Forgot your password?

Comment: Anti-SpaceX Propaganda Campaign (Score 3, Informative) 107

by catchblue22 (#47545725) Attached to: SpaceX Executive Calls For $22-25 Billion NASA Budget

As this article indicates, United Launch Alliance, the principle competitor to SpaceX has hired Shockey Scofield Solutions to initiate a propaganda campaign against SpaceX. You can see ULA listed as a client in the website listed above. The campaign is indirectly mentioned in the following very informative article, just past the halfway point in the article. You will also notice another client to Shockey Scofield Solutions as Koch Industries, which is a company notorious for its deceptive propaganda campaigns against action on global warming.

Given this fact, I would tend to suspect many of the anti SpaceX comments as being part of an astroturfing campaign. To be honest, I really don't understand why an actual thinking person would have any problem with SpaceX. They build reliable rockets quickly and cheaply. What on Earth is the problem with that?

Comment: Letter from Gaia to humanity on joy of expectation (Score 1) 313

Good point. Going even further, from something I wrote in 1992:
A letter from Gaia to humanity on the joy of expectation

Don't cry for me. When I let you evolve I knew it might cost the
rhino and the tiger. I knew the rain forests would be cut down. I
knew the rivers would be poisoned. I knew the ocean would turn to
filth. I knew it would cost most of the species that are me.

What is the death of most of my species to me? It is only sleep.
In ten million years I will have it all back again and more. This
has happened many times already. Complex and fragile species will
break along with the webs they are in. Robust and widespread
species will persist along with simpler webs. In time these
survivors will radiate to cover the globe in diversity again. Each
time I come back in beauty like a bush pruned and regrown.

Be happy for me. Over and over again I have tried to give birth to
more Gaias. Time and time again I have failed. With you I have
hope. I cannot tell you how happy I am.

Your minds, spacecraft, biospheres, and computers give me new realms
to evolve into. With your minds I evolve as ideas in inner space.
With your technology I can evolve into self replicating habitats in
outer space. Your computers and minds contain model Gaias I can
talk to; they are my first children. Your space craft and
biospheres are a step to spreading Gaias throughout the stars.

Cry, yes. Cry for yourselves. I am sorry those alive now will not
live to see the splendor to come from what you have started. I am
sorry for all the suffering your species and others will endure.
You who live now will remember the tiger and the rain forest and
mourn for them and yourselves. You will know what was lost without
ever knowing what will be gained. I too mourn for them and you.

There is so much joy that awaits us. We must look up and forward.
We must go on to a future - my future, our future. After eons of
barrenness I am finally giving birth. Help me lest it all fall away
and take eons more before I get this close again to having the
children I always wanted.

(Paul D. Fernhout, Lindenhurst, NY 6/92)


The preceeding is something I just scanned in from 1992, written while I was
in the SUNY Stony Brook Ecology and Evolution PhD program (where I had gone
to learn more towards simulating gardens and space habitats). I had learned
there that it took about 10 million years to regenerate lots of biodiversity
from a large asteroid impact event, and this had happened several times in
Earth's history.

The following is a related statement also just scanned in of what inspired
it written at the same time.

--Paul Fernhout (NY Adirondack Park, Oct 2008)


If one accepted that modern industrial civilization has initiated
a great die-off of species comparable to the one sixty-five
million years ago, how should one feel about this?

Is overwhelming sadness and anger the best emotional response? On
the surface it may seem so. Apparently modern civilization and
the accompanying pollution and deforestation are pulling apart a
tapestry woven over billions of years. Anger at the short sighted
and narrow values driving industry may seem well placed.
Certainly feelings of joy and excitement would seem out of place.

Here are a few thoughts that may affect one's feelings. High
levels of biodiversity can be generated from very low ones in
about ten million years. On the time scales of the earth this may
not be a blink of an eye, but it is a short nap. To humans this
may mean a great loss, but Gaia might barely notice. It has after
all been only sixty-five million years since the last die off.

