls and you don’t make a foamy mess all over the counter. Face lathering is two steps: loading the brush and lathering. First, to prep for the shave, you need to add a few drops of water to the soap to “bloom” the soap (meaning that the soap absorbs some of the water and the top layer softens up. Also, I like to leave the brush in warm water while I shower. If that’s not an option, just run some hot water over the bristles, because the brush will absorb some water. Then, give the brush a single shake (you want to get rid of some water, but not all), and start swirling the bristles over the soap puck. The soap will begin to foam, but you’re only loading the bristles with the soap, so you don’t want to go too long.
Once the brush is loaded, you proceed to swirl the brush on your cheeks until a foamy lather builds. Once the lather builds, you can paint it on other parts of your face until you have built up a nice slick, cushiony lather on all the places you’ll be shaving.
Bowl Lathering
Bowl lathering is very similar, but instead of taking the loaded brush to your face, you put it into a bowl and start swirling. Because of the fact that the bowl doesn’t have any moisture in it (as compared to your lubricated face), the lather tends to dry out, which makes it fluffier. Once you have a good lather built, you can just paint it on your face with the brush.
Want an added touch of luxury? Pour some hot water into a shave scuttle and heat up your lather while you make it!
Shaving
I’ve written an entire article’s worth of info, but we haven’t even cut a single whisker yet. In reality, once you get a hang of things, the pre-shave portion takes 2-3 minutes at most. Now it’s time to choose a razor and blades (for the safety razors). As mentioned above, my experience is with safety razors, so that’s what I’ll talk about.
Razors come in all different shapes and sizes, but there are three most important attributes: weight, balance, and aggressiveness. The key to shaving with a single blade razor is to avoid pressing. The blade should glide over your face, and even the slightest pressure can make for a bad shave. As such, the right weight razor keeps you from having to exert pressure to get the razor to cut. Too light, and your blade will skip right off your face. Too heavy, and you have very little control and feel as you cut. Balance also influences the control and feel. A well balanced razor can be held by two fingers and you can almost feel every whisker yield to the blade. Aggressiveness is about matching your style and skin sensitivity to how much the razor tries to take off on each pass. Some folks like really aggressive razors. Some (like me) like less aggressive razors. It’s all about getting a close cut without causing razor burn. Certain safety razors have adjustable aggressiveness. You twist a selector, and the blade bends to a different angle, reducing or increasing aggressiveness.
The blades themselves are also seen as aggressive or not. Feather blades have a reputation for aggressiveness, but I happen to like them in my Gillette Super Speed because it mellows their aggressiveness. Others are less aggressive. Most likely these differences are due to minute differences in the manufacturing tolerances, despite the fact that the blade’s form factor has been standardized for 80 years.
One of the great things about shaving with a safety razor is that besides the initial investment in the razor (about $10 for each of mine on ebay), the blades are super cheap. I’ve gotten deals under 10 cents per blade, and each blade usually lasts 5 or 6 shaves, if not more. However, like any other hobby, you can get lost in all of the options and spend hundreds of dollars on shave equipment. There are some rare vintage razors that go for over $100.
Shaving is very much an exercise in muscle memory. It’s quite similar to knife sharpening in that you need to find a proper angle, hold it at that angle, and make smooth strokes. You know it’s right when you can hear the blade cutting the whiskers. It’s a soothing sound. Unlike what you’ve likely learned shaving with a cartridge razor, it’s not about pushing down and dragging across half of your face. That will end with blood everywhere. With a safety or straight razor, it’s about smooth short strokes with almost no pressure. You only exert enough pressure to keep the blade from skipping when it hits the next whisker. I’ve found that when in doubt, you’re using too much pressure. The goal is to “reduce” the hair rather than “eliminate” the hair. This is why you do two or three passes. The first pass takes the stubble down lower, the second even lower, and the third down to the skin.
Also, this is a literal razor blade. Razor blades cut you if you drag them sideways along your skin. Your short smooth strokes should be directly perpendicular to the blade’s edge. Turning corners is an advanced move for when you stop cutting yourself.
After a bit of practice, you start to be able to feel when a blade is getting dull. Before then, replace your blade on a regular basis. Usually 5 or 6 shaves is about as much as you can get out of a blade. If you have an old house, there may even be a blade depository in your bathroom. It dumps all the used blades into your wall for the contractor to find when you decide to remodel the bathroom.
Finishing Up
After you shave and wipe off the excess lather, you’re not quite done yet. Your face is in an “open” state due to the warm water, the lather, and the razor. One refreshing way to close up your pores is to splash your face with cool water. If you have a couple tiny nicks that are thinking about bleeding, sometimes this step will convince them not to bleed.
Once you’ve rinsed your face with cool water, it’s time to apply after-product. This is purely optional, but I find that my face thanks me. I have extremely dry skin, so this is the perfect time to add some moisture and avoid redness, cracked skin, etc. In come two categories of after-shave. In front is Clubman Pinaud, which is a traditional Home Alone aftershave. It’s alcohol based, and it’ll let you know if you nicked yourself. To me, this is the smell of a barbershop, and it lingers with you for the rest of the day.
Behind the Clubman is some Tea Tree leave-in conditioner. I forget who recommended it to me, but this stuff is the absolute best at moisturizing my face. I just rub it in like lotion, and my dry skin issues go away within a couple hours. It doesn’t linger like Clubman, but you can still smell it a couple hours later.
Also, while you’re cleaning up, rinse out your brush and get as much water out as you can. I hang mine alongside my razor to air dry the rest of the way. I also leave the soap container open to air dry.
But what if you got a boo boo? Bleeding is a part of learning to shave, and it sucks. Rather than sticking toilet paper to your face or bleeding everywhere, get yourself a styptic pencil or an alum block. They both contain chemicals that help your blood clot up and stop the bleeding. They aren’t magic, so don’t start rubbing your jugular while you’re bleeding out, but they’ve stopped cuts where the blood was dripping down my chin before.
