I can hardly believe it, but today's episode marks the first anniversary of the launch of Patients Getting Paid!This community has long been a dream of mine - I've spent years learning how to find work that replaces a regular paycheck, but fits around my health condition. And once I found it, I knew I had to share it with my chronic illness community!In this episode, I talk about my own chronicpreneur story and the birth of PGP, before we hear from a handful of people from within PGP about what they've loved about being part of the community.Thank you for being a part of the Patients Getting Paid story so far. And if you're sitting on the fence about becoming a full member, check out what people currently inside the community are saying. And bear in mind that there's a price rise on the horizon! Now really is the best time to invest in yourself and begin living the chronicpreneur dream of work that fits around your health needs and that PAYS. In this episode:How Kathy's first steps to a chronicpreneur lifestyle grew out of monetizing her blogWhat led to her decision to leave full-time workHow Patients Getting Paid was born the moment she realized that she was making more money than when she was employed by someone elseAn overview of the different aspects that make up the PGP CommunityMessages from a number of PGP Community membersFull notes and resources at https://patientsgettingpaid.com/blog/patients-getting-paid-first-anniversary
PGP returns for an episode where they're joined by Orna Simkhai and three other Persian mothers. They share the story of how they formed We Do Care: Iranian-American Parents of LGBTQ, a community formed in 2013. Orna and her friends also share advice and discuss their own experience with their children coming out. More info on We Do Care: https://www.facebook.com/pages/category/Community/We-Do-Care-Iranian-American-Parents-of-LGBTQ-943104462412560/Support the show
Kathy Reagan Young is the founder of the FUMSnow.com site – whose mission is to provide information, inspiration, and motivation to help people with Multiple Sclerosis live their best lives. Diagnosed in 2008, Kathy found nothing uplifting about MS on the internet – only depressing, medically-dense sites. So – she built the site herself to show people that there was indeed life after diagnosis – and it could be a really good one! Over the course of 10+ years, she added a podcast, merchandise, and an ebook in an effort to monetize the site when she had to leave her full time employment due to her MS. Once she added patient advocacy gigs to her portfolio, her online income surpassed her previous full time employment income. Upon that achievement, she knew she had to share her experience and resources – which is why she started the Patients Getting Paid membership community – to help people with chronic illness learn how to find and create flexible, remote work opportunities to better accommodate their health while generating an income. She added a podcast for PGP as well - all of which can be found at www.PatientsGettingPaid.com Find Kathy's Podcasts on Social Media: ** Patients Getting Paid: Apple Podcast: https://podcasts.apple.com/us/podcast/patients-getting-paid/id1581141026 Google Podcast: https://open.spotify.com/show/325dx2GYuaipvbi8y3YTGz?si=XffG1ADOTcGYwtm5aK9C5w&utm_source=copy-link Instagram: https://www.instagram.com/patientsgettingpaid/ ** FUMS: Apple Podcast: https://podcasts.apple.com/us/podcast/fums-giving-multiple-sclerosis-the-finger/id982388479 Google Podcast: https://open.spotify.com/show/1CRt6lX5imnKsnB02TgwXW?si=kNAfCHyJQ7ilIstfEuszyw&utm_source=copy-link Instagram: https://www.instagram.com/fums.now/ Additional Resources: https://www.doctorgretchenhawley.com/insider Reach out to Me: Gretchen@DoctorGretchenHawley.com Website: www.MSingLink.com Social: ★ Facebook: https://www.facebook.com/groups/mswellness ★ Instagram: https://www.instagram.com/doctor.gretchen ★ YouTube: https://www.youtube.com/c/doctorgretchenhawley?sub_confirmation=1 → Game Changers Course: https://www.doctorgretchenhawley.com/GameChangersCourse → Total Core Program: https://www.doctorgretchenhawley.com/TotalCoreProgram → The MSing Link: https://www.doctorgretchenhawley.com/TheMSingLink
Timothy Willis Sanders is the author of the story collection Modern Massacres (Publishing Genius). Modern Massacres is Timothy Willis Sanders's third book and second collection of short stories. In the vein of Orange Juice (his first collection with PGP, from 2010), stories like “John Lennon,” “Officer Walter,” and “Glasses” examine contemporary life in a familiar, canny way. Humorous and full of keen observations, Sanders writes with care and respect for his characters, from the innocent kids to the flawed adults, all of whom are looking for connection and approval—or at least some kindness in a world that isn't always easy to live in. *** Otherppl with Brad Listi is a weekly literary podcast featuring in-depth interviews with today's leading writers. Launched in 2011. Books. Literature. Writing. Publishing. Authors. Screenwriters. Etc. Available where podcasts are available: Apple Podcasts, Google Podcasts, Spotify, Stitcher, iHeart Radio, etc. Subscribe to Brad Listi's email newsletter. Support the show on Patreon Merch @otherppl Instagram YouTube Email the show: letters [at] otherppl [dot] com The podcast is a proud affiliate partner of Bookshop, working to support local, independent bookstores. Learn more about your ad choices. Visit megaphone.fm/adchoices
PGP America only "Identifies" as a Super Power these days America has gone from the Cool Kid on the High School Football Team to the Old Guy talking about the glory days with his old classmates. https://mcdn.podbean.com/mf/web/2j9n3n/PGP_08_17_22_yt6xms4.mp4
Hello once again everyone I'm your host Ray Shasho and welcome to another edition of Interviewing the Legends. Brought to you by The Publicity Works Agency specializing in authors & musicians Remember We shine only when We make you shine! Call us today at 941-567-6193 for a free PR evaluation! KINGS X architected a catalog of seminal releases. KERRANG! famously scored their 1988 full-length debut, Out of the Silent Planet, with a rare “5-out-of-5-stars.” On its heels, the landmark Gretchen Goes to Nebraska continues to inspire think pieces with Ultimate Classic Rock going as far to proclaim, “no one else has crafted anything remotely like it.” They notably appeared on the soundtrack to Bill & Ted's Bogus Journey, and Guitar World christened the self-titled King's X one of “The 30 Greatest Rock Guitar Albums of 1992” (a year notably highlighted by Pantera's Vulgar Display of Power, Alice in Chains' Dirt, Megadeth's Countdown To Extinction, Dream Theater's Images and Words, and many more). Following Dogman, the group graced the stage of Woodstock 1994 and toured with everyone from Pearl Jam and AC/DC to Mötley Crüe and Iron Maiden. They also attracted one of the most diehard fanbases in music. Their first full-length studio offering in 14 years, Three Sides of One, represents the culmination of this trip and of a bond forged way back in 1979. PLEASE WELCOME bass guitarist, songwriter, and co-lead vocalist for the hard rock and progressive metal band King's X DUG PINNICK to Interviewing the Legends … PREORDER THE NEW ALBUM BY KINGS X Entitled ‘THREE SIDES OF ONE' AT https://kingsx.lnk.to/ThreeSidesOfOne The legendary King's X, comprised of Doug Pinnick, Ty Tabor & Jerry Gaskill, are pleased to announce the release of their 13th studio album ‘Three Sides of One' on September 2nd, 2022. With the announcement comes the first new music from the band in 14 years. ‘Three Sides of One' will be available as Limited CD Digipak, Gatefold 180g 2LP+CD+LP-booklet & as Digital Album. There will also be a Limited Deluxe 180g Orange/Red Marble 2LP+CD+LP-booklet that also includes a poster and a hand-numbered print, as well as an exclusive variant of the front cover artwork. Pre-order now at: https://kingsx.lnk.to/ThreeSidesOfOne ALSO PURCHASE 'JOY BOMB' By dUg Pinnick Solo Release available at amazon.com FOR MORE INFORMATION ABOUT KINGS X And dUg Pinnick VISIT www.dugnation.net dUg Pinnick Official Website www.kingsxrocks.com Official Website www.facebook.com/KingsXofficial Facebook https://twitter.com/kingsx Twitter www.instagram.com/kingsxofficial Instagram DISCOGRAPHY KINGS X Studio albums Year Album 1983 Sneak Preview 1988 Out of the Silent Planet 1989 Gretchen Goes to Nebraska 1990 Faith Hope Love 1992 King's X 1994 Dogman 1996 Ear Candy 1998 Tape Head 2000 Please Come Home... Mr. Bulbous 2001 Manic Moonlight 2003 Black Like Sunday 2005 Ogre Tones 2008 XV 2022 Three Sides of One Live albums Year Album 2004 Live All Over the Place 2007 Live & Live Some More 2009 Tales from the Empire 2010 Live Love in London 2012 Burning Down Boston Solo albums Emotional Animal (2005) Songs from the Closet (Molken Music, 2006) A collection of King's X demos with two previously unreleased songs Strum Sum Up (2007) Naked (2013) Tribute to Jimi (Often Imitated but Never Duplicated) (2018) Joy Bomb (2021) Poundhound Massive Grooves... (1998) Pineappleskunk (2001) KXM KXM (2014) Scatterbrain (2017) Circle of Dolls (2019) Grinder Blues Grinder Blues (2014) El Dos (2021) Pinnick, Gales & Pridgen PGP (2013) PGP 2 (2014) Side bands Supershine - s/t (2000) The Mob - s/t (2005) The Jibbs - "Burns In The Rain" single (2008) Razr 13 - Reflections (2009) Tres Mts. - Three Mountains (2011) 3rd Ear Experience - Peacock Black (2013) 3rd Ear Experience - Boi (2013) Pinnick Gales Pridgen - s/t (2013) Pinnick Gales Pridgen - PGP 2 (2014) Support us!
