oid

[Vaccine] Side Effects That Were Unavoidable

The meaning of the title of this post is up for grabs in the Supreme Court in a vaccine case against drug company Wyeth, now owned by drug giant Pfizer. It's a complicated case in legalities, and which court should be hearing the arguments, and more jargon and nonsense.

What it's really about, is that a little girl was severely harmed by a vaccine years ago, and several years later that vaccine was removed from the market because it was so dangerous. Yet the courts say the proof is not there that the vaccine was at fault.

"...case turns on the text of the federal law, which bars ordinary lawsuits “if the injury or death resulted from side effects that were unavoidable even though the vaccine was properly prepared and was accompanied by proper directions and warnings.”

Much of the argument concerned the meaning of the word “unavoidable.”
“The language that they used is certainly, to say the least, confusing,” Justice
Ruth Bader Ginsburg said." [NY TIMES]

The Obama administration sides with Wyeth. The record of the FDA in coming to the aid of US public health is so abominable, it makes the reference to it in the following quote worse than any Comedy Central punch line:

"The U.S. government filed a brief and argued on behalf of Wyeth, with assistant to the solicitor general Benjamin J. Horwich telling the court that the Food and Drug Administration and Centers for Disease Control make determinations about which vaccines are safe and effective, and it should stay that way.

'It would be extraordinary to institute a system where juries would be second guessing a decision' by federal experts, he said." [Post-Gazette]

As they say in the movie business, "What a throw-away line!" Any jury would have the benefit of input from various experts from all sides--and in this age of skepticism of government oversight, from Katrina on down to the recent multi-million-egg recall, who wants to have the sole last word on vaccine safety be the FDA and CDC? Hands please?

"Justice Sonia Sotomayor, meanwhile, seemed to sympathize with the argument that manufacturers could keep less safe vaccines on the market without a legal incentive.

'What is the motivation for manufacturers to continue testing [vaccines] and voluntarily stopping [sales] if a better design is found somewhere else?' she asked. 'I don't see why they should stop before they cause as many injuries as they need to before the FDA tells them to stop.' " [Post-Gazette]

--A voice of clarity amidst the dense fog.




oid

Avoid the Cold and Flu with Oregano Oil

The best way to not get the cold and flu is by using Oil of Oregano.




oid

Foods to Avoid When Experiencing Muscle and Joint Pain

Food groups to avoid or reduce in order to reduce or eliminate inflammation from muscle pain or joint pain.




oid

Attention Runners - Training Mistakes to Avoid

Tips for runners when training for a marathon and mistakes to avoid.




oid

Avoid and Prevent Shin Splints

Tips to help you avoid and prevent shin splints from occurring when enjoying the sport of running.




oid

Mistakes To Avoid When Buying a New Baseball Bat

Baseball is a fun sport that can keep you in shape. Learn the mistakes to avoid when buying a new baseball bat.




oid

Starting a Podcast? Avoid These 7 Common Mistakes

Let me tell you: it was a journey. Learning how to podcast is easy on the one hand, but keeping it up requires grit. I struggled. I celebrated. I attracted clients. I considered quitting at times. I got fan mail. I stuck with it.

Lather, rinse, repeat.

It has now been over 17 months, and I've learned some things. If you are thinking of starting a podcast, here are a few mistakes I'd recommend avoiding:

1. Spending too much money
You do not need a bunch of fancy equipment to start a podcast. Trust me. I spent $65 on a used Yeti microphone and pop filter from some guy off Craigslist and started recording the next day.

complete article




oid

7 Ways to Avoid the No.1 Virtual Sales Meeting Mistake

Here are seven ways you can avoid common virtual sales meeting technology mistakes

1. Prepare meeting attendees in advance with clear instructions
2. Run a tech check
3. Increase your internet speed and bandwidth
4. Choose a reliable meeting platform
5. Invest in quality audio and video
6. Master your platform
7. Have a backup plan




oid

Top 10 Driving Distractions: What to Avoid to Stay Safe

These are some of the most dangerous things that you can do whilst driving, and why you should avoid them.