I’ve never found out the right way to clean the styptic pencil. I usually rinse it off under the faucet, but the pencil doesn’t play well with water.
All of this to say, nobody needs 32 different kinds of razors. In Progtopia, we’re all gonna be stuck with shitty off-brand disposables and silly-string for shaving cream.
If you’ve ever signed up for an email newsletter, registered for a user account online, or purchased something from an online purveyor, you’ve undoubtedly been bombarded the last week (or longer) with emails like the one above. You’ve noticed the new cookie notice here on Glibertarians.com. You might have even read our Privacy Policy.
I’m not going to get into the details of the mind-numbing array of things the EU’s General Data Protection Regulation (GDPR) requires to be in compliance. I’m not a lawyer and much of it is open to interpretation.
If you’re interested there is no shortage of online resources, including the EU’s own website. Companies across the globe have been working on this compliance since the law was passed in April 2016.
No, what I want to rant about is the fact that as of May 25, 2018, the provisions of the 2-year-old regulation are now enforceable.
I hear you saying, “So what? It’s an EU law, and we aren’t in the EU.”
HAHAHAHAHAHAHAHA
You crack me up.
The new regulation is supposedly to protect EU citizens and their “personally identifiable information” (PII) that may be collected, processed, stored, and transferred online.
What the EU considers PII is much broader than what the US has generally considered PII. The EU insists that anything that could directly or indirectly be used to identify someone is included.
Personal data is any information that relates to an identified or identifiable living individual.
Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data.
Personal data that has been de-identified, encrypted or pseudonymised but can be used to re-identify a person remains personal data and falls within the scope of the law.
So, how the heck is the EU going to enforce the myriad complex and heavily nuanced provisions of the law? Fairly and objectively.
OK, I couldn’t even type that with a straight face.
The EU provides this helpful information:
Stronger rules on data protection mean
people have more control over their personal data
businesses benefit from a level playing field
Oh, good! Businesses are going to benefit!
Well, Uncle Sam wants to help make sure that US businesses are also going to benefit. The EU-U.S. Privacy Shield Framework is the mechanism by which the EU can impose their laws and regulations on US businesses and non-profits.
What’s that? Non-profits like the Glibertarian Foundation? Why, yes!
The U.S. Federal Trade Commission (FTC) has committed to work closely with the DPA (SP note: data protection authority in the EU) to provide enforcement assistance, which, in appropriate cases, could include information sharing and investigative assistance pursuant to the U.S. SAFE WEB ACT.
Indeed, one of the key provisions of the GDPR is increased territorial scope. Because of this, any website that “processes” any data from anyone in the EU must comply. Your business website may only ever have one visitor from the EU and if you set a web browser cookie for any reason whatsoever, you must meet the requirements of the GDPR. Seriously.
Infringement: the possibilities include a reprimand, a temporary or definitive ban on processing and a fine of up to €20 million or 4% of the business’s total annual worldwide turnover.
Oh, and that fine is whichever is greater. No potential there for abuse or selective enforcement! But remember, this is not about grabbing money or controlling the world. Because the Forces of Evil said it’s not.
So, what are US businesses doing? Most have been working on compliance for a long time now and are falling into line. Nobody really wants to lose their European customers and site visitors, after all.
Except for a bunch of media outlets and businesses that apparently weren’t ready for the enforcement to start on Friday. But, the EU says, don’t worry! There will not be an effect on innovation or access. Oh, wait, other organizations have just decided not to bother complying, closing business segments or blocking access from European countries.
Here at Glib HQ, we’ve determined that we have only one European registered user. We’ll miss you Pie in the Sky!*
We all know who is making bank from the GDPR, as is usual from regulation: lawyers and politicians. On Friday, many lawsuits and complaints were filed against large American tech firms like Amazon, Facebook, and Alphabet. We can expect dozens more to be filed in the coming weeks, months, and, probably, years.
Does my disgust and cynicism mean I am anti-privacy? Hell, no.
I have many stylish and useful tinfoil hats, as you all know. I use VPNs, encrypted email, mask my phone numbers, block cookies, browse from different browsers and devices, use cash for everything I can, have a prepaid cell phone for certain uses. The list goes on.
What I am is anti-government intrusion and regulation.
Remember, kids, with the exception of this Glibertopia, “If the product is free, the product is me.” Don’t like what Facebook does with your data? Don’t use Facebook; but don’t insist your congress critter pass another law or allow the FTC to enforce a cumbersome and impossible-to-get-right regulation from across the pond. Individuals and their rights always lose when bureaucracy wins.
Flashback nearly a decade and you’ll find me toiling away in a filthy (custodians would typically not go into the labs for fear of getting blamed for something going wrong) basement lab working on an algorithm for my doctoral thesis. Identifying exotic particles (eg: magnetic monopoles, Q-balls, strangelets, etc.) in cosmic ray datasets is not exactly what you’d call the most employable pursuit. However, it was definitely more useful than SJW grievance studies, more interesting than working as a glorified proofreader for other people’s code like some of my friends and I wasn’t paying for it, so what the Hell? Everyone knows the real reason you get into physics is for the pussy anyway (hahahahaha, oh I almost made it through typing that without LOLing).
So here I am cannibalizing standing on the shoulders of giants, using previous theoretical mathematical work on Bayesian predictive inference. Mathematics like this had been around for decades, this was just a novel application of it and formed the basis of my thesis work. I was creating an algorithm to use simulated training data and a Bayesian comparison between said training data and real data to try and identify compositional limits on particles theorized to exist but never observed (aforementioned MMs, strangelets, Q-balls etc.). While certainly fun to talk about at parties and a real panty peeler (more LOL), the thought that I’d use any of this stuff in the real world seemed remote. I had already ruled out pursuing a career in academia, so I figured I’d just go become a code monkey like my friends. Little did I know that I was inadvertently making myself eminently employable in a field that has become the new “hot thing” in tech.