Pregnancy related Pelvic Girdle Pain. You won't see RELAXIN here! 5 unexpected risk factors for pregnancy related pelvic girdle pain. The latest on how to manage and treat pregnancy related pelvic girdle pain, a guide for patients and practitioners.Sinéad Dufour PT PhDDr. Sinéad Dufour is an Associate Clinical Professor in the Faculty of Health Science at McMaster University. She teaches and conducts research in the Schools of Medicine, Nursing and Rehabilitation Science. She completed her MScPT at McMaster University (2003), her PhD in Health and Rehabilitation Science at Western (2011), and returned to McMaster to complete a post-doctoral fellowship (2014). Her current research interests include: conservative approaches to manage pelvic floor dysfunction, pregnancy-related pelvic-girdle pain, and interprofessional collaborative practice models of service provision to enhance pelvic health and pain science. Sinéad stays current as a pelvic health physiotherapists through her practice at The World of my Baby (the WOMB) a family of perinatal care centers in Ontario, Canada. Sinéad has been an active member of the Society of Obstetricians and Gynecologists of Canada (SOGC) sitting of multiple committees and leading several clinical practice guidelines. She also proud to serve as a clinical advisor many women's health businesses. Her passion for optimizing perinatal care and associated upstream health promotion for women stemmed from her own experience becoming a mother of twins. She is an advocate for women's pelvic health and a regular invited speaker at conferences around the world. LinksIG: @dr.sineadwww.thewomb.cahttps://experts.mcmaster.ca/display/sdufourhttps://reframerehab.com/https://biaformations.com/en/https://aptapelvichealth.org/education/freewebinars/Come learn with me to understand how we all need to “Re-frame” pregnancy-related PGP. https://reframerehab.com/25% Discount Code: SUMMIT25 To recommend interviewee guests and suggest topics, please leave a review for the show along with your suggested topics. You are also welcome to head over to the YouTube channel and leave a comment with your desired topics and guests. More from Candice IG: @nurtureyourvagina NurturePelvicHealth.com Use the code NURTUREPOD for a 20% discount on any courses.Todays Sponsor: Guided By Glow Guided by Glow is giving our listeners $20 off the annual membership. Use the promo code NURTURE on guidedbyglow.com This promo is available only through the website but if you prefer an app you can also access a few free glow sessions through their app!Thank you and as always, stay curious!Candice
The Boardroom Roundup brings you the latest DAO news headlines and governance proposals every week This week: • Uniswap proposes the formation of a foundation • Optimism's Token House concludes Season 1 • Aave Companies seeks retroactive payment for V3 work • Bridge hacks spook Aave and Frax • CreatorDAO raises $20M from a16z Plus, Figue from Paladin joins us to break down proposal PGP-17 Treasury Management —
This week, we get nostalgic with some of our favorite songs from the PUNK GOES series!!// Listen to Calm & Collected by Deaf Andrews! //Laniidae is playing Amos' Southend in Charlotte, NC - 8/20! //TIMESTAMPS| 5:47 | Calm & Collected| 19:50 | Still Fly| 36:00 | Heartless| 48:23 | Glad You Came| 57:01 | ...Baby One More Time| 1:08:19 | Little Lion Man| 1:22:34 | TornJOIN OUR DISCORD!Hit us up! -- Instagram // Email: email@example.comLogo and Art by Mitch WeirCONTENT ADVISORY: Explicit language, mature lyrical themesThe Banger Alert Podcast is Joe Tantalo and Mitch Weir
Over the course of these podcasts - and within the PGP community - the topic of Patient Advocacy and how to get paid for sharing your patient experience comes up repeatedly. People can be a little shy in naming their price - I know I certainly was!But now I say that you should not be shy about charging what your time and experiences are worth. Patient advocates have valuable skills and information in how they live their lives. And people will pay for it! I'm pleased to say that today's guest agrees with me. Jenna Green is a patient advocate, content creator, consultant, and speaker living with Multiple Sclerosis, Dystonia, and IBS as well as depression and anxiety. As you'll learn, Jenna is an overachiever in all areas of her life!Since her MS diagnosis in 2016, she has used her 20 years of experience in marketing, and a decade of self-employment to help bring awareness, support, education, and community to those who live with invisible illnesses, chronic pain, and fatigue. She's dedicated to helping disabled and chronically ill people live their best lives and also works with companies that want to engage with the community.At various times over the years, Jenna has had to rethink how she wants to define success or what her idea of a good life looks like. In our chat, she has a ton of advice on how to shift your career or side hustle into a new stage. In this episode:The story of Jenna's pre-diagnosis career and how her numerous chronic illnesses changed her working lifeHow the term 'passive income' doesn't reflect how much work it takes!Why working for herself with numerous chronic illnesses forced Jenna to redefine what success looked like to herThe reasons why undercharging for patient advocacy work can harm the whole community Details of a very generous discount for the PGP community on Jenna's Business Brainstorming PlannerFull notes and resources at https://patientsgettingpaid.com/blog/patient-advocacy-paid-work
Jon Callas is a computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle. He has held major positions at Digital Equipment Corporation, Apple, PGP, and Entrust, and is considered "one of the most respected and well-known names in the mobile security industry. His views stem from big tech's mass pooling of personal data for advertising and the polarization within Silicon Valley. While some companies are committed to privacy, many more earn their revenues from selling user data. Callas has stated that if the advertising market takes a downturn, companies that protect their users' data are the most insulated from harm. --- Support this podcast: https://anchor.fm/out-of-the-blank-podcast/support
Josh and Kurt talk about their very silly GPG key management from the past. This is sadly a very true story that details how both Kurt and Josh protected their GPG keys. Josh's setup is like something out of a very bad spy novel. It was very over the top for a key that really didn't matter. Show Notes XKCD signed email Shire calendar Guardian editors destroy Snowden laptop
Get inside knowledge into the world of Data Security from a Leading Privacy Expert!Hi, my name is Jamal Ahmed and I'd like to invite you to listen to this special episode of the #1 ranked Data Privacy podcast. In this episode you'll discover: The Most Common and Costly Mistakes To Avoid In Data Security How to successfully implement Security Programmes and encrypt data What you need to stand out in the hiring process And the possibility of a Federal Privacy Law in the US! Jeff Sizemore, Vice President of Governance and Compliance at Egnyte, is responsible for the strategy and execution of the Egnyte Protect content governance solution. Jeff has an extensive background in data protection, specifically in encryption, key management, data loss prevention, and identity and access management. Jeff has helped define the market by contributing to several start-ups, including PGP (now part of Symantec), Ionic Security, and Port Authority (now ForcePoint DLP). Listen Now... Follow Jamal on LinkedIn:https://www.linkedin.com/in/kmjahmed/ ( https://www.linkedin.com/in/kmjahmed/) Connect with Jeff on LinkedIn: https://www.linkedin.com/in/jeffsizemore/ (https://www.linkedin.com/in/jeffsizemore/) Join the Privacy Pros Academy Private Facebook Group for:• Free LIVE Training • Free Easy Peasy Data Privacy Guides • Data Protection Updates and so much more Apply to join here whilst it's still free:https://www.facebook.com/groups/privacypro ( https://www.facebook.com/groups/privacypro)
Episode Notes Episode summary Margaret talks with Elle an anarchist and security professional about different threat modeling approaches and analyzing different kinds of threats. They explore physical threats, digital security, communications, surveillance,and general OpSec mentalities for how to navigate the panopticon and do stuff in the world without people knowing about it...if you're in Czarist Russia of course. Guest Info Elle can be found on twitter @ellearmageddon. Host and Publisher The host Margaret Killjoy can be found on twitter @magpiekilljoy or instagram at @margaretkilljoy. This show is published by Strangers in A Tangled Wilderness. We can be found at www.tangledwilderness.org, or on Twitter @TangledWild and Instagram @Tangled_Wilderness. You can support the show on Patreon at www.patreon.com/strangersinatangledwilderness. Show Links Transcript Live Like the World is Dying: Elle on Threat Modeling Margaret 00:15 Hello, and welcome to Live Like The World Is Dying, your podcast for what feels like the end times. I'm your host, Margaret killjoy. And with me at the exact moment is my dog, who has just jumped up to try and talk into the microphone and bite my arm. And, I use 'she' and 'they' pronouns. And this week, I'm going to be talking to my friend Elle, who is a, an anarchist security professional. And we're going to be talking about threat modeling. And we're going to be talking about how to figure out what people are trying to do to you and who's trying to do it and how to deal with different people trying to do different things. Like, what is the threat model around the fact that while I'm trying to record a podcast, my dog is biting my arm? And I am currently choosing to respond by trying to play it for humor and leaving it in rather than cutting it out and re recording. This podcast is a proud member of the Channel Zero network of anarchists podcasts. And here's a jingle from another show on the network. Jingle Margaret 02:00 Okay, if you could introduce yourself, I guess, with your name and your pronouns, and then maybe what you do as relates to the stuff that we're going to be talking about today. Elle 02:10 Yeah, cool. Hi, I'm Elle. My pronouns are they/them. I am a queer, autistic, anarchist security practitioner. I do security for a living now that I've spent over the last decade, working with activist groups and NGOs, just kind of anybody who's got an interesting threat model to help them figure out what they can do to make themselves a little a little safer and a little more secure. Margaret 02:43 So that word threat model. That's actually kind of what I want to have you on today to talk about is, it's this word that we we hear a lot, and sometimes we throw into sentences when we want to sound really smart, or maybe I do that. But what does it mean, what is threat modeling? And why is it relevant? Elle 03:02 Yeah, I actually, I really love that question. Because I think that we a lot of people do use the term threat modeling without really knowing what they mean by it. And so to me, threat modeling is having an understanding of your own life in your own context, and who poses a realistic risk to you, and what you can do to keep yourself safe from them. So whether that's, you know, protecting communications that you have from, you know, state surveillance, or whether it's keeping yourself safe from an abusive ex, your threat model is going to vary based on your own life experiences and what you need to protect yourself from and who those people actually are and what they're capable of doing. Margaret 03:52 Are you trying to say there's not like one solution to all problems that we would just apply? Elle 03:58 You know, I love... Margaret 03:58 I don't understand. Elle 04:00 I know that everybody really, really loves the phrase "Use signal. Use TOR," and you know, thinks that that is the solution to all of life's problems. But it actually turns out that, no, you do have to have both an idea of what it is that you're trying to protect, whether it's yourself or something like your communications and who you're trying to protect it from, and how they can how they can actually start working towards gaining access to whatever it is that you're trying to defend. Margaret 04:31 One of the things that when I think about threat modeling that I think about is this idea of...because the levels of security that you take for something often limit your ability to accomplish different things. Like in Dungeons and Dragons, if you were plate armor, you're less able to be a dexterous rogue and stealth around. And so I think about threat modeling, maybe as like learning to balance....I'm kind of asking this, am I correct in this? Balancing what you're trying to accomplish with who's trying to stop you? Because like, you could just use TOR, for everything. And then also like use links the little like Lynx [misspoke "Tails"] USB keychain and never use a regular computer and never communicate with anyone and then never accomplish anything. But, it seems like that might not work. Elle 05:17 Yeah, I mean, the idea, the idea is to prevent whoever your adversaries are from keeping you from doing whatever you're trying to accomplish. Right? So if the security precautions that you're taking to prevent your adversaries from preventing you from doing a thing are also preventing you from doing the thing, then it doesn't matter, because your adversaries have just won, right? So there, there definitely is a need, you know, to be aware of risks that you're taking and decide which ones make sense, which ones don't make sense. And kind of look at it from from a dynamic of "Okay, is this something that is in my, you know, acceptable risk model? Is this a risk I'm willing to take? Are there things that I can do to, you know, do harm reduction and minimize the risk? Or at least like, make it less? Where are those trade offs? What, what is the maximum amount of safety or security that I can do for myself, while still achieving whatever it is that I'm trying to achieve?" Margaret 06:26 Do you actually ever like, chart it out on like, an X,Y axis where you get like, this is the point where you start getting diminishing returns? I'm just imagining it. I've never done that. Elle 06:37 In, in the abstract, yes, because that's part of how autism brain works for me. But in a, like actually taking pen to paper context, not really. But that's, you know, at least partially, because of that's something that autism brain just does for me. So I think it could actually be a super reasonable thing to do, for people whose brains don't auto filter that for them. But but