<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Ryan Bagley</title><link>https://rb.ax/</link><description>Recent content on Ryan Bagley</description><generator>Hugo</generator><language>en-US</language><copyright>© 2026 Ryan Bagley</copyright><atom:link href="https://rb.ax/index.xml" rel="self" type="application/rss+xml"/><item><title>No One Is Coming to Fix the Subsea Cables</title><link>https://rb.ax/blog/no-one-is-coming-to-fix-the-subsea-cables/</link><pubDate>Wed, 18 Mar 2026 10:00:00 -0600</pubDate><guid>https://rb.ax/blog/no-one-is-coming-to-fix-the-subsea-cables/</guid><description>&lt;p&gt;Subsea internet cables carry 99 percent of transoceanic digital traffic.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Financial transactions, diplomatic communications, military data, and the mundane browsing of billions of people all travel through fiber-optic strands resting on the ocean floor. These cables require something that is in desperately short supply: international cooperation.&lt;/p&gt;
&lt;p&gt;They need it for route surveys, installation permits, maintenance windows, and emergency repairs across dozens of jurisdictions. They need it when a cable is severed in waters controlled by a hostile government or a non-state militia. They need it when the only repair ship in the region cannot enter a conflict zone without a ceasefire that no one is willing to broker. The world is fracturing, and the infrastructure that holds the global internet together is fracturing with it.&lt;/p&gt;
&lt;p&gt;The Red Sea was, until recently, the highway of the global internet. Roughly 95 percent of data traffic between Asia and Europe transited its waters.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; The geography was compelling: shorter routes, lower latency, international waters with fewer regulatory obstacles. Egypt sat at the junction, drawing an estimated 10 percent of its national telecoms revenue from transit fees alone.&lt;sup id="fnref1:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Then the Houthis started firing. Since late 2023, two major outage events have each severed four subsea cables simultaneously.&lt;sup id="fnref2:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; The first major outage in February 2024 took nearly six months to fix because no one could secure safe passage for repair vessels into Houthi-controlled waters.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; As subsea cable consultant Roderick Beck put it, &amp;ldquo;the outages in themselves are not the problem. The problem is the inability to repair them in any reasonable length of time.&amp;rdquo;&lt;sup id="fnref3:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The industry had barely begun to digest the Red Sea&amp;rsquo;s transformation from a commercial thoroughfare into a no-go zone when a second choke point closed. The U.S. led military campaign against Iran in early 2026 turned the Strait of Hormuz and the Persian Gulf into an active war zone.&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; As Mr. Beck has noted, many subsea cable consortiums had viewed the Persian Gulf as their best hope for a Red Sea bypass route, only to discover that the Gulf is now possibly worse than the Red Sea.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; Alcatel Submarine Networks, the French state-owned company contracted to lay cable for Meta&amp;rsquo;s 2Africa Pearls extension, issued force majeure notices and halted all construction.&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; The cable-laying vessel &lt;em&gt;Ile De Batz&lt;/em&gt; sits stranded off the coast of Dammam, Saudi Arabia, unable to complete its mission.&lt;sup id="fnref1:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; A significant portion of the 2Africa Pearls cable has already been laid on the seabed but remains unconnected to its landing stations.&lt;sup id="fnref2:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The cascade extends well beyond 2Africa. SEA-ME-WE 6, originally scheduled for service in 2024 and already delayed to June 2027, faces further uncertainty.&lt;sup id="fnref3:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; The cable&amp;rsquo;s bypass route runs up the Persian Gulf to Bahrain, then traverses the desert to a cable landing station in Jeddah before connecting to the Red Sea corridor through Egypt, meaning it depends on both choke points remaining functional.&lt;sup id="fnref1:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; The $700 million WorldLink Transit Cable Project, whose entire premise rested on positioning the Persian Gulf as a viable alternative corridor for Asia-Europe traffic, appears likely to die on the vine.&lt;sup id="fnref4:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; The Fibre in Gulf project connecting the GCC countries and Iraq has been thrown into limbo.&lt;sup id="fnref5:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Both the Strait of Hormuz and the Red Sea are now effectively closed to commercial cable repair vessels.&lt;sup id="fnref6:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; Any cables damaged by missiles, naval mines, or the anchors of stricken ships will remain severed for the duration of the conflict.&lt;sup id="fnref7:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; Multiple active cable systems serving billions of users are already living this reality.&lt;/p&gt;
&lt;p&gt;The closure of two maritime choke points simultaneously has triggered a frantic search for overland alternatives. Gulf states are financing competing data corridors through Syria, Iraq, and East Africa to bypass the routes that their digital connectivity depends on.&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The most advanced project is SilkLink: Saudi Arabia&amp;rsquo;s STC Group signed an $800 million contract in February 2026 to build 4,500 kilometers of fiber across Syria to a submarine cable landing station at Tartus on the Mediterranean.&lt;sup id="fnref1:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; This replaced an earlier plan to route through Israel, which collapsed after the Gaza war.&lt;sup id="fnref2:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; Qatar&amp;rsquo;s Ooredoo is building a second corridor through Iraq with a separate $500 million commitment to overland routes from Iraq through Turkey to Europe.&lt;sup id="fnref3:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; A third project, WorldLink, announced by a privately funded consortium, would run a $700 million hybrid cable from the UAE through Iraq to Turkey, though it has no named construction contractor and a five-year timeline.&lt;sup id="fnref4:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;All three front-runner corridors converge on Turkey as the gateway to Europe.&lt;sup id="fnref5:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; This consolidation is inherently problematic. Additionally, the corridors being planned as escape routes from geographic vulnerability would themselves pass through Syria, Iraq, Sudan, and Ethiopia, countries where conflict or institutional fragility has severed infrastructure before.&lt;sup id="fnref6:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;For India, the timing is particularly damaging. Research by the Observer Research Foundation indicates approximately a third of India&amp;rsquo;s westbound internet traffic travels through cables passing near the Strait of Hormuz.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; India&amp;rsquo;s international internet traffic exits primarily through two gateways: Mumbai on the west coast and Chennai on the east, with Mumbai&amp;rsquo;s traffic largely dependent on cable systems crossing the Arabian Sea and the Gulf region.&lt;sup id="fnref1:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; Cybersecurity experts warn that if multiple cables fail simultaneously, remaining routes would become overloaded, with serious latency and speed degradation materializing in as little as a week.&lt;sup id="fnref2:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Lynn Kuok, writing in &lt;em&gt;Foreign Affairs&lt;/em&gt;, makes an intellectually thorough case for a comprehensive global architecture to secure subsea cables.&lt;sup id="fnref1:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; She argues for strengthening UNCLOS provisions, creating an intergovernmental organization for seabed infrastructure security, establishing a &amp;ldquo;trusted cable&amp;rdquo; certification program, and convening an ad hoc international conference to develop shared standards.&lt;sup id="fnref2:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; She acknowledges that a UN General Assembly resolution on these matters is &amp;ldquo;unlikely given the current geopolitical environment&amp;rdquo; but proposes that a &amp;ldquo;coalition of like-minded states&amp;rdquo; could convene an alternative forum.&lt;sup id="fnref3:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Kuok&amp;rsquo;s diagnosis is correct, but is pragmatically flawed. The international order that would make such cooperation possible is in active disassembly. An analysis from Brookings describes the current moment with unusual directness: the post-World War II order, built to prevent the recurrence of catastrophic conflict through free trade, multilateral institutions, and alliance systems, is being deliberately undermined by its principal architect.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; The Trump administration has threatened NATO partner annexation, supported far-right European movements, implemented whimsical tariffs, and withdrawn from institutions the United States spent decades building.&lt;sup id="fnref1:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; American foreign aid has been liquidated, democracy promotion eliminated, and conduct on the world stage has corroded the soft power that once made American leadership credible.&lt;sup id="fnref2:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;This matters for subsea internet cables because the kind of cooperation Kuok envisions requires exactly what is evaporating: confidence in American intentions, institutional durability, and consistent rule application.&lt;sup id="fnref3:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; As trust erodes, governments hedge. Partners diversify connections, alternative arrangements expand, and the habits of cooperation fade.&lt;sup id="fnref4:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; Fragmentation becomes self-reinforcing.&lt;sup id="fnref5:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Kuok herself identifies the central problem. Global cabling is already splintering into U.S.-led, Chinese-led, and nonaligned blocs, with routes and landings increasingly mirroring geopolitical alignment rather than commercial logic.&lt;sup id="fnref4:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; She notes that U.S.-linked cable systems like Apricot and Echo were originally designed to cross the South China Sea but were reengineered to avoid it due to permitting delays and security concerns in China&amp;rsquo;s claimed maritime areas.&lt;sup id="fnref5:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Some companies are rerouting cables around disputed areas rather than contesting China&amp;rsquo;s claims.&lt;sup id="fnref6:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The legal framework is equally fractured. UNCLOS provisions governing subsea cables were drafted for an earlier era and build on the 1884 Convention for the Protection of Submarine Telegraph Cables, a treaty signed by legacy monarchs.&lt;sup id="fnref7:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; China ratified UNCLOS in 1996 but maintains domestic regulations that directly contradict it by requiring foreign companies to secure consent for cable routes across its continental shelf.&lt;sup id="fnref8:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; A Finnish court dismissed sabotage charges against the crew of the &lt;em&gt;Eagle S&lt;/em&gt;, a Russian-linked tanker suspected of severing five Baltic cables, on jurisdictional grounds because the incident occurred beyond Finland&amp;rsquo;s territorial waters, and the vessel&amp;rsquo;s flag state, the Cook Islands, has initiated no proceedings.&lt;sup id="fnref9:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The United States is not even a party to UNCLOS. Proposing that Washington lead a new subsea order while simultaneously dismantling the broader international architecture is, at best, aspirational. At worst, it is a distraction from actions that could actually be taken now.&lt;/p&gt;
&lt;p&gt;The more pragmatic approach is already being demonstrated in Europe. The European Union has adopted an action plan with measures to prevent, deter, detect, and respond to acts against subsea cables, as well as to repair damage.&lt;sup id="fnref10:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; NATO has established a coordination cell and a maritime center dedicated to undersea infrastructure security, increased air and naval patrols in the North and Baltic Seas, and launched initiatives to detect cable damage and reroute data via satellites.&lt;sup id="fnref11:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; The EU promotes the deployment of Science Monitoring and Reliable Telecommunications (SMART) technology, which equips data cables with environmental and security sensors.&lt;sup id="fnref12:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; The regional scope is precisely why it might work.&lt;/p&gt;
&lt;p&gt;I wrote about SMART cable sensors in 2024 when covering Madeira&amp;rsquo;s &lt;a href="https://rb.ax/blog/madeira-submarine-cables/"&gt;submarine cable infrastructure&lt;/a&gt;. The Anel CAM project, connecting mainland Portugal with the Azores and Madeira, incorporates approximately 50 SMART repeaters across its 3,812-kilometer span. These sensors, placed roughly every 50 kilometers, can detect seafloor motion, water pressure changes, and temperature variations without interfering with the cable&amp;rsquo;s primary communication function. The dual-use value is significant: the same sensors that provide tsunami early warnings also detect suspicious activity along the seabed.&lt;/p&gt;
&lt;p&gt;When the Baltic Sea cables were severed in November 2024, I argued that &lt;a href="https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/"&gt;the response should be the same regardless of whether it was sabotage&lt;/a&gt;. The need to fortify protection for submarine cables exists independently of attribution. Increased redundancy through geographic path diversity, expanded deployment of SMART sensors, enhanced physical security at cable landing stations, and a stronger state posture around critical infrastructure: these are measures that any state or collection of states can implement without waiting for a global treaty that will never arrive.&lt;/p&gt;
&lt;p&gt;The European model works because it operates within an existing alliance structure with shared threat perception and the institutional capacity to act. NATO patrols the North and Baltic Seas not because an international treaty requires it but because member states recognize a common vulnerability and have the military assets to address it. The EU promotes SMART cable deployment not through a global certification regime but through its own regulatory framework and investment incentives.&lt;/p&gt;
&lt;p&gt;States outside Europe can adopt the same approach. The Gulf states are already doing so out of necessity, even if their competing overland corridors reflect what Kristian Ulrichsen called &amp;ldquo;an element of competition for influence rather than an alignment of effort.&amp;rdquo;&lt;sup id="fnref7:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; India, with a third of its westbound internet traffic exposed to the Hormuz choke point, has every reason to invest in redundant paths through the Bay of Bengal and overland connections that bypass the Middle East entirely.&lt;sup id="fnref3:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; The Polar Connect initiative, an Arctic submarine cable system linking Europe, North America, and East Asia designated as a Cable Project of European Interest by the EU, represents another form of regional diversification designed to circumvent vulnerable maritime corridors.&lt;sup id="fnref8:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The unfortunate consequence of all this is something Kuok describes with precision: subsea cable routes are following political paths rather than commercial ones.&lt;sup id="fnref13:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Meta&amp;rsquo;s Project Waterworth, a new 50,000-kilometer cable, was designed explicitly to bypass the Middle East.&lt;sup id="fnref9:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; Saudi Arabia&amp;rsquo;s SilkLink routes through Syria because routing through Israel became politically impossible after the Gaza war.&lt;sup id="fnref8:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; U.S.-linked cable systems avoid the South China Sea because engaging with China&amp;rsquo;s permitting requirements carries both delays and strategic risk.&lt;sup id="fnref14:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Each of these decisions makes commercial and security sense in isolation. Collectively, they accelerate the fracturing of what was once a unified global network into geopolitically segmented blocs. States maintain connections to allies and diminish connectivity to adversaries. Redundancy follows alliance lines. The physical infrastructure of the internet increasingly mirrors the political map rather than the technical or commercial one.&lt;/p&gt;
&lt;p&gt;A 100-gigabit wavelength from Singapore to Marseille via the Red Sea used to cost six times less than routing through Iran or Iraq and up through Turkey.&lt;sup id="fnref4:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; That price differential existed because the global system rewarded the most direct geographic path. As political considerations override commercial logic, costs rise, latency increases, and the economic advantages that drove the internet&amp;rsquo;s expansion erode.&lt;/p&gt;
&lt;p&gt;This is not an outcome anyone should welcome. But it is the outcome that current geopolitics are producing. The world&amp;rsquo;s subsea cable infrastructure was built on an assumption of baseline international cooperation: that repair ships could access the cables they were repairing, that permitting processes would follow predictable rules, that flag states would hold vessels accountable for cable damage, and that the major powers shared an interest in keeping the digital commons functional. Every one of those assumptions is now contested.&lt;/p&gt;
&lt;p&gt;Waiting for a global architecture that the current political environment cannot sustain is a losing strategy. Regional resilience offers the only viable path: broader geographic redundancy, more SMART cable sensors, stronger military patrols around critical infrastructure, and the institutional capacity to act without depending on adversaries to cooperate. The cables will still connect the world. They will just follow different paths, and those paths will tell you more about who trusts whom than about where the data needs to go.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Lynn Kuok, &amp;ldquo;The New Arteries of Power: Subsea Cables Are This Century&amp;rsquo;s Hidden Battleground,&amp;rdquo; &lt;em&gt;Foreign Affairs&lt;/em&gt;, January 2, 2026, &lt;a href="https://www.foreignaffairs.com/new-arteries-power"&gt;https://www.foreignaffairs.com/new-arteries-power&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref5:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref6:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref7:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref8:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref9:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref10:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref11:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref12:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref13:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref14:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Nadine Hawkins, &amp;ldquo;The End of the Red Sea Era: Why War and Politics Are Shattering a Global Digital Lifeline,&amp;rdquo; &lt;em&gt;Capacity&lt;/em&gt;, March 16, 2026, &lt;a href="https://capacityglobal.com/news/red-sea-internet-outage-geopolitical-crisis/"&gt;https://capacityglobal.com/news/red-sea-internet-outage-geopolitical-crisis/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Roderick Beck, &amp;ldquo;Capacity Media Interview of Me Regarding the Red Sea Cable Debacle and Solutions,&amp;rdquo; &lt;em&gt;Subsea Cables &amp;amp; Internet Infrastructure&lt;/em&gt;, March 16, 2026, &lt;a href="https://subseacables.blogspot.com/2026/03/capacity-media-interview-of-me.html"&gt;https://subseacables.blogspot.com/2026/03/capacity-media-interview-of-me.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Winston Qiu, &amp;ldquo;War in the Gulf Severs the World&amp;rsquo;s Digital Arteries: How the Iran Conflict Is Reshaping Global Connectivity,&amp;rdquo; &lt;em&gt;Submarine Networks&lt;/em&gt;, March 15, 2026, &lt;a href="https://www.submarinenetworks.com/en/nv/insights/war-in-the-gulf-severs-the-world-s-digital-arteries"&gt;https://www.submarinenetworks.com/en/nv/insights/war-in-the-gulf-severs-the-world-s-digital-arteries&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref5:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref6:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref7:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref8:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref9:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Roderick Beck, &amp;ldquo;Subsea Cable Nightmares: Elm Street Comes to the Middle East,&amp;rdquo; &lt;em&gt;Subsea Cables &amp;amp; Internet Infrastructure&lt;/em&gt;, March 14, 2026, &lt;a href="https://subseacables.blogspot.com/2026/03/subsea-cable-nightmares-elm-street.html"&gt;https://subseacables.blogspot.com/2026/03/subsea-cable-nightmares-elm-street.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Annie Turner, &amp;ldquo;ASN Ceases Work on 2Africa Cable Citing Force Majeure,&amp;rdquo; &lt;em&gt;Mobile Europe&lt;/em&gt;, March 18, 2026, &lt;a href="https://www.mobileeurope.co.uk/asn-ceases-work-on-2africa-cable-citing-force-majeure/"&gt;https://www.mobileeurope.co.uk/asn-ceases-work-on-2africa-cable-citing-force-majeure/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Indranil Ghosh, &amp;ldquo;The Gulf Built Oil Pipelines to Avoid Hormuz. It&amp;rsquo;s Now Doing the Same for Data,&amp;rdquo; &lt;em&gt;Rest of World&lt;/em&gt;, March 11, 2026, &lt;a href="https://restofworld.org/2026/gulf-overland-data-cables-europe-war/"&gt;https://restofworld.org/2026/gulf-overland-data-cables-europe-war/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref5:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref6:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref7:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref8:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Surabhi Gupta, &amp;ldquo;Buffering&amp;hellip; How Iran War Could Put India&amp;rsquo;s Internet Connectivity at Risk,&amp;rdquo; &lt;em&gt;ETV Bharat&lt;/em&gt;, March 13, 2026, &lt;a href="https://www.etvbharat.com/en/bharat/experts-warn-rising-hormuz-tensions-could-hit-india-connectivity-enn26031303842"&gt;https://www.etvbharat.com/en/bharat/experts-warn-rising-hormuz-tensions-could-hit-india-connectivity-enn26031303842&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Melanie W. Sisson et al., &amp;ldquo;Is Trump Reshaping the World Order?,&amp;rdquo; &lt;em&gt;Brookings&lt;/em&gt;, February 2, 2026, &lt;a href="https://www.brookings.edu/articles/is-trump-reshaping-the-world-order/"&gt;https://www.brookings.edu/articles/is-trump-reshaping-the-world-order/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref5:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Iran's BGP Behavior under Fire</title><link>https://rb.ax/blog/irans-bgp-behavior-under-fire/</link><pubDate>Sun, 08 Mar 2026 10:00:00 -0700</pubDate><guid>https://rb.ax/blog/irans-bgp-behavior-under-fire/</guid><description>&lt;p&gt;&lt;figure aria-label="Iran&amp;rsquo;s HTTP requests from February 24 to March 8, 2026 from the perspective of Cloudflare. Courtesy of Cloudflare Radar."&gt;
 &lt;img
 alt="Iran’s HTTP requests from February 24 to March 8, 2026 from the perspective of Cloudflare. Courtesy of Cloudflare Radar."
 title="Iran&amp;rsquo;s HTTP requests from February 24 to March 8, 2026 from the perspective of Cloudflare. Courtesy of Cloudflare Radar."
 width="1920"
 height="757"srcset="https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_867dbd5cd31b41d6.webp 480w, https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_ee5e7fc6aff6e06a.webp 768w, https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_d78f1eab86f74ada.webp 1024w, https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_79afcf53c5ac8cb.webp 1366w, https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_e2444b742ed1c985.webp 1600w, https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_e4a1057e01d03bf8.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/irans-bgp-behavior-under-fire/iran-http-traffic-featured_hu_e9f253c064f19977.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Iran&amp;rsquo;s HTTP requests from February 24 to March 8, 2026 from the perspective of Cloudflare. Courtesy of &lt;a href="https://radar.cloudflare.com/traffic/ir?dateStart=2026-02-24&amp;amp;dateEnd=2026-03-08"&gt;Cloudflare Radar&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;At approximately 06:15 UTC on February 28, 2026, the United States and Israel began air strikes against Iran. Less than two hours later, at around 08:00 UTC, Cloudflare Radar recorded HTTP traffic from Iran dropping to zero. The internet, by every observable measure of actual usage, went dark. But the BGP routes were never withdrawn from the global routing table.&lt;/p&gt;
&lt;p&gt;To investigate further, I pulled 30 hours of BGP data from three &lt;a href="https://www.ripe.net/analyse/internet-measurements/routing-information-service-ris/"&gt;RIPE RIS&lt;/a&gt; route collectors covering February 28, 00:00 UTC through March 1, 06:00 UTC. The three collectors were rrc00 in Amsterdam (a multi-hop collector with broad global peering), rrc13 in Moscow, and rrc26 in Dubai. Moscow and Dubai are particularly relevant here because of their geographic and network proximity to Iran&amp;rsquo;s upstream providers.&lt;/p&gt;
&lt;p&gt;The dataset captures 7.3 million BGP update messages involving Iran&amp;rsquo;s three international gateway autonomous systems: AS49666 (Telecommunication Infrastructure Company, or TIC), AS12880 (Iran Information Technology Company, or ITCO), and AS6736 (Institute for Research in Fundamental Sciences, or IPM). For readers who want background on how these gateways form the funnel apex of Iran&amp;rsquo;s internet architecture, I covered that in detail in a &lt;a href="https://rb.ax/blog/2026/anatomy-of-irans-internet/"&gt;previous post&lt;/a&gt;.&lt;/p&gt;
&lt;h3 id="air-strikes"&gt;&lt;a href="#air-strikes"&gt;Air Strikes&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;The air strikes began at 06:15 UTC. For roughly two hours afterward, the BGP data from Iran&amp;rsquo;s gateways looked largely normal. Update volumes during the 06:00 and 07:00 UTC hours were elevated but not dramatically so compared to earlier in the day. Then, at approximately 08:00 UTC, Cloudflare Radar showed HTTP traffic from Iran collapsing to a flatline. NetBlocks.org confirmed the outage.&lt;/p&gt;
&lt;p&gt;The BGP data during this throttle window tells its own story. There were zero route withdrawals. Across the entire 30-hour dataset not a single BGP WITHDRAW message was recorded for any prefix routed through Iran&amp;rsquo;s three international internet gateways.&lt;/p&gt;
&lt;p&gt;This provides an excellent insight into the pragmatic approach by Iranian technocrats. Rather than withdrawing BGP routes, which would be immediately visible to the global routing community, the regime instead applied filtering or rate limiting at the application and transport layers. The routes stayed in the global routing table and packets could still technically reach Iranian address space. But HTTP traffic, DNS queries, and other application-layer protocols were being silently dropped or throttled at the gateway.&lt;/p&gt;
&lt;p&gt;For the regime, this approach has a clear advantage. Withdrawn routes take time to reconverge when restored, and the act of withdrawal itself is a loud signal to the international community. Keeping routes announced while filtering traffic at a higher layer allows for faster restoration and less visible evidence of deliberate action to public observers.&lt;/p&gt;
&lt;h3 id="fluctuations"&gt;&lt;a href="#fluctuations"&gt;Fluctuations&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;At 09:00 UTC, BGP events spiked considerably, which was about an hour after HTTP traffic out of Iran flatlined. The below table starts at 00:00 on February 28 and extends to March 1 at 06:00 UTC.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Hour (UTC)&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Total Events&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Unique Prefixes&lt;/th&gt;
 &lt;th style="text-align: right"&gt;TIC (AS49666)&lt;/th&gt;
 &lt;th style="text-align: right"&gt;ITCO (AS12880)&lt;/th&gt;
 &lt;th style="text-align: right"&gt;IPM (AS6736)&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;00:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;121,762&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,822&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,801&lt;/td&gt;
 &lt;td style="text-align: right"&gt;374&lt;/td&gt;
 &lt;td style="text-align: right"&gt;28&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;01:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;70,599&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,612&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,591&lt;/td&gt;
 &lt;td style="text-align: right"&gt;411&lt;/td&gt;
 &lt;td style="text-align: right"&gt;22&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;02:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;95,675&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,041&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,020&lt;/td&gt;
 &lt;td style="text-align: right"&gt;369&lt;/td&gt;
 &lt;td style="text-align: right"&gt;22&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;03:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;20,893&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,148&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,127&lt;/td&gt;
 &lt;td style="text-align: right"&gt;379&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;04:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;27,122&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,257&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,098&lt;/td&gt;
 &lt;td style="text-align: right"&gt;382&lt;/td&gt;
 &lt;td style="text-align: right"&gt;190&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;05:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;20,078&lt;/td&gt;
 &lt;td style="text-align: right"&gt;479&lt;/td&gt;
 &lt;td style="text-align: right"&gt;456&lt;/td&gt;
 &lt;td style="text-align: right"&gt;242&lt;/td&gt;
 &lt;td style="text-align: right"&gt;23&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;06:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;63,839&lt;/td&gt;
 &lt;td style="text-align: right"&gt;829&lt;/td&gt;
 &lt;td style="text-align: right"&gt;804&lt;/td&gt;
 &lt;td style="text-align: right"&gt;247&lt;/td&gt;
 &lt;td style="text-align: right"&gt;27&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;07:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;244,134&lt;/td&gt;
 &lt;td style="text-align: right"&gt;2,836&lt;/td&gt;
 &lt;td style="text-align: right"&gt;2,814&lt;/td&gt;
 &lt;td style="text-align: right"&gt;719&lt;/td&gt;
 &lt;td style="text-align: right"&gt;56&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;&lt;strong&gt;08:00&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;34,130&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;1,489&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;1,468&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;450&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;51&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;&lt;strong&gt;09:00&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;3,886,009&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;8,354&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;8,338&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;1,968&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;24&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;&lt;strong&gt;10:00&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;1,259,809&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;8,180&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;8,021&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;1,945&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;166&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;11:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;388,688&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,141&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6,978&lt;/td&gt;
 &lt;td style="text-align: right"&gt;792&lt;/td&gt;
 &lt;td style="text-align: right"&gt;167&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;12:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;368,456&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,136&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6,969&lt;/td&gt;
 &lt;td style="text-align: right"&gt;790&lt;/td&gt;
 &lt;td style="text-align: right"&gt;167&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;13:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;294,533&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,118&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6,956&lt;/td&gt;
 &lt;td style="text-align: right"&gt;780&lt;/td&gt;
 &lt;td style="text-align: right"&gt;172&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;14:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;251,728&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,427&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,265&lt;/td&gt;
 &lt;td style="text-align: right"&gt;790&lt;/td&gt;
 &lt;td style="text-align: right"&gt;178&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;15:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;15,570&lt;/td&gt;
 &lt;td style="text-align: right"&gt;826&lt;/td&gt;
 &lt;td style="text-align: right"&gt;803&lt;/td&gt;
 &lt;td style="text-align: right"&gt;27&lt;/td&gt;
 &lt;td style="text-align: right"&gt;23&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;16:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;9,907&lt;/td&gt;
 &lt;td style="text-align: right"&gt;729&lt;/td&gt;
 &lt;td style="text-align: right"&gt;708&lt;/td&gt;
 &lt;td style="text-align: right"&gt;25&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;17:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;4,024&lt;/td&gt;
 &lt;td style="text-align: right"&gt;304&lt;/td&gt;
 &lt;td style="text-align: right"&gt;283&lt;/td&gt;
 &lt;td style="text-align: right"&gt;32&lt;/td&gt;
 &lt;td style="text-align: right"&gt;27&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;18:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;34,007&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,518&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,497&lt;/td&gt;
 &lt;td style="text-align: right"&gt;293&lt;/td&gt;
 &lt;td style="text-align: right"&gt;22&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;19:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;11,236&lt;/td&gt;
 &lt;td style="text-align: right"&gt;3,605&lt;/td&gt;
 &lt;td style="text-align: right"&gt;3,587&lt;/td&gt;
 &lt;td style="text-align: right"&gt;484&lt;/td&gt;
 &lt;td style="text-align: right"&gt;22&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;20:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;9,463&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,277&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,256&lt;/td&gt;
 &lt;td style="text-align: right"&gt;391&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;21:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;4,258&lt;/td&gt;
 &lt;td style="text-align: right"&gt;976&lt;/td&gt;
 &lt;td style="text-align: right"&gt;955&lt;/td&gt;
 &lt;td style="text-align: right"&gt;207&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;22:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,270&lt;/td&gt;
 &lt;td style="text-align: right"&gt;364&lt;/td&gt;
 &lt;td style="text-align: right"&gt;343&lt;/td&gt;
 &lt;td style="text-align: right"&gt;82&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;23:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,367&lt;/td&gt;
 &lt;td style="text-align: right"&gt;736&lt;/td&gt;
 &lt;td style="text-align: right"&gt;717&lt;/td&gt;
 &lt;td style="text-align: right"&gt;48&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;00:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;10,234&lt;/td&gt;
 &lt;td style="text-align: right"&gt;382&lt;/td&gt;
 &lt;td style="text-align: right"&gt;361&lt;/td&gt;
 &lt;td style="text-align: right"&gt;37&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;01:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;18,435&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,118&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,097&lt;/td&gt;
 &lt;td style="text-align: right"&gt;26&lt;/td&gt;
 &lt;td style="text-align: right"&gt;27&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;02:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;9,299&lt;/td&gt;
 &lt;td style="text-align: right"&gt;347&lt;/td&gt;
 &lt;td style="text-align: right"&gt;326&lt;/td&gt;
 &lt;td style="text-align: right"&gt;25&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;03:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;10,317&lt;/td&gt;
 &lt;td style="text-align: right"&gt;310&lt;/td&gt;
 &lt;td style="text-align: right"&gt;289&lt;/td&gt;
 &lt;td style="text-align: right"&gt;25&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;04:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;13,823&lt;/td&gt;
 &lt;td style="text-align: right"&gt;316&lt;/td&gt;
 &lt;td style="text-align: right"&gt;295&lt;/td&gt;
 &lt;td style="text-align: right"&gt;30&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;05:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;15,744&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6,477&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6,313&lt;/td&gt;
 &lt;td style="text-align: right"&gt;625&lt;/td&gt;
 &lt;td style="text-align: right"&gt;164&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;06:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,901&lt;/td&gt;
 &lt;td style="text-align: right"&gt;809&lt;/td&gt;
 &lt;td style="text-align: right"&gt;788&lt;/td&gt;
 &lt;td style="text-align: right"&gt;182&lt;/td&gt;
 &lt;td style="text-align: right"&gt;21&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The 09:00 UTC hour alone produced 3.88 million BGP announcements. For context, the baseline hours before the strikes averaged roughly 50,000 to 120,000 events. This represents a 30x to 70x increase in BGP churn.&lt;/p&gt;
&lt;p&gt;These were not withdrawals. They were announcements, the same prefixes being re-announced over and over with modified AS paths. This pattern is called route flapping, and it indicates that routers along the path were repeatedly losing and re-establishing BGP sessions, or that upstream providers were seeing constant path changes from Iranian networks.&lt;/p&gt;
&lt;p&gt;The number of unique downstream autonomous systems visible in the update stream jumped from 227 during the baseline period to 557 during the spike. Networks that were quietly stable before the strikes suddenly began generating massive volumes of BGP chatter. The top contributors to this instability were Iranian ISPs sitting directly behind the TIC gateway:&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;AS&lt;/th&gt;
 &lt;th style="text-align: left"&gt;Name&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Spike Events&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Baseline Events&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Increase&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS42337&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Respina Networks&lt;/td&gt;
 &lt;td style="text-align: right"&gt;840,392&lt;/td&gt;
 &lt;td style="text-align: right"&gt;27,535&lt;/td&gt;
 &lt;td style="text-align: right"&gt;214x&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS43754&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Asiatech Data Transmission&lt;/td&gt;
 &lt;td style="text-align: right"&gt;348,391&lt;/td&gt;
 &lt;td style="text-align: right"&gt;16,212&lt;/td&gt;
 &lt;td style="text-align: right"&gt;111x&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS48715&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Sefroyek Pardaz Engineering&lt;/td&gt;
 &lt;td style="text-align: right"&gt;217,700&lt;/td&gt;
 &lt;td style="text-align: right"&gt;271&lt;/td&gt;
 &lt;td style="text-align: right"&gt;882x&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS49556&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Hesab Rasam Rayaneh&lt;/td&gt;
 &lt;td style="text-align: right"&gt;142,728&lt;/td&gt;
 &lt;td style="text-align: right"&gt;0&lt;/td&gt;
 &lt;td style="text-align: right"&gt;N/A&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS62442&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Fara Saba Aria&lt;/td&gt;
 &lt;td style="text-align: right"&gt;95,250&lt;/td&gt;
 &lt;td style="text-align: right"&gt;408&lt;/td&gt;
 &lt;td style="text-align: right"&gt;396x&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS214922&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Unknown&lt;/td&gt;
 &lt;td style="text-align: right"&gt;86,977&lt;/td&gt;
 &lt;td style="text-align: right"&gt;0&lt;/td&gt;
 &lt;td style="text-align: right"&gt;N/A&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS204650&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Unknown&lt;/td&gt;
 &lt;td style="text-align: right"&gt;76,175&lt;/td&gt;
 &lt;td style="text-align: right"&gt;0&lt;/td&gt;
 &lt;td style="text-align: right"&gt;N/A&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS198154&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Tose-eh Fanavari Ertebat Pasargad&lt;/td&gt;
 &lt;td style="text-align: right"&gt;75,245&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,364&lt;/td&gt;
 &lt;td style="text-align: right"&gt;426x&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS41881&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Iran Telecommunication Company&lt;/td&gt;
 &lt;td style="text-align: right"&gt;71,023&lt;/td&gt;
 &lt;td style="text-align: right"&gt;8,863&lt;/td&gt;
 &lt;td style="text-align: right"&gt;53x&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS50558&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Ertebatat Zirsakht Shahr&lt;/td&gt;
 &lt;td style="text-align: right"&gt;69,485&lt;/td&gt;
 &lt;td style="text-align: right"&gt;0&lt;/td&gt;
 &lt;td style="text-align: right"&gt;N/A&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Several of these networks went from near silence to generating tens or hundreds of thousands of BGP updates in a two-hour window. AS49556, AS214922, AS204650, AS200370, and AS51469 had produced zero BGP events during the baseline period and then suddenly appeared during the spike. This suggests that the instability was propagating outward from the gateways, affecting networks deeper in Iran&amp;rsquo;s routing hierarchy that are normally invisible to the global BGP table.&lt;/p&gt;
&lt;p&gt;The AS path length data reinforces this picture. During baseline hours, the average AS path length for Iranian routes was 6.9 hops, with roughly 19% of announcements containing path prepending (consecutive duplicate ASNs in the path). During the 09:00 UTC spike, the average path length jumped to 8.7 hops, and 39.2% of all announcements contained prepending.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Period&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Avg Path Length&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Prepending %&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Total Announcements&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Baseline (00:00–05:00)&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6.9&lt;/td&gt;
 &lt;td style="text-align: right"&gt;19.1%&lt;/td&gt;
 &lt;td style="text-align: right"&gt;336,051&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Strikes begin, pre-throttle (06:00–08:00)&lt;/td&gt;
 &lt;td style="text-align: right"&gt;6.4&lt;/td&gt;
 &lt;td style="text-align: right"&gt;12.8%&lt;/td&gt;
 &lt;td style="text-align: right"&gt;307,973&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;HTTP Flatline (08:00–11:00)&lt;/td&gt;
 &lt;td style="text-align: right"&gt;8.3&lt;/td&gt;
 &lt;td style="text-align: right"&gt;33.8%&lt;/td&gt;
 &lt;td style="text-align: right"&gt;5,424,082&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Elevated (11:00–15:00)&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7.3&lt;/td&gt;
 &lt;td style="text-align: right"&gt;28.3%&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,303,405&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Settling (15:00–24:00)&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7.2&lt;/td&gt;
 &lt;td style="text-align: right"&gt;16.1%&lt;/td&gt;
 &lt;td style="text-align: right"&gt;103,102&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Next day (Mar 1 00:00–06:00)&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7.0&lt;/td&gt;
 &lt;td style="text-align: right"&gt;22.8%&lt;/td&gt;
 &lt;td style="text-align: right"&gt;77,852&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Path prepending is often used deliberately by network operators to make certain routes less preferred. In a crisis scenario, it could indicate routers cycling through backup paths, upstream providers de-preferring Iranian routes, or Iranian operators themselves attempting to shift traffic between gateways. The 09:00 UTC explosion of prepending suggests that whatever was happening inside Iran&amp;rsquo;s network was creating widespread path instability that rippled outward through every upstream provider peering with TIC and ITCO.&lt;/p&gt;
&lt;p&gt;The most striking behavior in the dataset belongs to ITCO (AS12880), Iran&amp;rsquo;s second-largest international gateway. ITCO carried 88,603 routes in the RIB table at midnight UTC and was actively participating in normal BGP operations through the early morning hours. Then, during the spike at 09:00 UTC, ITCO generated over 2 million BGP updates in two hours, its networks clearly caught in the same instability cascade as TIC.&lt;/p&gt;
&lt;p&gt;At approximately 10:40 UTC, ITCO effectively went silent.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Time (UTC)&lt;/th&gt;
 &lt;th style="text-align: right"&gt;ITCO Events&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Unique Prefixes&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;244,728&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,173&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:05&lt;/td&gt;
 &lt;td style="text-align: right"&gt;275,719&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,936&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:10&lt;/td&gt;
 &lt;td style="text-align: right"&gt;241,587&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,166&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:15&lt;/td&gt;
 &lt;td style="text-align: right"&gt;80,291&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,235&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:20&lt;/td&gt;
 &lt;td style="text-align: right"&gt;58,781&lt;/td&gt;
 &lt;td style="text-align: right"&gt;580&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:25&lt;/td&gt;
 &lt;td style="text-align: right"&gt;208,871&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,171&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:30&lt;/td&gt;
 &lt;td style="text-align: right"&gt;67,642&lt;/td&gt;
 &lt;td style="text-align: right"&gt;533&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:35&lt;/td&gt;
 &lt;td style="text-align: right"&gt;309,832&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,140&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:40&lt;/td&gt;
 &lt;td style="text-align: right"&gt;331,232&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,183&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:45&lt;/td&gt;
 &lt;td style="text-align: right"&gt;194,015&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,145&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:50&lt;/td&gt;
 &lt;td style="text-align: right"&gt;839&lt;/td&gt;
 &lt;td style="text-align: right"&gt;225&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;09:55&lt;/td&gt;
 &lt;td style="text-align: right"&gt;43,763&lt;/td&gt;
 &lt;td style="text-align: right"&gt;325&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;262,198&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,360&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:05&lt;/td&gt;
 &lt;td style="text-align: right"&gt;930&lt;/td&gt;
 &lt;td style="text-align: right"&gt;52&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:10&lt;/td&gt;
 &lt;td style="text-align: right"&gt;873&lt;/td&gt;
 &lt;td style="text-align: right"&gt;306&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:15&lt;/td&gt;
 &lt;td style="text-align: right"&gt;3,639&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,924&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:20&lt;/td&gt;
 &lt;td style="text-align: right"&gt;70,063&lt;/td&gt;
 &lt;td style="text-align: right"&gt;947&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:25&lt;/td&gt;
 &lt;td style="text-align: right"&gt;303,279&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,136&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;&lt;strong&gt;10:30&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;4,638&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;1,168&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;&lt;strong&gt;10:35&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;971&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;252&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;&lt;strong&gt;10:40&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;8&lt;/strong&gt;&lt;/td&gt;
 &lt;td style="text-align: right"&gt;&lt;strong&gt;4&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:45&lt;/td&gt;
 &lt;td style="text-align: right"&gt;850&lt;/td&gt;
 &lt;td style="text-align: right"&gt;94&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:50&lt;/td&gt;
 &lt;td style="text-align: right"&gt;132&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10:55&lt;/td&gt;
 &lt;td style="text-align: right"&gt;41&lt;/td&gt;
 &lt;td style="text-align: right"&gt;4&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;11:00&lt;/td&gt;
 &lt;td style="text-align: right"&gt;153&lt;/td&gt;
 &lt;td style="text-align: right"&gt;4&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The transition is dramatic. At 10:35, ITCO was still generating 971 events across 252 prefixes. Five minutes later, it produced 8 events across 4 prefixes. By 11:00 UTC, it was generating single-digit events per five-minute window.&lt;/p&gt;
&lt;p&gt;The RIB table snapshots confirm this was not temporary. At midnight UTC, ITCO was visible in routes to 1,975 unique prefixes. By the 16:00 UTC RIB snapshot, that number had dropped to 787, a 60% reduction. It never recovered during the observation window. The March 1 midnight snapshot still showed 787 prefixes.&lt;/p&gt;
&lt;p&gt;This did not happen through explicit BGP withdrawals. Remember, zero withdrawals were observed across the entire dataset. Instead, ITCO&amp;rsquo;s routes simply aged out of the global routing table as neighboring routers stopped hearing announcements for those prefixes. When a BGP speaker stops sending keepalive messages or route refreshes for a prefix, its peers will eventually remove that route from their RIB after the hold timer expires (typically 90 seconds by default, though many operators configure longer timers). The route disappears, but no withdrawal message is ever generated by the originating AS.&lt;/p&gt;
&lt;p&gt;This is a different kind of silence than the HTTP requests flatline. The application-layer throttle at 08:00 UTC was a deliberate policy action, a filter applied while keeping the routing infrastructure intact. ITCO&amp;rsquo;s disappearance at 10:40 UTC looks more like infrastructure failure, whether from physical damage to network equipment, power loss at critical facilities, or a deliberate decision to take ITCO&amp;rsquo;s international links offline.&lt;/p&gt;
&lt;p&gt;AS6736, the academic gateway operated by the Institute for Research in Fundamental Sciences, barely registered on any of this. Its BGP activity remained flat throughout the entire 30-hour period, generating between 21 and 190 unique prefix updates per hour regardless of what was happening around it. The RIB snapshots show it lost only 4 of its 192 prefixes.&lt;/p&gt;
&lt;p&gt;This makes sense given IPM&amp;rsquo;s role. It primarily serves academic and research institutions, not commercial ISPs. Its traffic volume and prefix count are tiny compared to TIC or ITCO. Whatever filtering or instability was affecting the commercial gateways either spared IPM or was irrelevant to its much smaller footprint.&lt;/p&gt;
&lt;p&gt;Across all three gateways, the overall picture is one of contraction. The RIB table at rrc00 showed 8,689 unique Iranian prefixes at midnight UTC on February 28. By 16:00 UTC that same day, that number had fallen to 7,526. A total of 1,169 prefixes disappeared from the global routing table.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;RIB Snapshot&lt;/th&gt;
 &lt;th style="text-align: right"&gt;Unique Prefixes&lt;/th&gt;
 &lt;th style="text-align: right"&gt;TIC Prefixes&lt;/th&gt;
 &lt;th style="text-align: right"&gt;ITCO Prefixes&lt;/th&gt;
 &lt;th style="text-align: right"&gt;IPM Prefixes&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Feb 28, 00:00 UTC&lt;/td&gt;
 &lt;td style="text-align: right"&gt;8,689&lt;/td&gt;
 &lt;td style="text-align: right"&gt;8,529&lt;/td&gt;
 &lt;td style="text-align: right"&gt;1,975&lt;/td&gt;
 &lt;td style="text-align: right"&gt;192&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Feb 28, 08:00 UTC&lt;/td&gt;
 &lt;td style="text-align: right"&gt;8,629&lt;/td&gt;
 &lt;td style="text-align: right"&gt;—&lt;/td&gt;
 &lt;td style="text-align: right"&gt;—&lt;/td&gt;
 &lt;td style="text-align: right"&gt;—&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Feb 28, 16:00 UTC&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,526&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,373&lt;/td&gt;
 &lt;td style="text-align: right"&gt;787&lt;/td&gt;
 &lt;td style="text-align: right"&gt;188&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;Mar 1, 00:00 UTC&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,526&lt;/td&gt;
 &lt;td style="text-align: right"&gt;7,373&lt;/td&gt;
 &lt;td style="text-align: right"&gt;787&lt;/td&gt;
 &lt;td style="text-align: right"&gt;188&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;None of those 1,169 prefixes returned by the March 1 midnight snapshot. The routing table contracted and stayed contracted. For the networks behind those prefixes, this represents a complete loss of global reachability, not because someone sent a withdrawal message, but because the routers that were announcing those routes stopped talking.&lt;/p&gt;
&lt;p&gt;The BGP data from those 30 hours reveals a layered sequence. The air strikes began at 06:15 UTC. The Iranian government&amp;rsquo;s response came roughly two hours later at 08:00 UTC: application-layer filtering that killed HTTP traffic while leaving the routing infrastructure untouched. This is consistent with the regime&amp;rsquo;s established practice of throttling internet access during crises, likely triggered here by the need to control information flow once strikes were underway.&lt;/p&gt;
&lt;p&gt;Then came the uncontrolled variable. An hour after the throttle, Iranian networks experienced a massive instability event that generated millions of BGP updates, caused widespread path prepending, and ultimately led to the partial disappearance of ITCO as a functioning international gateway. Whether this instability was caused by physical damage to networking infrastructure, power disruptions at critical facilities, or a deliberate decision to consolidate traffic through TIC alone is impossible to determine from BGP data alone.&lt;/p&gt;
&lt;p&gt;What the data does make clear is the distinction between these two events. The throttle didn&amp;rsquo;t specifically show up in BGP data. However, the infrastructure failure was recorded across millions of events. And the routing table shows us what remained: 1,169 prefixes that went dark and hadn&amp;rsquo;t come back 24 hours later.&lt;/p&gt;
&lt;p&gt;For a country whose entire internet architecture depends on two commercial gateways and one academic link, losing 60% of one gateway&amp;rsquo;s routing capacity in the span of ten minutes is significant. Iran&amp;rsquo;s &lt;a href="https://rb.ax/blog/2026/anatomy-of-irans-internet/"&gt;centralized internet design&lt;/a&gt; gives the government the ability to control information flow during a crisis. It also means that when that infrastructure is damaged, there is no redundancy to absorb the loss.&lt;/p&gt;
&lt;h3 id="replication"&gt;&lt;a href="#replication"&gt;Replication&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;The data used in this analysis is publicly available from RIPE RIS. RIPE NCC archives all BGP update and RIB table dumps at &lt;a href="https://data.ris.ripe.net/"&gt;data.ris.ripe.net&lt;/a&gt;. The files follow a predictable naming convention: &lt;code&gt;updates.YYYYMMDD.HHMM.gz&lt;/code&gt; for five-minute update intervals and &lt;code&gt;bview.YYYYMMDD.HHMM.gz&lt;/code&gt; for periodic RIB snapshots.&lt;/p&gt;
&lt;p&gt;I used the &lt;a href="https://bgpkit.com/"&gt;BGPKIT&lt;/a&gt; parser library for Python (&lt;code&gt;pybgpkit&lt;/code&gt;) to read the MRT files. Each BGP update element exposes the timestamp, prefix, AS path, origin ASN, element type (announcement or withdrawal), and other attributes. The core of the analysis is a filter: for every update element, check whether AS49666, AS12880, or AS6736 appears anywhere in the AS path.&lt;/p&gt;
&lt;p&gt;Here is the script that extracts all Iranian gateway-related events from the update files:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-python" data-lang="python"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;import&lt;/span&gt; pybgpkit_parser
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;import&lt;/span&gt; os
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;import&lt;/span&gt; json
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;IRAN_GATEWAY_ASNS &lt;span style="color:#f92672"&gt;=&lt;/span&gt; {&lt;span style="color:#ae81ff"&gt;49666&lt;/span&gt;, &lt;span style="color:#ae81ff"&gt;12880&lt;/span&gt;, &lt;span style="color:#ae81ff"&gt;6736&lt;/span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;DATA_DIR &lt;span style="color:#f92672"&gt;=&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;/path/to/ris-data&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;results &lt;span style="color:#f92672"&gt;=&lt;/span&gt; []
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; rrc &lt;span style="color:#f92672"&gt;in&lt;/span&gt; [&lt;span style="color:#e6db74"&gt;&amp;#34;rrc00&amp;#34;&lt;/span&gt;, &lt;span style="color:#e6db74"&gt;&amp;#34;rrc13&amp;#34;&lt;/span&gt;, &lt;span style="color:#e6db74"&gt;&amp;#34;rrc26&amp;#34;&lt;/span&gt;]:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; rrc_dir &lt;span style="color:#f92672"&gt;=&lt;/span&gt; os&lt;span style="color:#f92672"&gt;.&lt;/span&gt;path&lt;span style="color:#f92672"&gt;.&lt;/span&gt;join(DATA_DIR, rrc)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; files &lt;span style="color:#f92672"&gt;=&lt;/span&gt; sorted([f &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; f &lt;span style="color:#f92672"&gt;in&lt;/span&gt; os&lt;span style="color:#f92672"&gt;.&lt;/span&gt;listdir(rrc_dir) &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; f&lt;span style="color:#f92672"&gt;.&lt;/span&gt;startswith(&lt;span style="color:#e6db74"&gt;&amp;#34;updates.&amp;#34;&lt;/span&gt;)])
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; fname &lt;span style="color:#f92672"&gt;in&lt;/span&gt; files:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; fpath &lt;span style="color:#f92672"&gt;=&lt;/span&gt; os&lt;span style="color:#f92672"&gt;.&lt;/span&gt;path&lt;span style="color:#f92672"&gt;.&lt;/span&gt;join(rrc_dir, fname)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; parser &lt;span style="color:#f92672"&gt;=&lt;/span&gt; pybgpkit_parser&lt;span style="color:#f92672"&gt;.&lt;/span&gt;Parser(fpath)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; elem &lt;span style="color:#f92672"&gt;in&lt;/span&gt; parser:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; as_path_str &lt;span style="color:#f92672"&gt;=&lt;/span&gt; elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;as_path &lt;span style="color:#f92672"&gt;or&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; as_path_list &lt;span style="color:#f92672"&gt;=&lt;/span&gt; [int(x) &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; x &lt;span style="color:#f92672"&gt;in&lt;/span&gt; as_path_str&lt;span style="color:#f92672"&gt;.&lt;/span&gt;split() &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; x&lt;span style="color:#f92672"&gt;.&lt;/span&gt;isdigit()]
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; IRAN_GATEWAY_ASNS&lt;span style="color:#f92672"&gt;.&lt;/span&gt;intersection(set(as_path_list)):
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; results&lt;span style="color:#f92672"&gt;.&lt;/span&gt;append({
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;rrc&amp;#34;&lt;/span&gt;: rrc,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;timestamp&amp;#34;&lt;/span&gt;: elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;timestamp,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;type&amp;#34;&lt;/span&gt;: elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;elem_type,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;prefix&amp;#34;&lt;/span&gt;: elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;prefix,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;as_path&amp;#34;&lt;/span&gt;: as_path_str,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;peer_asn&amp;#34;&lt;/span&gt;: elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;peer_asn,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;origin_asns&amp;#34;&lt;/span&gt;: str(elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;origin_asns),
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; })
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;with&lt;/span&gt; open(&lt;span style="color:#e6db74"&gt;&amp;#34;iran_bgp_events.json&amp;#34;&lt;/span&gt;, &lt;span style="color:#e6db74"&gt;&amp;#34;w&amp;#34;&lt;/span&gt;) &lt;span style="color:#66d9ef"&gt;as&lt;/span&gt; f:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; json&lt;span style="color:#f92672"&gt;.&lt;/span&gt;dump(results, f)
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;This script produces the hourly event table shown above:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-python" data-lang="python"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;import&lt;/span&gt; json
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;from&lt;/span&gt; datetime &lt;span style="color:#f92672"&gt;import&lt;/span&gt; datetime, timezone
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;from&lt;/span&gt; collections &lt;span style="color:#f92672"&gt;import&lt;/span&gt; defaultdict
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;with&lt;/span&gt; open(&lt;span style="color:#e6db74"&gt;&amp;#34;iran_bgp_events.json&amp;#34;&lt;/span&gt;) &lt;span style="color:#66d9ef"&gt;as&lt;/span&gt; f:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; events &lt;span style="color:#f92672"&gt;=&lt;/span&gt; json&lt;span style="color:#f92672"&gt;.&lt;/span&gt;load(f)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;hourly_announce &lt;span style="color:#f92672"&gt;=&lt;/span&gt; defaultdict(int)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;hourly_withdraw &lt;span style="color:#f92672"&gt;=&lt;/span&gt; defaultdict(int)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;hourly_pfx &lt;span style="color:#f92672"&gt;=&lt;/span&gt; defaultdict(set)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;gateway_hourly_pfx &lt;span style="color:#f92672"&gt;=&lt;/span&gt; {&lt;span style="color:#ae81ff"&gt;49666&lt;/span&gt;: defaultdict(set), &lt;span style="color:#ae81ff"&gt;12880&lt;/span&gt;: defaultdict(set), &lt;span style="color:#ae81ff"&gt;6736&lt;/span&gt;: defaultdict(set)}
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; e &lt;span style="color:#f92672"&gt;in&lt;/span&gt; events:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; dt &lt;span style="color:#f92672"&gt;=&lt;/span&gt; datetime&lt;span style="color:#f92672"&gt;.&lt;/span&gt;fromtimestamp(e[&lt;span style="color:#e6db74"&gt;&amp;#34;timestamp&amp;#34;&lt;/span&gt;], tz&lt;span style="color:#f92672"&gt;=&lt;/span&gt;timezone&lt;span style="color:#f92672"&gt;.&lt;/span&gt;utc)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; hour_key &lt;span style="color:#f92672"&gt;=&lt;/span&gt; dt&lt;span style="color:#f92672"&gt;.&lt;/span&gt;strftime(&lt;span style="color:#e6db74"&gt;&amp;#34;%m-&lt;/span&gt;&lt;span style="color:#e6db74"&gt;%d&lt;/span&gt;&lt;span style="color:#e6db74"&gt; %H:00&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; e[&lt;span style="color:#e6db74"&gt;&amp;#34;type&amp;#34;&lt;/span&gt;] &lt;span style="color:#f92672"&gt;==&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;A&amp;#34;&lt;/span&gt;:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; hourly_announce[hour_key] &lt;span style="color:#f92672"&gt;+=&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;else&lt;/span&gt;:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; hourly_withdraw[hour_key] &lt;span style="color:#f92672"&gt;+=&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; hourly_pfx[hour_key]&lt;span style="color:#f92672"&gt;.&lt;/span&gt;add(e[&lt;span style="color:#e6db74"&gt;&amp;#34;prefix&amp;#34;&lt;/span&gt;])
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; as_path_list &lt;span style="color:#f92672"&gt;=&lt;/span&gt; [int(x) &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; x &lt;span style="color:#f92672"&gt;in&lt;/span&gt; e[&lt;span style="color:#e6db74"&gt;&amp;#34;as_path&amp;#34;&lt;/span&gt;]&lt;span style="color:#f92672"&gt;.&lt;/span&gt;split() &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; x&lt;span style="color:#f92672"&gt;.&lt;/span&gt;isdigit()] &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; e[&lt;span style="color:#e6db74"&gt;&amp;#34;as_path&amp;#34;&lt;/span&gt;] &lt;span style="color:#66d9ef"&gt;else&lt;/span&gt; []
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; gw &lt;span style="color:#f92672"&gt;in&lt;/span&gt; [&lt;span style="color:#ae81ff"&gt;49666&lt;/span&gt;, &lt;span style="color:#ae81ff"&gt;12880&lt;/span&gt;, &lt;span style="color:#ae81ff"&gt;6736&lt;/span&gt;]:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; gw &lt;span style="color:#f92672"&gt;in&lt;/span&gt; as_path_list:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; gateway_hourly_pfx[gw][hour_key]&lt;span style="color:#f92672"&gt;.&lt;/span&gt;add(e[&lt;span style="color:#e6db74"&gt;&amp;#34;prefix&amp;#34;&lt;/span&gt;])
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; h &lt;span style="color:#f92672"&gt;in&lt;/span&gt; sorted(hourly_announce&lt;span style="color:#f92672"&gt;.&lt;/span&gt;keys()):
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; print(
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; h,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; hourly_announce[h],
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; hourly_withdraw&lt;span style="color:#f92672"&gt;.&lt;/span&gt;get(h, &lt;span style="color:#ae81ff"&gt;0&lt;/span&gt;),
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; len(hourly_pfx[h]),
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; len(gateway_hourly_pfx[&lt;span style="color:#ae81ff"&gt;49666&lt;/span&gt;][h]),
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; len(gateway_hourly_pfx[&lt;span style="color:#ae81ff"&gt;12880&lt;/span&gt;][h]),
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; len(gateway_hourly_pfx[&lt;span style="color:#ae81ff"&gt;6736&lt;/span&gt;][h]),
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; )
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The RIB table comparison, which reveals the 1,169 lost prefixes, parses the &lt;code&gt;bview&lt;/code&gt; files the same way and compares prefix sets across snapshots:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-python" data-lang="python"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#f92672"&gt;import&lt;/span&gt; pybgpkit_parser
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#66d9ef"&gt;def&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;get_rib_prefixes&lt;/span&gt;(bview_path):
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; parser &lt;span style="color:#f92672"&gt;=&lt;/span&gt; pybgpkit_parser&lt;span style="color:#f92672"&gt;.&lt;/span&gt;Parser(bview_path)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; prefixes &lt;span style="color:#f92672"&gt;=&lt;/span&gt; set()
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; elem &lt;span style="color:#f92672"&gt;in&lt;/span&gt; parser:
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; as_path_list &lt;span style="color:#f92672"&gt;=&lt;/span&gt; [int(x) &lt;span style="color:#66d9ef"&gt;for&lt;/span&gt; x &lt;span style="color:#f92672"&gt;in&lt;/span&gt; elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;as_path&lt;span style="color:#f92672"&gt;.&lt;/span&gt;split() &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; x&lt;span style="color:#f92672"&gt;.&lt;/span&gt;isdigit()] &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;as_path &lt;span style="color:#66d9ef"&gt;else&lt;/span&gt; []
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;if&lt;/span&gt; {&lt;span style="color:#ae81ff"&gt;49666&lt;/span&gt;, &lt;span style="color:#ae81ff"&gt;12880&lt;/span&gt;, &lt;span style="color:#ae81ff"&gt;6736&lt;/span&gt;}&lt;span style="color:#f92672"&gt;.&lt;/span&gt;intersection(set(as_path_list)):
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; prefixes&lt;span style="color:#f92672"&gt;.&lt;/span&gt;add(elem&lt;span style="color:#f92672"&gt;.&lt;/span&gt;prefix)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;return&lt;/span&gt; prefixes
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;pre &lt;span style="color:#f92672"&gt;=&lt;/span&gt; get_rib_prefixes(&lt;span style="color:#e6db74"&gt;&amp;#34;rrc00/bview.20260228.0000.gz&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;post &lt;span style="color:#f92672"&gt;=&lt;/span&gt; get_rib_prefixes(&lt;span style="color:#e6db74"&gt;&amp;#34;rrc00/bview.20260228.1600.gz&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;lost &lt;span style="color:#f92672"&gt;=&lt;/span&gt; pre &lt;span style="color:#f92672"&gt;-&lt;/span&gt; post
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;print(&lt;span style="color:#e6db74"&gt;f&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;Prefixes before: &lt;/span&gt;&lt;span style="color:#e6db74"&gt;{&lt;/span&gt;len(pre)&lt;span style="color:#e6db74"&gt;}&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;print(&lt;span style="color:#e6db74"&gt;f&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;Prefixes after: &lt;/span&gt;&lt;span style="color:#e6db74"&gt;{&lt;/span&gt;len(post)&lt;span style="color:#e6db74"&gt;}&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;print(&lt;span style="color:#e6db74"&gt;f&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;Lost: &lt;/span&gt;&lt;span style="color:#e6db74"&gt;{&lt;/span&gt;len(lost)&lt;span style="color:#e6db74"&gt;}&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;BGP data was sourced from RIPE RIS route collectors rrc00 (Amsterdam, Netherlands), rrc13 (Moscow, Russia), and rrc26 (Dubai, UAE). Update files and RIB table dumps were parsed using the BGPKIT parser library. The analysis filtered for all BGP update messages where AS49666, AS12880, or AS6736 appeared anywhere in the AS path, capturing both direct announcements from these gateways and updates from their downstream networks. All timestamps are in UTC.&lt;/p&gt;</description></item><item><title>Street Photography at Sundance Film Festival 2026</title><link>https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/</link><pubDate>Mon, 02 Mar 2026 18:00:00 -0700</pubDate><guid>https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/</guid><description>&lt;p&gt;&lt;figure aria-label="A woman in a fur-hooded coat and sunglasses stands among a group on a crowded sidewalk, framed tightly between fur coats."&gt;
 &lt;img
 alt="A woman in a fur-hooded coat and sunglasses stands among a group on a crowded sidewalk, framed tightly between fur coats."