A Rose By Any Other Name is Just as Confusing
At the time, this field was limited to academia and a few tech companies that were using it to claw their way to the top (see: Google, Facebook, Amazon, et. al.). It didn’t even have a name other than just “statistics” or “data analytics”; boring pedestrian things that only the pocket protector squad cared about. Glamorous Silicon Valley VCs would never get on board with such dull nonsense. So, being the innovators that they are, techies rebranded this field “data science” employing “artificial intelligence” and “machine learning”. I personally have issues with all these monikers; “data science” is just meaningless (in spite of that being my job title) and “artificial intelligence” and “machine learning” both suffer from the same problem. Namely, they both imply that a computer is learning in the same fashion as a human brain. My preferred moniker is “predictive analytics” since I think it captures reality better and doesn’t overstate what the algorithm is doing to some kind of mind reading and/or Skynet AI.
So what exactly is it? Well, the short explanation is that any predictive algorithm takes parametric data inputs to build a statistical model that will predict the outcome of future iterations within some uncertainty. Essentially, you start with a set of “training data” with known outcomes, the algorithm then processes that data to build a model of how each parameter affects the outcome. You then feed the algorithm a set of test data, it applies the model to all the parameters, makes a prediction, then looks at the known outcome and scores whether it’s correct, a false positive or a false negative. If the algorithm passes some human-defined threshold, it starts working to make predictions on real-world data, all the while refining its model to get better as it processes more data. This real-time refinement is where the “learning” and “artificial intelligence” stuff comes in. To an external observer, it looks like the computer is learning and adapting; which in a way it is, but only in some narrowly defined brute-force iterative way within specific parameters. It has none of the heuristic properties of human intelligence. Perhaps someday we’ll unlock the secrets of the human mind and be able to simulate true intelligence, but I see that as a long way off.
How It Makes Your Life Better
As stated, this kind of analysis has been used in mathematical and academic settings for a long time, but the first exposure I ever had to it in the real world was a fun little quiz called the Gender Test at www.thespark.com (to early internet denizens, this was kind of a forerunner to places like College Humor, Ebaum’s World and finally the Glib-approved favorite, The Chive). This test asked a series of seemingly irrelevant questions such as “Which word is more gross, used or moist?” and showing pictures of two different cartoon monkeys asking “Which one will win?” After 50 or so of these kinds of questions, the quiz would then predict if you were male of female and ask if it got it right. This was long before the misgendering insanity so it was a binary choice; each time it got it right, it increased the relative weights of the preceding questions toward that gender. Each time it was wrong, it reduced the weights. The very first time someone took the test, the prediction was pure chance. But after a couple hundred thousand iterations, the relative gender weighting on the questions got pretty good and the algorithm could predict male or female almost all the time. In this case, the answers to the questions were the parameters and the gender was the predictive variable. While it may seem simple minded, this basic paradigm is what drives most of our modern computational conveniences.
Every time you search something in Google, that’s a set of parameters used to refine its model. It gets better and better at searching. Each time you “like” something on Facebook or click a link in Twitter or look at a job posting on LinkedIn, their models refine and get a little bit better. Each time you ask Siri something, she gets a little better at understanding you (remember when you first unboxed your new iPhone and Siri asked you to say a few things at startup? There’s your training data).
Of course the most important innovation is in the industry that is always the tip of the technological spear: porn. This goes way beyond dumbly suggesting videos tagged “big tits” after you’ve searched for big tits. EVERYTHING you do is a parametric data point. Among the videos you watch, are the tits real or fake? How big are they exactly? Is this lesbian, one on one hetero, threesome, group or something more exotic? What parts of the scene do you linger on? Go even further and perhaps there’s eye tracking technology (tape over your webcam people). What part of the tits do you look at the longest? In what sequence do you look at them? Is there a type of nipple you gaze at longer? Can the nipples themselves be broken down into parametric data for classification? The possibilities are endless. In this way, the porn site “learns” not only what your revealed preferences are, but it also can use data from other users with similar preferences to suggest things that you yourself might not even know you like. Like big tits? Might we suggest these ebony strap-on compilations for you?
There are of course more pedestrian applications like what I’m working on professionally now. We have biopsy slides that have been pre-tagged by experienced pathologists as cancerous or non-cancerous. The algorithm does pixel-by-pixel imagery analysis to classify features that indicate cancer or not. The hope is that eventually the algorithm will get good enough that it can identify cancer on its own, even in stages too early for a human to see. It’s not nearly as cool as porn, but a guy’s gotta eat right?
How it Ruins Your Life
Coolness factor aside, this way of doing things can quickly cross over from nifty to creepy. Target famously has an algorithm that not only tracks what you buy, but will automatically latch onto your smartphone and track your movements in the store. The most amazing (read: creepy) application of this is its ability, through lots of training and refinement, to tell the gender of the customer, the approximate age of the customer, whether the customer is pregnant and the approximate due date of the customer before she herself even knows she’s pregnant. All this is possible from millions of data points of known pregnant women (going from buying prenatal vitamins, to stretch mark cream to eventually diapers and formula) and their purchases and movements around the store leading up to the birth. The more times this happens, the better the algorithm gets.
One might be tempted to actually put this in the “how it improves your life” column. After all, Target can offer you discounts on things it knows you’ll need and make your life more convenient in the process. However, it doesn’t take much imagination to see how this can quickly morph into something very sinister, very quickly.
Creepy when a private company does it, this becomes nefarious when a government does it. Even worse is when government gets in bed with private companies to start profiling you based on your data. Buying a lot of fertilizer? Maybe you’re making a bomb. Let’s look at literally every parameter that comprises your life for the past decade to see (at a 95% confidence level) if you’re a terrorist. G-d help us if we ever get to a point in which this kind of shit is accepted in a court of law. We would literally have a Minority Report Pre-Crime situation on our hands.
