SpoOoOoky Spirits

Please consider supporting my writing on Patreon.

It’s just not Halloween without spirits! Here are 13 essential cocktails for your spirited All Hallows Eve gathering:

Corpse Reviver:
This classic cocktail is sure to get even the most reluctant guests dancing to the Monster Mash!
1 oz. gin
1 oz. Cointreau (or Triple Sec)
1 oz. Lillet or Cocchi
1 oz. lemon juice
1 dash Absinthe or Herbsaint

Shake vigorously with ice, then strain into a cocktail glass or coupe. Garnish with a lemon twist.

Satan’s Whiskers:
Sweet as temptation, bitter as the realization that you’ve sold your soul.
1/2 oz gin
1/2 oz Dry Curacao*
1/2 oz sweet vermouth
1/2 oz dry vermouth
1/2 oz orange juice

Shake vigorously with ice, then strain into a cocktail glass or coupe. Garnish with an orange twist.
*For a sweeter version, Triple Sec may be substituted for Dry Curacao.

Black Widow:
This intoxicating brew is deadly delicious.
2 oz. Irish whiskey
1 oz.  Chambord
12 oz. Guinness

Combine whiskey and Kahlua in a chilled pint glass, then add Guinness.

Heart of Darkness:
This potent blend will make your heart feel like it’s about to jump out of your chest!
2 oz. Fernet Branca
8 oz. hot coffee

Pour Fernet into coffee, enjoy while hot.

Persephone’s Kiss:
A single sip of this will bind you to the underworld forever; I promise you won’t mind.
2 oz. rum
2 oz. pomegranate liqueur*
1 oz. lime
2 dashes orange bitters

Shake with ice, serve on the rocks. Garnish with 6 pomegranate seeds.
*If no pomegranate liqueur, you may substitute 1 oz. grenadine and 1 oz. Triple Sec.

Fire and Brimstone:
Hot and smoky: drink and repent!
2 oz. mezcal
1 oz. ginger liqueur
1 oz. pineapple
1 oz. lime
Habanero bitters to taste*

Shake with ice, serve on the rocks. Garnish with a lime twist and/or fresh ginger.
*Add AT LEAST enough bitters that you can feel the burn!

Zombie:
A classic Tiki drink, this cocktail’s name speaks for itself.
1 1/2 oz. gold rum
1 oz. dark rum
1/2 oz. white rum
1/2 oz. 151-proof rum
1 oz. lime juice
1 oz. pineapple juice
1/2 oz. coconut creme

Shake all ingredients *EXCEPT* 151 with ice, and strain into a glass of crushed ice. Float 151 on top (ignite if you so choose.)

Fright Night:
The only thing more terrifying than this cocktail is the hangover you’ll be facing in the morning.
2 oz vodka
1 oz. Blue Curacao
1 oz. Midori
1 oz. Luxardo Maraschino liqueur
1 oz. lime juice

Shake all ingredients with ice, strain, and serve over the rocks. Garnish with two maraschino cherries.

Homicide:
Serve and drink at your own risk; just don’t name me as an accomplice.
1 oz. gin
1 oz. Fernet Branca
1 oz. Kahlua
1/4 oz. Chambord

Pour all ingredients into a glass of ice and stir together. Strain into a cocktail glass or coupe. Garnish with an orange twist.

Miasma:
It’s a swirling, toxic cloud… in a glass!
3 oz. Viniq
3 oz sparkling wine

Shake Viniq, then pour into a champagne flute. Top with sparkling wine. Regret forever.

Masque of the Red Death:
A concoction of little substance and remarkable potency.
1 oz. gin
1 oz. Campari
1 oz. Sweet Vermouth
3 oz. sparkling wine

Combine gin, Campari, and vermouth in a champagne flute. Add sparkling wine and garnish with a maraschino cherry.

Jack O’Lantern:
Honestly, your best bet is just to set it on fire and never look back.
2 oz. Jack Daniels
1/2 oz. sweet vermouth
1/2 oz. pumpkin spice syrup or liqueur
2 dashes Angostura bitters

Stir with ice, strain into a cocktail glass or coupe. Garnish with a maraschino cherry.

Poltergeist:
This drink is likely to haunt you long after you kill it.
2 oz. tequila
1/2 oz. ginger liqueur
1/2 oz. grenadine
1 oz. grapefruit juice

Shake with ice, then strain into a cocktail glass or coupe.

Checklist for Organizing an Inclusive Event

Please consider supporting my writing on Patreon.

