Cumin confused [Isaiah 28:27]

New International Version

Caraway is not threshed with a sledge, nor is the wheel of a cart rolled over cumin; caraway is beaten out with a rod, and cumin with a stick.

New Living Translation

A heavy sledge is never used to thresh black cumin; rather, it is beaten with a light stick. A threshing wheel is never rolled on cumin; instead, it is beaten lightly with a flail.

English Standard Version

Dill is not threshed with a threshing sledge, nor is a cart wheel rolled over cumin, but dill is beaten out with a stick, and cumin with a rod.

New American Standard Bible

For dill is not threshed with a threshing sledge, Nor is the cartwheel driven over cummin; But dill is beaten out with a rod, and cummin with a club.

King James Bible

For the fitches are not threshed with a threshing instrument, neither is a cart wheel turned about upon the cummin; but the fitches are beaten out with a staff, and the cummin with a rod.

Holman Christian Standard Bible

Certainly black cumin is not threshed with a threshing board, and a cart wheel is not rolled over the cumin. But black cumin is beaten out with a stick, and cumin with a rod.

International Standard Version

For caraway is not threshed with a sharp sledge, nor is a cart wheel rolled over cumin. Instead, caraway is winnowed with a stick, and cumin with a rod.

NET Bible

Certainly caraway seed is not threshed with a sledge, nor is the wheel of a cart rolled over cumin seed. Certainly caraway seed is beaten with a stick, and cumin seed with a flail.

GOD’S WORD® Translation

Black cumin isn’t threshed with a sledge, and wagon wheels aren’t rolled over cumin. Black cumin is beaten with a rod and cumin with a stick.

Jubilee Bible 2000

For the fitches are not threshed with a threshing instrument, neither is a cart wheel turned about upon the cummin; but the fitches are beaten out with a staff and the cummin with a rod.

King James 2000 Bible

For the dill is not threshed with a threshing sledge, neither is a cart wheel rolled over the cummin; but the dill is beaten out with a stick, and the cummin with a rod.

American King James Version

For the fitches are not threshed with a threshing instrument, neither is a cart wheel turned about on the cummin; but the fitches are beaten out with a staff, and the cummin with a rod.

American Standard Version

For the fitches are not threshed with a sharp threshing instrument, neither is a cart wheel turned about upon the cummin; but the fitches are beaten out with a staff, and the cummin with a rod.

Douay-Rheims Bible

For gith shall not be thrashed with saws, neither shall the cart wheel turn about upon cummin: but gith shall be beaten out with a rod, and cummin with a staff.

Darby Bible Translation

For the dill is not threshed with a threshing instrument, neither is a cart-wheel turned about upon the cummin; but dill is beaten out with a staff, and cummin with a rod.

English Revised Version

For the fitches are not threshed with a sharp threshing instrument, neither is a cart wheel turned about upon the cummin; but the fitches are beaten out with a staff, and the cummin with a rod.

Webster’s Bible Translation

For the vetches are not threshed with a threshing instrument, neither is a cart-wheel turned about upon the cummin; but the vetches are beaten out with a staff, and the cummin with a rod.

World English Bible

For the dill are not threshed with a sharp instrument, neither is a cart wheel turned over the cumin; but the dill is beaten out with a stick, and the cumin with a rod.

Young’s Literal Translation

For not with a sharp-pointed thing threshed are fitches, And the wheel of a cart on cummin turned round, For with a staff beaten out are fitches, And cummin with a rod.

via Isaiah 28:27 Caraway is not threshed with a sledge, nor is the wheel of a cart rolled over cumin; caraway is beaten out with a rod, and cumin with a stick..