I'm, I guess, lucky enough to be neurodivergent, and have like, you know, like, we always we joke in tech, "It's not a bug, it's a feature." And I feel like, you know, autism is kind of both sometimes. In some cases, it's totally a bug and and others, it's absolutely a feature. And this is one of the areas where it happens to be a feature, at least for me. Margaret 07:35 That makes sense. I, I kind of view my ADHD as a feature, in that, it allows me to hyper focus on topics and then move on and then not come back to them. Or also, which is what I do now for work with podcasting, and a lot of my writing. It makes it hard to write long books, I gotta admit, Elle 07:56 Yeah, I work with a bunch of people with varying neuro types. And it's really interesting, like, at least at least in my own team, I think that you know, the, the folks who are more towards the autism spectrum disorder side of of the house are more focused on things like application security, and kind of things that require sort of sustained hyper focus. And then folks with ADHD make just absolutely amazing, like incident responders and do really, really well in interrupt driven are interrupts heavy contexts, Margaret 08:38 Or sprinters. Elle 08:40 It's wild to me, because I'm just like, yes, this makes perfect sense. And obviously, like, these different tasks are better suited to different neuro types. But I've also never worked with a manager who actually thought about things in that way before. Margaret 08:53 Right. Elle 08:54 And so it's actually kind of cool to be to be in a position where I can be like, "Hey, like, Does this sound interesting to you? Would you rather focus on this kind of work?" And kind of get that that with people. Margaret 09:06 That makes sense that's.... i I'm glad that you're able to do that. I'm glad that people that you work with are able to have that you know, experience because it is it's hard to it's hard to work within....obviously the topic of today is...to working in the workplace is a neurodivergent person, but it I mean it affects so many of us you know, like almost whatever you do for work the the different ways your brain work are always struggling against it. So. Elle 09:32 Yeah, I don't know. It just it makes sense to me to like do your best to structure your life in a way that is more conducive to your neurotype. Margaret 09:44 Yeah. Elle 09:45 You know, if you can. Margaret 09:49 I don't even realize exactly how age ADHD I was until I tried to work within a normal workforce. I built my entire life around, not needing to live in one place or do one thing for sustained periods of time. But okay, but back to the threat modeling. Margaret 10:07 The first time I heard of, I don't know if it's the first time I heard a threat modeling or not, I don't actually know when I first started hearing that word. But the first time I heard about you, in the context of it was a couple years back, you had some kind of maybe it was tweets or something about how people were assuming that they should use, for example, the more activist focused email service Rise Up, versus whether they should just use Gmail. And I believe that you were making the case that for a lot of things, Gmail would actually be safer, because even though they don't care about you, they have a lot more resources to throw at the problem of keeping governments from reading their emails. That might be a terrible paraphrasing of what you said. But this, this is how I was introduced to this concept of threat modeling. If you wanted to talk about that example, and tell me how I got it all wrong. Elle 10:07 Yeah. Elle 10:58 Yeah. Um, so you didn't actually get it all wrong. And I think that the thing that I would add to that is that if you are engaging in some form of hypersensitive communication, email is not the mechanism that you want to do that. And so when I say things like, "Oh, you know, it probably actually makes sense to use Gmail instead of Rise Up," I mean, you know, contexts where you're maybe communicating with a lawyer and your communications are privileged, right?it's a lot harder to crack Gmail security than it is to crack something like Rise Up security, just by virtue of the volume of resources available to each of those organizations. And so where you specifically have this case where, you know, there's, there's some degree of legal protection for whatever that means, making sure that you're not leveraging something where your communications can be accessed without your knowledge or consent by a third party, and then used in a way that is conducive to parallel construction. Margaret 12:19 So what is parallel construction? Elle 12:20 Parallel construction is a legal term where you obtain information in a way that is not admissible in court, and then use that information to reconstruct a timeline or reconstruct a mechanism of access to get to that information in an admissible way. Margaret 12:39 So like every cop show Elle 12:41 Right, so like, with parallel construction around emails, for example, if you're emailing back and forth with your lawyer, and your lawyer is like, "Alright, like, be straight with me. Because I need to know if you've actually done this crime so that I can understand how best to defend you." And you're like, "Yeah, dude, I totally did that crime," which you should never admit to in writing anyway, because, again, email is not the format that you want to have this conversation in. But like, if you're gonna admit to having done crimes in email, for some reason, how easy it is for someone else to access that admission is important. Because if somebody can access this email admission of you having done the crimes where you're, you know, describing in detail, what crimes you did, when with who, then it starts, like, it gets a lot easier to be like, "Oh, well, obviously, we need to subpoena this person's phone records. And we should see, you know, we should use geolocation tracking of their device to figure out who they were in proximity to and who else was involved in this," and it can, it can be really easy to like, establish a timeline and get kind of the roadmap to all of the evidence that they would need to, to put you in jail. So it's, it's probably worth kind of thinking about how easy it is to access that that information. And again, don't don't admit to doing crimes in email, email is not the format that you want to use for admitting to having done crimes. But if you're going to, it's probably worth making sure that, you know, the the email providers that you are choosing are equipped with both robust security controls, and probably also like a really good legal team. Right? So if...like Rise Up isn't going to comply with the subpoena to the like, to the best of their ability, they're not going to do that, but it's a lot easier to sue Rise Up than it is to sue Google. Margaret 14:51 Right. Elle 14:51 And it's a lot easier to to break Rise Up's security mechanisms than it is to break Google's, just by virtue of how much time and effort each of those entities is able to commit to securing email. Please don't commit to doing crimes in email, just please just don't. Don't do it in writing. Don't do it. Margaret 15:15 Okay, let me change my evening plans. Hold on let me finish sending this email.. Elle 15:23 No! Margaret 15:25 Well, I mean, I guess like the one of the reasons that I thought so much about that example, and why it kind of stuck with me years later was just thinking about what people decide they're safe, because they did some basic security stuff. And I don't know if that counts under threat modeling. But it's like something I think about a lot is about people being like, "I don't understand, we left our cell phones at home and went on a walk in the woods," which is one of the safest ways anyone could possibly have a conversation. "How could anyone possibly have known this thing?" And I'm like, wait, you, you told someone you know, or like, like, not to make people more paranoid, but like... Elle 16:06 Or maybe, maybe you left your cell phone at home, but kept your smartwatch on you, because you wanted to close, you know, you wanted to get your steps for the day while you were having this conversation, right? Margaret 16:19 Because otherwise, does it even count if I'm not wearing my [smartwatch]. Elle 16:21 Right, exactly. And like, we joke, and we laugh, but like, it is actually something that people don't think about. And like, maybe you left your phones at home, and you went for a walk in the woods, but you took public transit together to get there and were captured on a bunch of surveillance cameras. Like there's, there's a lot of, especially if you've actually been targeted for surveillance, which is very rare, because it's very resource intensive. But you know, there there are alternate ways to track people. And it does depend on things like whether or not you've got additional tech on you, whether or not you were captured on cameras. And you know, whether whether or not your voices were picked up by ShotSpotter, as you were walking to wherever the woods were like, there's just there's we live in a panopticon. I don't say that so that people are paranoid about it, I say it because it's a lot easier to think about, where, when and how you want to phrase things. Margaret 17:27 Yeah. Elle 17:28 In a way that you know, still facilitates communications still facilitates achieving whatever it is that you're trying to accomplish, but sets you sets you up to be as safe as possible in doing it. And I think that especially in anarchist circles, just... and honestly also in security circles, there's a lot of of like, dogmatic adherence to security ritual, that may or may not actually make sense based on both, you, who your actual adversaries are, and what their realistic capabilities are. Margaret 18:06 And what they're trying to actually accomplish I feel like is...Okay, one of the threat models that I like...I encourage people sometimes to carry firearms, right in very specific contexts. And it feels like a security... Oh, you had a good word for it that you just used...ritual of security theater, I don't remember...a firearm often feels like that, Elle 18:30 Right. Margaret 18:31 In a way where you're like," Oh, I'm safe now, right, because I'm carrying a firearm." And, for example, I didn't carry a firearm for a very long time. Because for a long time, my threat model, the people who messed with me, were cops. And if a cop is going to mess with me, I do not want to have a firearm on me, because it will potentially escalate a situation in a very bad way. Whereas when I came out and started, you know, when I started getting harassed more for being a scary transwoman, and less for being an anarchist, or a hitchhiker, or whatever, you know, now my threat model is transphobes, who wants to do me harm. And in a civilian-civilian context, I prefer I feel safer. And I believe I am safer in most situations armed in that case. But every time I leave the house, I have to think about "What is my threat model?" And then in a similar way, sorry, it's just me thinking about the threat model of firearms, but it's the main example that I think of, is that often people's threat model in terms of firearms and safety as themselves, right? And so you just actually need to do the soul searching where you're like,"What's more likely to happen to me today? Am I likely to get really sad, or am I likely to get attacked by fascists?" Elle 19:57 Yeah. And I think that there is there's an additional question, especially when you're talking about arming yourself, whether it's firearms, or carrying a knife, or whatever, because like, I don't own any firearms, but I do carry a knife a lot of the time. And so like some questions, some additional questions that you have to ask yourself are, "How confident am I in my own ability to use this to harm another person?" Because if you're going to hesitate, you're gonna get fucked up. Margaret 20:28 Yeah. Elle 20:28 Like, if you are carrying a weapon, and you pull it out and hesitate in using it, it's gonna get taken away from you, and it's going to be used against you. So that's actually one of the biggest questions that I would say people should be asking themselves when developing a threat model around arming themselves is, "Will I actually use this? How confident am I?" if you're not confident, then it's okay to leave it at home. It's okay to practice more. It's okay to like develop that familiarity before you start using it as an EDC. Sorry an Every Day Carry. And then the you know, the other question is, "How likely am I to get arrested here?" I carry, I carry a knife that I absolutely do know how to use most of the time when I leave the house. But when I'm going to go to a demonstration, because the way that I usually engage in protests or in demonstrations is in an emergency medical response capacity, I carry a medic kit instead. And my medic kit is a clean bag that does not have any sharp objects in it. It doesn't have anything that you know could be construed as a weapon it doesn't have...it doesn't...I don't even have weed gummies which are totally like recreationally legal here, right? I won't even put weed in the medic kit. It's it is very much a... Margaret 21:52 Well, if you got a federally arrested you'd be in trouble with that maybe. Elle 21:55 Yeah, sure, I guess. But, like the medic bag is very...nothing goes in this kit ever that I wouldn't want to get arrested carrying. And so there's like EMT shears in there. Margaret 22:12 Right. Elle 22:13 But that's that's it in terms of like... Margaret 22:16 Those are scary you know...the blunted tips. Elle 22:21 I know, the blunted tips and the like safety, whatever on them. It's just...it's it is something to think about is "Where am I going...What...Who am I likely to encounter? And like what are the trade offs here?" Margaret 22:37 I remember once going to a demonstration a very long time ago where our like, big plan was to get in through all of the crazy militarized downtown in this one city and, and the big plan is we're gonna set up a Food Not Bombs inside the security line of the police, you know. And so we picked one person, I think I was the sacrificial person, who had to carry a knife, because we had to get the folding tables that we're gonna put the food on off of the top of the minivan. And we had to do it very quickly, and they were tied on. And so I think I brought the knife and then left it in the car and the car sped off. And then we fed people and they had spent ten million dollars protecting the city from 30 people feeding people Food Not Bombs. Elle 23:20 Amazing. Margaret 23:22 But, but yeah, I mean, whereas every other