DIY Greenhouses: A Comprehensive Guide to Building Your Own Greenhouse

Introduction

Hey there, gardening enthusiasts! If you’ve ever dreamed of extending your growing season, then you’re in for a treat! We stumbled upon this incredible blog post by A Piece of Rainbow that covers everything you need to know about DIY greenhouses. From simple cold frames to elaborate hoop houses, this guide is a treasure trove of inspiration and practical advice. We’re so excited to share this with you!

Key Takeaways

Why Build a Greenhouse?

  • Extend the Growing Season: Greenhouses allow you to garden year-round, even in cold climates.
  • Budget-Friendly: You don’t need a big budget or advanced carpentry skills to build your own greenhouse.
  • Resourceful and Sustainable: The guide encourages the use of recycled materials like old windows, pallets, and even plastic bottles.

Types of DIY Greenhouses

  1. Plastic Bottle Greenhouses: An eco-friendly and cost-effective option.
  2. Cedar Branch Hoop Houses: Long-lasting and made from natural materials.
  3. Pallet Greenhouses: Utilizes pallet wood, a readily available and sturdy material.
  4. Old Window Cold Frames: A great way to repurpose old windows.
  5. Straw Bale Cold Frames: Ingenious and simple, using straw bales as insulating walls.
  6. A-Frame Greenhouses: Easy to build and versatile.
  7. Hardware Fencing Hoop Houses: Made from hardware wire mesh, these are sturdy and durable.
  8. Retractable Hoop Houses: These have a smart design that makes it easy to work on garden beds.
  9. Geodesic Dome Greenhouses: These offer stability in high wind locations and optimal sunlight absorption.

Additional Tips

  • Passive Heating: Some designs incorporate passive heating elements like painted jugs to keep the greenhouse warm.
  • Material Choices: The guide also provides tips on choosing the right materials, such as good quality greenhouse plastic.
  • Lead Paint Caution: If you’re using old windows, make sure they were not painted with toxic lead paint.

Filling the Gaps

While the original post is comprehensive, it could delve deeper into the following:

  • Climate Considerations: How to adapt your greenhouse design based on your local climate.
  • Irrigation Systems: Tips on setting up an efficient watering system.
  • Pest Control: Natural ways to keep pests at bay.
  • Cost Estimates: A rough guide on the cost involved in building different types of greenhouses.
  • Step-by-Step Tutorials: More detailed tutorials for each type of greenhouse would be beneficial.

Conclusion

Whether you’re a gardening newbie or a seasoned pro, this guide offers something for everyone. So, what are you waiting for? Roll up those sleeves and start building your dream greenhouse today!

For the full guide and tutorials, make sure to visit the original post on A Piece of Rainbow. Happy gardening!

PRESS RELEASE: EPIC Urges FTC to Investigate Grindr’s Personal Data Practices

In a complaint filed Wednesday, the Electronic Privacy Information Center (EPIC) called on the Federal Trade Commission (FTC) to investigate the popular LGBTQ+ dating app Grindr for its potentially unlawful retention and disclosure of users’ sensitive personal data.

EPIC’s complaint highlights Grindr, LLC’s checkered history of protecting the privacy and safety of its users and troubling allegations made by Grindr’s former Chief Privacy Officer Ronald De Jesus in his recent wrongful termination lawsuit against Grindr.

Grindr appears to have retained and disclosed sensitive user data—including users’ account information, messages, and photos sent via the platform—after users deleted their Grindr accounts. Grindr also apparently failed to implement adequate data security practices and to control employee access to user data. And Grindr appears to have retained and disclosed sensitive health information—including users’ HIV status, last tested date, and vaccination status—in violation of commitments made in Grindr’s privacy policies. As EPIC writes:

“Grindr’s apparent personal data practices have caused or are likely to cause substantial injury to its users and former users because they expose users to security breaches of highly sensitive data, including health information like HIV status and vaccination status; other information users include on their profiles like sexual preference and age; users’ app usage; and location data.”

EPIC’s complaint calls on the FTC to investigate Grindr for unfair and deceptive practices in violation of Section 5 of the FTC Act and for violations of the Health Breach Notification Rule. EPIC further urges the FTC to enjoin any unlawful data practices confirmed in its investigation and to impose penalties against Grindr for any violations of the Health Breach Notification Rule.