oid

Fighting a Cold: Five Common Mistakes You Should Avoid

As the cold season has arrived, so did common colds. It's important to avoid certain pitfalls to recover quickly and prevent complications.




oid

Android 15 QPR2 brings the newest Linux kernel to all tensor-powered phones and tablets - Android Police

  1. Android 15 QPR2 brings the newest Linux kernel to all tensor-powered phones and tablets  Android Police
  2. Here’s everything new in Android 15 QPR2 Beta 1 [Gallery]  9to5Google
  3. Your Google Pixel Phone's Newest Android 15 Beta Update Arrived  Droid Life
  4. Google is preparing to bring back a beloved customization feature from Android 11  Android Authority
  5. Android 15 QPR2 beta 1 release includes major upgrade for Tensor-powered Pixels  PhoneArena




oid

Newer Android Tablet with LTE?



  • Smart Phones and Devices

oid

By selling 5.5 lakh square meters of land in FY25, Noida Authority hopes to raise Rs 3,700 crore

According to officials, the Noida Authority projects that in the fiscal year 2024-2025, it will sell group housing plots for a maximum of Rs 1,080 crore and commercial land parcels for Rs 1,010 crore.  According to people who know the … Continue reading




oid

HubMed is PubMed on Steroids

At the Internet Librarian's Conference, Steven M. Cohen demonstrated many real cool RSS applications including HubMed. Not being a health sciences librarian, I wasn't yet familiar with this relatively new alternative search of the familiar PubMed medical literature database. If you're one who monitors the latest news about a drug or treatment, or if you're doing serious medical research, you'll absolutely love the assortment of alerts and exporting features HubMed provides.

You won't appreciate any of this until you do a search. So go ahead, look for something of interest. I have a niece just diagosed with Hodgkin's Lymphoma so I'll do a search of that. HubMed allows users to perform a search, click on the orange "feeds" button in the right corner of the search results, and save it as an RSS feed. When new articles have been added to PubMed, HubMed will send you this information notification as an RSS feed.

So from the page of the search results I click on the orange button and now I see a page with the urls for query based feeds in both RSS and Atom formats. You can simply drag this button into a RSS news reader like NetNewsWire Pro (Mac) or NewzCrawler (PC) . Myself, I click on my Bloglines brower bookmarklet, and bingo, I'm into Bloglines where with one more click I'm subscribed to this feed for Hodgkins's Lymphoma. Now, Hubmed will keep checking the literature and deliver to me everything new it finds. Three clicks, literally. This is better than a dog that brings the morning paper.

If you are subscribed to a HubMed RSS feed, you can also post directly from your aggregator using the Blogger API at http://www.biologging.com/xmlrpc.php. Biologging, is a community weblog for biomedical researchers. It allows you to create your own annotated store of abstracts, and to browse the logs of other users. You can create an account and submit posts to your personal weblog within biologging by using the 'Blog This' or 'Make A List' buttons in HubMed.

But wait, there's more. So much more, in fact that Matt Eberle at Library Techlog calls Hubmed "The Swiss Army knife of PubMed interfaces." If you go back to your search results, you'll see for each result a number of links to things like Abstract, Fulltext, SFX, Clip, Citation, Related, TouchGraph, and References.

A click on the SFX link (a library link server) connects you to a look up of the resource in the holdings in your local library's catalog. It supports Innovatic Innopac, BIBSYS, Dynix Horizon, Endeavor VOYAGER, SIRSI Unicorn catalogs. You can also ook up holdings in other catalogs (such as MELVYL and Library of Contress, and OCLC WorldCat), request the document be sent to you using your library's document delivery service or another (such as ILLiad and Infotrieve), download the bibliographic record for importation into your software (Refworks, Endnote, Procite, Reference Manager), save the citation, capture it using the wonderful award winning Windows utility NetSnippets, and more.

My compliments to Alf Eaton and the creators of HubMed. "I have used HubMed for a while now," writes Steven, "and have been absolutely thrilled with the results. This is one of those tools that awes the crowds at some of my presentations, and rightfully so."