Every single thing you do, seemingly significant or not, is a parametric data point that can be fed into an ML algorithm to extract features, classify them and make predictions about you. Not just what toothpaste you use, but how long and how often you brush. Do you start from the molars or the incisors? Do you gargle your mouthwash? What are your favorite sexual positions? How loud are your orgasms? Do you own a tabby or a tuxedo cat? Do you typically move your bowels in the morning or the evening? Do you configure your toilet paper over or under? People like to think that this kind of data collection is limited to conscious decisions like the products they buy or the places they go, but that is barely scratching the surface. Emotions, unconscious behaviors, pointless or useless decisions of daily life; these things are the treasure trove that gives insight into your essence. The eyes are not the window to the soul, Big Data is. The only way to escape it is to forsake all modern technology, retreat to the woods and live as if it’s the 18th century (behavior which itself, by the way, offers a ton of data about you).
Now of course all of this can be used for good or ill. In all seriousness, a change in bowel habits could indicate a health problem. But let’s not be naive about the true nature of how these technologies are/will be used. To those who crave power and long to rule us, these developments are a gift from Heaven (or, more likely, Hell). These analytical techniques, so seemingly innocuous when Thomas Bayes first pioneered them 300 (!) years ago have opened a can of worms that could enslave the human race in ways Big Brother could only dream of. If Bayes could see what’s happening now he might echo Oppenheimer; “now I am become Death, the destroyer of worlds.”
Unfortunately, I don’t hold out a lot of hope for the future. Constitutional protections have proven toothless, people stupidly *volunteer* massive amounts of data and the data that they don’t volunteer gets vacuumed up by an ever more intrusive State. The campus #metoo squad is just the advanced scouting group checking out how fortified the “innocent until proven guilty” doctrine is; a trial balloon for the destruction of due process.
Working in the field I do only makes me more pessimistic because I see how powerful this is first hand. My advice: well, I don’t really have any; aside from the aforementioned retreat into the woods. Other than that, all you can do is continue to support causes that shore up data privacy protections and defend against 4th Amendment violations. That’s at least a finger in the dike (not finger in the dyke you perverts).
But, hey, at least PornHub’s suggested viewing is spot on right?
Engineering stimulates the mind. Kids get bored easily. They have got to get out and get their hands dirty: make things, dismantle things, and fix things. When the schools can offer that, you’ll have an engineer for life. — Bruce Dickinson
It’s very satisfying to bring something back from the dead and make it work and look new again. I learned this feeling early on in my life thanks to my dad. When I was 8 or 9 years old, he caught me taking his lawn mower engine apart. Instead of beating my ass, he bought me an old lawn mower from a garage sale for $5 to tinker with and fix. His goal was primarily to keep me away from his machine, but he also wanted a safe outlet for my interests and worked with me when possible.
Thanks dad, you and Bruce were right, I’m now both an engineer and Maiden Fan for life.
Part 1: Background
What is a Hi-Fi?
A Hi-Fi is a 1950-60’s marketing term for a High Fidelity audio system. They began appearing in the early 1950’s in the US, Europe, and the rest of the world. It is basically what we would call a stereo system in the 1970-90’s. The major difference between a Hi-Fi and a stereo system is mostly one of aesthetics and partially sophistication. The Hi-Fi was typically an electronics package mounted into furniture in the style of the era. In the 50’s and early 60’s, this meant a mid-century modern look with simple lines and/or modern space-age like themes. In the later 60’s and 70’s, the Hi-Fi look became a more traditional Spanish or colonial furniture style. In comparison, a rack or bookshelf mounted stereo system of the 60’s-90’s were intended for the audiophile that wanted more audio power, fidelity, or customization. The appearance of the rack system was generally utilitarian with separate components and speakers.
Why would I or anyone want to restore a vintage (old) Hi-Fi?
The appeal of a vintage Hi-Fi over a rack system, or modern solutions such as MP3 speakers, is the style of the system. From a fidelity or sound quality perspective, the vintage Hi-Fi is likely inferior to a component rack or sophisticated surround sound system; however, it can be superior to many modern MP3 speakers and PC systems for certain types of music. Fidelity is not always a critical feature these days compared to storage, portability, or other factors. My own impression is that an older Hi-Fi in good working order can be superior to that of standalone MP3 speakers made by suppliers such as Bose or most PC cheap speaker systems.
The Hi-Fi to me is a beautiful piece of furniture that can be the center of the entertaining area of your house. It is a throwback to a time when couples would have drinks and listen to a new record together. It can be in the background playing the sound track for the party or fill the house with sound while you are working. The final and most important factor for me was having a project that allowed me to tinker with electronic and mechanical systems, as well as apply some basic furniture refinishing with little financial risk.
My Hi-Fi: Webcore Ravinia 1958
I had passively been looking for a vintage Hi-Fi for a while on Craigslist. My criteria were the following:
1950’s -1970 time frame due to the styling of that era and the likelihood of finding cheap offerings.
The wood furniture must be solid, in relatively good condition, and free of water damage or serious contamination from pets or the environment.
The electronics don’t have to be in working order as I plan on repairing or, if necessary, replacing the guts of the system.
The Hi-Fi must be cheap enough that I won’t mind putting it on the tree lawn for the gypsies to take away if I completely muck it up.
I found what I was looking for after a few fits and starts of searching. I saw a Webcore Ravinia for sale for $40 locally. I made an appointment with the seller to meet and inspect it. The gentleman selling it inherited it from his grandmother and wanted to get the bulky thing out of this garage so he could fill it with used Firebird parts and meth fixins. It had a lot of dust and grime on it, but the wood was in relatively good shape for refinishing. Finally, the look and size of the system was close to what I was looking for.
Thanks Brother
The seller was adamant to demonstrate that the Hi-Fi worked, so he showed me that it could play Overkill’s Eliminate using his IPod through the Aux and remote control port. The electronics were functional enough to turn on without letting the smoke out of any components. The phonograph was barely able to turn and had no sound coming from it. I decided to take it that day. So I left my fledgling meth maker with $40 and brought it home and into the house. I proceeded to clean it up a bit, open up the back to ensure there were not pounds of dead mice or animal fur inside, and finally checked out the components and chassis for electrical damage prior to doing a quick test. I dusted the insides and vacuumed the cat fur out of the guts of the system. It looked in relatively good shape so I decided to fire it up to get a baseline assessment.