day in my life, especially back then when I was a hitchhiker, I absolutely carried a knife. Elle 23:30 Yeah. Margaret 23:31 You know, for multiple purposes. Yeah, okay, so then it feels like...I like rooting it in the self defense stuff because I think about that a lot and for me it maybe then makes sense to sort of build up and out from there as to say like...you know, if someone's threat model is my ex-partner's new partner is trying to hack me or my abusive ex is trying to hack me or something, that's just such a different threat model than... Elle 24:04 Yeah, it is. Margaret 24:05 Than the local police are trying to get me versus the federal police are trying to get me versus a foreign country is trying to get me you know, and I and it feels like sometimes those things are like contradictory to each other about what isn't isn't the best maybe. Elle 24:19 They are, because each of those each of those entities is going to have different mechanisms for getting to you and so you know, an abusive partner or abusive ex is more likely to have physical access to you, and your devices, than you know, a foreign entity is, right? Because there's there's proximity to think about, and so you know, you might want to have....Actually the....Okay, so the abusive ex versus the cops, right. A lot of us now have have phones where the mechanism for accessing them is either a password, or some kind of biometric identifier. So like a fingerprint, or you know, face ID or whatever. And there's this very dogmatic adherence to "Oh, well, passwords are better." But passwords might actually not be better. Because if somebody has regular proximity to you, they may be able to watch you enter your password and get enough information to guess it. And if you're, if you're not using a biometric identifier, in those use cases, then what can happen is they can guess your password, or watch, you type it in enough time so that they get a good feeling for what it is. And they can then access your phone without your knowledge while you're sleeping. Right? Margaret 25:46 Right. Elle 25:47 And sometimes just knowing whether or not your your adversary has access to your phone is actually a really useful thing. Because you know how much information they do or don't have. Margaret 26:01 Yeah. No that's... Elle 26:03 And so it really is just about about trade offs and harm reduction. Margaret 26:08 That never would have occurred to me before. I mean, it would occur to me if someone's trying to break into my devices, but I have also fallen into the all Biometrics is bad, right? Because it's the password, you can't change because the police can compel you to open things with biometrics, but they can't necessarily compel you...is more complicated to be compelled to enter a password. Elle 26:31 I mean, like, it's only as complicated as a baton. Margaret 26:34 Yeah, there's that XKCD comic about this. Have you seen it? Elle 26:37 Yes. Yes, I have. And it is it is an accurate....We like in security, we call it you know, the Rubber Hose method, right? It we.... Margaret 26:46 The implication here for anyone hasn't read it is that they can beat you up and get you to give them their [password]. Elle 26:50 Right people, people will usually if they're hit enough times give up their password. So you know, I would say yeah, you should disable biometric locks, if you're going to go out to a demonstration, right? Which is something that I do. I actually do disable face ID if I'm taking my phone to a demo. But it...you may want to use it as your everyday mechanism, especially if you're living in a situation where knowing whether or not your abuser has access to your device is likely to make a difference in whether you have enough time to escape. Margaret 27:30 Right. These axioms or these these beliefs we all have about this as the way to do security,the you know...I mean, it's funny, because you brought up earlier like use Signal use Tor, I am a big advocate of like, I just use Signal for all my communication, but I also don't talk about crime pretty much it in general anyway. You know. So it's more like just like bonus that it can't be read. I don't know. Elle 27:57 Yeah. I mean, again, it depends, right? Because Signal...Signal has gotten way more usable. I've been, I've been using Signal for a decade, you know, since it was still Redphone and TextSecure. And in the early days, I used to joke that it was so secure, sometimes your intended recipients don't even get the messages. Margaret 28:21 That's how I feel about GPG or PGP or whatever the fuck. Elle 28:24 Oh, those those.... Margaret 28:27 Sorry, didn't mean to derail you. Elle 28:27 Let's not even get started there. But so like Signal again, has gotten much better, and is way more reliable in terms of delivery than it used to be. But I used to, I used to say like, "Hey, if it's if it's really, really critical that your message reach your recipient, Signal actually might not be the way to do it." Because if you need if you if you're trying to send a time sensitive message with you know guarantee that it actually gets received, because Signal used to be, you know, kind of sketchy on or unreliable on on delivery, it might not have been the best choice at the time. One of the other things that I think that people, you know, think...don't think about necessarily is that Signal is still widely viewed as a specific security tool. And that's, that's good in a lot of cases. But if you live somewhere, for example, like Belarus, where it's not generally considered legal to encrypt things, then the presence of Signal on your device is enough in and of itself to get you thrown in prison. Margaret 29:53 Right. Elle 29:53 And so sometimes having a mechanism like, you know, Facebook secret messages might seem like a really, really sketchy thing to do. But if your threat model is you can't have security tools on your phone, but you still want to be able to send encrypted messages or ephemeral messages, then that actually might be the best way to kind of fly under the radar. So yeah, it again just really comes down to thinking about what it is that you're trying to protect? From who? And under what circumstances? Margaret 30:32 Yeah, I know, I like this. I mean, obviously, of course, you've thought about this thing that you think about. I'm like, I'm just like, kind of like, blown away thinking about these things. Although, okay, one of these, like security things that I kind of want to push back on, and actually, this is a little bit sketchy to push back on, the knife thing. To go back to a knife. I am. I have talked to a lot of people who have gotten themselves out of very bad situations by drawing a weapon without then using it, which is illegal. It is totally illegal. Elle 31:03 Yes Margaret 31:03 I would never advocate that anyone threaten anyone with a weapon. But, I know people who have committed this crime in order to...even I mean, sometimes it's in situations where it'd be legal to stab somebody,like... Elle 31:16 Sure. Margaret 31:16 One of the strangest laws in the United States is that, theoretically, if I fear for my life, I can draw a gun.... And not if I fear for my life, if I am, if my life is literally being threatened, physically, if I'm being attacked, I can I can legally draw a firearm and shoot someone, I can legally pull a knife and stab someone to defend myself. I cannot pull a gun and say "Back the fuck off." And not only is it illegal, but it also is a security axiom, I guess that you would never want to do that. Because as you pointed out, if you hesitate now the person has the advantage, they have more information than they used to. But I still know a lot of hitchhikers who have gotten out of really bad situations by saying, "Let me the fuck out of the car." Elle 32:05 Sure. Margaret 32:06 Ya know?. Elle 32:06 Absolutely. It's not....Sometimes escalating tactically can be a de-escalation. Right? Margaret 32:17 Right. Elle 32:18 Sometimes pulling out a weapon or revealing that you have one is enough to make you no longer worth attacking. But you never know how someone's going to respond when you do that, right? Margaret 32:33 Totally Elle 32:33 So you never know whether it's going to cause them to go "Oh shit, I don't want to get stabbed or I don't want to get shot," and stop or whether it's going to trigger you know a more aggressive response. So it doesn't mean that you know, you, if you pull a weapon you have to use it. Margaret 32:52 Right. Elle 32:53 But if you're going to carry one then you do need to be confident that you will use it. Margaret 32:58 No, that that I do agree with that. Absolutely. Elle 33:00 And I think that is an important distinction, and I you know I also think that...not 'I think', using a gun and using a knife are two very different things. For a lot of people, pulling the trigger on a gun is going to be easier than stabbing someone. Margaret 33:20 Yeah that's true. Elle 33:21 Because of the proximity to the person and because of how deeply personal stabbing someone actually is versus how detached you can be and still pull the trigger. Margaret 33:35 Yeah. Elle 33:36 Like I would...it sounds...it feels weird to say but I would actually advocate most people carry a gun instead of a knife for that reason, and also because if you're, if you're worried about being physically attacked, you know you have more range of distance where you can use something like a gun than you do with a knife. You have to be, you have to be in close quarters to to effectively use a knife unless you're like really good at throwing them for some reason and even I wouldn't, cause if you miss...now your adversary has a knife. Margaret 34:14 I know yeah. Unless you miss by a lot. I mean actually I guess if you hit they have a knife now too. Elle 34:22 True. Margaret 34:23 I have never really considered whether or not throwing knives are effective self-defense weapons and I don't want to opine too hard on this show. Elle 34:31 I advise against it. Margaret 34:32 Yeah. Okay, so to go back to threat modeling about more operational security type stuff. You're clearly not saying these are best practices, but you're instead it seems like you're advocating of "This as the means by which you might determine your best practices." Elle 34:49 Yes. Margaret 34:49 Do you have a...do you have a a tool or do you have like a like, "Hey, here's some steps you can take." I mean, we all know you've said like, "Think about your enemy," and such like that, but Is there a more...Can you can you walk me through that? Elle 35:04 I mean, like, gosh, it really depends on who your adversary is, right? Elle 35:10 Like, if you're if you're thinking about an abusive partner, that's obviously going to vary based on things like, you know, is your abusive partner, someone who has access to weapons? Are they someone who is really tech savvy? Or are they not. At...The things that you have to think about are going to just depend on the skills and tools that they have access to? Is your abusive partner or your abusive ex a cop? Because that changes some things. Margaret 35:10 Yeah, fair enough. Margaret 35:20 Yeah. Elle 35:27 So like, most people, if they actually have a real and present kind of persistent threat in their life, also have a pretty good idea of what that threat is capable of, or what that threat actor or is capable of. And so it, it's it, I think, it winds up being fairly easy to start thinking about things in terms of like, "Okay, how is this person going to come after me? How, what, what tools do they have? What skills do they have? What ability do they have to kind of attack me or harm me?" But I think that, you know, as we start getting away from that really, really, personal threat model of like the intimate partner violence threat model, for example, and start thinking about more abstract threat models, like "I'm an anarchist living in a state," because no state is particularly fond of us. Margaret 36:50 Whaaaat?! Elle 36:51 I know it's wild, because like, you know, we just want to abolish the State and States, like want to not be abolished, and I just don't understand how, how they would dislike us for any reason.. Margaret 37:03 Yeah, it's like when I meet someone new, and I'm like, "Hey, have you ever thought about being abolished?" They're usually like, "Yeah, totally have a beer." Elle 37:10 Right. No, it's... Margaret 37:11 Yes. Elle 37:11 For sure. Um, but when it comes to when it comes to thinking about, you know, the anarchist threat model, I think that a lot of us have this idea of like, "Oh, the FBI is spying on me personally." And the likelihood of the FBI specifically spying on 'you' personally is like, actually pretty slim. But... Margaret 37:34 Me? Elle 37:35 Well... Margaret 37:37 No, no, I want to go back to thinking about it's slim, it's totally slim. Elle 37:41 Look...But like, there's there is a lot like, we know that, you know, State surveillance dragnet exists, right, we know that, you know, plaintext text messages, for example, are likely to be caught both by, you know, Cell Site Simulators, which are in really, really popular use by law enforcement agencies. Margaret 38:08 Which is something that sets up and pretends to be a cell tower. So it takes all the data that is transmitted over it. And it's sometimes used set up at demonstrations. Elle 38:16 Yes. So they, they both kind of convinced your phone into thinking that they are the nearest cell tower, and then actually pass your communications on to the next, like the nearest cell tower. So your communications do go through, they're just being logged by this entity in the middle. That's, you know, not great. But using something... Margaret 38:38 Unless you're the Feds. Elle 38:39 I mean, even if you... Margaret 38:41 You just have to think about it from their point of. Hahah. Elle 38:42 Even if you are the Feds, that's actually too much data for you to do anything useful with, you know? Margaret 38:50 Okay, I'll stop interuppting you. Haha. Elle 38:51 Like, it's just...but if you're if you are a person who is a person of interest who's in this group, where a cell site simulator has been deployed or whatever, then then that you know, is something that you do have to be concerned about and you know, even if you're not a person of interest if you're like texting your friend about like, "All right, we do crime in 15 minutes," like I don't know, it's maybe not a great idea. Don't write it down if you're doing crime. Don't do crime. But more importantly don't don't create evidence that you're planning to do crime, because now you've done two crimes which is the crime itself and conspiracy to commit a crime Margaret 39:31 Be straight. Follow the law. That's