Latest Posts

French Toast Casserole

French Toast Casserole

With this French toast casserole, you skip the hassle of standing by the stove and pan-frying each individual slice of French toast.

Instead, you just throw everything into a dish and let the oven do the work! You can even assemble the casserole the night before and bake it the next morning.

You still get all the best parts of a slice of French toast, but with far less effort: soft and custardy middles, cinnamon-infused edges, plus an extra-crunchy toasted topping.

Continue reading "French Toast Casserole" »

Donald Trump, hacking news, Hilary Clinton, Obama, Presidential election, Russian hackers, us election
hacking news, netgear nighthawk, netgear router hack, netgear wireless router
American, Angry American, Books, mindset, Newbies, preparedness, prepper, Prepper Mentality, prepper mindset, Preppers, Prepping Academy

Prepping for SHTF scenarios with Angry American

Prepping for SHTF scenarios with Angry American Forrest & Kyle “The Prepping Academy” Listen in player below! Forrest and Kyle are interviewing author Chris Weatherman. Some folks may know Chris by another name though. Angry American. Chris is a successful author with more than a few novels under his belt. His “Going Home” series is a … Continue reading Prepping for SHTF scenarios with Angry American

The post Prepping for SHTF scenarios with Angry American appeared first on Prepper Broadcasting |Network.


10 Top Enemies of Ancient Rome

Roman civilization grew by destroying hundreds of others. In this process, many brave men and women challenged the almighty Roman army in the name of freedom, and even the Romans expressed their admiration for their deeds and courage. Today, many of these names are still considered a symbol of independence, determination, and national pride. 10 Pyrrhus Of Epirus In 280 BC, as Rome was conquering Southern Italy, the Greek city of Taras (modern-day Taranto) called for the aid of Pyrrhus (c. 319–272 BC), a Greek commander and king of the city of Epirus in present-day Northwest Greece. Pyrrhus answered Taras’s … Continue reading

The post 10 Top Enemies of Ancient Rome appeared first on LewRockwell.


The US Is Funding Terrorists in Syria

Rep. Tulsi Gabbard (D-HI) may have more sense than all the other democrats (and most republicans) in congress put together. Ms. Gabbard appeared on the Chutzpah News Network (CNN) and answered questions about her alignment with President-elect Donald Trump on foreign policy. Gabbard denounced the US policy of regime change and support for radical Islamic terror in Syria, accusing Washington of direct material support to the terrorists. Jake Tapper: “Are you really suggesting that US govt is funding these terrorist groups?” Tulsi Gabbard: “Ah, I’m not only ‘suggesting’ it. This is… this IS the reality that we’re living in.” Tapper: “Not directly … Continue reading

The post The US Is Funding Terrorists in Syria appeared first on LewRockwell.


We Need Answers to This Libertarian Quiz

Challenge: Which institution would I de-fund 100%? I would eliminate all funding for education, including all of the military academies. Most people would probably choose a federal program to eliminate. I wouldn’t. I think all government begins with self-government and then extends to three institutions: family, church, and state. My slogan is “Politics fourth.” Judicial sovereignty lies with the individual. Why? Because the individual is responsible for his own actions. If individuals do not govern themselves, there is not sufficient power anywhere else in society to force all men to do the right thing, or the predictable thing, or the … Continue reading

The post We Need Answers to This Libertarian Quiz appeared first on LewRockwell.


Has the Revolution Begun?

The wailing and keening over the choice of Oklahoma Attorney General Scott Pruitt to head the EPA appear to be a lead indicator of a coming revolution far beyond Reagan’s. “Trump Taps Climate Skeptic For Top Environmental Post,” said The Wall Street Journal. “Climate Change Denial,” bawled a disbelieving New York Times, which urged the Senate to put Pruitt in a “dust bin.” Clearly, though his victory was narrow, Donald Trump remains contemptuous of political correctness and defiant of liberal ideology. For environmentalism, as conservative scholar Robert Nisbet wrote in 1982, is more than the “most important social movement” of … Continue reading

The post Has the Revolution Begun? appeared first on LewRockwell.


