Fun with electronics

Internet of things devices are amazing. They are just really smart really tiny computers used in innovative ways.

  • smart electric socket
  • smart light bulbs
  • doorbell camera
  • video picture frames
  • autonomous vacuum cleaner
  • Amazon echo
  • Sonos speakers
  • Internet radios

It is really not that difficult to create your own IOT device but it is possible to get a head start by using either the Arduino or Raspberry Pi as a starting point. Both of these platforms bring a lot to the table but in different ways.

It might seem intimidating to create your own but this book can help clarify everything you need to know.

Theory and components
Simple circuits
Integrated circuits
Software tools
Raspberry Pi
C programming
Kicad design software
Linux commands

Streaming audio
Network storage
Arduino LED cube
LED cube with custom PCB

This book describes everything you need to create your own custom device. This could be built on top of a pre-existing platform or even by designing your own custom circuit. This makes it fun to create your very own device from scratch. Most importantly everything is described with the assumption you are a beginner.

Getting started with Arduino and Raspberry pi


Posted in Review | Comments Off on Fun with electronics

safe computing – data storage I

Only the most harded soul or boring individual has no pictures or stories to share.  It is easier than never before to share photos of cats, children, girlfriends or selfies. Simply take the photo and either email it or send it via MMS to your friends and family.

Although not ideal, it is still reasonably efficient to send photos with a distribution list when the photo is small.  This is increasingly not the case as as quite a few common cell phones have camera’s with well over ten megapixels.

Manufacturer Megapixel Model
Apple 8 iPhone S6
LG 13 LG G3
Samsung 16 Galaxy S5
Sony 20 Xperia Z3

Sending emails is easy but some older or company email systems have limits as low as five megabytes for attachments.  Even if these limitations didn’t exist why send emails with hundreds of megabytes to fifty people when only four or five are really interested.  Why not simply have some sort of network drive where this information can be stored.

The cloud

There may be some disputes who exactly coined the term “the cloud” to refer to services hosted over the internet.  These services might be a virtual computer or it might be a bunch of relatively dumb disks.

In any case, it has grown from a simple idea to a 38 billion dollar market which apparently will be exploding into the triple digits in the near future.

For a lot of consumers the cloud is simply some network storage that they can access from anywhere, but the available services make it possible to not only use it yourself but grant privileges to your friends. It is actually the perfect technology for sharing information with people who are geographically separate.

I can put some cat photos, baby videos or spreadsheets on such a virtual drive for my friends family and co-workers to access.  What could possibly go wrong?

Excluding the necessary setup to prevent your friends from accidentally moving your cat photos to their computer, there are other issues you should be concerned about.  I guess it all started with the lawyers ensuring 110% safety to the providers, perhaps it was due to fairly overzealous governments deciding they needed a peek or just maybe it was those clever guys in the marketing group.

All of this is summed up in the end user license agreement that comes with the service or software.

I didn’t actually need to read any of these to know that somebody was going to want more than I wanted to give.  When I started to read through these, I was rather disapointed to see I was correct.


This is a personal weblog. The opinions expressed here represent opinions and observations of the author not those of his employer or any other firm. I am not a lawyer so it is possible there is a misunderstanding when reading legal texts.

The entire disclaimer for this site can be found here.


For reasons I don’t understand, I just love the name.  They provide a nice service which makes it really easy to share your personal pictures and such with friends.

One of my friends makes a point of reminding me that if the government wants your data that it really doesn’t matter what you have done, they will get it.  Not only that but you will most likely be helping them do so.  It is really simple, either they will take away your freedom or the costs of defending yourself will become too great causing you to eventually surrender.

With whom

Law & Order. We may disclose your information to third parties if we determine that such disclosure is reasonably necessary to (a) comply with the law; (b) protect any person from death or serious bodily injury; (c) prevent fraud or abuse of Dropbox or our users; or (d) protect Dropbox’s property rights.

The who seems simple enough.  I am not quite sure how the nice people at Dropbox will prevent death or fraud unless they go through your data files very carefully.  I am not sure if this means scanning for illegal pornography or checking if you have any manifestos with dangerous sounding words.  This doesn’t say too much so it is hard to get too worked up about it.