Organizing is hard. Inclusivity can be difficult. Here is a live document intended to help organizers cover all the bases, so that no one is made to feel like they are unimportant or an afterthought.

  • Will there be childcare? Regardless of whether there will or will not be, this question should be answered in all event announcements, so parents can make informed decisions.
  • Is this space accessible? This question should be answered in all event announcements, regardless of the level of accessibility of the event. Some things to keep in mind include accessibility for people in wheelchairs, people who walk but have other physical disabilities, accessibility for those with sensitivity to scents or allergies, accommodations for people who are hard of hearing or deaf, content that may be triggering to those suffering from PTSD, proximity to public transportation, 
  • Is the makeup of the group of presenters diverse? This is NOT a suggestion that you include a solitary cisgender white woman, and say you’ve got a “diverse panel.” Your speakers should mirror the groups you are intending to speak TO. If you want your group to feel inclusive to people of color, and white people who are not cisgender men, you should not just be inviting them to attend, you should also be asking them to speak. Keep a public list of speakers, and update it as you add more, so that people can make an informed decision about whether your event really speaks to them.
  • Is there a fee associated? All event announcements should include this information. Additionally, if you are interested in maximum inclusivity but must charge for your event, a sliding scale and/or inclusion of the phrase “no one turned away for lack of funds” can be a huge step.

This is by no means an exhaustive list. These are all questions that should be answered publicly when your event is announced, rather than questions you should scramble to respond to when someone brings them up. Regardless of your resources as an organizer, or capacity to actually fix accessibility issues like those mentioned above, simply addressing them up front can make a huge difference between making people feel like they were considered in the organizing stages of your event, or making them feel like an inconvenient afterthought.

Your Threat Model is Not My Threat Model

Please consider supporting my writing on Patreon.

While this is something I’ve thought about quite a bit, for quite a while, the abundance of attention my blog has gotten recently has made it apparent that this needs to be said:

Your threat model is not my threat model.

I know that with regards to privacy and security, the threat at the front of many minds is a certain three-letter agency whose dragnet surveillance was exposed publicly in 2013.

The Snowden revelations have changed mainstream public discourse around privacy and security, bringing these importance of these issues to light for many who have lead lives of safety and complacency. The problem is, for many of us, privacy and safety have been concerns for a very long time, and dragnet surveillance is the least of our worries.

I know many of you are worried about your communications being stored in a database, accessible to the state in the event that you ever become a person of interest, deserving of further scrutiny. I will not tell you that it is an invalid concern. I WILL tell you that there are other guides out there for you, your concern is not MY primary concern, and my writing (aside from this piece) will probably never center you.

Many others of you are concerned with corporations like Google and Facebook collecting data to sell to third parties for purposes of targeted advertising. Again, I will not tell you that your concerns are not valid concerns. Again, I am unlikely to center those concerns.

Still others of you are savvy enough to be interested in using technical tools to keep yourselves safe from spying, regardless of its source. There are many guides out there relevant to your interests. I believe in advocating the skills and tools that the least savvy among us can use, because I believe that being non-technical shouldn’t mean being insecure.

I will always center the non-technical. I will always center those facing real, physical threat from unsophisticated attackers; adversaries who have no resources but time and malice ARE an advanced persistent threat, they are worthy of being addressed, and those who need to defend against them are underserved by the security community.

If your threat model identifies your primary adversaries as Google and the NSA, I will not tell you you’re wrong, but I will say that you’re extremely lucky. I would trade my adversaries for yours in a heartbeat. That said, I am here to help those who face threats like stalking, like abusive exes, like overbearing parents who cannot accept who they are. I am here to protect those who have snooping employers and prying frenemies. I am here to prioritize the people for whom extensive privacy guides are not written, and for whom a lack of privacy will have a very real, very detrimental affect.

I’m here for the people like me, for the people whose threat model mirrors my own, and because we deserve to be safe.

Sex, Drugs, and Alcohol: In Defense of Ada Lovelace

Today is Ada Lovelace Day, a day when we celebrate women in science and mathematics fields, and congratulate them on their continued struggle against the sexist notion that women do not belong in those roles.

Ada Lovelace, a Victorian-era mathematician and writer, is credited with being the first-ever computer programmer, due to her work with Charles Babbage on his Analytical Engine. Modern society being what it is, we seem to be incapable of celebrating the achievements of a woman in STEM without calling into question her character, and dismissing her on the basis of what is perceived to have been socially-unacceptable behavior. Two hundred years after her birth, we are still hung up on the fact that Ada Lovelace was… unladylike.