Why Did Japan Choose a Suicidal War in 1941?

Seven decades after Japan’s surprise attack on Pearl Harbor some truth is finally beginning to emerge from the miasma of propaganda that still clouds our vision of World War II. It seems clear by now that President Franklin Roosevelt’s White House knew from deciphered  codes that Japan was planning an attack on America’s key naval base in Hawaii. Shamefully, the senior US Navy and Army commanders at Pearl Harbor were not informed of the impending attack. The US Navy’s three aircraft carriers were coincidentally moved far from harm’s way before the attack, leaving only obsolescent World War I battleships in … Continue reading

The post Why Did Japan Choose a Suicidal War in 1941? appeared first on LewRockwell.


Can You Cure the Incurable?

Written with an eloquent flowing style, this book makes the case for Vitamin C as a remarkable medicine that has been overlooked by the medical establishment. Although the crowning achievement of modern medical science is the invention of antibiotics which cures bacterial infections, we have no antibiotics effective for acute viral illness. Dr. Levy says this is incorrect because Vitamin C is a curative “antibiotic” for viral diseases when used properly in high enough dosage by IM or IV route. Dr. Levy’s book makes a number of points: 1) Vitamin C is not really a vitamin needed in trace amounts, … Continue reading

The post Can You Cure the Incurable? appeared first on LewRockwell.


Mischievous Climate Worries

Modernity is a capitalistic phenomenon. It is the result of free-market industrial competition based on the security of private property, unregimented personal enterprise, specialized competence engaged via voluntary contractual exchange and unprotected profit-and-loss capitalization and management. While the results of such a social paradigm are eagerly sought the world over, the methods involved are often misunderstood, misconstrued, misapplied and even banned by force of arms, which leads to chicanery, corruption, waste, and failure. Modernity is not universally welcome among all the people of the Earth. Many believe that modernity has whetted man’s energy and goods appetite to the point where … Continue reading

The post Mischievous Climate Worries appeared first on LewRockwell.


How To Be a Billionaire

PALM BEACH, Fla.—Now that President-elect Trump has promised to supercharge the economy, vanquish China as a trade competitor, and make us all billionaires, you might be a little confused. You’ve never been a billionaire. You don’t know where to start. I’m here to help. First of all, you’re gonna need a suit. I can already hear your objections. “I don’t need a suit. I have three suits.” But you’re a billionaire now. You can’t wear those suits anymore. Billionaires don’t wear suits from Men’s Wearhouse, or Joseph A. Bank, or Brooks Brothers. You can go to the finest Armani boutique … Continue reading

The post How To Be a Billionaire appeared first on LewRockwell.


Sick and Evil

There is nothing wrong with insurance … provided you can say no to it. Then it’s like any other thing you choose to buy. Whether it makes sense to buy it – a subjective value judgment, by the way – isn’t the point. Exercise makes sense, too. The point is – or should be – if insurance is something you want, or feel the need of – then you have the right to choose to buy it. What you haven’t got is the right to force others to buy it – and thereby take away their free choice. Insurance at gunpoint is dark … Continue reading

The post Sick and Evil appeared first on LewRockwell.


Classic Vanilla and Chocolate Marbled Bundt Cake

Vanilla Chocolate Marbled Bundt Cake

I do love a good bundt cake. I feel like they’re somehow less fussy and formal than layer cake, but still, you know… Cake.

That’s why I zeroed right in on this recipe for Vanilla and Chocolate Marbled Bundt Cake in my friend Irvin Lin’s new cookbook, Marbled, Swirled, and Layered. 

He makes it with a chocolate-coffee syrup swirled into the batter. Plus chocolate chips. Plus a thick vanilla glaze over top. Game, set, match.