Retention. We’ll retain information you store on our Services for as long as we need it to provide you the Services. If you delete your account, we’ll also delete this information. But please note: (1) there might be some latency in deleting this information from our servers and back-up storage; and (2) we may retain this information if necessary to comply with our legal obligations, resolve disputes, or enforce our agreements.

This also sounds somewhat harmless on the surface as there are too many unknowns.  If there is a lawsuit against me does that mean my cat photos will be held until a subpoena allows them them to give everything over to the lawyers?  If one of the US states decides all internet companies need to store 10 years of information will my cat photos be backed up for 10 years after I asked that they be removed?

Despite my desire for privacy perhaps these are not unrealistic clauses.  We do live in a society of laws and we cannot pick which ones we want to follow and which ones not.


If we are involved in a reorganization, merger, acquisition or sale of our assets, your information may be transferred as part of that deal.

This last item actually is the most worrying.  My intellectual property is actually mine and I don’t want it to be handed over to the highest bidder.  Does the new owner get the deleted data as well or is that just in case the police come knocking on the door.

Apple iCloud

I am somewhat less familiar with the Apple solution.  Their solution appears to be less like a drive and more like the glue that is holding the apple infrastructure together.

  • Mail
  • Contacts
  • Calendar
  • Notes
  • Reminders
  • Photos
  • Storage device
  • Backup service

If you already have a number of Apple devices and use their software then it does sound like a really nice service.  Of course those fine people in Cupertino also have quite a list of conditions that apply.

It looks like Apple is playing the part of the parent and is trying to decide what types of content is good for you. It appears that they have gone one step further by making the user agree that Apple is the final arbiter of what is good content.  I rather doubt that Apple goes too deeply into the affairs of their users but the fact that they want the right to pre-screen and remove my content without my direct approval worries me.

C. Removal of Content

However, Apple reserves the right at all times to determine whether Content is appropriate and in compliance with this Agreement, and may pre-screen, move, refuse, modify and/or remove Content at any time, without prior notice and in its sole discretion, if such Content is found to be in violation of this Agreement or is otherwise objectionable.

The removal of content clause actually pretty much sums up my main concerns but apply does seem to have granted themselves pretty expanded rights when dealing with law enforcement authorities. Perhaps this simplifies things for Apple when the law comes a knockin but it does sound a bit much to me.

E. Access to Your Account and Content

Apple reserves the right to take steps Apple believes are reasonably necessary or appropriate to enforce and/or verify compliance with any part of this Agreement. You acknowledge and agree that Apple may, without liability to you, access, use, preserve and/or disclose your Account information and Content to law enforcement authorities, government officials, and/or a third party, as Apple believes is reasonably necessary or appropriate, if legally required to do so or if Apple has a good faith belief that such access, use, disclosure, or preservation is reasonably necessary to: (a) comply with legal process or request; (b) enforce this Agreement, including investigation of any potential violation thereof; (c) detect, prevent or otherwise address security, fraud or technical issues; or (d) protect the rights, property or safety of Apple, its users, a third party, or the public as required or permitted by law.

(emphasis is mine)

Google Drive

Of course Google also has their own internet storage solution which is called Google Drive.

Just like most EULA’s, if you are not a lawyer this does seem extra wordy and complicated but the end user license agreement from Google is probably on par with with that from both Apple and Dropbox.

Oddly enough one of the things that worries me is that Google specifically promises to deal with infringers according to the U.S. Digital Millennium Copyright Act.  It isn’t so much that they promise to follow the law that is troubling as much as some of the abuses that have been reported by companies using the DMCA to game the system.  This concern isn’t aimed at Google as much as other companies using it to their advantage.

Privacy and Copyright Protection

Google’s privacy policies explain how we treat your personal data and protect your privacy when you use our Services. By using our Services, you agree that Google can use such data in accordance with our privacy policies.

We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act.

We provide information to help copyright holders manage their intellectual property online. If you think somebody is violating your copyrights and want to notify us, you can find information about submitting notices and Google’s policy about responding to notices in our Help Center.

The big clause is of course the one that deals with your content.  The first line of the second paragraph sounds to give Google every possible right and more.  I suspect because of how harsh it sounds to the non-lawyers (including me) they added the first paragraph.

Your Content in our Services

Some of our Services allow you to upload, submit, store, send or receive content. You retain ownership of any intellectual property rights that you hold in that content. In short, what belongs to you stays yours.