“There’s good reason to believe that Grindr has betrayed the trust and violated the privacy of its users,” EPIC Director of Litigation John Davisson said. “It’s critical that the Federal Trade Commission step in and conduct a thorough investigation of Grindr’s personal data practices. Grindr users deserve peace of mind that their sensitive personal data will be protected from mishandling and misuse.”

EPIC has played a leading role in developing the authority of regulators to safeguard the rights of consumers, ensure the protection of personal data, and address privacy violations. EPIC previously called attention to Grindr’s failure to protect users from harassment and abuse by filing an amicus brief in Herrick v. Grindr.

###

About EPIC
EPIC is a public interest research center in Washington, D.C., established in 1994 to focus public attention on emerging privacy and civil liberties issues and to secure the fundamental right to privacy in the digital age for all people through advocacy, research, and litigation. EPIC pursues a wide range of program activities including policy research, public education, conferences, litigation, publications, and advocacy. EPIC routinely files amicus briefs in federal courts, pursues open government cases, defends consumer privacy, organizes conferences for NGOs, and speaks before Congress and judicial organizations about emerging privacy and civil liberties issues. EPIC works closely with a distinguished advisory board, with expertise in law, technology and public policy.

13 Beautiful Places To Visit This Fall

13 Beautiful Places To Visit This Fall | Homesteading tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

Strengthening Privacy and Data Protection Policy in the National Cybersecurity Strategy

As many as half of US consumers have been affected by data breaches because a company holding their personal information was hacked. That is significantly higher than the global average of just 33 percent of consumers. Although it can be difficult to remedy the harms of identity theft, preventing the underlying breach is in many cases neither difficult nor expensive. The Department of Homeland Security has estimated that 85 percent of data breaches were preventable, and more recently the Internet Society has estimated 95 percent of breaches could have been prevented. Companies must be incentivized to invest in safeguards to protect consumer data with which they have been entrusted—or else multiple breaches each impacting tens or hundreds of millions of Americans will continue to occur every year.

In March 2023, the White House unveiled a National Cybersecurity Strategy that includes a five-pillar plan to work towards a more secure and reliable digital ecosystem. In July 2023, the White House released its Implementation Plan for this strategy. In addition to covering a range of cybersecurity-focused issues, such as disrupting malicious actors online and investing in secure infrastructure, the strategy also makes clear that it is essential to reduce harmful data practices in the marketplace. Many governmental and non-governmental groups have begun to focus on building and supporting the cybersecurity workforce and infrastructure, but EPIC believes that the privacy and data security components of the strategy demand closer attention. In particular, it is important for civil society to have a coordinated action plan to promote better legislative and regulatory standards.

That is why EPIC is launching a new project on Strengthening Privacy and Cybersecurity Standards, with the support of craig newmark philanthropies’ Cyber Civil Defense Initiative. Our goal is to partner with other members of the Cyber Civil Defense to advance important elements of the National Cybersecurity Strategy including:

  1. Establishing cybersecurity minimum requirements in critical sectors (Strategy Pillar One- Defend Critical Infrastructure); and
  2. Improving privacy and data security practices in all sectors (Strategy Pillar Three- Shape Market Forces to Drive Security and Resilience).

By advocating in support of stronger minimum cybersecurity requirements to defend critical infrastructure and in support of comprehensive privacy and data security practices that shape market forces to drive security and resilience, EPIC will raise public awareness of threats to online security and will spur the creation of tools to promote privacy and defend our nation’s networks.

Minimum Cybersecurity Requirements to Defend Critical Infrastructure

As part of its work to support the National Cybersecurity Strategy, EPIC will advocate for federal policies that mandate stronger cybersecurity standards to defend critical infrastructure and improve public safety. Where sensitive information such as precise geolocation, communications, health, and/or financial information is at risk the stakes are especially high. Preventing bad actors from harvesting personal data from repositories containing this information is both a cybersecurity and privacy priority, and federal policy must reflect this reality through sensible minimum cybersecurity requirements. These requirements should include annual audits and…

The Ultimate Guide to Chicken Dust Baths: What to Add and What to Avoid

Hey, fellow homesteaders! If you’re as passionate about raising healthy, happy chickens as I am, then you’re going to love this comprehensive guide on chicken dust baths. I recently stumbled upon an incredible blog post by Tara Dodrill on Survival Sullivan, and I just had to share it with you all. Tara’s post is a treasure trove of information, but I’ve expanded on it to give you even more insights!

