What would your future-you have to say to you?
The no-pants guide to spending, saving, and thriving in the real world.
What would your future-you have to say to you?
From a question posted here:
Thank you for all your help in my previous question. After meeting with the agent, I’ve decided on term life insurance over whole life. But I am still not sure how much term life I should buy. Should I buy as much as I could afford or some specific amount?
My answer(edited a bit):
That question is far too open-ended.
Are you married? If yes, are you the primary breadwinner? Do you have children? Investments? Savings?
Here’s my situation:
I am married, with three children. I have the primary income.
We have a mortgage, a car payment, and some consumer debt.
I added up all of the debt as my base level of term life insurance. My family will not be burdened with debt if anything happens to me.
To the base level, I added 5 years of my net income. Without changing a thing, my family will be supported exactly as is for 5 years if I die. They won’t, however, have the same level of expenses, due to the base level of insurance paying off all debt. All of my living expenses also evaporate. For example, there will be one car sold, one less mouth to feed and body to dress, etc.
I figure with the lower expenses and no debt, my insurance will support my family for 10 to 15 years if my wife manages the money right. If she continues to work, it should last almost forever.
How do you figure the “right” amount of life insurance?[ad name=”inlineright”]
This is a guest post written by Jason Larkins. He writes at WorkSaveLive – a blog he started to help people change the way they think about their finances, careers, and lives.
Who doesn’t like to buy stuff?
Okay…I’m sure there are a few of you out there that take pride in never buying a new “toy,” but I know personally that I LOVE stuff!
Not to the point that I make dumb financial decisions that jeopardizes my family’s financial well-being, but I do have that natural American desire to have nice things and to be able to do fun stuff!
If you’re in the market to buy a Big-Ticket item (i.e. a new car, TV, or other technology gadget), what are some of the things you should be thinking through as you contemplate making the purchase?
The first mistake people make is buying on impulse. The massive majority of Americans don’t even have a thought process when it comes to buying toys, so that’s why I decided to dedicate a post on a few things you should ponder.
1. Avoid spending extra for add-ons, or features, that you’re never going to use.
It is easy to get an appliance or technology gadget that has a ton of amazing features on it – but why pay for them if you won’t use them?
Consider buying the item that may be a step below what you’re looking at.
I know that I personally love the thought of having an Ipad 2, but am I really going to utilize it to it’s full capabilities?
Probably not!
It doesn’t mean I shouldn’t have one, but it does mean I can look at the older Ipad and save some money. Or, I can avoid the purchase altogether if I don’t think it’s going to be worth the money.
2. Be cautious with offers such as “no money down,” “90 days same as cash,” or “12 months interest free.”
Nearly 88% of the “90 days same as cash” offers are actually converted to payments because the purchaser couldn’t pay off the bill before the offer was up.
3. Don’t buy it just because it’s the cheapest.
Always be sure to do research prior to your purchase – check consumer reviews and product reviews. Saving money may not be worth it if the product breaks down quickly or doesn’t have the functionality that you’re looking for.
1. Prepare for large purchases and pay cash for them.
If you can’t pay cash for the item, then there is a good chance that you can’t afford it.
Determine how much money you will need to spend on a particular item and save up for it! This is going to help you in a couple of ways:
2. Buy at the end of the month, or at the end of the year!
Consumers rarely think of this, but it’s important for you to know that every store (and store manager) has monthly/yearly sales to report.
If they’re wanting to close out the month/year strong, they’re much more inclined to offer you a deal on whatever you’re buying!
3. Avoid the extended warranty!
Insurance (in general terms) is the act of transferring risk – the more people that pool money together to help mitigate risk (buy insurance), then the lower the cost of the insurance becomes.
The reason to avoid the extended warranties is because the cost you’re paying to cover your item also includes: commissions paid to the retail store, overhead for the insurance company (wages for employees, building costs, utilities, etc), and some profit for the insurance company as well.
Sure, you may be in the miniscule percentage of buyers that has their item break down on them, but the reality is that it’s unlikely.
If it was likely for your item to break down, then the insurance wouldn’t be available because it wouldn’t be a profitable endeavor for the insurance company (and they’d be out of business).
Whenever you’re buying something that has a large price tag, you should develop a process that you think through before buying it!
Always pay in cash, get a deal, and make sure you actually need everything you’re paying for.
As we leave flooding season here in Minnesota, it’s important to remember that there are low-lifes who don’t mind preying on people when they are at their weakest and most vulnerable. That’s true in many situations, but the one I’m talking about specifically is the post-disaster scam.