the motto here. Elle 39:35 Yes. Oh, sorry. I just like I don't know, autism brain involuntarily pictured, like an alternate universe in which in where which I am straight, and law abiding. And I'm just I'm very... Margaret 39:52 Sounds terrible. I'm sorry. Elle 39:53 Right. Sounds like a very boring.... Margaret 39:55 Sorry to put that image in your head. Elle 39:56 I mean, I would never break laws. Margaret 39:58 No. Elle 39:59 Ever Never ever. I have not broken any laws I will not break any laws. No, I think that... Margaret 40:08 The new "In Minecraft" is "In Czarist Russia." Instead of saying "In Minecraft," because it's totally blown. It's only okay to commit crimes "In Czarist Russia." Elle 40:19 Interesting. Margaret 40:23 All right. We don't have to go with that. I don't know why i got really goofy. Elle 40:27 I might be to Eastern European Jewish for that one. Margaret 40:31 Oh God. Oh, my God, now I just feel terrible. Elle 40:34 It's It's fine. It's fine. Margaret 40:36 Well, that was barely a crime by east... Elle 40:40 I mean it wasn't necessarily a crime, but like my family actually emigrated to the US during the first set of pogroms. Margaret 40:51 Yeah. Elle 40:52 So like, pre Bolshevik Revolution. Margaret 40:57 Yeah. Elle 40:59 But yeah, anyway. Margaret 41:02 Okay, well, I meant taking crimes like, I basically think that, you know, attacking the authorities in Czarist Russia is a more acceptable action is what I'm trying to say, I really don't have to try and sell you on this plan. Elle 41:16 I'm willing to trust your judgment here. Margaret 41:19 That's a terrible plan, but I appreciate you, okay. Either way, we shouldn't text people about the crimes that we're doing. Elle 41:26 We should not text people about the crimes that we're planning on doing. But, if you are going to try to coordinate timelines, you might want to do that using some form of encrypted messenger so that whatever is logged by a cell site simulator, if it is in existence is not possible by the people who are then retrieving those logs. And you know, and another reason to use encrypted messengers, where you can is that you don't necessarily want your cell provider to have that unencrypted message block. And so if you're sending SMS, then your cell, your cell provider, as the processor of that data has access to an unencrypted or plain text version of whatever text message you're sending, where if you're using something like Signal or WhatsApp, or Wicker, or Wire or any of the other, like, multitude of encrypted messengers that you could theoretically be using, then it's it's also not going directly through your your provider, which I think is an interesting distinction. Because, you know, we we know, from, I mean, we kind of sort of already knew, but we know for a fact, from the Snowden Papers, that cell providers will absolutely turn over your data to the government if they're asked for it. And so minimizing the amount of data that they have about you to turn over to the government is generally a good practice. Especially if you can do it in a way that isn't going to be a bunch of red flags. Margaret 43:05 Right, like being in Belarus and using Signal. Elle 43:08 Right. Exactly. Margaret 43:10 Okay. Also, there's the Russian General who used an unencrypted phone where he then got geo located and blowed up. Elle 43:23 Yeah. Margaret 43:24 Also bad threat modeling on that that guy's part, it seems like Elle 43:28 I it, it certainly seems to...that person certainly seems to have made several poor life choices, not the least of which was being a General in the Russian army. Margaret 43:41 Yeah, yeah. That, that tracks. So one of the things that we talked about, while we were talking about having this conversation, our pre-conversation conversation was about...I think you brought up this idea that something that feels secret, doesn't mean it is, and Elle 43:59 Yeah! Margaret 44:00 I'm wondering if you had more thoughts about that concept? It's not a very good prompt. Elle 44:05 So like, it's it's a totally reasonable prompt, we say a lot that, you know, security and safety are a feeling. And I think that that actually is true for a lot of us. But there's this idea that, Oh, if you use coded language, for example, then like, you can't get caught. I don't actually think that's true, because we tend to use coded language that's like, pretty easily understandable by other people. Because the purpose of communicating is to communicate. Margaret 44:42 Yeah. Elle 44:43 And so usually, if you're like, code language is easy enough to be understood by whoever it is you're trying to communicate with, like, someone else can probably figure it the fuck out too. Especially if you're like, "Hey, man, did you bring the cupcakes," and your friend is like, "Yeah!" And then an explosion goes off shortly thereafter, right? It's like, "Oh, by cupcakes, they meant dynamite." So I, you know, I think that rather than then kind of like relying on this, you know, idea of how spies work or how, how anarchists communicated secretly, you know, pre WTO it's, it's worth thinking about how the surveillance landscape has adapted over time, and thinking a little bit more about what it means to engage in, in the modern panopticon, or the contemporary panopticon, because those capabilities have changed over time. And things like burner phones are a completely different prospect now than they used to be. Actually... Margaret 45:47 In that they're easier or wose? Elle 45:49 Oh, there's so much harder to obtain now. Margaret 45:51 Yeah, okay. Elle 45:52 It's it is so much easier to correlate devices that have been used in proximity to each other than it used to be. And it's so much easier to, you know, capture people on surveillance cameras than it used to be. I actually wrote a piece for Crimethinc about this some years ago, that that I think kind of still holds up in terms of how difficult it really, really is to procure a burner phone. And in order to do to do that safely, you would have to pay cash somewhere that couldn't capture you on camera doing it, and then make sure that it was never turned on in proximity with your own phone anywhere. And you would have to make sure that it only communicated with other burner phones, because the second it communicates with a phone that's associated to another person, there's a connection between your like theoretical burner phone and that person. And so you can be kind of triangulated back to, especially if you've communicated with multiple people. It just it is so hard to actually obtain a device that is not in any way affiliated with your identity or the identity of any of your comrades. But, we have to start thinking about alternative mechanisms for synchronous communication. Margaret 47:18 Okay. Elle 47:18 And, realistically speaking, taking a walk in the woods is still going to be the best way to do it. Another reasonable way to go about having a conversation that needs to remain private is actually to go somewhere that is too loud and too crowded to...for anyone to reasonably overhear or to have your communication recorded. So using using the kind of like, signal to noise ratio in your favor. Margaret 47:51 Yeah. Elle 47:52 To help drown out your own signal can be really, really useful. And I think that that's also true of things like using Gmail, right? The signal to noise ratio, if you're not using a tool that's specifically for activists can be very helpful, because there is just so much more traffic happening, that it's easier to blend in. Margaret 48:18 I mean, that's one reason why I mean, years ago, people were saying that's why non activists should use GPG, the encrypted email service that is terrible, was so attempt to try and be like, if you only ever use it, for the stuff you don't want to be known, then it like flags it as "This stuff you don't want to be known." And so that was like, kind of an argument for my early adoption Signal, because I don't break laws was, you know, just be like," Oh, here's more people using Signal," it's more regularized, and, you know, my my family talks on Signal and like, it helps that like, you know, there's a lot of different very normal legal professions that someone might have that are require encrypted communication. Yeah, no book, like accountants, lawyers. But go ahead. Elle 49:06 No, no, I was gonna say that, like, it's, it's very common in my field of work for people to prefer to use Signal to communicate, especially if there is, you know, a diversity of phone operating systems in the mix. Margaret 49:21 Oh, yeah, totally. I mean, it's actually now it's more convenient. You know, when I when I'm on my like, family's SMS loop, it's like, I constantly get messages to say, like, "Brother liked such and such comment," and then it's like, three texts of that comment and...anyway, but okay, one of the things that you're talking about, "Security as a feeling," right? That actually gets to something that's like, there is a value in like, like, part of the reason to carry a knife is to feel better. Like, and so part of like, like anti-anxiety, like anxiety is my biggest threat most most days, personally. Right? Elle 50:00 Have you ever considered a career in the security field, because I, my, my, my former manager, like the person who hired me into the role that I'm in right now was like, "What made you get into security?" when I was interviewing, and I was just like, "Well, I had all this anxiety lying around. And I figured, you know, since nobody will give me a job that I can afford to sustain myself on without a degree, in any other field, I may as well take all this anxiety and like, sell it as a service." Margaret 50:33 Yeah, I started a prepper podcast. It's what you're listening to right now. Everyone who's listening. Yeah, exactly. Well, there's a value in that. But then, but you're talking about the Panopticon stuff, and the like, maybe being in too crowded of an environment. And it's, and this gets into something where everyone is really going to have to answer it differently. There's a couple of layers to this, but like, the reason that I just like, my profile picture on twitter is my face. I use my name, right? Elle 51:03 Same. Margaret 51:04 And, yeah, and I, and I just don't sweat it, because I'm like, "Look, I've been at this long enough that they know who I am. And it's just fine. It's just is." One day, it won't be fine. And then we have other problems. Right? Elle 51:18 Right. Margaret 51:19 And, and, and I'm not saying that everyone as they get better security practice will suddenly start being public like it... You know, it, it really depends on what you're trying to accomplish. Like, a lot of the reasons to not be public on social media is just because it's a fucking pain in the ass. Like, socially, you know? Elle 51:36 Yeah. Margaret 51:36 But I don't know, I just wonder if you have any thoughts about just like, the degree to which sometimes it's like, "Oh, well, I just, I carry a phone to an action because I know, I'm not up to anything." But then you get into this, like, then you're non-normalizing... don't know, it gets complicated. And I'm curious about your thoughts on that kind of stuff. Elle 51:56 So like, for me, for me personally, I am very public about who I am. What I'm about, like, what my politics are. I'm extremely open about it. Partially, because I don't think that, like I think that there is value in de-stigmatizing anarchism. Margaret 52:20 Yes. Elle 52:20 I think there is value in being someone who is just a normal fucking human being. And also anarchist. Margaret 52:29 Yeah. Elle 52:30 And I think that, you know, I...not even I think. I know, I know that, through being exactly myself and being open about who I am, and not being super worried about the labels that other people apply to themselves. And instead, kind of talking about, talking about anarchism, both from a place of how it overlaps with Judaism, because it does in a lot of really interesting ways, but also just how it informs my decision making processes. I've been able to expose people who would not necessarily have had any, like, concept of anarchism, or the power dynamics that we're interested in equalizing to people who just wouldn't have wouldn't have even thought about it, or would have thought that anarchists are like this big, scary, whatever. And, like, there, there are obviously a multitude of tendencies within anarchism, and no anarchist speaks for anybody but themselves, because that's how it works. But, it's one of the things that's been really interesting to me is that in the security field, one of the new buzzwords is Zero Trust. And the idea is that you don't want to give any piece of technology kind of the sole ability to to be the linchpin in your security, right? So you want to build redundancy, you want to make sure that no single thing is charged with being the gatekeeper for all of your security. And I think that that concept actually also applies to power. And so I...when I'm trying to talk about anarchism in a context where it makes sense to security people, I sometimes talk about it as like a Zero Trust mechanism for organizing a society. Margaret 54:21 Yeah. Elle 54:21 Where you just you...No person is trustworthy enough to hold power over another person. And, so like, I'm really open about it, but the flip side of that is that, you know, I also am a fucking anarchist, and I go to demonstrations, and sometimes I get arrested or whatever. And so I'm not super worried about the government knowing who I am because they know exactly who I am. But I don't share things like my place of work on the internet because I've gotten death threats from white nationalists. And I don't super want white nationalists like sending death threats into my place of work because It's really annoying to deal with. Margaret 55:02 Yeah. Elle 55:03 And so you know, there's...it really comes down to how you think about compartmentalizing information. And which pieces of yourself you want public and private and and how, how you kind of maintain consistency in those things. Margaret 55:21 Yeah. Elle 55:22 Like people will use the same...people will like be out and anarchists on Twitter, but use the same Twitter handle as their LinkedIn URL where they're talking about their job and have their legal name. And it's just like, "Buddy, what are you doing?" Margaret 55:37 Yeah. Elle 55:38 So you do have to think about how pieces of data can be correlated and tied back to you. And what story it is that you're you're presenting, and it is hard and you are going to fuck it up. Like people people are going to fuck it up. Compartmentalization is super hard. Maintaining operational security