Feed aggregator

Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams

Malwarebytes - Thu, 02/13/2020 - 16:36

Research and reporting on this article were conducted by Labs writers Chris Boyd and David Ruiz.

Dating apps have been mainstream for a long time now, with nearly every possible dating scene covered—casual, long-term, gay, poly, of the Jewish faith, interested only in farmers—whatever you’re looking for. Sadly, wherever you find people trying to go about their business, you’ll also find others quite happy to intrude and cause problems.

Multiple pieces of research regularly highlight potential privacy flaws or security issues with dating apps galore. All this before we even get to the human aspect of the problem—no wonder online dating is exhausting.

Breaking into online dating circles

Dating apps are an unfortunate juicy target for cybercriminals, who will use any vulnerability—from software to psychological—to achieve their goal. Because it’s important to remember: Dating apps store more than just basic personally identifiable information (PII). They include sensitive data and images people might not be comfortable sharing elsewhere, which gives cybercriminals added leverage for blackmail, sextortion, and other forms of online abuse.

To start, the dating apps and sites themselves may not be safe from prying hackers looking to slurp user details. There’s the infamous 2015 compromise of cheating site Ashley Madison, or last year’s badly-timed announcement from dating app Coffee Meets Bagel, who informed users about a data compromise on Valentine’s Day.

How about location-based dating apps, like Tinder? In 2019, location-based dating app Jack’d allowed users to upload private photos and videos, but didn’t secure them on the backend, leaving users’ private images exposed to the public Internet. Now combine that with the ability to pinpoint a user’s exact location or track them on social media, and the end result is rather frightening.

Finally, online dating can wreak havoc in the workplace, too. If your organization supports a bring your own device (BYOD) policy, security vulnerabilities in dating apps could cause additional risk to your own reputation, as well as the company’s networks and infrastructure. (Though to be fair, you could argue “additional risk” is part and parcel of any BYOD policy.) A 2017 study by Kaspersky found that mobile dating apps were susceptible to man-in-the-middle attacks, putting any data or communications with the enterprise conducted via mobile device in danger.

Hints and tips for safe online dating

There are too many dating apps and websites out there to be able to give granular advice on privacy settings and security precautions for each and every one. However, a lot of security advice in this area is about common sense precaution, just as you would while dating in the real world. Many of these tips have been around forever; some require a little cybersecurity education, and a few rely on newer forms of technology to ensure things go smoothly.

Time to go hunting

Deploy some Google-Fu: One of the very first things you should do is a search related to your prospective date. There may well be multiple alarm bell–ringing search results for a troublesome dating site member all under the same username, for example. Or you could stumble upon multiple profiles begging for money on different sites, all using the same profile pic as your supposed date.

Checking photos and profile pics is a good idea in general. Use Google image search, Tineye, and other similar services to see if it’s been swiped from Shutterstock or elsewhere. It’s possible lazy scammers may start using deepfake images, which will be even harder to figure out, unless you read our blog and see some of the ways you can spot a fake.

Stay in on your night out

Don’t go outside the theoretical safety boundary of the app you’re using. This is one of the most common scam signs for any form of online shenanigans. Mysterious free video game platform gifts sent in your general direction? Surprise! You must receive the gift via dubious email link instead of the gaming platform you happen to be using. Making a purchase from a website you just discovered? Suddenly, you need to make a wire transfer instead of paying online—and so on.

Many dating apps restrict how much profile information you can reveal—that’s a good thing. However, that layer of privacy protection won’t work as well as it should if you’re convinced by a scammer to pass along lots of PII through other means. If the person on the other end of the communique is particularly insistent on this, that’s a definite red flag—for malware and for dating.

Hooking up with social media

A well-worn point, but it bears repeating: Sharing dating profiles with social media platforms may well open your data up to further scrutiny, thievery, and general tomfoolery. Your dating profile may be nicely locked down, but that approach again loses value if tied to public profiles containing a plethora of information on you, your friends, and your family. This just isn’t a risk worth taking.

Sharing is not always caring

Keeping your own dating data disconnected from social media platforms is just one step in protecting your sensitive information. Another step is awareness. When using dating apps, you should spend some time looking at their privacy policies and settings, as well as looking up news stories on them online, so that you know where your data is going, who is sending it around, and why.

For example, last month, the Norwegian Consumer Council revealed how the Android apps for Grindr, Tinder, and OkCupid sent sensitive personal information—including sexual preferences and GPS locations—to advertising companies, potentially breaching user trust.

