1.我正在改變!以前我愛父母、兄弟、配偶、孩子、朋友,但現在我已開始愛我自己 。 2.我正在改變。我瞭解到,我不是上帝,我扛不起整個世界。3.我正在改變。我不再和老伴計較,任何事情都由他(她)去吧!人生苦短,讓他(她)做些自己願意做的事情吧, 上帝留給我們的時間都已不多了,順其自然、由他(她)去吧! 不給他(她)的人生留下遺憾。 4.我正在改變。付計程車費時我不再等著司機找零錢,給他點小費或許會換來一個微笑。畢竟他為了生計比我辛苦多了。 5.我正在改變。我不再對老人說,“這個故事你已講很多次了”。 畢竟這個故事讓他們重拾回憶,重溫往事。6.我正在改變。我學會了不再糾正別人,即使是他們有錯。畢竟,讓每個人完美,不是我的責任。能讓事情平和愉快更值得珍惜。 7.我正在改變。我大方地給予讚美。這不僅讓對方心情變好,自己也受益。 8.我正在改變。我學會了不要為襯衫上的摺痕或斑點煩惱。畢竟,人格勝於外表。 9.我正在改變。我遠離那些看不起我的人,因為他們不懂我的價值。 10.我正在改變。我學會不要為堅持己見而破壞了朋友關係。畢竟,獨樂樂不如眾樂樂。 11.我正在改變。我學會把每一天當成最後一天。畢竟,真的有一天會是最後一天。 12.我正在改變。我正在做使自己快樂的事,我應該讓自己快樂,這是我對自己最應負的責任。 青絲已去,白髮染頭!回首人生之路, 一腔熱血東流。有的還沒退休,就被上帝接走; 有的退休不久,又躺醫院床頭; 我等非常幸運,仍在到處晃悠!!無論同學還是戰友,大官還是小官,無論官民窮富都要感恩知足,快樂向前走! 現今的我們:已失去了青春的激情。也淡化了中年的勁頭。經歷了人間不平事。喝盡了 塵世紅白酒。展示了你我的善與美。藏起了自己的苦與愁。 上奉養父母盡孝,下操勞子女紛擾。我們捫心無愧, 要快樂地向前走。! 我們超越了君王,不上早朝, 能知天下大事。 不用筆墨,可寫文章錦繡。 不問龍王,能知四海波瀾。無須騰雲,可在藍天行走。高鐵飛機,已讓地球縮小。電腦網路,已讓天涯牽手。我們趕上好時代, 就要快樂地 向前走! 我親愛的同學們,自然規律要看透,早走遲走都得走。 多想一些開心事,莫為生計去發愁。憑藉一個好身體,多吃一口是一口。夕陽路上,, 快樂向前。不留遺憾,不留後手。活一個壽比南山鬆不老! 樂一個天長地久,常聚首……
(作者:清華出版社兼職總編 馬慧)
Tuesday, July 28, 2020
《我正在改變》 清華出版社兼職總編 馬慧:
Monday, July 27, 2020
Cyber security about Zoom
Cyber security experts are warning people that the video meeting programs we now rely on might not be as secure as some might think. “Zoom bombing” is becoming a trend where people who are not supposed to be able to access Zoom meetings are getting in anyway. The experts say that people using the program should double check their privacy settings, and shouldn’t post the link to zoom meetings on public forums unless necessary.
Telecommuting and home-based learning is the new normal and people around the world are using video meetings and its essential that you know how to use video conferencing tools safely.
In Singapore more than half a million students will be on home-based learning and even more adults will use video meeting working from home.One day after the start of the home-based learning period on April 8 the Singapore Ministry of Education announced that it was suspending Zoom following one incident in which hackers hijacked some students’ Zoom stream and showed pornographic content.
Similar “Zoom bombing” incidents have been reported around the world. In the wake of this and other privacy and cyber security concerns. Zoom has improved some of its security features and meeting controls. So what should users take note of to prevent themselves from becoming victims of harassment, privacy loss and eavesdropping when using video conferencing tools ?
Five Top Tips
- It is vital to use the latest version of the software so that the bugs of the past would have been removed or fixed.
- Remember that companies such as Zoom collect personal data such as name, email address, phone number, job title and even employer, as well as the IP address and device being used. Furthermore, if users sign in using Facebook, information will be collected from the Facebook profile. To retain some privacy, avoid using Facebook to sign in.
