11 Honey Recipes | Tasty Ways To Cook With Honey

7&&void 0!==arguments[7]?arguments[7]:window,c=this;this.name=e,this.funcName=i,this.parameters=null===n?null:p(n)?n:[n],this.isBlock=o,this.blockedBy=s,this.deleteWhenComplete=r,this.isError=!1,this.isComplete=!1,this.isInitialized=!1,this.proceedIfError=a,this.fWindow=l,this.isTimeDelay=!1,this.process=function(){f(“… func = “+e),c.isInitialized=!0,c.isComplete=!0,f(“… func.apply: “+e);var i=c.funcName.split(“.”),n=null,o=this.fWindow||window;i.length>3||(n=3===i.length?o[i[0]][i[1]][i[2]]:2===i.length?o[i[0]][i[1]]:o[c.funcName]),null!=n&&n.apply(null,this.parameters),!0===c.deleteWhenComplete&&delete t[e],!0===c.isBlock&&(f(“—– F’D: “+c.name),u())}},l=function(e,i,t,n,o,s,r){var a=arguments.length>7&&void 0!==arguments[7]?arguments[7]:window,l=this;this.name=e,this.path=i,this.async=o,this.defer=s,this.isBlock=t,this.blockedBy=n,this.isInitialized=!1,this.isError=!1,this.isComplete=!1,this.proceedIfError=r,this.fWindow=a,this.isTimeDelay=!1,this.isPath=function(e){return”/”===e[0]&&”/”!==e[1]},this.getSrc=function(e){return void 0!==window.__ezScriptHost&&this.isPath(e)?window.__ezScriptHost+e:e},this.process=function(){l.isInitialized=!0,f(“… file = “+e);var i=this.fWindow?this.fWindow.document:document,t=i.createElement(“script”);t.src=this.getSrc(this.path),!0===o?t.async=!0:!0===s&&(t.defer=!0),t.onerror=function(){f(“—– ERR’D: “+l.name),l.isError=!0,!0===l.isBlock&&u()},t.onreadystatechange=t.onload=function(){var e=t.readyState;f(“—– F’D: “+l.name),e&&!/loaded|complete/.test(e)||(l.isComplete=!0,!0===l.isBlock&&u())},i.getElementsByTagName(“head”)[0].appendChild(t)}},c=function(e,i){this.name=e,this.path=””,this.async=!1,this.defer=!1,this.isBlock=!1,this.blockedBy=[],this.isInitialized=!0,this.isError=!1,this.isComplete=i,this.proceedIfError=!1,this.isTimeDelay=!1,this.process=function(){}};function d(e){!0!==h(e)&&0!=r&&e.process()}function h(e){if(!0===e.isTimeDelay&&!1===n)return f(e.name+” blocked = TIME DELAY!”),!0;if(p(e.blockedBy))for(var i=0;i200||(f(“let’s go”),m(o),m(s))}function m(e){for(var i in e)if(!1!==e.hasOwnProperty(i)){var t=e[i];!0===t.isComplete||h(t)||!0===t.isInitialized||!0===t.isError?!0===t.isError?f(t.name+”: error”):!0===t.isComplete?f(t.name+”: complete already”):!0===t.isInitialized&&f(t.name+”: initialized already”):t.process()}}function p(e){return”[object Array]”==Object.prototype.toString.call(e)}return window.addEventListener(“load”,(function(){setTimeout((function(){n=!0,f(“TDELAY —–“),u()}),5e3)}),!1),{addFile:function(e,i,n,r,a,c,h,f,u){var m=new l(e,i,n,r,a,c,h,u);!0===f?o[e]=m:s[e]=m,t[e]=m,d(m)},addDelayFile:function(e,i){var n=new l(e,i,!1,[],!1,!1,!0);n.isTimeDelay=!0,f(e+” … FILE! TDELAY”),s[e]=n,t[e]=n,d(n)},addFunc:function(e,n,r,l,c,h,f,u,m,p){!0===h&&(e=e+”_”+i++);var y=new a(e,n,r,l,c,f,u,p);!0===m?o[e]=y:s[e]=y,t[e]=y,d(y)},addDelayFunc:function(e,i,n){var o=new a(e,i,n,!1,[],!0,!0);o.isTimeDelay=!0,f(e+” … FUNCTION! TDELAY”),s[e]=o,t[e]=o,d(o)},items:t,processAll:u,setallowLoad:function(e){r=e},markLoaded:function(e){if(e&&0!==e.length){if(e in t){var i=t[e];!0===i.isComplete?f(i.name+” “+e+”: error loaded duplicate”):(i.isComplete=!0,i.isInitialized=!0)}else t[e]=new c(e,!0);f(“markLoaded dummyfile: “+t[e].name)}},logWhatsBlocked:function(){for(var e in t)!1!==t.hasOwnProperty(e)&&h(t[e])}}}();__ez.evt.add=function(e,t,n){e.addEventListener?e.addEventListener(t,n,!1):e.attachEvent?e.attachEvent(“on”+t,n):e[“on”+t]=n()},__ez.evt.remove=function(e,t,n){e.removeEventListener?e.removeEventListener(t,n,!1):e.detachEvent?e.detachEvent(“on”+t,n):delete e[“on”+t]};__ez.script.add=function(e){var t=document.createElement(“script”);t.src=e,t.async=!0,t.type=”text/javascript”,document.getElementsByTagName(“head”)[0].appendChild(t)};__ez.dot={};!function(){var e;__ez.vep=(e=[],{Add:function(i,t){__ez.dot.isDefined(i)&&__ez.dot.isValid(t)&&e.push({type:”video”,video_impression_id:i,domain_id:__ez.dot.getDID(),t_epoch:__ez.dot.getEpoch(0),data:__ez.dot.dataToStr(t)})},Fire:function(){if(void 0===document.visibilityState||”prerender”!==document.visibilityState){if(__ez.dot.isDefined(e)&&e.length>0)for(;e.length>0;){var i=5;i>e.length&&(i=e.length);var t=e.splice(0,i),o=__ez.dot.getURL(“/detroitchicago/grapefruit.gif”)+”?orig=”+(!0===__ez.template.isOrig?1:0)+”&v=”+btoa(JSON.stringify(t));__ez.dot.Fire(o)}e=[]}}})}();]]> [] 11 Honey Recipes | Tasty Ways To Cook With Honey tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