 title="A woman in a fur-hooded coat and sunglasses stands among a group on a crowded sidewalk, framed tightly between fur coats."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_889dedf26bd3e1f2.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_8ac96becf5a187d5.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_159961cb88a15406.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_e508d9ae67c967a8.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_98f5f72cc4088b5c.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_5eee74f70823cf8.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001520-featured_hu_af7dabdad7d0cb07.jpg"loading="eager"
 decoding="sync"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Western mob wife appears to have been the overarching clothing aesthetic at the last Sundance Film Festival in the state of Utah. Luckily for me, the look didn&amp;rsquo;t reflect the demeanor and most people were excited to get paparazzi&amp;rsquo;d on Park City&amp;rsquo;s Main Street. There was a lot of nervous laughter and reverse cat calling during my time roaming the streets.&lt;/p&gt;
&lt;p&gt;Although I have lived near Salt Lake City for some time it never crossed my mind to attend the festival. It was always this impenetrable force of chaos that snarled Park City for several weeks in January. But I decided to change that this year, mostly because it will be moving to Colorado in 2027 and I wanted the chance to be able to say, &amp;ldquo;yeah, I&amp;rsquo;ve been to Sundance.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;Besides pacing Main Street, I saw two films. The first was Rafael Manuel&amp;rsquo;s politically brilliant &lt;a href="https://festival.sundance.org/program/film/6932f9ec1a5535e50d91ac8a"&gt;Filipiñana&lt;/a&gt;. It follows a day in the life of a tee girl at an opulent country club. The country club is essentially a placeholder for the richness of the Philippines as a nation being reserved for the rich and powerful. With that comes a vivid and horrifying display of social power structures. Many of these social critiques from Mr. Manuel hit rather close to home since there are many Filipinos in my life that understand this dynamic all too well.&lt;/p&gt;
&lt;p&gt;The second film I saw was Kogonada&amp;rsquo;s &lt;a href="https://festival.sundance.org/program/film/6932f9e3bd8651f76060f746"&gt;zi&lt;/a&gt;, which was quite a bit more abstract and surreal. We follow a young woman walking through Hong Kong in a perpetual search for herself. And I mean that literally. The Sundance Film Festival&amp;rsquo;s synopsis for this movie was, &amp;ldquo;somewhere between sci-fi and supernatural,&amp;rdquo; which is the only helpful description you&amp;rsquo;ll get prior to watching it. The film does evoke a variety of emotions that are too dense for my caveman sensibilities.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A woman in a spotted fur hat and cream fur coat walks down Main Street carrying a designer bag, festival crowds behind her."&gt;
 &lt;img
 alt="A woman in a spotted fur hat and cream fur coat walks down Main Street carrying a designer bag, festival crowds behind her."
 title="A woman in a spotted fur hat and cream fur coat walks down Main Street carrying a designer bag, festival crowds behind her."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_7d7534012efe37b6.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_cf69599acbcb6f5a.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_d3d72db095bd75bc.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_8f0a7e3fb0f57302.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_d0466d616ff813e4.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_c41e36372175a382.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001481_hu_80547bc6787de578.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two women in cowboy hats and fur coats face each other mid-conversation on a crowded Main Street."&gt;
 &lt;img
 alt="Two women in cowboy hats and fur coats face each other mid-conversation on a crowded Main Street."
 title="Two women in cowboy hats and fur coats face each other mid-conversation on a crowded Main Street."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_56187a914e6d2e1d.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_5d0d0ade8afa95a6.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_1fe59e90b5d23c5c.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_84d36e19421db9c7.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_d035874a24776b23.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_47f2eae7271c4778.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001482_hu_b13d811e6662ca82.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Three women in fur coats, wide-brimmed hats, and sunglasses stride down Main Street past a Chase Sapphire Reserve sign."&gt;
 &lt;img
 alt="Three women in fur coats, wide-brimmed hats, and sunglasses stride down Main Street past a Chase Sapphire Reserve sign."
 title="Three women in fur coats, wide-brimmed hats, and sunglasses stride down Main Street past a Chase Sapphire Reserve sign."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_e3acb3666d5d49a3.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_eaabc0cd58c0d1ab.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_1e9f72a32db9777e.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_bef211f0da211da5.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_841f5f206c79a514.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_ebfd9eb5373a06ac.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001490_hu_e84e17b9d6cb98f0.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A cluster of festivalgoers in conversation on Main Street, phones and selfie sticks in hand."&gt;
 &lt;img
 alt="A cluster of festivalgoers in conversation on Main Street, phones and selfie sticks in hand."
 title="A cluster of festivalgoers in conversation on Main Street, phones and selfie sticks in hand."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_e5f3a3c95a8f5dcc.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_e96ec9c2ca54ed0e.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_4f32340a0f7e2990.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_981366e73f2ed23a.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_4a999fb5ac4dc20.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_f2b153ec4f845b28.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001499_hu_517635905f3deac7.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two women in fur coats walk down Main Street in bright afternoon light, a figure in a red onesie visible behind them."&gt;
 &lt;img
 alt="Two women in fur coats walk down Main Street in bright afternoon light, a figure in a red onesie visible behind them."
 title="Two women in fur coats walk down Main Street in bright afternoon light, a figure in a red onesie visible behind them."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_15c0fbfe5895a922.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_3b98df996da4bf67.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_67f07df7d33e5cdc.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_7388ad82a0c61efe.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_edc724a670a52ce2.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_544628ad1a22bb10.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001503_hu_f1db9502f6ba9dd.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two men in matching maroon onesies pose for the camera on Main Street, one flashing a peace sign."&gt;
 &lt;img
 alt="Two men in matching maroon onesies pose for the camera on Main Street, one flashing a peace sign."
 title="Two men in matching maroon onesies pose for the camera on Main Street, one flashing a peace sign."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_a59dbb0cdbd5cc6c.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_636a45a95d836413.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_616b6b1cc8c3a91.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_229e532898d658f2.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_f2e4661b258a5a74.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_2640dfcbec4dfe8d.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001504_hu_733812d772ae7975.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two women in fur-trimmed hats and coats carry shopping bags outside a storefront on Main Street."&gt;
 &lt;img
 alt="Two women in fur-trimmed hats and coats carry shopping bags outside a storefront on Main Street."
 title="Two women in fur-trimmed hats and coats carry shopping bags outside a storefront on Main Street."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_d10efc402a5888e.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_99c8057990e2d0b7.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_69c32c61d601d299.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_c1cf3dc7ed72607f.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_106264888ed89f04.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_fb16a67fde85efe7.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001507_hu_9dfb934f15eafbca.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two people laughing outside the Sunglass Hut, one in a leopard print coat with orange-tinted sunglasses and the other in a fur hat and brown fur coat."&gt;
 &lt;img
 alt="Two people laughing outside the Sunglass Hut, one in a leopard print coat with orange-tinted sunglasses and the other in a fur hat and brown fur coat."
 title="Two people laughing outside the Sunglass Hut, one in a leopard print coat with orange-tinted sunglasses and the other in a fur hat and brown fur coat."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_e4efc0af25bc8e21.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_3432ad68fc166bdb.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_83934342e0e1eb18.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_87e496fb012e00ef.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_d6e8cc81d4e49829.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_6d0ec9759c983010.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001510_hu_82d1bd293ebd41a4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A couple walks past a parked van on Main Street, she in a lavender fur coat and knit beanie, he in a camel overcoat carrying a small dog."&gt;
 &lt;img
 alt="A couple walks past a parked van on Main Street, she in a lavender fur coat and knit beanie, he in a camel overcoat carrying a small dog."
 title="A couple walks past a parked van on Main Street, she in a lavender fur coat and knit beanie, he in a camel overcoat carrying a small dog."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_1bc8d42e60a3d1a1.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_12e429af6fc4111f.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_ab1ee5518b36d582.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_297065b7b4c1a733.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_420256d88f925102.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_4fb6ed05267f70b1.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001513_hu_c3117867582793f3.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two men outside the Arc&amp;rsquo;teryx store on Main Street, one in a hot pink ski jacket holding a drink, the other in a houndstooth blazer and grey beanie."&gt;
 &lt;img
 alt="Two men outside the Arc&amp;rsquo;teryx store on Main Street, one in a hot pink ski jacket holding a drink, the other in a houndstooth blazer and grey beanie."
 title="Two men outside the Arc&amp;rsquo;teryx store on Main Street, one in a hot pink ski jacket holding a drink, the other in a houndstooth blazer and grey beanie."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_3fbf98e3082ba075.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_c8241c44ea1f4ac1.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_4add771231aeab44.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_feeebf0f23465f7.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_980aa27782b68c96.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_c47e5fbf449e9e46.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001515_hu_246b0512bfe521ba.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two women walking past storefronts at dusk, one smiling in a black jacket with a pink scarf, the other in a dark fur coat. An Audible sign glows in the background."&gt;
 &lt;img
 alt="Two women walking past storefronts at dusk, one smiling in a black jacket with a pink scarf, the other in a dark fur coat. An Audible sign glows in the background."
 title="Two women walking past storefronts at dusk, one smiling in a black jacket with a pink scarf, the other in a dark fur coat. An Audible sign glows in the background."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_1aa9564fff2053f9.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_4d9baafc5a982938.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_dd81182cc38b1afb.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_bf4c3bb1d1f2d7a7.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_d877ba2901444463.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_27a864cc117944ff.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001516_hu_f4171177fd2df5f4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two women standing on Main Street at golden hour, one in a royal blue coat with red lipstick, the other in a cream fur coat and black gloves."&gt;
 &lt;img
 alt="Two women standing on Main Street at golden hour, one in a royal blue coat with red lipstick, the other in a cream fur coat and black gloves."
 title="Two women standing on Main Street at golden hour, one in a royal blue coat with red lipstick, the other in a cream fur coat and black gloves."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_506eb78862bae20b.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_e13a6e4168fc25a.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_fea8f382f7b69bc4.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_f7a77f4679040072.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_efda3a902abf99df.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_f07c75420974cbb7.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001518_hu_387cb3581ff07ae3.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A woman in a green overcoat and blue beanie walks alongside a man in an oversized orange Detroit Red Wings jacket and blue sunglasses."&gt;
 &lt;img
 alt="A woman in a green overcoat and blue beanie walks alongside a man in an oversized orange Detroit Red Wings jacket and blue sunglasses."
 title="A woman in a green overcoat and blue beanie walks alongside a man in an oversized orange Detroit Red Wings jacket and blue sunglasses."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_ecf862ba7fe8082a.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_d3b6c6f75812124e.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_251ef22411a5d5bf.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_17629b5adae8f6f5.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_2d336f6c602a18cb.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_c7c2642331410c21.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001519_hu_9f807abfebeb0213.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A group of four people standing together on Main Street in winter coats and sunglasses, the afternoon light catching them from the side."&gt;
 &lt;img
 alt="A group of four people standing together on Main Street in winter coats and sunglasses, the afternoon light catching them from the side."
 title="A group of four people standing together on Main Street in winter coats and sunglasses, the afternoon light catching them from the side."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_ee7929f4246a2551.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_e677308a5715351e.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_e59a6b4adffb0dde.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_5cadf41f252f25c1.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_9088325a0341e2a4.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_2928f84b39928234.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001521_hu_efcaabbe1f0bcd33.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two men in fur and suede coats with orange-tinted sunglasses walk confidently down Main Street, the snowy mountains visible in the distance."&gt;
 &lt;img
 alt="Two men in fur and suede coats with orange-tinted sunglasses walk confidently down Main Street, the snowy mountains visible in the distance."
 title="Two men in fur and suede coats with orange-tinted sunglasses walk confidently down Main Street, the snowy mountains visible in the distance."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_73f33fd9ddbee30d.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_1fd2d3a2838cdeb9.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_97536162a034684c.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_6d170f1b99ddbaab.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_bd02bea2e21b871b.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_a9d7ae1621b81f58.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001523_hu_ff20e1e92145040.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Three women pose together on Main Street at dusk, wearing fur coats and sunglasses, the festival crowd flowing behind them."&gt;
 &lt;img
 alt="Three women pose together on Main Street at dusk, wearing fur coats and sunglasses, the festival crowd flowing behind them."
 title="Three women pose together on Main Street at dusk, wearing fur coats and sunglasses, the festival crowd flowing behind them."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_ad1c12190d9471ed.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_849247f94c66f518.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_a7563a227082f487.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_b1ec053ca79a03fb.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_13ab497df844890f.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_a681eaf927708d4.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001526_hu_b4875b944a6acadf.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A woman adjusts her wide-brimmed hat while her friend photographs her with a phone near the Onyx building at blue hour."&gt;
 &lt;img
 alt="A woman adjusts her wide-brimmed hat while her friend photographs her with a phone near the Onyx building at blue hour."
 title="A woman adjusts her wide-brimmed hat while her friend photographs her with a phone near the Onyx building at blue hour."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_86d2ca8880e8b6f8.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_fb715fdd77747d9d.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_3aefeb060058e0ea.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_813b16e78cbb4c1c.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_4b15219cd3522552.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_a547959ef32a431d.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001527_hu_d2690e1c3388dc65.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A woman in a dark fur coat and fur hat walks through a dense crowd on Main Street, someone behind her holding up a phone to film."&gt;
 &lt;img
 alt="A woman in a dark fur coat and fur hat walks through a dense crowd on Main Street, someone behind her holding up a phone to film."
 title="A woman in a dark fur coat and fur hat walks through a dense crowd on Main Street, someone behind her holding up a phone to film."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_3efa3086f48432ad.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_1fcc958327ae7903.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_20f68da08ec5bf6f.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_c69195f14afd2827.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_3ca58d3c80aac13a.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_c6067be1742b7fa8.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001528_hu_f8b8a3eefae04db2.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two women in cowboy hats and fur coats walk past the Patagonia store on Main Street at dusk."&gt;
 &lt;img
 alt="Two women in cowboy hats and fur coats walk past the Patagonia store on Main Street at dusk."
 title="Two women in cowboy hats and fur coats walk past the Patagonia store on Main Street at dusk."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_a57cb51ee34a0052.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_65c49290115bc5df.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_cad4b023d2022bf2.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_c48981466109a22.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_ba150da6dd76d6fd.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_b042e7799277b802.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001531_hu_987a408fd2c4432a.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A couple walks down Main Street at blue hour, she in an oversized yellow quilted coat with a bright green crossbody bag, he in a leather jacket and orange beanie."&gt;
 &lt;img
 alt="A couple walks down Main Street at blue hour, she in an oversized yellow quilted coat with a bright green crossbody bag, he in a leather jacket and orange beanie."
 title="A couple walks down Main Street at blue hour, she in an oversized yellow quilted coat with a bright green crossbody bag, he in a leather jacket and orange beanie."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_7946654e110a6d92.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_412719a2a18343dc.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_a8169a341f23f689.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_12de03bac56f326.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_4113778dec05e3ad.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_7526a4939609cbe9.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001534_hu_b03633ad02ebe75.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A woman in an all-white fur coat and fur hat walks alone down Main Street, phone in hand, the evening crowd blurred behind her."&gt;
 &lt;img
 alt="A woman in an all-white fur coat and fur hat walks alone down Main Street, phone in hand, the evening crowd blurred behind her."
 title="A woman in an all-white fur coat and fur hat walks alone down Main Street, phone in hand, the evening crowd blurred behind her."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_30efb84098765d90.webp 480w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_ac2ad33ae1a0fbd5.webp 768w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_16ce3bfba1ef7646.webp 1024w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_9f51bb682745df73.webp 1366w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_64527cbac5b47ae8.webp 1600w, https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_10d840f014e3905.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-at-sundance-film-festival-2026/2026-01-25_L1001535_hu_1f17adafeeee3c81.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;</description></item><item><title>Anatomy of Iran's Internet</title><link>https://rb.ax/blog/anatomy-of-irans-internet/</link><pubDate>Fri, 30 Jan 2026 10:00:00 -0700</pubDate><guid>https://rb.ax/blog/anatomy-of-irans-internet/</guid><description>&lt;p&gt;I&amp;rsquo;m slightly addicted to reading the news but I often forget about the Gell-Mann amnesia effect. This describes the phenomenon where if you&amp;rsquo;re an expert in a field you can spot lots of errors and problems with news articles in your given field but return to absolute trust once you read another article within a field you know nothing about. The subjects of network infrastructure and border gateway protocol (BGP) are not often closely examined in most newspapers so I&amp;rsquo;m usually in a state of blissful ignorance.&lt;/p&gt;
&lt;p&gt;However, with the recent prolonged shutdown of Iran&amp;rsquo;s internet amid national protests&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; there were repeated descriptions of some sort of national kill switch deployed by the government. This evokes an image of a giant industrial switch in a datacenter that gets dramatically switched once a call is received on the nearby red phone. While this makes for a good headline, it reduces the nuances of modern network infrastructure to a caricature. To be fair to some journalists, such as Mehul Srivastava and Chris Campbell, there exists some reporting that is technically very much on point.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;But does the nuance in this particular case matter? I think it matters quite a bit, mostly because this national strategy is very similar to what has already been deployed in China and Russia, among other internet restricted nations. It threatens the underlying notion of an unrestricted public internet where governments can shape and suppress their citizens access to information and ability to participate in civic dialogue. Awareness of the architecture of your suppression doesn&amp;rsquo;t make you any less suppressed but it certainly presents you with more options than ignorance.&lt;/p&gt;
&lt;h3 id="national-information-network"&gt;&lt;a href="#national-information-network"&gt;National Information Network&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;To explore the details a bit further we have to go back to the formation of Iran&amp;rsquo;s National Information Network (NIN). Understanding Iran’s current internet architecture requires an examination of this network. It establishes the regime&amp;rsquo;s view of the global internet as an adversarial and hostile territory.&lt;/p&gt;
&lt;p&gt;The NIN architectural framework involves two major design points. The first was a sovereign national &lt;em&gt;intranet&lt;/em&gt; that formed an internal network within the confines of Iran. Cut off from the wider international internet, this intranet would offer services and function under the control of state regulations. The second design required a complete and total aggregation of international gateways to entities controlled by the government. Consolidating this connectivity ensures that citizens access only government-approved international content.&lt;/p&gt;
&lt;p&gt;To understand the anatomy of the internet in Iran you have to abandon the Western conception of the World Wide Web as a global commons, public utility, or even the endeavor of a private company. Leaving the task of connecting your citizens across international borders to a variety of private companies is both inefficient and fractious if your primary goal is information control.&lt;/p&gt;
&lt;p&gt;In the pragmatic approach of the Islamic Republic, the internet is viewed primarily as a contested territory and is a domain of conflict where losing the battle of information warfare is a threat to the stability of the state. The system is designed to resolve the authoritarian dilemma of how to harvest the economic benefits of digital connectivity without importing the political risks of the open web.&lt;/p&gt;
&lt;p&gt;The architecture relies on a fundamental bifurcation between the international internet, a heavily filtered bridge to the outside world, and the NIN, a hermetically sealed domestic intranet. This design allows the state to throttle or filter international connections during unrest. Meanwhile, the domestic intranet remains operational for banking, administrative services, and internal propaganda. The NIN is a digital fortress built to keep foreign culture out and to entrap the Iranian population within a controllable digital environment.&lt;/p&gt;
&lt;p&gt;The architectural proposal for the NIN was spoken about in the early 2000s but didn&amp;rsquo;t take off in adoption and implementation until after the protests of the disputed 2009 presidential election.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; During the 2009 Green Movement, where protesters utilized platforms like Twitter, Facebook, and SMS messaging to organize against the disputed re-election of Mahmoud Ahmadinejad, Iranian officials began to see the influence of the international internet as a source of vulnerability&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; for state control. Supreme Leader Ayatollah Ali Khamenei later codified Iran&amp;rsquo;s official view, claiming that Western digital influence was a cultural invasion designed to undermine Iran.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; This led to the reinforcement of the regime&amp;rsquo;s ideology that relying on Western communication infrastructure was an intolerable national security vulnerability, and only further motivated the adoption of the NIN architecture to create a localized internet.&lt;/p&gt;
&lt;p&gt;During the early deployment of the NIN, officials described its purpose in moralistic, benign terms. Building the NIN was about establishing a &amp;ldquo;pure&amp;rdquo; internet that was &amp;ldquo;free from immoral, corrupt, and violent content.&amp;rdquo;&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; In tandem to this pure internet there would also be the international internet, which citizens would still have access. In hindsight this was patently false.&lt;/p&gt;
&lt;p&gt;Another interesting point of the early days of NIN deployment was research done by Collin Anderson and colleagues in Iran were their mapping of the growing intranet inside Iran in late 2012.&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; Much of the address space used by intranet assets were within &lt;a href="https://datatracker.ietf.org/doc/html/rfc1918"&gt;RFC 1918&lt;/a&gt; IP address space. In Mr. Anderson&amp;rsquo;s research he was able to map out several government, telecommunications, and academic assets within the country&amp;rsquo;s internal infrastructure. This does not necessarily prove anything behind the political intentions of the NIN in 2012 but simply shows it was growing rapidly.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Domain&lt;/th&gt;
 &lt;th style="text-align: left"&gt;IP Address&lt;/th&gt;
 &lt;th style="text-align: left"&gt;Ownership&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;lib.atu.ac.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.24.96.14&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Allameh Tabatabaie University&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;mdhc.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.30.5.163&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Vice Presidency for Management Development and Human Capital&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;iranmardom.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.30.5.148&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Vice Presidency for Management Development and Human Capital&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;erp.msrt.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.30.55.29&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Ministry of Science, Research and Technology&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;ou.imamreza.ac.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.56.51.27&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Imam Reza University&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;tehranedu.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.30.95.7&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Tehran Education Organization&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;sanaad.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.30.170.142&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Private Individual&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;ww3.isaco.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.21.201.50&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Iran Khodro Spare Parts &amp;amp; After-sales Services Company&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;iiees.ac.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;192.168.8.9 &lt;br&gt; 169.254.78.139 &lt;br&gt; 194.227.17.14&lt;/td&gt;
 &lt;td style="text-align: left"&gt;International Institute of Earthquake Engineering and Seismology&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;tci-khorasan.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.10.3.2 &lt;br&gt; 217.219.65.5 &lt;br&gt; 10.1.2.0&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Telecommunication Company of Iran, Khorasan&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;adsl.yazdtelecom.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.144.0.14&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Telecommunications Company of Iran, Yazd&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;iranhrc.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;46.36.117.51 &lt;br&gt; 10.30.74.3&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Private Individual&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;acc4.pishgaman.net&lt;/td&gt;
 &lt;td style="text-align: left"&gt;81.12.49.108 &lt;br&gt; 10.8.218.4&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Pishgaman, ADSL Access Provider&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;lib.uma.ac.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.116.2.5&lt;/td&gt;
 &lt;td style="text-align: left"&gt;University of Mohaghegh Ardabili&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;film.medu.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.30.170.110&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Ministry Of Education&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;shirazedc.co.ir&lt;/td&gt;
 &lt;td style="text-align: left"&gt;10.175.28.172&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Shiraz Electric Distribution Company&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;While the initial driver for building the NIN was political censorship it didn&amp;rsquo;t start getting momentum until the presidency of Hassan Rouhani from 2013–2021 due to economic necessity. Paradoxically, the moderate Rouhani administration accelerated the NIN&amp;rsquo;s development more effectively than its hardline predecessors. By investing heavily in local data centers and Internet Exchange Points (IXPs), they improved connection speeds and stability for domestic traffic. To incentivize adoption, Iran mandated a price differentiation policy: bandwidth for domestic NIN traffic is sold at a fifty percent discount compared to international traffic.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; These measures fostered an environment for domestic technology growth that is apparent with the number of applications and services available to Iranians that were intended to be a substitute to their international counterparts.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h3 id="architecture"&gt;&lt;a href="#architecture"&gt;Architecture&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;The physical reality of Iran&amp;rsquo;s internet is defined by extreme centralization. At the apex of this funnel sits the Telecommunication Infrastructure Company (TIC). This state-owned enterprise under the Ministry of Information and Communications Technology (ICT) holds a legal monopoly on all international bandwidth, acting as the sole importer and wholesaler of internet capacity.&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt; No private ISP in Iran, whether it be Shatel, Pars Online, or AsiaTech, can purchase bandwidth directly from a foreign carrier.&lt;sup id="fnref:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; All international bandwidth has to come from the TIC.&lt;/p&gt;
&lt;p&gt;The only other entity at this funnel apex is through a lab at the Insti­tute for Research in Fun­da­mental Sci­ences (IPM) as part of the Ministry of Science, Research, and Technology.&lt;sup id="fnref:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; While this lab has the only other international gateway in the country, it primarily serves academic and research oriented downstream autonomous systems while TIC serves more generalized downstream clients. This consolidated architecture ensures that Iran maintains absolute control at the few international gateways where internet connectivity crosses the national border.&lt;/p&gt;
&lt;p&gt;In 2020 there were some brief exceptions to this centralization rule. There were actually 2 autonomous systems that had their own international gateway connections independent of the TIC.&lt;sup id="fnref:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt; However, both &lt;a href="https://bgp.tools/as/31549#connectivity"&gt;AS31549&lt;/a&gt; and &lt;a href="https://bgp.tools/as/60976#connectivity"&gt;AS60976&lt;/a&gt; have since been repatriated behind a TIC international gateway. The Article 19 organization was unable to determine why this move toward decentralization was occurring at the time. Regardless, it has since been normalized back to the status quo.&lt;/p&gt;
&lt;p&gt;Centralization of Iran&amp;rsquo;s internet can be viewed by anyone in the world with some minor border gateway protocol (BGP) knowledge. This is the mechanism for how the modern internet is stitched together across an impressive amount of separate autonomous systems (AS). The fundamental architecture of the NIN requires all downstream AS to get their upstream internet connectivity through state owned entities. This approximately means that any &lt;a href="https://bgp.tools/rankings/IR?sort=cone"&gt;AS you locate in Iran&lt;/a&gt; will eventually have connectivity through either TIC or IPM before it reaches any portion of the international internet. The so called &lt;em&gt;funnel apex&lt;/em&gt; for the country.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Aria Shatel&amp;rsquo;s upstream connectivity per bgp.tools."&gt;
 &lt;img
 alt="Aria Shatel’s upstream connectivity per bgp.tools."
 title="Aria Shatel&amp;rsquo;s upstream connectivity per bgp.tools."
 width="1920"
 height="1437"srcset="https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_d6f120f4300c2ec8.webp 480w, https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_553334d8654ee6b4.webp 768w, https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_f35b32ab9d763acf.webp 1024w, https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_d5e814db554e9c59.webp 1366w, https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_13e8f518784289f5.webp 1600w, https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_f5a27eda0836777f.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/anatomy-of-irans-internet/AS31549_upstream_hu_e8bd5a6aacebe821.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Aria Shatel&amp;rsquo;s upstream connectivity per &lt;a href="https://bgp.tools/as/31549#connectivity"&gt;bgp.tools&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;If I take the top ten AS located in Iran, as rated by cone size, we can see this centralization in action. For clarification, cone size refers to the amount of downstream AS from a specific AS. This usually approximately indicates the importance and type of network of a particular AS.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;AS&lt;/th&gt;
 &lt;th style="text-align: left"&gt;Name&lt;/th&gt;
 &lt;th style="text-align: left"&gt;Peer Rank&lt;/th&gt;
 &lt;th style="text-align: left"&gt;AS Cone Rank&lt;/th&gt;
 &lt;th style="text-align: left"&gt;Upstream AS&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Telecommunication Infrastructure Company&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#12 (19)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#1 (580)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;External&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS12880&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Iran Information Technology Company PJSC&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#12 (19)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#2 (261)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;External&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS41689&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Asiatech Data Transmission company&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#23 (2)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#3 (259)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS43754&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Asiatech Data Transmission company&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#4 (80)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#4 (258)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS42337&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Respina Networks &amp;amp; Beyond PJSC&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#2 (143)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#5 (224)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS58224&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Iran Telecommunication Company PJS&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#3 (96)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#6 (104)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS49100&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Pishgaman Toseeh Ertebatat Company&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#5 (36)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#7 (65)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS41689&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS25184&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Afranet&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#6 (35)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#8 (56)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS42440&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Rayaneh Danesh Golestan Complex P.J.S. Co.&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#23 (2)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#9 (44)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;AS16322&lt;/td&gt;
 &lt;td style="text-align: left"&gt;Parsan Lin Co. PJS&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#18 (7)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;#10 (42)&lt;/td&gt;
 &lt;td style="text-align: left"&gt;AS49666&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Consolidation through the TIC certainly dominates upstream connectivity for most entities within Iran. It isn&amp;rsquo;t until twelfth place that the Institute for Research in Fundamental Sciences (AS6736) comes into play. Other AS under the same organization umbrella such as AS34837, AS35285, or AS39200 all get their upstream connectivity through the primary AS6736.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Respina Network&amp;rsquo;s upstream connectivity per bgp.tools."&gt;
 &lt;img
 alt="Respina Network’s upstream connectivity per bgp.tools."
 title="Respina Network&amp;rsquo;s upstream connectivity per bgp.tools."