Not all species will be affected equally. A simplification will
occur where the more specialized creatures will be the most likely
to go extinct. Complex food webs will either loose species to
become simpler or they will be replaced entirely by new simpler
webs. This will create opportunities for generalists to move
into vacated niches. It will also produce more robust species and
food webs. In the long term this may make the biosphere healthier
in the same way pruning a bush makes it grow more.

New forms of life existing as ideas are now living and will likely
continue to expand. Language and culture and technology are
possible with humanity's growth. These allow new patterns to be
created and selected for, giving evolution a new canvas. Also
possible are new combinations of ideas and life as philosophies
evolve in combination with ecosystems.

A process that may well lead to the extinction of 30 to 99 percent
of all species has been initiated unintentionally. Conservation
of biodiversity should be done if only for aesthetic and spiritual
reasons. Anger and sadness should not overwhelm one and keep one
from making the best of the inevitable.- Paul D. Fernhout 6/22/92

Comment: Blowback 9/11: Why some young Saudis hate the USA (Score 3, Informative) 125

It's called "Blowback". In order to prevent another 9/11/2001 or worse, it seems important to understand the motivations behind the first one (I'm using the year to distinguish from the US-supported 9/11/1973 coup in Chile). Like you, I also doubt the Saudi government had anything to do directly with funding that 9/11. In fact, that 9/11 seems more a protest against the Saudi government by Saudi citizens, but with the protest directed at the perceived source of funding for the Saudi government by the USA. Let's turn the political situation around hypothetically to try to understand the emotional aspect of it better, imagining what it might be like if the Saudi government was meddling directly in US affairs.

Here is a first cut at trying to understand the social/psychological dynamics of the situation from a different perspective. Imagine Saudi Arabia somehow was sending billions of dollars of campaign donations annually to the USA to keep in power an oppressive administration in the USA (passing laws forcing all US women to wear burkas, only allowing males with brown eyes to hold public office or get university degrees, and with capital punishment on suspicion of premarital sex or homosexuality). Also, imagine that there were millions of Saudi soldiers stationed in US states to ensure a flow of manufactured goods to Saudi Arabia despite strikes and other unrest in the USA and nearby countries. Also imagine that the Saudis were also funding Japanese people who, from fear of earthquakes and tsunamis in Japan, had moved to Canada, bought a lot of the land, claimed a right to govern all of Canada because some Japanese people had moved to Canada 10,000 years ago across the land bridge from Siberia, and then forced most non-Japanese Canadian citizens in all of Canada to flee to the USA and were killing non-Japanese Canadians who remained and resisted the Japanese occupation. If you are a US citizen in such a hypothetical world, would you be at all upset by such a situation whatever your eye color? Imagine that some very upset and frustrated young US citizens decide to protest this situation by attacking some big buildings in Saudi Arabia by hijacking airliners to show how unhappy they are with Saudi government foreign policy and to show how they felt their hopes and dreams for a good life in the USA had been thwarted by Saudi meddling in US government. Imagine this attack is then used by Saudi Arabia to justify invading Mexico (where some of the hypothetical American hijackers trained) and Brazil (because it is claimed by the Saudis to have WMDs that hypothetical young Americans might use against Saudis). Imagine the Saudis then start supplying "intelligence" to the US government from listening to all US telephone calls about specific US citizens who might be unhappy about the situation and perhaps plotting unrest in the USA or planning more blowback against the Saudis.

Now flip this scenario around and back to reality (US funding Saudis and Israel and US troops in the Middle East) and does the fact the almost all of the 9/11 hijackers were frustrated young Saudi men make more sense?