“War on drugs”

After the SWAT team broke down the door, they threw a flashbang grenade inside. It landed in my son’s crib.Flashbang grenades were created for soldiers to use during battle. When they explode, the noise is so loud and the flash is so bright that anyone close by is temporarily blinded and deafened. It’s been three weeks since the flashbang exploded next to my sleeping baby, and he’s still covered in burns.There’s still a hole in his chest that exposes his ribs. At least that’s what I’ve been told; I’m afraid to look.My husband’s nephew, the one they were looking for, wasn’t there. He doesn’t even live in that house. After breaking down the door, throwing my husband to the ground, and screaming at my children, the officers – armed with M16s – filed through the house like they were playing war. They searched for drugs and never found any.I heard my baby wailing and asked one of the officers to let me hold him. He screamed at me to sit down and shut up and blocked my view, so I couldn’t see my son. I could see a singed crib. And I could see a pool of blood. The officers yelled at me to calm down and told me my son was fine, that he’d just lost a tooth. It was only hours later when they finally let us drive to the hospital that we found out Bou Bou was in the intensive burn unit and that he’d been placed into a medically induced coma.

via A SWAT team blew a hole in my 2-year-old son – Salon.com.

Who do you need to worry about?

Recently, I heard that information security had been the topic of discussion at a meeting of political activists here in Kolkata. This should not surprise anyone – with all the publicity that information security has got in the past year – mainly thanks to Snowden’s leaked documents – the awareness that information security might be an issue has now reached “the general public”. Of course, among information technology people it has been clear that this is an important topic for a very long time – most famously there were the “cryptowars” of the 1990s1.

Unfortunately, a lot of the public debate about information security post-Snowden tends to take the route of fear-mongering and knee-jerk responses. This can happen either out of lack of knowledge (not knowing the threat, tools or other responses available), good intentions (IT professionals have been struggling for decades to explain and ensure that people use the information security tools available to them: the current climate of “fear” might be deemed helpful in such activism) or out of less-than-good-intentions (IT professionals spot an opportunity to sell consultancy and/or software).

In the end, the revelations by Snowden doesn’t mean very much for the average computer user or activist. In fact, the needle hasn’t moved very far in terms of the capabilities that corporations, internet providers, governments or “National Security Agencies” are presumed/known to have. Certainly, Snowden’s documents did provide confirmation of things that many people have long suspected, and the scope and reach of the monitoring programs stipulated in them were definitely astounding. However, the programs and systems that came to light from these documents should primarily serve as an eye opener and perhaps a motivator to engage with information security practices that every campaigner, NGO or activist (or even regular old computer user) should already have begun to learn about.

Thus, before we begin, let’s take a deep breath and realise that in the “post-Snowden era” not that much have changed for you, likely to be an average computer user. The things you need to take into account, and the behaviours you need to adopt are not that different now than they were two years ago. Certainly, your awareness that something “needs to be done” might have changed – but the basic strategies for “what” needs to be done are broadly the same. The upside of this is that the knowledge and the tools of how to respond to the information security threats you face are already available within the IT community.

So, if you are in the position where you don’t know so much in depth about computers or information technology, but you rely on them on a daily basis to undertake research, activism or even just spreading opinions online what are you to do?

First option is to ignore this and state that the Snowden revelations and information security has little to do with you. As explained above, there is some truth to this as nothing much has changed in terms of the threats you are facing. However, even two years ago any information technology professional could have told you that you probably ought to learn more about and understand better ways in which you are managing and protecting your information. So, using this new situation as a motivator to act, you can respond in two broad ways.

A second option is to radically reduce who, when and what you communicate online or what activities you use your computer for. This would involve not only limiting your usage of any Internet communication, but also any digital storage whether on your laptop, external hard drives, USB memories or CDs. That certainly will limit your and your organisation’s exposure, but at the same time that also puts limitations both to the reach of your work in terms of audience, but also your ability to organise yourself and others as well as work effectively. In some cases, this might not hamper your cause much, in which case it might be an appropriate approach to take, but in many cases I believe that computers and the Internet is massively helpful in spreading knowledge and opinions as well as organising people, materials and work.

So, the second option is to apply a reasonable approach to information security. Now, there are many, many, details to this, and I’ll attempt at summarising some items here on this blog in a few blog entries over the next couple of weeks, however the first important realisation is: there is no perfect information security.