Research into Ada’s past indicates that she drank alcohol, gambled to excess, and was addicted to drugs. In addition, she cursed profusely, and is believed to have committed adultery. These revelations call to question whether Ada Lovelace was, in fact, a role model for scientists and mathematicians everywhere.

Several people have voiced the opinion that in spite of her perceived flaws, Lovelace remains a role model. I contend that Ada is a role model in part BECAUSE of her failure to conform to societal norms. Ada is a perfect example of the fact that shortcomings and a lack of respectability do not need to be barriers to achieving greatness. She is proof that people should not be dismissed on the basis of addiction, proof that there is more to life than clinging to the concept of respectability.

In addition to her drinking, gambling, swearing, alleged adultery, and opium abuse, Ada Lovelace struggled with mental health issues for most of her tragically short life. In an age where we still struggle to accept neurodiversity, Lovelace also serves as a reminder of why we should not dismiss people simply because they do not think or behave the way society has mandated they should.

The legacy of Ada Lovelace is a perfect example of what we stand to lose if we continue to hold role models to impossible standards of respectability, if we diminish the achievements of women based on their failure to conform to an ideal of femininity. Ada Lovelace is an excellent role model, because she reminds us not only of what we can achieve, but also of the fact that we do not need to focus our energy on striving to fit into a societal mold of perfect womanhood. It is shameful to attempt to erase her accomplishments simply because she was unladylike. Instead, she deserves to be celebrated twofold: on the basis of her achievements in the field of mathematics, as well as on her refusal to conform to a patriarchal notion of who she ought to have been, and how she ought to behave.

Auto-defensa en Redes Sociales

Please consider supporting my writing on Patreon.

Con muchas gracias á @federicomena por la traducción!

Los acontecimientos recientes han suscitado una discusión sobre la necesidad de tener seguridad operacional al hacer uso de redes sociales. Hay discusiones sobre cómo mantener una presencia en línea al mismo tiempo que se proteje la vida privada y se resguarda la identidad de uno mismo. Esto ocurre en comunidades que nunca antes habían sentido la necesidad de practicar la seguridad operacional, y que nunca habían considerado la posibilidad de ser víctimas de violaciones de seguridad de datos.

En esta era de las redes sociales, hay muchas formas en las que nuestra presencia en línea puede usarse en contra nuestra por muchos tipos de adversarios. Desde acosadores hasta fiscales, cualquier información pública que pueda asociarse a nuestras identidades puede usarse en ventaja de ellos y en nuestra contra. Es importante que conozcamos los recursos que, sin querer, ponemos a disposición de quien quiere atacarnos.

Con el propósito de que la seguridad operacional práctica sea accesible a más gente, he compilado una lista de estrategias básicas para ayudar a ocultar los nexos entre una cuenta en redes sociales y la identidad verdadera de uno. Esta lista no es de ningún modo exhaustiva, y es importante tener en mente que un adversario con suficientes recursos muy probablemente podrá deducir este ocultamiento, si tiene suficiente tiempo. Dicho esto, casi siempre vale la pena hacer estas conexiones más difíciles, especialmente cuando nos incurren un costo muy bajo en cuanto a su ejecución.

1. Usa una dirección de correo diferente para cada red social

Cuando quieres ocultar la conexión entre cuentas en redes sociales, es importante usar una dirección de correo diferente y exclusiva para cada sitio, que no tenga relación con otros perfiles, nuestro nombre legal, o de forma ideal, ninguno de nuestros datos públicos. Usar nombre.apellido@trabajo.com es mala idea; usar sutantivo_al_azar.color_al_azar@gmail.com es una gran idea. Crear direcciones de correo nuevas es fácil, entonces no hay necesidad de re-utilizar una para las cuentas que quieres mantener separadas.

Consejo: puedes usar un servicio como 10minutemail.net para genera una dirección de correo temporal y usarla para crear una cuenta de Gmail.

2. Escoge un nombre de usuario único

No re-utilices nombres de usuario en las redes que quieras mantener separadas. No uses nombreapellido69 para las cuentas que no quieras que estén ligadas a tu identidad legal. Escoge algo diferente. Cualquier cosa. No importa.