Data Minimization: Limiting the Scope of Permissible Data Uses to Protect Consumers

Introduction: Purpose Limitations & Primary and Secondary Purposes Under an FTC Unfairness Rule

This is the second in a series of blog posts about EPIC’s proposal for a data minimization standard to limit commercial surveillance and protect consumer privacy. As explained in our previous post, data minimization is the standard for limiting the collection, use, transfer, and retention of personal information to that which is reasonably necessary. Our first blog post in this series discussed the reasonable consumer expectation framework for data minimization. This post explains why the Federal Trade Commission should promulgate a rule that prohibits secondary out-of-context data uses with limited exceptions and why it is important to limit the uses of personal information to certain narrow purposes.

The FTC’s Advanced Notice of Proposed Rulemaking (“ANPR”) regarding commercial surveillance and data security provides the FTC an opportunity to rein in these harmful out-of-context uses. In promulgating a privacy rule, the Commission should be guided by the core principles that have been the foundation of consumer privacy protections for decades, the Fair Information Practices, which include: (1) Collection Limitation; (2) Data Quality; (3) Purpose Specification; (4) Use Limitation; (5) Security Safeguards; (6) Openness; (7) Individual Participation; and (8) Accountability. In order to put these privacy principles into action, the FTC will need to use its unfairness authority to restrain business practices that cause substantial harm to consumers, that are not reasonably avoidable, and that are not outweighed by countervailing benefits to consumers or competition.  

As EPIC explained in our comments on the FTC rulemaking, out-of-context secondary uses cause substantial harm to consumers and should be curtailed. In order to determine the scope of data uses that cause substantial harm to consumers, the Commission will need to evaluate which data uses primarily serve the interests of consumers as they interact directly with businesses in the online ecosystem. To the extent that the Commission determines that certain limited secondary uses either serve the interests of consumers or have substantial countervailing benefits, it should allow data uses for those narrow secondary permissible purposes. A privacy rule that imposes a data minimization standard in this way will not only be consistent with the FIPs but will also fit clearly within the scope of Commission’s unfairness authority.

Secondary Uses Cause Substantial Harm

Consumers are constantly tracked online while using the internet and their devices which subjects consumers to far-reaching data collection. As explained in our previous blog post, data processing is often “not directly in service of fulfilling a consumer’s request,” including out-of-context secondary uses of data that regularly exceed the scope of reasonable consumer expectations. Not only is this data collection and use harmful in itself, but it also necessarily subjects consumers to downstream security risks and privacy harms. The unfair, systemic overcollection and misuse of personal data leads to “invasive, discriminatory targeting that violates the privacy and autonomy of consumers.”

In the course of our daily lives, our personal information is automatically collected, processed, and transferred, some of which is…

So, Are Bullsnakes Poisonous? – Survival Sullivan

There are countless species of snake the spread across North America and the rest of the globe, and though most of these snakes are harmless or nearly so, some snakes possess a deadly, poisonous bite.

bullsnakePsyon, CC BY-SA 3.0, via Wikimedia Commons

Learning to identify poisonous snakes can help put your mind at ease and also prevent unfortunate run-ins with the more dangerous variety.

How about the bullsnake that is so common through the Midwest and on the west coast? Are bullsnakes poisonous?

No, bullsnakes are not poisonous at all, though many varieties closely resemble the deadly poisonous rattlesnake (they even hiss and rattle their tails just like one).

Bullsnakes are big, long and powerfully muscle snakes, and their typical coloration can lead to them being easily confused with their deadly cousins.