Basically, our assumption should be that a sufficiently motivated adversary (more on this shortly) will be able to access your digital materials in some way or the other. This might not be by means of accessing your digital content without you being aware (via some massive computer monitoring network). It could equally well be reached by legal means, say through court orders, or even simply by forcing/tricking/asking you to give up the information voluntarily. That there is the second important realisation: many threats to the security of your information will not come from technological means. They will come from behavioural or legal threats. Case in point: a virus that successfully attacked Iran’s nuclear centrifuges originally infected the control computers (which weren’t attached to the Internet) via surprisingly simple technology – USB memories2.

With this in mind, in order to develop a strategy to protect our information, the first thing we have to understand is who do we want to protect our information from?  Some examples:

  1. Other NGOs or organisations
  2. Corporates
  3. The US government and NSA
  4. Our government
  5. Our state government
  6. Local police officers
  7. Staff or other people in connection with our work
  8. Our employer
  9. Newspapers or media
  10. Random “hackers” who enjoy finding secret information and sharing it / exploiting it
  11. Automated attack tools (viruses, trojan horses, etc.) that can steal your passwords, use your accounts to post spam or similar

Then, we need to decide: what do we want to protect? This goes for both “what content” (my Facebook posts, emails, emails to a specific group of people, documents stored on my hard drive, my website or blog, etc.) as well as “what type of protection” (more on that below). Some examples of what we might want to protect:

  1. The very fact that we are communicating with a person or a group at all (called “metadata” – think of it as the sender/recipient of email, the subject lines, and maybe the dates and times)
  2. What webpages we visited
  3. The content of such communication, for example an actual email or content of a group post or blog post
  4. That the blog posts or Facebook posts we send are really sent from us and hasn’t been changed by anybody – that is it’s fine if anybody reads it, but we want to ensure it isn’t changed and that it was really sent by
  5. The accessibility of information, that is that the data or information we have published or have stored is always accessible to everybody who needs it.
  6. The list of members of a mailing list or Facebook group
  7. Registers, excel sheets or notes on our hard drive

Finally, when it comes to “what type of protection” in information security terms we speak about authenticity, confidentiality, integrity, availability and anonymity. In simple terms: authenticity means being able to prove that the data, document, message or other information really came from the source it claims to have come, confidentiality that only the people who have the right to read it actually does, accessibility that the information is always accessible to the people who needs it at all times and anonymity that the source (e.g publisher, sender, location of person sending it, etc.) of the information is kept unknown.

As you can see, some of these can be difficult to combine. For example, it might be hard to ensure both authenticity and anonymity at the same time (in that case we often talk about “pseudonymity”).

The questions above need to be fully considered before you even decide what tools or behaviours to adopt. The easiest way is to make a list or table of “what content”, “what protection”, “from whom”. Then, you can think about what the “default rule” should be. For example, content which I don’t feel a need to explicitly protect, I still don’t want random people accessing in any which way they like. Thus, I need to protect all data with at least a minimum level of protection. This can be stated as simple as “I don’t want my internet service provider to be able to read any of my internet traffic” or “I want the contents of my USB pen drive to be readable by me only” or “anything on my blog can be read by anyone, but I want to ensure no one can post to it” or “I want to make it hard enough for a random person in the office to not be able to read it”.

Certainly, if the NSA are willing to expend some resources to read a message to my sister about how the monsoon is progressing that might not be such a big problem. At least it’s not a big enough problem for me to expend any active energy to hide it. However, I still wouldn’t want my neighbour to be able to read it.

In the next post, I will start discussing simple tools and behaviours (tools are not all!) to ensure authenticity, confidentiality and integrity of your information. I will focus on local actors, that is other people in your vicinity (whether “virtual vicinity” or physically close to you), your employer or organisation or perhaps even local government, police or other state actors. Now, beware that in order to beat “government” type resources, you will need to adopt a) stringent behavioural changes and b) relatively complex technological tools. If these are your requirements, you probably need external help and consultancy. Additionally, if you are trying to protect yourself against serious government attention and effort, probably your protection will lie more in legal means than in information security ones. In many countries, law enforcement have the right to get you to give up passwords or keys rendering many technical modes of protection useless.

