The book of inspiration

December 31, 2013

To Protect and Infect: The militarization of the internet

Filed under: tech — zproxy @ 9:58 am

WebGLSVGAnonymous

[...] your metadata, chained contacts and content will be stored for 15 years

  • Here’s a PDF file containing images Appelbaum showed in the talk

chuck-norris-eavesdrops-the-nsa-thumb

See also:

September 18, 2013

The Doom Piano by David Hayward

Filed under: tech — zproxy @ 12:06 pm

CropperCapture-2013-09-18-14-47-58-6140203

See also:

September 1, 2013

WebGL Doom

Filed under: tech — zproxy @ 11:07 am

logoby int13h.com

See also:

August 19, 2013

Sentiment Analysis / Opinion Mining

Filed under: tech — zproxy @ 9:18 am

Telephone Traffic

  • Opinion target: entities and their aspects (features) – a fingerprint with a query
  • Sentiment: positive or negative
  • Direct/indirect opinion holder: persons (source with agenda) who hold the opinions
  • Time: when opinions are expressed

Now what if I told you, your devices can do real time analysis of your opinions. What if the system was able to monitor global opinion and has the means to come up with events to change the required opinions . Whose side is your device on?

example3

Whenever you need to make a decision, you will need to consult the perception of reality of yourself and other people.

Opinion collection is no longer limited by your circle of friends. It is global.

See also:

June 11, 2013

PRISM

Filed under: tech — zproxy @ 2:10 am

[...] It’s about controlling any damning information from reaching epidemic proportions. It’s damage control to the extreme. It’s about the upcoming censorship of the internet in the name of national security. The plans are already in place.

“There’s no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren’t enough criminals, one makes them. One declares so many things to be a crime that it becomes impossible for men to live without breaking laws.” – Ayn Rand

NSAunchained

[...] But that’s the funny thing about how data is used by our current government. It’s used to createsuspicion, not to confirm innocence.

[...] he Navy has almost finished outfitting the nuclear-powered submarine USS Jimmy Carter with state-of-the-art technology for undersea fiber-optic taps, according to people knowledgeable about it.

[...] The free market is compromised, privacy is gone, the money is gone

[...] Yet no one is saying their own comments are gone, which means everyone who is posting can see their own comments in full, and are probably wondering why they are not getting any response from other people on the forum.This is accomplished by having the forum replicated many many times on a supercomputer somewhere, with a separate reality for everyone posting to it. 

Would you be surprised, if Mr. Eric was one of the morphed virtual persons produced by the holonet, as documented 911 victims, yet this time still alive? The ultimate turing test? What if this virtual person was powered by a powerful AI to enable two way video conference? When holonet skynet is known widely, noone can trust the anonymous internet as history will be rewritten and your memories replaced.

See also:

May 19, 2013

The Beginning Of The End Of CIA Google

Filed under: tech — zproxy @ 4:11 pm

… a lot of google people will go to prison, and they do not even know it

front company

A subsidiary or shell company used to shield another company from liability or scrutiny. A front company can be used to protect a parent corporation or brand from negative publicity in the event of a mishap, and may also be used to conceal illegal activities.

Facebook was indirectly funded by the CIA with the goal of learning and storing everything there is to know about you. Why? To monitor and ultimately control.

Up to now, the CIA has been organizing color revolutions using Twitter, Facebook, Youtube, and so forth as vehicles. … This is an operation which must be exposed.

I-always-feel-like-somebodies-watchin-me-red

[...] I see a future where you own your devices. And those devices work for you. They do not share any information with others.

[...] The question I have is: why the F**K should I share my network of contacts with these commercial entities.

[...] They’ve burned too many bridges at this point, to such a degree that at this point, I assume that if Google was behind it, it’s only a matter of time before they drop support.

 

[...] What is intuition? The body is always scanning for future events!

See also:

May 12, 2013

Keep the movies fresh

Filed under: tech — zproxy @ 10:31 pm

… There was an exchange program in place to “keep the movies fresh”, so old film reels were returned to America, along with the disguised rolls, where they were then loaded onto GIANT magnetic tape recorders and played back. The bandwidth was up to 3 mhz per channel, up to 256 channels, which allowed one tape to store every signal of significance originating within a nation for the length of time the tape ran.