I agree and only wish that HubMed had more in the way of tutorials to help novices like myself get the most out of this wonderful service. Have fun exploring it!

Speaking of the health sciences, look for the syndication of more and more publications from federal agencies. I saw recently, for example, that the National Network of Libraries of Medicine South Central Region (NN/LM SCR) is publishing Network News, their bimonthly Newsletter from the South Central Region, as a RSS feed. Thank you, Greg Bodin, for offering this.




oid

The Top 3 Cloud Network Security Threats (And How to Avoid Them)

As more businesses move to the cloud, they are becoming increasingly vulnerable to cloud network security threats. Here are the top three threats and how to avoid them: Data breaches One of the most common and devastating cloud security threats is data breaches. These can occur when hackers gain access to a company’s cloud-based data, …

The Top 3 Cloud Network Security Threats (And How to Avoid Them) Read More »




oid

DOJ Tries to Break Up Google Chrome, Android, and Search Monopoly

Spencer is back with Jared to host this week’s episode of the Niche Pursuits News Podcast.  Like they always do, they discuss the major happenings related to SEO, small publishers, Google, and beyond, and it has been a very eventful…

The post DOJ Tries to Break Up Google Chrome, Android, and Search Monopoly appeared first on Niche Pursuits.




oid

How to add PGP support on Android for added security and privacy

If you need to add encryption or digital signing to the Thunderbird email app (or other supporting apps) on Android, there's one clear and easy route to success.




oid

Ep 076 - A Small Way to Avoid Regret

In which Nicole reflects on some of the best advice she’s ever gotten in life and how it’s helped her avoid deep regret over the years. Learn more about Nicole’s trauma-informed coaching services (nicoleroccas.com/coaching). Connect with Nicole on Instagram or Twitter (@NicoleRoccas). The intro and outro of this podcast are the songs "Idea" and "Remedy for Melancholy" by Kai Engel, available under a CC BY-NC 4.0 license.




oid

Avoiding Surprises on the Day of Judgment

Fr. John Whiteford's sermon from March 10, 2024.




oid

Tax Whistleblower Law Proves Highly Effective at Reducing Corporate Tax Avoidance




oid

Avoid the Arguments. Live the Faith!

On the Sunday of the Holy Fathers we hear St. Paul teaching his spiritual son, St. Titus, how to live the faith instead of being distracted by troublemakers!




oid

Addiction, Possession, and the Opioid Crisis

Drug related deaths due to heroin and opioids are on the rise. It’s becoming an epidemic. Why is this? What are the factors contributing to this crisis of life and death? Why is this crisis reflective of a deep spiritual disorder that demands that parishes and their members get engaged based on their resources and capacity? Join Michael as he attempts to address these questions and shares information from his Metropolis that can be useful to many.




oid

The Opioid Crisis: What You Need to Know

A special episode of Healthy Minds Healthy Souls Radio Show entitled "The Opioid Crisis: What You Need to Know" with guests Fr. Anthony Salzman, Chris Thrasher, and Rev. Dr. Von Wrighten. Join us for a practical and in-depth discussion on the growing opioid crisis.




oid

Healing Opioid Addiction and Parish Culture

In this episode, Fr. Anthony talks with Subdeacon John (Robert) Cummings, the Manager of Staff Training and Development at Red Oak Recovery in Waynesville, PA, about opioid addiction, what works in recovery, and how the lessons of effective recovery can be re-learned and enculturated by our parishes. Along the way, they spar about the correct pronunciation of Appalachia (Fr. Anthony used the pronunciation of his ancestral homeland of northern Appalachia; Sdn. John that of his southern part), Enjoy the show!




oid

How to Avoid Sinking

Are you keeping your eyes on Jesus when the stormy seas of life stir up the fear of death?




oid

Avoiding the Passion

Fr. Ted shares his homily from Great and Holy Thursday.




oid

Moida Mansion

Papers Please/Obra Dinn creator Lucas Pope dropped a surprise spooky free web game inspired by 1980s LCD handhelds #




oid

Avoiding Insanity




oid

Race voided as stalls stranded on track

A race at Chelmsford is dramatically halted because the starting stalls could not be removed from the track.