When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.

The apple EULA seems to support different jurisdictions depending on the users location in their section on governing law.

It may be the same for Google as well but the only thing that I did find made it sound like the only law that would be used is the laws of California.

About these Terms

The laws of California, U.S.A., excluding California’s conflict of laws rules, will apply to any disputes arising out of or relating to these terms or the Services. All claims arising out of or relating to these terms or the Services will be litigated exclusively in the federal or state courts of Santa Clara County, California, USA, and you and Google consent to personal jurisdiction in those courts.

End User License Agreements & Privacy policies




Other Reading

Posted in Soapbox | Tagged | Leave a comment

Year of the Linux Desktop – 2026

It seems like only yesterday (2003) that a large government entity, the city of Munich, announced it would be converting their cities personal computers over to their own edition of Linux called LiMux. The good news was that perhaps 80% of the desktops would be converted over by 2008.

Not sure if it should be a surprise or not but the rollout of Linux to a city full of civil servants who were perfectly happy using Windows didn’t go quite as planned. Instead of all 18000 workstations only 1800 were converted over by 2009, but the rollout was completed to 15000 of the desktops by 2013. The sky didn’t fall nor did I hear how Munich sunk into the earth so I guess it was a successful rollout.

It may or may not be a surprise that a politician might change their mind on any given topic and the conversion over to Linux was such a topic. We may never really know all of the drama going on behind the scenes nor will we know if Microsoft moving their German headquarters to Munich played a roll.

The summary is that Munich tried to create their own Linux distribution and despite what was general acceptance, see wikipedia, they switched back to Windows 10 by 2020.

Open source 2026

The German state of Schleswig-Holstein is planning on replacing proprietary software with open source software. Specifically they want to replace Microsoft office with LibreOffice and later to replace Windows with Linux.

This actually might be a reasonably good plan, start with the applications which is something the users are passionate about and eventually change the underlying operation system that they are not as invested in.

We will keep an eye on this particular German state to see if this plan succeeds.

Posted in security, Soapbox | Leave a comment

Hacking skills as determined by a politician

Words have meaning and it is a bit disturbing when you read an article or see a speech where they are being incorrectly used. The most recent example of this is how people use or refer to technology. When computers were new, well newish, a hacker was someone who was an advanced computer technology enthusiast. These “hackers” played with and pushed the limits of the technology that was available to them.

Over the years the term hacker has taken on a different tone until today. Today this is someone who is still advanced with computer technologies but uses their skills to gain access to data or systems that they do not have authorization to use.

I know a lot of smart computer types but none of them are really hackers using either definition of the word hacker. I was surprised to read how Mike Parson, the Governor of Missouri, was able to recognize a hacker without any real examination.

The background is that a reporter was visiting one of the states web pages and he managed to uncover a security problem. The problem was that the web site which allowed the public to search teacher certifications and credentials and the site was written in such a way that it also held the social security numbers of those teachers. This information was apparently not visible unless you looked at the source code.

Finding this information might be a leap too far for most people but web browsers take this HTML code and display the site in your browser but the browser can also display the actual source code. It was the actual source code that contained this highly sensitive information. This discovery was made by St. Louis Post-Dispatch journalist. Once the journalist realized the seriousness of the problem it was reported back to the organization so the problem could be corrected before reporting on this issue in the newspaper. This is exactly how responsible security testing firms treat these same types of issues. Thus no information was in danger because of the article as the problem was corrected before it was published.

This is certainly embarrassing to the Department of Elementary and Secondary Education which was maintaining this website. Yet, it was perhaps more embarrassing to Governor Mike Parson as the buck really does stop at the top. It seems Governor Mike allegedly feels that the Post-Dispatch reporter is a hacker and is recommending prosecution. I guess that to Governor Mike thinks the ability to press a key sequence on your web browser to view the page source code makes you a hacker. Yup utilizing a built in developer feature is apparently the new bar for determining hacker skills.

Not only that, apparently the new reward in Missouri for reporting security short comings in their infrastructure is threats of prosecution by their governor.

Posted in programming, security | Tagged | Comments Off on Hacking skills as determined by a politician

More privacy or just annoying control

There are a lot of things you should be doing. Eat right, exercise and get enough sleep. These are some of the important things we should be doing as humans but there is quite a few things we should be doing with and for our computers.