Continue reading "Classic Vanilla and Chocolate Marbled Bundt Cake" »

computer virus, Decryption keys, malware, popcorn ransomware, ransomware, ransomware malware, TeslaCrypt Ransomware

This Ransomware Unlocks Your Files For Free If You Infect Others

Is your PC infected with Ransomware? Either pay the ransom amount to the attacker or spread the infection further to get the decryption keys. Yes, this new technique has been employed by cyber criminals with the latest round of ransomware threat, dubb...
android apps, GPS location tracking, how to trace location, location history, location track, tracking location, Uber app

Uber Now Tracks Your Location Even After Your Ride

Uber was in controversies at the mid of this year for monitoring the battery life of its users, as the company believed that its users were more likely to pay a much higher price to hire a cab when their phone's battery is close to dying. Uber is now ...
blackouts, collapse, Cyber Warfare, disaster, E.M.P., Electromagnetic Pulse, Energy Alternatives, GRID, grid down, hackers, power grid, Prepping for Tomorrow, Solar


GRID DOWN! A history + preparedness solutions by Sol-Ark (Two Part Analysis) Bobby Akart “Prepping For Tomorrow” Audio in player below! On the next two week’s episodes of the Prepping for Tomorrow program, Author Bobby Akart discusses the number one concern of most preppers—a collapse of the power grid. Do you think this is only … Continue reading GRID DOWN!

The post GRID DOWN! appeared first on Prepper Broadcasting |Network.

email hacking, hack yahoo email, hacking news, How to hack email, Vulnerability, XSS vulnerability, Yahoo bug bounty

Yahoo Flaw Allowed Hackers to Read Anyone’s Emails

Yahoo has patched a critical security vulnerability in its Mail service that could have allowed an attacker to spy on any Yahoo user's inbox. Jouko Pynnönen, a Finnish Security researcher from security firm Klikki Oy, reported a DOM based persistent XSS (Cross-Site Scripting) in Yahoo mail, which if exploited, allows an attacker to send emails embedded with malicious code. <!-- adsense --> In

Crispy Parmesan Potato Stacks


When the weather gets colder, I turn to baked potatoes for comfort. It’s the perfect excuse to turn on the oven and warm up the house. Besides who doesn’t want a side of roasted taters for dinner?

These crispy Parmesan potato stacks are a fun twist on your standard baked potato, and they’re surprisingly easy to make.

Continue reading "Crispy Parmesan Potato Stacks" »

Cyber-crime, exploit kit, hacking news, hacking software, hacking tool, malware author, malware development, Russian hackers

Russia proposes 10 Year in Prison Sentence for Hackers and Malware Authors

The Russian government has introduced a draft bill that proposes prison sentences as punishment for hackers and cyber criminals creating malicious software used in targeting critical Russian infrastructure, even if they have no part in actual cyber attacks. The bill, published on the Russian government’s website on Wednesday, proposes amendments to the Russian Criminal Code and Criminal
advertising, android, apple, Bell, Christopher Parsons, Data mining, Google, Identity Management, IMEI, IMSI, IMSI Catchers, Internet, Location, Mobile, Mobile Device Identifiers, pipeda, Privacy Online, Privacy Tech-Know Blog, Private Organizations, Rogers, Stingray, telecommunications, Telus, tracking

Privacy Tech-Know Blog: Uniquely You: The identifiers on our phones that are used to track us

Canadians’ mobile devices are filled with applications that collect personal information, including identifiers that are engrained into different parts of the devices. But what exactly are these identifiers, and how are they used? An identifier is a piece of information (usually a sequence of characters) that’s used to uniquely identify a device, a user, or […]
Balyoz, click fraud, ddos attack, Distributed Denial of Service attacks, hacking news, Turkish Hackers

