Review: Purely Alpaca Outdoor Adventure Socks, by Thomas Christianson

Purely Alpaca Outdoor Adventure Socks are made with a warm, comfortable, moisture-wicking, odor-resistent blend of alpaca, microfiber, nylon, and lycra. They are machine washable and tumble dryable.

They are priced at $25.95 a pair at the time of this writing from purelyalpaca.com. You may want to think about trying a pair.

The Backstory

My buddy from high school and I have been through a lot together. I was with him when he broke his arm. He was with me when I ricocheted an arrow off a snowman and into the side of my parent’s above-ground swimming pool. I was the best man at his wedding. He was the best man at my wedding. He had a daughter on my birthday. I had a daughter on his birthday. We have quite a bit of shared experience.

A few years ago, my friend began telling me about his wonderful alpaca socks. He said that they were so breathable that he could wear them summer or winter, that they were so odor-resistant that he could wear them a week at a time without laundering, and that they were by far the most comfortable socks that he had ever owned.

I was intrigued, because I love a good pair of socks. I began keeping my eyes open for an opportunity to give a pair of alpaca socks a try.

Recently, I ran across purelyalpaca.com online. Their outdoor adventure socks looked very interesting. So I sent them a message, asking if I could try out a pair. They were kind enough to agree. About a week later, a package arrived in the mail.

Opening the Package

The socks arrived in a USPS First Class Package. The return address was Purely Alpaca, 1444 Main St. #308, Ramona, CA 92065.

The labeling on the socks indicated that they are made in the USA. It also stated, “Alpaca is an excellent choice for warm docks due to its strength and hollow insulating core. These socks are made with a terry inner design for added warmth and comfort.” The wholesaler was identified as Choice Alpaca Footwear, PO Box 8598, La Jolla, CA 92038.

First Impressions

The outside of the socks felt very smooth and soft, and the terry design on the inside was quite cushiony. I pulled the socks on. They were very soft, warm, and breathable. I had the impression that they would make an excellent pair of slippers.

At first, I thought they might be a little thick for everyday wear. But as I wore them every day for a week, I found them to be extremely comfortable under a variety of shoes and boots during a variety of weather conditions. They remained odor-free throughout a full week of wear, washed up nicely in the laundry, and were soon ready for another week of wear.

 

 

 

When I put them on for a second week of wear, I was again impressed by how comfortable they are.

I…

Continue reading

The Ultimate Guide to Soap Making: A Comprehensive Summary

Soap making is an ancient craft that has evolved into a fascinating modern-day art form. The original blog post by Practical Self Reliance is an invaluable resource for anyone who wants to venture into the world of soap making. It’s a comprehensive guide that covers everything from the very basics to advanced techniques, ensuring you’re well-equipped to create your own soap masterpieces.

Why Make Soap at Home?

  • Self-Sufficiency: Making your own soap is a step towards a more self-reliant lifestyle. It’s empowering to create something so essential from scratch.
  • Customization: The beauty of homemade soap is the freedom to customize. You can choose the oils, scents, and even the colors that suit your skin type or aesthetic preferences.
  • Quality Control: When you make your own soap, you have complete control over the ingredients. This ensures that your soap is free from harmful chemicals and preservatives commonly found in commercial soaps.

The Basics: Ingredients and Tools

  • Ingredients: The primary ingredients are oils (such as olive, coconut, and palm), lye, and water. Each oil brings its own unique properties to the soap, affecting hardness, lather quality, and moisturizing ability.
  • Tools: Essential tools include scales for precise measurements, thermometers to check the temperature of your oils and lye water, mixing bowls, and molds to shape your soap.

