A new piece with some travel tips at Lew Rockwell.
Here’s the opening:
“A while ago I wrote an article suggesting that for some libertarians it might be time to run.
I still think it is. But I also think your journey abroad should be reasoned and carefully planned, or it could leave you worse off, not better. Run smart, not stupid.
To help you do that, here are some things I’ve learned from years of going back and forth across the world. I’ve grouped them under four headings that express fundamental elements of a libertarian stance in the world.
Connectivity (the free market is all about communicating and persuading)
Security (libertarians should take the initiative in defending themselves)
Simplicity (less always makes for more independence)
Flexibility (don’t resist change; it’s the essence of the free market)
Subject:
RE: Four Principles of Libertarian Travel
From: “Bill R
Date: Mon, August 10, 2009 6:30 am
To: lilarajiva@mindbodypolitic.com
Priority: Normal
Options: View Full Header | View Printable Version | Download this as a file
Hi Lila;
You appear to subconsciously know this. Making it conscious will help you
deal with difficult issues more effectively.
http://www.nazisociopaths.org/modules/article/view.article.php/c1/33
Regards;
Bill R
(Electronics Design Engineer)
Subject: Re: Four Principles of Libertarian Travel
From: “Vedad”
Date: Mon, August 10, 2009 3:31 am
To: lilarajiva@mindbodypolitic.com
Priority: Normal
Options: View Full Header | View Printable Version | Download this as a file
Hello,
I’m reading your article on LewRockwell and have some questions and
comments, primarily related to the IT part of the article. They’re a
bit in random order, so I apologize in advance for that.
First, you said “Write down your IP address.” Why? Most end user
Internet connections use dynamic IP addresses, which means that every
time you connect, you change your address. Furthermore, writing it
down has almost no utility, unless you’re hosting some kind of a
server on your computer and need to redirect DNS queries to it.
As for proxies, Tor (http://tor.eff.org) is a good, free option.
Second, I’d like to write a list of security applications most
(Windows) computers should have. Personally, I use Mac OS X, so it
doesn’t apply to me.
Antivirus: Eset NOD32. For over half a decade, this application,
though somewhat small and obscure compared to titans like Symantec
Norton and McAfee, has consistently won speed and efficiency
benchmarks for antiviruses, and is regarded by most as one of the best
there is. A little pricey given the fact that free antiviruses such as
ClamWin exist, but it’s worth it.
Spyware: Nothing beats Spybot Search & Destroy for.. well… searching
and destroying. Update it once a week, run its immunization function,
and do a scan. Remove any malware it finds, and repeat a week later.
Also get SpywareBlaster, which is purely a prevention application;
update it and apply its protection. Combined with Spybot, it should
ensure that no spyware infects your system. If you’re on a website and
you see an ad saying something like “Free antivirus”, “Scan your
computer now!”, “Your computer might be infected”, etc. avoid it like
the plague.
General protection: Use alternative web browsers (NOT Internet
Explorer!), such as Mozilla Firefox, Apple Safari, KDE Konqueror,
Opera, etc. Regularly back up your system to an external hard drive,
especially before applying system updates from Microsoft, as those
have a track record of frequently destroying a system.
Third:
You said to write down your passwords. You -can- do this safely on
your computer, as well. There’s a piece of software called KeePass
(Also available as KeePassX for Mac OS X and Linux users) that creates
an encrypted store of passwords (you could also use it as an
addressbook). You run it, enter your password (you can also use a
keyfile, so if you have for example a USB dongle, you can put a file
on it, use it as key, and unless that file is present – that is, the
USB dongle is connected and you can select the file – the encrypted
store won’t decrypt. Ideally, you should do both, as it creates two
factors of authentication), and voila, you have access to all your
passwords, plus comments, etc.
Another tip is to store sensitive data on a server outside the reach
of governments. One example is an application called JungleDisk, which
encrypts and uploads your data to a third party server (For example,
Amazon S3). Neither Amazon nor JungleDisk will have access to your
data, only you will. The downside is that this alternative costs a
bit, as you must both pay for JungleDisk and for the storage service.
You can find out more by listening to the Security Now! podcast about
JungleDisk at http://grc.com/securitynow . One obvious thing worth
pointing out just to be sure is that if you should lose your password,
you’re up the proverbial tributary without adequate means of
propulsion. Make sure you have a backup at home.