Turkish Hackers Are Giving Away Prizes For Participating In DDoS Attacks

DDoS has become a game now that could knock any service offline. A Turkish hacking group is encouraging individuals to join its DDoS-for-Points platform that features points and prizes for carrying out distributed denial-of-service (DDoS) attacks against a list of predetermined targets. The points earned can later be redeemed for various online click-fraud and hacking tools. Dubbed Sath-ı
Diversifying, Diversifying Income, Economy, finance, Financial Collapse, Gold, I Am Liberty, income, Silver
Chicken, Chicken Stew, Main Course, Pomegranate, Soup and Stew, Stew, Walnut

Chicken Stew with Walnut and Pomegranate Sauce (Fesenjan)

Fesenjan Persian Chicken Stew

Here is a stew made for fall! This Chicken Stew with Walnut and Pomegranate Sauce recipe is a classic preparation in Persian cooking, going by the name “Fesenjan”.

Chicken pieces are first browned and then slowly cooked in a sauce with ground toasted walnuts and pomegranate molasses. You might not normally think to make a sauce with walnuts and pomegranates, but it’s a perfect combination!


Continue reading "Chicken Stew with Walnut and Pomegranate Sauce (Fesenjan)" »

Cyber Criminal, Cyber-crime, hacking Celebrity, hacking news, sex tape
denial of service, hacking news, how to hack linux, Linux hacking, Linux kernel, Linux kernel exploit, Linux security, Linux Vulnerability, server hacking, Vulnerability
Antivirus, exploit kit, hacking news, malicious advertisement, malware, Stegano exploit kit, Steganography, targeted advertising

Hacking Millions with Just an Image — Recipe: Pixels, Ads & Exploit Kit

If you have visited any popular mainstream website over the past two months, your computer may have been infected — Thanks to a new exploit kit discovered by security researchers. Researchers from antivirus provider ESET released a report on Tuesday stating that they have discovered an exploit kit, dubbed Stegano, hiding malicious code in the pixels of banner advertisements that are currently
Are we as free as we think, bushcraft, Finding Freedom, free, freedom, Government, Homesteading, Prepping

Are we as free as we think?

Are we as free as we think we are? Richard McGrath “Finding Freedom” Audio in player below! This week on Finding Freedom Special guest Chris Weatherman “AKA” Angry American, author, prepper, and survivalist. Chris was also on season 1 of History’s hit show Alone. Chris’s book series i one of my favorites, starting with Going … Continue reading Are we as free as we think?

The post Are we as free as we think? appeared first on Prepper Broadcasting |Network.

Dairy, Food preservation, Food Waste / Saving Money, Freeze Drying Ideas & Recipes, Rehydrating

Rehydrating Freeze Dried Dairy

Freeze-dried dairy products are some of the most versatile ingredients you can have in your pantry. Dairy is not only easy to freeze dry, it’s easy to rehydrate and use in recipes. For example, yogurt is high in protein, so adding it to your breakfast oatmeal adds to the nutritional content. Yogurt drops are a […]
Corporate, Enduser, ESG Lab, Intercept X, Sophos Intercept X, testing

Independent testing: Intercept X makes the grade!

If you read the Sophos Blog, you will undoubtedly be aware of how our next-gen endpoint solution can protect you and your business. Sophos is really proud of Intercept X and genuinely believes it’s the best product of its kind out there. However, we realise that you may want to hear independent opinions as well, […]

Chocolate Peppermint Swiss Roll

Chocolate Peppermint Swiss Roll

Chocolate Swiss rolls are such an eye-catching holiday treat, aren’t they?

I’ve made this one with a peppermint whipped cream filling, rich chocolate ganache on the outside, and a crushed peppermint candy sprinkled on top, giving it a particularly festive, wintry air.

The light, springy cake practically melts in your mouth. If you’re looking for a show-stopper dessert for your holiday table, this is it.