The nonprofit’s report shone light on the digital advertising industry’s efforts to collect user information and channel it through a complex machine to find out who users are, where they live, what they like, who they support in elections, and even who they love. By analyzing 10 popular apps, the report’s researchers found at least 135 third parties that received user information.

Users’ GPS coordinates were shared with third parties by the dating apps Grindr and OkCupid. GPS “position” data was shared with third parties by the dating app Tinder, which also shared users’ expressed interest in gender. OkCupid also sent user information about “sexuality, drug use, political views, and much more,” the report said.

As to who received the information? The answers are less familiar. While Google and Facebook showed up in the report—both receiving Advertiser IDs—the majority of user data recipients were lesser-known companies, including AppLovin, AdColony, BuckSense, MoPub, and Braze.

There’s no cure-all to this type of data sharing, but you should know that privacy advocates in California are on it, having already asked the state’s Attorney General to investigate whether the data-sharing practices violate the California Consumer Privacy Act, which just came into effect at the start of this year.

General OPSEC tips

Operational security, or OPSEC for short, is pretty important as far as online dating is concerned. Some of the basic cybersecurity hygiene steps that we encourage our users to perform in their day-to-day business can help thwart unwanted digital access or steer you clear of physically dangerous situations. Here are a few examples:

Passwords, passwords, passwords

We all know password reuse is bad—across dating sites, apps, or any accounts—but depending on personal circumstances, it may also be bad to recycle usernames. If you don’t want people you’d rather avoid in the future tracking you down on social media, remember to use random names unrelated to your more general online activities.

While we’re on the subject, there are several other best practices for password security that we recommend, such as creating long passphrases that are unrelated to your name, birthday, or pets. If you can’t remember 85,000 different passwords, consider storing them in a password manager and using a single master password to control them all. If that seems like putting too much power in the hands of one password, we recommend using two- or multi-factor authentication.

The point is: Don’t reuse passwords on dating sites. There may be a plethora of intimate messages sent on these platforms, more so than on most other services you use. It makes sense to lock things down as much as possible.

Stranger danger

Meeting a date in person for the first time? Tell other people where you’re going on your date beforehand. It’s a basic, but invaluable safety step—especially if you have no way of vetting your date outside of the dating app constraints. Let your insider know the name/profile name/and anything else relevant to your date that might help them track you later, if necessary.

Also, try to obscure your literal latitude and longitude or home address from a virtual stranger before you get to know and trust them. Dating apps have taken those spammy “hot singles in your area” ads to their logical end point. Hot singles in your area really would be beneficial where dating is concerned, so why shouldn’t apps allow you to search on factors related to distance? However, on the flip side, this does rather tip your hand where revealing your general location is concerned.

So while your date will have some sort of idea as to where you’re based, you’ll want to have your first meeting(s) somewhere other than “the bar at the end of my street.” A little travel goes a long way to blocking some crucial details. Oh, and consider using public transport or your own vehicle to get to and from the date.

Ring, ring

If possible, don’t hand over your main phone number—especially when such a thing may be tied to SMS 2FA, which can lead to social engineering attacks on your mobile provider. If your mobile is your only phone, consider using a disposable phone specifically for dating that isn’t tied to anything important.

If that’s out of the question, you could try one of the many popular online services which provide their own number/voicemail.

Play it safe

After reading all of this, you may think that between potential security vulnerabilities, privacy exposures, and contending with awful scammers that it’s not worth the hassle to bother with online dating. That’s not our intention.

As long as you follow some of the advice listed above and keep in mind that dating apps can be compromised just like any other software, you should have a safe online dating experience. Just remember that anything you communicate online has the potential to drift offline—after all, that’s the whole goal of online dating in the first place.

Good luck, and stay safe out there!

The post Cyber tips for safe online dating: How to avoid privacy gaffs, exploits, and scams appeared first on Malwarebytes Labs.

Categories: Techie Feeds

Neapolitan Twist Cowl Tutorial

Moogly - Thu, 02/13/2020 - 16:01

The Neapolitan Twist Cowl is a super simple pattern that really shows off the yarn – and one very clever seam! See the right and left-handed video tutorials below to learn to make your own crochet cowl today! Disclaimer: This post includes affiliate links; materials provided by Yarnspirations and Furls. Neapolitan Twist Cowl Tutorial: How...

Read More

The post Neapolitan Twist Cowl Tutorial appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

Categories: Crochet Life

Here’s Your First Look at the New ‘X-Factor’ Costumes

First Comics News - Thu, 02/13/2020 - 14:59

The X-Men have conquered death, but the ability to bring back any fallen mutant comes with a host of questions and complications. And that’s where X-Factor comes in.

