Should You Hit on Your Bartender?

Please consider supporting my writing on Patreon.

The answer to this question is pretty universally “no,” if we’re being quite honest. Bartenders (and other service workers) are already dealing with an imbalanced power dynamic where it is literally their job to make you feel like they like you, and there is a very real risk that rebuffing your advances may lose them their job. Their income, and often even their employment, is almost entirely dependent on how convincingly they act like they like you, and on how much you like them.

That said, if you’re certain there are sparks between you and your bartender, there ARE ways you can go about making the connection without making it weird. Whether or not you should, however…

Now that you’ve made it through the chart, listen up:

DO NOT directly ask your bartender (or server, or cashier, or barista, or whomever) out. They literally cannot walk away and have no choice but to stand there awkwardly smiling at you. Putting them on the spot is 110% completely inappropriate.

So what do you do? Write them a note. Some variation on the following:

“I think you’re really cute, and I’d love it if you wanted to meet up some time when you’re not working. Here’s my number. There’s no pressure, and I promise I won’t make things weird if you don’t use it.”

That last bit is EXTREMELY IMPORTANT. If you absolutely must hit on someone who is literally being forced to serve you, it is imperative that you let them know that you won’t hold it against them (or make their lives hell) if you’ve completely misread the situation and they’re not actually into you.

ADDITIONALLY, your phone number is not a tip. Trust me. If you want even the slightest chance of that bartender calling you, you had better tip extra-well. And remember, they don’t owe you anything but the drinks that you’ve ordered.

Cheers!

Stop Snitching: Documentation Without Incrimination Part 2

Please consider supporting my writing on Patreon.

So you’ve learned how to document a demonstration without getting anyone into trouble, but now you’ve got a ton of footage and aren’t sure what to do with it. Chances are, if you’re a journalist being paid to cover the protests, your mind is already made up. If you’re not, there are some things to keep in mind. Chances are, if you’ve followed the instructions from my previous post, your photos and/or video footage are “safe” to post to social media. However, if you’ve captured images of someone being arrested or injured by police, you may want to check a few things before posting those images publicly.

Being arrested or subject to police violence can be a deeply traumatic, deeply vulnerable experience. As such, it is entirely possible that people subject to these indignities may not want to have that experience broadcast for public consumption. Additionally, if someone is taken into custody, it is preferable that their loved ones not find out by seeing their image plastered across social media.

Aside from the above, there is one other excellent reason to tread carefully when posting footage of someone’s arrest or brutalization: opposing counsel. In cases of both arrest and injury, the specter of litigation looms. With an arrest, a person may very well be facing charges. In cases of police repression, the affected party may either be brought up on charges later, or may want to file a lawsuit against the police department.

In any of these scenarios, it is best to offer footage to the person featured, rather than posting it publicly where anyone can see it. In the event of a pending court case, this may involve getting the footage to an incarcerated person’s attorney, or perhaps just finding a secure means of giving the data to the person it concerns, thus allowing them to review it (and ideally get legal counsel) before releasing it to the population at large. Even in the absence of a pending court case, reaching out and offering the content to the person(s) depicted, rather than posting it of your own volition, is likely the best course of action.

There are many means by which you can transfer the images you’ve captured; the best is to put the data onto a thumb drive, and hand it directly to the person you’d like to receive it. Second best is to physically mail a thumb drive, using tamper-evident packaging. In both cases, if for a court case, it is possible that you can get reimbursement from the attorney to whom you are supplying the data. Failing the ability to physically transfer data, you can also resort to email, but should avoid this if possible.

It is very true that it may be difficult to find the person whose arrest or brutalization you’ve captured, but it is absolutely worth the effort. The photos you snap, and video you record, and your discretion in keeping them private, may be the difference between jail and freedom for someone else.

SpoOoOoky Spirits

Please consider supporting my writing on Patreon.

It’s just not Halloween without spirits! Here are 13 essential cocktails for your spirited All Hallows Eve gathering:

Corpse Reviver:
This classic cocktail is sure to get even the most reluctant guests dancing to the Monster Mash!
1 oz. gin
1 oz. Cointreau (or Triple Sec)
1 oz. Lillet or Cocchi
1 oz. lemon juice
1 dash Absinthe or Herbsaint

Shake vigorously with ice, then strain into a cocktail glass or coupe. Garnish with a lemon twist.