 width="1920"
 height="1308"srcset="https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_e92cfe094bccda14.webp 480w, https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_b6a0c91e7d70ac22.webp 768w, https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_2a6d17047dc67600.webp 1024w, https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_2c5f92b96b43c126.webp 1366w, https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_2b082606d685c509.webp 1600w, https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_4b9f9564b13e7bd8.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/anatomy-of-irans-internet/AS42337_upstream_hu_9f9379a2fcba9572.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Respina Network&amp;rsquo;s upstream connectivity per &lt;a href="https://bgp.tools/as/42337#connectivity"&gt;bgp.tools&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Beyond the international gateways is the realm of the NIN as it serves the internal network of Iran. Much of the intranet architecture resembles normal network designs for cloud applications. Service providers aggregate their user connectivity and funnel it toward IXPs to get the best latency to applications running in the closest datacenters. Hesam Norouz Pour has outlined a simplified typology&lt;sup id="fnref:14"&gt;&lt;a href="#fn:14" class="footnote-ref" role="doc-noteref"&gt;14&lt;/a&gt;&lt;/sup&gt; of NIN:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code class="language-ASCII" data-lang="ASCII"&gt; [Internet]
 |
 v
[International Gateways]
 |
 v
[National Exchange Points]
 |
 v
 [Edge Clouds] &amp;lt;------&amp;gt; [Data Centers / CDNs]
 |
 v
[Aggregation Network]
 |
 v
[Internet Service Provider]
 |
 v
 [End Users]
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;As you can see from the simplified diagram, if Iran ever needed to shut down access to the internet it would not directly impact users ability to connect to domestic services and applications. The theory being that it would be easy to cut off the flow of international propaganda while the domestic life of citizens remained unaffected. However, this proves difficult if the actual information you are trying to stop is between citizens within the country. Group chats, message boards, and unsanctioned news articles can all freely circulate within Iran&amp;rsquo;s intranet without the need for the international internet. The Iranian government&amp;rsquo;s approach to addressing this vulnerability has been evolving along with protestors.&lt;/p&gt;
&lt;p&gt;During the 2009 protests, the government responded simply by blocking a handful of websites and search keywords.&lt;sup id="fnref:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; Things got slightly more advanced during the 2017 protests, however, citizens were able to side step restrictions rather easily with virtual private networks (VPNs). Once protests in 2019 started up the government showed the muscles of consolidation internet connectivity and plunged the country into a week of total internet blackout, including the NIN intranet.&lt;sup id="fnref:16"&gt;&lt;a href="#fn:16" class="footnote-ref" role="doc-noteref"&gt;16&lt;/a&gt;&lt;/sup&gt; Later protests in 2022 and the summer of 2025 met similar fates. Even though approximately 87% of Iranians rely on a subscription-based VPN&lt;sup id="fnref:17"&gt;&lt;a href="#fn:17" class="footnote-ref" role="doc-noteref"&gt;17&lt;/a&gt;&lt;/sup&gt; it becomes rather useless during a total internet blackout.&lt;/p&gt;
&lt;h3 id="starlink"&gt;&lt;a href="#starlink"&gt;Starlink&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;The introduction of Starlink satellite internet into Iran represents a fundamental shift in the struggle between digital activists and the state’s censorship apparatus. While the Iranian government has spent decades constructing a sophisticated domestic intranet to isolate its citizens during crises, the proliferation of Starlink terminals has sidestepped these digital barricades, creating a formidable challenge to state-enforced information blackouts. Imagine a simplified network topology for Iranian users:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code class="language-ASCII" data-lang="ASCII"&gt; [Internet]
 |
 v
[End Users]
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The widespread usage of Starlink in Iran did not happen rapidly. The smuggling of hardware took years of clandestine preparation which was triggered by the violent protests of 2022.&lt;sup id="fnref:18"&gt;&lt;a href="#fn:18" class="footnote-ref" role="doc-noteref"&gt;18&lt;/a&gt;&lt;/sup&gt; Following the internet shutdowns of that year, civil society groups and activists began strategizing to bypass land-based censorship infrastructure entirely. This effort was significantly aided by a 2022 U.S. government sanctions exemption, coordinated with the State Department,&lt;sup id="fnref:19"&gt;&lt;a href="#fn:19" class="footnote-ref" role="doc-noteref"&gt;19&lt;/a&gt;&lt;/sup&gt; which allowed American technology companies like SpaceX to offer digital communication tools in Iran.&lt;/p&gt;
&lt;p&gt;Encouraged by Elon Musk’s activation of the service for Iran in 2022, a complex smuggling network emerged. Activists and merchants utilized routes through neighboring countries, including the United Arab Emirates, Iraqi Kurdistan, Armenia, and Afghanistan, to sneak the hardware across the border. By early 2026, an estimated 50,000 Starlink terminals&lt;sup id="fnref:20"&gt;&lt;a href="#fn:20" class="footnote-ref" role="doc-noteref"&gt;20&lt;/a&gt;&lt;/sup&gt; were operating inside the country. While initially used by human rights activists and journalists, a black market eventually developed where wealthy Iranians paid between $700 and $800 per terminal&lt;sup id="fnref:21"&gt;&lt;a href="#fn:21" class="footnote-ref" role="doc-noteref"&gt;21&lt;/a&gt;&lt;/sup&gt; to access restricted platforms like Instagram and YouTube. These devices were hidden in discreet locations, such as rooftops, awaiting the next inevitable blackout.&lt;/p&gt;
&lt;p&gt;The true strategic value of this infrastructure was tested in January 2026, when the Iranian government implemented one of the most severe internet shutdowns in its history to quell growing unrest. As land-based connections were logically severed and the country entered a digital blackout, the Starlink terminals became a critical lifeline. Unlike previous shutdowns where information flow was successfully choked off, this unfettered access to the international internet allowed images of state violence, including troops firing on protesters, to reach the outside world.&lt;sup id="fnref:22"&gt;&lt;a href="#fn:22" class="footnote-ref" role="doc-noteref"&gt;22&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The impact of the technology was amplified by financial intervention from SpaceX. On January 13, 2026, amid the internet blackout, SpaceX waived service fees for users in Iran.&lt;sup id="fnref:23"&gt;&lt;a href="#fn:23" class="footnote-ref" role="doc-noteref"&gt;23&lt;/a&gt;&lt;/sup&gt; People could connect to the international internet simply by turning on their Starlink terminals, bypassing the hundreds of millions of dollars the Iranian government spent on building the NIN over the previous two decades. Additionally, Iranian developers devised technical workarounds to maximize the reach of the few available terminals, building tools to share connections and turn single terminals into gateways for others located farther away.&lt;sup id="fnref:24"&gt;&lt;a href="#fn:24" class="footnote-ref" role="doc-noteref"&gt;24&lt;/a&gt;&lt;/sup&gt; Perhaps some sort of private network with the neighborhood Starlink terminal serving as a gateway router.&lt;/p&gt;
&lt;p&gt;I can imagine the government&amp;rsquo;s frustration with this development. Realizing that its domestic intranet had become effectively useless, the regime escalated its response in an attempt to stop the connectivity link. They began deploying GPS jamming equipment in targeted raids, which are required for Starlink equipment to function.&lt;sup id="fnref:25"&gt;&lt;a href="#fn:25" class="footnote-ref" role="doc-noteref"&gt;25&lt;/a&gt;&lt;/sup&gt; Such tactics are rarely seen outside of active battlefields like Ukraine. The raids focused its jamming efforts on neighborhoods near major universities to force students offline. Despite these aggressive countermeasures, the decentralized nature of the Starlink network has proven difficult to fully suppress. GPS jamming and radio interference could be effective in a dense urban environments but is almost impossible in the dispersed countryside.&lt;/p&gt;
&lt;p&gt;The Iranian regime faces an escalating challenge as newer mobile devices integrate Starlink capabilities, removing the need for bulky physical terminals. The government could still interfere with Starlink operations through GPS jamming and radio interference but they&amp;rsquo;ll no longer be able to easily identify locations to action without external Starlink antennas.&lt;/p&gt;
&lt;p&gt;The growing usage of Starlink marks a significant failure for the state’s attempt to maintain a total monopoly on information. While the penetration of Starlink shows a weakness in the NIN it does not herald the end of it. The bulk of domestic network traffic still traverses the state controlled NIN. However, it will be interesting to see at what threshold that matters if the information the government is trying to control leaks through an unregulated Starlink.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Farnaz Fassihi, Pranav Baskar, and Sanam Mahoozi, “Iran Is Cut off from Internet as Protests Calling for Regime Change Intensify,” &lt;em&gt;The New York Times&lt;/em&gt;, January 9, 2026, &lt;a href="https://www.nytimes.com/2026/01/08/world/middleeast/iran-protests-internet-shutdown.html"&gt;https://www.nytimes.com/2026/01/08/world/middleeast/iran-protests-internet-shutdown.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Mehul Srivastava and Chris Campbell, &amp;ldquo;State shuts off inter­net but smuggled Starlink devices keep link to world,&amp;rdquo; &lt;em&gt;Financial Times&lt;/em&gt;, January 15, 2026, p. 3.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Hesam Norouz Pour, &amp;ldquo;The Dual Role of Iran&amp;rsquo;s National Information Network: A Primer,&amp;rdquo; &lt;em&gt;European University Institute&lt;/em&gt;, November 2025, &lt;a href="https://cadmus.eui.eu/server/api/core/bitstreams/1fc28765-10e6-4e6b-9335-9c260a8dea5a/content"&gt;https://cadmus.eui.eu/server/api/core/bitstreams/1fc28765-10e6-4e6b-9335-9c260a8dea5a/content&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Calla O&amp;rsquo;Neil, &amp;ldquo;Iran&amp;rsquo;s Digital Fortress: The Rise of the National Information Network,&amp;rdquo; &lt;em&gt;American Foreign Policy Council: Iran Strategy Brief&lt;/em&gt;, August 2025, &lt;a href="https://www.afpc.org/uploads/documents/Iran_Strategy_Brief_No._16_-_August_2025.pdf"&gt;https://www.afpc.org/uploads/documents/Iran_Strategy_Brief_No._16_-_August_2025.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Khosro Sayeh Isfahani, “The Internet Has No Place in Khamenei’s Vision for Iran’s Future,” &lt;em&gt;Atlantic Council&lt;/em&gt;, July 25, 2022, &lt;a href="https://www.atlanticcouncil.org/blogs/iransource/the-internet-has-no-place-in-khameneis-vision-for-irans-future/"&gt;https://www.atlanticcouncil.org/blogs/iransource/the-internet-has-no-place-in-khameneis-vision-for-irans-future/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;The Citizen Lab, &amp;ldquo;Iran&amp;rsquo;s National Information Network: Faster Networks, More Censorship,&amp;rdquo; &lt;em&gt;The Citizen Lab&lt;/em&gt;, April 24, 2024, &lt;a href="https://citizenlab.ca/irans-national-information-network/"&gt;https://citizenlab.ca/irans-national-information-network/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Collin Anderson, &amp;ldquo;The Hidden Internet of Iran: Private Address Space on a National Scale,&amp;rdquo; arXiv:1209.6398 [cs.NI], September 28, 2012, &lt;a href="https://arxiv.org/abs/1209.6398"&gt;https://arxiv.org/abs/1209.6398&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Matthew P. Laney, &amp;ldquo;The National Information Network of Iran: A Strategic Technical and Legal Analysis&amp;rdquo; (Master’s thesis, Naval Postgraduate School, 2020), DTIC (AD1107324), December 2019, &lt;a href="https://apps.dtic.mil/sti/pdfs/AD1107324.pdf"&gt;https://apps.dtic.mil/sti/pdfs/AD1107324.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Armen Shahbazian, “Analysis: The Growth of Domestic Messaging Apps in Iran,” &lt;em&gt;BBC Monitoring&lt;/em&gt;, July 23, 2018, &lt;a href="https://monitoring.bbc.co.uk/product/c20041be"&gt;https://monitoring.bbc.co.uk/product/c20041be&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;Collin Anderson, &amp;ldquo;The Hidden Internet of Iran,&amp;rdquo;&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:11"&gt;
&lt;p&gt;ARTICLE 19, &lt;em&gt;Iran: Tightening the Net 2020: After Blood and Shutdowns&lt;/em&gt; (London: ARTICLE 19, September 2020), &lt;a href="https://www.article19.org/wp-content/uploads/2020/09/TTN-report-2020.pdf"&gt;https://www.article19.org/wp-content/uploads/2020/09/TTN-report-2020.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:12"&gt;
&lt;p&gt;Mehul Srivastava and Chris Campbell, &amp;ldquo;State shuts off inter­net,&amp;rdquo;&amp;#160;&lt;a href="#fnref:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:13"&gt;
&lt;p&gt;ARTICLE 19, &lt;em&gt;Iran: Tightening the Net 2020&lt;/em&gt;.&amp;#160;&lt;a href="#fnref:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:14"&gt;
&lt;p&gt;Hesam Norouz Pour, &amp;ldquo;The Dual Role of Iran&amp;rsquo;s National Information Network,&amp;rdquo;&amp;#160;&lt;a href="#fnref:14" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:15"&gt;
&lt;p&gt;O&amp;rsquo;Neil, &amp;ldquo;Iran&amp;rsquo;s Digital Fortress,&amp;rdquo; 2.&amp;#160;&lt;a href="#fnref:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:16"&gt;
&lt;p&gt;O&amp;rsquo;Neil, &amp;ldquo;Iran&amp;rsquo;s Digital Fortress,&amp;rdquo; 3.&amp;#160;&lt;a href="#fnref:16" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:17"&gt;
&lt;p&gt;O&amp;rsquo;Neil, &amp;ldquo;Iran&amp;rsquo;s Digital Fortress,&amp;rdquo; 5.&amp;#160;&lt;a href="#fnref:17" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:18"&gt;
&lt;p&gt;Adam Satariano, Paul Mozur, and Sheera Frenkel. “How Activists in Iran Are Using Starlink to Stay Online.” &lt;em&gt;The New York Times&lt;/em&gt;, January 16, 2026. &lt;a href="https://www.nytimes.com/2026/01/15/technology/iran-online-starlink.html?campaign_id=2&amp;amp;emc=edit_th_20260116&amp;amp;instance_id=169402&amp;amp;nl=today%27s-headlines"&gt;https://www.nytimes.com/2026/01/15/technology/iran-online-starlink.html?campaign_id=2&amp;amp;emc=edit_th_20260116&amp;amp;instance_id=169402&amp;amp;nl=today%27s-headlines&lt;/a&gt;®i_id=69207950&amp;amp;segment_id=213781&amp;amp;user_id=8eca66a41bad4639d6a80be52119fbd8.&amp;#160;&lt;a href="#fnref:18" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:19"&gt;
&lt;p&gt;Satariano, “How Activists in Iran Are Using Starlink”&amp;#160;&lt;a href="#fnref:19" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:20"&gt;
&lt;p&gt;Satariano, “How Activists in Iran Are Using Starlink”&amp;#160;&lt;a href="#fnref:20" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:21"&gt;
&lt;p&gt;Satariano, “How Activists in Iran Are Using Starlink”&amp;#160;&lt;a href="#fnref:21" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:22"&gt;
&lt;p&gt;Satariano, “How Activists in Iran Are Using Starlink”&amp;#160;&lt;a href="#fnref:22" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:23"&gt;
&lt;p&gt;Natallie Rocha, “Starlink Users in Iran Get Free Internet Access, Nonprofits Say,” &lt;em&gt;The New York Times&lt;/em&gt;, January 14, 2026, &lt;a href="https://www.nytimes.com/2026/01/13/technology/iran-starlink-elon-musk.html"&gt;https://www.nytimes.com/2026/01/13/technology/iran-starlink-elon-musk.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:23" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:24"&gt;
&lt;p&gt;Satariano, “How Activists in Iran Are Using Starlink”&amp;#160;&lt;a href="#fnref:24" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:25"&gt;
&lt;p&gt;Satariano, “How Activists in Iran Are Using Starlink”&amp;#160;&lt;a href="#fnref:25" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Chrome Featured Extension Is Actually A Scraper Network</title><link>https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/</link><pubDate>Sun, 11 Jan 2026 10:30:00 -0700</pubDate><guid>https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/</guid><description>&lt;p&gt;&lt;em&gt;Update on January 30, 2026&lt;/em&gt;: A MyBib developer contacted me about this extension&amp;rsquo;s behavior. They confirmed that this was expected behavior and it was how they were pooling the retrieval of user citation requests. The instance where my computer downloaded several PDF files was a bug that has since been fixed. MyBib has &lt;a href="https://chromewebstore.google.com/detail/mybib-free-citation-gener/phidhnmbkbkbkbknhldmpmnacgicphkf"&gt;updated the language&lt;/a&gt; in the Chrome Web Store to reflect the reality of what the extension was doing in the background.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Note: In order to keep MyBib free, the MyBib extension may, from time to time, utilize unused bandwidth to crowdsource the collection of citation data for everyone citing on MyBib. This is anonymous and only occurs when your browser is not being used.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;tl;dr Popular Chrome extension &lt;a href="https://chromewebstore.google.com/detail/mybib-free-citation-gener/phidhnmbkbkbkbknhldmpmnacgicphkf"&gt;MyBib&lt;/a&gt; uses your computer to scrape random educational websites.&lt;/p&gt;
&lt;p&gt;I was downloading some files a few weeks ago and noticed something strange. I didn&amp;rsquo;t recognize two PDF files in my Downloads folder. They had the timestamp of 4:23 a.m. and 3:05 a.m. Uh, what the hell? Like any good security technologist I raw dogged those files and opened them up to see what they were. The first was &amp;ldquo;The Organization of Islamic Cooperation (OIC): Challenges for the Islamic World&amp;rdquo; by Dr. Ghulam Mustafa and Nusrat Bano. Not exactly in my area of interest in Political Science but perhaps I downloaded them unintentionally. Maybe I was clicking around too fast on some random site.&lt;/p&gt;
&lt;p&gt;The second file was a master&amp;rsquo;s thesis from Fantahun Ali Amedie, titled &amp;ldquo;Impacts of Climate Change on Plant Growth, Ecosystem Services, Biodiversity, and Potential Adaptation Measure.&amp;rdquo; I&amp;rsquo;m not really an atmospheric science person so this being on my computer made a lot less sense. Also, the early morning retrieval time alarmed me. I asked my wife jokingly if she was doing some late night research on my computer while I was sleeping.&lt;/p&gt;
&lt;p&gt;I reviewed my Chrome history and sure enough there were the entries at the right times. Somehow my Chrome was going to websites when I wasn&amp;rsquo;t around. But looking closer there were even more requests all through the night! Uh, what the hell? All of them went to this domain called ResearchGate. Who were these bastards and what had they done to my computer? I looked them up. While commercial, they were at least legitimate. They were an aspiring social networking site for scientists and researchers.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;My paranoia was in a weird state at this point. Initially, I assumed this errant traffic was limited to browsing random academic studies. It was odd but not a serious emergency. Like almost as if a script kiddie that only wore tweed jackets with elbow patches had taken over a portion of my computer.&lt;/p&gt;
&lt;p&gt;But my paranoia kept solidifying. I had recently witnessed a close family friend rebuild their digital life after a SIM swap attack. This person had spent weeks reestablishing themselves back into the modern world. It wasn&amp;rsquo;t something I wanted to live through and had spent the past weekend updating old passwords, adding two factor authentication where missing, and generally securing things.&lt;/p&gt;
&lt;p&gt;I took to Google, though I stalled when phrasing the search. It wasn&amp;rsquo;t as if my computer was going to random websites you&amp;rsquo;d normally associate with malware. My computer was in its academic arc and was obsessed with ResearchGate. I typed in &lt;em&gt;computer going to researchgate randomly&lt;/em&gt;. I got results for how to add an article on ResearchGate. Not very helpful. I pulled back a little broader and tried &lt;em&gt;computer going to random sites&lt;/em&gt;. Yes, potentially malware but why only this academic ResearchGate site?&lt;/p&gt;
&lt;p&gt;While I had Malwarebytes doing a scan I kept searching through Reddit and forum posts. Many of the conclusions were that certain Chrome extensions could be responsible for such erratic behavior. But I had only six extensions and most were either Chrome &lt;em&gt;Featured&lt;/em&gt; or had millions of users.&lt;/p&gt;
&lt;p&gt;The Malwarebytes scan returned zero results. My only remaining option was to scorch the earth and restore Chrome to its default settings. I deleted all six of my installed extensions and sanitized other custom settings. The only way to tell if anything worked was to wait a few days to see if random browsing was still taking place. Luckily, this happened over the holidays and I had plenty of time.&lt;/p&gt;
&lt;p&gt;After a week there was no new late night activity. Such a relief! It felt like my house&amp;rsquo;s front door finally had a lock on it again. I had broadly isolated the cause to a random extension I was using. I re-added three extensions, choosing them purely by the number of users. One had as few as 3,000. This approach might seem arbitrary, but sketchy behavior would likely evade detection more easily on a less popular extension.&lt;/p&gt;
&lt;p&gt;I waited another week and nothing happened. Then I realized the academic nature of the random browsing provided the biggest clue. Out of the remaining 3 extensions I had yet to test, two were citation generators, &lt;a href="https://chromewebstore.google.com/detail/scribbr-citation-generato/epbobagokhieoonfplomdklollconnkl"&gt;Scribbr&lt;/a&gt; and &lt;a href="https://chromewebstore.google.com/detail/mybib-free-citation-gener/phidhnmbkbkbkbknhldmpmnacgicphkf"&gt;MyBib&lt;/a&gt;. Yes, I realize I&amp;rsquo;m a lazy bastard for using such extensions but it takes the busy work out of writing a citation. I&amp;rsquo;m a firm believer that citations are massively superior to hyperlinks, as you can see on any past articles on this blog. They maintain an adequate amount of information needed to look up a source in the inevitable case that a hyperlink URL rots away.&lt;/p&gt;
&lt;p&gt;I re-installed Scribbr and waited. A week later nothing had happened. So I moved on to MyBib. A few hours after re-installing it I noticed out of the corner of my eye a new tab pop up and then rapidly disappear. Uh, what the hell? In my Chrome history it showed I had just gone to another ResearchGate study. Ok, I found the source but I wanted to explore what exactly was happening.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m a network engineer by trade so my automatic reaction to most problems is a packet capture. This often isn&amp;rsquo;t very efficient because packet captures are overly verbose and require a great deal of refinement to reach what you are actually interested in finding. And after looking through Wireshark there was another problem, encrypted traffic. This exposed my lack of familiarity with Session Key Logging on macOS where you essentially dump the encryption keys Chrome is using to talk with the far end domain. You can then use this to decrypt the traffic. Perhaps there was something further up the &lt;a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/"&gt;OSI&lt;/a&gt; stack that I could use to find what I needed faster.&lt;/p&gt;
&lt;p&gt;A quick Google search gave me a hint. If I enabled &lt;em&gt;Developer mode&lt;/em&gt; on the Chrome extension page it would allow me to view each extension&amp;rsquo;s service worker and all the operations it was performing. Clicking on the service worker of an extension essentially opens a DevTools page that shows all the normal diagnostic tabs like sources, network, performance, memory, and application. So I opened the network tab and waited.&lt;/p&gt;
&lt;p&gt;After a few hours I came back to a few results. I discovered that these sites were not exclusively ResearchGate. There were many other sites but only ResearchGate was showing up in my Chrome&amp;rsquo;s browsing history. What were these ghost requests? I could see that the extension was reaching out to them but the only record of them ever taking place was in this DevTools page. The frequency wasn&amp;rsquo;t blistering but still semi-frequent. All without my intervention.&lt;/p&gt;
&lt;p&gt;Under the &lt;em&gt;Initiator&lt;/em&gt; tab on a particular &lt;code&gt;GET&lt;/code&gt; request I could see a script referenced: &lt;code&gt;service_worker.js:1&lt;/code&gt;. I&amp;rsquo;m not well versed with coding and even less so with JavaScript so I asked my wife to help look at this script. Our goal was to find the part that had instructions for my computer to go to these random sites.&lt;/p&gt;
&lt;p&gt;The code excerpt below stood out as the basis of how this particular extension was sending instructions to my computer through a WebSocket connection.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;(&lt;span style="color:#a6e22e"&gt;n&lt;/span&gt; &lt;span style="color:#f92672"&gt;=&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;new&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;WebSocket&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;`wss://ws.mybib.com/?v=&lt;/span&gt;&lt;span style="color:#e6db74"&gt;${&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;t&lt;/span&gt;&lt;span style="color:#e6db74"&gt;}&lt;/span&gt;&lt;span style="color:#e6db74"&gt;`&lt;/span&gt;)).&lt;span style="color:#a6e22e"&gt;onopen&lt;/span&gt; &lt;span style="color:#f92672"&gt;=&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;function&lt;/span&gt;() {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;console&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;log&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;&amp;#34;&amp;gt;&amp;#34;&lt;/span&gt;);
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#66d9ef"&gt;const&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;e&lt;/span&gt; &lt;span style="color:#f92672"&gt;=&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;setInterval&lt;/span&gt;(( () =&amp;gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;n&lt;/span&gt; &lt;span style="color:#f92672"&gt;&amp;amp;&amp;amp;&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt; &lt;span style="color:#f92672"&gt;===&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;n&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;readyState&lt;/span&gt; &lt;span style="color:#f92672"&gt;?&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;n&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;send&lt;/span&gt;(&lt;span style="color:#e6db74"&gt;&amp;#34;// stay alive&amp;#34;&lt;/span&gt;) &lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;clearInterval&lt;/span&gt;(&lt;span style="color:#a6e22e"&gt;e&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;I looked for traffic to this particular domain in the DevTools Network page. And sure enough, there was a live WebSocket connection to &lt;code&gt;wss://ws.mybib.com/?v=1.2.4&lt;/code&gt;. Under it I could see these &lt;code&gt;//stay alive&lt;/code&gt; messages going along at a quick 20 second interval.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="My computer happily reporting for duty to the MyBib mothership on a regular 20 second cadence."&gt;
 &lt;img
 alt="My computer happily reporting for duty to the MyBib mothership on a regular 20 second cadence."
 title="My computer happily reporting for duty to the MyBib mothership on a regular 20 second cadence."
 width="1426"
 height="676"srcset="https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-keepalive_hu_7cea3a6e1e18345e.webp 480w, https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-keepalive_hu_b488267c0c1b4b41.webp 768w, https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-keepalive_hu_2e016bd342728523.webp 1024w, https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-keepalive_hu_9b5ab8dbe97f6dab.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-keepalive_hu_1021184b897ce55c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;My computer happily reporting for duty to the MyBib mothership on a regular 20 second cadence.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;These keep alive messages appear to force my computer to check in with the MyBib servers and await instructions. They were only interrupted by random scrape instructions. Please, obedient zombie computer, issue a &lt;code&gt;GET&lt;/code&gt; request to this particular URL and tell us what you find.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;{
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;headers&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;Cache-Control&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;no-cache&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; },
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;id&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;cace6dfb5f7f46f0a7bd4f02c217eb1f&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;url&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;https://blog.reworld.eco/afforestation-vs-reforestation-whats-the-difference-and-why-do-they-matter-46730cbce304&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;method&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;GET&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;useTab&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;false&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestUrl&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestContentString&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;And then a few minutes later my computer would respond with the scrape request. Notice how the &lt;code&gt;id&lt;/code&gt; field matches. I assume this is how the MyBib server keeps track of multiple scrape requests. Please note I abbreviated the output. It was the entire HTML of the page. The real point I wanted to make with this output was the &lt;code&gt;id&lt;/code&gt; and &lt;code&gt;useTab&lt;/code&gt; parameters.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;{
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;id&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;cace6dfb5f7f46f0a7bd4f02c217eb1f&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;response&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;lt;!doctype html&amp;gt;&amp;lt;html lang=\&amp;#34;en\&amp;#34;&amp;gt;&amp;lt;head&amp;gt;&amp;lt;title data-rh=\&amp;#34;true\&amp;#34;&amp;gt;Afforestation vs Reforestation: What’s the Difference and Why Do They Matter? | by Matthew Wheatley | ReWorld&amp;lt;/title&amp;gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;withCredentials&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;: true,
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;id&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;: &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;cace6dfb5f7f46f0a7bd4f02c217eb1f&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;,
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;url&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;: &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;https&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt;&lt;span style="color:#75715e"&gt;//blog.reworld.eco/afforestation-vs-reforestation-whats-the-difference-and-why-do-they-matter-46730cbce304&amp;#34;,
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;method&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;get&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;useTab&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;false&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestUrl&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestContentString&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; },
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;request&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {}
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Here is another scrape request from MyBib:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;{
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;headers&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;Cache-Control&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;no-cache&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; },
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;id&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;4a6398b5aa304e5a9e5f7b8722a5398f&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;url&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;https://www.lonelyplanet.com/turkey/aegean-coast/pamukkale/attractions/necropolis/a/poi-sig/1262860/360866&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;method&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;GET&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;useTab&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;false&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestUrl&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestContentString&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;And my abbreviated computer&amp;rsquo;s reply with the same &lt;code&gt;id&lt;/code&gt;.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;{
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;id&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;4a6398b5aa304e5a9e5f7b8722a5398f&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;response&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;lt;!DOCTYPE html&amp;gt;&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;&amp;lt;meta charSet=\&amp;#34;utf-8\&amp;#34;/&amp;gt;&amp;lt;meta name=\&amp;#34;viewport\&amp;#34; content=\&amp;#34;width=device-width, initial-scale=1\&amp;#34;/&amp;gt;&amp;lt;meta property=\&amp;#34;fb:app_id\&amp;#34; content=\&amp;#34;111537044496\&amp;#34;/&amp;gt;&amp;lt;meta property=\&amp;#34;og:site_name\&amp;#34; content=\&amp;#34;Lonely Planet\&amp;#34;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;withCredentials&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;: true,
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;id&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;: &amp;#34;&lt;/span&gt;&lt;span style="color:#ae81ff"&gt;4&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;a6398b5aa304e5a9e5f7b8722a5398f&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;,
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;url&lt;/span&gt;&lt;span style="color:#e6db74"&gt;&amp;#34;: &amp;#34;&lt;/span&gt;&lt;span style="color:#a6e22e"&gt;https&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt;&lt;span style="color:#75715e"&gt;//www.lonelyplanet.com/turkey/aegean-coast/pamukkale/attractions/necropolis/a/poi-sig/1262860/360866&amp;#34;,
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#75715e"&gt;&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;method&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;get&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;useTab&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;false&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestUrl&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestContentString&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; },
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;request&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {}
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Surprisingly, the behavior of opening ghost tabs in Chrome was rather rare for MyBib. It took me almost half a day of watching to see a request and to match that up to my Chrome browsing history. It appears this is needed due to some strict websites that enforce particular user agents or other technical limitations of the previously shared headless &lt;code&gt;GET&lt;/code&gt; requests. Below is an example with &lt;code&gt;useTab&lt;/code&gt; set to true:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;{
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;headers&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;Cache-Control&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;no-cache&amp;#34;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; },
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;id&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;15eea559f90f4677bc1473a05c1fdb09&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;url&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;https://www.researchgate.net/publication/250014950_Threatening_revisited&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;method&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;GET&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;useTab&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;true&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestUrl&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;listenForRequestContentString&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#66d9ef"&gt;null&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;And then my abbreviated computer&amp;rsquo;s reply:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;{
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;id&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;15eea559f90f4677bc1473a05c1fdb09&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;response&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; {
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;data&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;&amp;lt;html lang=\&amp;#34;en\&amp;#34;&amp;gt;&amp;lt;head prefix=\&amp;#34;og: http://ogp.me/ns#\&amp;#34;&amp;gt;\n &amp;lt;meta charset=\&amp;#34;utf-8\&amp;#34;&amp;gt;\n &amp;lt;meta http-equiv=\&amp;#34;content-type\&amp;#34; content=\&amp;#34;text/html; charset=UTF-8\&amp;#34;&amp;gt;\n &amp;lt;meta name=\&amp;#34;referrer\&amp;#34; content=\&amp;#34;origin-when-cross-origin\&amp;#34;&amp;gt;\n 
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;...
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt; &amp;lt;title&amp;gt;(PDF) Threatening Revisited&amp;lt;/title&amp;gt;\n&amp;lt;meta name=\&amp;#34;description\&amp;#34; content=\&amp;#34;PDF | This paper considers the act of verbal threatening. I first examine what constitutes a verbal threat, concluding that it involves conveying both&amp;lt;/div&amp;gt;&amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;&amp;#34;&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#e6db74"&gt;&amp;#34;status&amp;#34;&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;200&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;}
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;We were able to identify the instructions for this behavior in the service worker JavaScript file. If &lt;code&gt;useTab&lt;/code&gt; was set to &lt;code&gt;true&lt;/code&gt; it would perform some shady behavior:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-javascript" data-lang="javascript"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#a6e22e"&gt;r&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;useTab&lt;/span&gt;)
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;chrome&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;tabs&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;create&lt;/span&gt;({
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;active&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#f92672"&gt;!&lt;/span&gt;&lt;span style="color:#ae81ff"&gt;1&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;pinned&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#f92672"&gt;!&lt;/span&gt;&lt;span style="color:#ae81ff"&gt;0&lt;/span&gt;,
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#a6e22e"&gt;url&lt;/span&gt;&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#a6e22e"&gt;r&lt;/span&gt;.&lt;span style="color:#a6e22e"&gt;url&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; }, (&lt;span style="color:#66d9ef"&gt;function&lt;/span&gt;(&lt;span style="color:#a6e22e"&gt;e&lt;/span&gt;) {
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;When active was specified as &lt;code&gt;!1&lt;/code&gt; it would prevent your Chrome window from becoming the front and center when the page request was processing. Certainly to avoid attracting the attention of users that might be currently working on the computer. The pinned specification of &lt;code&gt;!0&lt;/code&gt; makes a pinned tab, which is overall smaller in the top menu and further obfuscates the visual representation of the process if a user was actively paying attention.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The WebSocket record of instructions my computer received from the MyBib extension. The red down arrows are the instructions and the green up arrows are my computer sending a response. This is from the DevTools page for the service worker of the extension."&gt;
 &lt;img
 alt="The WebSocket record of instructions my computer received from the MyBib extension. The red down arrows are the instructions and the green up arrows are my computer sending a response. This is from the DevTools page for the service worker of the extension."
 title="The WebSocket record of instructions my computer received from the MyBib extension. The red down arrows are the instructions and the green up arrows are my computer sending a response. This is from the DevTools page for the service worker of the extension."
 width="1421"
 height="673"srcset="https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-messages_hu_e5cdb044a86e789b.webp 480w, https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-messages_hu_64549112ecaee033.webp 768w, https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-messages_hu_9feaaba463f05716.webp 1024w, https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-messages_hu_30f025b36500fee7.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chrome-featured-extension-is-actually-a-scraper-network/mybib-service_worker-messages_hu_1088c383f53ac97c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The WebSocket record of instructions my computer received from the MyBib extension. The red down arrows are the instructions and the green up arrows are my computer sending a response. This is from the DevTools page for the service worker of the extension.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I was able to replicate this extension&amp;rsquo;s behavior across different platforms. My own computer is running MacOS Sequoia 15.7.2 with Google Chrome version 143.0.7499.170. I also encountered the same scraping behavior on another computer I have that is running Windows 10 Pro (OS build 19045.5737) with Google Chrome version 143.0.7499.193. Both systems were running version 1.2.4 of the MyBib extension.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m honestly flabbergasted this extension is behaving this way. I never signed up to be part of a distributed scraper network meant to evade the rate limiting security measures of websites. The audacity to hijack your user&amp;rsquo;s computer is profoundly arrogant. Even for a free extension there are certain expectations around how things should behave in the realm of security. Or at the very least, some sort of communicated disclaimers around the realm of security. Maybe that is just my own flawed reasoning, which will undoubtedly be further jaded after this encounter?&lt;/p&gt;
&lt;p&gt;I could understand the need for this on-demand scraping capability if you wanted to spread the compute load around. Take the fictional scenario where someone develops an extension but wants to keep it free, avoid subscriptions, and keep infrastructure costs low. This might require moving some of the compute burden onto the users. Instead of paying for widely distributed infrastructure you could instead just assign out the scraping task to a user who has your extension installed. A simple minor trade wherein the user pays with some compute for access to the free extension.&lt;/p&gt;
&lt;p&gt;I could see this exchange playing out just fine in the modern world. All you&amp;rsquo;d need is a few sentences on your extension page saying this was the terms of exchange. Users could then expect to see scraping activity and know it was their paid cost to using the extension. However, this is not the case. There is absolutely no mention of this behavior on the &lt;a href="https://chromewebstore.google.com/detail/mybib-free-citation-gener/phidhnmbkbkbkbknhldmpmnacgicphkf"&gt;MyBib extension page&lt;/a&gt;, which has over 1,000,000 Chrome users, their &lt;a href="https://www.mybib.com/terms"&gt;terms of service&lt;/a&gt;, or &lt;a href="https://www.mybib.com/privacy"&gt;privacy policy&lt;/a&gt; pages.&lt;/p&gt;
&lt;p&gt;MyBib&amp;rsquo;s actions don&amp;rsquo;t take place in a vacuum. They are a &lt;em&gt;Featured&lt;/em&gt; extension in the Google Chrome Web Store. Google&amp;rsquo;s definition of this is kind of vague but should supposedly instill some level of confidence in whatever extension you are installing.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Featured extensions follow our technical best practices and meet a high standard of user experience and design. &lt;a href="https://support.google.com/chrome_webstore/answer/1050673?hl=en&amp;amp;visit_id=639035227037436696-1471216940&amp;amp;p=cws_badges&amp;amp;rd=1#cws_badges&amp;amp;zippy=%2Cunderstand-chrome-web-store-badges"&gt;Chrome Web Store Help&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Google&amp;rsquo;s evaluation criteria obviously need rework if an extension like this can evade detection. Or alternatively, provide some mechanism for some sort of annual audit to make sure underlying functionality hasn&amp;rsquo;t become malicious with a new update. Furthermore, this might have some implications for Google&amp;rsquo;s &lt;a href="https://landing.google.com/intl/en_in/advancedprotection/"&gt;Advanced Protection Program&lt;/a&gt;, which I have opted into. Google says it performs even more stringent malware checks for Google Chrome but this extension was operating just fine.&lt;/p&gt;
&lt;p&gt;To be fair to Google and MyBib, this extension&amp;rsquo;s behavior isn&amp;rsquo;t specifically malicious. From what I have seen it is a distributed educational website scraper. Not something I want operating on my computer but definitely better than a million other sketchy applications. My bank account is intact and my digital life hasn&amp;rsquo;t been disturbed. But in the end, since MyBib was never forthright about their extension&amp;rsquo;s behavior, it is unforgivable.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Katie Fortney and Justin Gonder, “A Social Networking Site Is Not an Open Access Repository - Office of Scholarly Communication,” &lt;em&gt;University of California&lt;/em&gt;, December 1, 2015, &lt;a href="https://osc.universityofcalifornia.edu/2015/12/a-social-networking-site-is-not-an-open-access-repository/"&gt;https://osc.universityofcalifornia.edu/2015/12/a-social-networking-site-is-not-an-open-access-repository/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>2025 Running Review</title><link>https://rb.ax/blog/2025-running-review/</link><pubDate>Wed, 31 Dec 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/2025-running-review/</guid><description>&lt;p&gt;&lt;figure aria-label="An early morning sweaty run along the Jiangbeizui Riverbank Park in Chongqing, China on July 24, 2025. A comparable environment would be if Miami had a heat wave in the dead of summer and then got sucked into hell."&gt;
 &lt;img
 alt="An early morning sweaty run along the Jiangbeizui Riverbank Park in Chongqing, China on July 24, 2025. A comparable environment would be if Miami had a heat wave in the dead of summer and then got sucked into hell."
 title="An early morning sweaty run along the Jiangbeizui Riverbank Park in Chongqing, China on July 24, 2025. A comparable environment would be if Miami had a heat wave in the dead of summer and then got sucked into hell."
 width="2000"
 height="1500"srcset="https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_72435bd7d9406de8.webp 480w, https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_aabec258a9fbc7a9.webp 768w, https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_d1c96076bd52a06e.webp 1024w, https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_3b9b21145f4ba72f.webp 1366w, https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_78545cc24a068301.webp 1600w, https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_e497a9c928d20b5.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/2025-running-review/chongqing-riverwalk_hu_c7b30cebea5985f8.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;An &lt;a href="https://www.strava.com/activities/15215978301"&gt;early morning sweaty run&lt;/a&gt; along the Jiangbeizui Riverbank Park in Chongqing, China on July 24, 2025. A comparable environment would be if Miami had a heat wave in the dead of summer and then got sucked into hell.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;In 2025, I ran a total of 2,358 miles, which is a decrease of 1% &lt;a href="https://rb.ax/blog/2024-running-review/"&gt;from 2024&lt;/a&gt;. I had a lot less elevation gain this year at 91,566 ft, which is down 46% over 2024. The lack of training in the nearby mountains really adds up over the course of a season with most of my miles being on relatively flat roads. I had the biggest dip in July since I was in China for 3 weeks and was trying to avoid straining my body with jet lag and travel.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Month&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Distance (miles)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Elevation (feet)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Time (hours)&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;January&lt;/td&gt;
 &lt;td style="text-align: center"&gt;203&lt;/td&gt;
 &lt;td style="text-align: center"&gt;10,696&lt;/td&gt;
 &lt;td style="text-align: center"&gt;40&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;February&lt;/td&gt;
 &lt;td style="text-align: center"&gt;182&lt;/td&gt;
 &lt;td style="text-align: center"&gt;8,894&lt;/td&gt;
 &lt;td style="text-align: center"&gt;36&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;March&lt;/td&gt;
 &lt;td style="text-align: center"&gt;200&lt;/td&gt;
 &lt;td style="text-align: center"&gt;9,429&lt;/td&gt;
 &lt;td style="text-align: center"&gt;40&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;April&lt;/td&gt;
 &lt;td style="text-align: center"&gt;195&lt;/td&gt;
 &lt;td style="text-align: center"&gt;9,154&lt;/td&gt;
 &lt;td style="text-align: center"&gt;39&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;May&lt;/td&gt;
 &lt;td style="text-align: center"&gt;172&lt;/td&gt;
 &lt;td style="text-align: center"&gt;7,923&lt;/td&gt;
 &lt;td style="text-align: center"&gt;37&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;June&lt;/td&gt;
 &lt;td style="text-align: center"&gt;168&lt;/td&gt;
 &lt;td style="text-align: center"&gt;5,846&lt;/td&gt;
 &lt;td style="text-align: center"&gt;34&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;July&lt;/td&gt;
 &lt;td style="text-align: center"&gt;142&lt;/td&gt;
 &lt;td style="text-align: center"&gt;5,638&lt;/td&gt;
 &lt;td style="text-align: center"&gt;31&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;August&lt;/td&gt;
 &lt;td style="text-align: center"&gt;242&lt;/td&gt;
 &lt;td style="text-align: center"&gt;9,009&lt;/td&gt;
 &lt;td style="text-align: center"&gt;49&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;September&lt;/td&gt;
 &lt;td style="text-align: center"&gt;236&lt;/td&gt;
 &lt;td style="text-align: center"&gt;6,073&lt;/td&gt;
 &lt;td style="text-align: center"&gt;46&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;October&lt;/td&gt;
 &lt;td style="text-align: center"&gt;220&lt;/td&gt;
 &lt;td style="text-align: center"&gt;6,624&lt;/td&gt;
 &lt;td style="text-align: center"&gt;44&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;November&lt;/td&gt;
 &lt;td style="text-align: center"&gt;219&lt;/td&gt;
 &lt;td style="text-align: center"&gt;6,703&lt;/td&gt;
 &lt;td style="text-align: center"&gt;45&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;December&lt;/td&gt;
 &lt;td style="text-align: center"&gt;178&lt;/td&gt;
 &lt;td style="text-align: center"&gt;5,577&lt;/td&gt;
 &lt;td style="text-align: center"&gt;36&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;I didn&amp;rsquo;t have any major illnesses throughout the whole year and I attribute that to the theme I approached 2025 with: running for health. This included backing off mileage if I was ever in doubt about an upcoming cold or if I just felt tired. My overall performance was thus middle ground but over the course of the year, sustainable.&lt;/p&gt;
&lt;p&gt;Something I started incorporating towards the end of the year was doing zone 2 heart rate training. This involves keeping your heart rate below a certain threshold for the majority of your runs. The end goal is to reduce strain on your body while fortifying your running fitness. After about 2 months of doing this I noticed I had a lot less daily fatigue while doing the same amount of mileage on a weekly basis. The only trade off is that my zone 2 pace is unbearably slow and requires a larger allotment of time to complete my running.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m not sure what my running goals are for 2026. I really enjoyed not pushing myself to the extremes of 2024, like with the &lt;a href="https://rb.ax/blog/speedgoat-50k-2024-race-report/"&gt;Speedgoat 50K in 2024&lt;/a&gt;, but it also got kind of boring. I was running on a daily basis to check a box rather than attain something specific. I guess health was obtained but that isn&amp;rsquo;t as psychologically tangible as completing a challenging course. I feel a race of some sort in my near future.&lt;/p&gt;</description></item><item><title>Mine, All Mine</title><link>https://rb.ax/blog/mine-all-mine/</link><pubDate>Mon, 17 Nov 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/mine-all-mine/</guid><description>&lt;p&gt;&lt;figure aria-label="Gustav Holst, The Planets, op. 32, Boston Symphony Orchestra, conducted by William Steinberg, Deutsche Grammophon, 1971, LP."&gt;
 &lt;img
 alt="Gustav Holst, The Planets, op. 32, Boston Symphony Orchestra, conducted by William Steinberg, Deutsche Grammophon, 1971, LP."
 title="Gustav Holst, The Planets, op. 32, Boston Symphony Orchestra, conducted by William Steinberg, Deutsche Grammophon, 1971, LP."
 width="1595"
 height="1600"srcset="https://rb.ax/blog/mine-all-mine/gustav-holst_the-planets-featured_hu_fe337a9356a022f8.webp 480w, https://rb.ax/blog/mine-all-mine/gustav-holst_the-planets-featured_hu_928afa2b1ba30f87.webp 768w, https://rb.ax/blog/mine-all-mine/gustav-holst_the-planets-featured_hu_86e0a0a698e08fea.webp 1024w, https://rb.ax/blog/mine-all-mine/gustav-holst_the-planets-featured_hu_ea6523522f3ee8d.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/mine-all-mine/gustav-holst_the-planets-featured_hu_9ed326c0f4474650.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Gustav Holst, &lt;em&gt;The Planets&lt;/em&gt;, op. 32, Boston Symphony Orchestra, conducted by William Steinberg, Deutsche Grammophon, 1971, LP.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I stepped into a music store this weekend for the first time in quite a while. I was compelled by an urge to possess something tangible. It was a strange feeling because the phone in my pocket was capable of instantly streaming probably a vast majority of the music in the store. But access to something doesn&amp;rsquo;t mean you own it.&lt;/p&gt;
&lt;p&gt;Flipping through boxes of new and vintage vinyl came with sticker shock. A hefty $29.99 for a re-pressed vinyl record was a stretch from my $11.61 a month Qobuz subscription. There were even deluxe edition albums for even more at $59.99. The ever-present subscription business model has programmed this immediate comparison into me over the past decade. We no longer own things but instead pay a monthly fee for access. But recently, I have been trying to understand this relationship with a bit more nuance than just raw dollars and what ownership means to me personally.&lt;/p&gt;
&lt;p&gt;A music, movie, or television show streaming service isn&amp;rsquo;t very useful when the internet is out. You can cache music for offline listening but let&amp;rsquo;s ignore the corner cases for now and just approach the topic in general terms. Media access also exists at the whims of licensing deals that come and go. A movie or television show on Netflix one week might not be there the next. Will you need a new subscription to Netflix or Hulu in order to keep watching your favorite show? This isn&amp;rsquo;t as apparent for music streaming services, seeing as Qobuz offers over 100 million songs,&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; on par with Spotify.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; But there are still issues with some artists&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; not being on a certain platform that could be a problem for some.&lt;/p&gt;
&lt;p&gt;The overall cohesiveness for music streaming services is great but falls apart when you start thinking about movies or television shows. In today&amp;rsquo;s vast variety of streaming services you&amp;rsquo;ll have to look up your show to see where it&amp;rsquo;s available,&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; if anywhere. After you sign up for that service there is also no guarantee that it will remain there. I have experienced two instances of being in the middle of watching a television show, only to have it disappear from the service to which I was subscribed. I&amp;rsquo;m picturing a representative of a major studio showing up at my house, plucking a DVD from my collection and leaving with it.&lt;/p&gt;
&lt;p&gt;Is physical media ownership the answer to these dilemmas? I think so, at least in several aspects. After I purchase a Blu-ray or CD it marks the end of my relationship with the seller and I keep the media forever. The state of that media is then fully static. However, with streaming, that transaction is perpetually extended. Over the course of the streaming relationship I can lose access to specific media based on the decisions of the streaming service. A slightly weirder case is when the director or studio releases subsequent editions&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; that don&amp;rsquo;t exactly match what was originally shown in theaters.&lt;/p&gt;
&lt;p&gt;I realize none of these concepts are new but they seem to have faded into the background of my mind over the past decade with the growing use of subscription-based models. The convenience lulls me into a passive state of mind and I completely forget about it. But then these huge AWS outages happen that break the things I own&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; and I&amp;rsquo;m left facing the reality that I immensely depend on these external services for the majority of my &lt;em&gt;things&lt;/em&gt; to work. Should it be that way and to what degree am I comfortable? In this thought process I ask myself what it would take to partially remove my dependency on these services.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ll admit, it isn&amp;rsquo;t feasible to build your own personal music collection of 100 million songs so my music streaming service will have to stay. Qobuz has been doing a tremendous job helping my discovery of new music over the past few years. Real people curate new album releases every week. This meatspace curation hasn&amp;rsquo;t gone unnoticed; as Andrew Dubber notes, &amp;ldquo;Qobuz assumes I’m interesting, Spotify assumes I am predictable.&amp;rdquo;&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; It has helped me discover standout albums like Fat Dog&amp;rsquo;s &lt;em&gt;WOOF&lt;/em&gt; and 100 gecs&amp;rsquo; &lt;em&gt;10,000 gecs&lt;/em&gt; that might not have reached me through Spotify&amp;rsquo;s algorithm. From this path of discovery I can curate a list of albums that I can reference when I&amp;rsquo;m at the music store. I&amp;rsquo;ll approach using a music streaming service like an easy-access sampler to see if I like something before I make a larger investment in a physical copy for my own collection.&lt;/p&gt;
&lt;p&gt;For movies and television shows, which are less aggregated, it would be more beneficial for me to lean harder on owning and purchasing physical copies rather than subscribing to an inordinate amount of streaming services. There is also another problem where some movies aren&amp;rsquo;t even available on any streaming services.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; Shows coming out of the HBO studio seem to align with my tastes most consistently with Apple in a close second. But everything after that is kind of hit or miss and largely depends on the show itself. Considering the instability of availability for these types of media it would be really nice to have physical copies for my own collection. And the overall amount required for a decent library isn&amp;rsquo;t nearly as much as in the realm of music.&lt;/p&gt;
&lt;p&gt;The novel idea of ownership is probably obvious to many people in this age of streaming but for me it had been an idea that had faded away over the past few years. Purchasing a video game on Steam and downloading it in minutes without having to trudge down to the local game store is purely awesome. I pay for that convenience by forfeiting ownership of my Steam games&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; and other things like Kindle books.&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt; The tradeoff of this convenience might be too much for some and perfectly fine for others. I&amp;rsquo;m going to approach the whole situation pragmatically, accepting that convenience sometimes comes at the cost of ownership.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;&amp;ldquo;The Qobuz Experience,&amp;rdquo; Qobuz Help Center, accessed November 17, 2025, &lt;a href="https://help.qobuz.com/en/articles/10127-the-qobuz-experience"&gt;https://help.qobuz.com/en/articles/10127-the-qobuz-experience&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Will Howard, “How Many Songs Are There on Spotify?,” &lt;em&gt;Far Out Magazine&lt;/em&gt;, November 17, 2024, &lt;a href="https://faroutmagazine.co.uk/how-many-songs-are-there-on-spotify/"&gt;https://faroutmagazine.co.uk/how-many-songs-are-there-on-spotify/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Ben Sisario, “Joni Mitchell Plans to Follow Neil Young off Spotify, Citing ‘Lies,’” &lt;em&gt;The New York Times&lt;/em&gt;, January 30, 2022, &lt;a href="https://www.nytimes.com/2022/01/28/arts/music/joni-mitchell-neil-young-spotify.html"&gt;https://www.nytimes.com/2022/01/28/arts/music/joni-mitchell-neil-young-spotify.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;See &amp;ldquo;JustWatch,&amp;rdquo; accessed November 17, 2025, &lt;a href="https://www.justwatch.com/us;"&gt;https://www.justwatch.com/us;&lt;/a&gt; &amp;ldquo;Reelgood,&amp;rdquo; accessed November 17, 2025, &lt;a href="https://reelgood.com/"&gt;https://reelgood.com/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;&amp;ldquo;Changes in Star Wars Re-releases,&amp;rdquo; Wikipedia, accessed November 17, 2025, &lt;a href="https://en.wikipedia.org/wiki/Changes_in_Star_Wars_re-releases"&gt;https://en.wikipedia.org/wiki/Changes_in_Star_Wars_re-releases&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Sopan Deb, “AWS Cloud-Computing Outage Left Smart Bed Customers Without Sleep,” &lt;em&gt;The New York Times&lt;/em&gt;, October 24, 2025, &lt;a href="https://www.nytimes.com/2025/10/24/business/amazon-aws-outage-eight-sleep-mattress.html"&gt;https://www.nytimes.com/2025/10/24/business/amazon-aws-outage-eight-sleep-mattress.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Andrew Dubber, “Music Discovery: Qobuz Vs Spotify,” &lt;em&gt;MTF Labs&lt;/em&gt;, July 6, 2023, &lt;a href="https://andrewdubber.com/music-discovery-qobuz-vs-spotify/"&gt;https://andrewdubber.com/music-discovery-qobuz-vs-spotify/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Wilson Chapman, “The 30 Best Movies Currently Not Streaming Anywhere: ‘Short Cuts,’ ‘Pink Flamingos,’ ‘Cocoon,’ and More,” &lt;em&gt;IndieWire&lt;/em&gt;, July 8, 2025, &lt;a href="https://www.indiewire.com/gallery/best-films-unavailable-streaming/blonde-venus-from-left-sidney-blackmer-marlene-dietrich-1932/"&gt;https://www.indiewire.com/gallery/best-films-unavailable-streaming/blonde-venus-from-left-sidney-blackmer-marlene-dietrich-1932/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Kyle Barr, “Steam Finally Makes It Clear You Don’t Own Your Games,” &lt;em&gt;Gizmodo&lt;/em&gt;, October 11, 2024, &lt;a href="https://gizmodo.com/steam-finally-makes-it-clear-you-dont-own-your-games-2000511155"&gt;https://gizmodo.com/steam-finally-makes-it-clear-you-dont-own-your-games-2000511155&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;Joel Johnson, “You Don’t Own Your Kindle Books, Amazon Reminds Customer,” &lt;em&gt;NBC News&lt;/em&gt;, October 24, 2012, &lt;a href="https://www.nbcnews.com/technolog/you-dont-own-your-kindle-books-amazon-reminds-customer-1c6626211"&gt;https://www.nbcnews.com/technolog/you-dont-own-your-kindle-books-amazon-reminds-customer-1c6626211&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Street Photography in Chongqing</title><link>https://rb.ax/blog/street-photography-in-chongqing/</link><pubDate>Tue, 22 Jul 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/street-photography-in-chongqing/</guid><description>&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001184-featured_hu_2d5a809fb226355b.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001184-featured_hu_2a0094a9a390f976.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001184-featured_hu_d726fd878f5b3f76.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001184-featured_hu_ae8fb1a50229baf5.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001184-featured_hu_68a70b16291a4ca5.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001184-featured_hu_2639ac2e28557926.jpg"loading="eager"
 decoding="sync"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Chongqing (重庆市) has taken the triple crown of sweatiest, most crowded, and hectic place I&amp;rsquo;ve ever been to in my entire life. Traversing the heart of the city near the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区), over the Qiansimen Bridge (千厮门大桥), and Times Square (时代广场) is otherworldly. All the traits of the city come together to create a visual experience that more closely resembles the video game &lt;em&gt;Cyberpunk 2077&lt;/em&gt;. Walking up and down levels of the city, each with their own roadways and railways, is mind bending in that the concept of ground level becomes a relative term. Add on the neon lit skyscrapers and crush of people and you have a mega city from the future.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A plaza near Regent Chongqing (重庆丽晶酒店)."&gt;
 &lt;img
 alt="A plaza near Regent Chongqing (重庆丽晶酒店)."