Most likely, it is not active interest from government (as some of the most surprising revelations by Snoweden touched on) you are protecting yourself against but rather the continuous, and often “passive”, erosion of privacy by all levels of government, corporations or even individuals. When it comes to active (actively targeting you) adversaries they are much more likely to be local and exploit the very real truth that much of your digital data and communication is currently unprotected, both from unauthorised access, modification, publication or deletion by anybody with minimal resources.

This is the first post in a series I plan to write. I am mostly writing this to have something to refer to when it comes up for discussion, and I hope it will be useful for anybody with the energy to read through it all.

1 Where the US government attempted to maintain capacity to decrypt foreign communications by establishing export restrictions on software which implemented such encryption.

2 USB memories were dropped by spys in the parking lots of the nuclear facilities, with the expectation that the people working in these facilities would do what most of us would, pick them up, plug them in our computers and check the contents to see if we can return them to their owners.
 

Philosophy of Software Development

In Work-Oriented Devlopment of Software Artifacts, Pelle Ehn describes his experiences on a series of projects that explored making software easier to use, more appropriate to its final use, and made by both programmers and end users. For me, the high point of the book was the way in which he considers software development in the context of four philosophers: Descartes, Marx, Heidegger, and Wittgenstein.

A person working in the style of Descartes considers there to be an external reality worth describing, and turns her efforts toward capturing that reality in requirements, in models, and in the code. The first half-century of software development is filled with the Cartesion work style.

A person working in the style of Marx first asks, “Whom does this new system benefit? What changes in the social power structure accrue from its deployment?” This is a good question to consider, whether or not you like Marx.

A person working in the style of Heidegger considers the system for its efficacy as a tool. Ideally, the user does not “see” the system at all, but rather, sees through the system to the task being performed. For example, when I am typing, I don’t “see” the word processor, I see the page growing text. An accomplished pianist sees the music being formed, not the piano; a good carpenter sees the nail going into the wood, not the hammering tool. Heidegger’s frame can help us produce systems more fit for use.

It is only the style of Wittgenstein that directly opposes the style of Descartes. A person working in this style views the unfolding of the software design as the unfolding of a language game, in which new words are added to the language over time.

via Pelle Ehn, Wittgensteins Language Game – Agile Software Development — www.e-reading.ws.

 

They never taught me this in university.

Foreign-funded NGOs stalling development

NEW DELHI: An Intelligence Bureau report has accused “foreign-funded” NGOs such as Greenpeace, Cordaid, Amnesty and ActionAid of “serving as tools for foreign policy interests of western governments” by sponsoring agitations against nuclear and coal-fired power plants across the country.

The NGOs, said to be working through a network of local organizations such as PUCL and Narmada Bachao Andolan, have negatively impacted GDP growth by 2-3%, claims the IB report sent to the PMO and other government agencies.

via Foreign-funded NGOs stalling development: IB report – The Times of India.

With the newly elected government in place, the Shining Path of Development has begun to make its way forward. Apparently NGOs have received letters putting in question their FCRA status (whether or not they are allowed to take funds from abroad or not), so that we can ensure that they do no such thing as oppose environmental destruction or other critical development projects such as SEZ, nuclear power plants or hydropower dams.

“Intellectual Property”? How about “Imposed Monopoly Privileges” or “legislative colonization” instead

Did You Say “Intellectual Property”? It’s a Seductive Mirage

by Richard M. Stallman

It has become fashionable to toss copyright, patents, and trademarks—three separate and different entities involving three separate and different sets of laws—plus a dozen other laws into one pot and call it “intellectual property”. The distorting and confusing term did not become common by accident. Companies that gain from the confusion promoted it. The clearest way out of the confusion is to reject the term entirely.

