Jerry Garcia, Ken Kesey, Pig Pen, Bob Weir and a cast of thousands.
Opps. Here are the working links:
Acid Test Tapes:
Your books will be burnt and your family will be persecuted and the law will be used to intimidate you and eventually destroy you. Unless you can influence, recruit and control a greater and more skillful number of agents and have better weapons, your reason, ethics and opinions will remain useless and helpless. It has always been the case and so it will remain forever.
You have the right to dream within a preset paradigm of "freedom". An ineffective freedom which could be terminated at anytime by a weird and unfortunate accident, a bullet in the chest or a plausible suicide.
How Hackable Is Your Car? Consult This Handy Chart | Autopia | WIRED
Last year, when hackers Charlie Miller and Chris Valasek showed they could hijack the steering and brakes of a Ford Escape and a Toyota Priu
The Late Late Show Video - The Late Late Show - 7/14/2014 - CBS.com
Craig welcomes comedian Margaret Cho and actor Zachary Levi. (TV-14 D, L)
LinkedIn blocking Tiananmen Square posts in China | Al Jazeera America
Professional networking site says its policy complies with Chinese web rules and protects users
Apple Removed Encryption Protection for Email Attachments, Researcher Says
The tech giant withheld safeguards from parties seeking access to users’ email attachments in the latest versions of its operating system fo
Has the NSA Been Using the Heartbleed Bug as an Internet Peephole? | Thr...
The Heartbleed bug is unusually worrisome because it could possibly be used by the NSA or other spy agencies to steal your usernames and pas
NSA performed warrantless searches on Americans' calls and emails – Clapper
Director of national intelligence confirms for first time that NSA has used 'backdoor' in surveillance law to search for data related to 'US
Listening to Dylan Farrow: Woody Allen and the Mysteries of Family
Woody Allen’s adopted daughter, alleging that he sexually assaulted her, has brought to light questions, normally suppressed, about relation
Schneier on Security: Catalog of Snowden Revelations
Schneier on Security. A blog covering security and security technology. « GINSU: NSA Exploit of the Day | Main. January 30, 2014. Catalog of
Schneier on Security: Surveillance as a Business Model
Schneier on Security. A blog covering security and security technology. « Friday Squid Blogging: Magnapinna Squid Photo | Main. November 25,
I Trust Obama More Than I Trust Insurance Companies
What insurance companies have done since “Obamacare” registration went live, using loopholes in the law to cancel or raise prices on insuran
Fukushima residents may never go home, say Japanese officials
Admission deals blow to government assurances that radiation near the Daiichi nuclear plant can be brought down to safe levels
WATCH: Get your very own NSA children's toy [Fiore Cartoon]
"With a Li'l NSA Spy Kit, You Can Spy on Anyone, Anywhere!"