Category: Privacy


How To Find Out If You’ve Been Hacked In Under A Minute

 

 

 

 

 

” If it feels like the Internet is plagued by seemingly constant cybersecurity breaches, sometimes the best thing you can do is find out if your usernames and passwords are already owned by an enterprising criminal.

  The search engine Have I been pwned? (HIBP) is one of your best free and easy bets to find out if your sensitive information is floating out in cyberspace for all to see. There are other worthwhile options but HIBP’s new real-time monitoring tool separates it from the pack. 

  HIBP, which has provided easy access to stolen user credentials from newsworthy security breaches since last year, just introduced a major new feature that gives it access to about 175 million vulnerable accounts—a number that will keep growing rapidly—and alerts your within a minute to possible problems.

  Now, with the new feature, scores of smaller breaches are documented and made easy for anyone to search.”

 

Read more

 

 

 

 

 

 

 

 

 

About these ads

Facebook Poses A Threat To Every American

 

 

 

 

 

” Participation on Facebook could prove very dangerous to your future well-being. There is a reason that Facebook is aligned with both the CIA and the NSA. I have several credible sources tell me that all data posted on Facebook goes into series of cataloged files which culminates with each person being assigned a “Threat Matrix Score”. The mere existence of a Threat Matrix Score should send chills up and the collective spines of every American.

  When, not if, martial law comes to America, this Threat Matrix Score, of which Facebook data is used to help compile an “enemies of the state” list, your future longevity could be seriously imperiled. It is too late for people like Steve Quayle, Doug and Joe Hagmann, John B. Wells and myself to avoid being placed on this list. However, it is not too late for the average American to limit their exposure by NOT posting and participating on Facebook. Facebook participation should come with a black box warning:

“ WARNING: The views expressed on Facebook can and will be used against you. Participation in Facebook could prove detrimental to the length of your life. All political dissident views are immediately reported to the CIA and the NSA. Risk of repeated exposure on Facebook could result in you and your family being hauled out of their homes at 3AM, separated from your family and sent to a re-education camp”. “

 

 

 

Read the rest

 

 

 

 

 

 

 

 

 

 

Apple Will No Longer Unlock Most iPhones, iPads For Police, Even With Search Warrants

 

 

 

 

 

 

 

” Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.

  The move, announced with the publication of a new privacy policy tied to the release of Apple’s latest mobile operating system, iOS 8, amounts to an engineering solution to a legal quandary: Rather than comply with binding court orders, Apple has reworked its latest encryption in a way that prevents the company — or anyone but the device’s owner — from gaining access to the vast troves of user data typically stored on smartphones or tablet computers.

  The key is the encryption that Apple mobile devices automatically put in place when a user selects a passcode, making it difficult for anyone who lacks that passcode to access the information within, including photos, e-mails and recordings. Apple once maintained the ability to unlock some content on devices for legally binding police requests but will no longer do so for iOS 8, it said in the new privacy policy.

“ Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.” “

 

Washington Post

 

 

 

 

 

 

 

 

 

New Device In The Works To Catch Texting Drivers

 

 

 

 

 

” A Virginia company is developing a radar gunlike device that would help police catch drivers as they text.

  The technology works by detecting the telltale radio frequencies that emit from a vehicle when someone inside is using a cellphone, said Malcolm McIntyre of ComSonics. Cable repairmen use similar means to find where a cable is damaged – from a rodent, for instance – by looking for frequencies leaking in a transmission, McIntyre said.

  A text message, phone call and data transfer emit different frequencies that can be distinguished by the device ComSonics is working on, according to McIntyre. That would prove particularly useful for law enforcement in states such as Virginia, where texting behind the wheel is banned but talking on the phone is legal for adult drivers. “

  

 

Virginia Pilot

 

 

 

 

 

 

 

 

 

Tech Chiefs In Plea Over Privacy Damage

 

 

 

 

 

” The US tech industry has failed to appreciate the mounting global concern over its record on online privacy and security and must act fast to prevent deeper damage to its image, Silicon Valley’s top executives and investors have conceded.