Soon after 9/11 I saw an analysis in a magazine (maybe the Atlantic or New Yorker) of why the hijackers did what they did. I have not seen many such articles since. The point made there was that these were mostly young men whose hopes for significant advancement in Saudi society had seemed thwarted and they were led to blame the USA for that, because the USA was propping up the Saudi regime and otherwise meddling in the Middle East. Of course, being promised eternal bliss in "paradise" for becoming murderers can not be ignored as a related aspect of religious fundamentalism (including outrage about the occupation of Palestine), so there are layers of complexity here for that and other reasons. The motivations of the hijackers themselves may also be somewhat different than the motivations of the organizers at higher levels.

See also:
"The hijackers in the September 11 attacks were 19 men affiliated with al-Qaeda, and 15 of the 19 were citizens of Saudi Arabia. ... "

"The 9-11 Commission held its twelfth and final public hearing June 16-17, 2004, in Washington, DC. On June 16 the Commission heard from several of the federal government's top law enforcement and intelligence experts on al Qaeda and the 9-11 plot. It was at this hearing that the question "What motivated them to do it?" was finally asked. Lee Hamilton, vice chair of the 9/11 Commission said, "I'm interested in the question of motivation of these hijackers, and my question is really directed to the agents. ... what have you found out about why these men did what they did? What motivated them to do it?" The agents looked at each other, apparently not eager to be the one to have to say it. FBI Special Agent Fitzgerald stepped up to the plate and laid out the facts, "I believe they feel a sense of outrage against the United States. They identify with the Palestinian problem, they identify with people who oppose repressive regimes and I believe they tend to focus their anger on the United States." But this testimony was kept out of the 9/11 Commission Report and no recommendation was given to address the main motive for the 9/11 attacks."

So, it was not so much that "they hate us because we were free" (although there were some religious aspects of that). It was more that "they hate us because we fund their oppressors". Granted, there are additional layers of complexity including from religion and economics, but that is part of the bigger picture.

To bring this back to the source original article, it says: "The report also notes the MOI's use of invasive surveillance targeted at political and religious dissidents. But as the State Department publicly catalogued those very abuses, the NSA worked to provide increased surveillance assistance to the ministry that perpetrated them."

So, the USA is left in a difficult situation. Saudi citizens who resent their oppression or other treatment by a government propped up by US support still have reason to dislike the US government. But, if the US government does not help the Saudis via the NSA identify and suppress dissenting Saudi young men, then another 9/11/2001 becomes more likely in the short term, even as such a disaster or much worse becomes more certain in the long term if the USA continues to support a repressive Saudi government and otherwise take sides in Middle Eastern politics. What is the morally and politically correct solution to this dilemma? What policies should a US citizen now support? It's the kind of situation best avoided (see George Washington's farewell address which warned to avoid entanglements in foreign affairs) but it is too late for that. Also, to get to a good resolution, we have to acknowledge the truths behind the conflicts, but often conflicts include suppressing or spinning relevant details like misleadingly claiming "they hate us because we are free".

One thing I feel strongly is that given the increasing power of WMDs including bioweapons, the margin for political error grows smaller and smaller. Given that increasing risk, oppression does not seem like a good long-term strategy to ensure peace and prosperity in the 21st century. So, I feel we need to move instead towards some sort of transcendence of these 20th century (and earlier) conflicts. That included rethinking security to be mutual and intrinsic, like I mention here:

But others have been saying similar things for a long time:

And maybe we could create better software tools to help resolve such conflicts in a healthy way? As I suggested three years ago:
"This suggestion is about how civilians could benefit by have access to the sorts of "sensemaking" tools the intelligence community (as well as corporations) aspire to have, in order to design more joyful, secure, and healthy civilian communities (including through creating a more sustainable and resilient open manufacturing infrastructure for such communities). It outlines (including at a linked elaboration) why the intelligence community should consider funding the creation of such free and open source software (FOSS) "dual use" intelligence applications as a way to reduce global tensions through increased local prosperity, health, and with intrinsic mutual security."

Comment: Re:FONC: Fundamentals of New Computing -- Alan Kay (Score 1) 368

by Paul Fernhout (#47522231) Attached to: 'Just Let Me Code!'