oid

Office updates iOS, Android apps – Windows 10 apps coming soon

Since Microsoft first introduced Office for the iPad last March, it’s been downloaded some 40 million times, even with the restrictions of needing an Office 365 subscription to use it. Today, Microsoft announced that Office will soon be coming to …




oid

Avoiding the conversion cliff-edge: How SLAs support a successful lead handover

Service Level Agreements are the secret sauce for ensuring marketing and sales are singing from the same song sheet. Qualifying inbound leads is an exercise in cooperation between departments.




oid

News roundup: Chrome for Android, ASCII Fluid Dynamics, Node.js: doing life wrong?

(no podcast this week - Boo! Check back next week) Chrome for Android Google has just released a beta of Chrome for Android, which is available for those running Android Ice Cream Sandwich (aka "the 1%"). This isn't JavaScript-specific news per se, but it is HUGE news for web devs ...




oid

Bortoleto pushed for 2025 F1 debut to avoid missing a year of racing | Formula 1

Gabriel Bortoleto said he was determined not to sit out a year of racing in 2025 after Sauber confirmed he will make his debut for them in Formula 1 next year.







oid

A Template-Based Short Course Concept on Android Application Development




oid

Android malware analysis using multiple machine learning algorithms

Currently, Android is a booming technology that has occupied the major parts of the market share. However, as Android is an open-source operating system there are possibilities of attacks on the users, there are various types of attacks but one of the most common attacks found was malware. Malware with machine learning (ML) techniques has proven as an impressive result and a useful method for malware detection. Here in this paper, we have focused on the analysis of malware attacks by collecting the dataset for the various types of malware and we trained the model with multiple ML and deep learning (DL) algorithms. We have gathered all the previous knowledge related to malware with its limitations. The machine learning algorithms were having various accuracy levels and the maximum accuracy observed is 99.68%. It also shows which type of algorithm is preferred depending on the dataset. The knowledge from this paper may also guide and act as a reference for future research related to malware detection. We intend to make use of Static Android Activity to analyse malware to mitigate security risks.




oid

Unsupervised VAD method based on short-time energy and spectral centroid in Arabic speech case

Voice Activity Detection (VAD) distinguishes speech segments from noise or silence areas. An efficient and noise-robust VAD system can be widely used for emerging speech technologies such as wireless communication and speech recognition. In this paper, we propose two versions of an unsupervised Arabic VAD method based on the combination of the Short-Time Energy (STE) and the Spectral Centroid (SC) features for formulating a typical threshold to detect speech areas. The first version compares only the STE feature to the threshold (STE-VAD). In contrast, the second compares the SC vector and the threshold (SC-VAD). The two versions of our VAD method were tested on 770 sentences of the Arabphone corpus, which were recorded in clean and noisy environments and evaluated under different values of Signal-to-Noise-Ratio. The experiments demonstrated the robustness of the STE-VAD in terms of accuracy and Mean Square Error.




oid

Modeling and Performance Analysis of Dynamic Random Early Detection (DRED) Gateway for Congestion Avoidance




oid

International Collaboration for Women in IT: How to Avoid Reinventing the Wheel




oid

Genetic-linked Inattentiveness Protects Individuals from Internet Overuse: A Genetic Study of Internet Overuse Evaluating Hypotheses Based on Addiction, Inattention, Novelty-seeking and Harm-avoidance