  The self-criticism, much of it aimed at consumer internet companies such as Google and Facebook, comes as some of the tech sector’s best-known names have been battered by a backlash over revelations of widespread US internet surveillance and concerns about their growing business and cultural dominance.

  Peter Thiel, a prominent start-up investor and Facebook director, said: “Silicon Valley is quite oblivious to the degree to which this crescendo of concern is building up in Europe. It’s an extremely important thing and Silicon Valley is underestimating it badly.

  Jim Breyer, an early investor and former board member of Facebook, said: “The US government and [tech] companies will have to step up significantly if they want to regain the world’s trust.”

 

Financial Times

 

 

 

 

 

 

 

 

 

 

U.S. Threatened Massive Fine To Force Yahoo To Release Data

 

 

 

 

 

” The U.S. government threatened to fine Yahoo $250,000 a day in 2008 if it failed to comply with a broad demand to hand over user communications — a request the company believed was unconstitutional — according to court documents unsealed Thursday that illuminate how federal officials forced American tech companies to participate in the National Security Agency’s controversial PRISM program.

  The documents, roughly 1,500 pages worth, outline a secret and ultimately unsuccessful legal battle by Yahoo to resist the government’s demands. The company’s loss required Yahoo to become one of the first to begin providing information to PRISM, a program that gave the NSA extensive access to records of online com­munications by users of Yahoo and other U.S.-based technology firms.”

 

This is the power of Leviathan … we’ve been warned

 

 

 

 

 

 

 

 

 

Millions Of Gmail Accounts Hacked, Was Yours One Of Them?

 

 

 

 

” Time to change your password again. A database containing nearly 5 million Gmail user accounts and passwords was leaked on Bitcoin Security, a popular Russian website devoted to the cryptocurrency.

  The text file was published on Tuesday night by user tvskit, according to CNews, the Russian news outlet that first broke the story. The leaker claimed that the majority of the accounts belong to users who speak English, Russian, or Spanish, and that approximately 60 percent are active. The passwords not only give access to Gmail, but a slew of other Google services such as Drive and the mobile payment system Google Wallet. “

 

Fusion has more 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Stop And Seize

 

Stop & Seize

Click Pic For Video

 

 

 

” After the terror attacks on Sept. 11, 2001, the government called on police to become the eyes and ears of homeland security on America’s highways.

  Local officers, county deputies and state troopers were encouraged to act more aggressively in searching for suspicious people, drugs and other contraband. The departments of Homeland Security and Justice spent millions on police training.

  Behind the rise in seizures is a little-known cottage industry of private police-training firms that teach the techniques of “highway interdiction” to departments across the country.

  One of those firms created a private intelligence network known as Black Asphalt Electronic Networking & Notification System that enabled police nationwide to share detailed reports about American motorists — criminals and the innocent alike — including their Social Security numbers, addresses and identifying tattoos, as well as hunches about which drivers to stop.”

 

 

 

 

 

 

 

 

 

 

 

 

A Google Site Meant To Protect You Is Helping Hackers Attack You

 

 

 

 

 

” Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs.

  Hackers and cybercrooks do the same. The last thing you want if you’re a cyberthug is for your banking Trojan to crash a victim’s system and be exposed. More importantly, you don’t want your victim’s antivirus engine to detect the malicious tool.

  So how do you maintain your stealth? You submit your code to Google’s VirusTotal site and let it do the testing for you.

  It’s long been suspected that hackers and nation-state spies are using Google’s antivirus site to test their tools before unleashing them on victims. Now Brandon Dixon, an independent security researcher, has caught them in the act, tracking several high-profile hacking groups—including, surprisingly, two well-known nation-state teams—as they used VirusTotal to hone their code and develop their tradecraft. “

 

Read more at Wired

 

 

 

 

 

 

 

 

 

 

 

Hacker Breached HealthCare.gov Insurance Site

 

 

 

” A hacker broke into part of the HealthCare.gov insurance enrollment website in July and uploaded malicious software, according to federal officials.