Microsoft wrote an application called Malicious Software Removal Tool,
which works as an extra malware remover. Read how to use it here:
http://en.wikipedia.org/wiki/Windows_Malicious_Software_Removal_Tool
One final note on the topic of IT security; if you use Mozilla Firefox
as your web browser, I recommend having Adblock Plus and NoScript
installed. Adblock Plus.. well.. blocks ads. Very useful for enjoyment
of the web, plus it increases security. NoScript can be a bit of a
pain in the neck, as it blocks much of the scripting that makes the
web fun to use. It’s great for added security, but can be a major
annoyance. I recommend going into its settings and checking the
checkbox “Allow scripts globally (dangerous)”. It makes the web more
enjoyable to use than otherwise, while at the same time still
providing a little bit of protection. Or, if you’re completely
paranoid, and you don’t use sites like banks, YouTube, webmail, etc,
all of which use scripting, you can just run it as it’s supposed to be
run.
Fourth:
If you’re going to Scandinavia, don’t bring alcohol, tobacco or food
with you. The customs bureaucrats are pains in the neck.
—
Cordially,
Vedad
P.S. If you choose to post what I wrote anywhere on the web, leave my
surname out. Thanks. 🙂
Subject: re: Four Principles of Libertarian Travel
From: “KEITH”
Date: Sun, August 9, 2009 11:10 pm
To: lilarajiva@mindbodypolitic.com
Priority: Normal
Options: View Full Header | View Printable Version | Download this as a file
If you actually miss out on the farm in Patagonia and end up in Iowa, I
promise I won’t snicker. Rather envious as I’ve spent a far too short few
days in Chile and haven’t made it to Patagonia.
Also wanted to say that piece about Palin was great. While I can agree with
your evaluation of her as unqualified by many standards, the opposition to
her on every side was surreal. Could you imagine if someone had attacked
Michelle Obama in that manner. It kind of reminded of the treatment of
Reagan except more intense and far worse.
The Olbermans, Maddows, Kristols, Franks, Pelosis, Gingrichs et al are all
showing their true colors now. Whether or not Americans will see them for
who and what they are remains to be seen. I have a little pride in watching
“the mob” regarding the healthcare debate. Yes some of the arguments are
idiotic (“keep the government away from my Medicare”) but they are
functioning on instinct. I’ll take it. Don’t give up on this country just
yet. Never know Texas might just secede. I’ll head back there when that day
comes.
Peace,
Keith S
The People’s Republic of New York
Subject: Computer security
From: “Irdial-Discs”
Date: Mon, August 10, 2009 10:17 am
To: lilarajiva@mindbodypolitic.com
Priority: Normal
Options: View Full Header | View Printable Version | Download this as a file
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Greetings.
I just read your article.
>
> If you plan to use hot-spots for your wireless, make sure you have
> extra strong security. It’s easy for trojans and viruses to attack
> your computer through unsecured wireless connections, which means
> thieves could steal your bank information and credit card numbers.
I would personally recomend running Ubuntu Linux as a secure operating
system:
http://www.ubuntu.com/
The NSA has a built in back door to windows:
http://tinyurl.com/nymtoq
if your attacker (an ordinary criminal as opposed to a state one) is
expecting a windows machine (and most of them do) you will be more safe
by default if you are running Ubuntu.
Thanks, and keep up the good work!
./akin
./irdial
http://www.irdial.com/blogdial
Subject: Run
From: “Tom P
Date: Mon, August 10, 2009 4:39 pm
To: lilarajiva@mindbodypolitic.com
Priority: Normal
Options: View Full Header | View Printable Version | Download this as a file
Where? I lived in SE Asia for 3 years ( 2000, 2001, 2002 ) and while I really
enjoyed living in Vietnam, then on the side of a mountain on an island in SE
Thailand, the lack of quality health care was incredible and unacceptable.
So while “running” sounds good, in practice it’s not.
Tom
Subject: Connectivity
From: “John W
Date: Mon, August 10, 2009 9:25 pm
To: lilarajiva@mindbodypolitic.com
Priority: Normal
Options: View Full Header | View Printable Version | Download this as a file
RE:
* Write down all the user names and passwords to the websites carrying
your business and financial accounts. Be sure to disguise them so that no
one else will be able to figure out what they mean and which accounts they
refer to.
I would recommend Password safe, http://passwordsafe.sourceforge.net/, for
keeping your myriad usernames and IDs secure. It all fits on a simple thumb
drive.
In Liberty,
John W