- Do not share your meeting link on public forums or on social media as this makes it easier for unauthorised persons to gain access to your meeting.
- Familiarise yourself with your platform’s features and settings so as to be secure and protect your virtual space. For instance, Zoom has a “Waiting Room” feature that enables the host to manage the people who join and leave the meeting. Using this feature will enhance your security when hosting a meeting.
- Users should refrain from using one’s Personal Meeting ID (PMI) to host events for the public. One’s PMI is a personal virtual meeting space that should not be open to others, except for close and trusted colleagues or users.
While using their video cameras during a Zoom session, users who want to increase the privacy level and prevent others from seeing the details of their physical background or surroundings can activate the virtual background feature such as a scene from the beach. You can choose to switch off your camera, if the video feature is not required.
As a host of meetings or conferences, you can take extra precautions. For example, you should retain control of the screen.
Before and during a meeting, you can restrict the ability to screen share, so as to prevent others from sharing undesirable content or snatching control of your screen.
Before and during a meeting, you can restrict the ability to screen share, so as to prevent others from sharing undesirable content or snatching control of your screen.
- Additional security measures include setting up a two-factor authentication. Users can then only get access if they have the randomly generated meeting ID and a password. This enhances the level of security and limited access.
- Another approach is to only enable signed-in or pre-invited users to join in the meeting.
- You can “lock the meeting”. This Zoom feature allows the host to prevent others from joining the meeting. In this way, those with the meeting ID and password also cannot enter this virtual meeting room, once it is “locked”.
- To increase security and control as a host, you can exercise the option to remove disruptive and undesirable participants from the meeting.
- You can put the participants on hold and temporarily disable their video and audio connections to reduce noise and prevent interference.
Such features will be useful for educators when they are using video-conferencing tools with an excited or vocal group of students.
Besides Zoom, there are other video-conferencing options such as Skype, though it has a limit of a maximum of 50 users per session. Users might also consider using more secure platforms for business, like Google Meet and Facetime. Microsoft Teams is another free and popular video-conferencing platform with file and screen sharing features, capable of hosting up to 250 participants in a meeting.
Microsoft Teams and Google Meet require users to have accounts with them, whereas Zoom allows users to participate using their web browsers.
Another leading provider is Cisco Webex, which offers a secure video-conferencing platform that does not require participants to have a Webex account to join the online meetings. Its free version can host up to 100 participants, with a range of features including a white board function and no time limit for meetings.
Ultimately, each video-conferencing option has its strengths and limitations and the onus is on users to examine the security features carefully and use them effectively. Companies offering video-conferencing tools should highlight to users their security features and make a number of these features the default standard mode of use.
Parents and teachers could also educate their young to be aware of the importance of cyber security and to apply security measures when they are online. Cyber security is an essential life skill to protect us from online dangers and viruses, as we work and learn at home, while we fight the Covid-19 pandemic.
Author
- Thomas ReisingerPhD Candidate in Cyber Security, De Montfort University
Disclosure statement
Thomas Reisinger does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Partners
De Montfort University provides funding as a member of The Conversation UK.
We believe in the free flow of information
Republish our articles for free, online or in print, under a Creative Commons license.
The video conferencing app Zoom gained about 2 million new users in the first two months of 2020 – and that was before the World Health Organization declared the coronavirus outbreak a pandemic. With so many people now relying on video conferencing for contact with their friends, family and colleagues, it’s no wonder Zoom has seen a significant increase in its company stock price. But the firm has also attracted some negative press recently for issues related to its privacy and security.
I worked in the video conferencing industry for 10 years. During this time, I started a PhD on whether such systems meet the needs of organisations that have to communicate under adversarial circumstances, such as international NGOs and opposition groups under oppressive regimes. My near-finished research shows that Zoom has indeed had plenty of problems, but is far from the only platform with security and privacy issues.
A number of issues with Zoom have attracted public attention, most notably call hijacking or “Zoom-bombing”. Calls that are not set to private or password-protected can be accessed by anyone who inputs the nine- to 11-digit meeting code, and researchers have shown how valid meeting codes could easily be identified (something Zoom now says it prevents).