is extremely hard. But it is so worth thinking about. And even if you do fuck it up, you know, that doesn't mean that it's the end of the world, it might mean that you have to take some extra steps to mitigate that risk elsewhere. Margaret 56:11 The reason I like this whole framework that you're building is that I tend to operate under this conception that clandestinity is a trap. I don't want to I don't want to speak this....I say it as if it's a true statement across all and it's not it. I'm sure there's absolute reasons in different places at different times. But in general, when I look at like social movements, they, once they move to "Now we're just clandestine." That's when everyone dies. And, again, not universally, Elle 56:40 Yeah, but I mean, okay, so this is where I'm gonna get like really off the wall. Right? Margaret 56:46 All right. We're an hour in. It's the perfect time. Elle 56:50 I know, right? People may or may not know who Allen Dulles is. But Allen Margaret 56:54 Not unless they named an airport after him. Elle 56:56 They Did. Margaret 56:57 Oh, then i do who he is. Elle 56:59 Allen Dulles is one of the people who founded the CIA. And he released this pamphlet called "73 Points On Spycraft." And it's a really short read. It's really interesting, I guess. But the primary point is that if you are actually trying to be clandestine, and be successful about it, you want to be as mundane as possible. Margaret 57:22 Yep. Elle 57:23 And in our modern world with the Panopticon being what it is, the easiest way to be clandestine, is actually to be super open. So that if you are trying to hide something, if there is something that you do want to keep secret, there's enough information out there about you, that you're not super worth digging into. Margaret 57:46 Oh, yeah. Cuz they think they already know you. Elle 57:48 Exactly. So if, if that is what your threat model is, then the best way to go about keeping a secret is to flood as many other things out there as possible. So that it's just it's hard to find anything, but whatever it is that you're flooding. Margaret 58:04 Oh, it's like I used to, to get people off my back about my dead name, I would like tell one person in a scene, a fake dead name, and be like, "But you can't tell anyone." Elle 58:15 Right. Margaret 58:16 And then everyone would stop asking about my dead name, because they all thought they knew it, because that person immediately told everyone, Elle 58:22 Right. Margaret 58:23 Yeah. Elle 58:24 It's, it's going back to that same using the noise to hide your signal concept, that it...the same, the same kind of concepts and themes kind of play out over and over and over again. And all security really is is finding ways to do harm reduction for yourself, finding ways to minimize the risk that you're undertaking just enough that that you can operate in whatever it is that you're trying to do. Margaret 58:53 No, I sometimes I like, ask questions. And then I am like, Okay, well don't have an immediate follow up, because I just need to like, think about it. Instead of being like, "I know immediately what to say about that." But okay, so, but with clandestinity in general in this this concept...I also think that this is true on a kind of movement level in a way that I I worry about sometimes not necessarily....Hmm, what am I trying to say? Because I also really hate telling people what to do. It's like kind of my thing I don't like telling people what to do. But there's a certain level... Elle 59:25 Really? Margaret 59:25 Yeah, you'd be shocked to know, Elle 59:27 You? Don't like telling people what to do? Margaret 59:31 Besides telling people not to tell me what to do. That's one of my favorite things to tell people. But, there's a certain amount of. Margaret 59:38 Oh, that's true, like different conceptions of freedom. Elle 59:38 But that's not telling people what to do, that's telling people what not to do. Elle 59:44 It's actually setting a boundary as opposed to dictating a behavior. Margaret 59:48 But I've been in enough relationships where I've learned that setting boundaries is the same as telling people to do. This is a funny joke. Elle 59:55 Ohh co-dependency. Margaret 59:58 But all right, there's a quote from a guy whose name I totally space who was an old revolutionist, who wasn't very good at his job. And his quote was, "Those who make half a revolution dig their own graves." And I think he like, I think it proved true for him. If I remember correctly, I think he died in jail after kind of making half a revolution with some friends. I think he got like arrested for pamphleteering or something, Elle 1:00:20 Jesus. Margaret 1:00:21 It was a couple hundred years ago. And but there's this but then if you look forward in history that like revolutionists, who survive are the ones who win. Sometimes, sometimes the revolutionists win, and then their comrades turn on them and murder them. But, I think overall, the survival rate of a revolution is better when you win is my theory. And and so there's this this concept where there's a tension, and I don't have an answer to it. And I want people to actually think about it instead of assuming, where the difference between videotaping a cop car on fire and not is more complicated than people want you to know. Because, if you want there to be more cop cars on fire, which I do not unless we're in Czarist Russia, in which case, you're in an autocracy, and it's okay to set the cop cars on fire, but I'm clearly not talking about that, or the modern world. But, you're gonna have to film it on your cell phone in order for people to fucking know that it's happening. Sure. And and that works absolutely against your best interest. Like, on an individual level, and even a your friends' level. Elle 1:01:25 So like, here's the thing, being in proximity to a burning cop car is not in and of itself a crime. Margaret 1:01:33 Right. Elle 1:01:34 So there's, there's nothing wrong with filming a cop car on fire. Margaret 1:01:41 But there's that video... Margaret 1:01:41 Right. Elle 1:01:41 There is something wrong with filming someone setting a cop car on fire. And there's something extremely wrong with taking a selfie while setting a cop car on fire. And don't do that, because you shouldn't do crime. Obviously, right? Elle 1:01:42 But there's Layers there...No, go ahead. Margaret 1:02:03 Okay, well, there's the video that came out of Russia recently, where someone filmed themselves throwing Molotovs at a recruitment center. And one of the first comments I see is like, "Wow, this person has terrible OpSec." And that's true, right? Like this person is not looking at how to maximize their lack of chance of going to jail, which is probably the way to maximize that in non Czarist Russia... re-Czarist Russia, is to not throw anything burning at buildings. That's the way to not go to jail. Elle 1:02:35 Right. Margaret 1:02:35 And then if you want to throw the thing at the... and if all you care about is setting this object on fire, then don't film yourself. Elle 1:02:41 Right. Margaret 1:02:41 But if you want more people to know that this is a thing that some people believe is a worthwhile thing to do, you might need to film yourself doing it now that person well didn't speak. Elle 1:02:53 Well no. Margaret 1:02:56 Okay. Elle 1:02:56 You may not need to film yourself doing it. Right? Because what what you can do is if, for example, for some reason, you are going to set something on fire. Margaret 1:03:09 Right, in Russia. Elle 1:03:09 Perhaps what you might want to do is first get the thing to be in a state where it is on fire, and then begin filming the thing once it is in a burning state. Margaret 1:03:25 Conflaguration. Yeah. Elle 1:03:25 Right? And that can that can do a few things, including A) you're not inherently self incriminating. And, you know, if if there are enough people around to provide some form of cover, like for example, if there are 1000s of other people's cell phones also in proximity, it might even create some degree of plausible deniability for you because what fucking dipshit films themself doing crimes. So it's, you know, there's, there's, there's some timing things, right. And the idea is to get it...if you are a person who believes that cop cars look best on fire... Margaret 1:04:10 Buy a cop car, and then you set it on fire. And then you film it. Elle 1:04:15 I mean, you know, you know, you just you opportunistically film whenever a cop car happens to be on fire in your proximity. Margaret 1:04:23 Oh, yeah. Which might have been set on fire by the person who owned it. There's no reason to know one way or not. Elle 1:04:27 Maybe the police set the cop car on fire you know? You never know. There's no way to there....You don't have to you don't have to speculate about how the cop car came to be on fire. You can just film a burning cop car. And so the you know, I think that the line to walk there is just making sure there's no humans in your footage of things that you consider to be art. Margaret 1:04:29 Yeah. No, it it makes sense. And I guess it's like because people very, very validly have been very critical about the ways that media or people who are independently media or whatever, like people filming shit like this, right? But But I think then to say that like, therefore no, no cop cars that are on fire should ever be filmed versus the position you're presenting, which is only cop cars that are already on fire might deserve to be filmed, which is the kind of the long standing like film the broken window, not the window breaker and things like that. But... Elle 1:05:29 I think and I think also there's, you know, there's a distinction to be made between filming yourself setting a cop car on fire, and filming someone else setting a cop car on fire, because there's a consent elemenet, right? Margaret 1:05:34 Totally. Totally. Elle 1:05:47 You shouldn't like...Don't do crime. Nobody should do crime. But if you are going to do crime, do it on purpose. Right? Margaret 1:05:55 Fair enough. Elle 1:05:55 Like that's, that's what civil disobedience is. Civil disobedience is doing crime for the purpose of getting caught to make a point. That's what it is. And if you if you really feel that strongly about doing a crime to make a point, and you want everyone to know that you're doing a crime to make a point, then that's, that's a risk calculation that you yourself need to make for yourself. But you can't make that calculation for anybody else. Margaret 1:06:25 I think that's a great way to sum it up. Elle 1:06:27 So unless your friend is like, "Yo, I'm gonna set this cop car on fire. Like, get the camera ready, hold my beer." You probably shouldn't be filming them. Margaret 1:06:38 See you in 30 years. Elle 1:06:39 Right? You probably shouldn't be filming them setting the cop car on fire either. Margaret 1:06:43 No. No Elle 1:06:44 And also, that's a shitty friend because they've just implicated you in conspiracy, right? Margaret 1:06:49 Yeah. Elle 1:06:50 Friends don't implicate friends. Margaret 1:06:53 It's a good, it's a good rule. Yeah, yeah. All right. Well, I that's not entirely where I immediately expected to go with Threat Modeling. But I feel like we've covered an awful lot. Is there something? Is there something...Do you have any, like final thoughts about Threat Modeling, and as relates to the stuff that we've been talking about? Elle 1:07:18 I think that you know, the thing that I do really want to drive home. And that honestly does come back to your point about clandestinity being a trap is that, again, the purpose of threat modeling is to first understand, you know, what risks you're trying to protect against, and then figure out how to do what you're accomplishing in a way that minimizes risk. But the important piece is still doing whatever it is that you're trying to accomplish, whether that's movement building, or something else. And so there there is, there is a calculation that needs to be made in terms of what level of risk is acceptable to you. But if if, ultimately, your risk threshold is preventing you from accomplishing whatever you're trying to accomplish, then it's time to take a step back, recalculate and figure out whether or not you actually want to accomplish the thing, and what level of risk is worth taking. Because I think that, you know, again, if if you're, if your security mechanisms are preventing you from doing the thing that you're you set out to try to do, then your adversaries are already winning, and something probably needs to shift. Margaret 1:08:39 I really like that line. And so I feel like that's a decent spot, place to end on. Do. Do you have anything that you'd like to shout out? People can follow you on the internet? Or they shouldn't follow you on the internet? What? What do you what do you want to advocate for here? Elle 1:08:53 If you follow me on the internet, I'm so sorry. That's really all I can say. I'm, I am on the internet. I am a tire fire. I'm probably fairly easy to find based on my name, my pronouns and the things that I've said here today, and I can't recommend following my Twitter. Margaret 1:09:17 I won't put in the show notes then. Elle 1:09:19 I mean, you're welcome to but I can't advocate in good conscience for anyone to pay attention to anything that I have to say. Margaret 1:09:27 Okay, so go back and don't listen to the last hour everyone. Elle 1:09:31 I mean, I'm not going to tell you what to do. Margaret 1:09:34 I am that's my favorite thing to do. Elle 1:09:36 I mean, you know, this is just like my opinion, you know? There are no leaders. We're all the leaders. I don't know. Do do do what you think is right. Margaret 1:09:55 Agreed. All right. Well, thank you so much. Elle 1:09:59 Thank you. I really appreciate it. Margaret 1:10:07 Thank you so much for listening. If you enjoyed this podcast, you should tell people about it by whatever means occurs to you to tell people about it, which might be the internet, it might even be in person, it might be by taking a walk, leaving your cell phones behind, and then getting in deep into the woods and saying," I like the following podcast." And then the other person will be like, "Really, I thought we were gonna make out or maybe do some crimes." But, instead you have told them about the podcast. And I'm recording this at the same time as I record the intro, and now the
In this listeners live episode, Matt answers questions from the audience that have come up over our dark web episodes. Get sage advice on safely accessing the dark web without running afoul of policy, blockchain analysis (or the lack thereof with Monero), how to use PGP encryption to communicate with dark web actors and more.