I certainly understand the frustration of dealing will overly complex systems or also a rushed language like JavaScript where variables are globals by default. Still, did you know that you can compile almost anything to JavaScript these days and have it run in the browser at near native speeds (well, only some browsers, but likely more and more). See:
"While Google is betting on Native Client to allow web apps to execute native compiled code in the browser, Mozilla is betting on its ability to run JavaScript at near-native speeds, too. While they approach this problem from very different angles, both Google, through Native Client, and Mozilla, through its Emscripten LLVM-to-JavaScript compiler, allow developers to write their code in C or C++ and then run it in the browser."

So, JavaScript is just another platform now in that sense. But it is a platform that is almost everywhere significant for substantial human interaction... And installing JavaScript software for the end-user is as easy often-times as just surfing to a web page. If people don't actually install your software, what good is it?

Does JavaScript have problems? Yes. Tons. But it also has a lot of merits.

As for gibberish -- Cantonese sounds mostly like gibberish to me, but that is because I never learned to speak it. :-)

Would I like a simpler software stack and simpler but better languages and tools? Yes. I helped fight that battle over a decade ago like with VisualWorks/Squeak and we lost to stuff like Java, PHP, and JavaScript and the associated tool chains. Squeak showed what was possible, but almost no one would install it (the Squeak licensing confusion did not help there either). See also:
"Regular readers are quite tired of me pointing to this video, Alan Kay: The Computer Revolution hasn't happend yet. Keynote OOPSLA 1997, but I think it's quite fundamental to understand that Alan Kay had a vision for the web, and though his understanding of the role of HTML in the world of 1996 was flawed, it seems the collective web has spent the last ten years building exactly what he described, with HTML/SVG being the display substrate and JavaScript being the code to drive that display. Ten years later we have the Lively Kernel: ..."

But the past is the past. We have to start from where we are -- and today, people live in their HTML5/CSS3/JavaScript browsers or will soon (even on phones, and especially on the emerging Firefox OS phones). I'm writing this from a US$250 Chromebook that is almost entirely just a browser as far as user experience. Any sophisticated-enough system could eventually remake the stack underneath it, like native Squeak could do. So, saying we could build on JavaScript does not mean endless perpetual complexity. Chrome OS shows how a focus on HTML/CSS/JavaScript can sometimes simplify things though from one perspective, especially user experience.

There are several issues related to complexity (inherent complexity, accidental complexity, user expectations, installability, standards, etc.). Regardless of technical merit, HTML/CSS/JavaScript/PHP won in key areas. Sure, you can create the next Squeak, and good luck with that, it is a fun project. And/or we can try to use the current widespread platform as best as we can. For me right now, that means minimizing the backend (PHP or whatever) while emphasizing the front-end (JavaScript) and ideally encoding data in useful long-term forms.

And for those who like their Smalltalk deployed as HTML/CSS/JavaScript, see:
"The Amber language is deeply inspired by Smalltalk. It is designed to make client-side development faster and easier. Amber includes a live development environment with a class browser, workspace, unit test runner, transcript, object inspector and debugger. Amber is written in itself, including the compiler, and compiles into efficient JavaScript, mapping one-to-one with the JS equivalent."

As Manuel De Landa wrote:
"Certain standardizations, say, of electric outlet designs or of data-structures traveling through the Internet, may actually turn out to promote heterogenization at another level, in terms of the appliances that may be designed around the standard outlet, or of the services that a common data-structure may make possible."

