Berry Blog

home    message    submit    archive    theme
©
Via a LG G3
       Anonymous

swiftonsecurity:

I am Taylor Swift. 

[A perfectly fair question, one which I have carefully considered. Whenever I post, I always consider the impact on Taylor’s image and if I’m exploiting it for cheap laughs damaging or embarrassing to her. This has been a central concern since the very, very beginning of the account. One month in, so concerned, I even wrote a manifesto about my intentions.

http://pastebin.com/mSYM5HS4

I am exceedingly careful and avoidant in sexual references as well. The computer rack posts are ones I’ve debated back and forth on using, but after seeing them embraced by others I’m more confident in letting them remain. Although I started this account to make some dumb jokes about Heartbleed, I’ve grown to immensely respect her through my research. She is a good person. I don’t know how much it matters in the end, but I regularly get feedback that my work has enhanced her image in the minds of people who follow me. And my work is, in the end, an overall positive.

Regarding reports on the leaks, this is something I considered carefully as well. I started posting after I recognized this was a huge event everyone in the English-speaking world was going to hear about. I never once linked to anything that contained, showed blurred versions of, or linked in any way to the photos or video in question. I never posted any screenshots, even those with “safe-for-work” thumbnails. That’s a lot more than a lot of the sites did.

At that point, there was nothing to do except find something positive in it. My ignoring it would do nothing except throw away what I could offer to the public in this event. That came down to three things:

  1. Identify the methods used to compromise these images in order to help public understanding and personal defensive measures assuming the worst kind of compromise
  2. Looking at my past post history, you can see I am concerned with tech literacy and education of the populace on security matters. This is a “teachable moment” we can use to encourage defensive computing by everyone, especially women, who are disproportionately impacted. Taylor Swift is luckily a figure respected and a great way to draw attention. Early in the event, I was promoting @VioletBlue’s book on privacy.
  3. I have a large reach, far larger than on my personal account. I decided to use it as a platform to fight back against ridiculous slut-shaming because of that.

]

swiftonsecurity:

Page 48

Hobbling into the tape library module of Microsoft Prototype Datacenter Zeta with his arm around Taylor’s neck to support himself, he finally disentangles and falls to the floor. Blood flows from the railgun wound in his abdomen. After weeks of care, it had again re-opened running from…

whoever wrote this. brilliant. Love you.

Mr. and Mrs. Granger and the Christmas That Our Daughter Told Us All About Her New School
Mr. and Mrs. Granger and the Christmas That Our Daughter Skipped Because She Had Some Important Potion to Make
Mr. and Mrs. Granger and the Christmas That Our Daughter Skipped Because of Some Boy
Mr. and Mrs. Granger and the Christmas That Our Daughter Skipped Because Some Boy Four Years Older Than Her Asked Her to a Dance
Mr. and Mrs. Granger and the Christmas That Our Daughter Skipped Because, Even Though We Planned a Big Skiing Vacation, Skiing Isn't Her "Thing" and She Claimed That Everybody Who Was Serious About Exams Stayed in School Over Break
Mr. and Mrs. Granger and the Christmas That Our Daughter Actually Attended But Wouldn't Stop Complaining About Her Friend Ron and His New Girlfriend
Mr. and Mrs. Wilkins and the Christmas We Scuba Dived at the Great Barrier Reef

helloyoucreatives:

Could you live on the food you find in your agency? 

Sam is really funny and I love his pictures of food

       myexternalthoughts

neil-gaiman:

They are related.

I am reading The Graveyard Book and Neil Gaiman has made it INTERACTIVE