  Investigators found no evidence that consumers’ personal data was taken in the breach, federal officials said. The hacker appears only to have accessed a server used to test code for HealthCare.gov. The Department of Health and Human Services discovered the attack last week.

  An HHS official said the attack appears to mark the first successful intrusion into the website, where millions of Americans bought insurance starting last year under the Affordable Care Act. It raised concerns among federal officials because of how easily the intruder gained access and how much damage could have occurred.”

 

Read more

 

 

 

 

 

 

 

 

 

 

 

If Police Come To Your Door Without a Warrant, Shut Them Down Like This Guy

 

 

 

” If police come to your door and you don’t need their help, you can simply decline to answer. They cannot come into your home without a search warrant.

  Even if the police have probable cause, they cannot come in your home without a search warrant.

  You might even be a suspect in a criminal investigation. In such a case you should remain silent — except to say “Officer, I can’t let you inside without a search warrant.” Following such an encounter, you should immediately contact a lawyer before speaking to police again.

  The fact is that police can legally lie to try and gain access into your home and knowing how to deal with police at your door can go a long way.”

Free Thought Project 

The Police Tool That Pervs Use To Steal Nude Pics From Apple’s iCloud

 

 

 

 

 

” As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims’ iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers’ sext-stealing playbook has been ignored—a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.

  On the web forum Anon-IB, one of the most popular anonymous image boards for posting stolen nude selfies, hackers openly discuss using a piece of software called EPPB or Elcomsoft Phone Password Breaker to download their victims’ data from iCloud backups. That software is sold by Moscow-based forensics firm Elcomsoft and intended for government agency customers. In combination with iCloud credentials obtained with iBrute, the password-cracking software for iCloud released on Github over the weekend, EPPB lets anyone impersonate a victim’s iPhone and download its full backup rather than the more limited data accessible on iCloud.com. And as of Tuesday, it was still being used to steal revealing photos and post them on Anon-IB’s forum.”

 

Wired

 

 

 

 

 

 

 

 

 

 

This Is What Happens To A Disarmed Populace: Canada Edition

 

 

Canada Warrantless Searches

 

Click pic for video

 

 

   From The Truth About Guns … Warrantless searches , no right to remain silent , no Constitutional protections … Welcome to Statism …

 

 

 

 

 

 

 

 

 

Government To Track ‘False, Misleading’ Ideas On Twitter

 

 

Truthy

 

 

 

 

” Nope, this isn’t unsettling:

  The federal government is spending nearly $1 million to create an online database that will track “misinformation” and hate speech on Twitter.

  The National Science Foundation is financing the creation of a web service that will monitor “suspicious memes” and what it considers “false and misleading ideas,” with a major focus on political activity online.

  The “Truthy” database, created by researchers at Indiana University, is designed to “detect political smears, astroturfing, misinformation, and other social pollution.”

  One G-man’s “social pollution” is another free man’s First Amendment right. The very term sounds like something out of a 1920s Italian fascist tract. And why is the federal government even deciding which ideas are “false and misleading,” let alone tracking them?

  According to the project’s grant, the service “could mitigate the diffusion of false and misleading ideas, detect hate speech and subversive propaganda, and assist in the preservation of open debate.” 

 

 

Ricochet

 

 

 

 

 

 

 

 

 

Hackers Hit 25,000 Homeland Security Workers

 

 

USIS Hacked

 

 

 

 

” The internal records of as many as 25,000 Homeland Security Department employees were exposed during a recent computer break-in at a federal contractor that handles security clearances, an agency official said Friday.

  The official, who spoke on condition of anonymity to discuss details of an incident that is under active federal criminal investigation, said the number of victims could be greater. The department was informing employees whose files were exposed in the hacking against contractor USIS and warning them to monitor their financial accounts.

  Earlier this month, USIS acknowledged the break-in, saying its internal cybersecurity team had detected what appeared to be an intrusion with “all the markings of a state-sponsored attack.” Neither USIS nor government officials have speculated on the identity of the foreign government. A USIS spokeswoman reached Friday declined to comment on the DHS notifications. “

 

” We’re in the best of hands ” … read more

 

 

 

 

 

 

 

 

 

Left To Obama: Check Spy Agencies

 

 

 

” Activists on the left are demanding President Obama flex his muscle over the country’s spy agencies.

