If you can’t contact your loved ones, or government agencies and relief organizations can’t coordinate, you can’t get anything done. […] A communications system is only useful if you can connect to every other endpoint on the network. If you have power but no one else does, you have a well powered and expensive paperweight (assuming you still have paper). To that point, if your phone has power but the switching station does not, or the cell towers in half the city are down, you still aren’t able to communicate with anyone else.
A secret process that requires neither “concrete facts” nor “irrefutable evidence” … “Instead of a watchlist limited to actual, known terrorists, the government has built a vast system based on the unproven and flawed premise that it can predict if a person will commit a terrorist act in the future,” says Hina Shamsi, the head of the ACLU’s National Security Project. “On that dangerous theory, the government is secretly blacklisting people as suspected terrorists and giving them the impossible task of proving themselves innocent of a threat they haven’t carried out.
Yesterday, virtualenv-burrito 2.7 was released. There are two significant changes:
After 14 years, it’s time for a new GPG key adhering to modern standards. You can find my transition statement here. The full-text follows.
x.pose is a wearable data-driven sculpture that exposes a person’s skin as a real-time reflection of the data that the wearer is producing. —x.pose – xuedi.chen She decided to aggregate this data collected on her everyday, building a mobile app to do the job using Node.js and PhoneGap. X.pose is the result of those data points, which have been translated into an abstract geometric representation using 3D printing software Rhino.