U.S. Senator and 2016 Democratic presidential candidate Bernie Sanders introduced the Pay Workers a Living Wage Act on Wednesday, a bill that would increase the federal minimum wage to $15 per hour. However, an ad seeking interns on his Senate office’s website offers to pay them only $12 per hour.
A screenshot, seen below, of Sanders’ ad offering to pay $12 per hour to Senate interns shows that it appears directly adjacent to a picture of Sanders speaking at a rally calling for a national $15 hourly minimum wage.
“The federal minimum wage has not been raised since 2009. Increasing the minimum wage would directly benefit 62 million workers who currently make less than $15 an hour, including over half of African-American workers and close to 60 percent of Latino workers. If the minimum wage had kept up with productivity and inflation since 1968, it would be more than $26 an hour today,” claimed a press release on the bill by Sanders’ Senate office.
The press release continued, “State and cities are acting on their own. New York’s Wage Board today is expected to approve a new $15 minimum hourly pay for the state’s 200,000 fast food workers. Washington, D.C., and Kansas City, Missouri, are considering raising the wage. Los Angeles, Seattle, and San Francisco already passed ordinances raising their minimum wage to $15 an hour. Twenty-six states already enacted minimum wage increases.”
For those seeking stealth and anonymity online, a radio device known as ProxyHam was a highly anticipated new tool set to debut at the DefCon hacker conference next month. Now it’s just staged its own disappearing act.
Late Friday, the Twitter feed for Rhino Security, the consultancy run by the project’s creator Ben Caudill, announced that Caudill’s talk was being pulled from the DefCon line-up, and that the ProxyHam project was being called off. “Effective immediately, we are halting further dev on #proxyham and will not be releasing any further details or source for the device,” the message read. “Existing #proxyham units will be disposed of and no longer be made available at [DefCon]”
Just a couple weeks earlier, Caudill had enthusiastically described ProxyHam to WIRED as “that last-ditch effort to remain anonymous and keep yourself safe.” The $200 open-source, dictionary-sized networking device, which Caudill had said Rhino Security would be selling to DefCon attendees at cost, used a 900 megahertz radio to connect to an antenna dongle on a computer as far as 2.5 miles away. The result would be that an anonymous user could plant the ProxyHam in a library or coffee shop, then use that location’s Wi-fi via ProxyHam’s radio connection from the comfort and safety of their home.
With the ProxyHam, the link between IP addresses and physical locations is severed. ProxyHam uses a 900MHz radio link to bridge a WiFi network over miles. By hiding a ProxyHam base station in a space with public WiFi, anyone can have complete anonymity online; if the government comes to take you down, they’ll first have to stop at the local library, Starbucks, or wherever else has free WiFi.
The ProxyHam box contains something with an RJ45 connector on one end, and two RF connectors on the other. A quick perusal of Newegg lands on this, a radio base station designed to bridge networks via 900MHz radio. You’ll need to buy two of those to replicate the ProxyHam.
The Wired article describes the ProxyHam further: “…a Raspberry Pi computer connected to a Wi-Fi card and a small 900 megaherz antenna…” Newegg also stocks Raspberry Pis, antennas, and WiFi adapters. You might want to pick up a few SD cards too.
To set up the ‘throwaway’ part of the ProxyHam, you’ll need to first connect to the desired WiFi network, then bridge the WiFi and wired connections. Bridging networks with the Raspberry Pi is left as an exercise for the reader with sufficient Google-fu. Of course the 900MHz base station must also be configured, but according to the user guides on the Ubiquiti product page it’s not much harder than configuring a WiFi router. Set the radio to ‘bridge’ mode.
From there, it’s a simple matter of connecting a large yagi antenna to the ‘mobile’ part of the ProxyHam. Here’s how you build one. Configure the base station, and plug an Ethernet cable into a laptop. Congratulations, you’ve just replicated a talk at DEFCON by buying stuff from Newegg.
That’s how you build a ProxyHam. That’s also how to violate the FCC Part 97 prohibition against encryption – you can not use SSH or HTTPS over amateur radio. It’s also how you can be charged with the Computer Fraud & Abuse Act; connecting to a library’s WiFi from miles away is most certainly, “exceeding authorized access.”
Do not attempt this build. It’s illegal, it’s dumb, and the 900MHz band is flooded anyway. Also, if your plan for anonymity online revolves around stealing WiFi from Starbucks, why not just steal Starbucks WiFi from the McDonald’s across the street?
Alas, poor Flash. The trajectory from cool innovation to Web must-have, to reviled technology was dramatic, but there’s no doubt that the time has come: Flash has to go.
Flash entered our lives around the same time as the World Wide Web, though it began its existence as a drawing program for PenPoint OS. It wasn’t until 1996, after Macromedia bought the original developer, that Flash received a new name and a new mission — enabling animation on websites. Macromedia continued to develop Flash until the company was acquired by Adobe in 2005. Under Adobe, Flash became a Web animation juggernaut.
It didn’t take long for the backlash to build. Flash had some notable issues and at least one famous detractor — Steve Jobs’s 2010 open letter listing the reasons Flash wasn’t part of the iOS universe was for some a watershed moment. The hate for Flash wasn’t universal, though: Air, the system that allows Flash to be used as the basis for standalone applications, was named the best mobile development environment at CES for both 2014 and 2015.
Air isn’t enough reason to save Flash, though. It’s no longer required, and the alternatives have become better with each passing year. This week, another nail in the coffin arrived when Mozilla prevented Flash from running on its Firefox browser. It’s time, therefore, for Flash to ride into the sunset (probably in an animated clip featuring kittens riding cartoon unicorns).
Recently the House Agriculture Committee approved a controversial bill that would ban states from enacting mandatory labeling laws as well as regulations on genetically engineered foods.
House Resolution 1599, known as the Safe and Accurate Food Labeling Act to supporters and the DARK act by critics, would overturn current state laws requiring labeling of genetically engineered (GE) foods, as well as prevent future labeling laws from being passed on the state or local level.
Now that the Committee has approved the bill it moves towards a full vote in the House before moving on to the Senate where it will likely face opposition from Democrats. The bill currently has 106 cosponsors, 91 Republicans and 15 Democrats.
After the committee approved the measure Pamela Bailey, CEO of the Grocery Manufacturers Association (GMA), released a statement claiming that the legislation will ensure that Americans have accurate, consistent information about their food rather than a 50 state patchwork of labeling laws that will only prove costly and confusing for consumers, farmers and food manufacturers.”
When chatting on websites or social media or in forums, do not give out personal information about yourself, where you live, work, etc.Even if you are talking to people you know you maybe visible to other parties.
Do not use your primary email address (the one your ISP gave you) anywhere except to family members, close friends or trusted people. Instead create for yourself a web-based email account such as yahoo, hotmail, dynamitemail, mail.com, etc. and use this e-mail address to signing up for services, when in the need to give your mail to download something, or to publish on your homepage.
When signing up for services on the web, don’t give your real information like address, phone number and such unless you really need to do so. This is the kind of information that information gathering companies like to get, so that they can sell out and fill your mailbox with spam.