  The CIA’s admission that a handful of officials spied on Senate staffers is proof that the White House has lost control of the intelligence agencies, critics say. They are also discomforted by the continued support Obama has offered for agency Director John Brennan. 

“ This is not an isolated incident,” said Becky Bond, political director with the progressive group Credo.

“ The fact that these intelligence officials are able to keep their job when major breaches or major assaults on the Constitution are made public — let alone all the things that are happening that we don’t know about — it sets a very dangerous precedent,” she added.

  In recent days, more than 42,000 people have signed Credo’s petition calling for Obama to “fire” Brennan, along with agency officials who knew about the snooping on Congress. The petition also calls for the Justice Department to file criminal charges against people involved in the congressional snooping.

  The spying is just “the latest evidence that America’s shadowy intelligence agencies are out of control,” the group said in its petition. “Yet disturbingly, President Obama is still defending Brennan.”

  The administration’s positions have inflamed civil libertarians on both sides of the aisle. But for liberals who supported Obama based in part on his opposition to the powerful security apparatus of the administration of President George W. Bush, the shift is especially painful. 

“ It looks incredibly hypocritical relative to the promises he made over the campaign, and that’s completely been made transparent,” said Demand Progress executive director David Segal. “

 

The Hill

 

 

 

 

 

 

 

 

 

Many Americans Renounce Citizenship, Hitting New Record

 

 

 

” It may seem like a drop in the bucket, especially when droves want to immigrate to America. Still, the newly published names of individuals who renounced their U.S. citizenship or terminated long-term U.S. residency is up, with 576 for the quarter and 1,577 so far this year. The growing trend is a sad one as Record Numbers of Americans Are Renouncing Their U.S. Citizenship.

  For all the immigrant arrivals, the trickle the other direction is becoming more pronounced. The tally was 2,999 for all of 2013, a 221% increase over the 932 who left in 2012. The Treasury Department is required to publish a quarterly list, a kind of public outing putting Americans on notice of who relinquished their rights. Consular expatriations, where people don’t file exit tax forms with the IRS, are apparently not counted.

  Indeed, the Treasury Department’s published list states explicitly this is just those about whom the Secretary of the Treasury has data. It means these numbers are under-stated, some say considerably. Although tax law used to impact how one is taxed on departing the U.S., is no longer relevant why someone expatriates.”

 

Forbes has more

 

 

 

 

 

 

 

 

50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability

 

 

 

 

 

” The users of WordPress, a free and open source blogging tool as well as content management system (CMS), that have a popular unpatched wordPress plugin installed are being cautioned to upgrade their sites immediately.
  A serious vulnerability in the WordPress plugin, MailPoet, could essentially allows an attacker to inject any file including malware, defacements and spam, whatever they wanted on the server and that too without any authentication.
  MailPoet, formerly known as Wysija Newsletter, is a WordPress plugin with more than 1.7 million downloads that allows developers running WordPress to send newsletters and manage subscribers within the content management system.
  In a blog post, the security researcher and CEO of the security firm Sucuri, Daniel Cid, pointed out the vulnerability to be serious and said that within three weeks since the vulnerability unveiled, over 50,000 websites have been remotely exploited by the cybercriminals to install backdoors targeting the vulnerable MailPoet plugin.”
Read the rest at Hacker News

No More `Permanent’ Emails With New Service

 

 

 

 

 

” Since the dawn of the Internet, email users have been haunted by the finality of hitting the “send” button.

No more.

  What could be the foremost of all First World problems — the inability to retrieve or delete an ill-conceived email — is now a thing of the past for users of Pluto Mail, according to the Harvard law student who created it.

“ I’ve been annoyed with the fact that any email I send lasts forever, and I think Snapchat popularized the more-forgettable Internet, and I thought it would be great to bring it to email. It’s a very salient problem. I think everyone has had this ‘uh oh’ moment,” said David Gobaud, founder and CEO of Pluto Labs Inc. “Basically the Pluto service turns your emails into dynamic ones that you can maintain control over. I built a new email server that turns an email into a living document.”