The Soap Making Process

  1. Safety First: Safety is paramount. Always wear protective gloves and goggles to protect yourself from the caustic nature of lye.
  2. Measuring: Precision is key. Accurately measure all your ingredients to ensure the correct chemical reaction between the lye and oils.
  3. Mixing Lye and Water: This is a crucial step. Always add lye to water, never the other way around, to prevent a dangerous reaction.
  4. Combining Ingredients: Once your lye water and oils have reached the desired temperatures, it’s time to mix them together. This is the stage where the magic happens!
  5. Adding Extras: This is where you can get creative. Add colors, essential oils, or even small items like flower petals or oatmeal for exfoliation.
  6. Molding and Curing: After mixing, the soap is poured into molds. It needs to cure for several weeks to complete the saponification process.

Advanced Techniques

  • Hot Process Soap Making: This method speeds up the curing time but requires constant attention to prevent the soap from burning.
  • Melt and Pour: This is a fantastic option for beginners who aren’t comfortable handling lye. It involves melting a soap base and adding your choice of colors and fragrances.
  • Adding Natural Fragrances and Colors: If you’re looking for a more natural approach, essential oils and natural clays can be used to add fragrance and color to your soap.

Tips for Success

  • Soap Calculator: Before you start, it’s a good idea to double-check your recipe with a soap calculator. This ensures that the ratio of lye to oils is correct, making your soap safe for skin.
  • pH Testing: It’s crucial to test the pH of your finished soap to ensure it’s skin-safe. A pH between 7-10 is generally considered safe for skin.
  • Oil Experimentation: Don’t be afraid to experiment with different oils. Each oil brings its own unique properties to…

Senate Confirms Anna Gomez to FCC

The U.S. Senate confirmed Anna Gomez to the Federal Communications Commission on Thursday. The FCC has been without a full Commission for an unprecedented two-and-a-half years as President Biden’s initial nomination of attorney and consumer advocate Gigi Sohn stalled in the Senate over groundless attacks on Sohn’s record. Anna Gomez has served in the State Department’s Cyberspace and Digital Policy Bureau, NTIA, the FCC, and Sprint Nextel. EPIC’s Executive Director, Alan Butler, noted when Anna Gomez was nominated in May of this year that she would bring “decades of telecom experience to an FCC that needs to quickly and dramatically ramp up its response to threats to Americans’ privacy and data security, especially as they relate to location data. EPIC is optimistic that a full Commission will be in a much better position to protect Americans from these harms.”

5 Tasty Sweet Potato Tots Recipes Perfect For Snack Time

5 Tasty Sweet Potato Tots Recipes Perfect For Snack Time tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

EPIC, Coalition Statement Following Meeting with DNI Haines, Senior Intelligence Community Officials

Over a dozen privacy, civil rights, and civil liberties groups from across the political spectrum met yesterday with Director of National Intelligence (DNI) Avril Haines and other high ranking intelligence community officials to discuss Section 702 of the Foreign Intelligence Surveillance Act (FISA 702), and connected surveillance issues such as data purchases and surveillance pursuant to Executive Order 12333.

Following the meeting, the undersigned attendees (full list below) issued the following statement:

“We appreciate DNI Haines taking time to hear our serious concerns with warrantless FISA 702 surveillance, but remain deeply distressed that the intelligence community will not commit to any of the meaningful reforms that are critical to protect Americans’ privacy. 

“After years of misuse such as deliberately seeking out private messages of activists on the left and right, a batch of 19,000 campaign donors, and lawmakers, it’s clear that FISA 702 and related surveillance powers need serious change. The administration and intelligence community must be willing to come to the table and accept significant new privacy protections that advocates, Congress, and the American people are calling for. There simply isn’t a path to reauthorization built on half-measures, window dressing, and codification of internal procedures that have repeatedly failed to protect Americans’ civil rights and civil liberties.”

As detailed in a letter provided to DNI Haines in advance of the meeting, participants view reauthorization of FISA 702 as dependent on a range of meaningful reforms, including:

  • Requiring the government to obtain a warrant before searching the content of Americans’ communications collected under intelligence authorities;
  • Establishing legislative safeguards for surveillance affecting Americans that is conducted under Executive Order 12333;
  • Closing the data broker loophole, through which intelligence and law enforcement agencies purchase Americans’ sensitive location, internet, and other data without any legal process;
  • Bolstering judicial review in FISA-related proceedings, including by shoring up the government’s obligation to give notice when information derived from FISA is used against a person accused of a crime; and
  • Codifying reasonable limits on the scope of intelligence surveillance.