My old Hi-Fi after a bit of basic dusting and the initial clean up.
Assumptions and Constraints
I assume the electronics and speakers were worth repairing; if not, I will scrap them entirely.
Do the mechanicals such as the original turntable function, and do I care if they don’t?
Is the woodwork able to be refinished without expensive tools I don’t have and without taking the entire unit apart?
During the execution of this plan, the default is to scrap it if things go bad and cost me significant money to move forward. I set a budget of ~$100 for all expenses.
I plan on attacking this project in three parts
Assess and refurbish the electronics if possible, or scrap them and replace with something more modern if not.
Refurbish the turntable if possible or scrap/disable if not.
Refinish the furniture to a reasonable appearance with focus on the top and front of the Hi-Fi.
Finally, I’m not looking to keep the Hi-Fi system original if it means costing money or lowering the performance significantly. Do not use vintage or refurbished components; new components are your friend.
Electronics Refurbishment
Ass Covering Disclaimer: This is not a comprehensive how to article but a description of the path I took. Proceed at your own risk.
The baseline performance assessment was as follows
The system powered up and the tubes all seemed to be functional (they glowed).
The turntable was activated and rotated without turning it on by the selector knob.
The turntable would not turn with uniform speed and the needle appeared to be damaged.
The radio worked on all bands AM and FM with normal amounts of tuning noise.
The knobs for volume, treble, and bass all generated a great deal of crackle and spit when actuated.
I was able to play my IPod through the Aux and Remote control port using RCA and Microphone Aux plugs respectively. The thrash metal meth head was right.
There was a great deal of 60Hz hum present even without an input present that was amplified with increasing volume. Recapping will be needed to clean this up.
There was a moderate level of high frequency static hiss present that was not modulated by the volume level. Possibly a bad cap on the amplifier or noise generated somewhere and being picked up in the speakers.
The speakers sounded ok and looked good from the backside. Keep the speakers if possible.
There was no functional off switch, but there was a location where it used to be. Use a power strip with a fuse and on/of switch.
The sound output began to change, diminish, and distort after the unit was on for about 30 minutes prompting me to shut the unit off. I suspect there is a power supply issue somewhere based on this behavior.
In summary, the electronics and speakers appear to be worth a refurbish instead of replacement.
Electronics refurbish plan based on the initial assessment.
Research the system and try to get a schematic to help with the refurbishment
Clean up the chassis and all of the tube sockets during the refurbishment
Replace the old leaky electrolytic and paper caps in the power and preamp stages to minimize line and high frequency noise
Clean and or replace the pots if needed to eliminate the crackle and snap
Keep the turntable disconnected until it can be refurbished
Replace the speaker crossover capacitors with modern plastic film units
Check for and replace any significantly out of tolerance or damaged resistors or ceramic capacitors
Leave the radio tuner alone if possible as it is functional and not a high priority
To be successful at this the following basic skills and abilities will be important:
Able read a electrical schematic and know the basics of AC electrical and high voltage safety (vacuum tubes operate at >300V and the electrolytic caps might have to be discharged)
Knowledge and application of basic wiring, soldering, and electrical testing with a multimeter
Have or gain some knowledge of basic components such as vacuum tubes, capacitors, resistors, and inductors
Helpful Resources
I found a great deal of advice on refurbishing vintage audio equipment as well as a site dedicated to providing information on these old systems.
I was able to get schematics called a Sam’s manual from this site.
With schematics in hand, I went about removing the power supply chassis from the rest of the system, this involved cutting some wires and unplugging others. At this stage it’s important to take a lot of photos and label each connection you plan on cutting to be sure you remember how to put it all back together again. I used masking tape and a sharpie and a lot of photos.
Once the power chassis is removed, you need to get an appropriate workspace, prepared to desolder, remove, and re-solder your components. I made a lot of paper copies of the schematics for taking notes and for reference during the process.
I began the process by removing and carefully storing the vintage tubes. These tubes were old RCA units made in the 50’s and 60’s but they are likely still in good shape. I flipped the chassis over and began by inspecting and understanding how the schematic related to the components so I could assess what I was dealing with. I planned on removing and replacing the big electrolytic capacitor containing 4 separate cap values in one can and replacing them with separate modern components. I found some work had been done in the past as evidenced by additional components and connections that were not in the schematics. The system likely had some noise that cropped up as the electrolytic caps aged and a tech added a few new caps in parallel as a fix. This appeared to have been done many years ago based on the age of the components. These had to go, and new components had to be retrofitted. I went through the Bill of Materials (BOM) provided by the SAMs manual and purchased new replacements from Parts Express; you could also use any one of several electronic stores or distributors.
Once the old components were removed, I cleaned and deoxidized the tube sockets with contact cleaner, cotton swabs, and pipe cleaners. After a lot of removal, rewiring, and replacement I found I had room to mount the new components in the chassis. I also checked each component for: tolerance, functionality, solder connection, ground isolation, and mechanical integrity. I also checked and rechecked the circuit for any errors on my part, as I had to rewire as well as replace components.
Now that the power chassis is done, I’m ready for the Pre Amp. This required a bit more desoldering from other components of the Hi-Fi, as well as the removal of the pots from the body of the Hi-Fi. Again take a lot of pictures and label your desoldered and cut connections. The paper capacitors all need to go, and another multiple electrolytic cap can needs to be removed and replaced. I’ll replace the paper caps with newer metalized polymer film capacitors and the electrolytic can with new discrete axial leaded components like in the power supply.
Make sure to check your schematic, look for cold solder joints, and test for bad components and connections.
While I had the Amplifier chassis out, I decided to clean instead of replace my pots that control volume, treble and bass. They were very noisy during the baseline testing. I found a contact cleaner and lubricant that is supposed to be a miracle worker for bad pots and sliders. Caig DeoxIT Fader Spray is apparently used by musicians to clean faders and pots. I sprayed a few squirts into the body of the pots and worked them extensively. I repeated this process one more time prior to rejoining the chassis to the Hi-Fi case. I also used this opportunity to clean the chassis and tube sockets.