.. Total data storage on one of these tapes was equal to many petabytes.

… NSA does not like signals stored digitally, because they look for such small subtleties in the signal for source identification, and nyquist noise is a major hindrance.

See also:

May 9, 2013

Time Lines

Filed under: tech — zproxy @ 3:13 pm

People living in fear will be stuck in 3rd density.

To a person going with the process, all they see is growth and improvement. To those left behind, they
see chaos and destruction.

get back in touch with the planet, as a living, intelligent entity.

Consciousness doesn’t grow from being told facts—it grows from the search for them

hurricanes are the product of “co-magnetic thredules” in the Earth’s core

See also:

May 8, 2013

Intel Perceptual Computing Challenge

Filed under: tech — zproxy @ 1:47 pm

This software development competition is seeking innovative ideas for a
software application (“App”) using Intel’s new programming Software Development Kit
(“SDK”) which can be used with a web camera that is able to perceive gestures, voice and
touch (on screen). The idea must fit one (1) of the following categories:
Category 1: Gaming,
Category 2: Productivity,
Category 3: Creative User Interface,
Category 4: Open Innovation.

We’ll select up to 750 finalist proposals. Users can have more than one idea proposal selected as a finalist.

First Place Prize of $75,000 + $12,500 in Marketing and Development Consultations

It’s been a while since there has been any disruption in the way we interface with traditional PCs. The Intel® Perceptual Computing Challenge wants your apps to change that.

We’re looking for the best of the best. Check your semicolons twice and really think about how you can change the world of computing. You can register and submit your ideas until June 17, 2013

See also:

May 7, 2013

Predictive Programming – The Guillotine Simulator

Filed under: tech — zproxy @ 3:51 pm

[...] REAL WORLD OR EXERCISE? FACT OR FICTION?

How long does it take for you to realize the email sent by a family member to you was faked? At what point will you be unable to differentiate history, real world events from media, movies and staged fake flag events? What if history was to be rewritten in real time? Time is running up. HOLONET

zombie (1)

… The reality is that most people don’t have the patience, time,resources or inclination to find out what is really going on out there.

… The greatest trick the Devil ever pulled was convincing the world he didn’t exist.

Willing Suspension of Disbelief

You can ask an audience to believe the impossible, but not the improbable.

Suspension of disbelief can be broken even in science fiction when a show breaks its own established laws or places said laws outside of fiction.

[...] You see suspending your disbelief is a stress on the mind, you’re asking your brain to ignore what it knows to be true. You’re saying “Hey brain, you know how people can’t fly? Well screw you, this guy can.” And your brain grumbles a bit but then does as you ask and accepts the fact that people can now fly. And then you say “Hey grey matter, vampires exist.” More grumbling, but Mr Brain plays the game. And then in the last chapter of the book when the protagonist is struggling to disarm a bomb, his faithful dog sidles up to him and says “Oi, Jeff, just cut the bloody blue wire already.”

“No,” replies Brian the Brain, “just no! Flying, yes. Vampires, yes. But dogs do not just randomly start talking because it’s bloody convenient.

gaslight

to manipulate someone into questioning their own sanity; to subtly drive someone crazy

[...]  there must be a few seconds or more after your head is chopped off until you lose consciousness. Its not like being shot through the brain. They say Hearing is the last to go, so you can hear the reaction of the crowd as you die

… a precise shot of paralytic to the top of the spinal cord, followed by a photorealistic rendering (through the goggles) of the goggles being removed… to reveal the severed-head’s view of the “real world” simulation room. Dim lights to black; leave them there to contemplate.

… They’re not laughing because anything is particularly funny. It’s the sort of laughter that is created by an inappropriate joke or a stressful situation that is avoided.

This speaks to the quality and efficacy of the simulation – it elevates stress enough that it causes participants to need to ‘laugh it off’.

… Would a “little” damage to the limbic system, for instance, make it difficult for people to remember things that happened in the past?

Would constant reminders be helpful in shaping memory, allowing some events to remain important while others faded away? Would this help keep people easy to control?

Well we have news. Science is already censored. Lots of secret science is conducted, and has been conducted. Secret science and technology has been kept hidden to create a huge technology gap, and this huge technology gap allows evil people to play God with you and your loved ones.