Satan’s Whiskers:
Sweet as temptation, bitter as the realization that you’ve sold your soul.
1/2 oz gin
1/2 oz Dry Curacao*
1/2 oz sweet vermouth
1/2 oz dry vermouth
1/2 oz orange juice

Shake vigorously with ice, then strain into a cocktail glass or coupe. Garnish with an orange twist.
*For a sweeter version, Triple Sec may be substituted for Dry Curacao.

Black Widow:
This intoxicating brew is deadly delicious.
2 oz. Irish whiskey
1 oz.  Chambord
12 oz. Guinness

Combine whiskey and Kahlua in a chilled pint glass, then add Guinness.

Heart of Darkness:
This potent blend will make your heart feel like it’s about to jump out of your chest!
2 oz. Fernet Branca
8 oz. hot coffee

Pour Fernet into coffee, enjoy while hot.

Persephone’s Kiss:
A single sip of this will bind you to the underworld forever; I promise you won’t mind.
2 oz. rum
2 oz. pomegranate liqueur*
1 oz. lime
2 dashes orange bitters

Shake with ice, serve on the rocks. Garnish with 6 pomegranate seeds.
*If no pomegranate liqueur, you may substitute 1 oz. grenadine and 1 oz. Triple Sec.

Fire and Brimstone:
Hot and smoky: drink and repent!
2 oz. mezcal
1 oz. ginger liqueur
1 oz. pineapple
1 oz. lime
Habanero bitters to taste*

Shake with ice, serve on the rocks. Garnish with a lime twist and/or fresh ginger.
*Add AT LEAST enough bitters that you can feel the burn!

Zombie:
A classic Tiki drink, this cocktail’s name speaks for itself.
1 1/2 oz. gold rum
1 oz. dark rum
1/2 oz. white rum
1/2 oz. 151-proof rum
1 oz. lime juice
1 oz. pineapple juice
1/2 oz. coconut creme

Shake all ingredients *EXCEPT* 151 with ice, and strain into a glass of crushed ice. Float 151 on top (ignite if you so choose.)

Fright Night:
The only thing more terrifying than this cocktail is the hangover you’ll be facing in the morning.
2 oz vodka
1 oz. Blue Curacao
1 oz. Midori
1 oz. Luxardo Maraschino liqueur
1 oz. lime juice

Shake all ingredients with ice, strain, and serve over the rocks. Garnish with two maraschino cherries.

Homicide:
Serve and drink at your own risk; just don’t name me as an accomplice.
1 oz. gin
1 oz. Fernet Branca
1 oz. Kahlua
1/4 oz. Chambord

Pour all ingredients into a glass of ice and stir together. Strain into a cocktail glass or coupe. Garnish with an orange twist.

Miasma:
It’s a swirling, toxic cloud… in a glass!
3 oz. Viniq
3 oz sparkling wine

Shake Viniq, then pour into a champagne flute. Top with sparkling wine. Regret forever.

Masque of the Red Death:
A concoction of little substance and remarkable potency.
1 oz. gin
1 oz. Campari
1 oz. Sweet Vermouth
3 oz. sparkling wine

Combine gin, Campari, and vermouth in a champagne flute. Add sparkling wine and garnish with a maraschino cherry.

Jack O’Lantern:
Honestly, your best bet is just to set it on fire and never look back.
2 oz. Jack Daniels
1/2 oz. sweet vermouth
1/2 oz. pumpkin spice syrup or liqueur
2 dashes Angostura bitters

Stir with ice, strain into a cocktail glass or coupe. Garnish with a maraschino cherry.

Poltergeist:
This drink is likely to haunt you long after you kill it.
2 oz. tequila
1/2 oz. ginger liqueur
1/2 oz. grenadine
1 oz. grapefruit juice

Shake with ice, then strain into a cocktail glass or coupe.

Checklist for Organizing an Inclusive Event

Please consider supporting my writing on Patreon.

Organizing is hard. Inclusivity can be difficult. Here is a live document intended to help organizers cover all the bases, so that no one is made to feel like they are unimportant or an afterthought.