That being said, if you know you are dealing with a bullsnake you have nothing to fear. Keep reading to learn more about these impressive specimens.

What Do Bullsnakes Look Like?

The most distinctive characteristic of the bullsnake is its immense size, with adults ranging anywhere from 3 ft to upwards of 6 ft, and all are thick heavy bodied snakes.

The base coloration is usually somewhere between off-white or cream and an ocher yellow or tan color, and there are regularly spaced but slightly irregularly shaped Brown to brown black blotches all along its back and flanks.

These are markings are usually described as saddle-shaped, and are what typically results in the bullsnake being misidentified as a rattlesnake.

The belly of the snake is similarly colored, most often appearing ivory or pale yellow with a checkerboard pattern of black or dark brown spots that are square or nearly so along the park closest to the flanks.

Looking closer, the end of the tale may have an alternating pattern of dark and lightly colored bands, while the broad, thick head sometimes features a dark “eyeliner” that stretches between the bottom of the eye and the jaw. The mouth may feature black or dark brown bars alongside the upper jaw.

Most notably, and this will be important later, bullsnakes do not have a rattle on the end of their tail. More on that in just a minute.

Are Bullsnakes Venomous?

No, bullsnakes are alongside the non-venomous snakes‘ category. Bullsnakes are very muscular, and accordingly quite powerful constrictors.

It is through constriction, not venom, that they dispatch prey they cannot simply swallow whole.

Where are Bullsnakes Found?

Bullsnakes are a subspecies of gopher snake, and accordingly are found sporadically to commonly in the Midwest and commonly in the southwest and along the west coast.

Usually considered a prairie species of snake, they can be found commonly in fields, near rivers, in pastures and increasingly in areas with sparse trees. Despite their size, these snakes are adept and fast climbers.

Unlike some other snakes, bullsnakes are typically active in the daytime during the warmer months, either basking in the sun to increase their…

