User:Fontaine

From Noisebridge
(Difference between revisions)
Jump to: navigation, search
(removal of Taffy)
(removal of Taffy)
Line 34: Line 34:
 
** Classic Phone Phreaking
 
** Classic Phone Phreaking
 
** Human Factors of Security
 
** Human Factors of Security
* Psychology of Facism
 
** Contributory factors to development of ideals
 
** Social Psychology in Fascist/Neo-Fascist groups
 
 
  
 
==GPG Key==
 
==GPG Key==
 
Valid as of January 2012[http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0xE331FD29AE792C97]
 
Valid as of January 2012[http://pgp.mit.edu:11371/pks/lookup?op=vindex&search=0xE331FD29AE792C97]

Revision as of 09:19, 11 April 2012

I do everything. If I don't know how, I learn. Ask me anything. I have no TMI filter and a sense of humour about everything in the universe.

If you have a research project, or would like to discuss my research, please feel free to contact me. Always up for a chat. =)

A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects. -Robert A. Heinlein

Contact

Griffin Boyce

  • griffinboyce@gmail.com Email
  • fontaine@jabber.ccc.de Chat
  • abditum on Twitter
  • +1-609-445-4127. If you're into that sort of thing.

Scientific Interests

  • Mental Health
    • Gender and Sexuality
    • Poverty and Access Issues
    • Post-Trauma
    • Addiction Psychology
    • Grief and Loss
  • Telemedicine
    • Rural Access Initiatives
    • Transgender Health in Restricted Locations
    • Mental Healthcare Access
  • Human Factors Engineering
  • Poverty Prevention and Intervention
  • Privacy-related technology
    • Life-saving online privacy measures such as The Tor Project
    • Anonymity in general is a hobby-horse of mine
  • Ethical public policy and procedures
  • Health care for low-income medically-needy individuals
  • Historical Cryptography, Ciphers and Codebreaking
  • Telephony
    • Classic Phone Phreaking
    • Human Factors of Security

GPG Key

Valid as of January 2012[1]

Personal tools