Statement above attributable to the following organizations:

  • Americans For Prosperity
  • Brennan Center for Justice at NYU School of Law
  • Center for Democracy & Technology
  • Demand Progress
  • Due Process Institute
  • Electronic Information Privacy Center (EPIC)
  • FreedomWorks
  • National Association of Criminal Defense Lawyers
  • Project for Privacy and Surveillance Accountability
  • Project on Government Oversight
  • Restore the Fourth

A Local Disaster Network, by J.M.. The basic NextCloud cloud server.

(Continued from Part 4. This concludes the article.)

Cloud Dancing

Next, we’ll set up the Nextcloud application. Assuming your laptop and Raspberry Pi are still connected to your GL.iNet router and it has Internet access, open up a web browser on your laptop and enter the following address: ‘http://nextcloud.local’ – depending on your operating system and browser you may get a warning that says the connection isn’t private – just click to proceed anyway (or click on ‘Advanced’ and then ‘Proceed’). The first screen that will pop up is the following:

Figure 16: Nextcloud Activation

 

 

 

 

 

You’ll notice that there are two very very very long passwords displayed – the first one is for accessing the Nextcloud maintenance functions (http://nextcloud.local:4443) and the second one is for the default Nextcloud general user account ‘ncp’ (http://nextcloud.local). We’ll change these later on, but it’s absolutely critical that you save them somewhere like in a text file on your laptop for now. If you don’t and can’t remember them you’ll need to go back and re-image the microSD card from scratch.

Once you’ve saved the two passwords, click ‘Activate’ at the bottom. Once it’s done activating you will be automatically redirected to the Nextcloud maintenance interface and a login window will pop up that looks like this:

Figure 17: Nextcloud First Login

 

 

 

 

 

The username is ‘ncp’ and the password is that top really long Nextcloud maintenance password you saved from the previous screen. Enter those and click on ‘Sign In’. A configuration ‘First Run’ window will pop up – click on ‘skip’ since we’re not going to be doing any advanced set up at this time. You’ll next see the maintenance interface which looks like this:

Figure 17: Nextcloud Maintenance Interface

 

 

 

The first thing we’re going to do here is change that really long maintenance password – on the left side, scroll down until you see a function named ‘nc-passwd’ in the ‘Config’ section; click on nc-passwd and you’ll be prompted to enter a new maintenance password in the right frame. Enter and confirm a new password and click ‘Apply’. This replaces that first really long password you save from the activation screen, so write it down or save it somewhere as your ‘Nextcloud Maintenance Password’.

Next, scroll down on the left side and find ‘nc-httpsonly’ in the ‘Config’ section and click on it. On the right frame, uncheck the box labeled ‘Activate’ and click ‘Apply’. This is less secure, but since we’re not going to be permanently connecting this to the Internet it’ll will save a bunch of warning messages later on.

Next click on the small icon on the top right that looks like a circle with two smaller circles on each side – when you hover over it with your mouse pointer it’ll say ‘Launch Nextcloud’. That will…

Continue reading

40 Uses for Wood Ash: Practical Home & Garden Tips

Have you ever wondered about the countless uses for hardwood ashes, especially fireplace ashes and woodstove ashes? They can be used as an effective fire starter. This versatile substance, fireplace ashes, left behind after burning wood in a woodstove, has been utilized for centuries and continues to offer practical applications in various aspects of our lives. Hardwood ashes are known for their powdery texture. From cleaning to gardening, there are numerous ways to make use of wood ashes, a natural resource that works wonders for our food supply and crops due to its valuable nutrients.

