I outlined my thinking more fully about two weeks ago (here’s the post: The Final Test of the Electoral College), but I think it’s fair to say that the Electoral College has finally proven itself to be, at best, a quaint vestigial
growth on the Republic, and at worst a systemic effort at the national level to generally discount the value of votes in the most populous states (which are also, incidentally, where the densest populations of immigrants and people of color live) in favor of giving undue weight to those in the least populous (and, entirely coincidentally, predominately white) sections.
Please contact your state reps and encourage them to support the National Popular Vote. Abolishing the popular vote has seen support left, right, and center in recent years, including that of both Hillary Clinton and Donald Trump. I have it on good word that the National Popular Vote way of going about getting this done is basically the only way it’s gonna happen; support them.
Crappy fluorescent fixtures flicker at 120 Hz (i.e., 120 times each second, twice the frequency of the AC mains)—but that’s when performing perfectly. Usually, you won’t notice that at all. In fact, a flicker can get down to around 60 Hz before the average person can see it (I’ve been told that this was part of the motivation for choosing that frequency, as early incandescent bulbs would tend to noticeably pulse along with the AC).
But if the fluorescent light is visible and unambiguously flickering, then it’s definitely down below 50 Hz. And here’s the thing: the bright LEDs they’re using in this experiment to successfully treat and reverse symptoms of Alzheimer’s, they’re pulsing at 40 Hz—i.e., the “creepy horror-film industrial building” frequency.
(Please do listen to the entire podcast before deciding to spend a lot of time sitting under shitty office lights; the research is in its infancy and the rate of successful transfer of Alzheimer’s research from rodents to humans is something like 0.4%).
No CGI, no digital effects, no computer even; just some electrical testing equipment and an audio recording. Pretty neat and a lot of fun to watch—so neat and fun that I was, in fact, pretty dubious at first. So I borrowed an oscilloscope from my local public library and tried it out—AND IT WORKED!
I love watching Rob Scallon rock out on a shovel guitar.FYI, this is a totally doable afternoon DIY project for any of you (yes, even you!) or the bored teen in your life.You can build something just like this (or a hockey-stick bass, an electric broomstick banjo, an axe ax—you get the gag) using the methods laid out in the “$10 Electric Guitar” project in my first book (click here now to get a FREE copy of that project—and, if you’re near Metro Detroit in July, you can come to Motor City Steam Con where I’ll be running a workshop on electric-guitarifying stuff).
If you use LinkedIn, then your email and LinkedIn password have probably been compromised.If you reuse the same password across several sites, then you are likely a total sitting duck waiting to get exploited.Go change passwords NOW!
THE LONG VERSION
This breach seems to have gotten less press than usual, even though it’s liable to have a broader impact on folks, so I want to make sure it’s on everyone’s radar:
An enormous hack of LinkedIn accounts has surfaced (details). Crackers snagged ~164mil login credentials; since the passwords were stored as a unsalted hashes (i.e. “not securely”), the vast majority of these passwords were cracked.
I took the liberty of checking a couple friend/client email addresses while I checked mine (using this tool), and found that most of the emails I checked were included in the hack (as was I). LinkedIn hasn’t proactively informed anyone I’ve contacted about this. So, I’m spreading the word.
The immediate problem is losing control of your LinkedIn account (which, let’s be real, doesn’t necessarily mean much for most people). The bigger problem is that many folks reuse the same password on many sites. If the email:password you used on LinkedIn is the same as the one you used on Twitter or Facebook or Gmail, then those accounts are now also up for grabs. While a LinkedIn account may be of limited value to criminals, a Twitter or Gmail account can be much more useful, and a bank or credit card account—let’s not dwell on it. Did you start changing passwords yet? Go change passwords NOW.
Plug in the email address you use to log into LinkedIn (or any email you use to log in to any site; this service tracks many data breaches)
If you get a green bar, you lucked out. If you get a red bar with “oh no!” in it, continue to step #4
Read whatever details the site offers about the breach(es) you’ve been included in, and change your password(s) immediately.
Also set a new password anywhere else that you used that same password
Passwords are inherently crappy. It’s just a fact of life. Consider upping your security in two ways:
Set up “two-factor authentication” (also called “2FA”) on any account that lets you do so. Different sites have different systems (and, alas, call them different things), but they all boil down the same: Once 2FA is set up, logging into your email account (or whatever) will have an extra step. First you enter your username and password and hit submit (like normal). Then they ding your phone (either with a txt or via app) and wait for your to respond (either by clicking “accept” on the app or entering the six digit code they’ve texted you). If you don’t respond, you can’t get in. This makes it impossible for someone to log into your account unless they have your username, password, and your phone. Much more secure. (I’ve added 2FA to several personal web tools I depend on, as I was getting hammered with a brute force attack a couple weeks back.)
Please seriously consider using a “password manager” or “password locker.” This is a piece of software (or service) that securely stores your usernames and passwords for all of your accounts. That way, you don’t have to chose easily remembered passwords for all of your accounts. Instead, you choose one very good password for your locker, and then let the locker generate insanely hard passwords for your individual accounts (all of my passwords are now 20+ characters long and randomly generated). Lots of folks like LastPass and 1Password. I prefer KeePassX and use MiniKeePass on my phone (I have lots of nit-picky reasons, but the tl;dr: The software implements good encryption algorythms in a secure way; it’s open source and well vetted; it’s not “cloud based”—”the cloud” is just “some other dude’s computer” [with all that implies, viz. security risks], and a cloud computer full of the master keys to folks’ online lives strikes me as an attractive nuisance, at best).
Sorry to be your bad news bear today; I hope you all get green bars and nonetheless CHANGE YOUR PASSWORDS, GET A PASSWORD MANAGER, AND START USING 2FA WHENEVER YOU CAN!!!