From writer Leah Williams and artist David Baldeón, April 22’s X-FACTOR #1 dives into the world of murder and missing persons in order to keep the rules of resurrection on track.


Categories: Comic Book Blogs

Cryptozoic Will Preview Upcoming Collectibles, Games, and Trading Cards at Toy Fair New York 2020

Cryptozoic - Thu, 02/13/2020 - 14:00

Cryptozoic will preview upcoming products at Toy Fair New York, February 22-25 at the Javits Center in New York City. At Booth #6651, Cryptozoic will feature its upcoming Cryptkins™ Unleashed and Catwoman Movie Collectible vinyl figures and three tabletop games coming later in 2020: Steven Universe: Beach-a-Palooza Card Battling Game, Epic Spell Wars™ of the Battle Wizards: Hijinx at Hell High, and DC Deck-Building Game: Dark Nights: Metal. Finally, it will preview its latest trading card set based on Outlander.


Categories: Tabletop Gaming Blogs

NEW: His Dark Materials on spectacular dustburst splatter vinyl

Blogtor Who - Thu, 02/13/2020 - 13:04

Demon Records presents these full-cast BBC Radio dramatisations of the celebrated trilogy, pressed on nine Heavyweight Daemonic Dustburst Splatter Limited Edition Vinyl Philip Pullman’s bestselling trilogy of books has sold more than 19 million copies worldwide and formed the basis of the major HBO/BBC TV series His Dark Materials. Now, this stunning 9LP box set […]

The post NEW: His Dark Materials on spectacular dustburst splatter vinyl appeared first on Blogtor Who.

Categories: Doctor Who Feeds


Looking For Group - Thu, 02/13/2020 - 05:00

The post 1374 appeared first on Looking For Group.

Categories: Web Comics

GFL – Page 0012

Looking For Group - Wed, 02/12/2020 - 20:07

EXT. FOREST – DAY Krunch, military pressing the maw of the dragon’s caved-in skull open, walks its lifeless tongue like it’s a red carpet and this is award night. The normally cocky Benny bends a knee to the little killer […]

The post GFL – Page 0012 appeared first on Looking For Group.

Categories: Web Comics

Top Comments – Pages 1371 – 1372

Looking For Group - Wed, 02/12/2020 - 19:17

Monday, YOU are the star! We curate our favourite comments from the previous week’s comments on lfg.co and Facebook and remind you how clever you are. Here are the top comments for Looking For Group pages 1371 – 1372 Looking […]

The post Top Comments – Pages 1371 – 1372 appeared first on Looking For Group.

Categories: Web Comics

A Play Shade of Tom Moldvay's X2 Castle Amber - Clark Ashton Smith & Jack Vance Cha'alt/Godbound Campaign Commentary

Swords & Stitchery - Wed, 02/12/2020 - 18:36
Harry Quin's The Wild Hunt from Tom Moldvay's X2 Castle Amber m module This Bob Bledsaw II business has left a bad taste in my mouth & for a while I'm gonna have to switch out my Judge's Guild material for my campaigns at least for a couple of months. But since this led to a bit of a sleepless night for me. Why?! Because of the fact that a player of mine reminded me that  I was going Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
Categories: Tabletop Gaming Blogs

Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove

Malwarebytes - Wed, 02/12/2020 - 18:15

We first stumbled upon the nasty Android Trojan xHelper, a stealthy malware dropper, in May 2019. By mid-summer 2019, xHelper was topping our detection charts—so we wrote an article about it. After the blog, we thought the case was closed on xHelper. Then a tech savvy user reached out to us in early January 2020 on the Malwarebytes support forum:

“I have a phone that is infected with the xhelper virus. This tenacious pain just keeps coming back.”

“I’m fairly technically inclined so I’m comfortable with common prompt or anything else I may need to do to make this thing go away so the phone is actually usable!”

forum user misspaperwait, Amelia

Indeed, she was infected with xHelper. Furthermore, Malwarebytes for Android had already successfully removed two variants of xHelper and a Trojan agent from her mobile device. The problem was, it kept coming back within an hour of removal. xHelper was re-infecting over and over again.

Photo provided by Amelia

If it wasn’t for the expertise and persistence of forum patron Amelia, we couldn’t have figured this out. She has graciously has allowed us to share her journey. 