See also:

April 30, 2013

Organized Bloggers vs psy-op

Filed under: tech — zproxy @ 1:53 pm
  1. clearly define the mission so that it aligns with national objectives
  2. need a PSYOP estimate of the situation
  3. prepare the plan
  4. media selection
  5. product development
  6. pretesting – determines the probable impact of the PSYOP on the target audience
  7. production and dissemination of PSYOP material
  8. implementation
  9. posttesting – evaluates audience responses
  10. feedback

This isn’t the first time music has been used to influence the masses. One just has to look at history. Music is constantly being used to brainwash us, influencing our behaviors and our perception of reality, as well as changing and creating cultures! Remember how hip-hop used to be about spirituality and humanity?

16gbh

If the programmed subject is told to walk into an armed camp and assassinate an enemy leader, the subject will carry out his program with no regard to his personal welfare, whether he lives or dies, or how he is supposed to escape.

… Even under the ‘truth serum” drugs, the subject cannot reveal the truth because his conscious mind has no access to it.

… Waco was a “Open Eyes” operation.

… Whenever a government covert operative breaks his cover and begins to tell the truth, he/she is either jailed or killed.

… You can always judge the authenticity of serious reporters or investigative journals by paying attention to the things they have said about Project/Operation Monarch.

… Programmed terrorists are used by the NWO governments around the world to cause the citizens to give up their freedom and demand a police state to keep them safe. Once the police state is in place, the lessons learned from experiments like Jonestown can be used to program and re-educate the population in concentration camps

See also:

April 16, 2013

Google Glass API

Filed under: tech — zproxy @ 1:27 pm

Google has released documentation to the Mirror APIs, the API to program against Google Glass.

The second guide was slightly more technical, so when he returned a little later I asked him about the Debug Mode option. The reaction was interesting: he kind of looked at me, somewhat confused, and asked “wait, what version of the software does it report in Settings”? When I told him “XE4″ he clarified “XE4, not XE3″, which I verified. He had thought this feature had been removed from the production units.

… the Debug Mode option is the equivalent of the typical Android “Enable USB Debugging” option: it allows you to connect to the device over USB via adb.

… It knows all your passwords, for example, as it can watch you type them. It even manages to monitor your usage of otherwise safe, old-fashioned technology: it watches you enter door codes, it takes pictures of your keys, and it records what you write using a pen and paper. Nothing is safe once your Glass has been hacked.

See also:

April 9, 2013

HAARP vs PROJECT WOODPECKER

Filed under: tech — zproxy @ 5:19 am

 

 

A 24 hour day will seem to about 16 hours or less

geoengineering

sbx006_hires_lrg

[...] By the year 2025 the United States will own the weather

HAARP: THE HIGH FREQUENCY ACTIVE AURORAL RESEARCH PROGRAM (listen to it)

[...] could also be used to DISRUPT COMMUNICATIONS ALL OVER THE WORLD

Woodpecker: transmitter only a few kilometers southwest of Chernobyl and the receiver about 50 km northeast of Chernobyl… 31-bit pseudo-random binary sequence

Why does HAARP remind me Zak McKracken? Mind Control at 20m 22s.

Thee are atleast 17 HAARP stations around world.

7.83 Hz earths pulse rate – makes person feel good

10 Hz is used to put people into a hypnotic state.
10.80 Hz causes riotous behaviour
6.6 Hz causes depression.

See also:

March 26, 2013

leadercommunciator platform

Filed under: tech — zproxy @ 9:25 pm

A strategy is only a strategy until someone acts on it.

See also:

March 18, 2013

How to do this in WebGL?

Filed under: tech — zproxy @ 9:03 pm

tumblr_mjuzan58WY1r6j7rho1_r1_500

See also:

 

March 14, 2013

Another one bites the dust

Filed under: tech — zproxy @ 11:50 am

[...] RSS is my window to the world. - Slashdot

Today I learned another very highly used service bites the dust.

WARNING: Total media blackout 

From your 2,916 subscriptions, over the last 30 days you read 6,392 items, clicked 423 items, starred 0 items, and emailed 41 items.
Since December 25, 2010 you have read a total of 300,000+ items.

TimeOfDay

  • It is bad enough that the links stop working, images disappear and the videos at YouTube get pulled.
  • It is bad enough that blogs stop publishing valuable content or change their address.
  • It is hard enough to get someone blogging.
  • It is hard enough to get someone to read blogs.