The all-pervasive Internet has created serious problems, such as Internet overuse, which has triggered considerable debate over its relationship with addiction. To further explore its genetic susceptibilities and alternative explanations for Internet overuse, we proposed and evaluated four hypotheses, each based on existing knowledge of the biological bases of addiction, inattention, novelty-seeking, and harm-avoidance. Four genetic loci including DRD4 VNTR, DRD2 Taq1A, COMT Val158Met and 5-HTTLPR length polymorphisms were screened from seventy-three individuals. Our results showed that the DRD4 4R/4R individuals scored significantly higher than the 2R or 7R carriers in Internet Addiction Test (IAT). The 5-HTTLPR short/short males scored significantly higher in IAT than the long variant carriers. Bayesian analysis showed the most compatible hypothesis with the observed genetic results was based on attention (69.8%), whereas hypotheses based harm-avoidance (21.6%), novelty-seeking (7.8%) and addiction (0.9%) received little support. Our study suggests that carriers of alleles (DRD4 2R and 7R, 5-HTTLPR long) associated with inattentiveness are more likely to experience disrupted patterns and reduced durations of Internet use, protecting them from Internet overuse. Furthermore, our study suggests that Internet overuse should be categorized differently from addiction due to the lack of shared genetic contributions.




oid

A Method for Indoor Vehicle Obstacle Avoidance by Fusion of Image and LiDAR

Background and Objective: In response to the challenges of poor mapping outcomes and susceptibility to obstacles encountered by indoor mobile vehicles relying solely on pure cameras or pure LiDAR during their movements, this paper proposes an obstacle avoidance method for indoor mobile vehicles that integrates image and LiDAR data, thus achieving obstacle avoidance for mobile vehicles. Materials and Methods: This method combines data from a depth camera and LiDAR, employing the Gmapping SLAM algorithm for environmental mapping, along with the A* algorithm and TEB algorithm for local path planning. In addition, this approach incorporates gesture functionality, which can be used to control the vehicle in certain special scenarios where “pseudo-obstacles” exist. The method utilizes the YOLO V3 algorithm for gesture recognition. Results: This paper merges the maps generated by the depth camera and LiDAR, resulting in a three-dimensional map that is more enriched and better aligned with real-world conditions. Combined with the A* algorithm and TEB algorithm, an optimal route is planned, enabling the mobile vehicles to effectively obtain obstacle information and thus achieve obstacle avoidance. Additionally, the introduced gesture recognition feature, which has been validated, also effectively controls the forward and backward movements of the mobile vehicles, facilitating obstacle avoidance. Conclusion: The experimental platform for the mobile vehicles, which integrates depth camera and LiDAR, built in this study has been validated for real-time obstacle avoidance through path planning in indoor environments. The introduced gesture recognition also effectively enables obstacle avoidance for the mobile vehicles.




oid

An Approach/Avoidance Framework of Workplace Aggression

The number of constructs developed to assess workplace aggression has flourished in recent years, leading to confusion over what meaningful differences exist (if any) between the constructs. We argue that one way to frame the field of workplace aggression is via approach/avoidance principles, with various workplace aggression constructs (e.g., abusive supervision, supervisor undermining, and workplace ostracism) differentially predicting specific approach or avoidance emotions and behaviors. Using two multi-wave field sample of employees, we demonstrate the utility of approach/avoidance principles in conceptualizing workplace aggression constructs, as well as the processes and boundary conditions through which they uniquely influence outcomes. Implications for the workplace aggression literature are discussed.




oid

Need for avoiding trial by media

THE term “trial by media” gained popularity in the late 20th and early 21st centuries.
It refers to the impact of television and newspaper coverage on an individual’s reputation, often shaping public perceptions of guilt or innocence before a court has rendered its verdict.

Trial by media creates a reality shaped more by perception than by objective truth, where opinions are formed before verified information can be fully assessed.

The delicate balance between sense and sensationalism, news and noise, civility and chaos, and balance and extremism can also become increasingly distorted.

The Ulu Tiram and GISBH cases have driven the media into a frenzy as both are considered matters of public interest. From broad overviews to minute details, nothing has been spared in the reporting.

Public comments reflect feelings of anger, resentment, frustration and disappointment toward the accused
or state institutions. Even the names of witnesses are often anticipated, jeopardising the confidentiality of the case.

A lackadaisical attitude in handling high-profile cases can ultimately lead to witnesses becoming hostile or biased.

The current situation illustrates how trial by media can create its own narrative, potentially undermining fair judicial proceedings and damaging the reputations of those involved.