  • Will there be childcare? Regardless of whether there will or will not be, this question should be answered in all event announcements, so parents can make informed decisions.
  • Is this space accessible? This question should be answered in all event announcements, regardless of the level of accessibility of the event. Some things to keep in mind include accessibility for people in wheelchairs, people who walk but have other physical disabilities, accessibility for those with sensitivity to scents or allergies, accommodations for people who are hard of hearing or deaf, content that may be triggering to those suffering from PTSD, proximity to public transportation, 
  • Is the makeup of the group of presenters diverse? This is NOT a suggestion that you include a solitary cisgender white woman, and say you’ve got a “diverse panel.” Your speakers should mirror the groups you are intending to speak TO. If you want your group to feel inclusive to people of color, and white people who are not cisgender men, you should not just be inviting them to attend, you should also be asking them to speak. Keep a public list of speakers, and update it as you add more, so that people can make an informed decision about whether your event really speaks to them.
  • Is there a fee associated? All event announcements should include this information. Additionally, if you are interested in maximum inclusivity but must charge for your event, a sliding scale and/or inclusion of the phrase “no one turned away for lack of funds” can be a huge step.

This is by no means an exhaustive list. These are all questions that should be answered publicly when your event is announced, rather than questions you should scramble to respond to when someone brings them up. Regardless of your resources as an organizer, or capacity to actually fix accessibility issues like those mentioned above, simply addressing them up front can make a huge difference between making people feel like they were considered in the organizing stages of your event, or making them feel like an inconvenient afterthought.

Your Threat Model is Not My Threat Model

Please consider supporting my writing on Patreon.

While this is something I’ve thought about quite a bit, for quite a while, the abundance of attention my blog has gotten recently has made it apparent that this needs to be said:

Your threat model is not my threat model.

I know that with regards to privacy and security, the threat at the front of many minds is a certain three-letter agency whose dragnet surveillance was exposed publicly in 2013.

The Snowden revelations have changed mainstream public discourse around privacy and security, bringing these importance of these issues to light for many who have lead lives of safety and complacency. The problem is, for many of us, privacy and safety have been concerns for a very long time, and dragnet surveillance is the least of our worries.

I know many of you are worried about your communications being stored in a database, accessible to the state in the event that you ever become a person of interest, deserving of further scrutiny. I will not tell you that it is an invalid concern. I WILL tell you that there are other guides out there for you, your concern is not MY primary concern, and my writing (aside from this piece) will probably never center you.

Many others of you are concerned with corporations like Google and Facebook collecting data to sell to third parties for purposes of targeted advertising. Again, I will not tell you that your concerns are not valid concerns. Again, I am unlikely to center those concerns.

Still others of you are savvy enough to be interested in using technical tools to keep yourselves safe from spying, regardless of its source. There are many guides out there relevant to your interests. I believe in advocating the skills and tools that the least savvy among us can use, because I believe that being non-technical shouldn’t mean being insecure.

I will always center the non-technical. I will always center those facing real, physical threat from unsophisticated attackers; adversaries who have no resources but time and malice ARE an advanced persistent threat, they are worthy of being addressed, and those who need to defend against them are underserved by the security community.

If your threat model identifies your primary adversaries as Google and the NSA, I will not tell you you’re wrong, but I will say that you’re extremely lucky. I would trade my adversaries for yours in a heartbeat. That said, I am here to help those who face threats like stalking, like abusive exes, like overbearing parents who cannot accept who they are. I am here to protect those who have snooping employers and prying frenemies. I am here to prioritize the people for whom extensive privacy guides are not written, and for whom a lack of privacy will have a very real, very detrimental affect.

I’m here for the people like me, for the people whose threat model mirrors my own, and because we deserve to be safe.

Sex, Drugs, and Alcohol: In Defense of Ada Lovelace

Today is Ada Lovelace Day, a day when we celebrate women in science and mathematics fields, and congratulate them on their continued struggle against the sexist notion that women do not belong in those roles.

Ada Lovelace, a Victorian-era mathematician and writer, is credited with being the first-ever computer programmer, due to her work with Charles Babbage on his Analytical Engine. Modern society being what it is, we seem to be incapable of celebrating the achievements of a woman in STEM without calling into question her character, and dismissing her on the basis of what is perceived to have been socially-unacceptable behavior. Two hundred years after her birth, we are still hung up on the fact that Ada Lovelace was… unladylike.