All the fails

Before we share the culprit behind this xHelper re-infection, I’d like to highlight the tactics we used to investigate the situation, including the many dead ends we hit prior to figuring out the end game. By showing the roadblocks we encountered, we demonstrate the thought process and complexity behind removing malware so that others may use it as a guide. 

Clean slate

First off, Amelia was clever enough to do a factory reset before reaching out to us. Unfortunately, it didn’t resolve the issue, though it did give us a clean slate to work with. No other apps (besides those that came with the phones) were installed besides Malwarebytes for Android, thus, we could rule out an infection by prior installs (or so we thought).

We also ruled out any of the malware having device admin rights, which would have prevented our ability to uninstall malicious apps. In addition, we cleared all history and cache on Amelia’s browsers, in case of a browser-based threat, such as a drive-by download, causing the re-infection.

The usual suspect: pre-installed malware

Since we had a clean mobile device and it was still getting re-infected, our first assumption was that pre-installed malware was the issue. This assumption was fueled by the fact that the mobile device was from a lesser-known manufacturer, which is often the case with pre-installed malware.  So Amelia tested this theory by going through the steps to run Android Debug Bridge (adb) commands to her mobile device. 

With adb command line installed and the mobile device plugged into a PC, we used the workaround of uninstalling system apps for current user. This method renders system apps useless even though they still technically reside on the device. 

Starting with the most obvious to the least, we systematically uninstalled suspicious system apps, including the mobile device’s system updater and an audio app with hits on VirusTotal, a potential indicator of maliciousness.  Amelia was even able to grab various apps we didn’t have in our Mobile Intelligence System to rule everything out. After all this, xHelper’s persistence would not end.

Photo provided by Amelia of xHelper running on mobile device Triggered: Google PLAY

We then noticed something strange: The source of installation for the malware stated it was coming from Google PLAY. This was unusual because none of the malicious apps downloading on Amelia’s phone were on Google PLAY. Since we were running out of ideas, we disabled Google PLAY. As a result, the re-infections stopped!

We have seen important pre-installed system apps infected with malware in the past. But Google PLAY itself!? After further analysis, we determined that, no, Google PLAY was not infected with malware. However, something within Google PLAY was triggering the re-infection—perhaps something that was sitting in storage. Furthermore, that something could also be using Google PLAY as a smokescreen, falsifying it as the source of malware installation when in reality, it was coming from someplace else.

In the hopes that our theory held true, we asked Amelia to look for suspicious files and/or directories on her mobile device using a searchable file explorer, namely, anything that started with com.mufc., the malicious package names of xHelper. And then…eureka!

Photos provided by Amelia The culprit

Hidden within a directory named com.mufc.umbtts was yet another Android application package (APK). The APK in question was a Trojan dropper we promptly named Android/Trojan.Dropper.xHelper.VRW. It is responsible for dropping one variant of xHelper, which subsequently drops more malware within seconds.

Here’s the confusing part: Nowhere on the device does it appear that Trojan.Dropper.xHelper.VRW is installed. It is our belief that it installed, ran, and uninstalled again within seconds to evade detection—all by something triggered from Google PLAY.  The “how” behind this is still unknown.

It’s important to realize that unlike apps, directories and files remain on the Android mobile device even after a factory reset. Therefore, until the directories and files are removed, the device will keep getting infected.

How to remove xHelper re-infections

If you are experiencing re-infections of xHelper, here’s how to remove it:

  • We strongly recommend installing Malwarebytes for Android (free).
  • Install a file manager from Google PLAY that has the capability to search files and directories.
    • Amelia used File Manager by ASTRO.
  • Disable Google PLAY temporarily to stop re-infection.
    • Go to Settings > Apps > Google Play Store
    • Press Disable button
  • Run a scan in Malwarebytes for Android to remove xHelper and other malware.
    • Manually uninstalling can be difficult, but the names to look for in Apps info are fireway, xhelper, and Settings (only if two settings apps are displayed).
  • Open the file manager and search for anything in storage starting with com.mufc.
  • If found, make a note of the last modified date.
    • Pro tip: Sort by date in file manager
    • In File Manager by ASTRO, you can sort by date under View Settings
  • Delete anything starting with com.mufc. and anything with same date (except core directories like Download):
  • Re-enable Google PLAY
    • Go to Settings > Apps > Google Play Store
    • Press Enable button
  • If the infection still persists, reach out to us via Malwarebytes Support.
Mobile malware hits a new level

This is by far the nastiest infection I have encountered as a mobile malware researcher. Usually a factory reset, which is the last option, resolves even the worst infection. I cannot recall a time that an infection persisted after a factory reset unless the device came with pre-installed malware. This fact inadvertently sent me down the wrong path. Luckily, I had Amelia’s help, who was as persistent as xHelper itself in finding an answer and guiding us to our conclusion.