Continue reading

Off Grid Homes For Sale

7&&void 0!==arguments[7]?arguments[7]:window,c=this;this.name=e,this.funcName=i,this.parameters=null===n?null:p(n)?n:[n],this.isBlock=o,this.blockedBy=s,this.deleteWhenComplete=r,this.isError=!1,this.isComplete=!1,this.isInitialized=!1,this.proceedIfError=a,this.fWindow=l,this.isTimeDelay=!1,this.process=function(){f(“… func = “+e),c.isInitialized=!0,c.isComplete=!0,f(“… func.apply: “+e);var i=c.funcName.split(“.”),n=null,o=this.fWindow||window;i.length>3||(n=3===i.length?o[i[0]][i[1]][i[2]]:2===i.length?o[i[0]][i[1]]:o[c.funcName]),null!=n&&n.apply(null,this.parameters),!0===c.deleteWhenComplete&&delete t[e],!0===c.isBlock&&(f(“—– F’D: “+c.name),u())}},l=function(e,i,t,n,o,s,r){var a=arguments.length>7&&void 0!==arguments[7]?arguments[7]:window,l=this;this.name=e,this.path=i,this.async=o,this.defer=s,this.isBlock=t,this.blockedBy=n,this.isInitialized=!1,this.isError=!1,this.isComplete=!1,this.proceedIfError=r,this.fWindow=a,this.isTimeDelay=!1,this.isPath=function(e){return”/”===e[0]&&”/”!==e[1]},this.getSrc=function(e){return void 0!==window.__ezScriptHost&&this.isPath(e)?window.__ezScriptHost+e:e},this.process=function(){l.isInitialized=!0,f(“… file = “+e);var i=this.fWindow?this.fWindow.document:document,t=i.createElement(“script”);t.src=this.getSrc(this.path),!0===o?t.async=!0:!0===s&&(t.defer=!0),t.onerror=function(){f(“—– ERR’D: “+l.name),l.isError=!0,!0===l.isBlock&&u()},t.onreadystatechange=t.onload=function(){var e=t.readyState;f(“—– F’D: “+l.name),e&&!/loaded|complete/.test(e)||(l.isComplete=!0,!0===l.isBlock&&u())},i.getElementsByTagName(“head”)[0].appendChild(t)}},c=function(e,i){this.name=e,this.path=””,this.async=!1,this.defer=!1,this.isBlock=!1,this.blockedBy=[],this.isInitialized=!0,this.isError=!1,this.isComplete=i,this.proceedIfError=!1,this.isTimeDelay=!1,this.process=function(){}};function d(e){!0!==h(e)&&0!=r&&e.process()}function h(e){if(!0===e.isTimeDelay&&!1===n)return f(e.name+” blocked = TIME DELAY!”),!0;if(p(e.blockedBy))for(var i=0;i200||(f(“let’s go”),m(o),m(s))}function m(e){for(var i in e)if(!1!==e.hasOwnProperty(i)){var t=e[i];!0===t.isComplete||h(t)||!0===t.isInitialized||!0===t.isError?!0===t.isError?f(t.name+”: error”):!0===t.isComplete?f(t.name+”: complete already”):!0===t.isInitialized&&f(t.name+”: initialized already”):t.process()}}function p(e){return”[object Array]”==Object.prototype.toString.call(e)}return window.addEventListener(“load”,(function(){setTimeout((function(){n=!0,f(“TDELAY —–“),u()}),5e3)}),!1),{addFile:function(e,i,n,r,a,c,h,f,u){var m=new l(e,i,n,r,a,c,h,u);!0===f?o[e]=m:s[e]=m,t[e]=m,d(m)},addDelayFile:function(e,i){var n=new l(e,i,!1,[],!1,!1,!0);n.isTimeDelay=!0,f(e+” … FILE! TDELAY”),s[e]=n,t[e]=n,d(n)},addFunc:function(e,n,r,l,c,h,f,u,m,p){!0===h&&(e=e+”_”+i++);var y=new a(e,n,r,l,c,f,u,p);!0===m?o[e]=y:s[e]=y,t[e]=y,d(y)},addDelayFunc:function(e,i,n){var o=new a(e,i,n,!1,[],!0,!0);o.isTimeDelay=!0,f(e+” … FUNCTION! TDELAY”),s[e]=o,t[e]=o,d(o)},items:t,processAll:u,setallowLoad:function(e){r=e},markLoaded:function(e){if(e&&0!==e.length){if(e in t){var i=t[e];!0===i.isComplete?f(i.name+” “+e+”: error loaded duplicate”):(i.isComplete=!0,i.isInitialized=!0)}else t[e]=new c(e,!0);f(“markLoaded dummyfile: “+t[e].name)}},logWhatsBlocked:function(){for(var e in t)!1!==t.hasOwnProperty(e)&&h(t[e])}}}();__ez.evt.add=function(e,t,n){e.addEventListener?e.addEventListener(t,n,!1):e.attachEvent?e.attachEvent(“on”+t,n):e[“on”+t]=n()},__ez.evt.remove=function(e,t,n){e.removeEventListener?e.removeEventListener(t,n,!1):e.detachEvent?e.detachEvent(“on”+t,n):delete e[“on”+t]};__ez.script.add=function(e){var t=document.createElement(“script”);t.src=e,t.async=!0,t.type=”text/javascript”,document.getElementsByTagName(“head”)[0].appendChild(t)};__ez.dot={};!function(){var e;__ez.vep=(e=[],{Add:function(i,t){__ez.dot.isDefined(i)&&__ez.dot.isValid(t)&&e.push({type:”video”,video_impression_id:i,domain_id:__ez.dot.getDID(),t_epoch:__ez.dot.getEpoch(0),data:__ez.dot.dataToStr(t)})},Fire:function(){if(void 0===document.visibilityState||”prerender”!==document.visibilityState){if(__ez.dot.isDefined(e)&&e.length>0)for(;e.length>0;){var i=5;i>e.length&&(i=e.length);var t=e.splice(0,i),o=__ez.dot.getURL(“/detroitchicago/grapefruit.gif”)+”?orig=”+(!0===__ez.template.isOrig?1:0)+”&v=”+btoa(JSON.stringify(t));__ez.dot.Fire(o)}e=[]}}})}();]]> [] Off Grid Homes For Sale | Jake’s Old West Properties tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

FTC Moves to Block Meta From Monetizing Children’s Data, Impose New Privacy Safeguards

The Federal Trade Commission today announced its intent to impose dramatic new limits on the personal data practices of Meta (previously Facebook), including a ban on monetizing the data of children and restrictions on the company’s use of facial recognition technology.

The proposed action, which would modify an existing FTC order against Meta resulting from the Cambridge Analytica scandal, is based on findings that Meta “failed to fully comply with the order, misled parents about their ability to control with whom their children communicated through its Messenger Kids app, and misrepresented the access it provided some app developers to private user data.”

If finalized, the revised order would limit Meta’s use of minors’ personal data solely to providing its service and security purposes; prohibit Meta from releasing new products or features “until it can demonstrate . . . that its privacy program fully complies with the Order and has no material gaps or weaknesses”; extend restrictions on Meta’s use of facial recognition technology; and impose additional privacy and security safeguards.

“We have seen time and again that Meta and other Big Tech companies have broken their privacy promises and failed to meet their obligations to users, including children who are especially at risk of manipulation and abuse,” said EPIC Executive Director Alan Butler. “It is essential that the Federal Trade Commission vigorously enforce its orders and hold these companies to account when they fail to protect the privacy of their users. And we know that even incredibly large fines are not enough to stop data abuses where there are profits to be made. Meta has had over a decade to clean up its act, but even after a $5 billion fine, it continues to violate its users’ privacy.That is why it is necessary for the Commission to be proactive and ensure that these abusive business practices are stopped.”