  Gobaud said Pluto Mail allows people with sender’s remorse to edit, delete or set an expiration date on their emails. The product, which was released in early March, already has thousands of 
users and continues to grow by the day, he said.

  Pluto Mail isn’t an email provider but allows users to apply the service to their own email addresses — including Gmail, Outlook and Apple Mail — and then send messages as they normally would. But once the send button is hit, the Pluto Mail user can delete an email’s content, edit it or set an expiration time. The service also informs the sender if the recipient has already opened it. “

 

Read more

 

 

 

 

 

 

 

 

 

Undocumented iOS Features Left Hidden Backdoors Open In 600 Million Apple Devices

 

 

 

 

 

” A well known iPhone hacker and forensic scientist has unearthed a range of undocumented and hidden functions in Apple iOS mobile operating system that make it possible for a hacker to completely bypass the backup encryption on iOS devices and can steal large amounts of users’ personal data without entering passwords or personal identification numbers.
  Data forensics expert named Jonathan Zdziarski has posted the slides (PDF) titled “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” showing his findings, from his talk at the Hackers On Planet Earth (HOPE X) conference held in New York on Friday.
  Jonathan Zdziarski, better identified as the hacker “NerveGas” in the iPhone development community, worked as dev-team member on many of the early iOS jailbreaks and is also the author of five iOS-related O’Reilly books including “Hacking and Securing iOS Applications.”
  The results of his overall research on the iOS devices indicate a backdoor into iOS device’ operating system, although it is not at all that much widely open as a number of reports have suggested.
  You can protect your iOS device settings, Messages, Camera Roll, documents, saved games, email account passwords, Wi-Fi passwords, and passwords that you enter into websites using iTunes Backup feature. iTunes also allows users to protect their backup data with an encryption.”

Just A Penny And A Rubber Band

 

 

 

” We love bikes. We love skirts. But sometimes these two don’t mix well. Which is why we came up with Penny in Yo’ Pants. An easy solution to making your skirt bikeable.

  Check out our website at pennyinyourpants.co.uk. We will be making a slicker model shortly that will be even better than a penny and a rubber band (imagine that). Proceeds will go to get more women on bikes around the world!

  This was prototyped during Cyclehack Glasgow, 2014. cyclehack.com “

 

 

 

 

 

 

 

 

 

 

 

 

Report: Ordinary Americans Caught Up In Data Sweep

 

 

 

 

 

” When the U.S. National Security Agency intercepted the online accounts of legally targeted foreigners over a four-year period it also collected the conversations of nine times as many ordinary Internet users, both Americans and non-Americans, according to a probe by The Washington Post.

  Nearly half of those surveillance files contained names, email addresses or other details that the NSA marked as belonging to U.S. citizens or residents, the Post reported in a story posted on its website Saturday night. While the federal agency tried to protect their privacy by masking more than 65,000 such references to individuals, the newspaper said it found nearly 900 additional email addresses that could be strongly linked to U.S. citizens or residents.”

The Snowden revelations continue to reveal the extent of State spying during the Age Of Obama …

” The material reviewed by the Post included roughly 160,000 intercepted e-mail and instant-message conversations, some of them hundreds of pages long, and 7,900 documents taken from more than 11,000 online accounts. It spanned President Barack Obama’s first term, 2009 to 2012, and was provided to the Post by former NSA analyst Edward Snowden.

  The daily lives of more than 10,000 account holders who were not targeted were catalogued and recorded, the Post reported. The newspaper described that material as telling “stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” The material collected included more than 5,000 private photos, the paper said.”

AP News

Massachusetts SWAT Teams Claim They’re Private Corporations, Immune From Open Records Laws

 

 

 

 

 

 

” As part of the American Civil Liberties Union’s recent report on police militarization, the Massachusetts chapter of the organization sent open records requests to SWAT teams across that state. It received an interesting response.