 title="A plaza near Regent Chongqing (重庆丽晶酒店)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001015_hu_7a5cc4a0b7dcff7f.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001015_hu_80375439d196d0ee.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001015_hu_2935d5c7d76ca796.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001015_hu_190c9e2b31d7a704.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001015_hu_4253767c15d45391.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001015_hu_8c31c3ce1039f86.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."&gt;
 &lt;img
 alt="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 title="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001042_hu_6232b6a15555441.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001042_hu_df25746fc65026f7.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001042_hu_a31f4d6094d350a4.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001042_hu_1181864f4bfc73ea.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001042_hu_246886829f3f33c.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-22_L1001042_hu_58a971182d12e6db.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A street vendor on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="A street vendor on the Qiansimen Bridge (千厮门大桥)."
 title="A street vendor on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001099_hu_7563cb214808ad2e.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001099_hu_350348daf6a62297.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001099_hu_1c19db1909e5eb65.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001099_hu_377744ded9428f44.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001099_hu_ada669082cabcc13.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001099_hu_393e860e025a19fb.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A street vendor on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="A street vendor on the Qiansimen Bridge (千厮门大桥)."
 title="A street vendor on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001103_hu_a5bceaeb4e816869.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001103_hu_9cec9068ff8e663c.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001103_hu_3262ac6e2f12a282.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001103_hu_4fb0681bf0aa1e82.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001103_hu_31de461092d5a09a.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001103_hu_2a627faefbe6ab78.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="People on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="People on the Qiansimen Bridge (千厮门大桥)."
 title="People on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001104_hu_76181566ad5d8b33.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001104_hu_595ee7fb3a3d0c7e.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001104_hu_569ffdf01dca3c28.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001104_hu_e565e53f454ebee4.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001104_hu_3267052fb60259de.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001104_hu_f245830427d4f35e.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="People on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="People on the Qiansimen Bridge (千厮门大桥)."
 title="People on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001109_hu_6632c36030d8da20.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001109_hu_c39ff2a9184d7103.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001109_hu_5758a5b7fa8a14af.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001109_hu_d0faca609cd512a4.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001109_hu_7ea02bb062629a0e.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001109_hu_bf740b2305461e27.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="People on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="People on the Qiansimen Bridge (千厮门大桥)."
 title="People on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001113_hu_d52290cf663fcb68.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001113_hu_94e6d04e28be5e1e.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001113_hu_12ab34ad3e8b00fd.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001113_hu_c876286de95946db.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001113_hu_7359c96523772ead.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-23_L1001113_hu_a98443c13425aa6.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."&gt;
 &lt;img
 alt="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 title="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001167_hu_8b684e5715ea8742.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001167_hu_db1a10cc06aef707.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001167_hu_16e936ac22692ecf.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001167_hu_4969fab82cb3986b.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001167_hu_3872064198aae65.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001167_hu_49dc73258f719d7b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."&gt;
 &lt;img
 alt="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 title="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001169_hu_ab4f4b43d6b64032.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001169_hu_34b23c0a30273426.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001169_hu_7415835bec2f2bed.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001169_hu_9c06787d57adf4bd.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001169_hu_9c9db788a866843b.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001169_hu_ec22bcd4c66e3366.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."&gt;
 &lt;img
 alt="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 title="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001173_hu_96c8b3276e2b70fb.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001173_hu_de5c2f5296ae2826.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001173_hu_8b1c2ba05646f575.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001173_hu_d2813f9cbc270e76.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001173_hu_59e765f11e4941cf.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001173_hu_b560921744cdb451.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001177_hu_e8fced8073d6a534.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001177_hu_25cda815effe1948.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001177_hu_cb96197cb9f5e3b.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001177_hu_ea46526c8f39f721.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001177_hu_d114a1dba2591438.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001177_hu_932d7e5c45aa3500.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001179_hu_67b9239c666e95c1.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001179_hu_6622fa0688911cfe.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001179_hu_31709b8f3e8a4a3e.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001179_hu_5e508a91294520c6.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001179_hu_39f11cd3e232f201.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001179_hu_995806f73016d272.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001182_hu_f53f7da8983abfe4.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001182_hu_d51cc733d37599b8.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001182_hu_43d8346cd741f96a.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001182_hu_bd82457d4b557db0.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001182_hu_5e246a839db31b26.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001182_hu_50549fc5ead7a92c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."&gt;
 &lt;img
 alt="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 title="On the street above the Hongyadong Folk Custom Scene Area (洪崖洞民俗风貌区)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001183_hu_a69bcd47486a2477.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001183_hu_e3951cbd37e1cd56.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001183_hu_44d971eedd6e40c2.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001183_hu_ae83c113a90fd089.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001183_hu_2b33fe0146fbc636.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001183_hu_ca335bc3e6415fda.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001185_hu_a782c6965a609585.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001185_hu_bf508da4d77a5990.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001185_hu_ca19775d3220e0ca.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001185_hu_8f34754e00680cab.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001185_hu_7425c8095fcb4b20.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001185_hu_c43861ba65aa11c8.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001186_hu_e4690d52b6d05dd.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001186_hu_17bc578fa3aa7e89.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001186_hu_3aeb9c2507cb4a4f.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001186_hu_fe52c71ff2f048eb.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001186_hu_359ca08a91ce9b2e.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001186_hu_afeade9fec40c034.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."&gt;
 &lt;img
 alt="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 title="On a crowded pedestrian overpass near Chongqing&amp;rsquo;s Times Square (时代广场)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001190_hu_3012ff9e2264edde.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001190_hu_8faaf5cad68f6eb6.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001190_hu_bb9980bdff0f2ac3.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001190_hu_51d6ea340cb50ad9.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001190_hu_6948d5df2c1df399.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001190_hu_ecde8f794bfc782d.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Traffic on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="Traffic on the Qiansimen Bridge (千厮门大桥)."
 title="Traffic on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001196_hu_760ebaf7307a967.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001196_hu_8e5f040ea5946a95.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001196_hu_f5b36c0be5b91a89.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001196_hu_1b6a7a5dd4fbe73d.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001196_hu_1c1a0a4e4695ce21.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001196_hu_d323947d3cd3aaa9.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A street vendor on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="A street vendor on the Qiansimen Bridge (千厮门大桥)."
 title="A street vendor on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001198_hu_525463833ca5fb1b.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001198_hu_7ed2782f825b5a58.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001198_hu_33e863e8195e99dd.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001198_hu_7a280dacf9820ebc.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001198_hu_d303ba4195c3a720.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001198_hu_3500fae8b53d19e7.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Traffic on the Qiansimen Bridge (千厮门大桥)."&gt;
 &lt;img
 alt="Traffic on the Qiansimen Bridge (千厮门大桥)."
 title="Traffic on the Qiansimen Bridge (千厮门大桥)."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001200_hu_8ae490a87bedbfb7.webp 480w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001200_hu_4c78d784133a7ee1.webp 768w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001200_hu_9bf31fb95e71010e.webp 1024w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001200_hu_c47435e51da436fe.webp 1366w, https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001200_hu_d6ffb1881090bcfb.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/street-photography-in-chongqing/2025-07-24_L1001200_hu_e68693015190fce8.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;</description></item><item><title>Cisco Live 2025</title><link>https://rb.ax/blog/cisco-live-2025/</link><pubDate>Mon, 09 Jun 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/cisco-live-2025/</guid><description>&lt;p&gt;&lt;figure aria-label="Although Cisco Live suffers from zeitgeist mania, with this year being AI, there are still a lot of value from sessions and the tribal excitement of being with your industry peers."&gt;
 &lt;img
 alt="Although Cisco Live suffers from zeitgeist mania, with this year being AI, there are still a lot of value from sessions and the tribal excitement of being with your industry peers."
 title="Although Cisco Live suffers from zeitgeist mania, with this year being AI, there are still a lot of value from sessions and the tribal excitement of being with your industry peers."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-featured_hu_d34a70b5847283b8.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-featured_hu_ebfa67beda7ab6c6.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-featured_hu_4979d44e5779dfb3.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-featured_hu_fa7ead891d9a5224.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-featured_hu_8eb6fabffa5bb6c0.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-featured_hu_b6ebd0e0d440fbd6.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Although Cisco Live suffers from &lt;a href="https://www.reddit.com/r/networking/comments/1l83nqm/discouraged_at_cisco_live/"&gt;zeitgeist mania&lt;/a&gt;, with this year being AI, there are still a lot of value from sessions and the tribal excitement of being with your industry peers.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Either by outright luck or doing something correct at work, my management deemed me worthy to get sent to Cisco Live in San Diego. This was actually my first business trip despite being with my currently employer for a number of years. I was excited to experience the Network Engineering Mecca as I&amp;rsquo;ve been told by colleagues past and present that it was essential to attend at least once in your career.&lt;/p&gt;
&lt;p&gt;Cisco Live is formatted as a collection of curated classes, seminars, and labs over the course of a few days. Much of the content in all these categories is a hype-fest for Cisco products. But if you go into the conference with this perspective it won&amp;rsquo;t be as jarring and you can evaluate which events might be more worth your time rather than sitting through a useless sales pitch.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="I&amp;rsquo;ve heard of inter-switch links and inter-router links but this is the first time seeing inter-satellite links. Even better is that they&amp;rsquo;re entirely over lasers and are currently rated at 100Gbps."&gt;
 &lt;img
 alt="I’ve heard of inter-switch links and inter-router links but this is the first time seeing inter-satellite links. Even better is that they’re entirely over lasers and are currently rated at 100Gbps."
 title="I&amp;rsquo;ve heard of inter-switch links and inter-router links but this is the first time seeing inter-satellite links. Even better is that they&amp;rsquo;re entirely over lasers and are currently rated at 100Gbps."
 width="1600"
 height="859"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-starlink-architecture_hu_b4943a75744463d3.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-starlink-architecture_hu_26c881c1613317d0.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-starlink-architecture_hu_6090fac5afac66d4.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-starlink-architecture_hu_6755cbf9feebe4fe.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-starlink-architecture_hu_d361e2a8cc3a4fd3.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-starlink-architecture_hu_50f3cb4f933d69d2.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;I&amp;rsquo;ve heard of inter-switch links and inter-router links but this is the first time seeing inter-satellite links. Even better is that they&amp;rsquo;re entirely over lasers and are currently rated at 100Gbps.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;It was surprising to see how professional the conference was compared to the smaller, campy ones I had attended. There were many live commentary panels happening all over the conference building showcasing events for that day and had a seemingly national television quality equipment setup for all of them. Cisco even had a full audio and visual production staff at each of the sessions, which are &lt;a href="https://www.ciscolive.com/on-demand/on-demand-library.html#/"&gt;recorded and available&lt;/a&gt; if you have a Cisco account.&lt;/p&gt;
&lt;p&gt;Another part I wasn&amp;rsquo;t expecting was the provided breakfast and lunch each day. Considering the stereotypical perception of information technology workers eating junk food and being fat I went into the first meal not expecting much. But each meal was surprisingly healthy and delicious, which I hope is a reflection of the fading stereotype of IT workers being cranked on Mountain Dew an Doritos. The only time the food choices got lazy was on the last day of the conference, where breakfast was only cinnamon rolls and bananas. Not exactly ideal for someone watching their blood sugar. However, to Cisco&amp;rsquo;s credit, the last day of the conference was nearly a ghost town of attendance.&lt;/p&gt;
&lt;p&gt;From the classes I attended I&amp;rsquo;ve included a shortlist of which ones I found rewarding to me personally. If there were slides for the presentation they are linked. Keep that in mind if the urge to photograph each of the slides hits you in a particularly interesting class. Access to a PDF copy of the slides is always better than a blurry image taken from the back row.&lt;/p&gt;
&lt;h2 id="classes"&gt;&lt;a href="#classes"&gt;Classes&lt;/a&gt;&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKMSI-1000.pdf"&gt;BRKMSI-1000&lt;/a&gt; Connecting the unconnected with Starlink &amp;amp; Cisco validated solution&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKOPS-1009.pdf"&gt;BRKOPS-1009&lt;/a&gt; Dynamic Network Defense: Automating Traffic Engineering based on ThousandEyes Insights&lt;/li&gt;
&lt;li&gt;IBOSPG-2000 Let&amp;rsquo;s Talk Security: A Service Provider&amp;rsquo;s Perspective&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure aria-label="DDOS protection through a Remote Triggered Black Hole."&gt;
 &lt;img
 alt="DDOS protection through a Remote Triggered Black Hole."
 title="DDOS protection through a Remote Triggered Black Hole."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-rtbh-ddos_hu_5bf992e2764c1186.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-rtbh-ddos_hu_26f834e112a7f93.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-rtbh-ddos_hu_509ab66303670957.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-rtbh-ddos_hu_943f925859796920.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-rtbh-ddos_hu_88a0a138e67fc4a3.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-rtbh-ddos_hu_3af2b30053533d8d.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;DDOS protection through a &lt;a href="https://www.cisco.com/c/dam/en_us/about/security/intelligence/blackhole.pdf"&gt;Remote Triggered Black Hole&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKMSI-2005.pdf"&gt;BRKMSI-2005&lt;/a&gt; Internet Peering Design and Deployment&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKSPG-2080.pdf"&gt;BRKSPG-2080&lt;/a&gt; Architectural Best Practices for Ensuring High Availability of IOS XR IP/MPLS Backbone Networks&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure aria-label="From the BRKSPG-2080 class with a complex example to achieve high availability through path redundancy."&gt;
 &lt;img
 alt="From the BRKSPG-2080 class with a complex example to achieve high availability through path redundancy."
 title="From the BRKSPG-2080 class with a complex example to achieve high availability through path redundancy."
 width="1600"
 height="898"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-multi-plane-network_hu_954a475574c259b5.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-multi-plane-network_hu_912546f23088c1ca.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-multi-plane-network_hu_dbfe8b3b23da081c.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-multi-plane-network_hu_75ccbe76d9c61165.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-multi-plane-network_hu_341afe1c2a79dd69.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-multi-plane-network_hu_8504635d507c5e19.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;From the BRKSPG-2080 class with a complex example to achieve high availability through path redundancy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKAPP-2021.pdf"&gt;BRKAPP-2021&lt;/a&gt; Learnings Behind the Biggest Network Outages: Using ThousandEyes insights to improve IT resilience&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKENT-3219.pdf"&gt;BRKENT-3219&lt;/a&gt; Advanced Border Gateway Protocol&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure aria-label="BRKENT-3219 was my most technically fulfilling class of the conference. It went into the deep end of BGP with a lot of things to consider in real world scenarios."&gt;
 &lt;img
 alt="BRKENT-3219 was my most technically fulfilling class of the conference. It went into the deep end of BGP with a lot of things to consider in real world scenarios."
 title="BRKENT-3219 was my most technically fulfilling class of the conference. It went into the deep end of BGP with a lot of things to consider in real world scenarios."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-advanced-bgp_hu_80b0efe7fb10995f.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-advanced-bgp_hu_ac501fefbcca0f16.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-advanced-bgp_hu_50bfe4025e43095f.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-advanced-bgp_hu_be3cae389d823532.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-advanced-bgp_hu_e3797ebba5716e39.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-advanced-bgp_hu_591c2052d195e0a2.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;BRKENT-3219 was my most technically fulfilling class of the conference. It went into the deep end of BGP with a lot of things to consider in real world scenarios.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/CISCOU-1057.pdf"&gt;CISCOU-1057&lt;/a&gt; Packets in Space: Networking for the Final Frontier&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKMPL-2103.pdf"&gt;BRKMPL-2103&lt;/a&gt; Mastering BGP: A Deep Dive into Basics and Design Best Practices for BGP and L3VPN&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure aria-label="The biggest tease of the conference was a presentation from Blue Origin. Their presentation was mainly about the challenges of hardware suitable for a space rocket. However, they couldn&amp;rsquo;t go into specifics in any real amount due to proprietary restrictions."&gt;
 &lt;img
 alt="The biggest tease of the conference was a presentation from Blue Origin. Their presentation was mainly about the challenges of hardware suitable for a space rocket. However, they couldn’t go into specifics in any real amount due to proprietary restrictions."
 title="The biggest tease of the conference was a presentation from Blue Origin. Their presentation was mainly about the challenges of hardware suitable for a space rocket. However, they couldn&amp;rsquo;t go into specifics in any real amount due to proprietary restrictions."
 width="1600"
 height="895"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-blue-origin_hu_2dc049794c993034.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-blue-origin_hu_ee00ec31ae5052ab.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-blue-origin_hu_bc75e5cb9a459508.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-blue-origin_hu_8b64cb828dd613cd.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-blue-origin_hu_7f152c71996d40f1.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-blue-origin_hu_5510a580fcbdd09.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The biggest tease of the conference was a presentation from Blue Origin. Their presentation was mainly about the challenges of hardware suitable for a space rocket. However, they couldn&amp;rsquo;t go into specifics in any real amount due to proprietary restrictions.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKSEC-2499.pdf"&gt;BRKSEC-2499&lt;/a&gt; Are You Prepared for the Next Typhoon?&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ciscolive.com/c/dam/r/ciscolive/global-event/docs/2025/pdf/BRKMSI-1001.pdf"&gt;BRKMSI-1001&lt;/a&gt; Secure the Network Edge against the DDoS Attacks!&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There were certainly several themes that carried over among all of the classes. This was either through a collective effort by Cisco to urge and guide the industry or just separate teams identifying similarly important topics. The first was with authentication, both locally and through BGP peering. To illustrate the vulnerability during class, the instructor asked if someone could reveal the type 7 password on the screen. Within about 30 seconds someone had revealed the actual password with little more effort than a Google search and a &lt;a href="https://www.firewall.cx/cisco/cisco-routers/cisco-type7-password-crack.html"&gt;simple web page utility&lt;/a&gt;.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;username admin password 7 xxxxxxxxxxxxxx
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;The scary part is that this password type is still used in some environments. Perhaps through technical debt, being under staffed, or neglect, it leaves a stark vulnerability for a network compromise. Per the NSA, the recommended password type is &lt;a href="https://media.defense.gov/2022/Feb/17/2002940795/-1/-1/1/CSI_CISCO_PASSWORD_TYPES_BEST_PRACTICES_20220217.PDF"&gt;currently 8&lt;/a&gt;, with 0, 4, and 7 marked as DO NOT USE.&lt;/p&gt;
&lt;p&gt;Many classes expanded from this basic password hygiene to full system approaches like the &lt;a href="https://sec.cloudapps.cisco.com/security/center/resources/Cisco-IOS-XR-HardeningGuide"&gt;Cisco IOS XR Software Hardening Guide&lt;/a&gt;. But the instructors didn&amp;rsquo;t spend much time besides highlighting that the guide was available to be used later on for engineers. One interesting perspective a few instructors shared is that the future approach by Cisco will be secure by default and only unsecured with configuration. So rather than ship a new router with telnet enabled, it will be disabled along with many other unsecure protocols or features. This methodology is in direct response to regulations coming out of the European Union and India, among others, to increase information technology security. By shipping secure, Cisco will defer the later unsecure configuration to the entities purchasing their products. Or another hope is to simply secure by attrition.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="There were clever and fun ways that vendors built up engagement. Forward Networks had a full on Casino."&gt;
 &lt;img
 alt="There were clever and fun ways that vendors built up engagement. Forward Networks had a full on Casino."
 title="There were clever and fun ways that vendors built up engagement. Forward Networks had a full on Casino."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-forward-casino_hu_df4df4c53af65504.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-forward-casino_hu_18f44e3558d79728.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-forward-casino_hu_c6fbe9286f6d0866.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-forward-casino_hu_15c28e51d1bf0fed.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-forward-casino_hu_b02715ca242c67e8.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-forward-casino_hu_fd0a29d2936491d5.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;There were clever and fun ways that vendors built up engagement. Forward Networks had a full on Casino.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;In the vein of better authentication tools, BGP TCP Authentication Option (AO) was frequently brought up as the new best thing for secure peering. Defined in RFC 5925, TCP AO adds a number of things that improve peering security over the older MD5 style. You can run a keychain with several keys that rotate over time. Meaning you could arguably update one of those keys without directly impacting BGP peering. Doing that with MD5 would cause a peer flap and can be disruptive. TCP AO also supports HMAC-SHA1 and AES-128-CMAC algorithms. Lastly, adding the TCP element to this allows for sequence tracking during the peering conversation, which can protect against replay attacks since you need to know the exact sequence to spoof a specific peer.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="An interesting real world application of enterprise networking was this Crisis Response Vehicle that gets deployed to emergency locations. With a satellite uplink it can provide Wi-Fi services in places where infrastracture has been damaged or destroyed."&gt;
 &lt;img
 alt="An interesting real world application of enterprise networking was this Crisis Response Vehicle that gets deployed to emergency locations. With a satellite uplink it can provide Wi-Fi services in places where infrastracture has been damaged or destroyed."
 title="An interesting real world application of enterprise networking was this Crisis Response Vehicle that gets deployed to emergency locations. With a satellite uplink it can provide Wi-Fi services in places where infrastracture has been damaged or destroyed."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-response-vehicle_hu_64fb587731fff4f3.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-response-vehicle_hu_5b37e81c99b10380.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-response-vehicle_hu_4a92e70efc46242a.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-response-vehicle_hu_a04001f09c4e86e0.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-response-vehicle_hu_b5b6d0304029dd6c.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-response-vehicle_hu_794416c7fe31aa5b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;An interesting real world application of enterprise networking was this Crisis Response Vehicle that gets deployed to emergency locations. With a satellite uplink it can provide Wi-Fi services in places where infrastracture has been damaged or destroyed.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="I have modified my own 4Runner quite extensively but it was great to see this taken exponentially further with a full server rack in the Crisis Response Vehicle."&gt;
 &lt;img
 alt="I have modified my own 4Runner quite extensively but it was great to see this taken exponentially further with a full server rack in the Crisis Response Vehicle."
 title="I have modified my own 4Runner quite extensively but it was great to see this taken exponentially further with a full server rack in the Crisis Response Vehicle."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-vehicle-interior_hu_2b92a6d922a7d3ab.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-vehicle-interior_hu_5e4a4a7265d0acde.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-vehicle-interior_hu_db302229a10563f8.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-vehicle-interior_hu_dcccf9f61812aa9b.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-vehicle-interior_hu_afcd694f7f69065b.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-crisis-vehicle-interior_hu_8a76297b1965d1bb.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;I have modified my own 4Runner quite extensively but it was great to see this taken exponentially further with a full server rack in the Crisis Response Vehicle.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The exciting extension to the RPKI ROA architecture called &lt;a href="https://www.arin.net/resources/manage/rpki/aspa/"&gt;Autonomous System Provider Authorization&lt;/a&gt; (ASPA), was mentioned in a few classes and I even got to try it out in my lab course. While still in the very early stages of public deployment and adoption, it addresses an easy vulnerability to a ROA. Although you can publicly declare to the world that you own a specific prefix with a published ROA, it doesn&amp;rsquo;t specifically restrict the BGP AS path to get to that prefix. Only the final AS in the path. A hijacker could theoretically announce your prefix with 1 extra AS in the path to attract traffic.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="It was great to see a work colleague be part of a fireside panel during the conference."&gt;
 &lt;img
 alt="It was great to see a work colleague be part of a fireside panel during the conference."
 title="It was great to see a work colleague be part of a fireside panel during the conference."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-fireside-chat_hu_355c93ee9be840f2.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-fireside-chat_hu_fa610e73585ae997.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-fireside-chat_hu_3be3f2b1e077e706.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-fireside-chat_hu_6bf8b22c3acb1a85.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-fireside-chat_hu_abf4f8573a6a9aab.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-fireside-chat_hu_6b7ecb0ae691cea5.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;It was great to see a work colleague be part of a fireside panel during the conference.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;ASPA addresses this vulnerability by further defining the AS path and which providers are authorized to announce your prefixes. With it, you can define your service providers for the prefixes you own. It doesn&amp;rsquo;t cover the full AS path across the entire internet because the different paths are nearly infinite, however, it cements the important parts of the possible AS paths.&lt;/p&gt;
&lt;p&gt;The concept of evaluating ASPA validity was conveyed to me in an interesting way through physical peaks and valleys. In this concept, the peaks are so called tier 1 service providers and the valleys are the so called access autonomous systems. In a valid ASPA path the &lt;em&gt;valleys&lt;/em&gt; are limited to the beginning and end with the middle consisting of only service provider &lt;em&gt;peaks&lt;/em&gt;.&lt;/p&gt;
&lt;h2 id="after-hours"&gt;&lt;a href="#after-hours"&gt;After Hours&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Only about half of the events happen during normal hours at Cisco Live. After classes and seminars are done for the day everyone migrates to the the restaurants and bars in downtown San Diego. It&amp;rsquo;s quite comical to see the flood of Cisco Live backpack wearing individuals spill out of the convention center and funnel to different locations. Step into any restaurant nearby and you&amp;rsquo;d see tables and tables of social networking in play.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Late in the evening at a vendor sponsored event at a prohibition themed bar."&gt;
 &lt;img
 alt="Late in the evening at a vendor sponsored event at a prohibition themed bar."
 title="Late in the evening at a vendor sponsored event at a prohibition themed bar."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-after-hours_hu_d4ad9818d9a9f356.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-after-hours_hu_8d14075f7a63233d.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-after-hours_hu_37ee27c7bd197c61.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-after-hours_hu_537fd95bbda12904.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-after-hours_hu_478482e76bb48b2c.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-after-hours_hu_79f6bfc5a71b8f5e.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Late in the evening at a vendor sponsored event at a prohibition themed bar.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;While I&amp;rsquo;m a fan of computer networking and not necessarily social networking I still found the interactions rather fascinating. The interplay between vendors and clients on the ground was entertaining to say the least.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The band The Killers performing for the Cisco Live crowd."&gt;
 &lt;img
 alt="The band The Killers performing for the Cisco Live crowd."
 title="The band The Killers performing for the Cisco Live crowd."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-the-killers_hu_75ae92d3494d702.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-the-killers_hu_f3cd9f6f5e57c3d6.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-the-killers_hu_2b340aae5a5b318b.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-the-killers_hu_8fe57129d747774b.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-the-killers_hu_d2f99f18ac839783.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-the-killers_hu_5da4badf39c7c7f6.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The band &lt;em&gt;The Killers&lt;/em&gt; performing for the Cisco Live crowd.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="It wasn&amp;rsquo;t your typical high energy concert crowd since no one specifically bought tickets to see them but it was a great time nonetheless."&gt;
 &lt;img
 alt="It wasn’t your typical high energy concert crowd since no one specifically bought tickets to see them but it was a great time nonetheless."
 title="It wasn&amp;rsquo;t your typical high energy concert crowd since no one specifically bought tickets to see them but it was a great time nonetheless."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/cisco-live-2025/cisco-live-concert_hu_8517dce332f7cc9a.webp 480w, https://rb.ax/blog/cisco-live-2025/cisco-live-concert_hu_5e68683db117897e.webp 768w, https://rb.ax/blog/cisco-live-2025/cisco-live-concert_hu_536b5b6e1c1b3b4a.webp 1024w, https://rb.ax/blog/cisco-live-2025/cisco-live-concert_hu_3e53e5177f21fd1e.webp 1366w, https://rb.ax/blog/cisco-live-2025/cisco-live-concert_hu_7aee269bc03232ec.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/cisco-live-2025/cisco-live-concert_hu_4d412cad17238f5c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;It wasn&amp;rsquo;t your typical high energy concert crowd since no one specifically bought tickets to see them but it was a great time nonetheless.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;</description></item><item><title>Would China Target Taiwan’s Submarine Internet Cables During Invasion?</title><link>https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/</link><pubDate>Fri, 18 Apr 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/</guid><description>&lt;p&gt;&lt;figure aria-label="Map of major international submarine internet cables near Taiwan. Source: TeleGeography."&gt;
 &lt;img
 alt="Map of major international submarine internet cables near Taiwan. Source: TeleGeography."
 title="Map of major international submarine internet cables near Taiwan. Source: TeleGeography."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/taiwan-submarine-cable-map-featured_hu_2b8d3aad7bd68488.webp 480w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/taiwan-submarine-cable-map-featured_hu_6f01011cef4778ce.webp 768w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/taiwan-submarine-cable-map-featured_hu_bccdddd702f0986f.webp 1024w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/taiwan-submarine-cable-map-featured_hu_2a167f6354cbbf5.webp 1366w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/taiwan-submarine-cable-map-featured_hu_28452e52491f456b.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/taiwan-submarine-cable-map-featured_hu_4d780483db47f9c9.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Map of major international submarine internet cables near Taiwan. Source: &lt;a href="https://submarine-cable-map-2024.telegeography.com/"&gt;TeleGeography&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The seemingly ever present threat of China invading Taiwan stands as one of the most critical and closely watched geopolitical flashpoints globally. Decades of political separation between the People&amp;rsquo;s Republic of China (PRC) and Taiwan, coupled with Beijing&amp;rsquo;s unwavering claim of sovereignty over the island and its refusal to renounce the use of force, creates an undying risk of conflict.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; This risk is amplified by the PRC&amp;rsquo;s extensive military modernization program, which has been significantly driven by the objective of developing capabilities to compel unification with Taiwan, potentially through coercion or outright invasion.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Among the most vital components of modern global infrastructure are submarine communication cables. These undersea fiber optic networks serve as the backbone of the internet and international communications, carrying an estimated 95 to 99 percent of all intercontinental data traffic.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; They facilitate trillions of dollars in financial transactions daily&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; and are essential for global commerce, scientific collaboration, government operations, and military command and control.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; Despite their criticality, these cables are inherently vulnerable due to their physical fragility and unguarded presence. They lie exposed on the seabed floor and can be damaged from natural events or accidental or even intentional human activities. The worst part of all is that they often converge at a limited number of terrestrial landing stations in a choke point that creates a lucrative target during any conflict. Balancing this extreme importance and physical vulnerability places submarine cable security at the center of strategic considerations in potential conflict scenarios, particularly those involving highly digitized economies and potential maritime battlegrounds like the Taiwan Strait. The reliance is not merely economic. Military and governmental communications heavily depend on these commercial networks.&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Based on the criticality of Taiwan’s submarine internet cables how likely is it that the PRC would deliberately target and sever Taiwan&amp;rsquo;s submarine internet cables during a potential invasion or blockade scenario? One key way of answering this hypothetical is attempting to understand Beijing&amp;rsquo;s strategic calculus, including PLA doctrine regarding information warfare and critical infrastructure attacks. Additionally, what are the technical capabilities of the PLA Navy for undersea operations when compared to Taiwan&amp;rsquo;s specific vulnerabilities and resiliency measures?&lt;/p&gt;
&lt;p&gt;Understanding the potential for PRC to target Taiwan&amp;rsquo;s submarine communication cables requires an attempt to understand the doctrinal foundations of the PLA’s approach to modern warfare, specifically for information dominance and operations against critical infrastructure. The Taiwan scenario remains the &amp;ldquo;primary driver”&lt;sup id="fnref1:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; for PLA modernization efforts and its principal contingency focus, shaping force development, training, and strategic thought for decades. Statements by Xi Jinping have consistently underscored the military dimensions of the Taiwan issue, reinforcing the PLA&amp;rsquo;s mandate to prepare for coercion or forceful reunification.&lt;sup id="fnref2:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Central to the PLA&amp;rsquo;s contemporary warfighting philosophy is the concept of “information warfare&amp;rdquo; (信息化战争, Xìnxī huà zhànzhēng) and &amp;ldquo;systems confrontation&amp;rdquo; (体系对抗, Tǐxì duìkàng).&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; These concepts were formed and heavily influenced by observations of U.S. military operations since the 1991 Gulf War. Subsequently, the PLA has shifted focus from traditional attrition warfare aimed at annihilating enemy forces to a strategy centered on disrupting, paralyzing, or destroying the adversary&amp;rsquo;s entire operational system.&lt;sup id="fnref1:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; Information Warfare emphasizes that information dominance is a prerequisite for success across all domains including land, sea, air, space, and cyberspace.&lt;sup id="fnref2:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; Victory through informational warfare is achieved not just by destroying material means, but by disrupting the adversary&amp;rsquo;s ability to acquire, transmit, process, and utilize information effectively. Influential PLA texts like the 2020 Science of Military Strategy assert that winning information warfare is the &amp;ldquo;fundamental function”&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; of the military and that all modern warfare is essentially information warfare. The method for achieving victory in this context is termed &amp;ldquo;system destruction warfare&amp;rdquo; (体系破击战, Tǐxì pò jí zhàn), which involves targeting critical nodes and functions within the enemy&amp;rsquo;s operational system to induce paralysis or collapse.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Within this warfare framework, the PLA has developed specific campaign concepts relevant to a Taiwanese scenario, most notably the &amp;ldquo;joint blockade campaign&amp;rdquo; (联合封锁战役, Liánhé fēngsuǒ zhànyì).&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt; Described in authoritative sources like the 2006 PLA National Defense University&amp;rsquo;s Science of Campaigns, this concept envisions a large-scale, potentially long-term operation aimed at isolating Taiwan by asserting air, maritime, and information dominance.&lt;sup id="fnref:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; Crucially, this campaign explicitly includes not only traditional blockade actions like intercepting ships and aircraft, but also firepower strikes against key facilities like ports or airfields, mining maritime approaches, and conducting both kinetic and non-kinetic attacks on information systems and infrastructure.&lt;sup id="fnref1:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; Such a blockade could serve as a coercive measure short of actual invasion, a preparatory phase for an amphibious landing, or a primary means to achieve victory by strangling Taiwan into submission.&lt;sup id="fnref2:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Amphibious armored infantry fighting vehicles (IFV) of an army brigade under the PLA Eastern Theater Command form battle formations in waves during a maritime combat training exercise on June 30, 2022. Source: eng.chinamil.com.cn/Photo by Peng Zhifu."&gt;
 &lt;img
 alt="Amphibious armored infantry fighting vehicles (IFV) of an army brigade under the PLA Eastern Theater Command form battle formations in waves during a maritime combat training exercise on June 30, 2022. Source: eng.chinamil.com.cn/Photo by Peng Zhifu."
 title="Amphibious armored infantry fighting vehicles (IFV) of an army brigade under the PLA Eastern Theater Command form battle formations in waves during a maritime combat training exercise on June 30, 2022. Source: eng.chinamil.com.cn/Photo by Peng Zhifu."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-amphibious-IFVs-in-training-exercise_hu_acfe379c983c952a.webp 480w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-amphibious-IFVs-in-training-exercise_hu_f4579458b0bfa312.webp 768w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-amphibious-IFVs-in-training-exercise_hu_954d9b130b442d17.webp 1024w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-amphibious-IFVs-in-training-exercise_hu_468eb2bc73695e09.webp 1366w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-amphibious-IFVs-in-training-exercise_hu_7091d857a3e5d56c.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-amphibious-IFVs-in-training-exercise_hu_9184750fc1b9bceb.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Amphibious armored infantry fighting vehicles (IFV) of an army brigade under the PLA Eastern Theater Command form battle formations in waves during a maritime combat training exercise on June 30, 2022. Source: &lt;a href="http://eng.chinamil.com.cn/MEDIA/PhotosChina/10172482.html"&gt;eng.chinamil.com.cn/Photo by Peng Zhifu&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The PLA&amp;rsquo;s doctrinal emphasis on information dominance and system disruption directly implies the targeting of communication infrastructure. PLA writings explicitly mention targeting long-haul communications facilities, including satellite ground stations and undersea cable landing sites, as part of the initial strikes in a blockade scenario aimed at severing Taiwan&amp;rsquo;s external communications.&lt;sup id="fnref3:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; Beyond these explicit mentions, the broader concepts of &amp;ldquo;systems destruction warfare&amp;rdquo; and “information warfare&amp;rdquo; inherently encompass critical communication nodes like submarine cables. Targeting these cables aligns with the doctrinal goals of degrading information flow within Taiwan’s information system architecture.&lt;sup id="fnref3:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;All of the PLA’s doctrinal proclamations clearly indicate a specific approach towards prioritizing the disruption of an adversary&amp;rsquo;s information systems as a central element of modern warfare. Concepts like “information warfare&amp;quot; and &amp;ldquo;systems destruction,&amp;rdquo; particularly when applied within the framework of a &amp;ldquo;joint blockade campaign&amp;rdquo; against Taiwan, strongly suggest that critical communication infrastructure, including submarine internet cables, are considered legitimate and important targets. This doctrinal emphasis points to consider attacks on Taiwan&amp;rsquo;s vital communication links as extremely likely, and perhaps an essential component of any future conflict scenario.&lt;/p&gt;
&lt;p&gt;China possesses or is developing sophisticated technologies for undersea operations relevant to cable disruption. Research conducted at institutions with strong defense ties, such as Harbin Engineering University and the Ocean University of China, has focused on enhancing the ability to locate undersea cables, even those buried beneath the seabed. Methods include algorithmically enhanced robotics employing novel magnetic induction techniques and advanced sonar systems combining multiple technologies for improved detection and navigation to fault sites.&lt;sup id="fnref:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; While often framed for civilian applications like infrastructure maintenance or offshore wind farm support, these localization technologies have clear dual-use potential for military purposes, including identifying cables for surveillance or sabotage.&lt;sup id="fnref1:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;On a more basic approach, China has demonstrated capabilities for cutting submarine internet cables. Patents filed by PLA affiliated bodies, such as the PLA Navy Institute of Communication Application and the PLA Naval University of Engineering, explicitly describe devices for shearing deep sea optical cables and retrieving them, strongly suggesting military intent for sabotage or tapping.&lt;sup id="fnref2:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; Civilian institutions and companies, like Lishui University and Zhuhai Yunzhou Intelligence Technology, have also patented towed or deployable cutting devices, purportedly for emergency repairs or salvage but readily adaptable for military or gray zone use.&lt;sup id="fnref3:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; Recent reports highlight the development of a deep sea tool, potentially ship deployed, capable of cutting heavily fortified cables at depths up to 4,000 meters.&lt;sup id="fnref1:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; While the necessity for such extreme depth and cutting power against typical unarmored deep-sea cables is questionable,&lt;sup id="fnref:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt; the capability itself represents a significant advancement. Specialized surface vessels such as research ships or cable layers and potentially subsurface platforms like submarines (similar to Russia&amp;rsquo;s AS-31 Losharik&lt;sup id="fnref:14"&gt;&lt;a href="#fn:14" class="footnote-ref" role="doc-noteref"&gt;14&lt;/a&gt;&lt;/sup&gt;) or unmanned underwater vehicles&lt;sup id="fnref4:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; could be employed to deploy these infrastructure interference tools.&lt;/p&gt;
&lt;p&gt;Perhaps the most compelling evidence of China&amp;rsquo;s capability and potential willingness to interfere with undersea cables comes from numerous documented incidents in recent years, particularly because they employ &amp;ldquo;gray zone&amp;rdquo; tactics. These involve actions below the threshold of armed conflict, often designed to be ambiguous and deniable.&lt;sup id="fnref1:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; Multiple incidents near Taiwan have been attributed by Taiwanese authorities to Chinese fishing boats or cargo ships. These specifically include the severing of both cables connecting the Matsu Islands on February 12, 2023 &lt;sup id="fnref2:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; and subsequent incidents near Taiwan proper with cables off the coast of Penghu&lt;sup id="fnref:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; and Keelung.&lt;sup id="fnref:16"&gt;&lt;a href="#fn:16" class="footnote-ref" role="doc-noteref"&gt;16&lt;/a&gt;&lt;/sup&gt; Similar incidents in the Baltic Sea, involving &lt;a href="https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/"&gt;C-Lion1 and BCS East-West Interlink cables&lt;/a&gt;, have also implicated Chinese-flagged or associated vessels, sometimes operating out of Russian ports.&lt;sup id="fnref1:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="China&amp;rsquo;s newly publicized barges, which link up to form a bridge, could give China a way to land large numbers of vehicles and troops on Taiwan, solving a major logistical problem. Source: Composite image from a video posted on Weibo via Chinese state media via The New York Times."&gt;
 &lt;img
 alt="China’s newly publicized barges, which link up to form a bridge, could give China a way to land large numbers of vehicles and troops on Taiwan, solving a major logistical problem. Source: Composite image from a video posted on Weibo via Chinese state media via The New York Times."
 title="China&amp;rsquo;s newly publicized barges, which link up to form a bridge, could give China a way to land large numbers of vehicles and troops on Taiwan, solving a major logistical problem. Source: Composite image from a video posted on Weibo via Chinese state media via The New York Times."