It can also contaminate and influence witnesses’ memories, stances and views. Even if an accused individual is acquitted, the public may still perceive the person as guilty, leaving the individual’s reputation tarnished despite a verdict of innocence.

While the creation of social media has given us an extensive space to express our opinions, the lack of policing and regulations has allowed the widespread of rumours and prophecies in court cases.

The news disseminated through mainstream and social media can create multiple ideas, often leading to the presumption of guilt or innocence for the accused before the trial even begins. This is the exact definition of trial by media.

The principle of sub judice (under judicial consideration), though relevant, appears to be overlooked in the public discourse surrounding ongoing trials. The rule on sub judice seeks to safeguard the sanctity of court proceedings and ensure a fair trial for the accused in criminal cases.

Therefore, it would be apt for lawyers, prosecutors and the judiciary to take cognisance of the current situation and devise certain measures to ensure the impartiality of witnesses, and to avoid any spillage or contamination of evidence.

Expert witnesses, if appointed under section 45(1) of the Evidence Act, should not only be someone who is qualified in “science or art” but have a track record of being impartial and have not or will not mislead the court.

Impartiality here refers to individuals who abide by the law and do not have a track record of promoting repealed laws or overruled cases.

Although the court has the discretion to decide whether the expert evidence
is admissible, it is imperative for
experts to be scrutinised by the courts before accepting their views and opinions. In any event, it is trite law that expert opinion is not binding upon the court.

While the media shapes public debate and highlights cases of public interest, the unparalleled capacity of social media also offers lawyers an opportunity to volunteer and represent offenders who are in dire need of representation. Beyond concerns about legal fees, this is about striving to uphold justice. Some cases are simply meant to be pro bono.

With the proliferation of information available through mainstream and
social media platforms, lawyers and prosecutors should seize the opportunity to scour important details from these channels.

Unfortunately, very few lawyers have taken the bold step to assist those in desperate need of legal representation.

With the National Legal Aid Foundation unable to represent detainees under the Security Offences (Special Measures) Act 2012 during their trials and its potential dissolution, what would become of the poor and marginalised groups in need of legal representation?

Where are the pro bono lawyers
who are expected to uphold justice
and ensure the right to a fair
trial as enshrined in the Federal Constitution?

Legal advocates would do well to remember Martin Luther King Jr’s quote: “Injustice anywhere is a threat to justice everywhere.”

While no one can deny the media’s sterling role as the keeper of conscience and unraveller of wrongdoings, it is equally undeniable that the media has been able to entice vast reporting and responses from the public.

Therefore, it is essential to establish clear rules and regulations to safeguard individuals’ right to a fair trial, as stipulated in the Federal Constitution. Ultimately, what we seek is justice for all.

The writer is a criminologist and the deputy dean (Higher Degree) of
Faculty of Law, Universiti Malaya.
Comments: letters@thesundaily.com



  • Dr Haezreena Begum Abdul Hamid

oid

How Do I Avoid the Money in My Bank Disqualifying My Children From Financial Aid for College?

If you’ve sent kids to college, you’ve probably heard of FAFSA (Free Application for Federal Student Aid). FAFSA offers federal government aid via loans, grants and work-study options. It determines how much financial aid your children will get for college based on your family’s income and assets. As a parent, that includes your income, investment […]

The post How Do I Avoid the Money in My Bank Disqualifying My Children From Financial Aid for College? appeared first on Clark Howard.




oid

4 Signs You’re a Victim of Deed Theft (and How To Avoid It)

Deed theft happens when someone steals your home’s title and takes action — or tries to take action — against your property for financial gain. Also called home title theft, this crime isn’t new. But it’s gained more attention as high profile properties, including Elvis Presley’s Graceland, have been targeted. The good news is there […]

The post 4 Signs You’re a Victim of Deed Theft (and How To Avoid It) appeared first on Clark Howard.




oid

12-hours deadline: launching a website on the run (based on Monstroid2)

Is it possible to launch a website in 12 hours? You start out having lots of time ahead, yet at some point, the deadline creeps closer, and you realize you don’t have enough hours left to do the work.