Zoom has also recently had to make changes to its iPhone and iPad apps to stop Facebook being able to collect data about users. And last year it was forced to fix a problem that could have allowed websites to turn on Mac users’ cameras without permission.
Another issue, recently highlighted by The Intercept, is that Zoom claims its calls can be encrypted, but doesn’t use the kind of end-to-end encryption that many people have come to understand as standard for private communication services. Messages or calls sent with end-to-end encryption are effectively locked with the receiving user’s public key that anyone can access, but can only be unlocked by the user’s private key. This system is used by messaging apps such as WhatsApp to ensure only a message’s recipient can read it – not even the app’s provider has access.
Zoom instead uses the AES-256 ECB method of encryption, which shares the key used to encrypt calls with Zoom’s servers around the globe. This potentially gives them full access to the audio and video streams, although the company has stated no user content is available to its employees or servers once encrypted.
Researchers have also found that encryption keys even up on Zoom servers based in China (where the company has development sites) even when no Chinese participants are in the call. This opens the possibility that the Chinese government, famed for its control of internet communications in the country, could eavesdrop on calls. Zoom has now started offering paying customers the ability to opt out of having data routed through China or other regions.
While Zoom has developed measures or options to at least partly address all of the issues highlighted – and said it will freeze the development of new features for 90 days so it can focus on improving security – the litany of problems that have already been identified should provoke serious thought among its users. On top of this, Zoom’s privacy policy is arguably not user-friendly. By downloading the app, you essentially grant the company permission to do with your personal data whatever they want.
The problem for anyone looking for a more private system is that many of Zoom’s competitors have their own similar security issues. For example, Microsoft’s Skype and Teams services also use forms of encryption that give the company control over the keys.
Alternatives
So what are the alternatives? The most secure options are arguably those that use end-to-end encryption and are built with open-source code because it can be publicly reviewed to check it doesn’t have any hidden problems.
Signal is a messaging app that falls into this category and also provides video calling from smartphones, but not desktop video calls or video conferencing with multiple parties. Jitsi is also open source and provides end-to-end encrypted video calls via a web browser, and is working on doing the same for multi-party video conferencing.
If these options don’t suit you, then there are things you can do when using Zoom or other video calling services that have potential security issues to maximise your privacy and safety.
- Enforce encryption by default and makes sure it’s end-to-end if possible
- Lock and password-protect meetings
- Unauthenticated users should be held in a waiting room so the organiser can check their identity before admitting them to the call
- Make sure a meeting host monitors the participants list and ensures no unknown participant joins
- Be careful with meeting recordings and get consent from the participants
- Be aware that audio-only participants calling via a regular phone dial-in option will “break” the encryption
- Be careful with file and screen-sharing capabilities. They could accidentally disclose sensitive information or be used to spread malicious programs.
In response to the issues raised in this article, a Zoom spokesperson said:
Zoom takes user privacy, security, and trust extremely seriously. Zoom was originally developed for enterprise use, and has been confidently selected for complete deployment by a large number of institutions globally, following security reviews of our user, network and datacenter layers.During the COVID-19 pandemic, we are working around-the-clock to ensure that businesses, schools, and other organizations across the world can stay connected and operational. As more and new kinds of users start using Zoom during this time, Zoom has been proactively engaging to make sure they understand Zoom’s relevant policies, as well as the best ways to use the platform and protect their meetings.
Support our coronavirus coverage
This new and deadly pathogen is confusing enough for medical and scientific experts to understand. For the public, it’s even more so. At The Conversation, my colleagues and I are dedicated to finding academic experts who can best sort through the confusion and explain developing coronavirus science. Your donation of $5, $50 or $500 will help us distribute factual, responsible analysis, free of charge, to readers everywhere.
NOSE TO TAIL NOURISHMENT
NOSE TO TAIL NOURISHMENT
If you get one thing right, become passionately focused on the quality of the foods you “hunt” and I guarantee that you will see profound positive change in your overall health that will cascade into all of the other areas of your life. When you consume the highest quality foods (akin to our ancestors hunting the biggest and most sought after game), you will thrive- I know this with every fiber of my being and it is why I do what I do with Heart & Soil, my book, my podcast and all of my social media. My “why” is sharing with you, and as many people possible (Thousands? Hundreds of thousands? Millions?) the truths that I have discovered on my own journey.
