No more versionsing. Just Keep it Spinning

Dining Room Table – Dual Trestle and Extension Slides – Part 3

This is part three of my build for a Dining Room Table and will include the hardware attachment and finishing / staining phase.

To go to the Part 1, (building the legs and lower portions) see: Dining Room Table – Dual Trestle and Extension Slides – Part 1

To go to Part 2, (the table top and breadboard ends) see: Dining Room Table – Dual Trestle and Extension Slides – Part 2

[Read the rest of this entry...]


Dining Room Table – Dual Trestle and Extension Slides – Part 2

This is part two of my build for a Dining Room Table and will include the build for the table top components.

To go to the beginning, see: Dining Room Table – Dual Trestle and Extension Slides – Part 1 for the initial build of the leg components.

Cauls for the Top

Before even trying to make the top parts, which will consist of two 40″ x 40″ sides, plus two 15″ x 40″ leaves, I need to make cauls to keep the boards flat during glue up.

To do this, I made some long 2×2′s, (around 48″), so they’d extend far enough past the sides such that I could link them up with dowels. They’re going to have a slight curve to them to make sure they hold things down from the center out. As you’ll see, they’ll be clamped down later. Once everything is cut and put together, I put clear packing tape on the inside portions, then used plain parafin wax on top of that. This way, they won’t stick to the glue squeeze out on the boards during glue up. [Read the rest of this entry...]


Dining Room Table – Dual Trestle and Extension Slides – Part 1


This will be a series of a few blog posts to try to document my dining room table build. I’m doing this to try to share back to those maybe building something similar since I used a lot of resources myself to figure out techniques. I’m a novice woodworker and this was one of my more complicated projects. It’s likely some of the things I’ve done are not the best and you should definitely look at other resources as well. This is not a step-by-step How To. I’m just going to show the steps I took with some brief descriptions. Hopefully, it can help others with ideas the same way I got ideas from my own searches. I’ve put in links to others’ pages where I used them for background or specific technical How To info.

[Read the rest of this entry...]


Apple vs Government vs Terrorists

There’s a couple of items that seem to be missing from the February 2016 debate on whether Apple should assist the FBI in hacking into the cell phone used by deceased criminal / terrorist murderers.

Supposedly, this is a perfect case for avoiding most privacy issues. The bad evildoers are dead, so no privacy issues, and the phone is owned by their employer anyway, which is a public agency. Just one problem. If you make a way to crack into this phone, you’ve basically made a way to get into any phone. And even if you haven’t made a general backdoor, you’ve demonstrated you can and therefore are you going to start getting tons of court orders to keep doing this?

So let’s look at one obvious thing, but then a couple of items I think aren’t being looked at very closely just yet…

  • The FBI claims the order to hack the phone is narrowly described to focus on ONE phone. But how does the FBI know what it takes to get in there? Apple says the only way to do it is for them to re-cast their entire operating system. There’s really no apparent what – that I can think of in any case – where a hack would be inherently specific to one individual device.

What I’m not seeing anyone really talk about…

There are some other issues raised by what’s going on with this court order that I haven’t seen much focus on as yet.

  • Government Coercion of Forced Labor. Supposedly, when the Government requires Company compliance with various types of expensive regulations, they pay some form of reasonable accommodation fees to help them accomplish required tasks. But in this case, how could you possibly do that? You’re essentially ordering a private business to embark on a technical research project to discover what it would take to accomplish this goal, and then implement it. How much will that take in time and money? And what business opportunities will be lost by having those personnel assigned to this task instead of what they’d otherwise be doing?
  • Self Determination by Workers. Work may be at will in most states. So a company can fire you for pretty much any reason at any time. Maybe not for Government, Unions or some other types of work, but at most tech firms I’ve ever heard of, it’s At Will employemnt. So what happens if an Apple coder says s/he won’t do this work for philosophical reasons? Do they get fired? Or are they found in contempt of a court order and then they go to jail? Either way, what would Apple do then? Do they have to seek out and hire additional talent to accomplish this goal?

The slippery slope here is about a lot more than just privacy violations. It’s about what level of Government coercion can be used to force Specific Performance by Companies and individual workers. The State certainly has an interest in trying to gather evidence regarding terrorism, (or any other illegal activities), and to protect its citizens. And for that matter, I’d personally hope most would agree we’re all for our various police agencies aggressively seeking to protect us and stop the bad guys.

It’s probably true that with modern encryption more and more bad actors are putting more of their plans in digital forms only so there’s little to no evidence of the kind police agencies might have collected in the past. Police are then left with little other than actual actions by others, which can be harder to track. Perhaps after an incident there’s physical evidence, but with a complete inability to get at any plans or communications there’s clearly an increased advantage to criminals unlike ever before.

But here’s the thing: This is where we are. This is what we’re left with. We can’t allow the U.S. Government the kind of reach they’re looking for here because the philosophical and practical costs are too high and as importantly, DON’T SOLVE THE PROBLEM. Even if you can get into a device, users can have apps on devices that have encryption themselves. And there will be other devices not made in the U.S. that will add these capabilities, regardless of rules to not deploy them in the U.S. Even if this order ends up with the hacking of this phone, all we will have done is moved the threat down to the app level.

If this order prevails and Apple is compelled to do this, all that will happen is a major loss to end user privacy, major new risks for hacking of anyone, and likely a loss of business to Apple overseas as others prefer providers that don’t cripple encryption in their products.


My Build of a Kendall Extra Wide Dresser


I’m writing up some of the things I did during my build of a Kendall style extra wide dresser. I’m doing this in the hope that some of the tools or techniques I used may be helpful to others. I sort of hesitated to write this all up on my own hardly ever used blog as I kind of didn’t want to just add MORE stuff for folks to read who might be doing such a build. But I did some things a little differently that I thought some might find of interest. At the same time, each of us likely modifies plans just a bit as we each have different tools that could dictate how we go about certain tasks. [Read the rest of this entry...]

  • Categories

  • Archives

    • 2016 (4)
    • 2015 (1)
    • 2012 (6)
    • 2011 (2)
    • 2010 (9)
    • 2009 (14)
    • 2008 (1)
    • 2007 (4)
    • 2006 (6)
  • Feedburner

    Get updates by Email. Subscribe via Feedburner.

    FBFPowered by ®Google Feedburner