PGP 05-24-22 Just because the Federal Government sues a State doesn't mean the State has to stop drilling for oil, or anything they are doing. States could spend 20 years in court with appeals, and do the Feds have any right to sue a State, hmmm
Medical researchers have FINALLY realized something that we in the chronic illness space have known for a while - that the true experts are not necessarily those who have studied a condition but are in fact those of us who live with a condition 24 hours a day, seven days a week, 365 days a year. Due to this realization, researchers now want to include our voices (as well as those of our family caregivers) in their studies. And we are getting paid for our time and input. Because it can be difficult to connect with patients and caregivers, there are organizations that exist to join the dots. One of these is Rare Patient Voice (RPV), and my guest today is Mel Havert, the Patient Outreach Manager for RPV. Mel's role is based around connecting with patients and caregivers, and inviting them to the RPV panel so that they can assist with research opportunities and make their voices heard.Listen in to find out how you can be involved, improve medical research, and get paid for your time and experience!In this episode:What is Rare Patient Voice and what does it do?How patients can join and how the RPV process worksThe key question - how much patients can be paid?!What RPV does (and doesn't do) with your personal data How patients can sign up to RPV via the PGP affiliate linkFull notes and resources at https://patientsgettingpaid.com/blog/paid-research-patient-experience
As you build your chronicpreneur business, appearing on social media is one marketing channel that you're going to want to use. How else are you going to get your name out there without throwing money at advertising?Of all the social media channels that are out there, I doubt that LinkedIn was the first to spring to mind. But my guest today should spark your interest, not least because of this stat from her website:One post on LinkedIn is the equivalent of three posts, two reels, and appearing in your stories daily on InstagramRead that again!Megan MacNeill describes herself as a gin snob, beach bum, and book clubber. She works as a Personal Brand Strategist and LinkedIn is her magic power.Listen in to find out more about Megan and how you can leverage LinkedIn to build your personal brand. Megan also has an exclusive offer for PGP listeners for her Building Your Personal Brand on LinkedIn course.In this episode:What is a personal brand?Megan's work experience and how she became a Personal Brand StrategistWhy Megan thinks that LinkedIn is integral to building a personal brand"Likes don't pay the bills" so be wary of "vanity metrics" - build engagement on LinkedIn the same as you would at a real networking eventHow to get a discount on Megan's Online LinkedIn courseFull notes and resources at https://patientsgettingpaid.com/blog/branding-linkedin-megan-macneil/
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Is there a convenient way to make "sealed" predictions?, published by Daniel Kokotajlo on May 6, 2022 on LessWrong. Many people in our community claim to have ideas for how to build AGI, or other things, that they deem infohazardous and so don't want to publish. It would be great if they could publicly register these ideas in an encrypted way, so that later when their predictions come true they can reveal the key and everyone can see that they called it and give them epistemic credit accordingly.I know this is possible in principle, e.g. by using PGP and posting encrypted messages on your LW shortform and then later revealing the key.But it would be nice if this was a convenient, hassle-free feature embedded in LW, for example.Also: Is this a bad idea for some reason? Is the privacy not as secure as I think, such that people would be hesistant to make even these encrypted predictions? (I guess there is the matter of how to securely store the key...) Is there a way to make a prediction that will automatically be decrypted after N years? Thanks for listening. To help us out with The Nonlinear Library or to learn more, please visit nonlinear.org.
Back for another Solo Rip, I talk about: - Happy Birthday, Hal! - A pioneer, cypherpunk, and the first to receive a transaction from Satoshi, Hal Finney gave us PGP encryption, reusable proof of work, and supported the infant version of the bitcoin network. Hal is a Legend - John Carvalho vs Jeremy Rubin - Rogan says the word bitcoin and we all lose our minds. Stay focused people - Fed raises interest rates - The hash rate is through the roof, great for security but bad for small miners - Mine your block segme And more! If you enjoy the show, you can help support it by following, sharing, and subscribing to Talking in bits on your favorite platforms. If you want to be a friend of the show, hit us up to take part in the "Mine your block" segment
In this conversation, we chat with Gene Hoffman, Chief Operations Officer and President at Chia Network. Formerly CEO & co-founder Vindicia, eMusic, PGP, PrivNet. Recognized by the San Francisco Business Times with the “40 under 40 Emerging Leaders Award” in 2012, Gene has deep experience with building companies that disrupt markets. As head of eMusic, Gene was featured on the cover of Forbes Magazine as a member of the July 1999 E-Gang, and named one of the 100 most influential entrepreneurs in technology in Upside Magazine's November 2000 Elite 100. Gene led the acquisition of eMusic by Vivendi/Universal in June 2001. Before founding eMusic Gene was Director of Business Development and Director of Interactive Marketing of Pretty Good Privacy. More specifically, we touch on the early days of encryption, digital signatures, cryptocurrencies, and copyrights. As well as, the evolution of intellectual property management, the mechanics behind subscription infrastructure, how to build an alternative network to Bitcoin's, and so so much more!