This, however, marks a new era in mobile malware. The ability to re-infect using a hidden directory containing an APK that can evade detection is both scary and frustrating. We will continue analyzing this malware behind the scenes. In the meantime, we hope this at least ends the chapter of this particular variant of xHelper. 

Stay safe out there!

The post Android Trojan xHelper uses persistent re-infection tactics: here’s how to remove appeared first on Malwarebytes Labs.

Categories: Techie Feeds

Blast from the Past: Can You Hear Me? Immortals Special!

Blogtor Who - Wed, 02/12/2020 - 17:01

Once again for this series of Doctor Who, Blogtor Who is looking at all the nods and references to adventures which have gone before. This time its the turn of Can You Hear Me Now? So even if you are not already a Mastermind expert on all things in the Whoniverse you can appreciate the […]

The post Blast from the Past: Can You Hear Me? Immortals Special! appeared first on Blogtor Who.

Categories: Doctor Who Feeds

Moogly Live: February 12, 2020 – Question Time!

Moogly - Wed, 02/12/2020 - 16:15

Starting this month, I’m pledging to go live twice a month! So today on Facebook Live I’ll be catching you up on the latest Moogly happenings, and on YouTube, I’ll be answering your crafty questions! Disclaimer: This post is sponsored by Yarnspirations, and contains affiliate links. Live videos are unscripted, unedited, occasionally weird, and all...

Read More

The post Moogly Live: February 12, 2020 – Question Time! appeared first on moogly. Please visit www.mooglyblog.com for this post. If you are viewing this on another site they have scraped the content from my website without permission. Thank you for your support.

Categories: Crochet Life

Mike’s Dungeons

Ten Foot Pole - Wed, 02/12/2020 - 12:11
Geoffrey McKinney Self-published B/X Levels 1-10

I took my DeLorean time machine back to 1983. I saw there four middle-school boys playing Dungeons & Dragons, and Mike was the name of the DM. I managed to steal Mike’s dungeons and bring them back to 2020. I stole them fair and square, and now you can buy them. Mike did all the work, so we can be lazy.

This 158 page adventure describes a 72 level dungeon. It lies somewhere between “minimally keyed” and “just a bit more than minimally keyed.” And I do mean Just A Bit More. Is minimal keying good enough these days?

So …. Good effort. 72 dungeon levels. Hand drawn maps of about a dozen rooms per level. The rooms are all described on one page, in clean easy to read font with margins. The dungeon map is on the other page, making it a “lay open” book affair. I, also, use 3-rings at home, but rings instead of a folder. It’s a good format for actualling running things. You can flip around easily, fold it back to back, lay it open on facing pages, and find the front and back easily for additional quick-access reference material. 

Geoffrey doesn’t do any of that. It’s just a map and a one-page key, per level, with a singal page of DM background information on page one describing how undead turn as two levels harder and how all Chaotics in the temple levels of the dungeon get a 1 point armor class bonus when attacked by Lawfulls. 

The writing style is one that Geoffrey has used before, such as in Isle of the Unknown. It’s minimally keyed, and, while he doesn’t say it, it looks like he’s using the charts from B/X to roll the encounters on, about one per room. Thus the first level has about fourteen rooms and twelve of them have a creature to slay in it. The thirteenth is the entrance cave mouth and the fourteenth a room with a trick. Stuffed full of creatures!

And minimally keyed. Which I seem to think is important since I seem to be beating that point to death in this review, name dropping it all over the place. The encounters on level one include:

2 chaotic warriors in plate mail with shields and swords.  

Giant orange centipedes crawl in and out of a worthless red glass urn, and they will not attack unless disturbed.  

1 giant yellow scorpion cannot move unless the 319 gp scattered on the floor near the scorpion is touched. 

2 gray oozes are in this cold, damp, and humid chamber  

An 11-headed hydra lairs here. Each of its 22 eyes is an amethyst worth 100 gp  

I’m not summarizing; this is all the text there is for those various rooms. I don’t think I’m cherry picking either, this is fairly representative for the vast vast majority of rooms. It’s very similar to Isle of the Unknown. In both cases it looks like a random generator was used to crete a keying and then an adjective was added, usually a color adjective. Yellow scorpion. Orange centipede.