And that is what we are seeing with JavaScript now, where you can run anything from a KIM-1 to a Commodore C64 to Linux on it:

Comment: Serval Mesh Networking for Android (Score 3, Informative) 60

by Paul Fernhout (#47521955) Attached to: How the Internet of Things Could Aid Disaster Response

From: and http://developer.servalproject...
"Serval Mesh is an Android app that provides highly secure mesh networking, voice calls, text messaging and file sharing between mobile phones using Wi-Fi, without the need for a SIM or any other infrastructure like mobile cell towers, Wi-Fi hotspots or Internet access."
1. Communicate anytime
Mobile phones stop working when cellular infrastructure fails. The Serval Mesh changes this, allowing mobile phones to form impromptu networks consisting only of phones. This allows people nearby to keep communicating when needed most.
2. Communicate anywhere
Cellular networks are not available everywhere. In Australia for example, around 75% of the land area lacks mobile coverage. Letting mobile phones form stand-alone networks provides a cost-effective solution for communities in these remote areas to enjoy mobile communications.
3. Communicate privately
In this modern world private conversation with friends, families and service providers is vital, whether discussing medical issues or other private subjects. The Serval Mesh is built on a foundation engineered to support security. Voice calls and text messages are always end-to-end encrypted using strong 256-bit ECC cryptography. Encrypted calls work even on low-cost Android phones.
4.Communicate with people
The Serval Mesh is about enabling people to communicate with one another, regardless of what circumstances may befall them, or where they live in the world. Because at the end of the day, relationship with one another is what life is all about.

Serval was one of the first things I installed on a trio of cheap Android phones I bought for Andriod development and testing purposes several months ago (the Kyocera Hydro phones themselves ranged from US$35-$55 in price each). Still has rough edges, but getting there.

The Serval project is also working towards cheap rugged repeaters. "The Serval Mesh Extender is a hardware device that helps other devices to join and participate in a Serval Mesh network. ... Mesh Extenders mesh together over short distances using Ad Hoc Wi-Fi, over longer distances using packet radio on the ISM 915 MHz band"

I suggested related ideas back around 2000 based on two-mile range radios:
"[unrev-II] The DKR hardware I'd like to make..."

Very cheap insurance to make sure people have these sorts of devices for an emergency, which these days would not cost much more than a decent US$100 "weather radio" even with basic Smartphone features...

Comment: Solutions -- require tokens & connection phase (Score 0) 128

by Paul Fernhout (#47521847) Attached to: The Psychology of Phishing

In the past, I used whether an email contained my first name as an indicator (a textual token) of whether the email was legitimate, as a sort of password to gain access to your attention. That stopped being useful several years ago as many spammers must have a name database to go with email addresses now. That also would not work for people whose entire first name was in their email address, as is often a corporate practice. Still, the idea of filtering email on a token can make sense, where the token says the sender has been authorized to send you email.

I still have filters for certain keywords like products I support as a way of doing some of this filtering. A next step could be to tell people (on a contact web page) that they need to include some token phrase like "swordfish" in any email to you if they want it to get read as a first-time sender. Or the token could be a random uuid like "f34f775b-3ccb-45e0-a75e-06f845f0c318". It is relatively easy to make filters in many email clients that would prioritize emails with an expected token. After you get such an email from someone the first time, you can whitelist the sender. Granted, phishing or spam often forges sender email addresses. So, there is a problem here that the validity token ideally should be in every email sent to you to avoid relying on whitelisting address.

Ideally, there could be one unique token per entity (or email address) you want to get emails from. Then you could selectively disable and change the token if spammers got one. These tokens then are specific to an allowed communications channel. That requires more complexity though. For example, when you signed up for a mailing list, you could give the list a token such as the above (or perhaps just accept a random one from the list signup procedure), and the list software would store that token to include in a header when it sends a message to you. You would also tell your email client about the token being associated with the sender somehow (either the email address or the sender name or perhaps some other unique sender identifier like a public key). When your client software receives email, it would check if the email has the expected token for the sender. If the email does not have the token, it would be marked as probably spam or phishing. Email tools would need to have this facility built into them, both for sending and receiving. Public mailing lists might need to filter out such tokens from their public web pages of email archives to prevent spammers from harvesting such data to spam the list.