What is a Chicken Dust Bath?

First things first, let’s talk about what a chicken dust bath is. It’s a blend of natural substances that help clean and deter the growth of parasites in your chickens. Tara recommends using old tires, plastic tubs, or even cinder blocks to create a “bath” for the chicken dust materials. The bath should be at least 10 inches deep and large enough to accommodate multiple hens.

Why Do Chickens Need Dust Baths?

  • Social Activity: Chickens are social creatures, and dust bathing is a group activity they absolutely love.
  • Parasite Control: Dust baths help in controlling various types of parasites like mites, lice, and ticks.
  • Feather Care: The dust bath helps in maintaining the sheen and health of the chicken’s feathers.

What to Add to Your Chicken Dust Bath

Tara provides an excellent list of items you can add to your chicken dust bath. Here’s an expanded list:

Essential Ingredients

  • Sand: Acts as a base and provides grit for digestion.
  • Soil: Helps bind lighter ingredients together.
  • Diatomaceous Earth (DE): A powerful natural substance that can kill or prevent ticks.
  • Wood Ash: Contains potassium and calcium, and helps deter some parasites.

Optional Herbal Additions

  • Lavender: Helps relieve stress and may increase blood circulation.
  • Dill: May serve as a preventative to respiratory illness.
  • Lemon Balm: Contains natural antibacterial compounds.
  • Rosemary: Natural pain relief aid and helps bolster the respiratory system.
  • Ginger: Stimulates appetite and promotes a robust circulatory system.
  • Fennel: Improves reproductive health and may serve as an egg-laying stimulant.
  • Catnip: Acts as a natural insecticide.
  • Mint: Natural rodent repellent and insecticide.
  • Thyme: Holds antibiotic and antibacterial properties.
  • Basil: Enhances the mucus membrane and may produce brilliantly colored egg yolks.

What Not to Add

  • Kitty Litter: Contains fragrances and deodorizers.
  • Sawdust: Too lightweight and absorbent.
  • Straw: Houses mites and lice.
  • Coal Ash: Contains toxic substances like heavy metals and sulfur.
  • Pine Shavings: Harmful to the chicken’s respiratory system.
  • Cedar Shavings: Contains plicatic acid which is harmful when inhaled.

Chicken Dust Bath Mixture Recipe

For optimal results, Tara suggests the following ratio:

  • 2 parts soil
  • 1 part wood ash
  • 1 to 2 parts sand
  • 1 part diatomaceous earth
  • ½: Ensure the dust bath hasn’t become too soggy or hard.
  • Seasonal Relocation: Consider moving the bath to a shady spot during warm months and a sunny spot during cold months.
  • Perches: Add low-hanging perches for the chickens to preen their feathers after bathing.

Final Thoughts

Chicken dust baths are not just beneficial for the hens but also a joy to watch. They chatter, play, and have a grand time while also getting rid of parasites that can make them sick. So, go ahead and create that perfect dust bath for your feathered friends!

Huge shoutout to Tara Dodrill for her amazing insights. Make sure…

ICE’s Privacy Impact Assessment on Surveillance Technologies is an Exercise in Disregarding Reality  

A recent Privacy Impact Assessment (PIA) published by the DHS in 2022 details ICE Homeland Security and Investigations’ use of several categories of surveillance technologies. The PIA outlines ICE’s narrow conception of a “reasonable expectation of privacy” that allows the agency to conduct broad surveillance without judicial oversight. Although the PIA describes a warrant requirement for certain surveillance activities, the assessment fails to address ICE’s ability to purchase the same data without a warrant from commercial entities. Additionally, the PIA ignores the deceptive tactics ICE has used to obtain consent for certain surveillance activities covered by this PIA. The shortcomings of the PIA are exacerbated by ICE’s history of abuse of its authority and the broad surveillance dragnet the agency has created, which leaves little doubt that ICE will not abide by the minimal requirements described in the PIA and guarantees that ICE will bypass warrant requirements by obtaining surveillance data from commercial entities.