 width="1600"
 height="670"srcset="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-barges_hu_aeb26cfca8c01f18.webp 480w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-barges_hu_91302e22c4b23dc7.webp 768w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-barges_hu_4aae3acc641530f0.webp 1024w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-barges_hu_bf33d9a636de1a13.webp 1366w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-barges_hu_e0d3aec420501d08.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-barges_hu_f48ee7f463dbfb9.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;China&amp;rsquo;s newly publicized barges, which link up to form a bridge, could give China a way to land large numbers of vehicles and troops on Taiwan, solving a major logistical problem. Source: &lt;a href="https://www.nytimes.com/2025/04/01/world/asia/china-invasion-barges-taiwan.html"&gt;Composite image from a video posted on Weibo via Chinese state media via &lt;em&gt;The New York Times&lt;/em&gt;&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;These incidents often involve methods that mimic common accidents, such as anchors being dragged across cables.&lt;sup id="fnref2:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; The use of civilian vessels, sometimes operating under flags of convenience or engaging in identity tampering including manipulating AIS transmissions or using multiple identities,&lt;sup id="fnref3:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; provides a crucial layer of plausible deniability.&lt;sup id="fnref3:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; While definitive proof of state direction is often elusive, the pattern, frequency, location proximity to sensitive areas and critical infrastructure, and alignment with China&amp;rsquo;s broader strategic interests strongly suggest intentionality in many cases.&lt;sup id="fnref4:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;This pattern of repeated, deniable disruptions serves multiple purposes. It allows China to test adversary responses, probe vulnerabilities in detection and repair capabilities, exert psychological pressure, and potentially normalize such incidents as mere accidents.&lt;sup id="fnref4:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; By demonstrating the capability and willingness to interfere with critical infrastructure in peacetime or low-level crises, China may be lowering the perceived threshold for employing similar scaled-up tactics during a future conflict while aiming to maintain ambiguity and control escalation.&lt;/p&gt;
&lt;p&gt;Taiwan&amp;rsquo;s position as a modern, technologically advanced democracy and a linchpin in global supply chains is inextricably linked to its robust digital connectivity. This connectivity, however, relies overwhelmingly on a network of international submarine communication cables, creating significant strategic dependencies and vulnerabilities that could be exploited in a conflict scenario.&lt;/p&gt;
&lt;p&gt;Taiwan is connected to the global internet primarily through 15 international submarine internet cables.&lt;sup id="fnref5:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; This infrastructure provider over 100 Tbps of bandwidth to 21.71 million Taiwanese making it one of the world&amp;rsquo;s highest internet penetration rates.&lt;sup id="fnref:17"&gt;&lt;a href="#fn:17" class="footnote-ref" role="doc-noteref"&gt;17&lt;/a&gt;&lt;/sup&gt; This raw capability underpins virtually all aspects in critical industries like semiconductor manufacturing, financial services, government functions, military command and control, and daily civilian life.&lt;sup id="fnref6:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; The heavy reliance on a relatively small number of physical conduits creates a fundamental dependence on all mentioned sectors and any significant disruption to these cables could severely isolate the island digitally.&lt;sup id="fnref:18"&gt;&lt;a href="#fn:18" class="footnote-ref" role="doc-noteref"&gt;18&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Compounding this dependence is the geographic concentration of Taiwan&amp;rsquo;s cable infrastructure. Most of the submarine internet cables land in just three main areas: Toucheng in the northeast, Fangshan in the south, and the New Taipei/Tanshui area in the north.&lt;sup id="fnref7:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; This limited number of cable landing stations (CLS) creates critical choke points. A RAND study assessed that a successful attack on either the Toucheng or Fangshan landing sites could have a &amp;ldquo;sudden and calamitous effect&amp;rdquo; on Taiwan&amp;rsquo;s external communications.&lt;sup id="fnref:19"&gt;&lt;a href="#fn:19" class="footnote-ref" role="doc-noteref"&gt;19&lt;/a&gt;&lt;/sup&gt; Furthermore, analysis suggests that at least one CLS in Tanshui has been specifically identified as a point of interest tracked by a China affiliated entity, indicating potential hostile reconnaissance targeting these vulnerabilities.&lt;sup id="fnref:20"&gt;&lt;a href="#fn:20" class="footnote-ref" role="doc-noteref"&gt;20&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The economic stakes associated with Taiwan&amp;rsquo;s connectivity are immense, both domestically and globally. A disruption of Taiwan&amp;rsquo;s submarine cables would paralyze its digital economy, estimated to reach NT$6.5 trillion (USD $204 billion) by 2025.&lt;sup id="fnref:21"&gt;&lt;a href="#fn:21" class="footnote-ref" role="doc-noteref"&gt;21&lt;/a&gt;&lt;/sup&gt; Financial markets would be severely impacted, as demonstrated by slowdowns during the 2006 earthquake and disruptions to online banking seen during the Matsu cable cuts.&lt;sup id="fnref8:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; Interruptions could cost millions per hour.&lt;sup id="fnref:22"&gt;&lt;a href="#fn:22" class="footnote-ref" role="doc-noteref"&gt;22&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Crucially, Taiwan plays an indispensable role in the global semiconductor supply chain, producing the vast majority of the world&amp;rsquo;s most advanced logic chips and a significant share of chips for automotive and consumer electronics.&lt;sup id="fnref:23"&gt;&lt;a href="#fn:23" class="footnote-ref" role="doc-noteref"&gt;23&lt;/a&gt;&lt;/sup&gt; A blockade or conflict that severs Taiwan&amp;rsquo;s connectivity would halt this production and export, triggering catastrophic disruptions across numerous downstream industries worldwide, including electronics, automotive, computing, telecommunications, and medical devices.&lt;sup id="fnref1:23"&gt;&lt;a href="#fn:23" class="footnote-ref" role="doc-noteref"&gt;23&lt;/a&gt;&lt;/sup&gt; Economic modeling by institutions like the Rhodium Group, Bloomberg Economics, RAND, and the St. Louis Federal Reserve consistently projects global economic losses in the trillions of dollars from a Taiwan conflict scenario, largely driven by the interruption of the semiconductor supply chain reliant on Taiwan.&lt;sup id="fnref:24"&gt;&lt;a href="#fn:24" class="footnote-ref" role="doc-noteref"&gt;24&lt;/a&gt;&lt;/sup&gt; The Rhodium Group conservatively estimated that companies dependent on Taiwanese chips could lose $1.6 trillion in annual revenue during a blockade.&lt;sup id="fnref:25"&gt;&lt;a href="#fn:25" class="footnote-ref" role="doc-noteref"&gt;25&lt;/a&gt;&lt;/sup&gt; This highlights that targeting Taiwan&amp;rsquo;s cables is not just an attack on Taiwan itself, but potentially a potent form of global economic coercion. China could leverage the threat or act of cutting Taiwan&amp;rsquo;s cables to inflict widespread economic pain, potentially aiming to deter international intervention or sow discord among nations dependent on Taiwan&amp;rsquo;s technological outputs.&lt;sup id="fnref1:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Type 05 amphibious fighting vehicles assigned to the People&amp;rsquo;s Liberation Army&amp;rsquo;s 73rd Group Army in Xiamen, Fujian, China, take part in amphibious assault and live-firing exercises on May 12, 2021. Source: John Feng, “China Military’s Taiwan Invasion Force Conducts Amphibious Beach Assault Drills.”."&gt;
 &lt;img
 alt="Type 05 amphibious fighting vehicles assigned to the People’s Liberation Army’s 73rd Group Army in Xiamen, Fujian, China, take part in amphibious assault and live-firing exercises on May 12, 2021. Source: John Feng, “China Military’s Taiwan Invasion Force Conducts Amphibious Beach Assault Drills.”."
 title="Type 05 amphibious fighting vehicles assigned to the People&amp;rsquo;s Liberation Army&amp;rsquo;s 73rd Group Army in Xiamen, Fujian, China, take part in amphibious assault and live-firing exercises on May 12, 2021. Source: John Feng, “China Military’s Taiwan Invasion Force Conducts Amphibious Beach Assault Drills.”."
 width="1600"
 height="900"srcset="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-invasion-force-amphibious-firing-drills_hu_fb35efa75e60b758.webp 480w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-invasion-force-amphibious-firing-drills_hu_e7229e2af896b46.webp 768w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-invasion-force-amphibious-firing-drills_hu_de7279777fa9d823.webp 1024w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-invasion-force-amphibious-firing-drills_hu_19a5ba3bdc93efa0.webp 1366w, https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-invasion-force-amphibious-firing-drills_hu_b0414f6c235cfb01.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/would-china-target-taiwans-submarine-internet-cables-during-invasion/china-invasion-force-amphibious-firing-drills_hu_4d9886d6c23cfab0.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Type 05 amphibious fighting vehicles assigned to the People&amp;rsquo;s Liberation Army&amp;rsquo;s 73rd Group Army in Xiamen, Fujian, China, take part in amphibious assault and live-firing exercises on May 12, 2021. Source: &lt;a href="https://www.newsweek.com/china-military-taiwan-invasion-force-amphibious-beach-assault-drills-1594974"&gt;John Feng, “China Military’s Taiwan Invasion Force Conducts Amphibious Beach Assault Drills.”&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Severing Taiwan&amp;rsquo;s international communication links would have huge military implications. It would directly impede Taiwan&amp;rsquo;s ability to communicate and coordinate with external partners, primarily the United States, potentially delaying or complicating any international response or intervention efforts.&lt;sup id="fnref9:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; Active intelligence sharing and coordinated military actions rely heavily on secure, high-bandwidth communications, which are predominantly carried by commercial submarine internet cables.&lt;sup id="fnref1:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; Disrupting these links would force reliance on alternative systems like satellite communications, which offer significantly lower bandwidth and latency, may be more susceptible to jamming or kinetic attack, and could compromise operational security if forced onto less secure channels.&lt;sup id="fnref:26"&gt;&lt;a href="#fn:26" class="footnote-ref" role="doc-noteref"&gt;26&lt;/a&gt;&lt;/sup&gt; Isolating Taiwan digitally could also degrade its own military&amp;rsquo;s situational awareness, which would hinder its ability to mount a cohesive defense.&lt;sup id="fnref:27"&gt;&lt;a href="#fn:27" class="footnote-ref" role="doc-noteref"&gt;27&lt;/a&gt;&lt;/sup&gt; Furthermore, cutting external communication lines could create an environment ripe for psychological operations and disinformation campaigns, as Taiwan&amp;rsquo;s population and leadership would struggle to verify information or counter PLA propaganda effectively.&lt;sup id="fnref10:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Despite the potential military utility, attacking international submarine cables entails enormous risks for China. The primary deterrent is the potentially catastrophic global economic fallout.&lt;sup id="fnref2:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Given Taiwan&amp;rsquo;s critical role in global supply chains, particularly semiconductors, severing its links would likely trigger a global recession, severely damage China&amp;rsquo;s own economy, which relies heavily on international trade, and invite crippling international sanctions.&lt;sup id="fnref3:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Diplomatic consequences would likely include widespread condemnation, further isolation, and the potential formation of broad international coalitions aimed at constraining China&amp;rsquo;s power.&lt;sup id="fnref:28"&gt;&lt;a href="#fn:28" class="footnote-ref" role="doc-noteref"&gt;28&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Perhaps even more important, attacking internationally owned infrastructure carries a high risk of escalation.&lt;sup id="fnref2:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; Such actions could be interpreted as a direct attack on other nation state interests, potentially solidifying political will in Washington and allied capitals for direct military intervention or intensifying an ongoing intervention.&lt;sup id="fnref3:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; China&amp;rsquo;s leaders are likely aware that crossing this threshold could lead to a wider, more protracted, and potentially uncontrollable conflict with the United States, undermining their strategic objectives.&lt;sup id="fnref1:28"&gt;&lt;a href="#fn:28" class="footnote-ref" role="doc-noteref"&gt;28&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;However, some reviews suggest that if Beijing were to decide to initiate an invasion or full blockade, it would have already calculated and accepted enormous sunk cost that would include significant economic damage and becoming an international pariah.&lt;sup id="fnref4:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; Where catastrophic consequences are already anticipated, the marginal cost of adding cable cutting to the list of hostile actions might appear incredibly minor in Beijing&amp;rsquo;s calculus.&lt;sup id="fnref5:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; The perceived military necessity of isolating Taiwan quickly to achieve decisive victory before effective intervention could occur might override concerns about additional economic or diplomatic fallout.&lt;sup id="fnref:29"&gt;&lt;a href="#fn:29" class="footnote-ref" role="doc-noteref"&gt;29&lt;/a&gt;&lt;/sup&gt; The effectiveness of economic costs as a primary deterrent could be easily debatable. While generally significant,&lt;sup id="fnref2:28"&gt;&lt;a href="#fn:28" class="footnote-ref" role="doc-noteref"&gt;28&lt;/a&gt;&lt;/sup&gt; their marginal impact might decrease once a high-intensity conflict is already underway.&lt;sup id="fnref:30"&gt;&lt;a href="#fn:30" class="footnote-ref" role="doc-noteref"&gt;30&lt;/a&gt;&lt;/sup&gt; China&amp;rsquo;s ultimate decision would likely depend on its assessment of the specific circumstances, its risk tolerance, and its confidence in achieving its primary objectives swiftly.&lt;sup id="fnref1:29"&gt;&lt;a href="#fn:29" class="footnote-ref" role="doc-noteref"&gt;29&lt;/a&gt;&lt;/sup&gt; The potential for the conflict itself to cause such severe economic disruption that formal sanctions become somewhat ineffective is a factor that could paradoxically lower the threshold for cable attacks within an already escalated conflict, even as the overall economic consequences act as a deterrent against initiating the conflict in the first place.&lt;sup id="fnref1:30"&gt;&lt;a href="#fn:30" class="footnote-ref" role="doc-noteref"&gt;30&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Considering these competing factors, the likelihood of China launching widespread, easily attributable attacks against Taiwan&amp;rsquo;s &lt;em&gt;international&lt;/em&gt; submarine cables appears conditional and likely not a preferred opening move. While doctrinally sound from a PLA perspective and technically feasible, the immense potential for global economic disruption, severe diplomatic backlash, and uncontrollable military escalation makes it an extremely high-risk option. Such actions seem more plausible under more strained conditions if China felt bogged down in a protracted conflict and its initial objectives were failing. Alternatively, if China believes it can achieve a rapid victory before repercussions materialize it could be worth the plethora of costs with attacking submarine internet cables. The decision is heavily contingent on Beijing&amp;rsquo;s real-time assessment of the strategic environment, particularly the perceived resolve and appetite of the U.S. to intervene effectively.&lt;sup id="fnref4:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;However, the likelihood of selective targeting or the use of deniable, gray zone style disruptions appears considerably higher. China might prioritize targeting specific cables deemed less critical to major powers or focus attacks on landing stations within Taiwan&amp;rsquo;s territory, framing it as part of the direct assault on Taiwan rather than an attack on international infrastructure.&lt;sup id="fnref6:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; Employing tactics similar to those seen in the Matsu and Baltic incidents, using civilian vessels under ambiguous circumstances to cause “accidental” damage, remains a plausible scenario, especially in the lead-up to or early stages of a crisis, as it offers disruption while attempting to manage escalation and maintain deniability.&lt;sup id="fnref11:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Kevin Rudd, &amp;ldquo;The United States, China and Taiwan and the Role of Deterrence in Scenarios Short of War&amp;rdquo; (speech, Daniel K. Inouye Asia-Pacific Center for Security Studies, Honolulu, Hawaii, June 6, 2024), &lt;a href="https://usa.embassy.gov.au/APCSS24"&gt;https://usa.embassy.gov.au/APCSS24&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Joel Wuthnow, “System Overload: Can China’s Military Be Distracted in a War over Taiwan?,&amp;quot; &lt;em&gt;China Strategic Perspectives, No. 15&lt;/em&gt;, June 2020, &lt;a href="https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/china-perspectives-15.pdf"&gt;https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/china/china-perspectives-15.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Fern Hinrix, “Building Resilience in Taiwan’s Internet Infrastructure From Geopolitical Threats,&amp;quot; &lt;em&gt;The Henry M. Jackson School of International Studies&lt;/em&gt;,” May 21, 2024, &lt;a href="https://jsis.washington.edu/news/building-resilience-in-taiwans-internet-infrastructure-from-geopolitical-threats/"&gt;https://jsis.washington.edu/news/building-resilience-in-taiwans-internet-infrastructure-from-geopolitical-threats/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref5:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref6:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref7:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref8:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref9:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref10:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref11:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Erin Murphy and Matt Pearl, “China’s Underwater Power Play: The PRC’s New Subsea Cable-Cutting Ship Spooks International Security Experts,” &lt;em&gt;Center for Strategic &amp;amp; International Studies&lt;/em&gt;, April 4, 2025, &lt;a href="https://www.csis.org/analysis/chinas-underwater-power-play-prcs-new-subsea-cable-cutting-ship-spooks-international"&gt;https://www.csis.org/analysis/chinas-underwater-power-play-prcs-new-subsea-cable-cutting-ship-spooks-international&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Madison Long, “Information Warfare in the Depths: An Analysis of Global Undersea Cable Networks,” &lt;em&gt;U.S. Naval Institute&lt;/em&gt;, May 31, 2023, &lt;a href="https://www.usni.org/magazines/proceedings/2023/may/information-warfare-depths-analysis-global-undersea-cable-networks"&gt;https://www.usni.org/magazines/proceedings/2023/may/information-warfare-depths-analysis-global-undersea-cable-networks&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Colin Wall and Pierre Morcos, &amp;ldquo;Invisible and Vital: Undersea Cables and Transatlantic Security,&amp;rdquo; &lt;em&gt;Center for Strategic &amp;amp; International Studies&lt;/em&gt;, June 11, 2021, &lt;a href="https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security"&gt;https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;B. A. Friedman, “Finding the Right Model: The Joint Force, the People’s Liberation Army,” &lt;em&gt;Journal of Indo-Pacific Affairs&lt;/em&gt;, April 24, 2023, &lt;a href="https://www.airuniversity.af.edu/JIPA/Display/Article/3371164/finding-the-right-model-the-joint-force-the-peoples-liberation-army-and-informa/"&gt;https://www.airuniversity.af.edu/JIPA/Display/Article/3371164/finding-the-right-model-the-joint-force-the-peoples-liberation-army-and-informa/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Xiao Tianliang, Kang Wuchao, and Cai Renzhao, “Science of Military Strategy,” &lt;em&gt;China Aerospace Studies Institute&lt;/em&gt;, August 2020, &lt;a href="https://www.airuniversity.af.edu/Portals/10/CASI/documents/Translations/2022-01-26%202020%20Science%20of%20Military%20Strategy.pdf"&gt;https://www.airuniversity.af.edu/Portals/10/CASI/documents/Translations/2022-01-26%202020%20Science%20of%20Military%20Strategy.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Jeffrey Engstrom, &amp;ldquo;Systems Confrontation and System Destruction Warfare How the Chinese People&amp;rsquo;s Liberation Army Seeks to Wage Modern Warfare,&amp;rdquo; &lt;em&gt;RAND Corporation&lt;/em&gt;, February 1, 2018, &lt;a href="https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1708/RAND_RR1708.pdf"&gt;https://www.rand.org/content/dam/rand/pubs/research_reports/RR1700/RR1708/RAND_RR1708.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;U.S.-China Economic and Security Review Commission, &amp;ldquo;Chapter 8: China’s Evolving Counter-Intervention Capabilities and the Role of Indo-Pacific Allies,&amp;rdquo; in &lt;em&gt;2024 Report to Congress of the U.S.-China Economic and Security Review Commission&lt;/em&gt; (Washington, DC: U.S. Government Publishing Office, November 2024), &lt;a href="https://www.uscc.gov/sites/default/files/2024-11/Chapter_8--Chinas_Evolving_Counter-Intervention_Capabilities.pdf"&gt;https://www.uscc.gov/sites/default/files/2024-11/Chapter_8--Chinas_Evolving_Counter-Intervention_Capabilities.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:11"&gt;
&lt;p&gt;Lonnie Henley, “China Maritime Report No. 26: Beyond the First Battle: Overcoming a Protracted Blockade of Taiwan,” &lt;em&gt;China Maritime Studies Institute China Maritime Reports&lt;/em&gt;, March 2023, &lt;a href="https://digital-commons.usnwc.edu/cmsi-maritime-reports/26"&gt;https://digital-commons.usnwc.edu/cmsi-maritime-reports/26&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref5:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref6:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:12"&gt;
&lt;p&gt;Sunny Cheung and Cheryl Yu, “Creative Destruction: PRC Undersea Cable Technology,” &lt;em&gt;The Jamestown Foundation&lt;/em&gt;, January 16, 2025, &lt;a href="https://jamestown.org/program/creative-destruction-prc-undersea-cable-technology/"&gt;https://jamestown.org/program/creative-destruction-prc-undersea-cable-technology/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:13"&gt;
&lt;p&gt;Australian Naval Institute, &amp;ldquo;China’s cable cutting theatre,&amp;rdquo; &lt;em&gt;Australian Naval Institute&lt;/em&gt;, March 27, 2025, &lt;a href="https://navalinstitute.com.au/chinas-cable-cutting-theatre/"&gt;https://navalinstitute.com.au/chinas-cable-cutting-theatre/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:14"&gt;
&lt;p&gt;Harrison Kass, “AC-31 Losharik: Russia’S Secret Spy Submarine Is ‘Out of Action’ Due to a Fire,” &lt;em&gt;The National Interest&lt;/em&gt;, October 12, 2024, &lt;a href="https://nationalinterest.org/blog/buzz/ac-31-losharik-russias-secret-spy-submarine-out-action-due-fire-213195"&gt;https://nationalinterest.org/blog/buzz/ac-31-losharik-russias-secret-spy-submarine-out-action-due-fire-213195&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:14" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:15"&gt;
&lt;p&gt;bno Chennai bureau, “Chinese Threat to Submarine Cables Emerges in Indo-Pacific,” February 27, 2025, &lt;a href="https://www.bne.eu/chinese-threat-to-submarine-cables-emerges-in-indo-pacific-369355/"&gt;https://www.bne.eu/chinese-threat-to-submarine-cables-emerges-in-indo-pacific-369355/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref3:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref4:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:16"&gt;
&lt;p&gt;Maritime Executive, “Chinese Freighter Suspected of Severing Telecom Cable off Taiwan,” &lt;em&gt;The Maritime Executive&lt;/em&gt;, January 5, 2025, &lt;a href="https://maritime-executive.com/article/chinese-freighter-suspected-of-severing-telecom-cable-off-taiwan"&gt;https://maritime-executive.com/article/chinese-freighter-suspected-of-severing-telecom-cable-off-taiwan&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:16" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:17"&gt;
&lt;p&gt;Charles Mok and Kenny Huang, “The Most Critical Resilience Questions of Them All: Taiwan’s Undersea Cables,” &lt;em&gt;Taiwan Insight&lt;/em&gt;, October 2, 2024, &lt;a href="https://taiwaninsight.org/2024/10/02/the-most-critical-resilience-questions-of-them-all-taiwans-undersea-cables/"&gt;https://taiwaninsight.org/2024/10/02/the-most-critical-resilience-questions-of-them-all-taiwans-undersea-cables/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:17" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:18"&gt;
&lt;p&gt;Project 2049 Institute, “Undersea Cables: Taiwan’s Achilles Heel?,” &lt;em&gt;Project 2049 Institute&lt;/em&gt;, April 28, 2010, &lt;a href="https://project2049.net/2010/04/28/undersea-cables-taiwans-achilles-heel/"&gt;https://project2049.net/2010/04/28/undersea-cables-taiwans-achilles-heel/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:18" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:19"&gt;
&lt;p&gt;F. W. Lacroix et al., &amp;ldquo;A Concept of Operations for a New Deep-Diving Submarine,&amp;rdquo; report (RAND, 2001), &lt;a href="https://apps.dtic.mil/sti/tr/pdf/ADA411748.pdf"&gt;https://apps.dtic.mil/sti/tr/pdf/ADA411748.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:19" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:20"&gt;
&lt;p&gt;Christine McDaniel and Weifeng Zhong, “Submarine Cables and Container Shipments: Two Immediate Risks to the US Economy if China Invades Taiwan,” &lt;em&gt;Mercatus Center&lt;/em&gt;, August 29, 2022, &lt;a href="https://www.mercatus.org/research/policy-briefs/submarine-cables-and-container-shipments-two-immediate-risks-us-economy-if"&gt;https://www.mercatus.org/research/policy-briefs/submarine-cables-and-container-shipments-two-immediate-risks-us-economy-if&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:20" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:21"&gt;
&lt;p&gt;Philip Heijmans, “Should Taiwan Worry About Subsea Cable Security?,” &lt;em&gt;gCaptain&lt;/em&gt;, October 27, 2022, &lt;a href="https://gcaptain.com/should-taiwan-worry-about-subsea-cable-security/"&gt;https://gcaptain.com/should-taiwan-worry-about-subsea-cable-security/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:21" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:22"&gt;
&lt;p&gt;Michael Matis, “The Protection of Undersea Cables: A Global Security Threat,” &lt;em&gt;United States Army War College&lt;/em&gt;, March 7, 2012, &lt;a href="https://apps.dtic.mil/sti/pdfs/ADA561426.pdf"&gt;https://apps.dtic.mil/sti/pdfs/ADA561426.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:22" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:23"&gt;
&lt;p&gt;Joris Teer, Davis Ellison, and Abe de Ruijter, “The Cost of Conflict: Economic Implications of a Taiwan Military Crisis for the Netherlands and the EU,” &lt;em&gt;The Hague Centre for Strategic Studies&lt;/em&gt;, March 2024, &lt;a href="https://hcss.nl/wp-content/uploads/2024/03/Taiwan-The-Cost-of-conflict-HCSS-2024.pdf"&gt;https://hcss.nl/wp-content/uploads/2024/03/Taiwan-The-Cost-of-conflict-HCSS-2024.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:23" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:23" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:24"&gt;
&lt;p&gt;Christopher Neely, “The Economic Effects of a Potential Armed Conflict Over Taiwan,” &lt;em&gt;Federal Reserve Bank of St. Louis&lt;/em&gt;, February 2025, &lt;a href="https://www.stlouisfed.org/-/media/project/frbstl/stlouisfed/publications/review/pdfs/2025/feb/economic-effects-of-potential-armed-conflict-over-taiwan.pdf"&gt;https://www.stlouisfed.org/-/media/project/frbstl/stlouisfed/publications/review/pdfs/2025/feb/economic-effects-of-potential-armed-conflict-over-taiwan.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:24" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:25"&gt;
&lt;p&gt;Robert Manning, “Would Anyone “Win” a Taiwan Conflict?,” &lt;em&gt;Stimson Center&lt;/em&gt;, January 9, 2024, &lt;a href="https://www.stimson.org/2024/us-china-taiwan-conflict-global-economy/"&gt;https://www.stimson.org/2024/us-china-taiwan-conflict-global-economy/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:25" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:26"&gt;
&lt;p&gt;Joel Wuthnow et al., &lt;em&gt;Crossing the Strait: China’s Military Prepares for War with Taiwan&lt;/em&gt; (Washington, DC: National Defense University Press, 2022), &lt;a href="https://ndupress.ndu.edu/Portals/68/Documents/Books/crossing-the-strait/crossing-the-strait.pdf"&gt;https://ndupress.ndu.edu/Portals/68/Documents/Books/crossing-the-strait/crossing-the-strait.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:26" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:27"&gt;
&lt;p&gt;Yau-Chin Tsai, “The Influence of Matsu Undersea Cable Interruption on Taiwan’s National Defense Security,” &lt;em&gt;INDSR Security Commentaries&lt;/em&gt;, no. 28 (August 28, 2023), Institute for National Defense and Security Research, &lt;a href="https://indsr.org.tw/en/respublicationcon?uid=18&amp;amp;resid=2976&amp;amp;pid=5131"&gt;https://indsr.org.tw/en/respublicationcon?uid=18&amp;amp;resid=2976&amp;amp;pid=5131&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:27" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:28"&gt;
&lt;p&gt;U.S.-China Economic and Security Review Commission, “Chapter 4: A Dangerous Period for Cross-Strait Deterrence,” in &lt;em&gt;2021 Annual Report to Congress&lt;/em&gt; (Washington, DC: U.S. Government Publishing Office, 2021), &lt;a href="https://www.uscc.gov/sites/default/files/2021-11/Chapter_4--Dangerous_Period_for_Cross-Strait_Deterrence.pdf"&gt;https://www.uscc.gov/sites/default/files/2021-11/Chapter_4--Dangerous_Period_for_Cross-Strait_Deterrence.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:28" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:28" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:28" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:29"&gt;
&lt;p&gt;Jared McKinney and Peter Harris, “Broken Nest: Deterring China From Invading Taiwan,” &lt;em&gt;The US Army War College Quarterly Parameters&lt;/em&gt; 51, no. 4 (November 17, 2021): 23–36, &lt;a href="https://doi.org/10.55540/0031-1723.3089"&gt;https://doi.org/10.55540/0031-1723.3089&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:29" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:29" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:30"&gt;
&lt;p&gt;Gerard DiPippo and Jude Blanchette, “Sunk Costs: The Difficulty of Using Sanctions to Deter China in a Taiwan Crisis,” &lt;em&gt;Center for Strategic and International Studies&lt;/em&gt;, March 28, 2023, &lt;a href="https://www.csis.org/analysis/sunk-costs-difficulty-using-sanctions-deter-china-taiwan-crisis"&gt;https://www.csis.org/analysis/sunk-costs-difficulty-using-sanctions-deter-china-taiwan-crisis&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:30" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:30" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Installing Ratgdo and Fighting Technofeudalism</title><link>https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/</link><pubDate>Tue, 18 Feb 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/</guid><description>&lt;p&gt;&lt;figure aria-label="Full install kit for a Ratgdo v2.53i."&gt;
 &lt;img
 alt="Full install kit for a Ratgdo v2.53i."
 title="Full install kit for a Ratgdo v2.53i."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-install-kit-featured_hu_f0c3ac4b78ebbdb0.webp 480w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-install-kit-featured_hu_912c22e4a28b7e5f.webp 768w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-install-kit-featured_hu_a4611e3db402810d.webp 1024w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-install-kit-featured_hu_53b5755b061ef034.webp 1366w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-install-kit-featured_hu_3b15e8a460cc716d.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-install-kit-featured_hu_62ae95920b6caa17.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Full install kit for a Ratgdo v2.53i.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;In late in 2023 the Chamberlain Group, who makes the popular garage door opener Liftmaster, discontinued API connectivity through MyQ for third party home automation applications like Google Home, Apple Homekit, and Home Assistant, among others.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; As someone who purchased a Liftmaster garage door opener specifically to have it integrated with my Apple Homekit setup, I was absolutely irate. It hadn&amp;rsquo;t even been a year since buying it and Chamberlain walled off my most desired feature&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; behind their &lt;a href="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/"&gt;shitty, advertisement riddled, MyQ application&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It is becoming far too common for this sort of behavior from companies. How would you feel about buying a camera only to find out you only bought a license to use the camera?&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; Or plans by Sony to introduced interactive advertisement games into their products?&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; Forgive me for my skeptical nature where the mildest outcome is &lt;a href="https://imgur.com/please-drink-verification-can-dgGvgKF"&gt;drinking a verification can&lt;/a&gt; and the worst would be akin to a &lt;em&gt;Black Mirror&lt;/em&gt; episode or Cory Doctorow&amp;rsquo;s &lt;em&gt;&lt;a href="https://craphound.com/unauthorized-bread/"&gt;Unathorized Bread&lt;/a&gt;&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;The reason Chamberlain&amp;rsquo;s move was based on an alleged 0.2% of MyQ users generating 50% of all traffic to Chamberlain&amp;rsquo;s cloud servers.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; Firstly, if you advertised integration with Apple or Google on the cover of your product&amp;rsquo;s box then you should certainly have your infrastructure ready to accommodate a decent margin of your customers. It is fortuitous for Chamberlain to have been blessed with only 0.2% of customers actually using their device&amp;rsquo;s smart home integration features. Secondly, designing an aggregated command and control center for a cloud application will inevitably require adequate infrastructure. It is absolutely idiotic for Chamberlain to claim such centralized control over their application without having to pay for it.&lt;/p&gt;
&lt;p&gt;Regardless of Chamberlain&amp;rsquo;s follies, the home automation community has come to the rescue with a fabulous product called &lt;a href="https://ratcloud.llc/"&gt;Ratgdo&lt;/a&gt;. I can make an educated guess that this stands for &lt;em&gt;Remote Access Terminal Garage Door Opener&lt;/em&gt; but nowhere on their home page is this specifically defined. In a matter of 30 minutes I was able to break free of the technofeudalism imposed by Chamberlain and once again include my garage doors in my home automation.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Ratgdo v2.53i board."&gt;
 &lt;img
 alt="Ratgdo v2.53i board."
 title="Ratgdo v2.53i board."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-board_hu_8bec4fd6c94d2f9d.webp 480w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-board_hu_f30e2cda2a97d129.webp 768w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-board_hu_4e59eb441b89d261.webp 1024w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-board_hu_15f1320acf4a301.webp 1366w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-board_hu_cafd73c07c85da16.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/ratgdo-v253i-board_hu_3edeb363468a8176.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Ratgdo v2.53i board.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Ratgdo recently started selling a version 32 of their product, which has the capability for a laser and speaker upgrade. But I got the older v2.53i last year and it sat on my desk for over 10 months. It wouldn&amp;rsquo;t have sat so long if I knew installation would be as quick as it did. The Ratgdo itself is a small custom PCB. You can see here that v2.53i is dominated by a ESP-12F Wi-Fi module.&lt;/p&gt;
&lt;p&gt;Programming the board requires following some &lt;a href="https://www.youtube.com/watch?v=9WecAUTC9iI"&gt;simple instructions&lt;/a&gt; in a &lt;a href="https://ratgdo.github.io/esphome-ratgdo/"&gt;setup wizard&lt;/a&gt; over a USB to serial connection in Chrome. Per the instructions, connect the board directly to your computer without any USB hub or extra things in between. Since I am on MacOS I had to download the &lt;a href="https://www.wch-ic.com/downloads/CH341SER_MAC_ZIP.html"&gt;CH340 USB to UART driver&lt;/a&gt; in order to get the USB to serial connection working. Once connected and with the correct drivers you&amp;rsquo;ll be able to locate the correct serial connection:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-bash" data-lang="bash"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;% ls /dev/tty* | grep serial
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;/dev/tty.usbserial-10
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;As for the version you&amp;rsquo;ll be flashing to the drive I went with &lt;em&gt;ESP Home&lt;/em&gt;, which is best for Home Assistant, Control4, Nice/Elan, &amp;amp; Crestron integrations. The other version, &lt;em&gt;HomeKit&lt;/em&gt;, is suitable for those with iOS and without home automation platforms.&lt;/p&gt;
&lt;p&gt;With the board flashed all you have to do is connect all the wires to your Liftmaster garage door opener. This was the part that intimidated me the most and perhaps stalled me completing this project for so long. However, it is &lt;a href="https://ratcloud.llc/pages/wiring"&gt;really simple&lt;/a&gt;. With the 3 wire cable connector, just shove in the corresponding Ratgdo wires to the corresponding cable connector. So the red cable would go into the red marked cable housing. Both cables would end up being inside. Same for white and black wires. Since there is only 1 white cable on the Ratgdo you connect it to the leftmost white cable on the Liftmaster.&lt;/p&gt;
&lt;p&gt;The other connectors on the Ratgdo do server a purpose but if you are like me and want to keep installation simple while still achieving home automation connectivity then this is the best method. With everything connected all that is left is to plug in power. After the board booted up it was really easy to detect in Home Assistant and import all relevant controls.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Wiring terminals on my Liftmaster Garage Door Opener."&gt;
 &lt;img
 alt="Wiring terminals on my Liftmaster Garage Door Opener."
 title="Wiring terminals on my Liftmaster Garage Door Opener."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/liftmaster-myq-buttons_hu_da2f94e400b291e3.webp 480w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/liftmaster-myq-buttons_hu_9790a6a66cb33493.webp 768w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/liftmaster-myq-buttons_hu_76cafc59d05468d3.webp 1024w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/liftmaster-myq-buttons_hu_417dd4f9419e62b4.webp 1366w, https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/liftmaster-myq-buttons_hu_d4ca3577b078ce23.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-ratgdo-and-fighting-technofeudalism/liftmaster-myq-buttons_hu_96fe70783a0a19ca.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Wiring terminals on my Liftmaster Garage Door Opener.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Since I&amp;rsquo;ll never again use the MyQ application I wanted to factory erase the Liftmaster garade door opener. I could have left it running on my Wi-Fi but why even forward my usage data to them if they aren&amp;rsquo;t going to provide the service I want? Instructions for &lt;a href="https://support.chamberlaingroup.com/s/article/How-to-clear-the-Wi-Fi-settings-on-MyQ-Wi-Fi-product"&gt;resetting the Wi-Fi&lt;/a&gt; on a Liftmaster are straightforward:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Press and hold the black adjustment button between the arrows on the garage door opener until 3 beeps are heard. There is an initial beep, continue to hold the button for approximately 6 seconds, during this time the up arrow will be flashing. The opener will beep an additional 3 times.&lt;/li&gt;
&lt;li&gt;Wait a few seconds for the LED light to turn off. This indicates that the Wi-Fi settings are clear.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;I also went the extra mile and requested that Chamberlain Group &lt;a href="https://support.chamberlaingroup.com/s/article/How-to-delete-my-myQ-user-account"&gt;delete my MyQ account and all user data&lt;/a&gt; for it. Truly, the nuclear option but it made me feel great.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Jennifer Pattison Tuohy, “This Smart Garage Door Controller Is No Longer Very Smart,” &lt;em&gt;The Verge&lt;/em&gt;, November 8, 2023, &lt;a href="https://www.theverge.com/23949612/chamberlain-myq-smart-garage-door-controller-homebridge-integrations"&gt;https://www.theverge.com/23949612/chamberlain-myq-smart-garage-door-controller-homebridge-integrations&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;It&amp;rsquo;s true that the actual most desired feature would be to open my garage door but I&amp;rsquo;m certain any other competitor product could perform the same task.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Louis Rossmann, “I Thought I Bought a Camera, but No! DJI Sold Me a LICENSE to Use Their Camera,” April 17, 2025, &lt;a href="https://www.youtube.com/watch?v=aUOnQ_boqCw"&gt;https://www.youtube.com/watch?v=aUOnQ_boqCw&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Gary Zalewski, &lt;em&gt;System for converting television commercials into interactive networked video games&lt;/em&gt;, U.S. Patent 8246454 B2, filed June 2, 2009, and issued August 21, 2012, &lt;a href="https://patents.google.com/patent/US8246454B2/en"&gt;https://patents.google.com/patent/US8246454B2/en&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Maria Diaz, “My MyQ Garage Door Opener Just Lost Its Smarts, but Here’s My Workaround,” &lt;em&gt;ZDNET&lt;/em&gt;, November 8, 2023, &lt;a href="https://www.zdnet.com/home-and-office/smart-home/my-myq-garage-door-opener-just-lost-its-smarts-but-heres-my-workaround/"&gt;https://www.zdnet.com/home-and-office/smart-home/my-myq-garage-door-opener-just-lost-its-smarts-but-heres-my-workaround/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Using ExifTool to Set Dates Based on Filename</title><link>https://rb.ax/blog/using-exiftool-to-set-dates-based-on-filename/</link><pubDate>Fri, 17 Jan 2025 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/using-exiftool-to-set-dates-based-on-filename/</guid><description>&lt;p&gt;ExifTool has been a surprisingly useful piece of software in my recent quest to archive all of my family photographs. This includes scanned film from before the time of personal computers and also mangled files that don&amp;rsquo;t have the correct EXIF data to indicate exactly when they were taken. With the correct EXIF data you can maintain a tidy image archive that plays well with other programs, such as image editing or storage software.&lt;/p&gt;
&lt;p&gt;According to user &lt;em&gt;&lt;a href="https://exiftool.org/forum/index.php?topic=12165.0"&gt;StarGeek&lt;/a&gt;&lt;/em&gt;, Google Photos will pick from the following tags to sort a recently uploaded image.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EXIF &lt;code&gt;CreateDate&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;EXIF &lt;code&gt;DateTimeOriginal&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;EXIF &lt;code&gt;ModifyDate&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;IPTC &lt;code&gt;DigitalCreationDate+IPTC:DigitalCreationTime&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;IPTC &lt;code&gt;DateCreated+IPTC:TimeCreated&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;XMP-exif &lt;code&gt;DateTimeDigitized&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;XMP-exif &lt;code&gt;DateTimeOriginal&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;XMP-photoshop &lt;code&gt;DateCreated&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;XMP-xmp &lt;code&gt;CreateDate&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;XMP-xmp &lt;code&gt;ModifyDate&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;GPS &lt;code&gt;GPSDateStamp+GPS:GPSTimeStamp&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;System &lt;code&gt;FileModifyDate&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If Google Photos choses a field that isn&amp;rsquo;t exactly correct you have to edit the date and time manually. But in my experience, this doesn&amp;rsquo;t actually change the EXIF information on the image file, it just adds information to a separate &lt;code&gt;.json&lt;/code&gt; file. So rather than depending on Google Photos or some other software I tasked myself with correcting this information in the file itself. Both for transportability and ease of mind. I can easily move to different storage systems or software without worry.&lt;/p&gt;
&lt;p&gt;One things to keep in mind, as ExifTool author Phil Harvey has repeatedly stated, &lt;a href="https://exiftool.org/forum/index.php?topic=12165.0"&gt;dates before 1970 and after 2038 give unpredictable results&lt;/a&gt;. There are ways around this limitation but approach with caution depending on your system platform.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ve established the need to update EXIF information correctly but how do you actually do it based on filename? The basic approach is outlined in ExifTool&amp;rsquo;s &lt;a href="https://exiftool.org/faq.html#Q5"&gt;FAQ in step 5&lt;/a&gt;. But to ingest a filename as I needed, it required some further tweaking using more advanced logic with ExifTool&amp;rsquo;s advance formatting feature that utilizes Perl expressions.&lt;/p&gt;
&lt;p&gt;The &lt;code&gt;alldates&lt;/code&gt; command requires that all 6 date and time fields be present in some way in the filename like &lt;code&gt;YYYYmmddHHMMSS&lt;/code&gt;. It can parse through dashes and some other non-numerical characters but the actual numbers will shape the date and time output exactly unless you tell it otherwise. For my files named &lt;code&gt;2019-05-15_0023.jpg&lt;/code&gt; I don&amp;rsquo;t have any hours, minutes, or seconds specified in the filename. The last four numbers are just a random sequence of numbers. If I run the command normally it thinks I&amp;rsquo;m specifying 23 minutes past midnight. To get around this I needed to use &lt;a href="https://exiftool.org/exiftool_pod.html#Advanced-options"&gt;ExifTool&amp;rsquo;s advanced logic&lt;/a&gt;.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;exiftool &lt;span style="color:#e6db74"&gt;&amp;#39;-alldates&amp;lt;${filename;s/_.*//} 120000&amp;#39;&lt;/span&gt; 2019-05-15_0023.jpg
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt; image files updated
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;What this actually does is it instructs ExifTool to read the file name to obtain the year, month, and day in order to update EXIF date fields for &lt;code&gt;DateTimeOriginal&lt;/code&gt;, &lt;code&gt;CreateDate&lt;/code&gt;, and &lt;code&gt;ModifyDate&lt;/code&gt;. Another thing it does is it manually assigns a time stamp of noon. The Perl expression of &lt;code&gt;s/_&lt;/code&gt; matches the portion before the underscore &lt;code&gt;_&lt;/code&gt; and everything that follows (&lt;code&gt;.*&lt;/code&gt;) in the filename is replaced with nothing (&lt;code&gt;//&lt;/code&gt;). The value of &lt;code&gt;120000&lt;/code&gt; is interpreted in HHMMSS format, which ExifTool interprets as 12:00:00.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;exiftool -alldates 2019-05-15_0023.jpg
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Date/Time Original : 2019:05:15 12:00:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Create Date : 2019:05:15 12:00:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Modify Date : 2019:05:15 12:00:00
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description></item><item><title>2024 Running Review</title><link>https://rb.ax/blog/2024-running-review/</link><pubDate>Tue, 31 Dec 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/2024-running-review/</guid><description>&lt;p&gt;&lt;figure aria-label="Late Spring on a nearby mountain trail in Centerville, Utah."&gt;
 &lt;img
 alt="Late Spring on a nearby mountain trail in Centerville, Utah."
 title="Late Spring on a nearby mountain trail in Centerville, Utah."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/2024-running-review/parrish-lane-trail-featured_hu_ee221c3c46905db.webp 480w, https://rb.ax/blog/2024-running-review/parrish-lane-trail-featured_hu_1bb01a49169d27b3.webp 768w, https://rb.ax/blog/2024-running-review/parrish-lane-trail-featured_hu_dabca8d19853aab5.webp 1024w, https://rb.ax/blog/2024-running-review/parrish-lane-trail-featured_hu_68e0a097c199f1cc.webp 1366w, https://rb.ax/blog/2024-running-review/parrish-lane-trail-featured_hu_e0977f456f3f0cae.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/2024-running-review/parrish-lane-trail-featured_hu_5c90ebcd7d698965.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Late Spring on a nearby mountain trail in Centerville, Utah.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;In 2024 I ran a total of 2,389 miles, which is an increase of 7% over 2023. I had quite a bit more elevation gain this year at 169,078 ft, which is up 14% over 2023. There was a lot of extra running in the mountains to train for the Speedgoat 50K I did. The unexpected drop of in August was due to some harrowing food poisoning that lasted a few weeks. This month is normally the peak of the year but I got hit really hard. In a doctor checkup in early September they said I had lost 10 pounds, which is unsurprising, given the marathon of symptoms I had.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Month&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Distance (miles)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Elevation (feet)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Time&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;January&lt;/td&gt;
 &lt;td style="text-align: center"&gt;108&lt;/td&gt;
 &lt;td style="text-align: center"&gt;4,633&lt;/td&gt;
 &lt;td style="text-align: center"&gt;29h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;February&lt;/td&gt;
 &lt;td style="text-align: center"&gt;194&lt;/td&gt;
 &lt;td style="text-align: center"&gt;9,055&lt;/td&gt;
 &lt;td style="text-align: center"&gt;37h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;March&lt;/td&gt;
 &lt;td style="text-align: center"&gt;162&lt;/td&gt;
 &lt;td style="text-align: center"&gt;10,330&lt;/td&gt;
 &lt;td style="text-align: center"&gt;34h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;April&lt;/td&gt;
 &lt;td style="text-align: center"&gt;209&lt;/td&gt;
 &lt;td style="text-align: center"&gt;13,264&lt;/td&gt;
 &lt;td style="text-align: center"&gt;41h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;May&lt;/td&gt;
 &lt;td style="text-align: center"&gt;225&lt;/td&gt;
 &lt;td style="text-align: center"&gt;18,091&lt;/td&gt;
 &lt;td style="text-align: center"&gt;43h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;June&lt;/td&gt;
 &lt;td style="text-align: center"&gt;294&lt;/td&gt;
 &lt;td style="text-align: center"&gt;34,072&lt;/td&gt;
 &lt;td style="text-align: center"&gt;59h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;July&lt;/td&gt;
 &lt;td style="text-align: center"&gt;231&lt;/td&gt;
 &lt;td style="text-align: center"&gt;25,249&lt;/td&gt;
 &lt;td style="text-align: center"&gt;51h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;August&lt;/td&gt;
 &lt;td style="text-align: center"&gt;154&lt;/td&gt;
 &lt;td style="text-align: center"&gt;14,055&lt;/td&gt;
 &lt;td style="text-align: center"&gt;40h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;September&lt;/td&gt;
 &lt;td style="text-align: center"&gt;211&lt;/td&gt;
 &lt;td style="text-align: center"&gt;10,971&lt;/td&gt;
 &lt;td style="text-align: center"&gt;42h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;October&lt;/td&gt;
 &lt;td style="text-align: center"&gt;228&lt;/td&gt;
 &lt;td style="text-align: center"&gt;11,795&lt;/td&gt;
 &lt;td style="text-align: center"&gt;43h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;November&lt;/td&gt;
 &lt;td style="text-align: center"&gt;188&lt;/td&gt;
 &lt;td style="text-align: center"&gt;8,560&lt;/td&gt;
 &lt;td style="text-align: center"&gt;37h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;December&lt;/td&gt;
 &lt;td style="text-align: center"&gt;186&lt;/td&gt;
 &lt;td style="text-align: center"&gt;9,006&lt;/td&gt;
 &lt;td style="text-align: center"&gt;36h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;My loose goals for 2025 are improving my efficiency during high elevation runs. I&amp;rsquo;d like to keep my overall yearly goal at 2,000 miles but that might have to creep up to 2,500 or more if I want any elevation gains. I&amp;rsquo;m becoming more conservative with my approach to traveling and sleep so that should blunt the drastic spikes if and or when I get sick.&lt;/p&gt;
&lt;p&gt;Overall, I&amp;rsquo;m pleased with the year and look forward to more running adventures.&lt;/p&gt;</description></item><item><title>How to Clean Up Image Filenames with F2</title><link>https://rb.ax/blog/how-to-clean-up-image-filenames-with-f2/</link><pubDate>Sun, 29 Dec 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/how-to-clean-up-image-filenames-with-f2/</guid><description>&lt;p&gt;Archiving your personal collection of family images can quickly become a mess without some sort of organizational approach. I think the first and most important aspect of any organization measures would be to clean up and standardize image file names. In my mind, this involves having a date indicator with year, month, and if at all possible, a day. This would look something like &lt;code&gt;2020-08-30_0124.jpg&lt;/code&gt;. If you&amp;rsquo;re able to get this information into the file name most other methods of organization can easily follow but aren&amp;rsquo;t specifically required. For instance, folder structure for year and month would be helpful but not exactly required if you already that information written out in all your filenames.&lt;/p&gt;
&lt;p&gt;But manually updating all filenames can be tedious and time consuming. Luckily, there is a wide selection of software that is capable of bulk file renaming for images. On Windows platforms I can recommend &lt;a href="https://www.bulkrenameutility.co.uk/"&gt;Bulk Rename Utility&lt;/a&gt; (BRU) and on MacOS, &lt;a href="https://manytricks.com/namemangler/"&gt;Name Mangler&lt;/a&gt; is equally as good. If you are comfortable on the command line and require something with a bit more raw power, there is &lt;a href="https://github.com/ayoisaiah/f2"&gt;F2&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;I have just scratched the surface with F2 but it has capabilities far beyond my ultra simple image renaming jobs. It can read or write information based on directories, it is incredibly fast for large jobs, and integrates with many external utilities like &lt;a href="https://f2.freshman.tech/guide/exiftool-variables"&gt;ExifTool&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The assumption for everything after here is that you have F2 installed in addition to ExifTool. F2 will rely on ExifTool for the majority of the following commands.&lt;/p&gt;
&lt;p&gt;Before starting, you should do some EXIF reconnaissance on your files. EXIF data (short for Exchangeable Image File Format) is like a digital notebook that accompanies an image file. When you take a picture with your phone or camera, it automatically records extra details about the photo, such as when and where it was taken, what camera settings were used, and even the type of camera or phone that captured it. This information is saved as part of the image file, but it isn&amp;rsquo;t visible in the photo itself, it’s behind the scenes. For our case, EXIF data can be helpful to easily extract the write data to rename our files appropriately. But it’s also something to be mindful of if you’re sharing pictures online, as it might include your location.&lt;/p&gt;
&lt;p&gt;On modern smart devices there is a lot of information being coupled with image files. See the impressive number of fields from an image my wife took of my &lt;a href="https://rb.ax/blog/speedgoat-50k-2024-race-report/"&gt;Speedgoat 50K race in 2024&lt;/a&gt;. It even includes the uptime of her phone.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;exiftool 2024-07-20_0223.jpg
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;ExifTool Version Number : 13.06
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Name : 2024-07-20_0223.jpg
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Directory : .