Still, how can people contact you the first time? One answer is to separate the process of getting emails from a trusted source from the process of requesting a token. For example, when someone new wanted to contact you, they could need to go to a web page (or other means) and get a token for their sending email address (or other identifying information, like a public key). That web page might include some sort of captcha challenge or something requiring computational cost or even direct monetary cost (like a small amount of money required to be spent via Paypal or another service, perhaps as a donation to a favorite charity). A web form to do this might need to send a special email to your client that includes both its own token and the new sender and new token, which would need to be processed by your email client to make the association.

This would be a big difference from now, when the first contact you get from someone new might be directly via a new email which could be the spam or phishing attempt. Tokens could also be valid for a limited time. There could even be general tokens not associated with a specific email address, perhaps time-limited ones, ones that need to be paired with other tokens or perhaps topical key words (like a product name) to be considered valid. This does make it harder for senders to send emails, but it makes it more likely they will be read and not ignored as spam.

One advantage of this system is it could build on top of the current email architecture. Clients that don't support such tokens would just not work as well because they would not be able to distinguish Spam of Phishing as well, and emails they send without such a token would be more likely to be ignored.

There are other approaches of course to reduce spam and phishing. There are already mail receivers that will ask a first time sender to confirm identity or do greylisting. There are domain-oriented solutions too like DMARC:

But a token-based system just seems appealing to me because it sort-of worked for me for a time (based on my first name). I'm sure spammers or phishers would find some new way to get around these channel tokens eventually, but it seems like a next step in the evolutionary arms race of validating wanted communications. If tokens were associated with public keys which represented identities, a next step could be to sign the entire email or at least the token and a timestamp and message ID with the associated private key. This approach relies also on the fact that much email being sent is now encrypted all along the way.

There is at least one big flaw in this approach though. What to do about the CC or BCC list? Ideally, each recipient should get a token specific to the recipient. That seems to imply each recipient will have the email sent directly to him or her or it. But that is not how email servers work now, where one server might dispatch a single email to multiple destinations. So, still things to think through, including how much email servers should get involved with such tokens.

Paul Jones has his #noemail campaign as one potential solution to email woes, but I feel that throws the locally-stored email message center baby out with the spam & tl;dr bathwater. Paul Jones pushes social media and blogs as an alternative to email, which have their merits (see below at end), but are still suffering from more and more spam too. Web solutions also make it harder to have a local copy of correspondence. For example, I have many years of emails in my local email archive which I can search and review locally including to mailing lists, but l have little history of what I have read or posted via the web. Still, private email has its limits. As with my immediately previous Slashdot post referencing a post to the FONC mailing list, I can find some of my emails to public lists via Google. Using Google to find emails I wrote to public lists can be easier than searching my my email archive which is on a different machine than I post to Slashdot from often. And it is great to be able to link to such posts via a URL. I've started saying, "if it does not have a URL, it is broken". Ultimately I feel we need something that combines the best of email and the best of the web like perhaps a "social semantic desktop" such as I and others have worked towards. That could have a better infrastructure than email with anti-spam protections built-in (including perhaps public key authentication of senders, and perhaps even using DNS records to associate public keys with domains).

Comment: FONC: Fundamentals of New Computing -- Alan Kay (Score 3, Insightful) 368

by Paul Fernhout (#47520095) Attached to: 'Just Let Me Code!'

We are faced with a need for significant action and the odds are stacked against us. Invention receives no attention, and innovation (even when incorrectly understood) receives lip service in the press but no current-day vehicle exists to to nurture it. This wiki is an open invitation for talented individuals to pool their energy and collaborate towards fundamentally changing computing.

Over the years many groups have debated how to make progress in computing. There were likely as many opinions as there were people in the debates. Nevertheless personal accounts suggest that initiatives were sometimes reduced to a handful and then pursued with vigour. Consider what could be achieved by following the same pattern today, with the added benefit of doing it as a virtual, distributed team.