  As it turns out, a number of SWAT teams in the Bay State are operated by what are called law enforcement councils, or LECs. These LECs are funded by several police agencies in a given geographic area and overseen by an executive board, which is usually made up of police chiefs from member police departments. In 2012, for example, the Tewksbury Police Department paid about $4,600 in annual membership dues to the North Eastern Massachusetts Law Enforcement Council, or NEMLEC. (See page 36 of linked PDF.) That LEC has about 50 member agencies. In addition to operating a regional SWAT team, the LECs also facilitate technology and information sharing and oversee other specialized units, such as crime scene investigators and computer crime specialists.

  Some of these LECs have also apparently incorporated as 501(c)(3) organizations. And it’s here that we run into problems. According to the ACLU, the LECs are claiming that the 501(c)(3) status means that they’re private corporations, not government agencies. And therefore, they say they’re immune from open records requests. Let’s be clear. These agencies oversee police activities. They employ cops who carry guns, wear badges, collect paychecks provided by taxpayers and have the power to detain, arrest, injure and kill. They operate SWAT teams, which conduct raids on private residences. And yet they say that because they’ve incorporated, they’re immune to Massachusetts open records laws. The state’s residents aren’t permitted to know how often the SWAT teams are used, what they’re used for, what sort of training they get or who they’re primarily used against.”

 

 

    This is arrogance of the highest order . For any organizations funded by the taxpayers to claim to be private corporations is beyond the pale . 

 

 


” From the ACLU of Massachusetts’s report on police militarization in that state:

  Approximately 240 of the 351 police departments in Massachusetts belong to an LEC. While set up as “corporations,” LECs are funded by local and federal taxpayer money, are composed exclusively of public police officers and sheriffs, and carry out traditional law enforcement functions through specialized units such as SWAT teams . . .

  Due to the weakness of Massachusetts public records law and the culture of secrecy that has infected local police departments and Law Enforcement Councils, procuring empirical records from police departments and regional SWAT teams in Massachusetts about police militarization was universally difficult and, in most instances, impossible . . .

  Police departments and regional SWAT teams are public institutions, working with public money, meant to protect and serve the public’s interest. If these institutions do not maintain and make public comprehensive and comprehensible documents pertaining to their operations and tactics, the people cannot judge whether officials are acting appropriately or make needed policy changes when problems arise . . . “

 

 

 

    This situation cannot be allowed to stand . ALL public servants MUST be held accountable for their actions or are we to believe that these “mercenary” SWAT units are merely rogue privateers issued Letters of Marque ? If such is the case then they are no more than pirates and as such must be fought with all possible means  .

   Food for thought: If the SWAT teams are private corporations/private contractors , ala Blackwater ,  then they do not enjoy the legal immunities offered to employees of the State and thus should be subject to civil lawsuits and thus the discovery process … Let the flood gates open .

 

 

   Read the rest from Radley Balko at the Washington Post.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Supreme Court Bans Warrantless Cell Phone Searches, Updates Privacy Laws

 

 

 

 

” The Supreme Court ruled Wednesday that police must obtain warrants before snooping through people’s cellphones, delivering a unanimous decision that begins to update legal understanding of privacy rules to accommodate 21st-century technology.

  Police agencies argued that searching through data on cellphones was no different from asking someone to turn out his pockets, but the justices rejected that, saying a cellphone holds the most personal and intimate details of someone’s life and falls squarely within the Fourth Amendment’s privacy protections.

“ The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought,” Chief Justice John G. Roberts Jr. wrote in the unanimous opinion. “Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple — get a warrant.”

  The justices even said police cannot check a cellphone’s call log because it could contain more information than phone numbers, and perusing the call log is a violation of privacy that can be justified only with a court-issued warrant.

  Privacy advocates, meanwhile, said the ruling should ignite a broader rethinking of protections at a time when Americans are putting more personal information online.”

 

 

 

Washington Times continues the story of a small step on the road to victory in the war for privacy rights .

 

 

 

 

 

 

 

 

 

 

Follow

Get every new post delivered to your Inbox.

Join 6,300 other followers