According to Professor Mark Lemley, now of the Stanford Law School, the widespread use of the term “intellectual property” is a fashion that followed the 1967 founding of the World “Intellectual Property” Organization (WIPO), and only became really common in recent years. (WIPO is formally a UN organization, but in fact represents the interests of the holders of copyrights, patents, and trademarks.) Wide use dates from around 1990. (Local image copy)

The term carries a bias that is not hard to see: it suggests thinking about copyright, patents and trademarks by analogy with property rights for physical objects. (This analogy is at odds with the legal philosophies of copyright law, of patent law, and of trademark law, but only specialists know that.) These laws are in fact not much like physical property law, but use of this term leads legislators to change them to be more so. Since that is the change desired by the companies that exercise copyright, patent and trademark powers, the bias introduced by the term “intellectual property” suits them.

The bias is reason enough to reject the term, and people have often asked me to propose some other name for the overall category—or have proposed their own alternatives (often humorous). Suggestions include IMPs, for Imposed Monopoly Privileges, and GOLEMs, for Government-Originated Legally Enforced Monopolies. Some speak of “exclusive rights regimes”, but referring to restrictions as “rights” is doublethink too.

Some of these alternative names would be an improvement, but it is a mistake to replace “intellectual property” with any other term. A different name will not address the term’s deeper problem: overgeneralization. There is no such unified thing as “intellectual property”—it is a mirage. The only reason people think it makes sense as a coherent category is that widespread use of the term has misled them.

The term “intellectual property” is at best a catch-all to lump together disparate laws. Nonlawyers who hear one term applied to these various laws tend to assume they are based on a common principle and function similarly.

Nothing could be further from the case. These laws originated separately, evolved differently, cover different activities, have different rules, and raise different public policy issues.

Copyright law was designed to promote authorship and art, and covers the details of expression of a work. Patent law was intended to promote the publication of useful ideas, at the price of giving the one who publishes an idea a temporary monopoly over it—a price that may be worth paying in some fields and not in others.

Trademark law, by contrast, was not intended to promote any particular way of acting, but simply to enable buyers to know what they are buying. Legislators under the influence of the term “intellectual property”, however, have turned it into a scheme that provides incentives for advertising.

Since these laws developed independently, they are different in every detail, as well as in their basic purposes and methods. Thus, if you learn some fact about copyright law, you’d be wise to assume that patent law is different. You’ll rarely go wrong!

People often say “intellectual property” when they really mean some larger or smaller category. For instance, rich countries often impose unjust laws on poor countries to squeeze money out of them. Some of these laws are “intellectual property” laws, and others are not; nonetheless, critics of the practice often grab for that label because it has become familiar to them. By using it, they misrepresent the nature of the issue. It would be better to use an accurate term, such as “legislative colonization”, that gets to the heart of the matter.

via Did You Say “Intellectual Property”? It’s a Seductive Mirage – GNU Project – Free Software Foundation.

What function does sex identification at birth actually serve?

German parents will no longer be legally obliged to register their newborn child as male or female, and will instead be officially allowed to assign the baby a “third gender” if the sex cannot be clearly identified at birth.The new law will come into force on November 1, on the back of a constitutional court decision which states that as long as a person “deeply feels” that they belong to a certain gender, they have a personal right to choose how they legally identify themselves.Parents of newborn infants will be allowed to leave the gender form on the child’s birth certificate completely blank if it is born with unusual physical characteristics making it impossible to determine the gender.The new law will apply to intersexuals, also known as hermaphrodites, rather than transsexuals. Hermaphrodites are people in possession of both female and male physical characteristics.

via Germany to become first European state to allow ‘third gender’ birth certificates — RT News.

So, thanks to the new judgement in Germany, parents whose children have “unusual physical characteristics” will no longer be forced to choose one or the other (which, according to other articles often leads to immediate surgery to “correct” genitalia according to the choice of the parents). However, this raises the broader question – why is sex determination at birth even required at all?