Continue reading "Chocolate Peppermint Swiss Roll" »

exploit code, Firefox, linux, Naenara, North Korea, operating system, Red Star OS, remote code execution, Secure Operating System, Vulnerability

North Korea’s Linux-based Red Star OS can be Hacked Remotely with just a Link

North Korea's own homegrown computer operating system, that's supposed to be fully hacker proof and more secure than foreign OS, like Microsoft's Windows, can easily be hacked remotely. A group of hackers managed to break into Red Star OS — North Korea's government sanctioned Linux-based OS — using just a link. Red Star OS is North Korea's own homegrown OS that looks remarkably just like
Black market, Credit Card Fraud, credit card hacking software, credit card security, debit card hacking, hacking credit cards, hacking news

[Video] How to Hack a Credit Card in 6 Seconds, Experts Reveal

As India attempts an upgrade to a cashless society, cyber security experts have raised serious concerns and revealed how to find credit card information – including expiration dates and CVV numbers – in just 6 Seconds. And what's more interesting? The hack uses nothing more than guesswork by querying multiple e-commerce sites. In a new research paper entitled "Does The Online Card Payment
electric, Energy Alternatives, heat sources, Heating, Keeping Warm with Winter Preps, oil, Preps, propane, Tech Preps, Technology, Winter, Winter Preps, Winterization, wood stoves
BCrypt, DailyMotion, data breach, Data Security, hacking news, password cracking, password hashes, video website

DailyMotion Hacked — 85 Million User Accounts Stolen

Another day, another data breach. This time a popular video sharing platform DailyMotion has allegedly been hacked and tens of millions of users information have been stolen. Breach notification service LeakedSource announced the data breach on Monda...
Harvest Right

Harvest Right Featured in Paratus Business News

Paratus Business News, a trade magazine targeting the survival industry, recently published an article about Harvest Right home freeze dryers. During major election cycles, it’s easy to get caught up in all the excitement and hyperbole about change and the future. But today, there is a difference. It’s called the Harvest Right Home Freeze Dryer, […]

Mini Salmon Quiches

Mini Salmon Quiches

These little quiches are perfect for a party, either as a part of a big spread or to take to a potluck at a friend’s house. They’d also be a welcome addition to any brunch menu.

They also couldn’t be easier. Use store-bought puff pastry for the crust, and smoked salmon, cream cheese, and scallions in the filling.

Continue reading "Mini Salmon Quiches" »


Kids and IoT

The field of the Internet of Things ("IoT") is developing and expanding at a dizzying speed. More and more of our devices are "smart" devices, connected to the internet, from our phones to our watches and even our fridges. According to research by the Gartner consultancy there are currently around 6 billion internet-connected devices in use worldwide and figure is set to grow to over 20 billion by 2020.

The increased use of this technology is seen across the board in the post-millennials, who have never known a world without it. This generation, most of whom are still children (in the privacy sense of the word, which we will explain further down), have been constantly exposed to IoT with (relatively) easy access from a very early age, to items such as parents' smartphones to interactive dolls.  And this means that, indisputably, they are more tech savvy than any prior generation. 

Processing personal data is an intrinsic part of how IoT products work. Whether or not these products are targeted at children, many of them are likely to be used by children and collect their data.  It is therefore necessary for IoT data controllers to have an approach for how they will treat children's data and to be aware of the privacy rules regarding children, especially under the EU's General Data Protection Regulation ("GDPR") taking effect on 25 May 2018.  This is particularly important if your product is likely to be used by children, whether or not it is targeted at them.

However, it isn't all bad news. With tech savvy kids, comes a world of IoT of business opportunities in processing children's' data and creating bespoke products for the children of the new millennium; opportunities which can be exploited if children's privacy rights are adequately upheld.

So what do you need to know?

1. "Being technologically of age" varies in each country:

The first step is to clearly identify which individuals are considered "children" under privacy law. For example, the default position under GDPR is that any person under 16 is a "child"; however, local requirements currently differ and can go down to as young as 13 years old.  Outside the EEA, "being technologically of age" varies in each country.  