On this episode, the PGP crew discuss Gillie Da Kid vs. Wiz Khalifa. We also discuss Druskii's deleted "creepy guy" video and Wole and Bre go head to head in a Hovengers War!!! #wizkhalifa #gilliedakid #druskii #faizonlove #jayz #blackpodcasts #popculture #hiphop #entertainment
How do you manage unstructured data? Listen to this and get a perspective. Punit is joined by Jeff Sizemore for a conversation about how companies should also take consider unstructured repositories in their data storage, better of having one central view of data to invest in. More details of this topic will be discussed on this podcast. Jeff Sizemore is the Chief Governance Officer at Egnyte where he is responsible for the strategy and execution of the Egnyte content governance solution. Jeff has an extensive background in data protection, specifically in encryption, key management, data loss prevention, and identity and access management. Jeff has helped define the market by contributing to several start-ups, including PGP (now part of Symantec), Ionic Security, and Port Authority (now ForcePoint DLP). This is an extract from the full episode of The FIT4PRIVACY Podcast. If you like this, you would enjoy the full episode. If this is your first time, the FIT4PRIVACY Podcast is a privacy podcast for those who care about privacy. In this podcast, you listen to and learn from industry influencers who share their ideas. The episodes are released as audio every Wednesday and video every Thursday. If you subscribe to our podcast, you will be notified about the new episodes. And, if you have not done it, write a review and share this with someone who will benefit from this. RESOURCES Websites: www.fit4privacy.com, www.punitbhatia.com Take advantage of our Free GDPR training: https://www.fit4privacy.com/course/free CONNECT Instagram https://www.instagram.com/punit.world/ Facebook https://www.facebook.com/PunitBhatiaSpeaker/ LinkedIn https://www.linkedin.com/showcase/fit4privacy-podcast Podcast http://hyperurl.co/fit4privacy YouTube http://youtube.com/fit4privacy Email firstname.lastname@example.org --- Send in a voice message: https://anchor.fm/fit4privacy/message
In this episode of the FIT4PRIVACY Podcast, Punit is joined by Jeff Sizemore for a perspective on why we need privacy, why privacy matters and what is unstructured data, how does it create vulnerabilities and how to prioritize unstructured data in managing privacy. Jeff talks about creating different standards for identity and letting people choose which one they like to be identified with. He believes such an approach will create more trust. KEY CONVERSATION POINTS What is GDPR in one word? Lifecycle of Data and Information in Structural Database Detect Potentially Hidden Data How data becomes unstructured Where organizations need to look to detect potentially hidden data ABOUT THE GUEST Jeff Sizemore is the Chief Governance Officer at Egnyte where he is responsible for the strategy and execution of the Egnyte content governance solution. Jeff has an extensive background in data protection, specifically in encryption, key management, data loss prevention, and identity and access management. Jeff has helped define the market by contributing to several start-ups, including PGP (now part of Symantec), Ionic Security, and Port Authority (now ForcePoint DLP). Saying that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about freedom of speech because you have nothing to say. - Jean-Michel Jarre ABOUT THE HOST Punit Bhatia works with business and privacy leaders to create an organisational culture with high privacy awareness and compliance as a business priority. Punit is the author of various privacy books including “Be Ready for GDPR”. Punit has been a speaker at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. RESOURCES Websites: www.fit4privacy.com, www.punitbhatia.com CONNECT Instagram https://www.instagram.com/punit.world/ Facebook https://www.facebook.com/PunitBhatiaSpeaker/ LinkedIn https://www.linkedin.com/in/punitbhatia/ Podcast http://hyperurl.co/fit4privacy YouTube http://youtube.com/fit4privacy Email email@example.com --- Send in a voice message: https://anchor.fm/fit4privacy/message
On today's Locked on Ole Miss podcast we talk about the QB Competition between Jaxson Dart, Luke Altmyer and Kincade Dent. We discuss their first appearance with the media and their first impressions to the Ole Miss fanbase. We talk about how in a perfect world the paths forward for both players and why yesterday mattered. We talk about today's plan and why we won't have a PGP tonight for the Kentucky game even though a new starter is set to go in Dylan Delucia with TBAs Saturday and Sunday. We close with our doubts that a Stripe Out vs the Kentucky Wildcats will happen. Finally, we are joined by Tom Vanderford for his weekly perspective on Ole Miss Sports. We talk about the linebackers and how the defense is set to stand out. We mention the QB competition to get his thoughts on it. We talk how the transfer portal is completely changing Ole Miss Football. WANT MORE OLE MISS SPORTS CONTENT? Follow and Subscribe to the Podcast on these platforms:
In this episode, Persian comic legend Maz Jobrani comes on PGP to discuss his path to standup and his early education and career experiences, and the ways in which it conflicted with his families expectations at the time. He also shares how he breaks the caricatures often imposed on Middle Eastern talent in Hollywood and gives insight to his approach of raising his kids. Check out Maz's Podcast: Back To School With Maz JobraniTour DatesSupport the show (https://www.patreon.com/persiangirlpodcast)
So far all the chronicpreneurs we've featured on the PGP podcast have been solopreneurs. But today we're featuring two friends who have combined teaching Pilates with a thriving community into a business. Cassie and Chelsea met teaching Pilates before joining forces to form a chronic illness support group in Wichita Kansas. During the pandemic, they moved their group online (The Wellness Hub), and started a podcast - The Real Life Show: Living with a Chronic Illness. They continue to grow their community while building their Pilates teaching schedules.Of the two, Cassie is the chronic illness overachiever, while Chelsea has family links to the chronic illness community. But the fact that they don't have a shared language of health experience is one of the things that really plays into how they work together. I loved spending time with these two friends - and if you do too, you should join the Patients Getting Paid Community, because they're both members!In this episode:Cassie's diagnoses, how she met Chelsea, and why they decided to work togetherWhy their plans were upended by the pandemic but led to the formation of The Wellness Hub online communityThe importance of passive income to their businessProblems they have both faced with regards to health insurance through being self-employedTheir advice for other budding chronicpreneurs!Full notes and resources at https://patientsgettingpaid.com/podcast/community-chronicpreneur-business
Hey we're back with a PGP episode, and we're joined by Yeon for our 40th edition of the podcast. We go through Yeon's career from before he joined 100 Thieves Next in 2020 to being on that team, SGC 2020 and working with Spawn & CoreJJ there, then moving into TLA for 2021 and of course the 2022 season. We also hear about how Yeon picked his IGN, how Eyla ordered food without him, and he wants to remind everyone that Spawn is old. Follow Yeon: https://twitter.com/Yeon7lol https://twitch.tv/yeon7lol The Proving Grounds Pod is now streaming on all platforms! Catch the podcast here: Spotify: https://open.spotify.com/show/0tPeopHYF1F4jxSYaXoaPu Apple: https://podcasts.apple.com/us/podcast/proving-grounds-pod/id1549147079 YouTube: https://www.youtube.com/channel/UCfQRaWWzLH6CyfPSfouiwLA Stay up to date with us on our socials: Twitter: https://twitter.com/PGroundsPod Twitch: https://www.twitch.tv/provinggroundspod Discord: https://discord.gg/YDccFdwxKb Smax: https://twitter.com/SmaxHeid Cubby: https://twitter.com/Cubbyxx --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
In a "former life", Kathy Chester was a corporate travel agent with a passion for being active, when she was hit by a double diagnosis of Multiple Sclerosis and Rheumatoid Arthritis. Against the advice of the time, her instinct was to keep moving!She became a certified trainer, and after working in other businesses, she now owns and operates her own studio, Disrupt Fitness. The COVID pandemic led her to look closely at her business. She has now found safer ways that she can work and has niched down to service the MS and Autoimmune communities in particular.As well as sharing her inspiring story, Kathy also relates her experiences within the Patients Getting Paid community.In this episode:Kathy's life and career before getting her double diagnosis The reasons why she decided to focus on lifestyle and exercise, against the prevailing medical wisdom of the time!Why she decided to change her fitness practice to focus on helping people with autoimmune conditions – and the reason Kathy decided to stop training in other venues and begin working with clients in her garageKathy's experiences of being a part of the Patients Getting Paid communityResources:Visit the Patients Getting Paid website to learn more about, and join, the PGP communityVisit Disrupt FitnessFollow Disrupt Fitness on Facebook and InstagramListen to the Move It Or Lose It podcastTools mentioned in this podcast include MindBody app, Google Suite, Calendly, Square, Venmo, QuickBooks**Be sure to join us on the Patients Getting Paid Facebook and Instagram pages AND get on the PGP email list to stay updated on all things PGP!Special thanks to Steve Woodward at PodcastingEditor.com
It can be an exciting time when you begin your chronicpreneur journey. But you can find yourself in trouble if you haven't thought through the potential legal issues of owning a business.Joel Ankney is a lawyer who has been helping freelancers start and run businesses for over 25 years. AND - he's my attorney!Joel is also the author of Before You Leap, a great book that walks freelancers through some of the most important legal issues involved in starting and running a business. And he's here today to help us think through what legal needs we may have when starting a chronicpreneur business, answering some of the questions which I've seen in the PGP community.Not only that, he's also giving away a limited number of audiobook copies of "Before You Leap" to listeners of the Patients Getting Paid podcast. Just email firstname.lastname@example.org, mentioning Patients Getting Paid, to request a download code.In this episode:Joel's definition of the gig economy Why I decided to get a lawyer for my patient advocacy work in the first placeDo chronicpreneurs need an LLC or a corporation? The difference between being an employee and a contractor - what Joel calls the principle of worker clarificationCommonly overlooked legal issues when running a freelance, consulting, or service business - including how to set up contracts that make sure you get paid!How much does all of this cost?The bare minimum you need to be thinking about getting right from the start - and how much would it cost to hire an attorney to sort this all out?Resources:Visit the Patients Getting Paid website to learn more about, and join, the PGP communityBuy Joel's book, Before You Leap: What a Lawyer Wants You to Know About Starting a Gig Economy Business *affiliate link*Email email@example.com to request a code for a free audiobook copy of Before You LeapVisit Ankney Law Connect with Joel on LinkedIn, and check out his YouTube channel**Be sure to join us on the Patients Getting Paid Facebook and Instagram pages AND get on the PGP email list to stay updated on all things PGP!Special thanks to Steve Woodward at PodcastingEditor.com
It's surprising that this album made it 3 years without getting covered by PGP. This self-titled album from Joyce Manor is the second album of theirs that we've covered. The previous was Never Hungover Again. For fans of the band, keep listening, our takes improve after we hear the remastered version. For new listeners, DO NOT listen to the OG black album, the mix is shit. Listen to the new orange one, sounds incredible. Speaking of orange, if you like orange shirts we have some for sale at coolclothes4guys.com. It's for all genders, not just guys. The clothes are cool, and there are 4 guys that do the podcast. It's not what you think at first. The cool clothes are for everyone, not just the 4 guys. I hope that makes sense. The clothes are cool, and these 4 guys are really excited to offer them to everyone.
If you have a chronic health condition, there are many benefits of working from home. You can choose your own hours, you can take time to recuperate when you need to, and your commute is no more than a minute! But it also means that, if required, you can pick up and relocate in a second.My guest today is Christina Mathers. She describes herself as a Lyme-thriver, mother, wife and dog mom. Although she maintains a patient advocacy website about managing her condition, she also works from home as a premium auditor at an insurance company. And since moving from Pennsylvania to Florida, Christina and her family could not be happier or healthier.In this episode:Christina's work in insurance and the benefits of working from home, both for her and her husbandHow Christina and her family were able to relocate for the good of all their healthChristina's attempts (and future plans) to monetize her Living Well With Lyme website - including affiliate links and eBooksKathy's experience of registering as a limited liability company (LLC)Christina's advice for budding chronicpreneursResources:Visit the Patients Getting Paid website to learn more about, and join, the PGP communityVisit Living Well With Lyme Connect with Christina on Facebook, Pinterest, Instagram, and TikTokTools mentioned in this episode include Canva and CoSchedule**Be sure to join us on the Patients Getting Paid Facebook and Instagram pages AND get on the PGP email list to stay updated on all things PGP!Special thanks to Steve Woodward at PodcastingEditor.com
When you're starting on your chronicpreneur career, you'll know that you need to get organized. And if you're anything like me, and you have “shiny box” syndrome, you'll look around at what other people are using and buy a plethora of productivity tools and subscriptions, each of which will promise a new and more methodical version of you.And then a couple of months down the line your desktop is littered with programs that you never worked out how to use. But what if there was a way to manage your workflow, by using tools that you already work with every day? My guest today is Dara Sklar, the productivity expert you never knew you needed. She's a powerhouse of Google Tools and her goal is to stop people from feeling overwhelmed at the prospect of getting their business systems organized. And I know from first-hand experience that it's achievable!Dara is another of the featured experts within the Patients Getting Paid Community. Visit PatientsGettingPaid.com for more information and to see her special deep-dive workshop.In this episode:Kathy's own experience of Dara's transformational Get Productive With G Suite courseWhy working in a corporate job led Dara to believe that a course about using Google Workspace to be more productive was neededShould you choose Google Tools over other organizational tools?The biggest challenges to getting more productive with Google ToolsWhy incremental changes can help even the most tech-phobic peopleDara's “quick wins” for you to try right now!Resources:Visit the Patients Getting Paid website to learn more about the PGP community - and join the community to get access to Dara's trainingGet instant access to Get Productive with G Suite (with Dara Sklar) [affiliate link]Learn more about Google WorkspaceHere's a link to download Dara's "Top 40 Time-Saving Google Hacks You'll Wish You'd Been Using All Along" Connect with Dara on Instagram, Linkedin, and FacebookVisit Learn.WithDara.com **Be sure to join us on the Patients Getting Paid Facebook and Instagram pages AND get on the PGP email list to stay updated on all things PGP!Special thanks to Steve Woodward at PodcastingEditor.com
Following on from last month's episode, here we continue to explore the potential of Plant Growth Promoters (PGPs). This information may be particularly timely in light of the massive price hike in NPK fertilisers and farm chemicals – perhaps it's now time to consider alternative yield-building strategies. In this episode, we focus upon chitinase and the capacity of this enzyme to boost protection and production. We will also look at liquid vermicast, and the exciting potential of this low-cost, DIY inoculum, as a PGP. The human health component further illuminates pathways to avoid the death of desire. Here, we will consider the health and longevity benefits integral to the reclamation of lost libido.