EPIC has long fought to protect the privacy of social media users, particularly users of Facebook and Meta. In 2009, EPIC and coalition partners brought an FTC complaint concerning Facebook’s privacy settings that led to the Commission’s first consent decree with Facebook. EPIC filed numerous FTC complaints targeting Facebook’s abusive data practices in the years after and challenged the inadequacy of the Commission’s 2019 consent decree in federal court.

How To Make a Kitchen Compost Bin

7&&void 0!==arguments[7]?arguments[7]:window,c=this;this.name=e,this.funcName=i,this.parameters=null===n?null:p(n)?n:[n],this.isBlock=o,this.blockedBy=s,this.deleteWhenComplete=r,this.isError=!1,this.isComplete=!1,this.isInitialized=!1,this.proceedIfError=a,this.fWindow=l,this.isTimeDelay=!1,this.process=function(){f(“… func = “+e),c.isInitialized=!0,c.isComplete=!0,f(“… func.apply: “+e);var i=c.funcName.split(“.”),n=null,o=this.fWindow||window;i.length>3||(n=3===i.length?o[i[0]][i[1]][i[2]]:2===i.length?o[i[0]][i[1]]:o[c.funcName]),null!=n&&n.apply(null,this.parameters),!0===c.deleteWhenComplete&&delete t[e],!0===c.isBlock&&(f(“—– F’D: “+c.name),u())}},l=function(e,i,t,n,o,s,r){var a=arguments.length>7&&void 0!==arguments[7]?arguments[7]:window,l=this;this.name=e,this.path=i,this.async=o,this.defer=s,this.isBlock=t,this.blockedBy=n,this.isInitialized=!1,this.isError=!1,this.isComplete=!1,this.proceedIfError=r,this.fWindow=a,this.isTimeDelay=!1,this.isPath=function(e){return”/”===e[0]&&”/”!==e[1]},this.getSrc=function(e){return void 0!==window.__ezScriptHost&&this.isPath(e)?window.__ezScriptHost+e:e},this.process=function(){l.isInitialized=!0,f(“… file = “+e);var i=this.fWindow?this.fWindow.document:document,t=i.createElement(“script”);t.src=this.getSrc(this.path),!0===o?t.async=!0:!0===s&&(t.defer=!0),t.onerror=function(){f(“—– ERR’D: “+l.name),l.isError=!0,!0===l.isBlock&&u()},t.onreadystatechange=t.onload=function(){var e=t.readyState;f(“—– F’D: “+l.name),e&&!/loaded|complete/.test(e)||(l.isComplete=!0,!0===l.isBlock&&u())},i.getElementsByTagName(“head”)[0].appendChild(t)}},c=function(e,i){this.name=e,this.path=””,this.async=!1,this.defer=!1,this.isBlock=!1,this.blockedBy=[],this.isInitialized=!0,this.isError=!1,this.isComplete=i,this.proceedIfError=!1,this.isTimeDelay=!1,this.process=function(){}};function d(e){!0!==h(e)&&0!=r&&e.process()}function h(e){if(!0===e.isTimeDelay&&!1===n)return f(e.name+” blocked = TIME DELAY!”),!0;if(p(e.blockedBy))for(var i=0;i200||(f(“let’s go”),m(o),m(s))}function m(e){for(var i in e)if(!1!==e.hasOwnProperty(i)){var t=e[i];!0===t.isComplete||h(t)||!0===t.isInitialized||!0===t.isError?!0===t.isError?f(t.name+”: error”):!0===t.isComplete?f(t.name+”: complete already”):!0===t.isInitialized&&f(t.name+”: initialized already”):t.process()}}function p(e){return”[object Array]”==Object.prototype.toString.call(e)}return window.addEventListener(“load”,(function(){setTimeout((function(){n=!0,f(“TDELAY —–“),u()}),5e3)}),!1),{addFile:function(e,i,n,r,a,c,h,f,u){var m=new l(e,i,n,r,a,c,h,u);!0===f?o[e]=m:s[e]=m,t[e]=m,d(m)},addDelayFile:function(e,i){var n=new l(e,i,!1,[],!1,!1,!0);n.isTimeDelay=!0,f(e+” … FILE! TDELAY”),s[e]=n,t[e]=n,d(n)},addFunc:function(e,n,r,l,c,h,f,u,m,p){!0===h&&(e=e+”_”+i++);var y=new a(e,n,r,l,c,f,u,p);!0===m?o[e]=y:s[e]=y,t[e]=y,d(y)},addDelayFunc:function(e,i,n){var o=new a(e,i,n,!1,[],!0,!0);o.isTimeDelay=!0,f(e+” … FUNCTION! TDELAY”),s[e]=o,t[e]=o,d(o)},items:t,processAll:u,setallowLoad:function(e){r=e},markLoaded:function(e){if(e&&0!==e.length){if(e in t){var i=t[e];!0===i.isComplete?f(i.name+” “+e+”: error loaded duplicate”):(i.isComplete=!0,i.isInitialized=!0)}else t[e]=new c(e,!0);f(“markLoaded dummyfile: “+t[e].name)}},logWhatsBlocked:function(){for(var e in t)!1!==t.hasOwnProperty(e)&&h(t[e])}}}();__ez.evt.add=function(e,t,n){e.addEventListener?e.addEventListener(t,n,!1):e.attachEvent?e.attachEvent(“on”+t,n):e[“on”+t]=n()},__ez.evt.remove=function(e,t,n){e.removeEventListener?e.removeEventListener(t,n,!1):e.detachEvent?e.detachEvent(“on”+t,n):delete e[“on”+t]};__ez.script.add=function(e){var t=document.createElement(“script”);t.src=e,t.async=!0,t.type=”text/javascript”,document.getElementsByTagName(“head”)[0].appendChild(t)};__ez.dot={};!function(){var e;__ez.vep=(e=[],{Add:function(i,t){__ez.dot.isDefined(i)&&__ez.dot.isValid(t)&&e.push({type:”video”,video_impression_id:i,domain_id:__ez.dot.getDID(),t_epoch:__ez.dot.getEpoch(0),data:__ez.dot.dataToStr(t)})},Fire:function(){if(void 0===document.visibilityState||”prerender”!==document.visibilityState){if(__ez.dot.isDefined(e)&&e.length>0)for(;e.length>0;){var i=5;i>e.length&&(i=e.length);var t=e.splice(0,i),o=__ez.dot.getURL(“/detroitchicago/grapefruit.gif”)+”?orig=”+(!0===__ez.template.isOrig?1:0)+”&v=”+btoa(JSON.stringify(t));__ez.dot.Fire(o)}e=[]}}})}();]]> [] How To Make a Kitchen Compost Bin | Homesteading Tips tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