Now I used my pictures and labels to reassemble the Hi-Fi. I took the opportunity to replace the crossover capacitors with modern units, while resoldering the power supply leads to the speakers.
I took this opportunity to remove and deep clean the control knobs and display as they looked like they had 60 years of metal meth head’s grandma’s skin on them. Hot water and simple green did the trick for the knobs and a little bit of spray cleaner cleaned up the display.
Once I had everything resembled and cleaned up, it was time to test the sound quality and compare it to the baseline.
The system powered up without any smoke or fire!!
The system selector worked as expected-> Radio, Aux, and Phono
The turntable was left unplugged
The Radio worked on all bands AM and FM with normal amounts of tuning noise
The knobs for volume, treble, and bass were free from any crackle and spit when actuated
I was able to play my IPod through the Aux and Remote control port using RCA and Microphone Aux plugs respectively
There was a no 60Hz hum present until the volume knob was turned to maximum with no input present
There was a small level of high frequency static hiss present that was not modulated by the volume level; it was present no matter what connected input was used
The speakers sounded great and had much more power than before
The sound clarity was much improved
The sound quality remained constant after 3 hours of use with no distortion or reduction of output
Here is a video of the operation and sound after refurbishment and where it will be located. The performance compared to the baseline was very significant and the sound is now great.
Part two will focus on the turntable
Part three will focus on the repair and refurbish of the cabinet
Friends! It has been so long. Brett is in a post-apocalyptic wasteland and his second through fourth string replacements are working (yes, Rufus, some of us work). So you get some slap-dash, last-minute links from me:
Florida legislature! “Florida House declares pornography as a health risk: Republican Rep. Ross Spano says there is research that finds a connection between pornography use and mental and physical illnesses.” Republicans are apparently aiming to be the party of science now. Good for them.
Now here’s some science. “Drinking Alcohol Helps Better Than Exercise If You Want To Live Past 90 Years Old” Guess what, we at Glibertarians don’t care if this is good science or not. 건배!!
Time to sit your boss down and have The Talk. “Phishing schemes net hackers millions of dollars from Fortune 500: IBM has uncovered sophisticated campaigns which are successfully targeting Fortune 500 companies.”
Yusef Adama(not real name) has been in the HVACR trades for 31 years, Residential, Commercial, Industrial and Refrigeration and currently runs a small operation out of Southern California.
Heating, Ventilation and Air Conditioning, HVAC – a silly acronym for the most valuable thing man has created to advance Civilization. What, Yusef? What about Computers? Medicine? Food storage?
NONE of those things would not be possible in their current form without HVAC, so let’s get started.
Behold Your God (of AC)
Way back when we used Fire, people began to notice if you gave Fire an easy place to vent smoke, it will go that way, Later we discovered Pressure Differential, and used it to our advantage. Today we use a variety of materials including PVC plastic to vent our Products of Combustion, and have developed standards of safety to insure said PoC don’t mix with our breathing air.
Yup, a that is a furnace alright.
Gas ranges, old boiler systems and floor furnaces all give off some PoC, but the legal maximum is 9ppm so that’s O.K. However any forced air furnace is limited to 3ppm.
Bad burning gas
Good burning gas
CO and You: CO is cumulative in the bloodstream – you start out with flu-like symptoms, then it gets worse…and if you don’t catch CO poisoning soon, you will die. If you have a good running gas furnace, it will produce NO CO, CO is created by incomplete combustion, Modern furnaces burn really clean, but even an old furnace with a clean burn, Will. Not. Produce. CO. If your CO detector does go off, I, personally, would do the following;
Check for a clear vent,
Run the unit and check with my million dollar meter for actual CO,
Check the combustion air supply,
Check for living air incursion,
Look for cracked heat cells,
Check and adjust burners,
Check and adjust gas valve manifold pressure.
Combustion air and You: Furnaces need oxygen to burn clean (as does all fire) and a separate air supply is provided for just that purpose. Seen a screen or 2 in the furnace closet? That’s combustion air and it needs to stay clear of blockage – so don’t store things in there, not good.
Heat Pumps and electric heat: This is the fun one; First, they aren’t really AC in reverse, they require a number of check valves, 2 different metering devices for the refrigerant and a bunch of other things that make them work. When it gets below about 25 degrees, they lose the capacity to draw heat from the surrounding air and begin to freeze, this where defrost comes in…
“Why is my heater blowing out freezing air?” Defrost occurs via sensors in the outdoor unit, and flips it into cooling mode. This results in switching valves around and thawing the outside coil, then it flips back to heat… so hang tight, it will come back. If you have electric heat installed, this will temper the cold air until defrost ends. Heat pumps are really only useful in a clime like California or maybe Arizona, cause once you get below 25 or so your running strip heat, which is extremely expensive.
Back to modern furnaces: The days of fires and rollouts are long gone. Off the top of my head, there are; the centrifugal switch, the pressure switch, 2 rollout switches, a high limit in the burner compartment, another on the blower, the igniter itself, and finally the flame sensor. If any ONE thing fails, the whole machine will shut down, and you must unplug and reset the system to check those faults, takes me about ten minutes, unless there are birds in the vent,etc.
NOT a birdhouse
Bottom line, you are much safer than even 20 years ago.
Yusef what can I do to be safe and enjoy my comfortable warm/cool home? Filters, if you don’t know where they are, find them! Or ask me 🙂 usually located at the bottom of a furnace in a closet, in the ceiling as in a filter grille, turn off your system before changing, and no less than every 6 months for a forced air system, here’s why.
NOT CLEAN!
The filter is to keep the equipment clean, not your precious breathing air!
The indoor coil is capable of acquiring tons of dirt, blocking air flow for heating, and cooling and destroying equipment that demands airflow. It is expensive to clean up, and quite embarrassing for the homeowner.