Just as we don’t (any more) require or think that “race” should be determined at birth (at least not as far as I know in most places), is there any real function of determining sex at birth (or even ever)? What is the real function of having sex programmed into our official records?

Is it medically helpful to know who has a uterus and who has testicles? Yes, perhaps. However, this could be data simply privy between the doctor and patient, to be used as and when specifically required.

Is it there so that government programs can be targeted? So that we can decide who gets what benefits? Maybe.

Does it help government to identify people? Perhaps, but there certainly are better ways.

Does it help individuals to “self identify”? Well, it’s certainly not a self-determination of sex – rather an enforced one, and even if we weren’t entertaining it in official records I am sure the individual could figure out how they wanted to identify themselves.

Does it enforce a gender binary and the power structures that come with it? Certainly.

Of course, changing or getting rid of this couldn’t be done overnight, but isn’t it long-term an idea worth considering? Do we, in fact, require a society where sex identification at birth or even later in life (in drivers licenses, passports, etc.) is ever required?

You should listen to this, just saying

▶ Wax Tailor Feat. Marina Quaisse & ASM – Positively Inclined (Berry Weight Remix) – YouTube.

Review: DEV D

Amusing, intense love-gone-bad story taking place in Delhi and Punjab, chock-full of references in each and every direction.

via Linus Kendall: Filmography.

Memorable Meals To Eat In Your Lifetime (The Less BS version)

So, some website has conjured up forty meals to eat in a lifetime. A worthy list to have perhaps,  too bad it contains mostly bland looking and horrible food. See for yourself:

Memorable Meals To Eat In Your Lifetime – Business Insider.

Instead I propose an alternate list (mostly veg and I realize somewhat tilted towards subcontinental food…)  from my own meager experience (in no particular order except for my recollection):

  1. Bhetki Paturi in Kolkata
  2. Chao Mian (from hand pulled noodles of course) at a street side stall anywhere in wheat-eating parts of China
  3. Poulet aux prune tagine with cous-cous in Morocco (for me at a homestay in Moulay Idriss)
  4. Tapas (with Jerez) at a local bar in Seville
  5. Pickled aubegine. börek and other tasty snacks and meze in Istanbul
  6. Mr Falafel in Bruxelles, Belgium (Tel Aviv,pff)
  7. Heavy creamy daal makhani with paratha in Shahjahanabad
  8. Spicy laksa in Kuala Lumpur
  9. Appam and avial in Kerala
  10. Fried Momo with tangy,spicy tomato chutney in Kathmandu
  11. Gelato in Italy (ok, BI we can agree to agree on this)
  12. Arroz e feijão in Brazil, so simple yet so tasty
  13. Phuchka (preferred), golgappa or pani puri on any street around India (but ideally in Kolkata (preferred), Mumbai or Delhi)
  14. Rye bread (Swedish-style) with a slice of good cheese (manchego say, or something a bit stronger) and maybe a few strands of bell pepper
  15. Hongshao qiezi (because aubegine is about the best thing ever)
  16. Afghani bourani baingan with huge slightly leavened naan (because yes, aubegine is still the best thing ever)
  17. A full British fry up – because fat, stodge and dubious meat is what made the world go round for centuries (you can have it once, your heart will survive)
  18. Kashmiri rajma with a click ghee and rice
  19. Rice, mustard oil and gongura pickle in Andhra, India
  20. A selection of good cheese (from some local cheese shop) and wine in France
  21. Any spiced up version of a shashlik kebab from a street food corner from anywhere between Morocco and China (basically anywhere there is a sizeable muslim population with access to good spices)
  22. Tapas and wine at Garum 2.1 in Cordoba

Upon reading this I realize the list really needs to be added on to as far as African (south of Sahara) and South Amercian food goes…

Oh, and Eastern Europe, I’ve visited you, but nothing you threw at me makes the list. Sorry about that.