Research into Ada’s past indicates that she drank alcohol, gambled to excess, and was addicted to drugs. In addition, she cursed profusely, and is believed to have committed adultery. These revelations call to question whether Ada Lovelace was, in fact, a role model for scientists and mathematicians everywhere.

Several people have voiced the opinion that in spite of her perceived flaws, Lovelace remains a role model. I contend that Ada is a role model in part BECAUSE of her failure to conform to societal norms. Ada is a perfect example of the fact that shortcomings and a lack of respectability do not need to be barriers to achieving greatness. She is proof that people should not be dismissed on the basis of addiction, proof that there is more to life than clinging to the concept of respectability.

In addition to her drinking, gambling, swearing, alleged adultery, and opium abuse, Ada Lovelace struggled with mental health issues for most of her tragically short life. In an age where we still struggle to accept neurodiversity, Lovelace also serves as a reminder of why we should not dismiss people simply because they do not think or behave the way society has mandated they should.

The legacy of Ada Lovelace is a perfect example of what we stand to lose if we continue to hold role models to impossible standards of respectability, if we diminish the achievements of women based on their failure to conform to an ideal of femininity. Ada Lovelace is an excellent role model, because she reminds us not only of what we can achieve, but also of the fact that we do not need to focus our energy on striving to fit into a societal mold of perfect womanhood. It is shameful to attempt to erase her accomplishments simply because she was unladylike. Instead, she deserves to be celebrated twofold: on the basis of her achievements in the field of mathematics, as well as on her refusal to conform to a patriarchal notion of who she ought to have been, and how she ought to behave.

Auto-defensa en Redes Sociales

Please consider supporting my writing on Patreon.

Con muchas gracias á @federicomena por la traducción!

Los acontecimientos recientes han suscitado una discusión sobre la necesidad de tener seguridad operacional al hacer uso de redes sociales. Hay discusiones sobre cómo mantener una presencia en línea al mismo tiempo que se proteje la vida privada y se resguarda la identidad de uno mismo. Esto ocurre en comunidades que nunca antes habían sentido la necesidad de practicar la seguridad operacional, y que nunca habían considerado la posibilidad de ser víctimas de violaciones de seguridad de datos.

En esta era de las redes sociales, hay muchas formas en las que nuestra presencia en línea puede usarse en contra nuestra por muchos tipos de adversarios. Desde acosadores hasta fiscales, cualquier información pública que pueda asociarse a nuestras identidades puede usarse en ventaja de ellos y en nuestra contra. Es importante que conozcamos los recursos que, sin querer, ponemos a disposición de quien quiere atacarnos.

Con el propósito de que la seguridad operacional práctica sea accesible a más gente, he compilado una lista de estrategias básicas para ayudar a ocultar los nexos entre una cuenta en redes sociales y la identidad verdadera de uno. Esta lista no es de ningún modo exhaustiva, y es importante tener en mente que un adversario con suficientes recursos muy probablemente podrá deducir este ocultamiento, si tiene suficiente tiempo. Dicho esto, casi siempre vale la pena hacer estas conexiones más difíciles, especialmente cuando nos incurren un costo muy bajo en cuanto a su ejecución.

1. Usa una dirección de correo diferente para cada red social

Cuando quieres ocultar la conexión entre cuentas en redes sociales, es importante usar una dirección de correo diferente y exclusiva para cada sitio, que no tenga relación con otros perfiles, nuestro nombre legal, o de forma ideal, ninguno de nuestros datos públicos. Usar nombre.apellido@trabajo.com es mala idea; usar sutantivo_al_azar.color_al_azar@gmail.com es una gran idea. Crear direcciones de correo nuevas es fácil, entonces no hay necesidad de re-utilizar una para las cuentas que quieres mantener separadas.

Consejo: puedes usar un servicio como 10minutemail.net para genera una dirección de correo temporal y usarla para crear una cuenta de Gmail.

2. Escoge un nombre de usuario único

No re-utilices nombres de usuario en las redes que quieras mantener separadas. No uses nombreapellido69 para las cuentas que no quieras que estén ligadas a tu identidad legal. Escoge algo diferente. Cualquier cosa. No importa.