3. No uses las mismas fotos

No uses las mismas fotos en los perfiles que quieras mantener separados. Hay servicios para hacer búsqueda inversa de fotos (le das una foto y te dice de dónde salió) y te pueden joder el día. Idealmente, no uses imágenes de tu cara en absoluto en un perfil que no quieras que se asocie a ti – pero si es indispensable, asegúrate que no se pueda rastrear de vuelta a tus cuentas en Twitter o Facebook sólo mediante hacer una búsqueda de arrastrar-y-soltar.

4. Tus pestañas del navegador son TU asunto

No des ningún indicio de que estás usando un sitio que no quieres que la gente sepa: si estás tratando de mantener privada una cuenta, asegúrate de no dar ninguna pista de que esa cuenta existe al tener pestañas del navegador abiertas. Fíjate que no espíen sobre tu hombro mientras usas esa cuenta, y nunca postées capturas de pantalla que muestren las pestañas del navegador. JAMÁS.

5. Limpia tu historial del navegador

Religiosamente. Como en el punto anterior, si no quieres que la gente sepa que estás usando un sitio o servicio, es mejor no dejar evidencia con la que se pueda topar alguien sin querer. Borrar tu historial del navegador es fácil. Usar Chrome o Firefox en modo incognito o privado, y cerrar las pestañas después de cada sesión, es todavía más fácil.

6. Cuando sea posible, paga con dinero en efectivo

Cuando hagas compras relacionadas con tu identidad privada, paga en efectivo. Cuando no puedas usar efectivo, considera la posibilidad de usar una tarjeta de prepago. Que compraste con efectivo. No quieres tener estados de cuenta de un banco o de tarjeta de crédito que establezcan un nexo entre tú y lugares en los que “nunca estuviste” o con sitios “que no utilizas”.

7. No uses tu nombre legal

Escoge un nombre. Cualquier nombre. No hay ninguna necesidad de usar tu nombre legal en las redes sociales. Desde luego que PUEDES hacerlo si te sientes cómodo con ello, pero de ninguna forma es obligatorio. Sin embargo, escoge un nombre al que SÍ le prestes atención.

8. Si quieres mantener un secreto, CIERRA LA BOCA

No hables de ello. No presumas, no lo discutas de forma anónima. No le digas a tu mejor amigo, no le digas a tus colegas, no le digas a ese extraño en el bar. Sólo SHHHHH. Deja de hablar.

9. Usa contraseñas robustas

“Contraseña”, “c0ntraseñ@”, “contraseña123”, etc. no son buenas. Usa contraseñas robustas y únicas para cada sitio o servicio. O mejor aún, usa un gestor de contraseñas que las genere automáticamente y que las proteja con una contraseña maestra fuerte.

10. No compartas información con la que puedan identificarte

Si quieres mantener secreto un perfil, no compartas en él información con la que te puedan identificar. Mantén secretos tu lugar de trabajo, tu escuela, tatuajes, y el lunar en tu nalga izquierda; no hay ningún beneficio en compartir estos detalles en una cuenta que no quieres que se pueda ligar a tí.

11. La “negación plausible” es una pésima idea

Si tu seguridad operacional es tan mala que depende de la negación plausible, es casi seguro de que no eres capaz de lograr la negación plausible. Es mejor compartir información falsa desde el principio que poner información verdadera, y luego intentar mentir para encubrir su relación contigo. Si confías en la negación plausible para mantenerte a salvo, estás jodido.

12. Si te reconocen, ya te jodiste

No tengas reuniones clandestinas en lugares que frecuentas en tu vida normal. Basta con que un solo trabajador, o cliente frecuente, etc. te reconozca y te llame por el nombre equivocado para que se rompa tu disfraz. Basta con un comentario inocente a alguien en tu vida normal para que se sepan tus secretos. Escoge un lugar en donde sea poco probable que te reconozcan; vístete de forma diferente a como lo haces normalmente; y no vayas más a ese lugar en tu vida normal si puedes evitarlo.

13. Las coartadas pueden ser útiles, pero son complicadas

Usa tu tarjeta bancaria o compra un boleto del cine o paga por comida en un lugar al que vayas frecuentemente. El problema con muchas coartadas es que dependen de que alguien más mienta por tí, lo cual es una violación del punto número 8. Si vas a construir una coartada, es mejor fabricar evidencia que depender de testimonios falsos.

14. Compartimientos estrictos

La primera regla del Club de la Pelea es, no hables del Club de la Pelea. La segunda regla del Club de la Pelea es, NO HABLES DEL CLUB DE LA PELEA. Esta regla va en ambos sentidos: así como no debes discutir tu vida secreta durante tu vida normal, tampoco debes discutir tu vida normal en tu vida secreta. No lo hagas. Mantenlas completamente separadas; que no se crucen, no hagas alusión a ellas, nada.

