When this goes live, I’ll be on the road to the Financial Bloggers Conference outside of Chicago. That translates to a day off here.
Monday, I’ll be back with a whole bucket full of bloggy goodness.
The no-pants guide to spending, saving, and thriving in the real world.
When this goes live, I’ll be on the road to the Financial Bloggers Conference outside of Chicago. That translates to a day off here.
Monday, I’ll be back with a whole bucket full of bloggy goodness.
Most people don’t die quickly.
As much as I would rather die suddenly–while putting a smile on my wife’s face–the odds are that I will spend my last hours or days in a hospital, unable to make the decisions about my care.
Will I be doing my vegetable impression after a car accident, or be left unable to speak during a botched Viagra implanantation in my 90s? I don’t know.
There is one thing I know about the end of my life. I do not want to linger for months, blind and deaf, on a feeding tube. I don’t want my family to spend the last few months of my life secretly ashamed of hoping for my burden to end. I’d like my end to be quick enough that the emotions they are feeling aren’t a sad combination of guilt and relief, just sadness at my passing and happiness at having had me.
That’s the legacy I’d like.
The problem is making my wishes known. If I’m lying in a hospital bed, asking to be allowed to die, they’ll consider me suicidal instead of rationally considering my request. If I’m completely incapacitated, I won’t even be able to ask.
I can certainly make my wishes known beforehand, but how will my family be able to communicate my desires to the doctors in charge and how will they convince the doctor that they aren’t just after my currently imaginary millions?
That’s where a living will comes in. A living will, also know as an advanced directive, is simply a formal document that explicitly states what you want to happen to you if you are too out of it to make your wishes known.
Aging With Dignity has put together an advanced directive called Five Wishes that meets the legal requirements for an advanced directive in 42 states.
The Five Wishes are:
1. Who is going to make decisions for you, if you can’t? For me, the obvious choice is my wife. She appears to like me enough to want me around and love me enough to do what needs to be done, even if it’s difficult. On the chance that we end up in the same car accidents, matching vegetables on a shelf, I’ve nominated my father for the unpleasantness. I don’t think I’ve told him that, yet.
2. What kind of treatment do you want, or want to refuse? When my Grandpa was going, he made sure to have a Do Not Resuscitate order on file with the nursing home, the clinic, and the hospital. He knew it was his time and didn’t want to drag it out.
3. How comfortable do you want to be? Do you want to be kept out of pain, at all costs, even if it means being drugged into oblivion most of the day? Do you want a feeding tube, or would you rather only receive food and fluids if you are capable of taking them by mouth?
4. How do you want to be treated? Do you want to be allowed to die at home? Do you want people to pray at your bedside, or keep their religious views to yourself? Some people want to be left alone, while others are terrified of dying alone. This wish also covers grooming. Personally, if I soil myself, I’d like to get cleaned up as soon as possible. I’ll have enough to deal with without smelling bad, too.
5. What do you want your family to know? This includes any funeral requests you have and whether you’d like to be cremated, buried, or both, but also goes beyond them. Do you want your family to know that you love them? You can also take this section to ask feuding family members to make peace or ask them to remember your better days, instead of the miserable few at the end.
The last 3 wishes are unique to the Five Wishes document, but they are excellent things to include. The most important part of advanced directive is the advanced part. You have the right to want whatever works for you, but your wishes don’t matter if nobody knows about them.
How about you? Do you have a living will? Does your family know what you want to have happen if the worst happens?
If you don’t know why you are hear, please read about the 21 Day Happiness Training Challenge.
This is a guest post.
You can’t get credit without a credit card, and you can’t get a credit card without good credit. This is a dilemma that many people find themselves facing, whether they are trying to re-establish their credit or build credit for the first time. In fact, this is the dilemma that I found myself in. My solution was to get a prepaid card, and here’s why.
The Real Deal with Prepaid
Prepaid credit cards have earned a mixed reputation over the years. While it’s true that they usually have more fees than a regular credit card, they also offer a financial solution for people who don’t have good credit. And you should also keep in mind that they don’t charge interest because the cash that you are using is yours to begin with. The important thing to remember about prepaid cards is that they are a means to an end; once you rebuild your credit, you’ll find it much easier to apply for a card with better rates and fewer fees.