3. No uses las mismas fotos

No uses las mismas fotos en los perfiles que quieras mantener separados. Hay servicios para hacer búsqueda inversa de fotos (le das una foto y te dice de dónde salió) y te pueden joder el día. Idealmente, no uses imágenes de tu cara en absoluto en un perfil que no quieras que se asocie a ti – pero si es indispensable, asegúrate que no se pueda rastrear de vuelta a tus cuentas en Twitter o Facebook sólo mediante hacer una búsqueda de arrastrar-y-soltar.

4. Tus pestañas del navegador son TU asunto

No des ningún indicio de que estás usando un sitio que no quieres que la gente sepa: si estás tratando de mantener privada una cuenta, asegúrate de no dar ninguna pista de que esa cuenta existe al tener pestañas del navegador abiertas. Fíjate que no espíen sobre tu hombro mientras usas esa cuenta, y nunca postées capturas de pantalla que muestren las pestañas del navegador. JAMÁS.

5. Limpia tu historial del navegador

Religiosamente. Como en el punto anterior, si no quieres que la gente sepa que estás usando un sitio o servicio, es mejor no dejar evidencia con la que se pueda topar alguien sin querer. Borrar tu historial del navegador es fácil. Usar Chrome o Firefox en modo incognito o privado, y cerrar las pestañas después de cada sesión, es todavía más fácil.

6. Cuando sea posible, paga con dinero en efectivo

Cuando hagas compras relacionadas con tu identidad privada, paga en efectivo. Cuando no puedas usar efectivo, considera la posibilidad de usar una tarjeta de prepago. Que compraste con efectivo. No quieres tener estados de cuenta de un banco o de tarjeta de crédito que establezcan un nexo entre tú y lugares en los que “nunca estuviste” o con sitios “que no utilizas”.

7. No uses tu nombre legal

Escoge un nombre. Cualquier nombre. No hay ninguna necesidad de usar tu nombre legal en las redes sociales. Desde luego que PUEDES hacerlo si te sientes cómodo con ello, pero de ninguna forma es obligatorio. Sin embargo, escoge un nombre al que SÍ le prestes atención.

8. Si quieres mantener un secreto, CIERRA LA BOCA

No hables de ello. No presumas, no lo discutas de forma anónima. No le digas a tu mejor amigo, no le digas a tus colegas, no le digas a ese extraño en el bar. Sólo SHHHHH. Deja de hablar.

9. Usa contraseñas robustas

“Contraseña”, “c0ntraseñ@”, “contraseña123”, etc. no son buenas. Usa contraseñas robustas y únicas para cada sitio o servicio. O mejor aún, usa un gestor de contraseñas que las genere automáticamente y que las proteja con una contraseña maestra fuerte.

10. No compartas información con la que puedan identificarte

Si quieres mantener secreto un perfil, no compartas en él información con la que te puedan identificar. Mantén secretos tu lugar de trabajo, tu escuela, tatuajes, y el lunar en tu nalga izquierda; no hay ningún beneficio en compartir estos detalles en una cuenta que no quieres que se pueda ligar a tí.

11. La “negación plausible” es una pésima idea

Si tu seguridad operacional es tan mala que depende de la negación plausible, es casi seguro de que no eres capaz de lograr la negación plausible. Es mejor compartir información falsa desde el principio que poner información verdadera, y luego intentar mentir para encubrir su relación contigo. Si confías en la negación plausible para mantenerte a salvo, estás jodido.

12. Si te reconocen, ya te jodiste

No tengas reuniones clandestinas en lugares que frecuentas en tu vida normal. Basta con que un solo trabajador, o cliente frecuente, etc. te reconozca y te llame por el nombre equivocado para que se rompa tu disfraz. Basta con un comentario inocente a alguien en tu vida normal para que se sepan tus secretos. Escoge un lugar en donde sea poco probable que te reconozcan; vístete de forma diferente a como lo haces normalmente; y no vayas más a ese lugar en tu vida normal si puedes evitarlo.

13. Las coartadas pueden ser útiles, pero son complicadas

Usa tu tarjeta bancaria o compra un boleto del cine o paga por comida en un lugar al que vayas frecuentemente. El problema con muchas coartadas es que dependen de que alguien más mienta por tí, lo cual es una violación del punto número 8. Si vas a construir una coartada, es mejor fabricar evidencia que depender de testimonios falsos.