I used to aske people I met did they have a blog. Now, without google reader, I am not sure how to follow them…

Google Reader is optimized to help you sift through many news items quickly. … and that’s something these newspaper-like apps cannot accomplish.

The Intenet.

I feel there is a need for a new service. A personal internet service. A service which will keep tabs on all the content for you. Works on your devices. Can not be discontinued. And keeps a copy of everything. Like a personal internet archive. And integrates with Google Glass, of course.

By phone I meant it will serve as a personal internet cache, your agent, always with you wherever you travel. You can connect to it from any laptop and it will synchronize feeds for you.

See also:

December 15, 2012

Windows NT Terminal Service RemoteApp

Filed under: tech — zproxy @ 3:12 pm

How many distinct C: drives can you explore at the same time?

Remote desktop connection icon.PNG

Did you know that you can run your remote application within your local desktop seamessly?

On your client modify your .rdp file:

remoteapplicationmode:i:1
remoteapplicationprogram:s:cmd.exe

On your server do:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\TSAppAllowList]
fDisabledAllowList“=dword:00000001

To list remote drives:

wmic logicaldisk get caption

To open the task manager:

taskmgr

To open Control Panel, one could choose Windows Classic layout:

control

While Visual Studio 2012 actually works in this mode.

Since some web applications already allow one to map network drives via WebDAV then how long, until one can actually connect to a virtual web application via Remote Desktop Client RemoteApp? What if that virtual web application would be hosted by your android device or your chrome web application?

What if the application was running on EC2 yet as a RemoteApp?

See also:

September 15, 2012

Web Browser

Filed under: tech — zproxy @ 10:57 am

The primary purpose of a web browser is to bring information resources to the user (“retrieval” or “fetching”), allow them to view the information (“display”, “rendering”), and then access other information (“navigation”, “following links”).

I like the way StatCounter is using the client only URL hash to query the web service. In chrome I like best the way it enables to synchronize bookmarks between all devices.

Normalised smartphone platforms to 3Q 2012

See also:

May 25, 2012

Key Frame Animation and 3D Drawing

Filed under: tech — zproxy @ 7:33 am

To unpack old packages:

msiexec /a Setup.msi TARGETDIR=”Y:\opensource\unmonitored\3DJournal_363\source” /qb

 

See also:

March 31, 2012

GDC 2012: The Bleeding Edge of Open Web Tech

Filed under: tech — zproxy @ 6:25 pm
  1. Detect and fetch bugs in he wild
  2. Detect and respond to user focus loss
  3. Track as much user data as possible
  4. Choose monetization metric that fits your game
  5. Focus on Consumable and durable goods

See also:

August 2, 2011

Unlimited Detail

Filed under: tech, video — Tags: , — zproxy @ 4:05 pm
  1. Fictional items designed by artists
  2. Scanned Real world items

via Geeks3D and also covered by slashdot, rockpapershotgun.

[...] more correctly, get excited about voxelsNotch

See also:

July 28, 2011

Hard to copy, easy to pay

Filed under: tech — Tags: , , , — zproxy @ 7:34 am
  • Hard to copy
    • Authenticity
    • Findability
    • Embodiment
    • Interpretation
    • Attention
  • Easy to pay
    • Immediacy
    • Personalization
    • Understanding how it works
[...] It’s fun to do impossible projects because then you don’t have to worry about what happens if you succeed – Seth
[...] “To get something you never had, you have to do something you’ve never done.”
[...] Things are only impossible until they’re not.
See also:

July 1, 2011

Write a proposal – What’s your sales message?

Filed under: tech — Tags: , , , , — zproxy @ 2:36 pm

cohesive: strong, unyielding

New business will be won only to the extent that the client believes that
the professional is interested, cares, and is trying to help.
—DAVID H. MAISTER1

So you have received a request for proposal? Do you know how to write a proposal? Do you know how to present your sales message?

The project proposal is a tool — not a goal. It should be followed as closely as possible, and deviations should occur only when necessary.

A Request for Proposal (RFP) is a formal statement of requirements and technical specifications that constitute a company’s needs for the evaluation, recommendation and bid proposal of systems, services or products from vendors.

[...] If you have the tools you still need wood to build anything.