The most prevalent is probably the home-repair con. If you have damage to your home from a disaster, be prepared to have people knocking on your door offering to fix your house. We had a nasty hail storm a couple of years ago and were plagued with contractors for months. Most of these were not con-men, but it is a safe bet that some were. There are two basic home-repair cons after a disaster.
The first is to over-promise and under-deliver. These people may just be inexperienced, but if someone claims to be able to replace your roof, your siding, and your deck for half of what anyone else is offering, run. The solution is to get multiple quotes and to check licenses and references. Then, get a written estimate. No reputable company will complain about any of that. If it feels to good to be true, it probably is.
The second common home-repair scam is to take your money and run. Most big contracting companies want to deal with your insurance company directly. That’s because they know they can pad the labor costs and add a mark-up to materials. Some just want to get the insurance money and run. Either way, I insist on dealing with the insurance company myself, so I can pay the contractor when the work is finished to my satisfaction.
Another common scam is the advance-fee loan con. This is perpetrated by scum preying on those people unfortunate, unlucky, or unwise enough to not have insurance to cover disaster damage. They will promise below-market interest rates, fast closing, and no credit check. All you have to do is give them a large down payment to seal the deal and they will “guarantee” the loan. In my world, guarantee does not refer to the art of leaving the state with someone else’s money, but that’s how this scam ends. Once again, don’t fall for “dream deals”. Never give money to a company you haven’t verified is legitimate and never(ever, ever, ever) give money or personal information to a stranger over the phone. If you didn’t initiate the contact and verify the company, don’t do business with them.
The third major con attacks the generous nature of most people when faced with another’s hardship. The charity con. Donating money to help people in need is an honorably act. Please make sure that you are donating to an actual charity, not a scam artist with a credit-card machine. If you didn’t initiate the contact, hang up and verify the charity is legitimate, then call back and donate money on your own. You can verify a charity’s status by contacting your state government, usually the Attorney General’s office.
As always, you are in charge of your safety and security, both financial and otherwise. Don’t let yourself be scammed.
As some of you have noticed, the link to subscribe by email has changed. While you do still have the option to subscribe to the rss feed through Feedburner, I’m no longer providing the link or recommending it. What I have in its place is an actual email list.
Yes, you can now subscribe to Live Real, Now by email, without having to go through Feedburner. That means you can get all of the updates in your email, for free! This is magic. This magic gives me another option to offer contests and free stuff.
There are two lists to choose from.
Your email will never be shared, with anyone, for any reason whatsoever. Ever. I hate spammers with a passion fueled by the fiery pits of hell to which spammers should be cast. I won’t be that guy.
Please, take this chance to subscribe to the magic.
Skip to the bottom if you’re familiar with PRISM and don’t want to hear any political talk and rampant violations of our Constitutional rights, but still want to protect your privacy.
For those of you who haven’t been paying attention, the PRISM program is an NSA program to monitor electronic activity.
Lots of electronic activity.
The companies identified to be working with the NSA in this grand overreach include AOL, Apple, Facebook, Google, Microsoft, PalTalk, Skype, Yahoo! and YouTube. For most people, that is the definition of “the internet”. If you’re doing it online, the NSA is–or could be, at their leisure–watching.
This isn’t a crazy conspiracy theory. This is happening, and the government has admitted it. In fact, when this broke, the executive branch’s response was along the lines of, “Don’t worry, we’ll find the guy who leaked this information.”
On top of that, the government has been demanding phone records from at least Verizon on a daily basis.
In addition, the Justice Department was just busted wiretapping Associated Press phones.
Seriously, if you put this in fiction, nobody would buy it, because it’s ridiculous in the land of the free.
As far as the people who say I’ve got nothing to worry about if I’m not doing anything wrong: shut up. You can speak again when you give me your email passwords, bank records, and let me install a toilet cam in your house. What are you trying to hide?
Seriously, there is such a mess of non-legislative administrative regulations that are considered felonies that the best estimate is that most people commit three felonies a day, without realizing it.
When we live in a system with so many rules that have never been voted on and our legal system refuses to consider legitimate ignorance of the law to be a defense and we have a collection of secret laws that are a felony to disclose or violate, government spying gets far more dangerous.
The Foreign Intelligence Surveillance Act of 1978(FISA) is the law the NSA is using to justify all of these data requests. The law, that we all must obey, is being overseen by a small subcommittee in Congress, and the FISA courts are just a small subset of the judges. The judges are signing warrants allowing the wiretaps and massive surveillance, but that is clearly unconstitutional and, hence, illegal.
The text of the Fourth Amendment to the Constitution, the supreme law of the United States is: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.”
Any warrant that cannot name a place to be searched is illegal.
Any warrant that cannot describe the person to be monitored is illegal.