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Size : 4.4 MB
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Modification Date/Time : 2025:01:05 12:32:56-07:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Access Date/Time : 2025:01:17 14:52:08-07:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Inode Change Date/Time : 2025:01:05 13:46:55-07:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Permissions : -rw-r--r--
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Type : JPEG
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;File Type Extension : jpg
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;MIME Type : image/jpeg
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;JFIF Version : 1.02
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exif Byte Order : Big-endian &lt;span style="color:#f92672"&gt;(&lt;/span&gt;Motorola, MM&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Make : Apple
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Camera Model Name : iPhone &lt;span style="color:#ae81ff"&gt;15&lt;/span&gt; Pro Max
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Orientation : Rotate &lt;span style="color:#ae81ff"&gt;90&lt;/span&gt; CW
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;X Resolution : &lt;span style="color:#ae81ff"&gt;72&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Y Resolution : &lt;span style="color:#ae81ff"&gt;72&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Resolution Unit : inches
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Software : 17.5.1
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Modify Date : 2024:07:20 18:36:02
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Host Computer : iPhone &lt;span style="color:#ae81ff"&gt;15&lt;/span&gt; Pro Max
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Y Cb Cr Positioning : Centered
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exposure Time : 1/539
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;F Number : 1.8
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exposure Program : Program AE
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;ISO : &lt;span style="color:#ae81ff"&gt;80&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exif Version : &lt;span style="color:#ae81ff"&gt;0232&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Date/Time Original : 2024:07:20 18:36:02
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Create Date : 2024:07:20 18:36:02
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Offset Time : -06:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Offset Time Original : -06:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Offset Time Digitized : -06:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Components Configuration : Y, Cb, Cr, -
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Shutter Speed Value : 1/539
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Aperture Value : 1.8
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Brightness Value : 6.75755074
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exposure Compensation : &lt;span style="color:#ae81ff"&gt;0&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Metering Mode : Multi-segment
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Flash : Off, Did not fire
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Focal Length : 6.8 mm
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Subject Area : &lt;span style="color:#ae81ff"&gt;2302&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;1876&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;484&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;488&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Maker Note Version : &lt;span style="color:#ae81ff"&gt;14&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Run Time Flags : Valid
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Run Time Value : &lt;span style="color:#ae81ff"&gt;789101687277583&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Run Time Scale : &lt;span style="color:#ae81ff"&gt;1000000000&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Run Time Epoch : &lt;span style="color:#ae81ff"&gt;0&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AE Stable : Yes
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AE Target : &lt;span style="color:#ae81ff"&gt;192&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AE Average : &lt;span style="color:#ae81ff"&gt;190&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AF Stable : Yes
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Acceleration Vector : -0.00598860486 -0.9743222594 -0.0465432033
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Focus Distance Range : 1.37 - 1.39 m
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Image Capture Type : Scene
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Live Photo Video Index : &lt;span style="color:#ae81ff"&gt;8595224612&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Luminance Noise Amplitude : 0.01041153818
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Photos App Feature Flags : &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;HDR Headroom : 0.9900000095
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AF Performance : &lt;span style="color:#ae81ff"&gt;113&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;33&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Signal To Noise Ratio : 54.02030178
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Photo Identifier : 1BB57D7A-74B0-4831-AB89-3320E711376B
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Color Temperature : &lt;span style="color:#ae81ff"&gt;5849&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Camera Type : Back Normal
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Focus Position : &lt;span style="color:#ae81ff"&gt;67&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;HDR Gain : -0.04646149652
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AF Measured Depth : &lt;span style="color:#ae81ff"&gt;100&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;AF Confidence : &lt;span style="color:#ae81ff"&gt;100&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Semantic Style : &lt;span style="color:#f92672"&gt;{&lt;/span&gt;_0&lt;span style="color:#f92672"&gt;=&lt;/span&gt;1,_1&lt;span style="color:#f92672"&gt;=&lt;/span&gt;0,_2&lt;span style="color:#f92672"&gt;=&lt;/span&gt;0,_3&lt;span style="color:#f92672"&gt;=&lt;/span&gt;0&lt;span style="color:#f92672"&gt;}&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Sub Sec Time Original : &lt;span style="color:#ae81ff"&gt;742&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Sub Sec Time Digitized : &lt;span style="color:#ae81ff"&gt;742&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Flashpix Version : &lt;span style="color:#ae81ff"&gt;0100&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Color Space : Uncalibrated
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exif Image Width : &lt;span style="color:#ae81ff"&gt;5712&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exif Image Height : &lt;span style="color:#ae81ff"&gt;4284&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Sensing Method : One-chip color area
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Scene Type : Directly photographed
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Exposure Mode : Auto
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;White Balance : Auto
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Focal Length In 35mm Format : &lt;span style="color:#ae81ff"&gt;24&lt;/span&gt; mm
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Scene Capture Type : Standard
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Lens Info : 2.220000029-15.65999985mm f/1.779999971-2.8
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Lens Make : Apple
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Lens Model : iPhone &lt;span style="color:#ae81ff"&gt;15&lt;/span&gt; Pro Max back triple camera 6.765mm f/1.78
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Composite Image : General Composite Image
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Latitude Ref : North
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Longitude Ref : West
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Altitude Ref : Above Sea Level
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Time Stamp : 00:36:01
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Speed Ref : km/h
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Speed : 0.1803867135
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Img Direction Ref : True North
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Img Direction : 149.5131072
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Dest Bearing Ref : True North
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Dest Bearing : 149.5131072
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Date Stamp : 2024:07:21
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Horizontal Positioning Error: 4.775458293 m
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Compression : JPEG &lt;span style="color:#f92672"&gt;(&lt;/span&gt;old-style&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Thumbnail Offset : &lt;span style="color:#ae81ff"&gt;3028&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Thumbnail Length : &lt;span style="color:#ae81ff"&gt;10862&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;XMP Toolkit : XMP Core 6.0.0
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Creator Tool : 17.5.1
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Date Created : 2024:07:20 18:36:02
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Area Y : 0.438, 0.4385
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Area W : 0.086952380952380948, 0.084857142857142853
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Area X : 0.41147619047619044, 0.40309523809523812
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Area H : 0.11599999999999999, 0.11299999999999999
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Area Unit : normalized, normalized
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Type : Face, Focus
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Extensions Angle Info Yaw: &lt;span style="color:#ae81ff"&gt;356&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Extensions Angle Info Roll: &lt;span style="color:#ae81ff"&gt;274&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Extensions Confidence Level: &lt;span style="color:#ae81ff"&gt;669&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Extensions Face ID : &lt;span style="color:#ae81ff"&gt;488&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Extensions :
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Applied To Dimensions H : &lt;span style="color:#ae81ff"&gt;4284&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Applied To Dimensions W : &lt;span style="color:#ae81ff"&gt;5712&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Region Applied To Dimensions Unit: pixel
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile CMM Type : Apple Computer Inc.
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Version : 4.0.0
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Class : Display Device Profile
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Color Space Data : RGB
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Connection Space : XYZ
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Date Time : 2022:01:01 00:00:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile File Signature : acsp
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Primary Platform : Apple Computer Inc.
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;CMM Flags : Not Embedded, Independent
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Device Manufacturer : Apple Computer Inc.
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Device Model :
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Device Attributes : Reflective, Glossy, Positive, Color
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Rendering Intent : Perceptual
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Connection Space Illuminant : 0.9642 &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt; 0.82491
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Creator : Apple Computer Inc.
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile ID : ecfda38e388547c36db4bd4f7ada182f
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Description : Display P3
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Profile Copyright : Copyright Apple Inc., &lt;span style="color:#ae81ff"&gt;2022&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Media White Point : 0.96419 &lt;span style="color:#ae81ff"&gt;1&lt;/span&gt; 0.82489
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Red Matrix Column : 0.51512 0.2412 -0.00105
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Green Matrix Column : 0.29198 0.69225 0.04189
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Blue Matrix Column : 0.1571 0.06657 0.78407
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Red Tone Reproduction Curve : &lt;span style="color:#f92672"&gt;(&lt;/span&gt;Binary data &lt;span style="color:#ae81ff"&gt;32&lt;/span&gt; bytes, use -b option to extract&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Chromatic Adaptation : 1.04788 0.02292 -0.0502 0.02959 0.99048 -0.01706 -0.00923 0.01508 0.75168
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Blue Tone Reproduction Curve : &lt;span style="color:#f92672"&gt;(&lt;/span&gt;Binary data &lt;span style="color:#ae81ff"&gt;32&lt;/span&gt; bytes, use -b option to extract&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Green Tone Reproduction Curve : &lt;span style="color:#f92672"&gt;(&lt;/span&gt;Binary data &lt;span style="color:#ae81ff"&gt;32&lt;/span&gt; bytes, use -b option to extract&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;HDR Gain Curve : &lt;span style="color:#f92672"&gt;(&lt;/span&gt;Binary data &lt;span style="color:#ae81ff"&gt;2067&lt;/span&gt; bytes, use -b option to extract&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Image Width : &lt;span style="color:#ae81ff"&gt;5712&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Image Height : &lt;span style="color:#ae81ff"&gt;4284&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Encoding Process : Baseline DCT, Huffman coding
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Bits Per Sample : &lt;span style="color:#ae81ff"&gt;8&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Color Components : &lt;span style="color:#ae81ff"&gt;3&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Y Cb Cr Sub Sampling : YCbCr4:2:0 &lt;span style="color:#f92672"&gt;(&lt;/span&gt;&lt;span style="color:#ae81ff"&gt;2&lt;/span&gt; 2&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Run Time Since Power Up : &lt;span style="color:#ae81ff"&gt;9&lt;/span&gt; days 3:11:42
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Aperture : 1.8
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Image Size : 5712x4284
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Megapixels : 24.5
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Scale Factor To &lt;span style="color:#ae81ff"&gt;35&lt;/span&gt; mm Equivalent: 3.5
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Shutter Speed : 1/539
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Create Date : 2024:07:20 18:36:02.742-06:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Date/Time Original : 2024:07:20 18:36:02.742-06:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Modify Date : 2024:07:20 18:36:02-06:00
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Thumbnail Image : &lt;span style="color:#f92672"&gt;(&lt;/span&gt;Binary data &lt;span style="color:#ae81ff"&gt;10862&lt;/span&gt; bytes, use -b option to extract&lt;span style="color:#f92672"&gt;)&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Altitude : 2471.3 m Above Sea Level
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Date/Time : 2024:07:21 00:36:01Z
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;GPS Latitude : &lt;span style="color:#ae81ff"&gt;40&lt;/span&gt; deg 34&lt;span style="color:#e6db74"&gt;&amp;#39; 51.92&amp;#34; N
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;GPS Longitude : 111 deg 39&amp;#39;&lt;/span&gt; 24.29&lt;span style="color:#e6db74"&gt;&amp;#34; W
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;Circle Of Confusion : 0.008 mm
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;Field Of View : 73.7 deg
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;Focal Length : 6.8 mm (35 mm equivalent: 24.0 mm)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;GPS Position : 40 deg 34&amp;#39; 51.92&amp;#34;&lt;/span&gt; N, &lt;span style="color:#ae81ff"&gt;111&lt;/span&gt; deg 39&lt;span style="color:#960050;background-color:#1e0010"&gt;&amp;#39;&lt;/span&gt; 24.29&lt;span style="color:#e6db74"&gt;&amp;#34; W
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;Hyperfocal Distance : 3.04 m
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;Light Value : 11.1
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#e6db74"&gt;Lens ID : iPhone 15 Pro Max back triple camera 6.765mm f/1.78
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Certainly overwhelming, but we are only interested in 3 fields that have date information. If present, these fields will be essential in rewriting the file name.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Date/Time Original&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Create Date&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;Modify Date&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If those fields aren&amp;rsquo;t present or maybe 1 is missing there is still hope. I have noticed that over the years that image taking devices such as iPhones and normal cameras will add in some of those date fields and leave the others blank. I also noticed in iOS movie files that &lt;code&gt;DateTimeOriginal&lt;/code&gt; was more often present than &lt;code&gt;Create Date&lt;/code&gt;. Or it might be the churn of files going across systems and platforms that things start to go missing in the EXIF fields. But you need to be aware of what is actually present.&lt;/p&gt;
&lt;p&gt;Say you&amp;rsquo;ve read through your files and most have the &lt;code&gt;CreateDate&lt;/code&gt; field present with an accurate date. The below command would instruct F2 to read the field &lt;code&gt;CreateDate&lt;/code&gt; with the help of ExifTool and output the formatted date followed by a four digit sequencing value before the file extension. The &lt;code&gt;-R&lt;/code&gt; flag asks F2 to look recursively if there are files farther down from where you command line is currently running.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;f2 -r &lt;span style="color:#e6db74"&gt;&amp;#39;{xt.CreateDate}_{%04d}{ext}&amp;#39;&lt;/span&gt; -R --exiftool-opts &lt;span style="color:#e6db74"&gt;&amp;#39;--dateFormat %Y-%m-%d&amp;#39;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————————*—————————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| ORIGINAL | RENAMED | STATUS |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————————*—————————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_4282.jpg | 2020-08-30_0124.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_4283.jpg | 2020-08-30_0125.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_4284.jpg | 2020-08-30_0126.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————————*—————————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;dry run: commit the above changes with the -x/--exec flag
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;A preview output is given before any changes are actually made, which is very helpful. If a file does not have information from &lt;code&gt;CreateDate&lt;/code&gt; then the date portion of the new filename would be blank. To run the command you do it again but adding a &lt;code&gt;-x&lt;/code&gt; flag at the end.&lt;/p&gt;
&lt;p&gt;For files that don&amp;rsquo;t have &lt;code&gt;CreateDate&lt;/code&gt; field you could use &lt;code&gt;DateTimeOriginal&lt;/code&gt; instead. I found that this was the situation a lot for iOS &lt;code&gt;.mov&lt;/code&gt; files.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;f2 -r &lt;span style="color:#e6db74"&gt;&amp;#39;{xt.DateTimeOriginal}_{%04d}{ext}&amp;#39;&lt;/span&gt; -R --exiftool-opts &lt;span style="color:#e6db74"&gt;&amp;#39;--dateFormat %Y-%m-%d&amp;#39;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————————*—————————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| ORIGINAL | RENAMED | STATUS |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————————*—————————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_4282.jpg | 2020-08-30_0124.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_4283.jpg | 2020-08-30_0125.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_4284.jpg | 2020-08-30_0126.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————————*—————————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;dry run: commit the above changes with the -x/--exec flag
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;For those as obsessive compulsive as myself there are additional steps to clean up filenames. One approach is to remove the uppercase file extensions placed on some files. It is my personal opinion that all file extensions should be lower case. Many filesystems are case sensitive so you are just making it easier for yourself and others in the future. Additionally, consolidating common extensions like &lt;code&gt;.jpeg&lt;/code&gt; into simply &lt;code&gt;.jpg&lt;/code&gt; could also prove helpful in fortifying your future sanity.&lt;/p&gt;
&lt;p&gt;The below command changes files with &lt;code&gt;.jpeg&lt;/code&gt; extensions to &lt;code&gt;.jpg&lt;/code&gt;. It ignore case, which would match something like &lt;code&gt;.JPEG&lt;/code&gt;. It will perform recursively into subfolders.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;f2 -f &lt;span style="color:#e6db74"&gt;&amp;#39;jpeg&amp;#39;&lt;/span&gt; -r &lt;span style="color:#e6db74"&gt;&amp;#39;jpg&amp;#39;&lt;/span&gt; -i -R
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*——————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| ORIGINAL | RENAMED | STATUS |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*——————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_0297.jpeg | IMG_0297.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_0298.jpeg | IMG_0298.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_0299.jpeg | IMG_0299.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*——————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;dry run: commit the above changes with the -x/--exec flag
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The below command changes files with &lt;code&gt;.JPG&lt;/code&gt; extensions to &lt;code&gt;.jpg&lt;/code&gt;. It ignore case, which would match something like &lt;code&gt;.JPEG&lt;/code&gt;. It will perform recursively into subfolders.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;f2 -f &lt;span style="color:#e6db74"&gt;&amp;#39;jpg&amp;#39;&lt;/span&gt; -r &lt;span style="color:#e6db74"&gt;&amp;#39;jpg&amp;#39;&lt;/span&gt; -i -R
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*——————————————————*—————————————————*———————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| ORIGINAL | RENAMED | STATUS |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*——————————————————*—————————————————*———————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_3368.jpg | IMG_3368.jpg | unchanged |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_3369.JPG | IMG_3369.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_3451.jpg | IMG_3451.jpg | unchanged |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| IMG_3455.JPG | IMG_3455.jpg | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*——————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;dry run: commit the above changes with the -x/--exec flag
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The below command changes files with &lt;code&gt;.MOV&lt;/code&gt; extensions to &lt;code&gt;.mov&lt;/code&gt;. It ignore case, which would match something like &lt;code&gt;.MOV&lt;/code&gt;. It will perform recursively into subfolders.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-zsh" data-lang="zsh"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;f2 -f &lt;span style="color:#e6db74"&gt;&amp;#39;mov&amp;#39;&lt;/span&gt; -r &lt;span style="color:#e6db74"&gt;&amp;#39;mov&amp;#39;&lt;/span&gt; -i -R
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| ORIGINAL | RENAMED | STATUS |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| 10/IMG_4769.MOV | 10/IMG_4769.mov | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| 12/IMG_5521.MOV | 12/IMG_5521.mov | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;| 12/IMG_5522.MOV | 12/IMG_5522.mov | ok |
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;*—————————————————*—————————————————*————————*
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;dry run: commit the above changes with the -x/--exec flag
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Once you have your image filenames updated appropriately it will provide a good foundation to maintain your archive or pursue organization even further. Luckily, this semi-tedious job is often only required once in a file&amp;rsquo;s lifetime. That is if you have an appropriate number of backups and redundancy for your file storage.&lt;/p&gt;</description></item><item><title>16-bit BGP Community Architecture</title><link>https://rb.ax/blog/16-bit-bgp-community-architecture/</link><pubDate>Sun, 15 Dec 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/16-bit-bgp-community-architecture/</guid><description>&lt;p&gt;There are a lot of reasons a network engineer might use a 16-bit BGP community tag in an enterprise environment. It can be forced from pre-existing constraints and overcoming technical debt while still giving the opportunity for managing and propagating routing information at scale. Or you just want a compact way to assign and manipulate routes. The first 16-bits available within the full 32-bit field might currently be strictly assigned to each AS and must stay in place as a legacy system. Whatever the reasons, I came up with this methodology as a thought process to better understand compact BGP community architecture.&lt;/p&gt;
&lt;p&gt;BGP communities provide a mechanism to tag and group routes with metadata that facilitates streamlined routing policies and efficient traffic engineering. Gone are the days of manually filtering routes based on actual subnets over a long chain of routers to propagate new routes. This is a strong but dangerous tool. If your architecture is set to advertise certain communities it would be easy for widespread impact to happen very quickly. While extended BGP communities offer additional flexibility, the 16-bit standard community remains relevant for backward compatibility or hardware limitations.&lt;/p&gt;
&lt;p&gt;Standard BGP communities, as defined in RFC 1997, are 32-bit values used to tag routes. These values are typically represented in a decimal:decimal format, such as &lt;code&gt;64512:100&lt;/code&gt;, where the first part usually corresponds to an Autonomous System Number (ASN) and the second part is a custom identifier. The 16-bit section could range from a defined value of 0 all the way to 65,535. Standard communities are widely supported across BGP implementations and are frequently used for purposes like route tagging, filtering, and marking routes for specific treatment. Their simplicity and broad adoption make them an effective tool for basic routing policies. Standard communities also include well-known values such as &lt;code&gt;NO_EXPORT&lt;/code&gt; (65535:65281), which prevents a route from being advertised to external peers, and &lt;code&gt;NO_ADVERTISE&lt;/code&gt; (65535:65282), which stops the route from being advertised to any BGP peer.&lt;/p&gt;
&lt;p&gt;Extended BGP communities, introduced later in RFC 4360, expand on the capabilities of standard communities by using a 64-bit format. These communities include additional fields that allow for more complex tagging, enabling operators to encode information such as route target attributes, route origin, or specific traffic engineering requirements. Extended communities have a defined structure with fields for type and sub-type information, which determine how the community should be interpreted. For example, extended communities can be used in Multi-Protocol Label Switching (MPLS) Virtual Private Networks (VPNs) to control the scope of route propagation within a VPN. Values in extended communities are often represented as hexadecimal or in a similar &amp;ldquo;ASN:value&amp;rdquo; format, depending on the context.&lt;/p&gt;
&lt;p&gt;Not every situation allows for the deployment of 64-bit BGP communities so it is interesting to explore the capacity within 16-bit communities. Using the below categorizations you could easily accommodate for a wide variety of enterprise network designations while staying within 16 bits.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Bits&lt;/th&gt;
 &lt;th&gt;Field&lt;/th&gt;
 &lt;th&gt;Description&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;5&lt;/td&gt;
 &lt;td&gt;Origin Type&lt;/td&gt;
 &lt;td&gt;0–31 (internal, external, upstream, etc)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;5&lt;/td&gt;
 &lt;td&gt;Route Role&lt;/td&gt;
 &lt;td&gt;0–31 (production, backup, etc)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;6&lt;/td&gt;
 &lt;td&gt;Scope or Custom&lt;/td&gt;
 &lt;td&gt;0–63 (global, regional, local, etc)&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This layout allows 32 values for Origin Type and Route Role, and 64 values for Scope, providing sufficient granularity for most enterprise needs. The assignments could also be moved around if greater capability was needed in a specific category compared to others.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Origin Type (5 bits):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;0&lt;/code&gt;: Internal (data centers, branches, etc).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;1&lt;/code&gt;: Upstream providers (ISPs, etc).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;2&lt;/code&gt;: Peering routes (IXPs, etc).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;3&lt;/code&gt;: Cloud provider routes.&lt;/li&gt;
&lt;li&gt;&amp;hellip; up to &lt;code&gt;31&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Route Role (5 bits):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;0&lt;/code&gt;: Production traffic.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;1&lt;/code&gt;: Backup routes.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;2&lt;/code&gt;: Management traffic.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;3&lt;/code&gt;: Test/lab environments.&lt;/li&gt;
&lt;li&gt;&amp;hellip; up to &lt;code&gt;31&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Scope (6 bits):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;0&lt;/code&gt;: Global (advertised broadly).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;1&lt;/code&gt;: Regional (advertised within a region).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;2&lt;/code&gt;: Local (specific to a branch or device).&lt;/li&gt;
&lt;li&gt;&lt;code&gt;3&lt;/code&gt;: Internet-bound.&lt;/li&gt;
&lt;li&gt;&lt;code&gt;4&lt;/code&gt;: Enterprise-only.&lt;/li&gt;
&lt;li&gt;&amp;hellip; up to &lt;code&gt;63&lt;/code&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Based on the possible values in these 3 categories, you can create compact community values that stay in the 16 bit capacity. Some examples might include:&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Community Value (Decimal)&lt;/th&gt;
 &lt;th&gt;Binary&lt;/th&gt;
 &lt;th&gt;Meaning&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;1000&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;00001 00001 000000&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;External route, production, global.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;2001&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;00010 00000 000001&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Peering route, backup, regional.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;3072&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;00011 00000 010000&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Cloud route, production, local.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;It might make more sense if we use some practical implementations to filter routes for various needs. But first you&amp;rsquo;ll need to be aware of how the bits are referred to as they show from left to right. Bit 15 is the most left bit in a 16-bit field. In the context of a binary number, bit numbering typically starts from the leftmost (most significant bit, MSB) and moves to the rightmost (least significant bit, LSB). Here is how the bit positions are numbered in a 16-bit binary field:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;Bits: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0
 | | | | | | | | | | | | | | | |
Binary: 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;To block all routes from origin type &lt;code&gt;1&lt;/code&gt; (Upstream Providers), match communities where bits 15–11 encode the value of &lt;code&gt;1&lt;/code&gt; in binary. Translating to decimal the minimum possible value would be &lt;code&gt;00001 00000 000000&lt;/code&gt; (32) where the maximum would be &lt;code&gt;00001 11111 111111&lt;/code&gt; (63). We can use that decimal range to craft appropriate regex that captures that range.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code class="language-junos" data-lang="junos"&gt;policy-options {
 community upstream-providers {
 members &amp;#34;^.*:((3[2-9])|([4-5][0-9])|(6[0-3]))$&amp;#34;;
 }
 policy-statement block-upstream {
 term block {
 from community upstream-providers;
 then reject;
 }
 }
}
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Crafting a filter for other values of the origin type category would include variations on the binary and decimal value. For &lt;code&gt;0&lt;/code&gt; the binary would be &lt;code&gt;00000xxxxx xxxxxx&lt;/code&gt; with a decimal range of 0-31. Type &lt;code&gt;2&lt;/code&gt; would be &lt;code&gt;00010xxxxx xxxxxx&lt;/code&gt; with the decimal range of 64-95. Type &lt;code&gt;3&lt;/code&gt; would be &lt;code&gt;00011xxxxx xxxxxx&lt;/code&gt; with a range of 96-127.&lt;/p&gt;
&lt;p&gt;To allow routes marked as route role &lt;code&gt;0&lt;/code&gt; (Production Traffic), match communities where bits 10–6 are &lt;code&gt;0&lt;/code&gt; in binary. This would be a decimal sequence from 0 to 2016. Not really clean and compact but it accomplishes the original goal.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code class="language-junos" data-lang="junos"&gt;policy-options {
 community production-traffic {
 members &amp;#34;^.*:(0|32|64|96|128|160|192|224|256|288|320|352|384|416|448|480|512|544|576|608|640|672|704|736|768|800|832|864|896|928|960|992|1024|1056|1088|1120|1152|1184|1216|1248|1280|1312|1344|1376|1408|1440|1472|1504|1536|1568|1600|1632|1664|1696|1728|1760|1792|1824|1856|1888|1920|1952|1984|2016)$&amp;#34;;
 }
 policy-statement allow-production {
 term allow {
 from community production-traffic;
 then accept;
 }
 }
}
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;To block any route not scoped for enterprise only traffic with scope &lt;code&gt;4&lt;/code&gt;, match communities where bits 5–0 are not 4 in binary.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code class="language-junos" data-lang="junos"&gt;policy-options {
 community non-enterprise-routes {
 members &amp;#34;^(?!.*4$).*$&amp;#34;;
 }
 policy-statement block-non-enterprise {
 term block {
 from community non-enterprise-routes;
 then reject;
 }
 }
}
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;For routes originating from the cloud and that are also backup, match origin type 3 and route role 1.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code class="language-junos" data-lang="junos"&gt;policy-options {
 community cloud-backup {
 members &amp;#34;^.*:((3[2-9]|[4-5][0-9]){1})$&amp;#34;;
 }
 policy-statement permit-cloud-backup {
 term allow {
 from community cloud-backup;
 then accept;
 }
 }
}
&lt;/code&gt;&lt;/pre&gt;</description></item><item><title>It Doesn't Matter if Baltic Submarine Cable Cuts Were Sabotage</title><link>https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/</link><pubDate>Thu, 21 Nov 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/</guid><description>&lt;p&gt;&lt;figure aria-label="Map of the C-Lion1 Submarine Cable path from Finland to Germany. Source: TeleGeography."&gt;
 &lt;img
 alt="Map of the C-Lion1 Submarine Cable path from Finland to Germany. Source: TeleGeography."
 title="Map of the C-Lion1 Submarine Cable path from Finland to Germany. Source: TeleGeography."
 width="1500"
 height="1123"srcset="https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/c-lion1-submarine-cable-featured_hu_582054bf88218f23.webp 480w, https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/c-lion1-submarine-cable-featured_hu_3ce64662a337fb65.webp 768w, https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/c-lion1-submarine-cable-featured_hu_47a7ce87528239dc.webp 1024w, https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/c-lion1-submarine-cable-featured_hu_7f94fdbffebdb908.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/c-lion1-submarine-cable-featured_hu_a513b1f0270751a2.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Map of the C-Lion1 Submarine Cable path from Finland to Germany. Source: &lt;a href="https://www.submarinecablemap.com/submarine-cable/c-lion1"&gt;TeleGeography&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The recent severing of submarine cables in the Baltic Sea has brought to the forefront the critical vulnerabilities surrounding the infrastructure that underpins modern society. On November 17, the BCS East-West Interlink cable, owned by Arelion and spanning from Lithuania to Sweden, was severed.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Shortly after, on November 18, the C-Lion1 submarine cable, owned by Cinia&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; and extending from Finland to Germany, was also severed.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; These incidents have prompted extensive debate regarding whether the severances were accidental or acts of deliberate sabotage, with Germany’s Minister of Defense, Boris Pistorius, leaning towards the latter.&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; Irrespective of causation, the imperative that all nation states must embrace is identical. We must immediately take steps to enhance submarine cable redundancy, advance technological capabilities of the cables themselves, and fortify state posture around these critical assets as key national security goals. Given that submarine cables account for over 95% of international internet traffic,&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; they are the arteries of global communication, and their security is central to the seamless functioning of an interconnected society.&lt;/p&gt;
&lt;p&gt;The strategic interest in undersea infrastructure is not new, and Russian activities have repeatedly highlighted these vulnerabilities. American intelligence officials have reported increased Russian activity&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; in proximity to critical submarine cable infrastructure. Instances such as Russian agents scouting cable landing stations in 2015,&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; and a Russian spy vessel getting uncomfortably close to critical infrastructure&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; in the Irish Sea in November 2024, underscore the vital significance of these cables. This increasing scrutiny from state actors is symptomatic of a broader trend that places the resilience of submarine cable networks under constant threat. With more than 750,000 miles of submarine cables traversing the globe, safeguarding their integrity and ensuring sufficient redundancy is an immense challenge that demands international cooperation between private and government entities and proactive policy measures.&lt;/p&gt;
&lt;p&gt;A fundamental priority for enhancing submarine cable security is the pursuit of increased redundancy. The Baltic incidents reveal that while some level of redundancy is embedded in current systems, it is insufficient when faced with coordinated attacks or multiple points of failure. An analysis conducted by Réseaux IP Européens Network Coordination Centre (RIPE NCC) illustrated that the severance of the Baltic cables resulted in an increase in latency of 15ms between Sweden and Lithuania and 10ms between Germany and Finland.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; While these latencies may appear negligible, they underscore the intrinsic dependency of modern communications on uninterrupted cable infrastructure. More significantly, the analysis highlights that while the internet is inherently resilient enough to reroute data around damaged nodes, the current redundancy must be significantly expanded to mitigate intentional threats from state actors and ensure continued functionality under coordinated stress.&lt;/p&gt;
&lt;p&gt;Redundancy is not merely about deploying additional cables but rather about ensuring true geographic path diversity. The most flagrant example is in submarine cable path aggregation through the Red Sea, where 90% of Europe-Asia traffic transits through a single corridor. In March of 2024 three cables were attacked, which impacted approximately 25% of internet traffic transiting &lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt; the Red Sea. It is currently an extreme exposure that places international communications at significant risk.&lt;/p&gt;
&lt;p&gt;As of 2024, between 100 and 150 submarine cables are severed annually, largely due to inadvertent incidents involving fishing equipment or ship anchors.&lt;sup id="fnref:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; Given the frequency of such occurrences, redundancy must be treated as a baseline requirement, not as an exception. Further, heightened redundancy would significantly complicate attempts by either state or non-state actors to cause large-scale telecommunications disruptions. Russia’s continued scrutiny of undersea infrastructure suggests the strategic value that adversarial states perceive in targeting such assets as part of broader geopolitical maneuvers.&lt;/p&gt;
&lt;p&gt;Increased redundancy is not only crucial for mitigating physical threats but also for sustaining the reliability of global communications. Submarine cables are essential to international commerce, banking, and the digital communications that underpin daily life. Any disruption in these cables can have catastrophic consequences, economically and socially. Governments and private sector stakeholders must coordinate to assess vulnerabilities systematically and invest in creating backup routes to minimize the potential impact of disruptions. Collaboration between private and public entities is vital to ensuring that global connectivity is maintained even under adverse conditions.&lt;/p&gt;
&lt;p&gt;Another pivotal dimension of submarine cable security lies in the adoption and advancement of smart cable technology. Traditionally, submarine cables served a single function—as conduits for communication. However, contemporary advancements are enabling these cables to be embedded with smart sensors capable of environmental monitoring. Smart submarine cables, which integrate sensors roughly every 70 kilometers, can detect and measure seafloor motion, variations in water pressure, and changes in temperature.&lt;sup id="fnref:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; This sensor capability is not only instrumental for environmental research&lt;sup id="fnref:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt; but is also critical for securing the cables. Enhanced situational awareness along the seabed could allow authorities to detect suspicious activity or accidental damage before the perpetrating vessel leaves the area.&lt;/p&gt;
&lt;p&gt;The potential of smart submarine cable technology to transform underwater infrastructure from passive conduits into proactive security tools is significant. By embedding sensors, these cables can relay real-time data to authorities, providing crucial information on both natural occurrences and anthropogenic activities along the seabed. Such data is instrumental in responding swiftly to accidental damages and deterring acts of sabotage. The successful implementation of these technologies will necessitate concerted efforts from governments, private enterprises, and multinational bodies, emphasizing subsidies and incentives to encourage adoption.&lt;/p&gt;
&lt;p&gt;Governmental support, including subsidies, will be critical in accelerating the deployment of smart submarine cables. Increasing the density of sensors and applying smart technologies to both newly deployed and replacement cables will yield a more granular and timely picture of potential disruptions. Enhanced sensor density will enable pinpointing the precise location and timing of severances, thereby facilitating rapid responses. In cases of deliberate tampering, these sensors will provide critical data that could be provided to government agencies, allowing them to more efficiently identify the perpetrators. Thus, investing in smart cable infrastructure not only augments the overall resilience of the network but also serves as a deterrent against malign actors by making evasion significantly more difficult.&lt;/p&gt;
&lt;p&gt;Additionally, the dual-use aspect of smart technology bridges infrastructure security and environmental science. Smart cables, with their integrated monitoring capabilities, have the potential to contribute valuable data to environmental research while simultaneously enhancing security. For instance, early detection of underwater seismic activity or tsunamis could provide essential warning time to coastal communities, thereby mitigating loss of life. Dual-use technologies represent an attractive investment for nations seeking to improve security while delivering broader societal benefits.&lt;/p&gt;
&lt;p&gt;As climate change accelerates, monitoring the impact of changing ocean temperatures and conditions through smart submarine cables offers essential data for global climate models. The dual-purpose functionality of smart cables provides policymakers with a compelling rationale for infrastructure investment. Not solely for security but also as part of a broader commitment to environmental stewardship and scientific understanding. By addressing multiple policy goals simultaneously, investments in smart cable technologies can enhance resilience, contribute to climate research, and fortify critical infrastructure.&lt;/p&gt;
&lt;p&gt;Equally critical to the advancement of submarine cable security is fortifying state posture regarding this vital infrastructure. While smart cables provide an enhanced passive defense mechanism, active protection is indispensable for comprehensive security. The recent decision by the United States Federal Communications Commission (FCC) to review submarine cables as critical infrastructure&lt;sup id="fnref:14"&gt;&lt;a href="#fn:14" class="footnote-ref" role="doc-noteref"&gt;14&lt;/a&gt;&lt;/sup&gt; is a welcome but long overdue acknowledgment of their importance. Initiatives such as Team Telecom, a cross-agency group tasked with evaluating the national security implications of undersea cables&lt;sup id="fnref:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; landing on U.S. shores, must be further strengthened to ensure that infrastructure does not become a strategic liability that could be easily exploited by adversaries.&lt;/p&gt;
&lt;p&gt;International collaboration is essential for the effective security of submarine cables. These cables traverse multiple jurisdictions, involving an array of stakeholders, including nations, corporations, and international bodies. Establishing global norms and cooperative frameworks for protecting undersea infrastructure can enhance resilience against potential threats. Multilateral agreements to standardize cable protection, foster information sharing, and coordinate responses to incidents could improve the collective security of submarine networks.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Map of the BCS East-West Interlink Submarine Cable path from Lithuania to Sweden. Source: TeleGeography."&gt;
 &lt;img
 alt="Map of the BCS East-West Interlink Submarine Cable path from Lithuania to Sweden. Source: TeleGeography."
 title="Map of the BCS East-West Interlink Submarine Cable path from Lithuania to Sweden. Source: TeleGeography."
 width="1500"
 height="1123"srcset="https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/bcs-east-west-interlink-submarine-cable_hu_d0a141d3a2704dfa.webp 480w, https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/bcs-east-west-interlink-submarine-cable_hu_51068da87c6faf46.webp 768w, https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/bcs-east-west-interlink-submarine-cable_hu_cba3c587e66f8aad.webp 1024w, https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/bcs-east-west-interlink-submarine-cable_hu_8507ba3781d54175.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/it-doesnt-matter-if-baltic-submarine-cable-cuts-were-sabotage/bcs-east-west-interlink-submarine-cable_hu_749130c0a0e99a6e.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Map of the BCS East-West Interlink Submarine Cable path from Lithuania to Sweden. Source: &lt;a href="https://www.submarinecablemap.com/submarine-cable/bcs-east-west-interlink"&gt;TeleGeography&lt;/a&gt;.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Bilateral and multilateral partnerships are instrumental in securing submarine cable infrastructure. Nations with shared interests in maintaining open, secure communication channels should work in concert to establish joint task forces, conduct regular risk assessments, and develop coordinated response strategies. These partnerships can promote more effective information exchange and provide a unified defense against potential adversarial threats. The pooling of technological expertise and financial resources through international cooperation is fundamental to reinforcing the robustness of submarine cable networks.&lt;/p&gt;
&lt;p&gt;Physical security measures also constitute a crucial component of submarine cable protection. Although patrolling the entirety of submarine cables, spanning thousands of miles along the ocean floor, is impractical, focused efforts can enhance security at critical junctures. Submarine cable landing stations, where cables connect with terrestrial infrastructure, represent a significant vulnerability. Governments must invest in fortifying the physical security of these installations to prevent unauthorized access and potential acts of sabotage. Additionally, remote monitoring technologies, such as smart submarine sensors, must be employed to provide oversight across areas that are otherwise impractical to patrol. The combination of enhanced physical security and technological monitoring can create a resilient defense against both accidental damage and deliberate threats.&lt;/p&gt;
&lt;p&gt;The human element is an often-overlooked aspect of infrastructure security. Efforts should be made to engage local communities in the coastal areas where submarine cable landing stations are situated. Community awareness initiatives and local partnerships can foster vigilance and encourage the reporting of suspicious activities. By involving local stakeholders, governments can establish an additional layer of security that complements technological measures. This community-focused approach, paired with enhanced physical and technological security, represents a comprehensive defense strategy against a diverse array of threats.&lt;/p&gt;
&lt;p&gt;Community engagement is critical not only for enhancing vigilance but also for building trust between the public and authorities tasked with safeguarding critical infrastructure. By educating coastal communities on the strategic importance of submarine cables and the potential threats they face, governments can foster a culture of collaboration and mutual support. This inclusive approach is instrumental in early threat detection and mitigation, as community members are often the first to observe and respond to suspicious activities.&lt;/p&gt;
&lt;p&gt;The severing of submarine cables in the Baltic Sea is reminiscent of similar uncertainties surrounding other infrastructure damage, such as the Nord Stream gas pipeline explosion in 2022. Despite thorough investigations, the responsible party remains unidentified, underscoring the challenge of attribution in incidents involving critical infrastructure.&lt;sup id="fnref:16"&gt;&lt;a href="#fn:16" class="footnote-ref" role="doc-noteref"&gt;16&lt;/a&gt;&lt;/sup&gt; Whether the Baltic cable cuts were acts of sabotage or merely accidental, the broader imperative remains clear, submarine cables must be protected, strengthened, and made resilient to withstand both deliberate attacks and natural disasters.&lt;/p&gt;
&lt;p&gt;The significance of submarine cables in the contemporary era is impossible to overstate. These cables are the backbone of global communications, carrying more than 95% of international internet traffic. Every financial transaction, communication, and data transfer that crosses international boundaries depends on the continued integrity of these undersea links. The interconnected nature of global economies and societies hinges on this largely unseen infrastructure beneath the ocean&amp;rsquo;s surface. This is critical infrastructure that is, in many cases, simply resting on the sea floor in unpatrolled international waters. The recent damage to Baltic cables is a reminder to global governments, urging them to rethink how they safeguard critical infrastructure in an era where digital connectivity is essential.&lt;/p&gt;
&lt;p&gt;Securing this infrastructure requires a holistic strategy that encompasses redundancy, technological advancement, and enhanced security protocols. By advocating for increased redundancy, nations can make the global internet more resilient to large-scale disruptions, minimizing the risk that arises from individual cable failures. Geographic path diversity must be prioritized to avoid creating critical bottlenecks that could be exploited by malicious actors or accidental damage. Building a resilient web of connectivity that can absorb shocks without compromising functionality is crucial for ensuring global stability in an increasingly unpredictable world.&lt;/p&gt;
&lt;p&gt;Adopting smart submarine cable technology is a forward-thinking solution that not only enhances security but also contributes to environmental monitoring and research. By integrating sensors along cables, authorities gain a comprehensive understanding of seafloor conditions, allowing them to detect threats in real time and respond effectively. Government incentives, such as subsidies for adopting smart technologies, can encourage private companies to invest in these innovations, ensuring that both new and existing cables are equipped to meet the evolving challenges of the twenty-first century. Smart sensors are not merely tools for scientific advancement; they are indispensable elements of modern infrastructure security.&lt;/p&gt;
&lt;p&gt;Furthermore, fortifying state posture around submarine cable infrastructure is crucial for deterring adversarial actions and safeguarding national interests. Governmental entities, such as Team Telecom in the United States, must take proactive measures to assess risks associated with submarine cables and ensure that they do not become strategic vulnerabilities. Enhanced physical security measures at landing stations and other critical points must be implemented to prevent unauthorized interference. The strategic importance of submarine cables necessitates a multifaceted approach to security that integrates technological innovation, physical safeguards, and international cooperation.&lt;/p&gt;
&lt;p&gt;The incidents involving the Baltic submarine cables serve as a stark reminder of the vulnerabilities inherent in the infrastructure that supports global communications. Whether these severances were caused by sabotage or negligence is ultimately secondary to the greater necessity of securing these critical assets. Submarine cables must be rendered resilient to withstand both human-induced threats and the forces of nature. As society becomes ever more dependent on digital connectivity, the urgency of securing these networks becomes increasingly evident. Ensuring redundancy, embracing smart technologies, and fortifying security measures are essential steps toward safeguarding the future of global communications. The moment to act is now, before further incidents reveal the fragility of the infrastructure that sustains our interconnected society.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Emmet Lyons, “Undersea Cables Cut or Damaged, Leading European Nations to Investigate Possible Sabotage,” &lt;em&gt;CBS News&lt;/em&gt;, November 20, 2024, &lt;a href="https://www.cbsnews.com/news/undersea-cables-cut-europe-finland-germany-hint-russia-sabotage/"&gt;https://www.cbsnews.com/news/undersea-cables-cut-europe-finland-germany-hint-russia-sabotage/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Henri Astier &amp;amp; Paul Kirby, “Germany Suspects Sabotage Over Severed Undersea Cables in Baltic,” &lt;em&gt;BBC News&lt;/em&gt;, November 19, 2024, &lt;a href="https://www.bbc.com/news/articles/c9dl4vxw501o"&gt;https://www.bbc.com/news/articles/c9dl4vxw501o&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Viivi Koivistoinen, Tiina Aspeslagh, and Jesse Mäntysalo, “Traficom Ylelle: Suomen Ja Saksan Välinen Merikaapeli on Katkennut – Näin Supo Kommentoi,” &lt;em&gt;Yle Uutiset&lt;/em&gt;, November 18, 2024, &lt;a href="https://yle.fi/a/74-20125324"&gt;https://yle.fi/a/74-20125324&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Melissa Eddy and Johanna Lemola, “Severing of Baltic Sea Cables Was ‘Sabotage,’ Germany Says,” &lt;em&gt;The New York Times&lt;/em&gt;, November 19, 2024, &lt;a href="https://www.nytimes.com/2024/11/19/business/finland-germany-cable-baltic-sea.html"&gt;https://www.nytimes.com/2024/11/19/business/finland-germany-cable-baltic-sea.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Adam Satariano et al., “How The Internet Travels Across Oceans,” &lt;em&gt;The New York Times&lt;/em&gt;, March 13, 2019, &lt;a href="https://www.nytimes.com/interactive/2019/03/10/technology/internet-cables-oceans.html"&gt;https://www.nytimes.com/interactive/2019/03/10/technology/internet-cables-oceans.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;David E. Sanger and Eric Schmitt, “Russian Ships Near Data Cables Are Too Close for U.S. Comfort,” &lt;em&gt;The New York Times&lt;/em&gt;, October 25, 2015, &lt;a href="https://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html"&gt;https://www.nytimes.com/2015/10/26/world/europe/russian-presence-near-undersea-cables-concerns-us.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Sebastian Moss, “Report: Irish Police Claim Russian Agents Scouted Submarine Cable Landing Stations,” &lt;em&gt;Data Center Dynamics&lt;/em&gt;, February 18, 2020, &lt;a href="https://www.datacenterdynamics.com/en/news/report-irish-police-claim-russian-agents-scouted-submarine-cable-landing-stations/"&gt;https://www.datacenterdynamics.com/en/news/report-irish-police-claim-russian-agents-scouted-submarine-cable-landing-stations/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Lisa O’Carroll, “Russian Spy Ship Escorted Away From Area With Critical Cables in Irish Sea,” &lt;em&gt;The Guardian&lt;/em&gt;, November 16, 2024, &lt;a href="https://www.theguardian.com/world/2024/nov/16/russian-spy-ship-escorted-away-from-internet-cables-in-irish-sea"&gt;https://www.theguardian.com/world/2024/nov/16/russian-spy-ship-escorted-away-from-internet-cables-in-irish-sea&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Emile Aben, “Does the Internet Route Around Damage? - Baltic Sea Cable Cuts,” &lt;em&gt;RIPE Labs&lt;/em&gt;, November 20, 2024, &lt;a href="https://labs.ripe.net/author/emileaben/does-the-internet-route-around-damage-baltic-sea-cable-cuts/"&gt;https://labs.ripe.net/author/emileaben/does-the-internet-route-around-damage-baltic-sea-cable-cuts/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;Rajeswari Pillai Rajagopalan, “Undersea Cables Are Increasingly Critical and Vulnerable,” &lt;em&gt;The Diplomat&lt;/em&gt;, March 27, 2024, &lt;a href="https://thediplomat.com/2024/03/undersea-cables-are-increasingly-critical-and-vulnerable/"&gt;https://thediplomat.com/2024/03/undersea-cables-are-increasingly-critical-and-vulnerable/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:11"&gt;
&lt;p&gt;Daniel F. Runde, Erin L. Murphy, and Thomas Bryja, “Safeguarding Subsea Cables: Protecting Cyber Infrastructure Amid Great Power Competition,” &lt;em&gt;Center for Strategic &amp;amp; International Studies&lt;/em&gt;, October 15, 2024, &lt;a href="https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition"&gt;https://www.csis.org/analysis/safeguarding-subsea-cables-protecting-cyber-infrastructure-amid-great-power-competition&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:12"&gt;
&lt;p&gt;Paul Voosen, “‘Smart’ Fiber-optic Cables on the Sea Floor Will Detect Earthquakes, Tsunamis, and Global Warming,” &lt;em&gt;Science&lt;/em&gt;, March 13, 2024, &lt;a href="https://www.science.org/content/article/smart-fiber-optic-cables-sea-floor-will-detect-earthquakes-tsunamis-and-global-warming"&gt;https://www.science.org/content/article/smart-fiber-optic-cables-sea-floor-will-detect-earthquakes-tsunamis-and-global-warming&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:13"&gt;
&lt;p&gt;Bob Wallace, “Smart(Er) Subsea Cables to Provide Early Warning System,” &lt;em&gt;Network Computing&lt;/em&gt;, November 20, 2024, &lt;a href="https://www.networkcomputing.com/network-management/smart-er-subsea-cables-to-provide-early-warning-system"&gt;https://www.networkcomputing.com/network-management/smart-er-subsea-cables-to-provide-early-warning-system&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:14"&gt;
&lt;p&gt;David Shepardson, “US Agency to Launch Review of Undersea Cables, National Security Risks,” &lt;em&gt;Reuters&lt;/em&gt;, October 30, 2024, &lt;a href="https://www.reuters.com/technology/us-agency-vote-launch-review-undersea-cable-vulnerabilities-2024-10-30/"&gt;https://www.reuters.com/technology/us-agency-vote-launch-review-undersea-cable-vulnerabilities-2024-10-30/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:14" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:15"&gt;
&lt;p&gt;Colin Wall and Pierre Morcos. “Invisible and Vital: Undersea Cables and Transatlantic Security.” &lt;em&gt;Center for Strategic &amp;amp; International Studies&lt;/em&gt;, 2021. &lt;a href="https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security"&gt;https://www.csis.org/analysis/invisible-and-vital-undersea-cables-and-transatlantic-security&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:16"&gt;
&lt;p&gt;Melissa Eddy, “Nord Stream Pipeline Breaks Look Deliberate, Europeans Say,” &lt;em&gt;The New York Times&lt;/em&gt;, September 28, 2022, &lt;a href="https://www.nytimes.com/2022/09/27/world/europe/pipeline-leak-russia-nord-stream.html"&gt;https://www.nytimes.com/2022/09/27/world/europe/pipeline-leak-russia-nord-stream.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:16" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Perfect Image Processing with Hugo</title><link>https://rb.ax/blog/perfect-image-processing-with-hugo/</link><pubDate>Mon, 11 Nov 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/perfect-image-processing-with-hugo/</guid><description>&lt;p&gt;&lt;figure aria-label="With the correct image processing you can still get a 100 score from PageSpeed Insights despite an image heavy article. This is an evaluation of my Speedgoat race report in July."&gt;
 &lt;img
 alt="With the correct image processing you can still get a 100 score from PageSpeed Insights despite an image heavy article. This is an evaluation of my Speedgoat race report in July."