‎[...] A hammer does not build a house for a carpenter.

In order to ask for comments provide a section by section overview to indicate where you are most uncertain.

  • The proposal as a cohesive document
  • The proposal as a persuasive document
[...] Persuasion – A successful intentional effort at influencing another’s mental state through communication in a circumstance in which the reader has some measure of freedom. – Daniel J. Okeefe
Why would we persuade?
  • To narrate
  • To inform
  • To convince
  • To explore
  • To make decisions
  • To define
  • To establish credibility

All proposals share in common the following basic parts:

  1. The metaphor of a body
  2. The idea of narration
  3. The idea of persuasion, we really are arguing for our idea
  4. The idea of audience
The checklist for effective persuasion:
  • Have the aims of persuasion been identified and addressed?
  • Is the central persuasive statement controlled?
  • Have logical fallacies been avoided?
  • Have the audience’s knowledge, beliefs, and attitudes been considered?
  • Has a formal persuasive system been followed?
[...] Anything only has a value depending on what we compare it to – Rory Sutherland
[...] The first rule of Persuasion Design is that every design is persuasive in some ways. There is no neutral way of designing something. – Arjan Haring 2010
Trick:
  • In your sales video, talk about the value you will be providing
  • Send customers to buy
  • Invite them –  “See you on the other side”
[...] Don’t tell me about your grass seed, tell me about my lawn

See also:

April 29, 2011

You do have a backup, right?

Filed under: tech — Tags: , — zproxy @ 9:32 am

Note to self: Have external drives sync up on each other bi-weekly.

Today I found out that my 1TB external hard drive has stopped working. Only the bright white LED was still shining. The operating system itself was unable to detect the drive via the USB connection.

You do have a backup, right?

Well, no. It was the backup. I had a collection of documents I wanted to read later. Most of them were related to my Ph.D studies and downloaded from the internet. The source code on the disk was either disposable or synced to a repository like svn or git. And then there was media like movies and images.

Should an external hard drive be considered as a temporary means to transport data?

A coffee spill on your Asus Ultrabook UX31E may take up to 2 + 8 weeks in your local repair shop!

(more…)

April 14, 2011

Ace Of Spades

Filed under: tech — Tags: , — zproxy @ 1:22 am

Will this be as cool as Minecraft?

Seems like April is the month for Voxels :)

As I have a spare 1 TB of storage space on my external HDD it seems I should write a bot to back up stuff I link in this blog as they seem to become unavailable only within a few years.

Also do check out XB PointStream Demo by Andor Salga:

See also: Hexplore

See also:

November 11, 2010

Turn off your WAP on Android

Filed under: tech — Tags: , , — zproxy @ 6:52 am

1. First, open phone dialer,
2. Press *#*#4636#*#* to bring up Testing screen,
3. Tap on Phone Information on the menu,
4. Press menu button on the phone,
5. Choose More,
6. Tap on Disable data connection.

* Unless you have a forgiving data plan that does not try steal your money.

** Still waiting for Froyo and Flash 10.1 for this device. (See press release)

Update:

Check locks: *#7465625#

Check your region: *#272*HHMM# where HH is hours and MM is minutes. (see also)

So where is it?

I9000XXJPC

Update: AdHoc WiFi? You could try to configure it.

*#1234# :SW Version

PDA: I9000XWJM5

PHONE: I9000XXJM3

CSC: I9000OXEJM1

*2767*4387264636#: ProductCode

PCode: GT-I9000HKASEB

See also: Update guide

Update: Android 2.3 was just announced. Can I get it on my Samsung Galaxy S? Mid december?

Note: Flash Player 10.1 is only for Android 2.2 (I9000XXJPC) on Samsung Galaxy S.

Update: Local Samsung rep told me to wait until December 24. Will wait then… :)

See also:

November 9, 2010

Outlander Online

Filed under: tech — Tags: , , — zproxy @ 8:25 am

Gavin you are doing good work. Arm your vehicle with dashcams rear front and sideways including microphone. The way I see it there needs to be a system for immediate automatic constitution violation detection, which would automatically allow to sue the agent and take class action at any such encounter.

Consider this. You stop your car and your car loudspeaker will identify itself to the agent, allow the agent to identify himself. Read the agent his rights and wait for further actions. As soon there is a violation the agent will be notified by the car, fined and sued. All done by the robotic voice overlay. Robocop comes to mind.