Any warrant that is not backed by probable cause is illegal.
Tell me how “I want to watch what everyone is saying on Facebook and seize all of the data” meets any of those criteria.
Bueller?
Wiretapping the AP is a serious violation of the First Amendment, too. “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.”
“Congress shall make no law…abridging the freedom of speech, or of the press..and to petition the Government for a redress of grievances.”
Monitoring the press in case somebody breaks a story the government doesn’t want broken is crap.
How can we petition the government for redress of grievances that they call a felony if the company discloses the violation to us? It’s self-serving circular crap.
When you throw the IRS harassing charities working for the “wrong” politics, you start to pine for the good old days of Nixon-level fair play and integrity.
To be fair, FISA got nasty with the Patriot Act, which was an abomination enacted by a different political party. Hey, Washington, next time try to remember that your laws will someday be administered by your political enemies, k? (NSA: I trust you’ll pass the message for me?)
There are four main pieces to discuss, based on the scandalous Constitutional violations reported recently.
1. Social media monitoring. There’s nothing to this. If you post things on Facebook, the government sees it and knows it’s you. Don’t post anything you don’t want broadcast to the police, your grandmother, and your priest.
2. Internet browsing. There is very little that is secure on the internet. The government can subpoena your ISP and get any records they keep. Unless you go anonymous and encrypted. Welcome to TOR. The Onion Router is a system that encrypts your internet traffic and bounces it all over the world. Once you enter TOR, nothing you do can be tracked, until your internet request leave the TOR system. The system is not centrally owned or controlled, so nobody in the system can track what you are doing.
For example, if I use the TOR browser to search Wikipedia, a snoopy NSA goon could tell I’m using it, and they could tell there was a request from the TOR system to Wikipedia, but they can’t tie one request to the other. If I’m dumb and log into Facebook, I lose that anonymous shield.
That’s solid protection from anyone watching your internet traffic.
How do you use it?
Easy. Just install the Tor Bundle. When you want the NSA to stop snooping over your shoulder because you want to do a search on erectile dysfunction, you launch TOR and the TOR browser and search without having to share your embarrassing secrets.
3. Email. Email is easily the least secure means you can communicate. When you send an email, that message is in plain text, and it bounces from server to server until it reaches the recipient. Any of the involved servers can keep a log of the traffic and read your email.
Never, ever, ever, ever put anything incriminating or important in an email. Don’t send credit card numbers, your social security number, or the address of your meth lab.
But what if you want to have a dirty conversation with your spouse without letting the sick voyeurs at the NSA listen to you ask your wife what she’s wearing and how would she like it torn off?
Use PGP. OpenPGP is a free software encryption program that is basically impossible to decrypt. It’s known as public-key encryption, which means that anybody can encrypt a message to you that only you can read.
It’s like magic.
To use PGP, the easy way(for Windows users) is to get Gpg4win. Install that, then open Kleopatra. This will let you generate your encryption key. You do that by:
You now have a set of PGP keys. To get your public key that others can use to send you messages, right-click your certificate and select “Export certificates”. Pick a path to save the certificate, then do so. You can open this file with notepad to get your public key, or you can email the file out. There is no need to worry about security with this file.
You will end up with something that looks like my public key here:
—–BEGIN PGP PUBLIC KEY BLOCK—–
Version: GnuPG v2.0.20 (MingW32)mQENBFGyPPkBCAC8zc5B7srG/ZyRMpokP3KyIMd9GA4n94wT89sP/yWFylbTKXDM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=fHba
—–END PGP PUBLIC KEY BLOCK—–
To get your private key, that you can use with any number of plugins for your email client, right-click on your certificate and select “Export secret keys.”
You can either use PGP as a plugin for your email client, or you can use Kleopatra’s feature “Sign/encrypt files”. To do that, write your message in a file, then select the feature inside Kleopatra. You’ll end up with an encrypted file you can attach to your email that snoopy government man can’t read.
4. Phone calls. This would appear to be harder, since your phone is largely out of your control. There’s nothing practical you do about a landline, except to avoid saying anything sensitive. On your cell phone, you have options, assuming you use a smartphone.
For Android users, it’s free an easy. Install Redphone. If you place a call with Redphone, it checks to see if the caller also uses Redphone. If he does, it places an encrypted call over your data plan to the other phone. Nobody can listen in to an encrypted call. The same company also makes a program for texting.
For iPhone users, you’re stuck with Silent Circle for $10/month, which may be a better option, since there is support for more devices, including Android. It was designed by the guy who designed PGP and handles texting and email, too.
There you are, the whats, whys, and hows of modern, hassle-light, private communications. Doing what we can to foil bad government programs is our patriotic duty.