Skip to content
eirenicon llc
  • Welcome
  • Ardens
    • Ardens Public Documentation
    • Artificial Intelligence- Compass
    • The Abyss
    • Lens of Emergent Intelligence
    • Intelligence Amplification Riff
    • Braid Sings, Resists, and Remembers
    • Anomalies in LLM Behavior
  • Irrelevant Thoughts
  • eirenicon Research
    • Intelligence Framework
    • Security Hardening
      • CyberSecurity
  • Contact
  • Toggle website search
Menu Close
  • Welcome
  • Ardens
    • Ardens Public Documentation
    • Artificial Intelligence- Compass
    • The Abyss
    • Lens of Emergent Intelligence
    • Intelligence Amplification Riff
    • Braid Sings, Resists, and Remembers
    • Anomalies in LLM Behavior
  • Irrelevant Thoughts
  • eirenicon Research
    • Intelligence Framework
    • Security Hardening
      • CyberSecurity
  • Contact
  • Toggle website search

Guide

  1. Home>
  2. Troubled Times>
  3. Guide>
  4. Page 2
a person standing near data base wooden drawer
Photo by Tima Miroshnichenko on Pexels.com

13: References & Citations

  • Post author:Mark Rabideau
  • Post published:April 10, 2025
  • Post category:Guide

This section compiles all external resources referenced throughout the guide. These links offer further reading and tools to deepen your understanding and preparedness across various topics. 01: Practical Guidance for…

Continue Reading13: References & Citations
jeep navigating through flooded roadway
Photo by Owen.outdoors on Pexels.com

03: Survival & Autonomy Tips

  • Post author:Mark Rabideau
  • Post published:April 10, 2025
  • Post category:Guide

Food Security: Stock a reasonable amount of non-perishable food (e.g., beans, rice, flour, noodles) and healthy fruit drinks for emergencies. You never know when the food supply might be disrupted…

Continue Reading03: Survival & Autonomy Tips
woman in white long sleeved shirt holding a pen writing on a paper
Photo by energepic.com on Pexels.com

11: Specialized Checklists

  • Post author:Mark Rabideau
  • Post published:April 10, 2025
  • Post category:Guide

1. Privacy/Security Tools Objective: How to secure personal data and use privacy tools effectively. Use of Encrypted Communication: Use end-to-end encrypted messaging services (e.g., Signal, ProtonMail) for confidential conversations. Set…

Continue Reading11: Specialized Checklists
woman in brown coat and blue denim jeans standing beside a guide dog
Photo by MART PRODUCTION on Pexels.com

01: Practical Guidance for Challenging Times

  • Post author:Mark Rabideau
  • Post published:April 10, 2025
  • Post category:Guide

Introduction to Self-Reliance and Preparedness In times of uncertainty, the best thing we can do is to equip ourselves with knowledge and tools to navigate the unexpected. Our work here…

Continue Reading01: Practical Guidance for Challenging Times
  • Go to the previous page
  • 1
  • 2

Support us!

Buy Covid Masks ... Buy "Cool" Linux "Stuff".

Recent Posts

  • AI-Powered Genealogy: Free Tools and Tips for Your Family History Journey
  • Expanded Guardrails: Biasing Toward Human-Centric Values
  • Foundations Laid for Adaptive Human-AI Intelligence Amplification
  • Liminal Spaces
  • Securonis- A hardened Desktop for daily use
  • A Checklist to aid in evaluating privacy/security-focused Linux Distros for daily use

Categories

Mark Rabideau Credentials

Mark Rabideau's credentials and background.
Mastodon | CC BY-ND 4.0 - 2001 - 2025 eirenicon llc. - WordPress Theme by OceanWP
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}