Travel Like a Libertarian….

A new piece with some travel tips at Lew Rockwell.

Here’s the opening:

“A while ago I wrote an article suggesting that for some libertarians it might be time to run.

I still think it is. But I also think your journey abroad should be reasoned and carefully planned, or it could leave you worse off, not better. Run smart, not stupid.

To help you do that, here are some things I’ve learned from years of going back and forth across the world. I’ve grouped them under four headings that express fundamental elements of a libertarian stance in the world.

Connectivity (the free market is all about communicating and persuading)
Security (libertarians should take the initiative in defending themselves)
Simplicity (less always makes for more independence)
Flexibility (don’t resist change; it’s the essence of the free market)

6 thoughts on “Travel Like a Libertarian….

  1. Subject:
    RE: Four Principles of Libertarian Travel
    From: “Bill R
    Date: Mon, August 10, 2009 6:30 am
    To: lilarajiva@mindbodypolitic.com
    Priority: Normal
    Options: View Full Header | View Printable Version | Download this as a file

    Hi Lila;

    You appear to subconsciously know this. Making it conscious will help you
    deal with difficult issues more effectively.

    http://www.nazisociopaths.org/modules/article/view.article.php/c1/33

    Regards;

    Bill R

    (Electronics Design Engineer)

  2. Subject: Re: Four Principles of Libertarian Travel
    From: “Vedad”
    Date: Mon, August 10, 2009 3:31 am
    To: lilarajiva@mindbodypolitic.com
    Priority: Normal
    Options: View Full Header | View Printable Version | Download this as a file

    Hello,
    I’m reading your article on LewRockwell and have some questions and
    comments, primarily related to the IT part of the article. They’re a
    bit in random order, so I apologize in advance for that.

    First, you said “Write down your IP address.” Why? Most end user
    Internet connections use dynamic IP addresses, which means that every
    time you connect, you change your address. Furthermore, writing it
    down has almost no utility, unless you’re hosting some kind of a
    server on your computer and need to redirect DNS queries to it.
    As for proxies, Tor (http://tor.eff.org) is a good, free option.

    Second, I’d like to write a list of security applications most
    (Windows) computers should have. Personally, I use Mac OS X, so it
    doesn’t apply to me.

    Antivirus: Eset NOD32. For over half a decade, this application,
    though somewhat small and obscure compared to titans like Symantec
    Norton and McAfee, has consistently won speed and efficiency
    benchmarks for antiviruses, and is regarded by most as one of the best
    there is. A little pricey given the fact that free antiviruses such as
    ClamWin exist, but it’s worth it.

    Spyware: Nothing beats Spybot Search & Destroy for.. well… searching
    and destroying. Update it once a week, run its immunization function,
    and do a scan. Remove any malware it finds, and repeat a week later.
    Also get SpywareBlaster, which is purely a prevention application;
    update it and apply its protection. Combined with Spybot, it should
    ensure that no spyware infects your system. If you’re on a website and
    you see an ad saying something like “Free antivirus”, “Scan your
    computer now!”, “Your computer might be infected”, etc. avoid it like
    the plague.

    General protection: Use alternative web browsers (NOT Internet
    Explorer!), such as Mozilla Firefox, Apple Safari, KDE Konqueror,
    Opera, etc. Regularly back up your system to an external hard drive,
    especially before applying system updates from Microsoft, as those
    have a track record of frequently destroying a system.

    Third:
    You said to write down your passwords. You -can- do this safely on
    your computer, as well. There’s a piece of software called KeePass
    (Also available as KeePassX for Mac OS X and Linux users) that creates
    an encrypted store of passwords (you could also use it as an
    addressbook). You run it, enter your password (you can also use a
    keyfile, so if you have for example a USB dongle, you can put a file
    on it, use it as key, and unless that file is present – that is, the
    USB dongle is connected and you can select the file – the encrypted
    store won’t decrypt. Ideally, you should do both, as it creates two
    factors of authentication), and voila, you have access to all your
    passwords, plus comments, etc.
    Another tip is to store sensitive data on a server outside the reach
    of governments. One example is an application called JungleDisk, which
    encrypts and uploads your data to a third party server (For example,
    Amazon S3). Neither Amazon nor JungleDisk will have access to your
    data, only you will. The downside is that this alternative costs a
    bit, as you must both pay for JungleDisk and for the storage service.
    You can find out more by listening to the Security Now! podcast about
    JungleDisk at http://grc.com/securitynow . One obvious thing worth
    pointing out just to be sure is that if you should lose your password,
    you’re up the proverbial tributary without adequate means of
    propulsion. Make sure you have a backup at home.