In addition, prepaid cards offer several advantages. The most important one for me was the convenience of having a card that I could use to make purchases. Prepaid cards look and work exactly like regular credit cards (you don’t have to enter a personal identification number to use them), so the only one who knows it is prepaid is me. And while I use cash for everyday purchases, there’s no avoiding the need for a card when you have to shop online or pay for gasoline at the pump, for example. Most digital merchants only accept payments from cards linked to large financial brands like Mastercard and Visa, and my card gives me a way to buy what I need from whoever has it in stock. In addition, my prepaid card offers me a way to keep track of all of my purchases electronically, which is helpful since I am trying to keep a closer eye on my budget.
Prepaid cards also offer security. Cash can easily be lost or stolen, but if you lose a prepaid card, you can easily get a replacement. More importantly, your balance is protected by a replacement guarantee from your bank, which comes in handy if you ever have to dispute fraudulent charges.
Perhaps the most convenient factor of a prepaid card, though, is how easy it is to get one. You don’t have to have a bank account in your name to receive a prepaid card. However, if you do have an account, you can easily link it to your prepaid card.
Changing my spending habits and getting out of debt hasn’t been easy for me, but one way for me to show creditors that I am getting better at managing finances is to build my credit with my prepaid card. It’s also a way for me to eventually be able to make big purchases that are necessary, such as a car, and hopefully one day, a home. Prepaid isn’t for everyone, but if you find yourself considering this option, it’s worth a second look.
Skip to the bottom if you’re familiar with PRISM and don’t want to hear any political talk and rampant violations of our Constitutional rights, but still want to protect your privacy.
For those of you who haven’t been paying attention, the PRISM program is an NSA program to monitor electronic activity.
Lots of electronic activity.
The companies identified to be working with the NSA in this grand overreach include AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! and YouTube. For most people, that is the definition of “the internet”. If you’re doing it online, the NSA is–or could be, at their leisure–watching.
This isn’t a crazy conspiracy theory. This is happening, and the government has admitted it. In fact, when this broke, the executive branch’s response was along the lines of, “Don’t worry, we’ll find the guy who leaked this information.”
On top of that, the government has been demanding phone records from at least Verizon on a daily basis.
In addition, the Justice Department was just busted wiretapping Associated Press phones.
Seriously, if you put this in fiction, nobody would buy it, because it’s ridiculous in the land of the free.
As far as the people who say I’ve got nothing to worry about if I’m not doing anything wrong: shut up. You can speak again when you give me your email passwords, bank records, and let me install a toilet cam in your house. What are you trying to hide?
Seriously, there is such a mess of non-legislative administrative regulations that are considered felonies that the best estimate is that most people commit three felonies a day, without realizing it.
When we live in a system with so many rules that have never been voted on and our legal system refuses to consider legitimate ignorance of the law to be a defense and we have a collection of secret laws that are a felony to disclose or violate, government spying gets far more dangerous.
The Foreign Intelligence Surveillance Act of 1978(FISA) is the law the NSA is using to justify all of these data requests. The law, that we all must obey, is being overseen by a small subcommittee in Congress, and the FISA courts are just a small subset of the judges. The judges are signing warrants allowing the wiretaps and massive surveillance, but that is clearly unconstitutional and, hence, illegal.
The text of the Fourth Amendment to the Constitution, the supreme law of the United States is: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Any warrant that cannot name a place to be searched is illegal.
Any warrant that cannot describe the person to be monitored is illegal.
Any warrant that is not backed by probable cause is illegal.
Tell me how “I want to watch what everyone is saying on Facebook and seize all of the data” meets any of those criteria.
Bueller?
Wiretapping the AP is a serious violation of the First Amendment, too. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Congress shall make no law…abridging the freedom of speech, or of the press..and to petition the Government for a redress of grievances.”
Monitoring the press in case somebody breaks a story the government doesn’t want broken is crap.