Wood ash, often overlooked as mere residue, holds immense potential. Charcoal, potash, acorns, and ashes are all valuable components found in wood ash. Charcoal, potash, acorns, and ashes are all valuable components found in wood ash. Potash, derived from wood ashes, is a good addition to soil, enriching it with essential minerals that can enhance plant growth and yield. Its nutrient-rich composition makes it valuable for the overall health of plants. Baking soda, wood ash works, and potash can help neutralize acidic soils, creating a more favorable environment for a wide range of plants.

But the benefits of wood ash, charcoal and potash extend beyond the garden. Baking soda, charcoal, potash, and wood ashes are excellent natural cleaners for surfaces like glass or porcelain due to their abrasive nature. It can also be used as an ingredient in homemade soaps or detergents, utilizing potash, wood ashes, charcoal, and soda. Furthermore, wood ash, also known as potash, can act as a deterrent against pests such as slugs or snails when sprinkled around vulnerable areas. Additionally, the use of charcoal and acorn ashes can have similar effects.

Intrigued by the possibilities? In the following sections, we’ll explore some creative and practical ways to incorporate wood ashes, charcoal, potash, and baking into your daily life. Discover how wood ashes, charcoal, and potash can have a significant impact on your cleaning routine, gardening endeavors, and more. Find out the best way to utilize this humble byproduct.

Cleaning and Repelling with Wood Ash

Using Wood Ash as an Abrasive Cleaner

Wood ashes, also known as potash, are a great way to utilize the remnants of a fire. They can be effectively used in different cleaning tasks. One of the remarkable properties of potash is its ability to act as an abrasive cleaner, particularly for tough stains on surfaces like metal or porcelain. Wood ashes can also be used as an effective abrasive cleaner for difficult stains on various surfaces. When mixed with water or combined with soap, wood ashes form a gritty paste that can effectively scrub away grime and dirt.

Imagine you have a stubborn stain on your favorite stainless steel pot that just won’t budge. Have you tried using wood ashes? Have you tried using wood ashes? Instead of reaching for harsh chemical cleaners, consider using wood ashes as a natural alternative. To remove stains, simply sprinkle some clean wood ashes onto the stained area and gently scrub it using a damp…

Draft California Risk Assessment Regulations Are a Promising Start

By: Ben Winters, Senior Counsel

Earlier this year, EPIC, the Center for Digital Democracy, and the Consumer Federation of America submitted comments to the California Privacy Protection Agency (CPPA) to recommend strong regulations implementing key provisions of the California Consumer Privacy Act. The comments include proposals on cybersecurity audits, risk assessments, and automated decision-making systems and urge the agency to protect Californians by drawing on strong existing frameworks and ensuring that consumers’ rights to opt out and receive information are easy to exercise.

EPIC also provided extensive input on CCPA regulations in November 2021May 2022August 2022, and November 2022, arguing for consumer-friendly interpretations of the CCPA to guard against exploitative commercial data practices. 

Last week, the CPPA published draft regulatory text implementing the cybersecurity audits and risk assessment sections of the CCPA. This blog highlights and evaluates the draft risk assessment provisions. It’s important to remember this is an early draft, and also that the agency is limited to creating regulations pursuant to the drafted text. (Occasional inline commentary by EPIC in parentheses.)

When do risk assessments have to be submitted? When processing of information presents significant risk to consumers’ privacy. The agency is proposing that be any one of the 7 following circumstances:

  • “Selling or sharing personal information” (which means many businesses may have to complete these risk assessments);
  • Processing sensitive personal info (information for normal employment purposes like payroll, health insurance, and wage reporting are excluded);
  • Using Automated Decisionmaking Technology in furtherance of a sensitive decision (i.e, one “that results in the provision or denial of financial or lending services, housing, insurance, education enrollment or opportunity, criminal justice, employment, healthcare, or access to to essential goods/services”);
  • Processing personal information from people that the business knows are younger than 16;
  • Processing in ways that constitute workplace or school surveillance (e.g., recording, speech/face detection, location trackers, keystroke loggers, and productivity monitors);
  • Processing personal information of consumers in publicly accessible places using technology to monitor behavior, location, movements or actions (places that serve or are open to the public);
  • Processing to train AI or ADT (particularly relevant to Generative AI)