EPIC Leads Coalition Brief Defending California’s New Age-Appropriate Design Code

On Friday, EPIC lead a coalition including Reset Tech, Facebook whistleblower Frances Haugen, and former government officials in filing an amicus brief defending California’s new Age-Appropriate Design Code against a challenge from tech giant advocacy group NetChoice.

The California Age-Appropriate Design Code is a landmark new law that requires tech companies to design their services with children’s privacy in mind. Starting in July 2024, tech companies will be required to assess how their services collect and use children’s data and to refrain from certain harmful uses of that data. NetChoice, whose members include Google, Meta, Amazon, Twitter, and TikTok, is trying to block the law’s implementation. NetChoice argues that the law restricts what content a company can show on its website and, consequently, the law violates the First Amendment and is inconsistent with Section 230 of the Communications Decency Act, which prevents tech companies from being treated as the publishers of third-party content.

The coalition of groups lead by EPIC argued that California’s Design Code “does not require companies to remove or even demote any specific content—as long as they do not use children’s data in a way that violates the law, companies can show users whatever information they like.” The coalition pointed out that courts have “increasing rejected” tech companies’ attempts to use Section 230 to immunize themselves from their own harmful conduct, such as when they use personal information about users to deny them access to information in violation of anti-discrimination laws or when the design of an app feature causes foreseeable harm. Since California’s new law regulates similar platform conduct, Section 230 does not apply. The coalition also argued that “the impact assessments required by the AADC are common in regulatory frameworks across the United States and the world.” The coalition wrote that NetChoice’s and its supporters’ “argument that generally applicable privacy regulations, targeted specifically at mitigating harms to children’s privacy, are unconstitutional would undermine numerous federal and state laws and undermine the state’s compelling interest in protecting the privacy of children.”

EPIC regularly files amicus briefs defending the constitutionality and enforceability of privacy statutes.