  • backup our data
  • keep security patches up to date
  • be nice to your IT people

Unfortunately, we don’t always do these things but I decided to get my IT back under control and so I decided to start with the router. A new router, heck even the previous generation router has a lot of technology support beyond what you might expect – NAS, Television Streaming support, VPN and more.

I decided to work on the more mundane tasks such as ensuring that every device in the network had a name and that old devices were disabled. Ideally the next step will be to refuse any devices whose MAC address is not known.

Imagine my surprise to see my wife “owned” at least six identical iphones. That is simply not possible so I locked each of them down that did not have a MAC address equal with her actual phone. Unfortunately this was every single phone and yes, my wife was not impressed she had been locked out of the network. I could see that one of the phones actually was connected about a minute ago, the MAC did not match but I enabled it anyway. Believe it or not, that worked. The MAC address is a unique identifier that is burned into into the network card. How can this be?

This constant value is what helps make the entire system work. The router will typically assign the same IP address to the same MAC each time it expires. Apple did realize this could actually provide a unique identifier that the network operators could use to track you. They actually modified iOS 14, iPadOS 14, and watchOS 7 so your devices don’t actually give their actual MAC when trying to join a network.

If you delete the iPhone entry from your network list and rejoin you will probably get a different IP address because the router got a different MAC address.

It really isn’t a big deal now that I know about this change from Apple but in this case knowing IT makes it harder to work with your new Apple iPhone not easier.

Posted in security | Comments Off on More privacy or just annoying control

A prelude to 1984

The book 1984 by George Orwell is about Winston Smith who works for a repressive regime that rewrites history to fit their current narrative.

It has actually quite a few years since I read this book but you might think with all that is going on in the world it is a rough draft for a new book. We don’t have a repressive regime at the moment but there is quite a few of the elements that could be important for such situation.

We definitely have the Stalinesque ability to track people. Oddly enough rather than having televisions that track us, well, we have some of that as well but most adults do carry around a device that can be used to track the person carrying it within a few feet. We also use computers in such a way that allows a number of different companies to know a lot about us including very personal information. The people tell search engines and ISP’s information about themselves and what they are interested in.

The US government does surveillance of their own citizens in quite a few different ways. One of which is to track the communications of its citizens. So much data has been looked at this is “this isn’t a wiretap, it’s a country-tap.”. Knowing who is calling who, along with the frequency, can help to get a picture of who your “circle of friends” are. To be honest, if you looked through my phone bill for a few months you would have a good idea who I call, if there is a pattern and perhaps by looking at the names you would know if they are family.

If you don’t make many phone calls this is a pretty easy way to see who you are really connected to but with all of the new technology some of these calls are starting to fall off the radar. It is possible to call your digital contacts using apps such as WhatsApp, Signal, Facebook messager, Skype and many others. Some of these other apps actually make it harder for wiretaps whether they are with or without a warrant.

How can we fill in this lost information? The government could start to find your circle of friends a bit more directly by looking at the various social media groups you participate in.. Yet, how can you know if John Smith is a Facebook member and what his username is? Perhaps you can have your law enforcement gather which companies you frequent – nah that would be over the top.

LAPD officers told to collect social media data on every civilian they stop

Nope, I guess the Los Angeles Police force has been doing just this and this is including individuals who are not arrested or accused of a crime.

This would give a lot of direct information, again, the people being surveilled would be keeping all of their relationships current.

Posted in Soapbox | Comments Off on A prelude to 1984

The fall from grace

It is actually quite easy to label a group as the “enemy” if you have never spent any time with them. Governments in foreign lands are the perfect faceless enemy that provides the focal point for criticism or even hate. Different societies place different emphasis on different values from free speech, societal harmony, or even a patriarchal form of government. It is hard to judge a different culture from afar but it is easy to to make a list of differences.

Corruption in government

How can you truly measure the corruption? Only connected people tend to make it to government office and once they do their overall wealth, after a few short years, easily outstrips the average wealth of their constituents.

Minority rule

Through what seems to be some form of legal trickery the government is controlled not by the what the majority of the citizen. This also takes place in conjunction with legal maneuvers to disenfranchise various groups of voters.