2. What do you need to do if you want to collect children's data?

2.1 You are likely to need parental consent. If you process IoT data from children in multiple jurisdictions, you will have to think carefully about:

(a) how to implement appropriate parental consent mechanisms to IoT devices across the different jurisdictions; and

(b) how to market IoT devices targeted at children, without a harmonised system.

2.2 Always treat children's data as sensitive:

Where children's data is involved, companies should take extra care to implement adequate security measures to minimise and avoid risks of hacking and security breaches. With the internet providing further opportunities for paedophiles and bullies, companies will need to think carefully about how their IoT products can protect children and stop their information falling into the wrong hands.

2.3 Design IoT so that they are child friendly and allow children (and, where applicable, their parents) to exercise their rights.

3. What do you need to do if you do not want to collect children's data?

If your IoT is definitely not for children, do not take for granted that this is evident for the audience. Parents will hand over their smart phones; put fit bits on children and a long etcetera. 

3.1 Clearly tell your audience that your IoT is not for children:

You may also want to find a way to restrict access to those aged 16 and above so that variations in child consent requirements don't apply.

3.2. Embrace the fact children may use your IoT and define an approach:

Let's face it; children are often better at navigating technology than their parents. There is a risk some children might find ways round access restrictions (or even parental consent mechanisms).  If you have IoT which is likely to appeal to children, the first step is clearly to try to prevent circumnavigation of restrictions being possible but also make sure you have an approach on how you will deal with this circumstance if it does happen.

In conclusion, progressively more and more children have access to IoT.  This opens a window of opportunity to companies who want to target a young audience and create products and services for this tech savvy and tech hungry group.  It also expands the market of non-child targeted IoT, which never-the-less that are appealing to a young audience.  A world of exciting prospects is out there.  But with these incredible opportunities comes a greater level of privacy responsibility and awareness.  

Be aware if your IoT is likely to be accessed by kids. And if it is, ensure it is child proof and child friendly.


New Spanish data protection law in 2017?

New Spanish data protection law in 2017?

A few days ago, Mar España, the Head of the Spanish Data Protection Authority (AEPD), announced in the VI IAB Congress that a draft bill to reform the current Spanish Data Protection Act ("LOPD") (which transposes the Data Protection Directive) will be submitted in February 2017. A consultation period for this draft new law is also on the agenda for early 2017.

Our understanding is that the aim behind this initiative is, among others, to bring the Spanish data protection regime (including the LOPD and the Royal Decree that supplements it) up to the General Data Protection Regulation ("GDPR") standards and to provide an interpretation to some of the broader concepts in the GDPR. It is expected that the new LOPD will also cover some topics subject to derogations under GDPR and that the mandatory list of security measures (currently mandatory for all controllers and processors based in Spain) is revisited and updated.

This announcement has not come completely by surprise; earlier this year, the Ministry of Justice asked Public Law Section V of the Codification Commission, chaired by privacy veteran and ex-head of the AEPD Professor Jose Luis Piñar, to study the impact of the GDPR on the current LOPD.

Why is Spain doing this?

The ultimate aim of the Spanish law makers is to put a new law in place that sits alongside and complements the GDPR.

Our auspices for this new law are that it will cover most of the GDPR derogations and provide a conservative interpretation of GDPR, where possible, in line with the current application of the LOPD and case law.

It is known that the Spanish data protection regime is one of the strictest regimes in the EU and it is not clear whether this initiative seeks to ensure that this continues to be the case by keeping some of the stricter requirements of the current Spanish data protection regime which would otherwise have been lost upon the implementation of the GDPR.

From a pan European standpoint, it seems Spain is following the initiative taken by countries like France, Germany or the Netherlands all of which are pushing through legislative initiatives to bring existing data protection laws up to GDPR standards. Please see here for a blog on the changes in France brought by the recently approved Digital Republic Act.