Did someone say “dirt”?How it Works:
Forced-air furnaces, work like this;
1. Thermostat calls for heat,
2. Furnace calls for inducer motor (or vent motor if positive pressure)
3. Centrifugal switch closes to turn on motor,
4. Pressure switch closes,
5. Control circuit goes through all limit switches,
6. Igniter is energized, (could be a spark igniter or a hot surface igniter)
7. Gas valve opens for 7 seconds,
8. If flame is produced, flame sensor sends a signal to the control board,
9. After 90 second delay, blower comes on,
10. Once the thermostat is satisfied, the exact reverse happens – starting with the gas valve.
Heat pumps, electric heat:
1. Thermostat calls for heat,
2. Compressor fires off and reversing valve engages,
3. 2 sensors calculate ambient and coil temps every 15 minutes or so,
4. When it gets too cold and the outdoor coil begins to freeze…
5. Unit goes into cooling mode, defrosting outdoor coil, strip heat comes on,
6. Unit defrosted, goes into heating, strip heat turns off.
Yusef what can I do? I’m cold! Go to your breaker panel and rest the furnace breaker, or if a HP, both outdoor and indoor breakers. What we are trying to do is clear a programming fault in the circuit board, it does work sometimes and can save you oodles of cash, worth the small effort IMO.
If not, call an expert. the most expensive thing in your house is your HVAC… but it’s often the most neglected. It’s what keeps you comfy, and it will kill you if you don’t pay attention. I see dog hair clogged filters that look like a fur wall and ask my BMW driving customers, “would you do this to your car?”
“No? But you do this to your half a million dollar home.” (I despise those types)
Don’t be afraid, enjoy your comfort and don’t panic – but be aware, nothing is perfect, and CHANGE YOUR FILTERS!
Aight! We’ve talked about Computer Science and we’ve talked about some design features used in blockchain. Now let’s put it all together and cap this series off.
What is blockchain? It is a linked list of data structures that uses cryptographic hashing to sign each data structure, thus including it in the canonical chain. Here’s the block used by Bitcoin (most other cryptos will have mostly the same components).
You can see the transactions in the Block Content section, and you can see info (such as the hash of the previous block) in the Header section. Let’s relate this all together and draw a true picture of a blockchain (specifically Bitcoin) block. To do so, we’re gonna be dealing with a whole bunch of cryptographic hashes.
Hashing: A Redux
If you want the nitty gritty detail, you can go here. However, since we’re not writing a mining algorithm or a storefront, I’ll spare you the minutae. If you want an awesome video that explains exactly what I’m about to talk about, but in visual form? Here ya go! Want to learn more about blockchain than you ever wanted to know, but all at a layperson level? You’re welcome!
Here’s a Bitcoin block:
Let’s work from the bottom up.
txns
The payload of a Bitcoin block is an array of transactions. Each transaction looks like this:
I show the transaction mainly to show you that it contains two things: tx_in and tx_out. This is how it works, you combine a certain number of prior transactions in the blockchain (inputs) and then dole out the coins contained in those transactions in the outputs. If the inputs go over how much you’re paying the other person, you add an output to pay yourself back the overage. It’s much like cash. Just like handing bills to the cashier and receiving change back, you hand over inputs, and receive back an output for the overage.
Let’s do a quick example. Oscar wants to pay ZARDOZ for the Gift of the Gun, and he wants to pay $150. Oscar has previously received money from Office Manager Mohammed for “Jihad related expenses” for the amount of $110. Oscar has also previously received money from Preet Bahahahaha for “Woodchipping services” in the amount of $65. In order to pay ZARDOZ, Oscar sets up the transaction by including the previous Jihad and Woodchipping transactions as inputs, and creates two outputs: one to ZARDOZ for $150, and one back to Oscar for the remainder ($25). Then those Jihad and Woodchipping transactions are marked as fulfilled, meaning that they can’t be used again as inputs.
txn_count
This is fairly self explanatory. This contains the number of transactions in the block.
nonce
From here on up in the block, everything is contained in the header. Remember that the hash of the block is really the hash of the header. The txn and txn_count parts of the block are not used in calculating the hash. However, we’ll find out really soon why the transactions are still reflected in the block hash.
Nonce is related to mining. I’ve alluded to the way that blocks are created, and I’ll discuss it more in the next section, but suffice it to say that the nonce is a random number and has no purpose besides in calculating the hash. The way that a block is added to the blockchain is that the block’s hash must be below a certain number. How do you get the hash below a certain number? You adjust the source data used to make the hash. Since the hash comes from the header and the nonce is in the header, you can change the nonce until the hash is below a certain number. Notice that simply changing the nonce to a lower number doesn’t guarantee that the hash is a lower number. This is where luck and random chance come into play. We’ll talk more in the next section about this.
bits
Bits goes with the nonce. It is the “certain number” mentioned above that the hash needs to go below for the block to be accepted.
timestamp
Timestamp is self explanatory. It’s the time when the block was created.
Merkle Root
We’ve discussed the Merkle root before, but haven’t really nailed it down. Let’s do that now. The 10,000 foot view is that the Merkle root is the hash of all of the transactions. The hash of the block (which is actually the hash of the block header) takes the Merkle root into account when calculated.
The Merkle tree is a binary tree (each parent node has two children) that hashes from the bottom up. The bottom row of the Merkle tree contains the hashes of each transaction. The middle row hashes adjacent bottom row hashes (it’s a hash of a hash). The top row is a hash of a hash of a hash and contains information from all of the transactions. Notice what it would take to modify or replace a transaction. If STEVE SMITH tries to replace TX4 with FAKE_TX4, he has to recalculate three different hashes, as well (all of the hashes that include TX4 in them).
Prev Hash
This has been discussed at length in the prior two parts. This is the hash of the prior block, the link between the current block and the prior block.
Version
The version of the blockchain tells everybody what rules this block has been assembled under. This makes it possible to improve a blockchain without having to toss out all of the old blocks.