Which is not to say that the entries are all bad. Crawling in and out of a glass urn is not bad, as ia hydra with amethyst eyes. In both cases it engages the risk/reward mechanism of the party, tempting them to recover loot, present with the hydra and not with the urns.   

And to be fair there are sometimes longer entries. But they are not common. Here’s one in which the creatures will talk to you:

The 9 wereboars here are preyed upon by the cyclops (room B). They will seek an alliance against their hated enemy: “Help us kill him, and you can keep all his gold.”

Your experiences here are going to be related to your tolerance of minimally keying. I don’t have any tolerance for it. There are mountains and mountains of random creature generators online these days to roll up your own dungeon. The level theming is pretty non-existent, except for a an Evil Temple theme which runs through some of the levels. (Portions of a dozen or sixteen levels?) It’s just a novelty, like the Habitation of the Stone Giant Lord art project from a few years back. I’m glad he wrote this, it’s fun to see, but that’s all.

This is $4 at DriveThru. The entire thing is available for preview, all 158 pages. Kudos for McKinney for doing this. Every product should be like this, or, close enough to it that you can get a real sense of what you are buying before you pay for it.


Categories: Tabletop Gaming Blogs

Wednesday Comics: Wild, Wild West

Sorcerer's Skull - Wed, 02/12/2020 - 12:00

The 60s spy-fi Western Wild, Wild West has had a couple of comic book adaptations. Gold Key Comics published 7 issues from 1966-69 (the span of tv series). The most recent series was in 1990 from Millennium Comics.

I've never read the Millennium series, but several issues of the Gold Key run are available on the Internet Archive. Check them out.

Red Planet Under Siege - Mars For The Cha'alt/Godbound Campaign

Swords & Stitchery - Wed, 02/12/2020 - 04:47
"Sometime after the collapse of the Human Empires & the disappearance of  Tékumel. Mars wasn't the powerhouse it had been during the days of the Human Space Empire. Instead there were thousands of space craft dry docks across Mars & scattered city states living in the shadows of forgotten temples of technologies that had been forgotten or abandoned all together. This would be a Mars that had Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
Categories: Tabletop Gaming Blogs

Itsy bitsy teenie weenie

Yarn Harlot - Wed, 02/12/2020 - 03:13

I wasn’t going to blog today because I didn’t have much time, but a short post is better than no post so I’m going to write this, but I’m not even going to try to make it coherent.  Let’s do a list, shall we? Here’s some things.

1. We had Megan’s baby shower on Saturday here at the house.  I thought that you were only supposed to have a shower for your first, but the girls said I was being old-fashioned and I couldn’t think of a good reason not to celebrate getting a baby, so we did.

2. I made cookies.

3. I also made a romper (the pattern is this one) and then I hadn’t run out of yarn so I made a bonnet (no pattern I just know what babies look like) and the I still had yarn so I made shoes.

I am out of yarn now. All that from one skein of Rosy Green Cheeky Merino Joy – which made it a very good deal indeed.  (Colour was 62, Isar Pebble.)

4. The shoes are from 50 Baby bootees to knit, which is a book I love now and always have. It’s paid for itself a thousand times.

5. Elliot is staying here for 3 days and two nights while his parents celebrate the last gasp of relative freedom they have before the new baby thows them back into lockdown.  I admit, I’m a little nervous – we’ve been doing sleepovers to practice for this – and so that he can have people to hang out with when the little usurper arrives, but two nights is a long time for a boy not yet three.  I hope it goes well. Today was the first and it went just fine. We cooked dinner together, and he went to bed like warm butter on hot toast, so let’s just see if it lasts.  (I have purchased treats and are willing to use them.)

6. I have their dog too.  See above re: treats.

7. I taught Elliot how to peel a carrot. Together with the potty training (he is better at that then the carrot) he is just about employable.

8. I do not care to discuss the blanket (or lack thereof) today.

Categories: Knitting Feeds

Wars of the Red Planet - Brett Slocum's Warrior's of the Lost Planets & A Post Apocalyptic Mars

Swords & Stitchery - Tue, 02/11/2020 - 18:15
'The distant red sands blow across the works of a reign of red kings who have turned to dust. Warriors of many tribes fight in the hollow remains of pyramids & stalk among the streets of a long dead empire fighting among themselves with sword & radium pistols!' My family is fine & all but work has had me on the ropes for the last three days or so. Last night after getting back from Needleshttp://www.blogger.com/profile/11243274667834930867noreply@blogger.com0
Categories: Tabletop Gaming Blogs


Subscribe to Furiously Eclectic People aggregator