What does this mean for controllers and processors operating in Spain?

Controllers and processors operating in Spain will be subject to the GDPR and the reformed LOPD. In practice this will mean that, as it happens today, organisations will have to take into account local data protection laws when considering privacy compliance. If many EU member states follow suit, would the harmonisation of EU data protection law be put at risk?

Whilst the GDPR does allow for local laws to be put in place, the LOPD is a broad piece of legislation that applies 'across the board' so the question is whether the post-GDPR European data protection legal landscape was meant to have all encompassing local laws sitting alongside the GDPR.

Next steps

The AEPD seems to be optimistic that the reformed LOPD will be in force at the same time as GDPR, in May 2018. However, there are political and procedural factors that have to be taken into account when considering timings. The reform of an 'organic' law (i.e. a law that regulates areas related to fundamental rights) is subject to a more complex parliamentary procedure than 'ordinary' laws. Furthermore, the Spanish Government has only been recently formed, after months of political uncertainly and the repetition of the general elections.

bricklaying, bricks, construction, DIY & How-To, energy efficiency, featured, Home & Garden, home energy, stone, Videos

Using Brick Stone to Make Your Home Energy Efficient

A home that’s energy-efficient is actually healthier and cost effective. Energy efficiency modifications in your home can eliminate or at least lessen the poor quality of air that’s brought in by various weather conditions. One way to make your home energy efficient is to pay attention to the building materials and to the house design.  […]

The post Using Brick Stone to Make Your Home Energy Efficient appeared first on Practical Solutions For Life.

Alternative Energy, diy, DIY & How-To, featured, Home & Garden, Off Grid, solar panels, Videos, wind mills

Ideas for Alternative Home Energy

When it comes to problems in western society, energy consumption and associated rising costs rank near the top of the list.  An unavoidable fact in our modern world is that we all need electricity to power our lives.  Our fast paced, high tech civilization depends on the power provided by electricity. However, few would disagree that […]

The post Ideas for Alternative Home Energy appeared first on Practical Solutions For Life.


English Toffee

Homemade English Toffee

Toffee is so dangerous for me to have around the house. No one should eat as much as I do when it’s available.

But for special occasions, I’m more than happy to bust out the sugar and whip up a batch!

This nutty, chocolate-covered toffee is the quintessential holiday treat, perfect for nibbling at the end of a big meal or gifting to a friend.

Continue reading "English Toffee" »

Corporate, Enduser, malware, ransomware, video

Get under the skin of ransomware

In 2016 alone, hackers have taken over $1 Billion in the form of ransoms from users trying to retrieve their files after being infected with ransomware. Ransomware is the most successful malware attack today. It works by locking up your files and crippling your systems until you’ve handed over money. And, one of the biggest […]
Food preservation, Food Storage, Food Waste / Saving Money

Is a Smaller Home Freeze Dryer for You?

Did you know Harvest Right offers three sizes of freeze dryers? Our smallest version is a compact 16.5″ wide, 25″ tall and 18.5″ deep. Freeze drying technology is superior in every way to other methods of food preservation, but until recently freeze dryers were enormous, expensive machines that were only built for commercial purposes. Harvest […]

How to Make Salmon Gravlax

How to Make Salmon Gravlax

Of all the DIY home-cured foods, gravlax is one of the most satisfying.

The process doesn’t take long – or much of your attention – and it’s so pretty!

Give fresh salmon a sprinkle of salt, sugar, and herbs and a few days in the fridge, and it will transform into a beautiful, flavorful dish ready for the brunch table.

Continue reading "How to Make Salmon Gravlax" »

Corporate, Enduser, Intercept X, ransomware, Security Tips, Webcast

Join our webcast: Stop the Exploit. Stop the Attack.