 title="With the correct image processing you can still get a 100 score from PageSpeed Insights despite an image heavy article. This is an evaluation of my Speedgoat race report in July."
 width="1433"
 height="1124"srcset="https://rb.ax/blog/perfect-image-processing-with-hugo/pagespeed-insights-100-featured_hu_7dc8bb0846827eda.webp 480w, https://rb.ax/blog/perfect-image-processing-with-hugo/pagespeed-insights-100-featured_hu_639b8d1468e9bf46.webp 768w, https://rb.ax/blog/perfect-image-processing-with-hugo/pagespeed-insights-100-featured_hu_1f1c20052dbc9696.webp 1024w, https://rb.ax/blog/perfect-image-processing-with-hugo/pagespeed-insights-100-featured_hu_47db9e043044411a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/perfect-image-processing-with-hugo/pagespeed-insights-100-featured_hu_fac2eeb341e4e6fb.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;With the correct image processing you can still get a 100 score from PageSpeed Insights despite an image heavy article. This is an evaluation of my &lt;a href="https://rb.ax/blog/speedgoat-50k-2024-race-report/"&gt;Speedgoat race report&lt;/a&gt; in July.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I use &lt;a href="https://gohugo.io/"&gt;Hugo&lt;/a&gt; to build this little blog and it frequently gets incredibly frustrating. My safe space in technology is tagging BGP routes with regex matched communities, not web development. There are tutorials, guides, and support threads on a variety of topics for basically anything you could think of for Hugo. But the time sink to first conceptualize a problem and thereafter apply a best practice fix is very long. In most cases it takes me a long Saturday afternoon to do a simple task like setting up an RSS feed. It has been months of sporadic reading and tinkering to find a suitable image processing script I am happy with.&lt;/p&gt;
&lt;p&gt;In the past I was extremely spoiled and babied by content management systems (CMS) like &lt;a href="https://ghost.org/"&gt;Ghost&lt;/a&gt;. A few clicks here and there made everything come together easily. There was a problem with all of that capability. It added a great deal of unnecessary bloat that bogged down page requests and added tens of megabytes to simple text and image pages. Also, dealing with a database on Ghost&amp;rsquo;s backend was entirely overkill for my goal of having a basic static website. While these behaviors aren&amp;rsquo;t specific to Ghost or any other CMS it is certainly the trending average for them. To get a CMS paired down appropriately would require a great deal of time and I could spend the same time learning basic web design and be farther ahead in the end.&lt;/p&gt;
&lt;p&gt;Instead, I embraced Hugo with the direct goal of learning the fundamentals of web design while keeping my blog simple and fast. Not to create something fancy or awe inspiring. But to just be decent enough to operate the fundamentals of a text and image static site.&lt;/p&gt;
&lt;p&gt;Ironically, while Hugo aims to be an ultra fast static site generator it doesn&amp;rsquo;t specifically share an all encompassing image processing script, which is arguably the biggest burden on site data transfer usage. There is a thorough &lt;a href="https://gohugo.io/content-management/image-processing/"&gt;Image Processing&lt;/a&gt; guide from Hugo but putting all the pieces together is something for serious web developer folks. I have instead relied on smashing together several other people&amp;rsquo;s scripts in order to get something I am comfortable running. However, this might be the fundamental goal of the Hugo developers. To give an array of appropriate tools and leave the overall crafting of image processing up to each project owner.&lt;/p&gt;
&lt;p&gt;While the script I built has some elements from various authors, the biggest inspiration came from Michael Welford.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; I didn&amp;rsquo;t take his same approach for inserting gradient image placeholders (GIP), however, his logical approach to skipping SVG and GIF files to the collection of breakpoint sizes was very helpful.&lt;/p&gt;
&lt;p&gt;This script relies on overriding the default behavior of Hugo for calling out images with Markdown. This is easily done by placing a file in &lt;code&gt;layouts/_default/_markup/render-image.html&lt;/code&gt;. In the past I had used shortcodes to perform the same image processing but the syntax in Markdown documents was jarring and incompatible. By using regular Markdown to call out images you can draft documents much easier in Visual Studio Code, iA Writer, or anything else that suits your fancy. You will also future proof your Markdown documents in case you decide to move to something else besides Hugo.&lt;/p&gt;
&lt;p&gt;To insert an image in a post I would use the normal Markdown syntax for an image:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;![A dirt road with a steep trail going up to Mount Baldy.](speedgoat-50k-2024-mount-baldy-ascent.webp &amp;quot;The turn off before I started climbing Mount Baldy.&amp;quot;)&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;The text &amp;ldquo;A dirt road with a steep trail going up to Mount Baldy.&amp;rdquo; will serve as the image&amp;rsquo;s alt attribute unless overridden by the last text field. Since I&amp;rsquo;m using Hugo&amp;rsquo;s &lt;a href="https://gohugo.io/content-management/page-bundles/"&gt;Page Bundles&lt;/a&gt;, I specify the image file &amp;ldquo;speedgoat-50k-2024-mount-baldy-ascent.webp&amp;rdquo; without any sort of folder structure prefix. The last text parameter &amp;ldquo;The turn off before I started climbing Mount Baldy.&amp;rdquo; will become the figcaption, title attribute, and accessibility aria-label. There is certainly a limitation to compressing all these fields into a limited number of inputs. Yet, you have to decide if the trade off is worth it for the wider compatibility of using Markdown. The only alternative is to spread this out through a dedicated Hugo shortcode as you see fit. But if there comes a time in the future where you have to migrate away from Hugo this will become a pain in the ass to convert.&lt;/p&gt;
&lt;p&gt;The Markdown callout will build the below HTML for the img wrapped inside a figure element. Remember that the alt attribute is replaced by the last text field, if present. I formatted it all for easier reading:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;&amp;lt;figure role=&amp;#34;figure&amp;#34; aria-label=&amp;#34;The turn off before I started climbing Mount Baldy.&amp;#34;&amp;gt;
 &amp;lt;img 
 alt=&amp;#34;The turn off before I started climbing Mount Baldy.&amp;#34; 
 title=&amp;#34;The turn off before I started climbing Mount Baldy.&amp;#34; 
 width=&amp;#34;1600&amp;#34; height=&amp;#34;1200&amp;#34; 
 srcset=&amp;#34;
 /blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu10284923237444045690.webp 420w,
 /blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu8804836215186072207.webp 789w,
 /blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu10352609384891324939.webp 1019w,
 /blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu14272288209653111312.webp 1430w,&amp;#34; 
 sizes=&amp;#34;(min-width: 800px) 50vw, 100vw&amp;#34; 
 src=&amp;#34;/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu8823523890708859362.jpg&amp;#34; 
 decoding=&amp;#34;async&amp;#34; 
 loading=&amp;#34;lazy&amp;#34;
 &amp;gt;
 &amp;lt;figcaption&amp;gt;The turn off before I started climbing Mount Baldy.&amp;lt;/figcaption&amp;gt;
&amp;lt;/figure&amp;gt;
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;As you can see there is a fallback JPG image availability for legacy browsers but WEBP is now widely supported&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; by anything recently up to date.&lt;/p&gt;
&lt;p&gt;Many resampling filters are available through Hugo image processing but I chose Lanczos due to the superior results it was giving with high resolution images. I don&amp;rsquo;t specify a quality value so Hugo defaults to 75 out of a scale of 100. Another thing to note is that despite trying all resampling filters I had issues with charts and maps becoming discolored or added compression artifacts. After further experimentation I realized this was only happening when those screenshots I had taken were WEBP prior to being processed by Hugo. If I fed them in as JPG they were perfectly fine afterwards as WEBP. This must have something to do with Hugo&amp;rsquo;s image processing on Windows since I could not replicate the issue by performing the same WEBP to WEBP conversion with Adobe Photoshop.&lt;/p&gt;
&lt;p&gt;The sizes attribute within the img tag of the script specifies how the browser should choose the appropriate image size to load based on the layout of the webpage. With the growing adoption of high resolution retina screens and the variability of mobile browsing it gets very complicated to efficiently manage an image&amp;rsquo;s size as it&amp;rsquo;s offered up to the browser. One major improvement in managing sizes was from some advice from Chris Coyier&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; to effectively let the browser figure it out. In my script, I adopt Mr. Coyier&amp;rsquo;s advice and the sizes attribute is set to &lt;code&gt;(min-width: 800px) 50vw, 100vw&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Overall, this works as a set of conditions and values to determine the correct image to provide to the browser requesting the webpage. The first part is a condition &lt;code&gt;(min-width: 800px)&lt;/code&gt;, which defines a media query. If the viewport width is at least 800 pixels, the condition is true. The second part is the value 50vw. If the condition of viewport width ≥ 800px is true, the browser will calculate the image size to be 50% of the viewport’s width. The last part determines if a default of 100vw will come into play into the browser&amp;rsquo;s calculations. If the condition of viewport width &amp;lt; 800px is false, the browser will use the fallback value of 100vw, meaning the image should take up the full width of the viewport.&lt;/p&gt;
&lt;p&gt;This attribute works in conjunction with the srcset attribute, which provides a list of available image versions in different resolutions or widths. The browser uses the sizes attribute to determine how large the image will appear in the layout and then selects the most appropriate image from the srcset options. For example, on a desktop with a screen width of 1024px the image might be displayed at 512px wide, which would make it 50% of the viewport width. On a smaller device, like a smartphone with a width of 400px, the image would instead be displayed at 400px wide being 100% of the viewport width. This ensures the best quality image is loaded without unnecessary file size overhead, saving bandwidth and improving load times.&lt;/p&gt;
&lt;p&gt;Additional features of the script include eager loading and sync decoding for image files that have &amp;ldquo;featured&amp;rdquo; in the file name. This is especially helpful for images that appear at the top of a web page. If you relied on lazy loading and async decoding for these front and center images you might get a lower PageSpeed score. And to be frank, that isn&amp;rsquo;t best practice. Those deferment parameters are meant for images that load later in a web page.&lt;/p&gt;
&lt;p&gt;Lastly, it is very helpful to specifically define an image&amp;rsquo;s width and height to a numeric value. This helps the browser appropriately render the page since it knows the dimensions of all elements.&lt;/p&gt;
&lt;p&gt;This script relies on overriding the default behavior of Hugo for calling out images with Markdown. You can do this by creating a file at &lt;code&gt;layouts/_default/_markup/render-image.html&lt;/code&gt;. Otherwise, you could theoretically create your own shortcode and reference it by whichever name you chose. I would also recommend manually deleting the contents of &lt;code&gt;public&lt;/code&gt; prior to rebuilding your site&amp;rsquo;s images with this or any other script, as per Hugo &lt;a href="https://discourse.gohugo.io/t/delete-public-or-not/40354"&gt;best practice&lt;/a&gt;. You don&amp;rsquo;t want it cluttered with a huge arrangement of stale srcset junk built from an old script.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;{{- $image_sizes := slice &amp;#34;420&amp;#34; &amp;#34;789&amp;#34; &amp;#34;1019&amp;#34; &amp;#34;1430&amp;#34; &amp;#34;2048&amp;#34; -}}
{{- $image_quality := &amp;#34;Lanczos&amp;#34; -}}
{{- $alt := .Text -}}
{{- $label := .Text -}}
{{- $caption := &amp;#34;&amp;#34; -}}
{{- if ne .Title &amp;#34;&amp;#34; -}}
 {{- $caption = .Title | $.Page.RenderString -}}
 {{- $label = $caption -}}
{{- end -}}
{{- $image := .Page.Resources.GetMatch .Destination -}}
{{- if and (not $image) .Page.File -}}
 {{- $image = resources.Get (path.Join .Page.File.Dir .Destination) -}}
{{- else -}}
 {{- $image := resources.Get $image -}}
{{- end -}}
{{- with $image -}}
 {{- $image_width := $image.Width -}}
 {{- $image_height := $image.Height -}}
 {{- if strings.Contains $image &amp;#34;_2x&amp;#34; -}}
 {{- $image_width = math.Floor (math.Div $image_width 2) -}}
 {{- $image_height = math.Floor (math.Div $image_height 2) -}}
 {{- end -}}
 {{- $fallback_image := ($image.Resize (print &amp;#34;789x jpg &amp;#34; $image_quality)) -}}
&amp;lt;figure role=&amp;#34;figure&amp;#34; aria-label=&amp;#34;{{- $label | plainify -}}&amp;#34;&amp;gt;
 &amp;lt;img
 alt=&amp;#34;{{- $caption | markdownify | plainify -}}&amp;#34;
 title=&amp;#34;{{- $label | plainify -}}&amp;#34;
 width=&amp;#34;{{- $image_width -}}&amp;#34;
 height=&amp;#34;{{- $image_height -}}&amp;#34;
 {{- if (or (strings.HasSuffix $image &amp;#34;.gif&amp;#34;) (strings.HasSuffix $image &amp;#34;.svg&amp;#34;)) -}}
 src=&amp;#34;{{- $image.RelPermalink -}}&amp;#34;
 {{- else -}}
 srcset=&amp;#34;
 {{- if le $image.Width (index $image_sizes 0) }}
 {{- with $image.Resize (print $image.Width &amp;#34;x webp &amp;#34; $image_quality) -}}
 {{- print .RelPermalink &amp;#34; &amp;#34; .Width &amp;#34;w, &amp;#34; -}}
 {{- end -}}
 {{- end -}}
 {{- with $image_sizes -}}
 {{- range $index, $size := . -}}
 {{- if ge $image.Width $size -}}
 {{- with $image.Resize (print $size &amp;#34;x webp &amp;#34; $image_quality) -}}
 {{- print .RelPermalink &amp;#34; &amp;#34; $size &amp;#34;w, &amp;#34; -}}
 {{- end -}}
 {{- end -}}
 {{- end -}}
 {{- end -}}&amp;#34;
 sizes=&amp;#34;(min-width: 800px) 50vw, 100vw&amp;#34;
 src=&amp;#34;{{- $fallback_image.RelPermalink -}}&amp;#34;
 {{- end -}}
 {{- if strings.Contains $image &amp;#34;featured&amp;#34; -}}
 loading=&amp;#34;eager&amp;#34;
 decoding=&amp;#34;sync&amp;#34;
 {{- else -}}
 decoding=&amp;#34;async&amp;#34;
 loading=&amp;#34;lazy&amp;#34;
 {{- end -}}
 /&amp;gt;
 &amp;lt;/a&amp;gt;
 &amp;lt;figcaption&amp;gt;{{- $caption -}}&amp;lt;/figcaption&amp;gt;
&amp;lt;/figure&amp;gt;
{{- end -}}
&lt;/code&gt;&lt;/pre&gt;&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Michael Welford, “Responsive Image Management With Hugo,&amp;quot; &lt;em&gt;Michael Welford&lt;/em&gt; (blog), May 31, 2024, &lt;a href="https://its.mw/posts/hugo-responsive-images/"&gt;https://its.mw/posts/hugo-responsive-images/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Alexis Deveria, “WebP Image Format,&amp;quot; &lt;em&gt;Can I Use&amp;hellip;&lt;/em&gt;, April 7, 2024, &lt;a href="https://caniuse.com/webp"&gt;https://caniuse.com/webp&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Chris Coyier, “Responsive Images: If You&amp;rsquo;Re Just Changing Resolutions, Use Srcset,” &lt;em&gt;CSS-Tricks&lt;/em&gt; (blog), September 7, 2015, &lt;a href="https://css-tricks.com/responsive-images-youre-just-changing-resolutions-use-srcset/"&gt;https://css-tricks.com/responsive-images-youre-just-changing-resolutions-use-srcset/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>BGP Route Origin Authorization Regulation</title><link>https://rb.ax/blog/bgp-route-origin-authorization-regulation/</link><pubDate>Thu, 31 Oct 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/bgp-route-origin-authorization-regulation/</guid><description>&lt;p&gt;Recent heightened scrutiny of government regulation surrounding BGP (Border Gateway Protocol) ROA (Route Origin Authorization) has emerged as a critical topic within the internet infrastructure community. As the fundamental routing protocol of the global internet, BGP is essential in ensuring that data reaches its intended destination with efficiency. To put it simply, BGP works like a postal service for the internet, ensuring that data packets are routed through the best possible paths to reach their intended recipients. However, its inherent vulnerabilities have introduced substantial risks, such as route hijacking and misconfigurations, prompting increased regulatory attention from governments worldwide.&lt;/p&gt;
&lt;p&gt;A United States Federal Communications Commission (FCC) report&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; that was published in May of 2024, emphasizes the importance of strengthening the security of critical internet infrastructure by encouraging the adoption of secure routing technologies like RPKI (Resource Public Key Infrastructure), which plays a crucial role in supporting BGP ROA by providing the infrastructure for validating route origin authorizations. It underscored the need for coordinated efforts among private entities, standards bodies, and government authorities to mitigate vulnerabilities in BGP routing. The report also highlights the challenges faced by smaller ISPs in achieving compliance, advocating for balanced regulatory approaches that enhance security without imposing undue burdens. Additionally, it recognizes the need for improving resilience while maintaining the openness and flexibility of the internet.&lt;/p&gt;
&lt;p&gt;The Internet Society and Cyber Global Alliance&amp;rsquo;s response&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; to the FCC report expressed significant concern over the direction of the proposed regulations, highlighting the risk of centralization and government overreach. John Morris and Ryan Polk argued that mandating compliance with BGP ROA and RPKI could compromise the fundamental openness of the internet, especially if regulatory bodies hold excessive control over routing infrastructure. Furthermore, the Internet Society emphasized that such mandates could disproportionately impact smaller ISPs, potentially stifling competition and innovation.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; They called for a more inclusive, community-driven approach to improving BGP security that respects the diverse needs of stakeholders and avoids introducing unnecessary points of control.&lt;/p&gt;
&lt;p&gt;Later in June, the FCC sought comments on a proposal&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; that would require nine major US internet service providers to draft BGP Routing Security Risk Management Plans, and confidentially report them to the federal agency. The FCC would want status updates on the specific efforts made to create and maintain ROAs for at least 90% of the routes under its control. Additionally, measures taken to which each carrier has implemented Route Origin Validation (ROV) filtering at its interconnection points.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;In addition to the FCC&amp;rsquo;s pushes, in September 2024, the White House Office of the National Cyber Director released a press statement&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; calling for the adoption of BGP ROA as part of a broader roadmap to enhance internet routing security. The press release emphasized the urgency of securing critical internet infrastructure and highlighted the Biden-Harris Administration&amp;rsquo;s commitment to promoting best practices in routing security. I shared this with a few people and all were surprised such an esoteric networking concept had made it to a White House press release. Yet it does signal to the internet infrastructure community just how top of mind the subject is and how important the internet has become to our normal day to day life.&lt;/p&gt;
&lt;p&gt;BGP was originally designed with an emphasis on openness and mutual trust, assuming that network operators would configure routes correctly without the need for stringent security mechanisms. This trust-first model, however, has often led to significant unintended or malicious disruptions of internet connectivity. Incidents of route hijacking and route leaks have precipitated widespread outages, unauthorized interception of network traffic, and even serious security breaches—resulting in substantial financial losses and undermining global connectivity.&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; In response, numerous countries are advocating for stronger regulatory oversight, focusing on the implementation of technologies such as ROA to enhance BGP routing security.&lt;/p&gt;
&lt;p&gt;ROA is a pivotal component within the RPKI framework. It permits network operators to authorize specific IP prefixes to be advertised by designated ASNs (Autonomous System Numbers), thereby providing a mechanism for validation that ensures only legitimate networks can announce routes. This validation mechanism has demonstrated its efficacy in mitigating certain classes of attacks and in reducing the likelihood of route leaks. However, as governments seek to mandate the adoption of ROA, critical questions arise regarding the appropriate methods for regulatory implementation and the potential for unintended negative consequences.&lt;/p&gt;
&lt;p&gt;The increased scrutiny of BGP ROA represents a double-edged sword. On the one hand, governmental mandates for BGP ROA compliance could markedly enhance the security of the internet&amp;rsquo;s routing system by reducing its vulnerability to attacks. On the other hand, there are legitimate concerns about potential overreach, bureaucratic inefficiencies, and the resulting impact to internet service providers. Mandating the use of ROA and RPKI could impose additional compliance burdens on smaller ISPs, which may lack the financial and technical resources to adapt readily to these regulatory demands. Furthermore, the centralization of validation authorities under government-regulated bodies raises concerns about new points of failure and the potential for state-level censorship and control. For instance, China&amp;rsquo;s implementation of the Great Firewall leverages routing controls to restrict access to certain online content, illustrating how centralized control could be exploited for censorship.&lt;/p&gt;
&lt;p&gt;The central challenge lies in achieving an equilibrium between security and the openness that has been fundamental to the internet&amp;rsquo;s design. While there is widespread consensus within the industry that enhancing BGP security is crucial for maintaining the internet&amp;rsquo;s reliability, the mechanisms for accomplishing this goal remain subject to ongoing debate. A collaborative approach involving private network operators, standards organizations, and governmental entities will be essential for formulating policies that bolster security without eroding the openness that underpins the internet&amp;rsquo;s utility and innovation. It is admirable that the FCC chose not to impose direct regulation, instead opting to ask carriers to report on the progress of BGP ROA adoption. This approach not only encourages accountability but also provides flexibility for carriers to adapt their practices while aligning with the overall goal of enhancing internet security.&lt;/p&gt;
&lt;p&gt;Ultimately, the growing governmental scrutiny of BGP ROA regulation reflects a broader trend towards bolstering the resilience and security of critical internet infrastructure. This evolving conversation has far-reaching implications, affecting all stakeholders—from major service providers to individual end-users—as the repercussions of routing incidents can be felt universally. The aspiration is that through deliberate, collaborative regulation, the internet will continue to evolve in a manner that preserves both its security and its openness for all.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;United States Federal Communications Commission, “FCC FACT SHEET Reporting on Border Gateway Protocol Risk Mitigation Progress Notice of Proposed Rulemaking PS Docket Nos. 24-146 and 22-90,” May 16, 2024, &lt;a href="https://docs.fcc.gov/public/attachments/DOC-402609A1.pdf"&gt;https://docs.fcc.gov/public/attachments/DOC-402609A1.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Internet Society and Global Cyber Alliance, &amp;ldquo;Matter of Safeguarding and Securing the Open Internet,&amp;rdquo; April 17, 2024, &lt;a href="https://www.internetsociety.org/wp-content/uploads/2024/04/2024-FCC-Ex-Parte-re-BGP.pdf"&gt;https://www.internetsociety.org/wp-content/uploads/2024/04/2024-FCC-Ex-Parte-re-BGP.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;John Morris and Ryan Polk, “The US FCC Signals a Dangerous New Course on BGP Security,” &lt;em&gt;Internet Society&lt;/em&gt;, April 18, 2024, &lt;a href="https://www.internetsociety.org/blog/2024/04/the-us-fcc-signals-a-dangerous-new-course-on-bgp-security/"&gt;https://www.internetsociety.org/blog/2024/04/the-us-fcc-signals-a-dangerous-new-course-on-bgp-security/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;United States Federal Communications Commission, “Reporting on Border Gateway Protocol Risk
Mitigation Progress PS Docket Nos. 24-146 and 22-90,” June 7, 2024, &lt;a href="https://docs.fcc.gov/public/attachments/FCC-24-62A1.pdf"&gt;https://docs.fcc.gov/public/attachments/FCC-24-62A1.pdf&lt;/a&gt;&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Doug Madory, “Dissecting the FCC’s Proposal to Improve BGP Security,” &lt;em&gt;North American Network Operators Group&lt;/em&gt;, August 23, 2024, &lt;a href="https://nanog.org/stories/articles/dissecting-the-fccs-proposal-to-improve-bgp-security/"&gt;https://nanog.org/stories/articles/dissecting-the-fccs-proposal-to-improve-bgp-security/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;White House, “Fact Sheet: Biden-Harris Administration Releases Roadmap to Enhance Internet Routing Security,” The White House, September 3, 2024, &lt;a href="https://www.whitehouse.gov/oncd/briefing-room/2024/09/03/fact-sheet-biden-harris-administration-releases-roadmap-to-enhance-internet-routing-security/"&gt;https://www.whitehouse.gov/oncd/briefing-room/2024/09/03/fact-sheet-biden-harris-administration-releases-roadmap-to-enhance-internet-routing-security/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Mike Conlow, Emily Music, and Tom Strickx, “Making Progress on Routing Security: The New White House Roadmap,” The Cloudflare Blog, October 9, 2024, &lt;a href="https://blog.cloudflare.com/white-house-routing-security/"&gt;https://blog.cloudflare.com/white-house-routing-security/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Meta Ends Direct Peering with Deutsche Telekom</title><link>https://rb.ax/blog/meta-ends-direct-peering-with-deutsche-telekom/</link><pubDate>Sat, 28 Sep 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/meta-ends-direct-peering-with-deutsche-telekom/</guid><description>&lt;p&gt;On Wednesday, Meta announced&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; it was ending its direct peering relationship with Deutsche Telekom (DT) due to the fee being charged for the connections. DT also had some strong words on their perspective of the situation.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; This effectively means all DT customers will now have their traffic flow along a longer path through another internet service provider to reach Meta applications. It could mean slower or latent WhatsApp messaging, Instagram reels, or Facebook content. Not the end of the world for most people but it brings the architecture of the internet and the business decisions around it to news articles and public focus. It is also prompts a reexamination of peering agreements in the context of technology giants and how they work in building the internet.&lt;/p&gt;
&lt;p&gt;To provide some background on why Meta made their decision we need to go back to 2010. DT and Meta, then still Facebook, struck a direct peering deal where DT set aside 24 private interconnection points with 50 ports and 5,000 Gbps at seven locations.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; All to handle traffic from DT&amp;rsquo;s customers towards Meta&amp;rsquo;s suite of applications: Facebook, Instagram, WhatsApp. Meta paid €5.8 million a year for these direct connections. All with the exclusive goal of making Facebook applications quicker for DT customers. Fast forward to 2020, and Meta asked for a 40% discount during contract renewal negotiations. DT countered with a 16% discount but then COVID-19 pandemic hit and it became less of a focus for both companies.&lt;/p&gt;
&lt;p&gt;Later on in March 2021, DT had left the status quo intact and was offering to keep the ports running “for the benefit of consumers” while working out a new contract agreement with Meta. While this extended runway was provided to Meta, DT kept billing them for the original amount. However, Meta stopped paying the invoices and claimed these connections were now a &amp;ldquo;settlement-free peering.&amp;rdquo; They stated this kind of no fee direct peering setup was standard practice in the internet world. This is true for some peering arrangements but we&amp;rsquo;ll get into that later. This assertion by Meta was also proven by their experience globally with other telecom providers. DT was the unique exception that was charging transit fees.&lt;/p&gt;
&lt;p&gt;DT obvious didn&amp;rsquo;t agree with this interpretation and in December 2022, the telecom giant sued Meta’s German subsidiary. The court ruled&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; in DT’s favor, ordering Meta to pay €20 million. Under German contract law the continued use of the connections by Meta after stating the contract was terminated simply created a new contract. Thereafter, to avoid further fees under the new contract, Meta terminated these direct peering connections with DT.&lt;/p&gt;
&lt;p&gt;The scope of impact is unclear for DT customers but we can already see the path changes network traffic towards Meta subnets. Based on &lt;a href="https://lookingglass.telekom.com/?queryTerm=%3F%2032934%20*&amp;amp;queryType=AsPathQuery&amp;amp;selectedVantagePoints=%5B%22Berlin%2C%20Germany%22%5D"&gt;201 routes from DT&amp;rsquo;s looking glass tool towards Meta&amp;rsquo;s AS32934&lt;/a&gt; I took an example route to show 3 of the currently available paths. 82 routes go through AS1299 Arelion, the artist formerly known as Telia. Only about 5 routes go through AS174, which is Cogent. The last 113 routes go through GTT&amp;rsquo;s AS3257.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Vantage Point&lt;/th&gt;
 &lt;th&gt;Prefix&lt;/th&gt;
 &lt;th&gt;AS Path&lt;/th&gt;
 &lt;th&gt;BGP Next Hop&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Berlin, Germany&lt;/td&gt;
 &lt;td&gt;69.171.224.0/20&lt;/td&gt;
 &lt;td&gt;1299 32934&lt;/td&gt;
 &lt;td&gt;194.25.5.185&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Berlin, Germany&lt;/td&gt;
 &lt;td&gt;57.144.134.0/23&lt;/td&gt;
 &lt;td&gt;174 32934&lt;/td&gt;
 &lt;td&gt;194.25.5.184&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Berlin, Germany&lt;/td&gt;
 &lt;td&gt;157.240.9.0/24&lt;/td&gt;
 &lt;td&gt;3257 32934&lt;/td&gt;
 &lt;td&gt;194.25.5.185&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;These tier 1 service providers that are now handling this new transit traffic are large enough to handle it. However, DT claims Meta was sending approximately 3.5 TBps so the up tick will hardly go unnoticed by these 3 other providers. The technical aspects of this new routing situation are incredibly simple. All that happened for most traffic was an additional AS in the path. Further evidence is needed to see how much user latency is actually produced from it. But regardless of that outcome it allows us to move to the more complicated question of when or how settlement-free peering connections are normally accepted. Before that can be answered, I need to explain the context of DT&amp;rsquo;s perspective as a tier 1 provider and what that even means for peering agreements.&lt;/p&gt;
&lt;p&gt;There is a 3-tier model classification system that organizes Internet Service Providers (ISPs) based on their size, reach, and interconnectivity. At the top of the hierarchy are tier 1 ISPs, which are the largest providers with global networks. These ISPs have extensive infrastructure that allows them to deliver internet traffic worldwide without paying other providers for transit. A defining feature of tier 1 ISPs is that they engage in settlement-free peering, where they exchange traffic with other tier 1 ISPs without any financial exchange. This arrangement exists because tier 1 providers have comparable network reach. With these connections among the tier 1 providers it allows them to reach the entire internet routing table and has the cool description of the global internet backbone. There are 14 tier 1 ISPs globally and recognizable examples for US residents include AT&amp;amp;T, Lumen, and Verizon. Deutsche Telekom is also a tier 1, which is an important point in order to understand their perspective on Meta&amp;rsquo;s claim.&lt;/p&gt;
&lt;p&gt;Tier 2 ISPs operate on a smaller scale, often serving regional or national areas. They rely on tier 1 ISPs for access to parts of the global internet that their networks do not reach. While tier 2 ISPs may also engage in some peering with other ISPs, they often need to pay transit fees to tier 1 providers for broader internet access. Their peering agreements are typically limited to regional traffic or between similar-sized providers, which means they don&amp;rsquo;t have direct access to reach the full internet routing table. Comcast and Cogent are examples of tier 2 ISPs, as they operate large but regionally constrained networks that need transit services from tier 1 ISPs to achieve full connectivity to the internet.&lt;/p&gt;
&lt;p&gt;At the base of the hierarchy, tier 3 ISPs are local providers that offer last-mile connectivity to homes and businesses within a specific geographic area. These ISPs do not have large networks and therefore rely entirely on purchasing internet transit from tier 2 or tier 1 ISPs. They do not typically engage in peering agreements due to their limited reach. Local internet providers serving specific towns or regions fall into this category.&lt;/p&gt;
&lt;p&gt;Settlement-free peering is used when two ISPs, typically tier 1 providers, have similar network reach and traffic exchange patterns. Instead of sending network traffic through an intermediary provider, they agree to directly exchange data for free, as both parties benefit equally from the arrangement. This practice allows ISPs to reduce costs and provide faster routing for their customers. Peering relationships are based on mutual benefit, and for settlement-free peering to work, the traffic exchanged between networks needs to be relatively balanced. For tier 2 and tier 3 ISPs, peering is more limited or non-existent, because it is much more advantageous to simply pay to peer with a tier 1 that has much better global reach.&lt;/p&gt;
&lt;p&gt;This description of settlement-free peering is entirely generalized and there are always exceptions or restrictions. The internet and the underlying architecture is a commercial venture and so these decisions are frequently business decisions rather than technical. Each provider has different rules and policies governing these decisions. Lumen has shared their &lt;a href="https://www.lumen.com/en-us/about/legal/peering-policy.html"&gt;Settlement-Free Peering Policy&lt;/a&gt;, which includes some steep hurdles like 500 Gbps per month and providing transit for 1,000 unique autonomous systems. Yet any of these specific points could most likely be ignored if it was in the specific business interest of Lumen as a company.&lt;/p&gt;
&lt;p&gt;Based on the fact that DT is a tier 1 provider and now we know the general conditions for settlement-free peering does Meta&amp;rsquo;s claim hold any bearing? I would argue yes, but with the huge caveat which would require DT&amp;rsquo;s approval. I find it hilarious that Meta thought they could glide out of paying DT 5.8 million per year without them attempting to claw that all back. DT, after all, isn&amp;rsquo;t a charity. What incentive do they have to let a sizable cash flow suddenly stop? Any de-peering latency could easily be blamed on Meta, the foreign tech giant with, at most, a dubious impact on global society.&lt;/p&gt;
&lt;p&gt;I can&amp;rsquo;t completely write off the situation purely on it being up to DT as a business. DT&amp;rsquo;s business decisions have come under increasing scrutiny as they have been exiting the industry norm. Barbara van Schewick has a striking summary&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; of their attempts to extract revenue from both their subscribers and also business entities that pay for direct network access. Normally ISPs have provided neutral access for their subscribers to the entirety of the internet. But recent moves by DT and other providers require business entities to pay up or have network slowness for their service.&lt;/p&gt;
&lt;p&gt;From a technical perspective, the use of a settlement-free peering connection would be helpful to both companies. The massive 3.5 TBps being consumed by DT&amp;rsquo;s users could be served much better directly between the networks rather than through the intermediary providers noted above. For fixed internet customers in Germany, DT is a provider for 40% of them.&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; DT is ignoring the fact that their users are also their customers and are choosing willingly to request data from Meta. Where is their obligation as a provider to their users in order to decrease latency and improve the experience of being online no matter where that destination might be?&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Facebook Company and Meta, “Why We’re Having to End Our Direct Peering Relationship With Deutsche Telekom,” &lt;em&gt;Meta&lt;/em&gt;, September 25, 2024, &lt;a href="https://about.fb.com/news/2024/09/why-were-having-to-end-our-direct-peering-relationship-with-deutsche-telekom/"&gt;https://about.fb.com/news/2024/09/why-were-having-to-end-our-direct-peering-relationship-with-deutsche-telekom/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Deutsche Telekom Ag, “Meta Is Not Above the Law,” &lt;em&gt;Deutsche Telekom&lt;/em&gt;, September 25, 2024, &lt;a href="https://www.telekom.com/en/company/details/meta-is-not-above-the-law-1079704"&gt;https://www.telekom.com/en/company/details/meta-is-not-above-the-law-1079704&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Ingrid Lunden, “After Losing a Lawsuit in Germany, Meta Says It’S Never Getting Back Together With Deutsche Telekom,” &lt;em&gt;TechCrunch&lt;/em&gt;, September 25, 2024, &lt;a href="https://techcrunch.com/2024/09/25/after-losing-a-peering-lawsuit-in-germany-meta-says-its-never-getting-back-together-with-deutsche-telekom/"&gt;https://techcrunch.com/2024/09/25/after-losing-a-peering-lawsuit-in-germany-meta-says-its-never-getting-back-together-with-deutsche-telekom/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Landgericht Köln, “Landgericht Köln Gibt Der Klage Einer Tochter Der Deutschen Telekom AG Gegen Eine Tochter Des Meta-Konzerns Auf Vergütung Von Datentransportleistungen Statt,” &lt;em&gt;Pressemitteilung&lt;/em&gt;, May 14, 2024, &lt;a href="https://cdn.netzpolitik.org/wp-upload/2024/05/Meta-vs-Telekom-%E2%80%93-PM2024-01-33-O-178-23.pdf"&gt;https://cdn.netzpolitik.org/wp-upload/2024/05/Meta-vs-Telekom-%E2%80%93-PM2024-01-33-O-178-23.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Barbara Van Schewick, “A Deutsche Telekom Shakedown: Will Instagram, Facebook and WhatsApp Slow to a Crawl in Germany as DT Tries to Get Paid Twice, and Will German Regulators Have the Courage to Stop DT’s Bullying?,” &lt;em&gt;Stanford CIS&lt;/em&gt;, September 25, 2024, &lt;a href="https://cyberlaw.stanford.edu/blog/2024/09/a-deutsche-telekom-shakedown-will-instagram-facebook-whatsapp-slow-to-a-crawl/#footnote1"&gt;https://cyberlaw.stanford.edu/blog/2024/09/a-deutsche-telekom-shakedown-will-instagram-facebook-whatsapp-slow-to-a-crawl/#footnote1&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Veröffentlicht von F. Tenzer, “Marktanteile der Deutschen Telekom AG und ihrer Wettbewerber an den Breitbandanschlüssen in Festnetzen von 2001 bis 2023,” &lt;em&gt;Statista&lt;/em&gt;, May 28, 2024, &lt;a href="https://de.statista.com/statistik/daten/studie/154999/umfrage/anteil-der-unternehmen-an-vermarkteten-breitbandanschluessen-in-deutschland/?ref=cyberlaw.stanford.edu"&gt;https://de.statista.com/statistik/daten/studie/154999/umfrage/anteil-der-unternehmen-an-vermarkteten-breitbandanschluessen-in-deutschland/?ref=cyberlaw.stanford.edu&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Madeira Submarine Cables</title><link>https://rb.ax/blog/madeira-submarine-cables/</link><pubDate>Sun, 18 Aug 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/madeira-submarine-cables/</guid><description>&lt;p&gt;I recently visited the Island of Madeira on vacation and was impressed with their internet speed. For an island in a remote part of the Atlantic it was not something I expected. After looking further into the island’s internet connectivity I peaked into a new view of the region’s politics and technological history.&lt;/p&gt;
&lt;p&gt;Madeira is an autonomous region of Portugal and boasts a rich history shaped by its strategic location in the Atlantic Ocean. Discovered by Portuguese explorers João Gonçalves Zarco and Tristão Vaz Teixeira in 1419, Madeira quickly became an important stopover on trade routes between Europe, Africa, and the Americas. The island’s fertile volcanic soil allowed it to flourish as an agricultural hub, with sugarcane production dominating its early economy. Over time, Madeira developed a reputation for producing world-renowned fortified wine, a staple of its economy that continues to be a significant export today.&lt;/p&gt;
&lt;p&gt;In modern times, Madeira’s economy is supported by several key industries, with tourism playing a central role. The island’s stunning landscapes, mild climate, and cultural heritage attract visitors year-round. Agriculture remains important. particularly the cultivation of bananas, grapes, and other fruits, alongside the production of Madeira wine. Additionally, Madeira has developed a strong service sector, including financial services and real estate, benefiting from its status as an autonomous region with favorable tax and cryptocurrency regulations.&lt;/p&gt;
&lt;p&gt;Madeira’s early internet connectivity was established in the late 20th century, marking a significant milestone in its integration with the global digital community. The island’s remote location presented challenges, but these were overcome with the installation of submarine fiber optic cables, which connected Madeira to mainland Europe. This early adoption of internet infrastructure has allowed Madeira to participate in the global economy more effectively, facilitating business, education, and tourism. Today, the island continues to invest in advanced telecommunications to maintain its competitive edge as a modern and connected autonomous region within Portugal.&lt;/p&gt;
&lt;p&gt;These technology investments are becoming more politically oriented as Portugal and many other member states of the European Union have started pushing to expand and solidify the region’s digital sovereignty.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Such a term is wide but includes things such as classifying submarine cables as critical infrastructure, fortifying regional-local technology manufacturing, and diversifying connectivity to rival or replace foreign technology giants like Google or Amazon.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Some of these pursuits might be counterproductive as Portugal attempts to attract further submarine cable connections and investments to shore.&lt;sup id="fnref1:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; With already 10 to 15% of the world’s data traveling through cables on Portugal’s shores it adds significant security and operational risk. Consolidation to a single shore or location would increase vulnerability to intentional or unintentional issues with cable connectivity. The Portuguese Navy has identified several Russian ships that have been seen surveying submarine cables along the Portuguese coast.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; While looking at submarine cables are harmless it occurs in the context of Dmitry Medvedev’s threats about “destroying enemies’ communication cables.”&lt;sup id="fnref1:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;On a broader perspective, a report by European Parliament noted a severe uptick in 2017 for Russian interest in locating NATO member state undersea cable infrastructure.&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; A member of the Irish military described that Russia does not necessarily want to cut these submarine cables but wants NATO members to be aware that they can anytime.&lt;sup id="fnref1:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; As the technology magazine &lt;em&gt;Wired&lt;/em&gt; describes it, it is the most vulnerable place on the internet.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Madeira plays an interesting role in this geopolitical grandstanding. It isn&amp;rsquo;t a major telecommunication&amp;rsquo;s hub like the coast of Portugal so it is most likely seen as less important by major players. However, this might change in the future as further cables are laid from Europe to South America and Africa.&lt;/p&gt;
&lt;h2 id="local-providers"&gt;&lt;a href="#local-providers"&gt;Local Providers&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Telecommunications infrastructure on the island is overseen by Telecomunicações da Madeira (EMACOM), which is a subsidiary of the municipal electrical company, Electricidade da Madeira. Infrastructure is built and maintained to be carrier neutral. The most prevalent consumer providers are MEO AS3243 and NOS Madeira AS15457/AS2860.&lt;/p&gt;
&lt;p&gt;Of the two companies, MEO has a larger presence in the market. It is a subsidiary of Altice and launched in Madeira in 1995. MEO is currently originating 7,204 /24&amp;rsquo;s of IPv4 space over &lt;a href="https://bgp.tools/as/3243#prefixes"&gt;15 prefixes&lt;/a&gt;. It has a single upstream connected through Altice Portugal AS8657.&lt;/p&gt;
&lt;p&gt;NOS Madeira is a bit more modest with 272 /24&amp;rsquo;s of IPv4 address origination over &lt;a href="https://bgp.tools/as/15457#prefixes"&gt;8 prefixes&lt;/a&gt;. As a subsidiary of NOS in Portugal it also has a single upstream connection over NOS AS2860.&lt;/p&gt;
&lt;h2 id="ellalink"&gt;&lt;a href="#ellalink"&gt;EllaLink&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Up until June of 2021 the only direct link between Europe and South America was the Atlantis 2 submarine cable, which had capacity of 40 Gbps&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; that limited it usage to telephony connectivity. All internet traffic between the regions had to transit through the United States. While not optimal, it didn’t take on new urgency until the Edward Snowden leaks in the summer of 2013 that revealed the vast surveillance of the United States National Security Agency. In February of 2014 Brazilian President Dilma Rousseff stated one of the primary goals of EllaLink was to “guarantee the neutrality”&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; of the internet.&lt;/p&gt;
&lt;p&gt;The EllaLink project began in 2015 but installation of the submarine cable didn’t begin until 2020. The supplier was Alcatel Submarine Networks. Total cost for the full length of the EllaLink submarine cable ranges from 150 million euros to 185.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; Madeira contributed 13.6 million euros&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; for the cable between the island to Sines, Portugal. Another 1.5 million euros was contributed by Madeira to improve the cable landing station near the Praia Formosa beach and the Amparo Terrestrial Station.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Geographical survey performed by Alcatel Submarine Networks for the EllaLink project as it makes landfall on the southern coast."&gt;
 &lt;img
 alt="Geographical survey performed by Alcatel Submarine Networks for the EllaLink project as it makes landfall on the southern coast."