Our goal could be to capture the significant ideas and initiatives that we have been exposed to, are aware of, or can discover, distil them into groups, reduce them to a handful of concepts worthy of vigorous exploration, and focus our efforts on these common ideas with the eventual aim of making substantial progress towards finding a common set of fundamentals of new computing.

See also:

A big focus of FONC was in reducing lots of complexity. Smalltalk shows what is possible... But in practice new languages and new standards often just add more complexity to the mix and what we often need are better tools for dealing with complexity. And community and trends mean a lot too, as does hireability and ubiquity and easy installability. So, again, in practice, I'm moving to JavaScript with conceptually simple backends (even in, yikes, PHP) -- inspired in part by Dan Ingall's own work with the Lively Kernel which shows what is possible as near-zero-effort-to-install JavaScript apps.

My own thoughts on FONC from 2010:
"fonc] On inventing the computing microscope/telescope for the dynamic semantic web"
Biology made a lot of progress by inventing the microscope -- and that was done way before it invented genetic engineering, and even before it understood there were bacteria around. :-)

What are our computing microscopes now? What are our computing telescopes? Are debuggers crude computing microscopes? Are class hierarchy browsers and package managers and IDEs and web browsers crude computing telescopes?

Maybe we need to reinvent the computing microscope and computing telescope to help in trying to engineer better digital organisms via FONC? :-) Maybe it is more important to do it first? ...

It's taken a while for me to see this, but, with JavaScript, essentially each web page can be seen like a Smalltalk ObjectMemory (or text-based image like PataPata writes out). While I work towards using the Pointrel System to add triples in a declarative way, in practice, the web of calling cgi scripts at URLs is a lot like message passing (just more like the earlier Smalltalk-72 way without well-defined syntax). So, essentially, a web of HTML pages with JavaScript and CGI on servers is like the Smalltalk system written large. :-) Just in a very ad hoc and inelegant way. :-)


Comment: Ingsoc (Score 5, Insightful) 82

"The German Nazis and the Russian Communists came very close to us in their methods, but they never had the courage to recognize their own motives. They pretended, perhaps they even believed, that they had seized power unwillingly and for a limited time, and that just round the corner there lay a paradise where human beings would be free and equal. We are not like that. We know that no one ever seizes power with the intention of relinquishing it. Power is not a means, it is an end. One does not establish a dictatorship in order to safeguard a revolution; one makes the revolution in order to establish the dictatorship. The object of persecution is persecution. The object of torture is torture. The object of power is power." George Orwell - "1984"

Comment: Look into adequate vitamin D for joint pain (Score 1) 529

And also eating more vegetables and fruits (such as Dr. Joel Fuhrman's work or Dr. Andrew Weil's work) to reduce inflammation. You might also be sensitive to some compounds in food, such as in the nightshade family (like tomatoes) or possibly other things (food additives, etc.)

If you want true alternatives. gold and guns/ammo won't help. All that can be confiscated.

I collected some better solutions at this link and elsewhere on my site:
"This article explores the issue of a "Jobless Recovery" mainly from a heterodox economic perspective. It emphasizes the implications of ideas by Marshall Brain and others that improvements in robotics, automation, design, and voluntary social networks are fundamentally changing the structure of the economic landscape. It outlines towards the end four major alternatives to mainstream economic practice (a basic income, a gift economy, stronger local subsistence economies, and resource-based planning). These alternatives could be used in combination to address what, even as far back as 1964, has been described as a breaking "income-through-jobs link". This link between jobs and income is breaking because of the declining value of most paid human labor relative to capital investments in automation and better design. Or, as is now the case, the value of paid human labor like at some newspapers or universities is also declining relative to the output of voluntary social networks such as for digital content production (like represented by this document). It is suggested that we will need to fundamentally reevaluate our economic theories and practices to adjust to these new realities emerging from exponential trends in technology and society."

Learning more about health creation for yourself falls in part under subsistence production... And also the gift economy,,,

A rolling disk gathers no MOS.