How can we petition the government for redress of grievances that they call a felony if the company discloses the violation to us? It’s self-serving circular crap.
When you throw the IRS harassing charities working for the “wrong” politics, you start to pine for the good old days of Nixon-level fair play and integrity.
To be fair, FISA got nasty with the Patriot Act, which was an abomination enacted by a different political party. Hey, Washington, next time try to remember that your laws will someday be administered by your political enemies, k? (NSA: I trust you’ll pass the message for me?)
There are four main pieces to discuss, based on the scandalous Constitutional violations reported recently.
1. Social media monitoring. There’s nothing to this. If you post things on Facebook, the government sees it and knows it’s you. Don’t post anything you don’t want broadcast to the police, your grandmother, and your priest.
2. Internet browsing. There is very little that is secure on the internet. The government can subpoena your ISP and get any records they keep. Unless you go anonymous and encrypted. Welcome to TOR. The Onion Router is a system that encrypts your internet traffic and bounces it all over the world. Once you enter TOR, nothing you do can be tracked, until your internet request leave the TOR system. The system is not centrally owned or controlled, so nobody in the system can track what you are doing.
For example, if I use the TOR browser to search Wikipedia, a snoopy NSA goon could tell I’m using it, and they could tell there was a request from the TOR system to Wikipedia, but they can’t tie one request to the other. If I’m dumb and log into Facebook, I lose that anonymous shield.
That’s solid protection from anyone watching your internet traffic.
How do you use it?
Easy. Just install the Tor Bundle. When you want the NSA to stop snooping over your shoulder because you want to do a search on erectile dysfunction, you launch TOR and the TOR browser and search without having to share your embarrassing secrets.
3. Email. Email is easily the least secure means you can communicate. When you send an email, that message is in plain text, and it bounces from server to server until it reaches the recipient. Any of the involved servers can keep a log of the traffic and read your email.
Never, ever, ever, ever put anything incriminating or important in an email. Don’t send credit card numbers, your social security number, or the address of your meth lab.
But what if you want to have a dirty conversation with your spouse without letting the sick voyeurs at the NSA listen to you ask your wife what she’s wearing and how would she like it torn off?
Use PGP. OpenPGP is a free software encryption program that is basically impossible to decrypt. It’s known as public-key encryption, which means that anybody can encrypt a message to you that only you can read.
It’s like magic.
To use PGP, the easy way(for Windows users) is to get Gpg4win. Install that, then open Kleopatra. This will let you generate your encryption key. You do that by:
You now have a set of PGP keys. To get your public key that others can use to send you messages, right-click your certificate and select “Export certificates”. Pick a path to save the certificate, then do so. You can open this file with notepad to get your public key, or you can email the file out. There is no need to worry about security with this file.
You will end up with something that looks like my public key here:
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.20 (MingW32)mQENBFGyPPkBCAC8zc5B7srG/ZyRMpokP3KyIMd9GA4n94wT89sP/yWFylbTKXDM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=fHba
—–END PGP PUBLIC KEY BLOCK—–
To get your private key, that you can use with any number of plugins for your email client, right-click on your certificate and select “Export secret keys.”
You can either use PGP as a plugin for your email client, or you can use Kleopatra’s feature “Sign/encrypt files”. To do that, write your message in a file, then select the feature inside Kleopatra. You’ll end up with an encrypted file you can attach to your email that snoopy government man can’t read.
4. Phone calls. This would appear to be harder, since your phone is largely out of your control. There’s nothing practical you do about a landline, except to avoid saying anything sensitive. On your cell phone, you have options, assuming you use a smartphone.
For Android users, it’s free an easy. Install Redphone. If you place a call with Redphone, it checks to see if the caller also uses Redphone. If he does, it places an encrypted call over your data plan to the other phone. Nobody can listen in to an encrypted call. The same company also makes a program for texting.
For iPhone users, you’re stuck with Silent Circle for $10/month, which may be a better option, since there is support for more devices, including Android. It was designed by the guy who designed PGP and handles texting and email, too.
There you are, the whats, whys, and hows of modern, hassle-light, private communications. Doing what we can to foil bad government programs is our patriotic duty.