14. Compartimientos estrictos

La primera regla del Club de la Pelea es, no hables del Club de la Pelea. La segunda regla del Club de la Pelea es, NO HABLES DEL CLUB DE LA PELEA. Esta regla va en ambos sentidos: así como no debes discutir tu vida secreta durante tu vida normal, tampoco debes discutir tu vida normal en tu vida secreta. No lo hagas. Mantenlas completamente separadas; que no se crucen, no hagas alusión a ellas, nada.

15. Mantén la compostura

Si quieres salirte con la tuya y mantener un secreto, debes mantenerte tranquilo. Cuidado con ponerse visiblemente nervioso. No te sonrías cada vez que alguien dice la palabra “secreto”. Controla tus expresiones faciales y tus reacciones a la gente que te rodea. Ten en mente los nombres a los que debes responder en cada situación. Mantén la calma.

16. No seas arrogante

Mantener una identidad requiere de alerta constante. La seguridad personal nunca está garantizada, y esto nunca hay que olvidarlo. La arrogancia lleva al descuido, el descuido lleva a que te descubran.

17. La perfección exige práctica

Ninguna de estas habilidades es innata. Todas requieren de mucha práctica. Puedes darte cuenta que necesitas comenzar desde cero, y comenzar en una hoja en blanco una y otra vez. No hay vergüenza en el fracaso, pero es importante acordarse de que Internet nunca olvida; es mejor errar con cautela y añadir información a medio camino, después de sopesar los riesgos.

Una vez más, aunque esta lista no es de ninguna forma exhaustiva en cuanto a todas las precauciones que podrías tener, y aunque estas precauciones pueden no servir contra adversarios con suficiente tiempo y recursos, son absolutamente útiles y una forma fácil de minimizar el riesgo de acosadores, miembros peligrosos de tu familia, patrones chismosos, e incluso adversarios de bajo nivel del estado. Las redes sociales pueden ser un punto vulnerable para muchos de nosotros, pero a través del manejo cuidadoso de identidades, se puede negar algo de esta inseguridad al mismo tiempo que se mantiene una firme presencia en línea.

Dear New Neighbor

Please consider supporting my writing on Patreon.

Welcome

Dear New Neighbor,

I understand that you are new to this neighborhood, or perhaps this city, or maybe even to this state. I know you know that things here are pretty tense as more and more people born and raised here become less and less able to afford the cost of living. I know it is not your intention to displace those who called this place home before you. I know that you want to be a good neighbor and to minimize your negative impact on the community you are seeking to become a part of.

Here is what you need to know:

We do not call the cops.

Calling the cops is feeding into institutional violence. Calling the cops is providing fodder for their bullshit script when they kill a person who “fit a description.” Calling the cops is appealing to a system that doesn’t give a fuck about me, or you, or really anyone else. Calling the cops is potentially condemning someone to the horrors and inhumanities of the court and prison systems, and even if they survive, they’re infinitely more susceptible to having to go back because our “justice” system is one predicated not on rehabilitation but on recidivism.

We don’t call the cops because to do so is to invite them into our community, and facilitate their terrorization of our black and brown neighbors. We don’t call the cops because we believe in learning to work with our community to resolve our own issues, instead of turning to strangers with iron fists and steel bullets to resolve them for us.

We don’t call the cops, because all cops care about is property, and our property is not worth another person’s life.

We don’t call the cops in cases of domestic violence, because they are just as likely to arrest the victim as they are the perpetrator. We don’t call the cops in cases of sexual violence, because even if prison weren’t a vile institution constructed with the primary purpose of using slave labor to generate profits, only about 2% of rapists ever go to prison anyway. We don’t call the cops because they blame victims of sexual assault instead of the perpetrators, questioning them in ways that force them to relive their trauma, while dismissing what has happened based on what they were wearing, or whether they had been friendly with their attacker, or whether they had a cocktail, or whether they were “asking for it.”

We don’t call the cops because we are not willing participants in white supremacy, and we do not want to help them in enforcing racist laws in our society, and perpetuating systemic violence.

 

We don’t call the cops because in order to be good members of the community we are moving into, we need to get to know our neighbors, we need to understand the role we play in the alteration of our neighborhood, and we need to comprehend that the police will commit unspeakable acts of violence against those who were here before us in the interest of providing the illusion of safety to us.