Animal foods are the most nutrient rich nourishment on the planet. They are an absolute part of the human diet if we seek vitality, vigor, and ass-kickery. They have also been unjustly maligned by the mainstream media based on misleading epidemiology (you can read all about this in my book, The Carnivore Code.)
Plants exist on a spectrum of toxicity and contain defense chemicals (phytoalexins) that may be damaging and toxic for many individuals. In order to survive their co-evolution with animals, insects, and fungi over the last 450 million years, plants needed to develop chemicals that protect them from unabated predation. For many people, elimination of some or all of these chemicals will lead to a higher quality of life.
AT HEART & SOIL,
WE’RE ALL ABOUT THESE TRUTHS
Our supplements are 100% animal based and contain zero plant based products or fillers.They are also sourced from the finest animals on the planet, raised on regenerative farms in the pristine lands of New Zealand and soon from regenerative farms right here at home in the United States.
But the story doesn’t end there. When our currently living indigenous people hunt animals, and when our predecessors hunted animals, they didn’t just eat the muscle meat. They ate the spoils of their sacred hunting rites in their entirety, from nose-to-tail. Consuming animals in this way and wasting nothing, shows great respect for the fundamental circle of life and death that we all participate in, and we now know that from a nutritional biochemistry perspective it provides our body with all of the nutrients we need to thrive.
What a beautifully elegant truth that everything, every vitamin, mineral, peptide, protein, and co-factor that the human body needs to function optimally can be obtained from consuming animals in their entirety. Our ancestors knew this, but it’s a sacred idea that’s been lost between recent generations, and the health effects within our culture are profoundly negative.
Over 40% of our brothers and sisters now meet the formal criteria for obesity, and only an elite 12% of our population can truly be considered metabolically healthy (CDC Obesity Report 2017-2018, Metabolically Unhealthy)!
It is no hyperbole when I say that this is absolutely because we have forsaken the nutritional wisdom of our forefathers and foremothers.
We have traded nose to tail animal foods for ultra processed carbohydrates, sugars and vegetable oils that invariably lead to the smoldering inflammation that underlies the rampant epidemics of autoimmunity and chronic disease we now face as a greater human tribe.
HOW DO WE CORRECT THESE MISSTEPS
AND REMEMBER THE WISDOM
OF OUR PREDECESSORS?
Eating meat from properly raised animals is a great start, but it’s only part of the equation. To truly obtain ALL of the nutrients you need to thrive, organs like liver, bone marrow, spleen, heart, kidney, thymus, intestines, and testicle are crucial. Muscle meat has lots of nutrition, but it doesn’t have everything. On the product pages for our carefully crafted supplements you’ll find a wealth of information about all the nutrients, peptides and growth factors that are uniquely found in meaningful quantities in organs how these special “vital-mins” help us live radically.
Though organs are foreign to many of us, I am deeply committed and incredibly passionate about helping make them more available for you and your family. On the “About us” page you’ll find a video of how I eat in a day- fresh organ meats are a critical part of my diet. If you can eat them fresh this is always the best, but if this is challenging for you, or you’re looking to be even more radical, our desiccated supplements (low temperature dehydration preserves as many of the key nutrients as possible- you can read more about it here (link)) will absolutely support your journey to optimal health.
If you are reading this page, there’s a very good chance that you’ve discovered the value of nose to tail animal foods in your diet and are ready for a change within your own life and to be a beacon of change for those around you. If you believe what we believe, now is the time for you to join our tribe, we’ve been waiting for you. We can’t wait to celebrate the reclamation of your ancestral birthright to radical health, strength, and vitality by including the most nutrient rich foods on the earth in your diet by consuming the organ meats in our supplements.
RECLAIM YOUR ANCESTRAL BIRTHRIGHT TO RADICAL
HEALTH, STRENGTH & VITALITY
Eating animals nose to tail provides us with all of the nutrients needed to thrive
Shop Now"When the blood in your veins returns to the sea, and the earth in your bones returns to the ground, perhaps then you will remember that this land does not belong to you, but it is you who belong to this land."
-ANONYMOUS
JOIN THE INTERNET's LARGEST NOSE TO TAIL NEWSLETTER
Join our tribe and we'll send you our quick start guide to eating nose to tail, tribe member discounts, and product updates.
Subscribe to:
Posts (Atom)