Controlling their citizens

I guess dress code is all a matter of opinion. As a much younger person seeing the girls in their skimpy swim suits or ultra short skirts seemed ok but as the dad this much less appreciated. Just like I can control what my children wear some governments seem to have a lot of control of what their women and children wear outside of the house. Women are actualy limited in things that they can do with a male family member or even alone. One of the clearest indication of this women’s ability to get an abortion.

Legalized stealing by the government

Nobody expected to get held up by the police at a traffic stop. It is a sign of corruption if you do not know if the money in your pocket will be taken by the police with out knowing if you will ever get it back.

Living in primitive conditions

Everyone would recognize that living in a cave with nothing more than a rock for a pillow would be living in the stone age but it is rarely that clear cut. What if you live in an apartment building with no heating or air conditioning. A sign of true poverty is if we cannot expect reliability in some of the most basic human needs – water and electricity. Another sign of living in primitive conditions might be if your buildings and bridges collapse without being bombed by a foreign power.

Disbelief of science

Science can be very inconvenient when someone throws in your face to prove their point. It can be especially upsetting if someone uses science to increase your cost of doing business – especially if this something you don’t really believe in. This is difficult if your own government doesn’t support or in fact threatens your livelihood if you don’t toe the party line. This is even worse if science becomes politicized to the point facts no longer matter.

Civil strife

When 50% or more of the country can’t tolerate their fellow citizens.

This entire laundry list of issue could easily be pointed at a lot of different “third world” countries. They might sound like one or two specific countries but unfortunately they are all about one country in particular – the United States of America.

It is ok for the various political parties to disagree with what they see as the priorities for the country as a whole but at the moment it seems that both parties, perhaps one more than the other, is focusing on its own groups best interests not the best interests of the entire country.

Are these current troubles going to be a relatively short blip like the McCarthy years or will it last decades like the cold war. At the end of the day, it is important for everyone to behave as if they all belong to a single country and work for the betterment of that country.

Posted in Soapbox | Comments Off on The fall from grace

Think of the children

I actually was a child once and have children of my own so I can understand wanting to protect some of society’s most vulnerable people. A topic such as child porn is probably the worst possible thing that could occur.

Thus supporting the fight to prevent bad things from occurring is a truly noble and Apple has stepped up to fight this problem. Unlike arguments of creating more or bigger safety nets for society there are two possible outcomes and both can be correct depending on your position. This is not true for child porn and sexual predators there is no positive argument thus this issue tends to be used to implement new rules, regulations or restrictions.

Yet, in order to support this very admirable goal Apple has decided its users have to give up an element of our privacy. The plan is photos from our iPhones will be scanned for known child pornography prior to be uploaded to the Apple cloud. In addition to this the iMessage service will be also be scanning for text and photos that are not suitable for minors.

I do not want anyone to use modern technology and social media to inappropriately reach my children but lets look at Apple’s change from another view.

Apple will have a world wide infrastructure to monitoring photos and text that should not be shared. The authorities will be informed if this occurs “too many times”.

If we look at this change on its face value this is a great way to scoop up a few of the technological naive people who think technology is a magic cloak. The problem is that this international companies are responsible to answering to many different governments some of which have differing ideas on privacy or what is acceptable. This means that dictators or authoritarian regimes can replace “child pornography” with memes and track anyone who sends anti-government texts. Too many times could be equal to 1.

The same reason why adding a government only back door to an encryption method will never be secure over the long run. Someone will discover it, break it or leak the secret password. The same is true about implementing this infrastructure, it will take the Apple corporation from one that tries to support privacy to “the authoritarians” favorite foreign cell phone maker.

Posted in security, Soapbox | Comments Off on Think of the children

A trojan horse

Gaming and office productivity tasks which pretty much describes all of the things you can do on a computer. If you want or need to do either of these then Windows 10 is a great operating system to have. There are virtually no A level games that are not available on Windows.

If this is indeed true why would anyone want to move away from Windows 10. Sure there might be some small reasons but if you need to purchase software you would not be excited you might need to purchase all new software.

We could all move away from Windows 10 because the newest and bestest Windows 11 is about to be released. Sure, we might have to purchase new software in some cases but we are going to get some really good functionality right? Well, lets look at all the Windows 10 goodness we received when it was the new kid on the block.