We don’t call the cops because what they provide is, in fact, just that: an illusion of safety. They do not de-escalate situations, they do not prevent bad things from happening, they cannot undo the bad things that DO happen, and we cannot fix our problems by facilitating violence against our neighbors. We don’t call the cops because it is in the best interest of all of us who live here to build strong bonds with our neighbors and establish a community on the principles of communication, understanding, and mutual support.

Welcome to the neighborhood.

Drink All The Booze, Hack All The Things

Please consider supporting my writing on Patreon.

With the release of the 20th Anniversary edition of Hackers on Blu-Ray, Hackers parties are popping up left and right. Help your guests get as trashed as Dade’s rights with these Hackers-inspired cocktails!

Acid Burn
Shaken and served on the rocks! 
2 oz. light rum
1 oz. lime juice
4 oz. pineapple juice
1/2 oz. grenadine
habanero bitters to taste

Crash And Burn
Shaken and served on the rocks!
2 oz. tequila
1/2 oz. mezcal
1 oz. lime juice
4 oz. orange juice
1/2 oz. grenadine
habanero bitters to taste

Zero Cool
Shaken and served up!
2 oz. gin
1 oz. green Chartreuse
1 oz. lime juice
1/2 oz. Yerba Mate syrup

Hack The Planet
Suspiciously like a Cuba Libre… served on the rocks!
2 oz. light rum
Jolt Cola
Lime wedge

Hacked Gibson
Served up, stirred, not shaken. We are not barbarians.
2 oz. gin
1/2 oz. dry vermouth
Cocktail onion*
Pour gin and vermouth into a glass. Add ice to the top. Stir until well-chilled. Strain into martini glass. Look at cocktail onion. Recognize that cocktail onions are garbage. Mumble “god” under your breath, and toss cocktail onion into the Garbage File. Congratulations, you’ve hacked the Gibson!

Serve these cocktails, and watch other party hosts mess with the best and die like the rest. Just don’t rollerblade after drinking, and remember: it’s not a hangover, it’s The Plague.

Social Media Self-Defense

Please consider supporting my writing on Patreon.


español – 

Recent events have raised conversation about the necessity for operational security in relation to social media. Discussions about how to maintain an online presence while protecting one’s private life and personal identity are cropping up in communities who had previously never felt the need to exercise operational security, and who had never considered the possibility of falling prey to compromised security and data breaches.

In the age of social media, there are a myriad ways our online presence may be used against us by a multitude of adversaries. From stalkers to prosecutors, any public information that can be attached to our identities may be used to their advantage and our detriment. It is important that we are mindful of the resources we make available to potential attackers.

In the interest of making practical operational security accessible to more people, I have composed a list of basic strategies for helping to mask the link between a social media account and one’s true identity. This list is by no means exhaustive, and it is important to keep in mind that an adversary with enough resources will likely be able to circumvent this obfuscation, given enough time. That said, it is nearly always worthwhile to make these connections more difficult, especially when they come at very little cost to us in terms of implementation.

1. Use a unique email address.
When attempting to mask connections between social media profiles, including dating sites, it is important to use a dedicated email address that does not relate back to other profiles, our legal name, or, ideally, any of our public associations. Using firstname.lastname@workplace.com is a bad idea; using randomcolor.randomnoun@gmail.com is a great idea. Creating new email addresses is easy, so there is no need to reuse one for accounts you’d like to keep separate.
Pro-tip: you can use a service like 10minutemail.net to generate a temporary email for creating a new Gmail account.

2. Choose a unique handle.
Do not re-use handles across platforms you’d like to keep separate. Do not use firstnamelastname69 for accounts you do not want to have connected to your legal identity. Pick something else. Anything else. It doesn’t matter.

3. Don’t use the same photos.
Do not use the same photos on profiles you’d like to keep separate. Reverse image search is a thing, and it will fuck your shit up. Ideally, you would not use images of your face at all on a profile you did not want tied to you, but if you must, make sure they can’t be linked back to your Twitter or Facebook accounts simply by using a quick drag-and-drop search.