Mining
We’ve hinted at what mining is already, but now we can put all the pieces together. When transactions are posted to the blockchain network (all of the computers mining and transacting on that blockchain), they are packaged up into a block to be added to the end of the blockchain. How this happens is technical and a bit beyond this overview. Once a block is packaged up, the mining process begins. The block, sans block hash and nonce, is sent out to the network for mining. Computers that are set up as miners begin to calculate the block hash. Remember that the block hash is calculated from data that includes the Merkle root, the previous block’s hash, and the nonce. All of those pieces of data are constant except for the nonce. Therefore, miners, upon calculating the block hash, adjust the nonce to try to get the block hash to be less than the current difficulty number (represented by the bits field).
Once a miner has calculated a block hash below the current difficulty number, they submit the hashed block to the network. If they’re the first to do so, they “win”. They end up getting a small payment of cryptocurrency for their efforts. The payment is based on an algorithm that reduces the amount of currency created for a successful mine until an end date when no more currency will be created for that coin. At that time, miners will only be compensated by transaction fees (which are currently in the tenths of a percent range).
As you can imagine, it’s not easy to do this. Bitcoin, for example, is designed so that, on average, the winner mines the block in about 10 minutes. Given the vast amount of processing power dedicated to Bitcoin mining across the world, the chance of a single desktop computer winning even once a month is slim. In some other cryptocurrencies, it is easier, but even a second tier crypto like Monero would average one or two wins a month for a standard desktop computer. At that point, you’re probably not making enough to pay for the electricity you used.
That’s where mining pools come in. It’s a fairly simple concept. Take a bunch of computers, let them mine as a cohesive unit, and split the winnings across members based on a pre-defined formula.
The Big Picture of Blockchain and Different Applications
We’ve talked about blockchain in the context of cryptos, but there are a ton of different potential applications for blockchain. The main “hot topic” for blockchain use is reputation analysis. Rather than having to go through a reputation broker (Uber, AirBnB, Yelp) to find out whether the person driving that car or renting that room or cooking that meal is trustworthy, you can reach out to the decentralized blockchain to find their reputation.
This is a fairly simplistic application of reputation analysis, but the reason folks are excited is the application of such a thing to automation technology. What if, for example, you didn’t have to put in a reservation to get a hotel room? If your reputation is high enough and the room is available, the lockbox automatically opens and gives you the key to the room. All you have to do is tell the system how long you plan on staying there, and you’re set.
Another application is identity management. Does the cashier really need to see your name, address, and other personal info to know that you’re old enough to buy alcohol? There’s a whole bunch of identity leakage that sets each and every one of us up for identity theft. One proposed use of blockchain is to provide customized identity services. The cashier can query the blockchain as to whether you’re old enough to buy alcohol, but can’t access your address. Amazon can get your address, but can’t get your social security number. Starbucks can get your first name, but not your last name.
What about securing your finances? This isn’t entirely separate from cryptocurrencies, but what if every transaction you made was from a different account? Instead of giving your bank account info or your credit card number to merchants, you give the equivalent of a Visa gift card with the exact amount of the transaction on it. If Target gets breached and your info is leaked to malevolent actors, it’s not an issue, because it points to an empty one-time account.
Finally, the application that I think would be the most interesting. Traffic management via blockchain. As automated cars become a more likely reality, most of the traffic management interaction methods that have been designed to be centralized or distributed in nature. A decentralized traffic management system would reduce the efficacy of government meddling and the potential for an enforced monopoly a la internet service provider.
Cryptocurrencies
I’m not going to list out all the cryptocurrencies in detail. I trust y’all to DDG it yourselves. Let me just point out a few of the big ones in passing.
Bitcoin – The original and most famous. There is relatively little anonymity in using Bitcoin, as shown by the Silk Road FBI takedown. It’s also relatively slow to get new blocks integrated, at an average of 10 minutes per block.
Bitcoin Cash – A fork of Bitcoin meant to scale to more users a bit easier by making the blocks bigger.
LiteCoin – Billed as “silver to Bitcoin’s gold”. It generates blocks 4x faster (2.5 minutes per block), will generate more coins than BitCoin, and some different internal algorithms.
Ethereum – Ethereum is much more than a cryptocurrency. It creates smart contracts that can take advantage of automation. Want to unlock your guestroom when somebody has enough reputation points? Ethereum is probably the best blockchain to start from to do this sort of thing.
Monero – Billed as the “secure cryptocurrency,” it is designed slightly differently from BitCoin so that bad actors (like the FBI) can’t trace one transaction back and see your entire transaction history. Secure is a relative term, because, as seen in the Silk Road incident, there are weaknesses wherever you have to give personal info (shipping, currency conversion)
Drawbacks and Limitations
This could be an article in and of itself, but I’ll just hit a few that are top of mind.
Blockchain length – The immense size of the Bitcoin (and other large cryptos’) blockchain means that you either need to rely on somebody else’s node to get plugged in (by using an exchange) or you need to wait a few days for all of the blocks to be downloaded.
Block acceptance time – In Bitcoin, it takes an average of 10 minutes for your transaction to be included in an accepted block, and due to forks (when two different blocks are accepted in two different parts of the network), folks recommend waiting an hour before declaring the transaction “completed.” That obviously doesn’t work for somebody trying to walk out the checkout line at the supermarket.
Scalability – This is kinda wrapped up in the last two, but the number of transactions in a block are limited by a maximum size. Therefore, as more and more transactions occur, the chance of your transaction making the first block goes down substantially. Then, you have to wait not only 10 minutes for your block to be mined, but you have to wait an unknown amount of time until your transaction is included in a mined block. This is where transaction fees come into play. When there are 50,000 transactions, which ones are you going to try to make into a block as a miner? The ones that pay the best, of course.
Security – We’ve discussed some security concerns already, but blockchain doesn’t resolve the single biggest threat in online transactions: the other party in the transaction retaining and ultimately misappropriating your personal information.
I hope this series was helpful to y’all! I’ve certainly learned a ton!