15. Mantén la compostura

Si quieres salirte con la tuya y mantener un secreto, debes mantenerte tranquilo. Cuidado con ponerse visiblemente nervioso. No te sonrías cada vez que alguien dice la palabra “secreto”. Controla tus expresiones faciales y tus reacciones a la gente que te rodea. Ten en mente los nombres a los que debes responder en cada situación. Mantén la calma.

16. No seas arrogante

Mantener una identidad requiere de alerta constante. La seguridad personal nunca está garantizada, y esto nunca hay que olvidarlo. La arrogancia lleva al descuido, el descuido lleva a que te descubran.

17. La perfección exige práctica

Ninguna de estas habilidades es innata. Todas requieren de mucha práctica. Puedes darte cuenta que necesitas comenzar desde cero, y comenzar en una hoja en blanco una y otra vez. No hay vergüenza en el fracaso, pero es importante acordarse de que Internet nunca olvida; es mejor errar con cautela y añadir información a medio camino, después de sopesar los riesgos.

Una vez más, aunque esta lista no es de ninguna forma exhaustiva en cuanto a todas las precauciones que podrías tener, y aunque estas precauciones pueden no servir contra adversarios con suficiente tiempo y recursos, son absolutamente útiles y una forma fácil de minimizar el riesgo de acosadores, miembros peligrosos de tu familia, patrones chismosos, e incluso adversarios de bajo nivel del estado. Las redes sociales pueden ser un punto vulnerable para muchos de nosotros, pero a través del manejo cuidadoso de identidades, se puede negar algo de esta inseguridad al mismo tiempo que se mantiene una firme presencia en línea.

Dear New Neighbor

Please consider supporting my writing on Patreon.

Welcome

Dear New Neighbor,

I understand that you are new to this neighborhood, or perhaps this city, or maybe even to this state. I know you know that things here are pretty tense as more and more people born and raised here become less and less able to afford the cost of living. I know it is not your intention to displace those who called this place home before you. I know that you want to be a good neighbor and to minimize your negative impact on the community you are seeking to become a part of.

Here is what you need to know:

We do not call the cops.

Calling the cops is feeding into institutional violence. Calling the cops is providing fodder for their bullshit script when they kill a person who “fit a description.” Calling the cops is appealing to a system that doesn’t give a fuck about me, or you, or really anyone else. Calling the cops is potentially condemning someone to the horrors and inhumanities of the court and prison systems, and even if they survive, they’re infinitely more susceptible to having to go back because our “justice” system is one predicated not on rehabilitation but on recidivism.

We don’t call the cops because to do so is to invite them into our community, and facilitate their terrorization of our black and brown neighbors. We don’t call the cops because we believe in learning to work with our community to resolve our own issues, instead of turning to strangers with iron fists and steel bullets to resolve them for us.

We don’t call the cops, because all cops care about is property, and our property is not worth another person’s life.

We don’t call the cops in cases of domestic violence, because they are just as likely to arrest the victim as they are the perpetrator. We don’t call the cops in cases of sexual violence, because even if prison weren’t a vile institution constructed with the primary purpose of using slave labor to generate profits, only about 2% of rapists ever go to prison anyway. We don’t call the cops because they blame victims of sexual assault instead of the perpetrators, questioning them in ways that force them to relive their trauma, while dismissing what has happened based on what they were wearing, or whether they had been friendly with their attacker, or whether they had a cocktail, or whether they were “asking for it.”

We don’t call the cops because we are not willing participants in white supremacy, and we do not want to help them in enforcing racist laws in our society, and perpetuating systemic violence.

 

We don’t call the cops because in order to be good members of the community we are moving into, we need to get to know our neighbors, we need to understand the role we play in the alteration of our neighborhood, and we need to comprehend that the police will commit unspeakable acts of violence against those who were here before us in the interest of providing the illusion of safety to us.

We don’t call the cops because what they provide is, in fact, just that: an illusion of safety. They do not de-escalate situations, they do not prevent bad things from happening, they cannot undo the bad things that DO happen, and we cannot fix our problems by facilitating violence against our neighbors. We don’t call the cops because it is in the best interest of all of us who live here to build strong bonds with our neighbors and establish a community on the principles of communication, understanding, and mutual support.

Welcome to the neighborhood.