Difference between revisions of "User:Fontaine"

From Noisebridge
Jump to: navigation, search
(removal of Taffy)
(Contact: updated jabber)
Line 8: Line 8:
'''Griffin Boyce'''
'''Griffin Boyce'''
* griffinboyce@gmail.com Email
* griffinboyce@gmail.com Email
* fontaine@jabber.ccc.de Chat
* saint@jabber.ccc.de Chat
* [https://twitter.com/abditum abditum] on Twitter
* [https://twitter.com/abditum abditum] on Twitter
* +1-609-445-4127. If you're into that sort of thing.
* +1-609-445-4127. If you're into that sort of thing.

Revision as of 08:28, 30 July 2012

I do everything. If I don't know how, I learn. Ask me anything. I have no TMI filter and a sense of humour about everything in the universe.

If you have a research project, or would like to discuss my research, please feel free to contact me. Always up for a chat. =)

A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects. -Robert A. Heinlein


Griffin Boyce

  • griffinboyce@gmail.com Email
  • saint@jabber.ccc.de Chat
  • abditum on Twitter
  • +1-609-445-4127. If you're into that sort of thing.

Scientific Interests

  • Mental Health
    • Gender and Sexuality
    • Poverty and Access Issues
    • Post-Trauma
    • Addiction Psychology
    • Grief and Loss
  • Telemedicine
    • Rural Access Initiatives
    • Transgender Health in Restricted Locations
    • Mental Healthcare Access
  • Human Factors Engineering
  • Poverty Prevention and Intervention
  • Privacy-related technology
    • Life-saving online privacy measures such as The Tor Project
    • Anonymity in general is a hobby-horse of mine
  • Ethical public policy and procedures
  • Health care for low-income medically-needy individuals
  • Historical Cryptography, Ciphers and Codebreaking
  • Telephony
    • Classic Phone Phreaking
    • Human Factors of Security


Valid as of January 2012[1]