How To Identify Poison Ivy

7&&void 0!==arguments[7]?arguments[7]:window,c=this;this.name=e,this.funcName=i,this.parameters=null===n?null:p(n)?n:[n],this.isBlock=o,this.blockedBy=s,this.deleteWhenComplete=r,this.isError=!1,this.isComplete=!1,this.isInitialized=!1,this.proceedIfError=a,this.fWindow=l,this.isTimeDelay=!1,this.process=function(){f(“… func = “+e),c.isInitialized=!0,c.isComplete=!0,f(“… func.apply: “+e);var i=c.funcName.split(“.”),n=null,o=this.fWindow||window;i.length>3||(n=3===i.length?o[i[0]][i[1]][i[2]]:2===i.length?o[i[0]][i[1]]:o[c.funcName]),null!=n&&n.apply(null,this.parameters),!0===c.deleteWhenComplete&&delete t[e],!0===c.isBlock&&(f(“—– F’D: “+c.name),u())}},l=function(e,i,t,n,o,s,r){var a=arguments.length>7&&void 0!==arguments[7]?arguments[7]:window,l=this;this.name=e,this.path=i,this.async=o,this.defer=s,this.isBlock=t,this.blockedBy=n,this.isInitialized=!1,this.isError=!1,this.isComplete=!1,this.proceedIfError=r,this.fWindow=a,this.isTimeDelay=!1,this.isPath=function(e){return”/”===e[0]&&”/”!==e[1]},this.getSrc=function(e){return void 0!==window.__ezScriptHost&&this.isPath(e)?window.__ezScriptHost+e:e},this.process=function(){l.isInitialized=!0,f(“… file = “+e);var i=this.fWindow?this.fWindow.document:document,t=i.createElement(“script”);t.src=this.getSrc(this.path),!0===o?t.async=!0:!0===s&&(t.defer=!0),t.onerror=function(){f(“—– ERR’D: “+l.name),l.isError=!0,!0===l.isBlock&&u()},t.onreadystatechange=t.onload=function(){var e=t.readyState;f(“—– F’D: “+l.name),e&&!/loaded|complete/.test(e)||(l.isComplete=!0,!0===l.isBlock&&u())},i.getElementsByTagName(“head”)[0].appendChild(t)}},c=function(e,i){this.name=e,this.path=””,this.async=!1,this.defer=!1,this.isBlock=!1,this.blockedBy=[],this.isInitialized=!0,this.isError=!1,this.isComplete=i,this.proceedIfError=!1,this.isTimeDelay=!1,this.process=function(){}};function d(e){!0!==h(e)&&0!=r&&e.process()}function h(e){if(!0===e.isTimeDelay&&!1===n)return f(e.name+” blocked = TIME DELAY!”),!0;if(p(e.blockedBy))for(var i=0;i200||(f(“let’s go”),m(o),m(s))}function m(e){for(var i in e)if(!1!==e.hasOwnProperty(i)){var t=e[i];!0===t.isComplete||h(t)||!0===t.isInitialized||!0===t.isError?!0===t.isError?f(t.name+”: error”):!0===t.isComplete?f(t.name+”: complete already”):!0===t.isInitialized&&f(t.name+”: initialized already”):t.process()}}function p(e){return”[object Array]”==Object.prototype.toString.call(e)}return window.addEventListener(“load”,(function(){setTimeout((function(){n=!0,f(“TDELAY —–“),u()}),5e3)}),!1),{addFile:function(e,i,n,r,a,c,h,f,u){var m=new l(e,i,n,r,a,c,h,u);!0===f?o[e]=m:s[e]=m,t[e]=m,d(m)},addDelayFile:function(e,i){var n=new l(e,i,!1,[],!1,!1,!0);n.isTimeDelay=!0,f(e+” … FILE! TDELAY”),s[e]=n,t[e]=n,d(n)},addFunc:function(e,n,r,l,c,h,f,u,m,p){!0===h&&(e=e+”_”+i++);var y=new a(e,n,r,l,c,f,u,p);!0===m?o[e]=y:s[e]=y,t[e]=y,d(y)},addDelayFunc:function(e,i,n){var o=new a(e,i,n,!1,[],!0,!0);o.isTimeDelay=!0,f(e+” … FUNCTION! TDELAY”),s[e]=o,t[e]=o,d(o)},items:t,processAll:u,setallowLoad:function(e){r=e},markLoaded:function(e){if(e&&0!==e.length){if(e in t){var i=t[e];!0===i.isComplete?f(i.name+” “+e+”: error loaded duplicate”):(i.isComplete=!0,i.isInitialized=!0)}else t[e]=new c(e,!0);f(“markLoaded dummyfile: “+t[e].name)}},logWhatsBlocked:function(){for(var e in t)!1!==t.hasOwnProperty(e)&&h(t[e])}}}();__ez.evt.add=function(e,t,n){e.addEventListener?e.addEventListener(t,n,!1):e.attachEvent?e.attachEvent(“on”+t,n):e[“on”+t]=n()},__ez.evt.remove=function(e,t,n){e.removeEventListener?e.removeEventListener(t,n,!1):e.detachEvent?e.detachEvent(“on”+t,n):delete e[“on”+t]};__ez.script.add=function(e){var t=document.createElement(“script”);t.src=e,t.async=!0,t.type=”text/javascript”,document.getElementsByTagName(“head”)[0].appendChild(t)};__ez.dot={};!function(){var e;__ez.vep=(e=[],{Add:function(i,t){__ez.dot.isDefined(i)&&__ez.dot.isValid(t)&&e.push({type:”video”,video_impression_id:i,domain_id:__ez.dot.getDID(),t_epoch:__ez.dot.getEpoch(0),data:__ez.dot.dataToStr(t)})},Fire:function(){if(void 0===document.visibilityState||”prerender”!==document.visibilityState){if(__ez.dot.isDefined(e)&&e.length>0)for(;e.length>0;){var i=5;i>e.length&&(i=e.length);var t=e.splice(0,i),o=__ez.dot.getURL(“/detroitchicago/grapefruit.gif”)+”?orig=”+(!0===__ez.template.isOrig?1:0)+”&v=”+btoa(JSON.stringify(t));__ez.dot.Fire(o)}e=[]}}})}();]]> [] How To Identify Poison Ivy | Homesteading Safety Tips tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

New ODNI National Security Transparency Report Reveals Steady Increase in Section 702 Surveillance, Continued Warrantless Querying Issues