  • Start Menu Ads in Windows 10
  • Windows 10 targeted ads
  • Windows 10 Location Tracking and Location History
  • News app notifications
  • Windows store
  • Cortana searches only with Bing not Google
  • Forced updates

These are definitely not positive features in a lot of peoples opinions although they are quite interesting for Microsoft. What does Windows 11 bring to the table?

  • TPM 2.0
  • UEFI, Secure Boot capable

Windows does have a few new requirements which can actually be used to help keep your computer secure. Yet, the history of UEFI and Windows has not only been one of security against installing unsigned software. Microsoft is a large company and can afford infrastructure for dealing with UEFI signed keys and motherboard manufacturers but this one situation can cause difficulties. The Linux world did come up with a solution but if you wanted to start completely from scratch you wouldn’t be able to install new keys onto your own hardware.

Another issue is the requirement of TPM 2.0 support on your computer. Although TPM 2.0 has been around since 2014 is has been implemented by a lot of manufacturers as a hardware addon. According to some of the rumors you also need a CPU that is two years old or older. This change might all be for the best but it sounds like the new hardware requirements might mean new hardware is necessary.

Well, I am sure that Microsoft has no plans on getting everyone to switch to Windows 11 and then either lock them into their own ecosystem and force everyone to purchase from their own software store. They would have no plans to consolidating every Windows pc into locked down platform.

Oh, if you have Windows 10 you can get Windows 11 for free! Wow, hundreds of engineers working on a successor to Windows 10 for years and Microsoft wants to give it to all of us for free?!?

Lets all hope this isn’t some sort of Trojan Horse.

Posted in Soapbox | Comments Off on A trojan horse

Mature minor doctrine – think of the children

Mature Minor Doctrine – think of the children

I was young once and despite my bluster here, I was not all that rebellious against my parents. Either that or the could see me coming a mile away and defused the situation. In terms of serious issues I could have done any of the following.

Color my hair
get a mohawk haircut
get some piercings
get a small tattoo
get a large obvious tattoo
run away and join the circus

Now, a few years later, I can only imagine that these are still options but there are a few very polarizing issues in the United States at the moment. What political party do you support and do you believe in getting a Covid 19 vaccination.

I cannot imagine all that many 14 or 15 year olds who start dressing up like either Donald Trump or Bernie Sanders or having a demonstration in the living-room but what about the vaccine? If your parents are against it you can really rile them up by getting it.

Normally, it is your parents that bring you to the doctor and get those kinds of things done. Yet, kids these days are pretty tech savvy, and there is a lot of information available on the internet. Actually some of this information is describing this “Mature Minor Doctrine” which has been online since 2008. This Tennessee law was passed in 1987 when kids were less rebellious and it allowed minors to get vaccinated above the age of 14 without their parents consent.

All of this might interesting but not especially relevant for those who do not live in Tennessee. Well, except that the Tennessee health department has backed down from their efforts to get minors vaccinated. These efforts were in the form of Facebook and Twitter posts. They have gone as far as to delete these posts and to fire the medical director, Mischelle Fiscus, for vaccine-preventable diseases and immunization programs.

I guess it may have had something to do with the Tennessee state senator Janice Bowling who urged the head of the health department, Lisa Piercey, to “take action” and to “remove the fear, the concerns and the anger that has gone across the state as a result of (Fiscus) letter”.

“It is very disconcerting to see the letter, or memo, from Dr. Fiscus stating that Tennessee law allows the Department of Health to give vaccinations to children 14 years of age,” “Tennessee law does not allow that” Janice Bowling

I guess the senator who is not as familiar with the Tennessee state statutes is concerned about the flood of rebellious youths who have or are planning to get the vaccine. Thjs is obvious by the massive number of teens, which as of June 2021 could be measured to 8000 eight individuals which included the three children of Lisa Piercey.

I guess now that we have managed to protect the hords of rebellious youths wanting to get a vaccination in the middle of a Pandemic the Tennessee department of health can focus on other pressing issues such as enforcing the prohibition of teaching anything that is related to “non-abstinent-behavior” and collection those 500 dollar fines.

Fines for teaching anything non-abstinent as protection

More on this topic is available from “The Tennessean”

Posted in corona times, Soapbox | Comments Off on Mature minor doctrine – think of the children