What are risk assessments comprised of? Risk assessments are instruments of accountability—and the required process should reflect that. As EPIC wrote to the CPPA in March 2023, “When implemented properly, risk assessments force institutions to carefully evaluate the full spectrum of privacy and data-driven risks of a contemplated processing activity, to identify and implement measures to mitigate those risks, and to determine whether the processing activity can be justified considering any risks that cannot be fully mitigated. A risk assessment can also provide regulators and the public with vital information about processing activities that may pose a threat to privacy and civil rights. A risk assessment should not be a simple box-checking exercise or a static, one-off undertaking.” The CPPA’s draft reflects this perspective, requiring a whole-of-organization approach to completing risk assessments and a wide breadth of required considerations and disclosures.

The regulations call for a disclosure of the following to the agency:

  • A short summary…

Step-by-Step Guide to Making Vegetable Rennet for Homemade Cheese

Step-by-Step Guide to Making Vegetable Rennet for Homemade Cheese tallest) { tallest = thisHeight; } }); group.height(tallest); } equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); $(window).resize(function() { equalHeight($(“.dg-grid-shortcode .dg_grid-shortcode-col”)); }); }); ]]> Sorry, this product is unavailable. Please choose a different combination. ]]>

20 Things You Should Start Hoarding

Print Friendly, PDF & Email

On 9/8, move here: https://urbansurvivalsite.com/things-you-should-be-hoarding-and-why/

Estimated reading time: 7 minutes

20 Things You Should Start Hoarding

Nearly everyone has a drawer, closet, or room filled with…well, stuff. The word ‘hoarding’ generally evokes terrifying images of a house overflowing with useless junk – newspapers from the past thirty years, every can or bottle the hoarder has ever drunk from, and a seemingly endless supply of containers, wires, screws, and other things lying all over the place.

But it’s not always a bad thing: Take a guess at how many of those things we just listed can be useful. It’s time to sort out the junk drawer. Here’s what you should be hoarding and why…

Want to save this post for later? Click Here to Pin It On Pinterest!

1. Packing Crates

Online orders often come in large wooden packing crates, and these are surprisingly sturdy. (If not, they can be sourced from local stores that receive their stock on wooden pallets or in crates.)

If you can get hold of a couple of these, they can be used to store almost anything – with a little finishing it’ll hold up well, even against the weather. Take them apart and, with a little DIY handiwork, you can transform it into something entirely new.

2. Newspapers and Magazines

Newspapers and magazines are often tossed away, but they make great kindling when you’re starting a fire. Newspapers are also (for the most part) sterile, which is why traditional fish-and-chips are served wrapped in newspaper.

Newspapers can also be used to transport or store breakables. (And, well, have you ever run out of toilet paper? Better old news than poison ivy.)

3. Potash

Potash is easily discarded, but can and should be saved up after a fire. It’s one component of homemade soap (the others being fat and water; there is a great recipe for this in the FM 21-76 US Army Survival Manual) and potash mixed into soil does wonders for the soil’s mineral content: Want to revitalize soil for the next harvest? Potash.

4. Empty Tins

Empty tins are always useful to store things in. Keep your empty tins because, whether it’s a coffee tin or a small Altoid tin, you’re bound to find a use for it at some point. You can also turn empty tins into everything from a lantern to a small, improvised stove: They’re way too useful to dispose of.

5. Soda Cans

You can turn an empty soda can into a myriad of things. Just a couple examples off of YouTube include a Wi-Fi booster, a popcorn maker, a soda can stove, a torch, and a camping water heater. Hell, you can even make chains from the tabs, thanks to this ingenious video from Grant Thompson – thanks!

6. Polystyrene

Polystyrene is not biodegradable and has a massive environmental impact, so don’t just throw it away.

When left to soak in gasoline, polystyrene…

Continue reading