Lets keep the good fight.

Guys, I just logged into a car, remotely. I drove it for 1 minute and 30 seconds. I used my keyboard to do that. The car was on the other side of the earth. Think of the implications.

When can I log into my car? I want to drive it remotely, too. We know that cars with all their electronics will be fully capable in doing that in near future.

This is me, logged in as alias Kevin Sutherland, driving around on my Dell Latitude XT with an Outlander!

We already knew there were drones patrolling around desert Nevada . Exactly how long will it take to have remote controlled taxi service or public transport in general? We know that some trains already rely on automation.

Skynet?

Update: Without the code, can you trust them?

2013-09-28: surgical kinetic air strikes has a whole new meaning

Air Force to End the Need for Pilots In 6th Generation Fighters

See also:

October 27, 2010

Face Input

Filed under: tech — Tags: , , , — zproxy @ 7:23 am

Have you seen those single input games? One where you just have to press space to jump? One where you have to press space to gain height for your air plane? Where you change the orientation of your phone to see the beer glass being depleted?

What about face input? You can either blink or move your head. You can even ask your girlfriend for a split screen game.

The future input events:

  • this.onkeypress
  • this.onclick
  • this.ontouch
  • this.onvoice
  • this.onface
  • this.oncameratilt
  • this.onacceleration
  • this.onorientation
  • this.onhoverhands
  • this.oneye
  • this.oneyesclosed
  • this.onmusic
  • this.onmind
  • this.ondevicesensor
  • this.ongps
  • this.onmagnet
  • this.onnfc

See: http://mrdoob.com/lab/actionscript/webcam/face_driven_3d/ (see also the article)

How many web cameras does your multitouch multiscreen application consume?

Update: See Face Tracking Tetris with Kinect

See also: Emergency and Disaster Service mentioned by Nathan

The Technium referenced some thin interesting named Readers of The Screen:

See also:

October 24, 2010

Have you tried turning it off and on again?

Filed under: tech — zproxy @ 10:12 am
  • Most Of Your Accomplishments Are Invisible
  • Every Conversation You Have Is Roughly The Same
  • You’re An Expert Of Bleeding-Edge Technology Products, Aren’t You?
  • Your Talents Are Forcibly Undervalued
  • You’re Never Allowed A Moment’s Peace
  • People Ask You To Perform Miracles
  • Your Assumed “All-Knowing” Status Sets You Up To Let People Down
  • You Possess Unlimited Responsibility
  • A Life Of Alienation
  • You Have No Identity

via lifereboot.com

See also: Reasons for quitting IT by Jack

October 19, 2010

Convert C Headers to .NET

Filed under: tech — Tags: — zproxy @ 12:19 pm

Alexandre Mutel has been busy generating a .NET wrapper for DirectX 11. From what I could gather he is reading .h files in and writing .cs files out.

Note that his post seems to be unavailable.

New OpCodes used by his tool:

  • instruction “calli
  • instruction “sizeof” for generic
  • instruction “cpblk“, memcpy in IL

For future reference to gather some of my thoughts:

It so happens to be that jsc is also providing some support for PInvoke to convert an application to java source code.

Could one at one point program a java application in C# which runs on JVM and uses DirectX via jni? Technically it is possible yes although while jsc uses a version of jni which seems to be bound to the CDecl calling convention.

The names of the exported native functions can be read as described on stackoverflow. For parameters a .h file is required.

What is Cdecl?

ANSI C or POSIX (see the API) portability is a goal

see also: http://en.wikipedia.org/wiki/Interix

__cdecl: caller pushes and pops args off stack, args passed right to left.
Older, unmanaged code that was developed by using the standard C libraries can implement functions that take variable numbers of parameters by using a technique that is known as varargs. Only the code that calls these functions knows for certain what it has placed on the stack, so it is the responsibility of the calling code to clean up the stack when the function completes. This is referred to as the Cdecl calling convention. It is the mechanism that unmanaged code that runs on Windows Embedded CE uses (you can use this as a point to select between Cdecl and StdCall nn your code).

 

See also:

Older Posts »

The Shocking Blue Green Theme Blog at WordPress.com.

Follow

Get every new post delivered to your Inbox.

Join 62 other followers