On April 28, the Office of the Director of National Intelligence (ODNI) released its Annual Statistical Transparency Report Regarding the Intelligence Community’s Use of National Security Surveillance Authorities, which shows a steady increase in targeting under Section 702 of the Foreign Intelligence Surveillance Act (FISA)—up to nearly 250,000 in 2022—and continued noncompliance with Congressional safeguards. In response to concerns over the extent to which the Federal Bureau of Investigation (FBI) queries raw Section 702 data, as well as its inability to comply with Section 702’s minimal privacy safeguards, the FBI revised its methodology for counting queries and issued new guidance on querying. Still, under this new methodology—which only counts unique queries and therefore does not count repeat queries using the same U.S. person terms—the FBI queried Section 702 databases roughly 119,000 times. Further, according to the report, the FBI continues to flout a very narrow requirement that it obtain a court order prior to conducting certain queries, a requirement with which the FBI has never complied.

The newest ODNI transparency report also showed that the intelligence community continues to obtain business records under Section 215 of the PATRIOT Act, despite the provision’s sunset in 2020. Because of a savings clause in Section 215, the intelligence community has been able to make use of this defunct legal standard to continue its longstanding investigations into groups like Al Qaeda, or foreign countries like China and Russia. According to ODNI, the number of unique identifiers like phone numbers and email addresses collected through this provision doubled in 2022. Responding to the report, Sen. Ron Wyden emphasized that “[i]f the government wants to use [the savings clause exception] to dramatically increase collection, it should come back to Congress where reforms of the authority can be debated.”

EPIC recently published several posts—including one on backdoor searches—as part of a new blog series focused on explaining Section 702 and the need to reform it. EPIC has also urged the Privacy and Civil Liberties Oversight Board to recommend prohibiting warrantless backdoor searches and has joined a coalition of civil liberties groups proposing broad reform to Section 702 and related surveillance authorities.

Jeramie Scott, EPIC Senior Counsel & Director of the Project on Surveillance Oversight, released the following statement regarding ODNI’s most recent transparency report:

“The most recent ODNI transparency report further supports the need for serious reform. Although the government claims revised internal procedures have led to a drop in searches, the FBI continues to conduct warrantless searches of Americans’ communications at a rate of hundreds of searches a day. Warrantless searches of Americans’ communications should not occur under Section 702 or any other authority, full stop. To pretend that going from millions of warrantless searches a year to hundreds of thousands somehow resolves the issue is to distract from the clear need for reform. Until the government acknowledges the need for comprehensive reform, it’s clear they are more interested in window dressing than actually protecting Americans’ privacy and civil liberties.”

Do You Take This One Resource for Granted? – reThinkSurvival.com

It’s interesting how people change over time. Most of us, I suspect, will never change drastically, but we can sometimes “see the writing on the wall,” so to speak, as one of my good friends is doing recently.

We had them over this weekend, and, to my surprise, he’s becoming more interested in what I’m up to. Specifically, he’s becoming interested in our gardening, chickens, and general preparedness, but he hasn’t yet chosen to “pull the trigger” as it were. That got me to thinking: what preparedness resources do we most take for granted?

Most of us would probably say food. After all, it’s an easy preparedness resource to pick on; I won’t preach to the choir much here as I’m sure you’re well aware of how important food is to our survival. Suffice it to say that attempting to become truly self-reliant with respect to food is awfully difficult. Even growing your own vegetable garden won’t amount to anything fruitful for months, and then there’s the canning, freeze-drying, and whatnot to save for winter. And I haven’t mentioned a word about growing food for calories (like grains) or protein (like rabbits or cows) and how much work all that would be. It would become a full time job for sure!

What about water? That’s a resource which I believe we, even as preppers, take for granted more so than food. After all, what happens if they turned off the water spigot right now? I’d be fine for a few weeks, maybe a few months if we truly conserved, but I would have a real hard time acquiring any real amount of clean water. Yes, I’ve got filters, and I know about SODIS (solar water disinfection), and I’ve got bleach and other stuff for water treatment, but it’s the gathering of water that would be the real problem. Even rainwater collection isn’t as easy as I wish it were. We can get weeks without collecting a drop here in the Midwest, and even then we might not gather much to get excited about. I’ll spare you the rest of the details, but water is certainly overlooked by most of us.

I’d further argue that our health is a resource that we often overlook. I believe that most of us assume we would be perfectly healthy if/when SHTF and that nothing would go bad, but that’s far from the truth. Odds are good that our health will change drastically if for nothing other than poor sanitation practices, restricted diets, unmanaged stress, as well as a drastic change in physical activity. SHTF will be a real eye-opener for most of us, me included. And that’s to say nothing of the serious potential problems we might face, such as accidents (like falls or deep cuts), 3rd degree burns (from starting fires), acute illness (bad food or water or sanitation), and damage from others (like gunshot wounds). This will be a real mess.

Speaking of which, how about your security? Right now, your neighbors…

Continue reading