4. Your tabs are YOUR business.
Give no indication that you’re using a site you don’t want people to know you’re using: if you’re trying to keep your private account private, make sure you’re not hinting at its existence by means of open tabs. Ensure you’re not being shouldersurfed while interacting with that account, and never post screencaps that show tabs. EVER.

5. Scrub your browsing history.
Religiously. As with the above point, if you don’t want people to know you’re using a site or service, it’s best not to leave evidence around and available to the casual observer. Deleting your browsing history is easy. Using Chrome in incognito mode and closing your tabs after every session is even easier.

6. When possible, pay in cash.
When making purchases connected to your private persona, pay in cash. When cash isn’t possible, consider paying with a pre-paid card. Purchased with cash. You do not need bank statements or credit card statements establishing a link between you and places you never were, or sites you do not use.

7. Don’t use your legal name.
Pick a name. Any name. There is no need whatsoever for you to use your legal name on social media. You certainly CAN if you feel comfortable with it, but it is absolutely not mandatory. DO pick a name you will actually respond to, though.

8. If you want to keep a secret, KEEP QUIET.
Don’t talk about it. Don’t brag, don’t discuss it anonymously. Don’t tell your best friend, don’t tell your workmates, don’t tell that stranger at the bar. Just SHHHH. Stop talking.

9. Use strong passphrases.
“Password,” “Passw0rd,” “password123,” etc. are not good enough. Use strong unique passwords for each site or service. Better yet, use a password manager with a strong master password.

10. Don’t share identifying information.
If you’re trying to keep a profile secret, don’t share personally-identifying details on it. Keep your workplace, alma mater, tattoos, and the freckle on your left butt cheek private; there is no benefit to sharing these details on an account you don’t want to have linked back to you.

11. “Plausible deniability” is a terrible failsafe.
If your operational security is poor enough that you have to rely on plausible deniability, you are almost definitely not capable of pulling off plausible deniability. It’s far better to share false information from the start than it is to put honest information out there, and then try to lie to cover up its connection to you. If you are relying on plausible deniability to keep you safe, you are fucked.

12. Being recognized will fuck your shit up.
Don’t conduct clandestine meetings in places you frequent in your normal life. It only takes one staff member, regular patron, etc. to recognize you, call you by the wrong name, and totally blow your cover. It only takes an innocuous comment to someone in your normal life to make your secrets known. Pick somewhere you are unlikely to be recognized, dress differently than you normally do, and don’t go to that place in your day-to-day life if you can avoid it.

13. Alibis can be helpful, but they’re hard.
Use your credit card to buy a movie ticket or pay for food somewhere you frequent often. The problem with many alibis is that they involve having someone else lie on your behalf, which in turn requires violation of rule number 8. If you are going to construct an alibi, make sure you’re fabricating evidence, rather than relying on false testimony.

14. Strict compartmentalization.
The first rule of Fight Club is, do not talk about Fight Club. The second rule of Fight Club is DO NOT TALK ABOUT FIGHT CLUB. This rule actually goes both ways; just as you should not be discussing your secret life within your mundane existence, there is also no reason to discuss your day-to-day life within your secret life. Just don’t. Keep it completely separate; no overlap, no allusion, nothing.

15. Maintain composure.
If you want to get away with keeping a secret, you must keep your cool. Be mindful of being fidgety. Don’t giggle every time someone says the word “secret.” Be aware of your facial expressions and your reactions to the people around you. Be aware of what names you’re responding to, when. Stay calm.

16. Don’t get cocky.
Persona maintenance requires constant vigilance. Personal security is never assured, and one should never forget this. Cockiness breeds sloppiness, sloppiness leads to discovery.

17. Perfection takes practice.
None of these skills are innate. All of them require extensive practice. You may find that you need to start over and start clean over and over again. There is no shame in failure, but it is important to remember that the internet never forgets; it is best to always err on the side of caution and add additional information as you go, after having properly assessed the risk.

Again, while this is by no means an exhaustive list of all possible precautions one might take, and while these precautions may not be as helpful against adversaries with a lot of time and resources, they are absolutely an easy way to minimize risk from stalkers, dangerous family members, nosy employers, and potentially even low-level state adversaries. Social media can very well be a point of vulnerability for many of us, but through careful persona management, it is possible to negate some of that insecurity while maintaining a robust online presence.