We know ransomware is one of the biggest threats facing organizations today but the security industry has traditionally struggled to keep up with this sophisticated, ever-changing attack. Until now. Deploying a range of innovative next-gen technologies to block all kinds of advanced attacks, Sophos Intercept X is designed to stop ransomware in its tracks. It […]

Did the Supreme Court of Canada formally establish a new form of consent? Is “implied consent” really “deemed, irrevocable consent”?

I just posted a comment on the new Royal Bank of Canada v. Trang decision from the Supreme Court of Canada (Supreme Court of Canada permits disclosure of mortgage document over debtor’s privacy objections), but there’s an aspect of it I’d like to dig into further.

On close review, it does appear that the Supreme Court of Canada has -- perhaps inadvertently -- re-written a key aspect of the Personal Information Protection and Electronic Documents Act ("PIPEDA"). In the decision, the Court found that Scotiabank had Trang’s implied consent to disclose a mortgage discharge statement to the Royal Bank of Canada. I don’t think that’s very controversial, but if you dig into it, the Court’s conclusion is significant. It found that "implied consent" is really not consent, but deemed and irrevocable consent where it’s reasonable.

“Implied consent” is consent where you can imply someone’s permission or consent from the circumstances. For example, if I ask someone for their name and address to send them something and they give their name and address, you can imply their consent to use it for that purpose. In other circumstances, it can be unspoken. If I were to ask the same person for their name and address and it is clear in the circumstances that I’d be using it to send them something, their consent can be implied by their providing the information.

This is in contrast to express consent, which is where the individual has expressed his or her consent at the time. (“Yes, I give you consent to use my name and address to send me that thing.”)

All of this is clear from PIPEDA. But what is also clear from PIPEDA is that an individual can withdraw his or her consent at any time:

4.3.8 An individual may withdraw consent at any time, subject to legal or contractual restrictions and reasonable notice. The organization shall inform the individual of the implications of such withdrawal.

In the Trang case, it was abundantly clear that Trang did not consent to any disclosure of the mortgage discharge statement. While the decision does not specifically say that Trang revoked it, it is clear that Trang was asked and did not consent. Further, Trang did not appear at an examination in aid of execution. (I’d imply no consent there.)

So what does this mean? In short, “implied consent” as used by the Supreme Court here is really not “implied consent” but “deemed deemed”. It’s a consent that is reasonable in the circumstances but really cannot be revoked or overridden. It occurs regardless of the actual wishes of the individual. And that’s a big deal.

Now, I don’t think that the Supreme Court just made this up. You might even say it is necessary given that that PIPEDA only has a limited number of circumstances where an organization can do away with consent, all of which are listed in s. 7 of the Act. We can see many examples in findings from the Office of the Privacy Commissioner of Canada, particularly those that arise in the workplace. For example, in Transit driver objects to use of technology (MDT and GPS) on company vehicle, the Commissioner found there was implied consent for a transit operation to use GPS to track his movements on the job. The driver who complained clearly objected -- definitively communicated a lack of consent, but the Commissioner found that the purpose was reasonable and that notice was given to the employees, so all was kosher.

Much of this has been fixed with the Digital Privacy Act (but only for employees), which added this new section 7.3:

Employment relationship

7.3 In addition to the circumstances set out in section 7, for the purpose of clause 4.3 of Schedule 1, and despite the note that accompanies that clause, a federal work, undertaking or business may collect, use and disclose personal information without the consent of the individual if

(a) the collection, use or disclosure is necessary to establish, manage or terminate an employment relationship between the federal work, undertaking or business and the individual; and

(b) the federal work, undertaking or business has informed the individual that the personal information will be or may be collected, used or disclosed for those purposes.

So 7.3 fixes it and makes this discussion moot in the employment context, but the Supreme Court’s decision seems to support the proposition that there are circumstances where implied consent really equals deemed, irrevocable consent.

I hesitate to predict how this will play out in the future, but it's likely significant.


Banking on pot

Economists have examined the US legal cannabis sector to gauge the value of banking services.