Homeland Security Investigations

Homeland Security and Investigations (HSI) is a directorate under ICE and is the principal investigative component of the DHS. HSI has the “legal authority” to investigate, disrupt, and dismantle transnational crime. HSI’s legal mandate has come with a track record of questionable use of its authority.

HSI’s Abuse of Its Authority

 Just this year, a review by the DHS Office of Inspector General determined that ICE HSI did not obtain necessary warrants when using cell-site simulators, violating both departmental and federal privacy requirements in the process. HSI’s practice of using administrative subpoenas to collect sweeping financial records from Western Union in several states since 2019 was exposed just last year. Senator Ron Wyden’s response to this issue pointed out the questionable authority and interpretations that HSI used to access these records, circumventing approval from the DHS Office of the General Council and Office for Civil Rights and Civil Liberties on several occasions to access bulk personal information.

From 2017 to mid-August 2022, HSI issued more than 170,000 custom summons for data, all without judicial oversight. Among these summonses, HSI sought records from a youth soccer league in Texas, surveillance footage from a major abortion provider in Illinois, state university health records services, student elementary school records in Georgia, and data from a Lutheran humanitarian aid organization supporting refugees. These summonses have also been used to target journalists. Despite the fact that HSI is required to tailor its subpoenas to current investigations only, HSI’s practices reveal that these powers have been used indiscriminately to amass bulk domestic surveillance databases. HSI uses its authority beyond its own stated mission.

Despite HSI and Enforcement and Removal Operations (ERO) being completely separate components of DHS, HSI uses its authority to conduct criminal investigations as a pretext for conducting deportations and family separation operations that ordinarily fall within ERO’s mandate. HSI has often enlisted its staff to aid in CBP and ERO deportation operations. This sort of cross-pollination leaves HSI’s expansive investigative powers accessible for use cases they were not intended to serve. HSI’s abuse of its authority is exacerbated by its ability to access…

Go squirrel hunting to learn wilderness survival skills – Survival Common Sense Blog

How do you learn the basic survival skills of marksmanship, stalking, concealment and skinning and processing game animals?

Take up squirrel hunting.

by Leon Pantenburg

Many people don’t know how to get started hunting. But they may be thinking it’s time to learn.

There could be a variety of reasons – to supplement your diet, to harvest clean, organic, non-GMO meat, to practice wilderness survival skills to get outdoors more etc. The reasons are as varied as the participants. (A good point-of-view comes from Lily Raff McCaulou, a city woman who took up hunting when she moved to rural Oregon. Her book “Call of the Mild” is a reasoned look at hunting.)

This .40 caliber flintlock rifle is similar to those made about 1800 in Pennsylvania.

This .40 caliber flintlock rifle is my favorite squirrel gun

But there are added benefits. You can learn survival skills that might come in really handy if  The Shinola Hits the Fan.

Start by taking a hunter safety class, and learning firearms safety.

Then take up squirrel hunting.

Squirrels are the second-most harvested small game in the US, after rabbits. They are in virtually every state, and most places have liberal limits.

A 10-year-old kid with a .410, an old guy with his equally ancient Winchester 97 or the modern longhunter with a flintlock can all be successful and get a lot of enjoyment out of the same activity.

Here are some of the survival skills that go along with squirrel hunting.

Marksmanship: The average adult tree squirrel will weight about one pound. The target size is small. They move quickly, and are masters of concealment. If one spots you, you probably won’t get a shot.

Using a shotgun doesn’t guarantee success. A squirrel running through the trees tops, offering only fleeting glimpses of its bushy tail is a challenging target.

A rifleman has  more challenge. If you restrict yourself to heads shots only, your target is the size of a walnut. If you can consistently make a head shot, at a range of between 10 to 30 yards, you’ll have no problem taking a deer at similar ranges.

If you want to get really good with your centerfire rifle, work up some reduced loads and hunt small game with it. (Just about every reloading manual has some suggested low velocity loadings. DO NOT make up your own!)

Up the ante and go hunting with a blackpowder rifle. The epitome of squirrel hunting challenge, to me, is using a flintlock rifle, like the colonial frontiersmen.