This …

The post 12-hours deadline: launching a website on the run (based on Monstroid2) appeared first on Template Monster Help.




oid

The void in supporting working mothers

Extensive research highlights the anxiety and stress working mothers face while balancing their work and family life.



  • The Way I See It

oid

Analog Equivalent Rights (8/21): Using Third-Party Services Should Not Void Expectation of Privacy

Privacy: Ross Ulbricht handed in his appeal to the U.S. Supreme Court last week, highlighting an important Analog Equivalent Privacy Right in the process: Just because you’re using equipment that makes a third party aware of your circumstances, does that really nullify any expectation of privacy?

In most constitutions, there’s a protection of privacy of some kind. In the European Charter of Human Rights, this is specified as having the right to private and family life, home, and correspondence. In the U.S. Constitution, it’s framed slightly differently, but with the same outcome: it’s a ban for the government to invade privacy without good cause (“unreasonable search and seizure”).

U.S. Courts have long held, that if you have voluntarily given up some part of your digitally-stored privacy to a third party, then you can no longer expect to have privacy in that area. When looking at analog equivalence for privacy rights, this doctrine is atrocious, and in order to understand just how atrocious, we need to go back to the dawn of the manual telephone switchboards.

At the beginning of the telephone age, switchboards were fully manual. When you requested a telephone call, a manual switchboard operator would manually connect the wire from your telephone to the wire of the receiver’s telephone, and crank a mechanism that would make that telephone ring. The operators could hear every call if they wanted and knew who had been talking to whom and when.

Did you give up your privacy to a third party when using this manual telephone service? Yes, arguably, you did. Under the digital doctrine applied now, phonecalls would have no privacy at all, under any circumstance. But as we know, phonecalls are private. In fact, the phonecall operators were oathsworn to never utter the smallest part of what they learned on the job about people’s private dealings — so seriously was privacy considered, even by the companies running the switchboards.

Interestingly enough, this “third-party surrender of privacy” doctrine seems to have appeared the moment the last switchboard operator left their job for today’s automated phone-circuit switches. This was as late as 1983, just at the dawn of digital consumer-level technology such as the Commodore 64.

This false equivalence alone should be sufficient to scuttle the doctrine of “voluntarily” surrendering privacy to a third party in the digital world, and therefore giving up expectation of privacy: the equivalence in the analog world was the direct opposite.

But there’s more to the analog equivalent of third-party-service privacy. Somewhere in this concept is the notion that you’re voluntarily choosing to give up your privacy, as an active informed act — in particular, an act that stands out of the ordinary, since the Constitutions of the world are very clear that the ordinary default case is that you have an expectation of privacy.

In other words, since people’s everyday lives are covered by expectations of privacy, there must be something outside of the ordinary that a government can claim gives it the right to take away somebody’s privacy. And this “outside the ordinary” has been that the people in question were carrying a cellphone, and so “voluntarily” gave up their right to privacy, as the cellphone gives away their location to the network operator by contacting cellphone towers.

But carrying a cellphone is expected behavior today. It is completely within the boundaries of “ordinary”. In terms of expectations, this doesn’t differ much from wearing jeans or a jacket. This leads us to the question; in the thought experiment that yesterday’s jeans manufacturers had been able to pinpoint your location, had it been reasonable for the government to argue that you give up any expectation of privacy when you’re wearing jeans?

No. No, of course it hadn’t.

It’s not like you’re carrying a wilderness tracking device for the express purpose of rescue services to find you during a dangerous hike. In such a circumstance, it could be argued that you’re voluntarily carrying a locator device. But not when carrying something that everybody is expected to carry — indeed, something that everybody must carry in order to even function in today’s society.

When the only alternative to having your Constitutionally-guaranteed privacy is exile from modern society, a government should have a really thin case. Especially when the analog equivalent — analog phone switchboards — was never fair game in any case.

People deserve Analog Equivalent Privacy Rights.

Until a government recognizes this and voluntarily surrenders a power it has taken itself, which isn’t something people should hold their breath over, privacy remains your own responsibility.