    Microsoft wrote an application called Malicious Software Removal Tool,
    which works as an extra malware remover. Read how to use it here:
    http://en.wikipedia.org/wiki/Windows_Malicious_Software_Removal_Tool

    One final note on the topic of IT security; if you use Mozilla Firefox
    as your web browser, I recommend having Adblock Plus and NoScript
    installed. Adblock Plus.. well.. blocks ads. Very useful for enjoyment
    of the web, plus it increases security. NoScript can be a bit of a
    pain in the neck, as it blocks much of the scripting that makes the
    web fun to use. It’s great for added security, but can be a major
    annoyance. I recommend going into its settings and checking the
    checkbox “Allow scripts globally (dangerous)”. It makes the web more
    enjoyable to use than otherwise, while at the same time still
    providing a little bit of protection. Or, if you’re completely
    paranoid, and you don’t use sites like banks, YouTube, webmail, etc,
    all of which use scripting, you can just run it as it’s supposed to be
    run.

    Fourth:
    If you’re going to Scandinavia, don’t bring alcohol, tobacco or food
    with you. The customs bureaucrats are pains in the neck.


    Cordially,
    Vedad

    P.S. If you choose to post what I wrote anywhere on the web, leave my
    surname out. Thanks. 🙂

  3. Subject: re: Four Principles of Libertarian Travel
    From: “KEITH”
    Date: Sun, August 9, 2009 11:10 pm
    To: lilarajiva@mindbodypolitic.com
    Priority: Normal
    Options: View Full Header | View Printable Version | Download this as a file

    If you actually miss out on the farm in Patagonia and end up in Iowa, I
    promise I won’t snicker. Rather envious as I’ve spent a far too short few
    days in Chile and haven’t made it to Patagonia.
    Also wanted to say that piece about Palin was great. While I can agree with
    your evaluation of her as unqualified by many standards, the opposition to
    her on every side was surreal. Could you imagine if someone had attacked
    Michelle Obama in that manner. It kind of reminded of the treatment of
    Reagan except more intense and far worse.
    The Olbermans, Maddows, Kristols, Franks, Pelosis, Gingrichs et al are all
    showing their true colors now. Whether or not Americans will see them for
    who and what they are remains to be seen. I have a little pride in watching
    “the mob” regarding the healthcare debate. Yes some of the arguments are
    idiotic (“keep the government away from my Medicare”) but they are
    functioning on instinct. I’ll take it. Don’t give up on this country just
    yet. Never know Texas might just secede. I’ll head back there when that day
    comes.

    Peace,

    Keith S
    The People’s Republic of New York

  4. Subject: Computer security
    From: “Irdial-Discs”
    Date: Mon, August 10, 2009 10:17 am
    To: lilarajiva@mindbodypolitic.com
    Priority: Normal
    Options: View Full Header | View Printable Version | Download this as a file

    —–BEGIN PGP SIGNED MESSAGE—–
    Hash: SHA1

    Greetings.

    I just read your article.
    >
    > If you plan to use hot-spots for your wireless, make sure you have
    > extra strong security. It’s easy for trojans and viruses to attack
    > your computer through unsecured wireless connections, which means
    > thieves could steal your bank information and credit card numbers.

    I would personally recomend running Ubuntu Linux as a secure operating
    system:

    http://www.ubuntu.com/

    The NSA has a built in back door to windows:

    http://tinyurl.com/nymtoq

    if your attacker (an ordinary criminal as opposed to a state one) is
    expecting a windows machine (and most of them do) you will be more safe
    by default if you are running Ubuntu.

    Thanks, and keep up the good work!

    ./akin
    ./irdial

    http://www.irdial.com/blogdial

  5. Subject: Run
    From: “Tom P

    Date: Mon, August 10, 2009 4:39 pm
    To: lilarajiva@mindbodypolitic.com
    Priority: Normal
    Options: View Full Header | View Printable Version | Download this as a file

    Where? I lived in SE Asia for 3 years ( 2000, 2001, 2002 ) and while I really
    enjoyed living in Vietnam, then on the side of a mountain on an island in SE
    Thailand, the lack of quality health care was incredible and unacceptable.

    So while “running” sounds good, in practice it’s not.

    Tom

  6. Subject: Connectivity
    From: “John W
    Date: Mon, August 10, 2009 9:25 pm
    To: lilarajiva@mindbodypolitic.com
    Priority: Normal
    Options: View Full Header | View Printable Version | Download this as a file

    RE:

    * Write down all the user names and passwords to the websites carrying
    your business and financial accounts. Be sure to disguise them so that no
    one else will be able to figure out what they mean and which accounts they
    refer to.

    I would recommend Password safe, http://passwordsafe.sourceforge.net/, for
    keeping your myriad usernames and IDs secure. It all fits on a simple thumb
    drive.

    In Liberty,

    John W

Leave a Reply

Your email address will not be published. Required fields are marked *