Talk about trophy hunting –  your success rate will probably go down. But when you do drop one, there is a real feeling of accomplishment.

I gave up bowhunting squirrels after a couple of unsuccessful tries. Not only could I not hit one, but I also usually lost the arrow. If you’re a hardcore bowhunter, though, use small game blunts…

Continue reading here

16 Ways to Purify Water Off The Grid

Water is a fundamental necessity for life. However, just because water appears clean doesn’t mean it’s safe to consume. The World Health Organization has highlighted that millions succumb to diseases from contaminated water annually. Especially when living off the grid or homesteading, access to public drinking water might be limited, emphasizing the importance of purifying your water. Here are 16 methods to ensure your water is safe for consumption when living off-grid.

Boiling Water

One of the most reliable methods to eliminate viruses, bacteria, and parasites from water is boiling. Bringing water to a full, rolling boil for a minimum of one minute is essential (three minutes for higher altitudes). However, it’s crucial to note that boiling won’t remove chemicals or particles, but it effectively kills harmful microorganisms.

Disinfection

Disinfection is another method to make water potable. Common disinfectants include household bleach, iodine, and water purification tablets. The EPA provides guidelines for disinfecting with bleach. It’s essential to maintain the correct bleach-to-water ratio to ensure safety.

  • Use eight drops of 6% bleach or six drops of 8.25% bleach per gallon of water.
  • If the water is cloudy or cold, double the bleach amount.
  • Stir and let it stand for 30 minutes.
  • If there’s a strong chlorine smell, transfer the water to another container and let it stand for a few hours.

Water Filtration

Water filters vary in their capabilities and types. They range from countertop filters to portable and whole-house filters. It’s essential to understand your filter type and ensure it’s suitable for your water source. Notably, water purification filters differ from standard water filters, which might only enhance taste but not purify the water.

Lifestraw Water Filters

Lifestraw offers a range of water filters tailored to filter various contaminants. They have single-person straw filters and larger, gravity-fed filters suitable for homesteads or camps. However, these systems rely on filters with limited lifespans, so monitoring usage and expiration is crucial.

Berkey Water Filters

Many homesteaders trust Big Berkey water filters for clean, safe drinking water. These systems, though a bit pricey, are highly effective, eliminating almost all contaminants. However, acquiring replacement filters off-grid might be challenging.

Distillation

Distillation involves boiling water to produce steam, which is then condensed back into water. This method removes nearly all impurities, but the resultant water might taste bland due to mineral removal. Distillation can be achieved using devices like an Instapot or a traditional pressure canner. There are also countertop distillation pots available for those with access to electricity.

Solar Still

A solar still utilizes the sun’s energy to produce pure water. It’s an excellent choice for off-grid living as it doesn’t require electricity. However, its efficiency might be compromised in cold or cloudy conditions. There are various DIY methods to build a solar still, including using a hole in the ground covered with a plastic sheet.

Ultraviolet Light Purification

Ultraviolet light can effectively disinfect water. Devices like the SteriPen are popular for purifying individual water bottles. However, larger UV purification systems for homes need electricity. Portable units, on the other hand, might operate on batteries.

Solar…

The CFPB Moves Ahead with FCRA Rulemaking to Rein in Data Brokers

The Consumer Financial Protection Bureau took a major step last week toward establishing stronger guardrails for data brokers and better protections for consumers. On September 21, the CFPB released a document outlining proposals and alternatives under consideration for the Bureau’s upcoming Fair Credit Reporting Act (FCRA) Rulemaking. The FCRA regulates the consumer reporting market by permitting certain specified uses of consumer reporting data and prohibiting others, imposing accuracy requirements onto credit reporting agencies, and providing consumers a right to dispute inaccurate or incomplete information in their credit reporting files. The CFPB has the authority to issue rules under the FCRA and shares enforcement power with the Federal Trade Commission.

If the rules the CFPB is considering come to fruition, consumers will be better protected from the harmful practices of the data broker industry. Data brokers use the millions of data points they collect about American consumers to predict and influence consumer behavior, combining the personal data they collect with other datasets, mining that data for insights (often using AI tools), and selling personal data to third parties. In EPIC’s recent comments and coalition letter to the CFPB, we emphasized the widespread harm caused by data brokers. Because of the types and volume of personal information they collect, data brokers have a deeply invasive reach into the lives of American consumers.

In addition to the privacy harms caused by industry practices, data brokers also inflict economic and broader social harms. For example, consumers may suffer privacy, economic, and reputational harms, as well as severe anxiety, when their data collected by a broker is subject to a security breach. Further, considering certain kinds of data when making determinations related to a person’s eligibility for credit, employment, or housing can exacerbate existing inequalities and perpetuate racial bias.

Even as data brokers profit off the intimate details of consumers’ lives, consumers generally lack the ability to know how their information is being collected, used, and shared, while the brokers themselves operate largely with impunity. The data broker industry has exploded as technology has advanced, and it is time for regulators to catch up to protect consumers from harm. The CFPB’s FCRA rulemaking offers the Bureau an opportunity to do that.

In EPIC’s comments to the CFPB in July 2023, we urged the CFPB to presumptively recognize all data brokers as consumer reporting agencies (CRAs) unless data brokers demonstrate that they undertake reasonable measures to prevent the data they collect and sell from being used for any of the enumerated purposes under the FCRA. Data brokers’ business models are built on the mass collection, transfer, and combination of consumer data. It is important to ensure that consumer reports are not combined with other datasets and then used for purposes that harm consumers. Presumptively subjecting all data brokers to the FCRA would mitigate these harms and go a long way towards reining in the data broker industry.

Proposals and Alternatives Under Consideration by the CFPB

Acknowledging the rapid…

How To Make Sun-Dried Tomatoes With a Dehydrator: A Comprehensive Guide

Introduction

Ah, the joy of harvesting tomatoes from your garden each summer! Whether you’re a fan of the cherry variety like me or prefer the robust Romas, there’s something incredibly satisfying about plucking these red jewels. But what to do when you have a surplus? Sure, you can use them in salads, sauces, and even freeze them for later. But have you ever considered making your own sun-dried tomatoes? Don’t worry; you don’t actually need the sun for this. A dehydrator will do just fine, and it’s quicker and simpler!

Why Sun-Dried Tomatoes?

Sun-dried tomatoes are not just a fad; they’re a culinary delight that has stood the test of time. Their concentrated flavor can elevate any dish, from pasta and stews to sandwiches and omelets. They’re incredibly versatile and can be used in a myriad of ways:

  • In Pasta: Try them in our Sicilian pasta salad or mixed in our chicken and asparagus pasta with pesto.
  • In Breakfast: Add them to your omelets or scrambled eggs.
  • As a Snack: Yes, they’re delicious straight from the container!
  • In Sauces: Rehydrate them in boiling water and puree to make different types of sauces.

Choosing the Right Tomatoes

For drying purposes, Romas are usually the go-to choice. However, you’re not limited to just one type. Here are some other options:

  • Beefsteak: These are large and juicy, excellent for those who prefer a meatier texture.
  • Cherry: These tiny tomatoes are sweet and perfect for snacking.

Remember, always opt for the firmest tomatoes. Mushy ones will not yield the best results.

Step-by-Step Instructions

Prepping the Tomatoes

  1. Wash the tomatoes thoroughly to remove any dirt or pesticides.
  2. Remove the stems and any blemished skin.
  3. Cut into ¼-inch slices or in half. Thicker slices will take longer to dry out.

Seasoning (Optional)

At this point, you can sprinkle them with herbs for added flavor. Some popular choices are:

  • Oregano
  • Basil
  • Thyme
  • Garlic powder

Drying Process

  1. Arrange the slices on the dehydrator trays.
  2. Set the dehydrator to 150°F.
  3. Dry them out for about 10 hours maximum, checking every hour or so after the first 4 hours. They should take on a leathery texture.

Storage

Place your dried tomatoes in an air-tight container, and store them in the refrigerator or freezer. They should last for 6 months to a year with proper storage.

No Dehydrator? No Problem!

If you don’t own a dehydrator, you can also dry your tomatoes in a 150°F oven. Follow the same preparation steps and place the slices on baking sheets. It will take a few hours for them to achieve the desired leathery texture.

Additional Tips