 title="Geographical survey performed by Alcatel Submarine Networks for the EllaLink project as it makes landfall on the southern coast."
 width="1600"
 height="1000"srcset="https://rb.ax/blog/madeira-submarine-cables/madeira-submarine-cable-survey_hu_1c794b6c082b7cd5.webp 480w, https://rb.ax/blog/madeira-submarine-cables/madeira-submarine-cable-survey_hu_95e776775836494e.webp 768w, https://rb.ax/blog/madeira-submarine-cables/madeira-submarine-cable-survey_hu_a0e3f76db7de582f.webp 1024w, https://rb.ax/blog/madeira-submarine-cables/madeira-submarine-cable-survey_hu_b6805ddb97cbbb35.webp 1366w, https://rb.ax/blog/madeira-submarine-cables/madeira-submarine-cable-survey_hu_6933aeb3cacdebc4.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/madeira-submarine-cables/madeira-submarine-cable-survey_hu_33d5b25777ac9556.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Geographical survey performed by Alcatel Submarine Networks for the EllaLink project as it makes landfall on the southern coast.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The above geographic survey was performed by Alcatel Submarine Networks, Elettra, and GeoTeam. It shows the landing of EllaLink at Praia Formosa and is identified as a red line with blue circles around it. The &lt;a href="https://www.madeira.gov.pt//Portals/40/documentos/9_5.EllaLink_Madeira_Perfis__Vol_III.pdf"&gt;survey map is available&lt;/a&gt; through the Madeira government website. There are additional documents available that &lt;a href="https://www.madeira.gov.pt//Portals/40/documentos/3.%20Ellalink_Madeira_Instala%c3%a7%c3%a3o_Aperfei%c3%a7oamento.pdf"&gt;outline the technique and tools&lt;/a&gt; used to bury the cable at the beach and how it is bolted down to the sea floor in shallow water.&lt;/p&gt;
&lt;p&gt;EllaLink was completed in June of 2021 and ended up at a length of 6,200 km if including the branch off to Morocco. The cable itself is 4 pairs of fiber. With DWDM that gives 25 Tbps per pair for a total capacity of 100 Tbps.&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt; Latency from Portugal to Brazil should have a round-trip time (RTT) of less than 60ms. Farther destinations such as between Marseille and São Paulo should be less than 135ms.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="I took a jog over to the Praia Formosa landing site for the EllaLink submarine cable. As expected, there wasn&amp;rsquo;t any identifying signs. The only clues were the EM@COM branded utility vaults."&gt;
 &lt;img
 alt="I took a jog over to the Praia Formosa landing site for the EllaLink submarine cable. As expected, there wasn’t any identifying signs. The only clues were the EM@COM branded utility vaults."
 title="I took a jog over to the Praia Formosa landing site for the EllaLink submarine cable. As expected, there wasn&amp;rsquo;t any identifying signs. The only clues were the EM@COM branded utility vaults."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/madeira-submarine-cables/praia-formosa-ellalink-landing-site_hu_fbd601528a20c1e7.webp 480w, https://rb.ax/blog/madeira-submarine-cables/praia-formosa-ellalink-landing-site_hu_e9da6f23e4039988.webp 768w, https://rb.ax/blog/madeira-submarine-cables/praia-formosa-ellalink-landing-site_hu_8decf655d8eaf141.webp 1024w, https://rb.ax/blog/madeira-submarine-cables/praia-formosa-ellalink-landing-site_hu_4069a803db045615.webp 1366w, https://rb.ax/blog/madeira-submarine-cables/praia-formosa-ellalink-landing-site_hu_91d8bbf11319a29f.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/madeira-submarine-cables/praia-formosa-ellalink-landing-site_hu_719a296f6828c29f.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;I took a jog over to the Praia Formosa landing site for the EllaLink submarine cable. As expected, there wasn&amp;rsquo;t any identifying signs. The only clues were the EM@COM branded utility vaults.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;One advanced feature of the EllaLink cable is that between the 75km segment from Madeira to the main EllaLink junction box is an extra GeoLab fiber pair. A GeoLab fiber cable is designed to monitor and gather data about the Earth’s geophysical processes, such as seismic activity and oceanographic conditions. The extra fiber pair for GeoLab data is a separate addition to the main EllaLink fiber pairs.&lt;/p&gt;
&lt;p&gt;Measurements across this extra GeoLab fiber pair is performed by a &lt;a href="https://www.febus-optics.com/en/page/a1"&gt;Febus A1-R module&lt;/a&gt; that can identify acoustic changes in the fiber. This distributed acoustic sensing (DAS) technology is limited to a distance of about 100 km and can only be installed at either end of the cable.&lt;sup id="fnref:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; In this case, just on the Madeira side of things. For these reasons it isn&amp;rsquo;t as preferred as a system of Science, Monitoring, and Reliable Telecommunications (SMART) repeaters across the full length of a submarine cable. However, it still contributes a wealth of knowledge that was previously non-existent.&lt;/p&gt;
&lt;h2 id="cam-ring"&gt;&lt;a href="#cam-ring"&gt;CAM Ring&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The Continente Azores Madeira (CAM) Ring cable is a colloquial term in reference to the various connections between mainland Portugal and the autonomous regions of the Azores and Madeira. The information published by &lt;a href="https://www.submarinecablemap.com/landing-point/funchal-portugal"&gt;TeleGeography&lt;/a&gt; refers to misnamed or non-existent cables. However, statements by Autoridade Nacional de Comunicações (ANACOM) show that ATLANTIS-2 connects Madeira to Portugal&lt;sup id="fnref:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; and COLUMBUS-III connects Azores to Portugal with AZORES-MADEIRA between the islands.&lt;sup id="fnref:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Regardless of the actual naming of these cables they have all reached the end of their usable life. Their 300 Gbps capacity is no longer sufficient for today’s bandwidth needs and there is an ever increasing risk for physical issues as usage is extended past the expected life span.&lt;/p&gt;
&lt;h2 id="anel-cam-ring"&gt;&lt;a href="#anel-cam-ring"&gt;Anel CAM Ring&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The successor to the aging CAM ring is the Anel CAM project, which needs and wishlist were outlined by ANACOM in late 2019.&lt;sup id="fnref:14"&gt;&lt;a href="#fn:14" class="footnote-ref" role="doc-noteref"&gt;14&lt;/a&gt;&lt;/sup&gt; It was awarded for implementation to Alcatel Submarine Networks in March of 2024.&lt;sup id="fnref:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; Installation should finish by the end of 2026 and is estimated to cost 154.4 million euros.&lt;sup id="fnref:16"&gt;&lt;a href="#fn:16" class="footnote-ref" role="doc-noteref"&gt;16&lt;/a&gt;&lt;/sup&gt; A sizable part of the cost will be paid for by a 5G auction. No specific cost information has been published for any contribution by Madeira itself. Yet with their recent improvements to their cable landing station infrastructure to accommodate the EllaLink cable I doubt any further on-island costs will be needed.&lt;/p&gt;
&lt;p&gt;The planned route for Anel CAM will still circumvent in a ring around Madeira and Azores but has two landing locations in each region for added redundancy. It would include Terceira and São Miguel in Azores, Machico and Formosa in Madeira, and Carcavelos and Sines in Portugal. This could prove helpful during maintenance windows or natural disasters to keep connectivity working for other parts of the ring. Total length of the cable would be approximately 3,812 km and consist of 6 fiber pairs. This would provide an available bandwidth of 150 Tbps.&lt;/p&gt;
&lt;p&gt;While a hub and spoke topology might have been more cost effective there are two major reasons a ring is more advantageous. The primary reason is redundancy through alternative paths on a ring topology. If there is maintenance or an outage traffic can simply redirect and still reach mainland Portugal. There is not a specific need for a connection between the islands of Madeira and Azores. I doubt the intra-island traffic amount is anything substantial so the connection is entirely for redundant connectivity.&lt;/p&gt;
&lt;p&gt;The second reason is to increase necessary coverage of &lt;a href="https://www.youtube.com/watch?v=eh729pa-yz4&amp;amp;list=PLWuYED1WVJIP6KGMHoCeHegg2PeLcTzrg"&gt;Science, Monitoring, and Reliable Telecommunications&lt;/a&gt; (SMART) sensors. These sensors are being incorporated into new submarine cables and can help provide information for tsunami warning systems (TWS) and earthquake early warning systems. They are placed around every 50 km along the cable and don’t interfere with the main fiber strands or overall life expectancy of the cable. Within the full span of the Anel CAM Ring that would be approximately 50 repeaters.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Submarine cable SMART repeaters stacked in a factory for testing. Source report from the European Commission."&gt;
 &lt;img
 alt="Submarine cable SMART repeaters stacked in a factory for testing. Source report from the European Commission."
 title="Submarine cable SMART repeaters stacked in a factory for testing. Source report from the European Commission."
 width="1600"
 height="860"srcset="https://rb.ax/blog/madeira-submarine-cables/submarine-cable-smart-repeaters_hu_7afa051a374968e9.webp 480w, https://rb.ax/blog/madeira-submarine-cables/submarine-cable-smart-repeaters_hu_b8a9c9e1c901142b.webp 768w, https://rb.ax/blog/madeira-submarine-cables/submarine-cable-smart-repeaters_hu_eca364a04d0e11ae.webp 1024w, https://rb.ax/blog/madeira-submarine-cables/submarine-cable-smart-repeaters_hu_b89bead76536b1d.webp 1366w, https://rb.ax/blog/madeira-submarine-cables/submarine-cable-smart-repeaters_hu_9e65f674fe04ba6a.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/madeira-submarine-cables/submarine-cable-smart-repeaters_hu_cac7284482deb196.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Submarine cable SMART repeaters stacked in a factory for testing. &lt;a href="https://ec.europa.eu/research/participants/documents/downloadPublic?documentIds=080166e5c4fcfff1&amp;amp;appId=PPGMS"&gt;Source report&lt;/a&gt; from the European Commission.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Adding sensors to the area between Azores, Madeira, and Portugal is especially important given the neighboring confluence of tectonic plates. A short distance away the Nubia, Eurasia, and North American plate boundaries grind against each other and provide for the potential of destructive earthquakes and tsunamis. The boundary between the Nubia and Eurasia plates are especially volatile. Over the past 1024 years the three largest European earthquakes have originated from this location. &lt;sup id="fnref1:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt; This includes the infamous &lt;a href="https://www.youtube.com/watch?v=Ht0W2E9g8cA"&gt;1755 8.7 magnitude earthquake&lt;/a&gt; that resulted in a tsunami that almost completely wiped out the city of Lisbon and killed an estimated 30,000 to 40,000 people.&lt;/p&gt;
&lt;p&gt;Given the region’s historical and modern threat of earthquake impact it is imperative to deploy early warning sensors. Many have been deployed on land but far fewer have penetrated offshore locations. With the evolution of SMART sensors these can now expand on the coattails of submarine cables all across the world.&lt;/p&gt;
&lt;p&gt;The benefits of having these SMART sensors could be life saving. In some modeling cases there was a 10 to 30 minute warning advantage over coastal tide-gauges.&lt;sup id="fnref2:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="future-cables"&gt;&lt;a href="#future-cables"&gt;Future Cables&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Between EllaLink and Anel CAM the islands of Madeira will be in a good situation with 250 Tbps of bandwidth capacity for a good deal of time into the future. But for neighboring Azores there are some concerns about the end of life submarine cables for their 9 intra-island connections. These are not covered by the new Anel CAM cable project. The Azorean President took a moment to reiterate this need during the announcement of the Anel CAM project with ANACOM in São Miguel.&lt;sup id="fnref:17"&gt;&lt;a href="#fn:17" class="footnote-ref" role="doc-noteref"&gt;17&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;For other future submarine cables planned within Madeira or the region it will be interesting to see how Portugal attempts to position itself as a landing station for the Atlantic. Whether or not this involves Madeira directly will depend on specific routes and needs of future submarine cables. EllaLink was only extended to Madeira after payment by the local government. It is not specifically needed and some future cables will entirely bypass Madeira to more infrastructure ready Carcavelos and Sines.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Laurens Cerulus, “Lisbon Eyes Undersea Cable Investment to Bolster EU Tech Infrastructure,” &lt;em&gt;POLITICO&lt;/em&gt;, December 15, 2020, &lt;a href="https://www.politico.eu/article/submarine-cables-europe-lisbon-eyes-undersea-investment-bolster-tech-infrastructure/"&gt;https://www.politico.eu/article/submarine-cables-europe-lisbon-eyes-undersea-investment-bolster-tech-infrastructure/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Laurens Cerulus, “Portugal Looks to Rule the Waves Again (Thanks to Undersea Data),” &lt;em&gt;POLITICO&lt;/em&gt;, June 2, 2021, &lt;a href="https://www.politico.eu/article/portugal-plugs-in-submarine-internet-cable/"&gt;https://www.politico.eu/article/portugal-plugs-in-submarine-internet-cable/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Portugal Pulse, “The Threat Lurking in the Sea of Portugal: Sabotage of Submarine Cables Would Be a Catastrophe,” &lt;em&gt;Portugal PULSE&lt;/em&gt;, June 19, 2023, &lt;a href="https://www.portugalpulse.com/the-threat-lurking-in-the-sea-of-portugal-sabotage-of-submarine-cables-would-be-a-catastrophe/"&gt;https://www.portugalpulse.com/the-threat-lurking-in-the-sea-of-portugal-sabotage-of-submarine-cables-would-be-a-catastrophe/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Christian Bueger, Tobias Liebetrau, and Jonas Franken, “Security Threats to Undersea Communications Cables and Infrastructure - Consequences for the EU,” &lt;em&gt;European Parliament&lt;/em&gt;, 2022. &lt;a href="https://www.europarl.europa.eu/RegData/etudes/IDAN/2022/702557/EXPO_IDA(2022)702557_EN.pdf"&gt;https://www.europarl.europa.eu/RegData/etudes/IDAN/2022/702557/EXPO_IDA(2022)702557_EN.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Matt Burgess, “The Most Vulnerable Place on the Internet,” &lt;em&gt;WIRED&lt;/em&gt;, November 2, 2022, &lt;a href="https://www.wired.com/story/submarine-internet-cables-egypt/"&gt;https://www.wired.com/story/submarine-internet-cables-egypt/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Toms Dumpis, “New Optical Cable Will Link Morocco, Portugal,” &lt;em&gt;Morocco World News&lt;/em&gt;, March 13, 2021, &lt;a href="https://www.moroccoworldnews.com/2021/03/337236/new-optical-cable-will-link-morocco-portugal"&gt;https://www.moroccoworldnews.com/2021/03/337236/new-optical-cable-will-link-morocco-portugal&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Robin Emmott, “Brazil, Europe Plan Undersea Cable to Skirt U.S. Spying,” &lt;em&gt;Reuters&lt;/em&gt;, February 24, 2014, &lt;a href="https://www.reuters.com/article/2014/02/24/us-eu-brazil-idUSBREA1N0PL20140224/"&gt;https://www.reuters.com/article/2014/02/24/us-eu-brazil-idUSBREA1N0PL20140224/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Tobi Hughes, “Submarine Cable to Cross Madeira Costs 170 Million and Starts Transmitting Data in 2020,” &lt;em&gt;Madeira Island News Blog&lt;/em&gt; (blog), October 7, 2019, &lt;a href="https://www.madeiraislandnews.com/2019/10/submarine-cable-to-cross-madeira-costs-170-million-and-starts-transmitting-data-in-2020.html"&gt;https://www.madeiraislandnews.com/2019/10/submarine-cable-to-cross-madeira-costs-170-million-and-starts-transmitting-data-in-2020.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Maurice Reed, “1,100 Km of Cable Connects Madeira to Mainland,” &lt;em&gt;Madeira Island News Blog&lt;/em&gt; (blog), January 21, 2021, &lt;a href="https://www.madeiraislanddirect.com/blog/2021/01/1100-km-of-cable-connects-madeira-to-mainland/"&gt;https://www.madeiraislanddirect.com/blog/2021/01/1100-km-of-cable-connects-madeira-to-mainland/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;EllaLink - Submarine Cable With Lowest Latency, May 21, 2024, &lt;em&gt;EllaLink&lt;/em&gt;, May 21, 2024, &lt;a href="https://ella.link/"&gt;https://ella.link/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:11"&gt;
&lt;p&gt;Dan Swinhoe, “Making Subsea Cables Smart, and Helping Save the Planet,” &lt;em&gt;Data Centre Dynamics&lt;/em&gt;, June 7, 2022, &lt;a href="https://www.datacenterdynamics.com/en/analysis/making-subsea-cables-smart-and-helping-save-the-planet/"&gt;https://www.datacenterdynamics.com/en/analysis/making-subsea-cables-smart-and-helping-save-the-planet/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:12"&gt;
&lt;p&gt;Paulo Simões, Rui Jorge Cabral, “With the New Submarine Cables We Will Have the Largest Real-time Laboratory in the Atlantic,” &lt;em&gt;Açoriano Oriental&lt;/em&gt;, March 21, 2023, &lt;a href="https://www.acorianooriental.pt/noticia/with-the-new-submarine-cables-we-will-have-the-largest-real-time-laboratory-in-the-atlantic-348910"&gt;https://www.acorianooriental.pt/noticia/with-the-new-submarine-cables-we-will-have-the-largest-real-time-laboratory-in-the-atlantic-348910&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:13"&gt;
&lt;p&gt;Luis Matias, Yasser Omar, Fernando Carrilho, Vasco Sá, Rachid Omira, Carlos Corela, Rui A. P. Perdigão, and Afonso Loureiro, &amp;ldquo;The contribution of the CAM fibre optic submarine cable telecom ring to the early warning of tsunami and earthquakes,&amp;rdquo; &lt;em&gt;European Geosciences Union General Assembly 2020&lt;/em&gt;, May 4, 2020, &lt;a href="https://doi.org/10.5194/egusphere-egu2020-13988"&gt;https://doi.org/10.5194/egusphere-egu2020-13988&lt;/a&gt;&amp;#160;&lt;a href="#fnref:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref1:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&amp;#160;&lt;a href="#fnref2:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:14"&gt;
&lt;p&gt;José S. Barros, &amp;ldquo;Atlantic Submarine Cable Platform: A Smart, Green, and Blue Approach,&amp;quot;&lt;em&gt;Autoridade Nacional de Comunicações&lt;/em&gt;, February 12, 2019, &lt;a href="https://www.anacom.pt/streaming/Atlantic_CAM_Platform_SGBCAM_full_version.pdf?contentId=1468523&amp;amp;field=ATTACHED_FILE"&gt;https://www.anacom.pt/streaming/Atlantic_CAM_Platform_SGBCAM_full_version.pdf?contentId=1468523&amp;amp;field=ATTACHED_FILE&lt;/a&gt;&amp;#160;&lt;a href="#fnref:14" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:15"&gt;
&lt;p&gt;“Alcatel Submarine Networks Selected for the Groundbreaking Anel CAM Submarine Cable Project in Portugal,” &lt;em&gt;Alcatel Submarine Networks&lt;/em&gt;, March 19, 2024, &lt;a href="https://www.asn.com/press-release/anel-cam/"&gt;https://www.asn.com/press-release/anel-cam/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:16"&gt;
&lt;p&gt;Winston Qiu, “IP And ASN Sign Contract for Construction of New CAM Ring,” &lt;em&gt;Submarine Cable Networks&lt;/em&gt;, March 26, 2024, &lt;a href="https://www.submarinenetworks.com/en/systems/intra-europe/new-cam-ring/ip-and-asn-sign-contract-for-construction-of-new-cam-ring"&gt;https://www.submarinenetworks.com/en/systems/intra-europe/new-cam-ring/ip-and-asn-sign-contract-for-construction-of-new-cam-ring&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:16" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:17"&gt;
&lt;p&gt;Sara Ribeiro, “Governo Dos Açores Pede Urgência Na Substituição Dos Cabos Interilhas,” &lt;em&gt;Jornal de Negócios&lt;/em&gt;, July 26, 2024. &lt;a href="https://www.jornaldenegocios.pt/empresas/detalhe/governo-dos-acores-pede-urgencia-na-substituicao-dos-cabos-interilhas-que-estao-em-fim-de-ciclo-de-vida"&gt;https://www.jornaldenegocios.pt/empresas/detalhe/governo-dos-acores-pede-urgencia-na-substituicao-dos-cabos-interilhas-que-estao-em-fim-de-ciclo-de-vida&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:17" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Speedgoat 50K 2024 Race Report</title><link>https://rb.ax/blog/speedgoat-50k-2024-race-report/</link><pubDate>Sat, 20 Jul 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/speedgoat-50k-2024-race-report/</guid><description>&lt;p&gt;&lt;figure aria-label="The energy at the beginning of any race is exhilarating. Tapering for weeks after intense training leaves me with tons of pent up energy."&gt;
 &lt;img
 alt="The energy at the beginning of any race is exhilarating. Tapering for weeks after intense training leaves me with tons of pent up energy."
 title="The energy at the beginning of any race is exhilarating. Tapering for weeks after intense training leaves me with tons of pent up energy."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-start-of-race-featured_hu_7d670ace1791b8d2.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-start-of-race-featured_hu_ea50beb3ba033b0.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-start-of-race-featured_hu_80c8b199b75b955f.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-start-of-race-featured_hu_bed93bd38652a671.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-start-of-race-featured_hu_525b84f664bd24f9.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-start-of-race-featured_hu_cc5f5c817336b2c.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The energy at the beginning of any race is exhilarating. Tapering for weeks after intense training leaves me with tons of pent up energy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;My third time completing the Speedgoat 50K has been the most humbling. Every time I do this race I come away shredded by the demands of the endless hill climbs that wreck all semblance of confidence I had in training. But this year I thought it might be different and that my training had better prepared me. It didn&amp;rsquo;t turn out that way. This is the intention of race inventor, Karl Meltzer:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&amp;ldquo;The course is set up to mentally demoralize you&amp;rdquo;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;The race course has changed over the years but stays mostly the same. From the Snowbird Ski Resort parking lot you run up to Hidden Peak, down around Mineral Basin, back up to Mount Baldy, down again a bit, up the Hidden Peak ridge, and then finally down to where you started at the Snowbird Ski Resort parking lot.&lt;/p&gt;
&lt;p&gt;In 2015 the course was 31.3 miles with 12,139 ft of elevation gain. I did it in &lt;a href="https://utmb.world/en/runner/671552.ryan.bagley"&gt;11:44&lt;/a&gt;. Two years later in 2017 the course was 33.7 miles long with 11,236 feet of elevation gain. I did that one in &lt;a href="https://www.strava.com/activities/1107907302"&gt;10:35&lt;/a&gt;. This year, in 2024, the course was 32.8 miles long and had an elevation gain of 11,400 feet. I did it in &lt;a href="https://www.strava.com/activities/11939995654"&gt;11:46&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="training-preparation"&gt;&lt;a href="#training-preparation"&gt;Training Preparation&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;This race is difficult to train for due to the unique and aggressive elevation gain and loss throughout the course. All while above 8,000 feet of elevation. The race isn&amp;rsquo;t traditionally ran in every sense of the word. It is more an endurance test of how long you can power hike uphill and whatever speed you can manage going downhill on rough terrain.&lt;/p&gt;
&lt;p&gt;To prepare, I followed the &lt;em&gt;Some Work All Play&lt;/em&gt; 50 mile plan from David and Megan Roche I mentioned in my &lt;a href="https://rb.ax/blog/learning-after-2255-miles/"&gt;2023 running review&lt;/a&gt;. I kept with the vast majority of the targeted workouts and instructed strength training. I was interested to see if the &lt;em&gt;Mountain&lt;/em&gt; and &lt;em&gt;Speed Legs&lt;/em&gt; would provide any noticeable benefit. In retrospect, they didn&amp;rsquo;t specifically give any benefit to my race performance but I could see a greater ability for single leg balance and stability while going fast on rough terrain.&lt;/p&gt;
&lt;p&gt;Below is my total mileage and elevation gain by week for the duration of the 12 week preparation plan.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Week&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Distance (miles)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Elevation (feet)&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;1&lt;/td&gt;
 &lt;td style="text-align: center"&gt;47.78&lt;/td&gt;
 &lt;td style="text-align: center"&gt;4,469&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;2&lt;/td&gt;
 &lt;td style="text-align: center"&gt;54.21&lt;/td&gt;
 &lt;td style="text-align: center"&gt;4,911&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;3&lt;/td&gt;
 &lt;td style="text-align: center"&gt;57.43&lt;/td&gt;
 &lt;td style="text-align: center"&gt;4,393&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;4&lt;/td&gt;
 &lt;td style="text-align: center"&gt;52.20&lt;/td&gt;
 &lt;td style="text-align: center"&gt;3,806&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;5&lt;/td&gt;
 &lt;td style="text-align: center"&gt;56.93&lt;/td&gt;
 &lt;td style="text-align: center"&gt;6,539&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;6&lt;/td&gt;
 &lt;td style="text-align: center"&gt;70.32&lt;/td&gt;
 &lt;td style="text-align: center"&gt;7,119&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;7&lt;/td&gt;
 &lt;td style="text-align: center"&gt;59.01&lt;/td&gt;
 &lt;td style="text-align: center"&gt;5,049&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;8&lt;/td&gt;
 &lt;td style="text-align: center"&gt;66.72&lt;/td&gt;
 &lt;td style="text-align: center"&gt;8,353&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;9&lt;/td&gt;
 &lt;td style="text-align: center"&gt;65.56&lt;/td&gt;
 &lt;td style="text-align: center"&gt;8,264&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;10&lt;/td&gt;
 &lt;td style="text-align: center"&gt;61.94&lt;/td&gt;
 &lt;td style="text-align: center"&gt;5,840&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;11&lt;/td&gt;
 &lt;td style="text-align: center"&gt;56.13&lt;/td&gt;
 &lt;td style="text-align: center"&gt;4,144&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;12&lt;/td&gt;
 &lt;td style="text-align: center"&gt;56.38&lt;/td&gt;
 &lt;td style="text-align: center"&gt;11,824&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Looking back, I can see that my mileage was low by about 33% and the elevation gain was more than 100-200% deficient. Looking at the training history of runners who performed well enough during the race had an average of 10,000 to 20,000 feet of elevation gain during their peak training weeks. My training peaked at 8,353 during week 8 and it made me exhausted. I was a bit thick to not see that foreshadowing message that yes, this race required immense elevation gain stamina.&lt;/p&gt;
&lt;h2 id="utmb-ownership"&gt;&lt;a href="#utmb-ownership"&gt;UTMB Ownership&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The Speedgoat race series has grown up since I first participated in 2015 and 2017. At that point it was ran primarily by Karl Meltzer himself and had a homey and local feel to everything. In 2015 there were 304 runners and 2017 only had 226. Compare that to 2024, which had 601 runners.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Speedgoat 50K 2024 Course Map based on my Strava activity. the northern section is the Snowbird Ski Resort."&gt;
 &lt;img
 alt="Speedgoat 50K 2024 Course Map based on my Strava activity. the northern section is the Snowbird Ski Resort."
 title="Speedgoat 50K 2024 Course Map based on my Strava activity. the northern section is the Snowbird Ski Resort."
 width="1600"
 height="1019"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-course-map_hu_59fabb42129f76fc.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-course-map_hu_177a0fc8bff0ad85.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-course-map_hu_12922af0dbf1d758.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-course-map_hu_c3fe5f9b5d43ee01.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-course-map_hu_633d4c67f9844c46.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-course-map_hu_305505edb344090d.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Speedgoat 50K 2024 Course Map based on my Strava activity. the northern section is the Snowbird Ski Resort.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The race has not only matured by absolute number of runners but by corporate ownership. In 2021 it was acquired by UTMB/Ironman. I was surprised at the expansive setup of the venue when I arrived early on July 20 to pick up my bib at around 5AM. There was an entire events tent the size of a small warehouse with temporary vinyl flooring and multiple vendor shops inside. It was as if a miniature running mall had appeared out of nowhere. In 2015 and 2017 the extent of vendor booths were entirely under pop up tents.&lt;/p&gt;
&lt;h2 id="hydration-1"&gt;&lt;a href="#hydration-1"&gt;Hydration 1&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The energy at the beginning of any race is exhilarating. Tapering for weeks after intense training leaves me with tons of pent up energy. Combine that with the music, surging crowd, and anticipating of a monumental day can push me to an unsustainable pace. But I resisted this feeling and held back as we began the long day.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Watching the sun rise in this grand mountain terrain while I was still fresh in the early morning was the most enjoyable part of the race."&gt;
 &lt;img
 alt="Watching the sun rise in this grand mountain terrain while I was still fresh in the early morning was the most enjoyable part of the race."
 title="Watching the sun rise in this grand mountain terrain while I was still fresh in the early morning was the most enjoyable part of the race."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-hydration-1_hu_4c1428c6ae0cb6a7.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-hydration-1_hu_65ac20b7bffd72fe.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-hydration-1_hu_84c0d537175f14ea.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-hydration-1_hu_b31f90e650d04b55.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-hydration-1_hu_a3b90db06842b816.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-hydration-1_hu_5d5a9ca69a8ba776.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Watching the sun rise in this grand mountain terrain while I was still fresh in the early morning was the most enjoyable part of the race.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Starting off at 8,080 feet at the Snowbird Plaza the course winds back and forth for 4.2 miles and up 1,656 feet to the first aid station. A few people remarked how we were still in sight of the starting line as we did switch backs across the mountain bench. The course was almost entirely dirt access roads up to this point. This was very helpful to manage the huge crowd of runners before the climb began to thin us out.&lt;/p&gt;
&lt;h2 id="hidden-peak-1"&gt;&lt;a href="#hidden-peak-1"&gt;Hidden Peak 1&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;After leaving the first aid station the route became more direct up to Hidden Peak. The dirt access roads gave way to beautiful single track trails. The sun had risen at this point but was behind the mountain peak making the running conditions cool and beautiful.&lt;/p&gt;
&lt;p&gt;Although the bulk of the racing crowd had spread out as we all adopted our own pace there was still a concentration of people that overwhelmed the capacity of the single track paths. When the course transitioned from the wider dirt access road to single track there were traffic jams. This became pretty annoying as we ascended up to Hidden Peak but might have been my saving grace. The slower pace at times kept my heart rate under control and avoided giving way to the trap of going too fast.&lt;/p&gt;
&lt;p&gt;In this portion of the race I tried to establish my calorie and salt intake. I started with a salt pill at 1:30 to be repeated every hour on the half hour mark. These have 215mg of sodium, 63mg of potassium, 11mg of calcium, and 22mg of calcium. Then, at 2:00 I started taking GU gels at the top of every hour. These have 55mg of sodium, 450mg of amino acids, and 7g of sugar.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The back of Hidden Peak. It was challenging to stay on the single track while gazing around at the amazing scenery."&gt;
 &lt;img
 alt="The back of Hidden Peak. It was challenging to stay on the single track while gazing around at the amazing scenery."
 title="The back of Hidden Peak. It was challenging to stay on the single track while gazing around at the amazing scenery."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-above-mineral-basin_hu_35c4b4c091accf19.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-above-mineral-basin_hu_d64b2c6552525e6f.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-above-mineral-basin_hu_9b7ec5536bdc3a56.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-above-mineral-basin_hu_ea022ecae5ce4566.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-above-mineral-basin_hu_6ee713b360bc998e.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-above-mineral-basin_hu_6c12d658cb02eb22.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The back of Hidden Peak. It was challenging to stay on the single track while gazing around at the amazing scenery.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;At any point where I was near enough an aid station I substituted my GU gel intake with actual snacks or food. I did this because I wouldn’t wish 10-12 hours of GU intake on my worst enemy and also to manage stomach nausea.&lt;/p&gt;
&lt;p&gt;At the Hidden Peak aid station at 9.3 miles and another 2,975 feet of elevation gain I wolfed down my favorite snacks, potato chips, peanut butter stuffed pretzels, Coca-Cola, and a few slices of water melon. This is the most well stocked and populated aid station besides the finish line.&lt;/p&gt;
&lt;h2 id="water-pipe"&gt;&lt;a href="#water-pipe"&gt;Water Pipe&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Between the Hidden Peak aid station to the Water Pipe is the greatest litmus test of your performance for the rest of the race. The downhill profile promises you’ll make up lost time but the terrain is loose apple and melon sized rocks. You have to be incredibly careful as you descend down into Mineral Basin to not roll your ankle or trip. This added a great deal of fatigue on my quads.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="This terrain was not conducive to running. I heard several runners complain about being unable to make up time on this downhill due to the terrain."&gt;
 &lt;img
 alt="This terrain was not conducive to running. I heard several runners complain about being unable to make up time on this downhill due to the terrain."
 title="This terrain was not conducive to running. I heard several runners complain about being unable to make up time on this downhill due to the terrain."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-descending-into-mineral-basin_hu_b070ac679a041c35.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-descending-into-mineral-basin_hu_bd35ba0355ab14d7.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-descending-into-mineral-basin_hu_dba6e2333b0cfbaf.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-descending-into-mineral-basin_hu_5264cf214715b8ff.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-descending-into-mineral-basin_hu_b4fa0463a20074d0.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-descending-into-mineral-basin_hu_c9eb0bf6c6fd2042.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;This terrain was not conducive to running. I heard several runners complain about being unable to make up time on this downhill due to the terrain.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After getting to the bottom of Mineral Basin at around 7,600 feet elevation I was relieved to finally be done with the incredibly long and technical descent. This was about 4 hours and 15.4 miles into the course and it was starting to get really hot. In my effort to stay hydrated I had been aggressively consuming water and was almost empty with my front pack water bottles. Luckily I was carrying an additional 2 liters in my backpack hydration reservoir.&lt;/p&gt;
&lt;p&gt;The race guidance had directly warned us about this section and had required everyone to carry 2 liters of water for exactly this section. Yet, in years past they had an aide station at the bottom of Mineral Basin that provided a much needed refuel before the long climb back up to the top of Mineral Basin. The course now has moved this aid station to mile 18.1, which is up a long 3 mile climb in the heat.&lt;/p&gt;
&lt;p&gt;As I started the hot climb back up Mineral Basin I realized I was exhausted and I changed from a slow jog to a death march. Many runners describe this as hitting the &lt;em&gt;wall&lt;/em&gt;. I tried to isolate what could be the cause. I had been slamming water and electrolytes pills on my normal rhythm. I was still sweating so I wasn’t specifically dehydrated. I had also been eating regularly. Certainly a lot more calories than in my training runs.&lt;/p&gt;
&lt;p&gt;About a half mile into this internal review process in a zoned out death march I hit another setback. After trying to lift my leg up to get a small pebble out of my shoe the entire back of my left thigh seized up into a cramp. The spasms were surprising considering I had never had cramps in this particular area of my body before and the muscle is pretty large. After taking a short break to relax my leg enough to keep hiking I made sure to slow my pace even more to accommodate for the struggling thigh.&lt;/p&gt;
&lt;p&gt;From Hidden Peak to the Water Pipe aid station is 8.7 miles with 3,658 feet of elevation loss and 2,444 feet of elevation gain. In absolute terms this is tolerable. But for many reasons it is where I personally and many other verbal runners around me start to struggle. I think the primary reason is that the race has finished the &lt;em&gt;fun&lt;/em&gt; part and with every step becoming more and more about sheer will.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Between the Water Pipe Aid Station and Mineral Basin Aid Station."&gt;
 &lt;img
 alt="Between the Water Pipe Aid Station and Mineral Basin Aid Station."
 title="Between the Water Pipe Aid Station and Mineral Basin Aid Station."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-water-pipe_hu_df9c664632f97a6d.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-water-pipe_hu_dbe6eafb894c1616.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-water-pipe_hu_ba434fa8e4d6adcf.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-water-pipe_hu_518a27334307c2f5.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-water-pipe_hu_356383799a80953.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-after-water-pipe_hu_a4d1b55080fa0a58.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Between the Water Pipe Aid Station and Mineral Basin Aid Station.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The Water Pipe aid station itself is next to a natural spring with race volunteers gathering water for the parched runners. Although there is no food it isn’t really a problem because the only thing I was thinking about at this point was getting more water and cooling off with a dump of water over my neck.&lt;/p&gt;
&lt;h2 id="mineral-basin"&gt;&lt;a href="#mineral-basin"&gt;Mineral Basin&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;A short 1.4 miles farther and 616 feet of gain I started to realize how hungry I was for snacks. I took my time here at this well stocked aid station. Plenty of potato chips, pickles, pizza, cookies, Coca-Cola, and my favorite: peanut butter pretzels. The placement of the aid station exit sign was looming over my feast. It proudly stated the next hellish segment of the race, up Mount Baldy.&lt;/p&gt;
&lt;p&gt;Refreshed from the aid station I started off in the next section with a slow jog on the flatter parts. When the uphill part started a few hundred feet later I slowed to a steady hike. My cramping leg had become more timid and would flare back up occasionally. Much of the winding approach up to Mount Baldy isn’t steep itself but still merits a strong input of will.&lt;/p&gt;
&lt;p&gt;As I turned off the dirt access road right before the Mount Baldy climb I heard a group of runners collectively questioning their life’s choices. A few had done Ironman competitions and said this Speedgoat race was harder. A few more said their 100km race wasn’t this hard. All agreed in the camaraderie of misery.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The turn off before I started climbing Mount Baldy."&gt;
 &lt;img
 alt="The turn off before I started climbing Mount Baldy."
 title="The turn off before I started climbing Mount Baldy."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu_a989e35a004ff02a.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu_a1e75462048a6cff.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu_6a70323ef0b0b36b.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu_da5ae328f6e9a76b.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu_299506660723e00b.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-mount-baldy-ascent_hu_11821f34f3645cf7.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The turn off before I started climbing Mount Baldy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;When the trail became unmanageably steep I shortened my steps and focused entirely on placement. The loose dirt and rocks here stole your energy if you were unfortunate enough to slide back down after gathering enough strength to step upward. In the previous times on this race I had opted not to bring hiking poles and always regretted not having them on this section. But this year I came back with revenge and 2 ultralight carbon fiber poles. They gave my climb much needed stability and I was able to use much more of my body to help with the climb.&lt;/p&gt;
&lt;p&gt;If I only had a single proud moment in this brutal race it was this last steep climb up Mount Baldy. My steps were tiny and my progress was incredibly slow. But I kept the climb consistent and deliberate without any side step breaks. In a mere 2.6 miles I had gotten closer to the sun by 1,843 feet.&lt;/p&gt;
&lt;h2 id="tunnel"&gt;&lt;a href="#tunnel"&gt;Tunnel&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The placement of the Tunnel Aid Station is perplexing. The nirvana of the Hidden Peak Aid Station is up a small hill but instead you bypass it off to the side and wrap around to an interesting tunnel through the mountain. Entering the cool tunnel after the brutal climb up Baldy with the heat ofthe day is one of the greatest feelings. Through the length of the tunnel are photographs and objects from a time long ago. I always find it a shame I don&amp;rsquo;t stop here to view this hole in the mountain museum.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Many great historical photographs I could only glance at as I ran by during the race."&gt;
 &lt;img
 alt="Many great historical photographs I could only glance at as I ran by during the race."
 title="Many great historical photographs I could only glance at as I ran by during the race."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-tunnel-museum_hu_ca4f4eb6636c54c4.webp 480w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-tunnel-museum_hu_41543081059ab312.webp 768w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-tunnel-museum_hu_9ac815f56434a19f.webp 1024w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-tunnel-museum_hu_bbd6993d0b7746b7.webp 1366w, https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-tunnel-museum_hu_29728a00cc21da0d.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/speedgoat-50k-2024-race-report/speedgoat-50k-2024-tunnel-museum_hu_ab9b31a8cf6b4ea2.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Many great historical photographs I could only glance at as I ran by during the race.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After exiting the tunnel the aid station is waiting right outside. I gathered my usual snacks and tried to minimize my time here. Slowing down anywhere is a sure way to realize how much pain you are in.&lt;/p&gt;
&lt;p&gt;From the Tunnel Aid Station to the bottom of the Hidden Peak ridge is the easiest part of the course. The path is a wide open dirt access road that winds back and forth as I went down the hill. There are small and medium sized rocks on the road so I couldn&amp;rsquo;t let loose with absolute speed but it was much more manageable than going down the river bed at Mineral Basin. This section goes down 1,128 feet before I started climbing back up again along the Hidden Peak Ridge.&lt;/p&gt;
&lt;p&gt;As I started up the Hidden Peak Ridge there were storm clouds starting to form around the peak. This is a semi-regular occurrence in late summer where afternoon thunderstorms roll in briefly and then disappear. I had a sudden fear that all my effort might be wasted if the storm continued to strengthen. Yet, as I slowly climbed the ridge the clouds stayed high and there were no lightning to be seen or thunder to be heard.&lt;/p&gt;
&lt;p&gt;Nearing the top of the ridge the wind started to strengthen and patchy rain rolled in. I kept my pace in an earnest effort to beat the storm. After Hidden Peak it was almost entirely downhill to the finish line. From the Tunnel Aid Station I had gone 2.7 miles with an elevation gain of 1,535 feet.&lt;/p&gt;
&lt;p&gt;It was here that an event photographer had stationed himself and was snapping away to capture my absolute misery. I understand it is logistically easiest to access this spot since it was a short walk down from Hidden Peak. However, the choice of capturing a runner&amp;rsquo;s image at the height of discomfort is odd to me. Other runners might experience reaching the top of the ridge with ecstasy on their face. Mine was just dead. I nonchalantly told the photographer as I passed him I felt like I was dying. He tried to disarm the situation by saying everyone is dying. I laughed at that but quipped back that I felt closer than most.&lt;/p&gt;
&lt;h2 id="hidden-peak-2"&gt;&lt;a href="#hidden-peak-2"&gt;Hidden Peak 2&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;At the last few hundred feet before reaching the Hidden Peak Aid station there were race officials waiting for me. Fearing a canceled race due to lightning risk or I hadn&amp;rsquo;t made the cutoff time I approached them slowly. As I got to them they just instructed me to take the low road around the back of Hidden Peak to avoid the wide open exposure of the last hill climb up to the top. Although the aid station is higher it is next to buildings that would theoretically attract a lightning strike. Despite the extra distance around the low road I was grateful to avoid getting struck by lightning.&lt;/p&gt;
&lt;p&gt;As I reached the aid station the race crew was packing up the bulk of tables and tents. I realized 9 hours and 44 minutes had passed and I was still miles away from the finish. I was glad I had kept my forward progress without getting cut or quitting but it was still frustrating to see once again how far back in the pack I was.&lt;/p&gt;
&lt;p&gt;During these broody thoughts I was ushered by a race official towards a checkpoint. Since I had taken the low road I had to loop back slightly to get my bib scanned for the aid station. I realized the race official was none other than Karl Meltzer himself. I told him I was in a love hate relationship with him. He feigned a laugh since I&amp;rsquo;m 100% sure he&amp;rsquo;s heard that a million times before.&lt;/p&gt;
&lt;h2 id="hydration-2"&gt;&lt;a href="#hydration-2"&gt;Hydration 2&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;I set off from Hidden Peak quite excited for the last part of the race. Much of it is downhill but there are a few surprises that always get me and other swearing. Towards the middle of the 5 miles before reaching Hydration #2 there is a series of hill climbs up 748 feet that hit at the worst possible time. Since I was so close to the finish I could strive forward in confidence but it as incredibly slow up the last hill climbs. It feels as if I was robbed of a graceful finish. To suddenly go from a speedy downhill jog to a trudge up more hills is greatly demoralizing. Over the 5 mile portion of the course I lost 3,047 feet of elevation.&lt;/p&gt;
&lt;p&gt;It is interesting to experience the last 7 miles of this race. Psychologically, you have to balance levels of pain and the duration I&amp;rsquo;d have to stay with that pain. Meaning I could minimize my pain by power hiking at a 16 to 20 minute per mile pace instead of running at a 9 to 12 minute. But this would almost double the duration of that minimized pain. Logically, the better choice would be to run. It wasn&amp;rsquo;t as if I was going to injure or damage myself from the quicker jog. Yet, the decision for me flipped back and forth between walking and running.&lt;/p&gt;
&lt;p&gt;The last few miles were a blur of pain as I tried to ignore my discomfort for the sake of finishing any faster than what a slow walk would give me. Once again they had stationed an event photograph only half a mile from the finish to capture me at my most dismal. The official distance and elevation gain was 31.8 miles and 11,318 feet. My Garmin Fenix 7x recorded 32.9 miles and 11,138 feet.&lt;/p&gt;
&lt;p&gt;I would have expected someone&amp;rsquo;s third race attempt to have improved performance. But I didn&amp;rsquo;t fulfill my speed or &lt;em&gt;comfort&lt;/em&gt; goals. I wanted to feel strong throughout the race but instead I felt dead after only 16 miles. My confidence isn&amp;rsquo;t shattered but I am once again humbled to improve my training. I won&amp;rsquo;t shy away from doing this again in the future and look forward to further mental demoralization.&lt;/p&gt;</description></item><item><title>Robots.txt Won't Save You</title><link>https://rb.ax/blog/robots.txt-wont-save-you/</link><pubDate>Fri, 12 Jul 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/robots.txt-wont-save-you/</guid><description>&lt;p&gt;&lt;figure aria-label="The AI vacuum hard at work"&gt;
 &lt;img
 alt="The AI vacuum hard at work"
 title="The AI vacuum hard at work"
 width="1600"
 height="914"srcset="https://rb.ax/blog/robots.txt-wont-save-you/the-ai-vacuum-at-work-featured_hu_775f8b8014629632.webp 480w, https://rb.ax/blog/robots.txt-wont-save-you/the-ai-vacuum-at-work-featured_hu_3cfd44985e98ef9d.webp 768w, https://rb.ax/blog/robots.txt-wont-save-you/the-ai-vacuum-at-work-featured_hu_497f770e0c7fc1f6.webp 1024w, https://rb.ax/blog/robots.txt-wont-save-you/the-ai-vacuum-at-work-featured_hu_4678005642efb542.webp 1366w, https://rb.ax/blog/robots.txt-wont-save-you/the-ai-vacuum-at-work-featured_hu_70535961392d7cbd.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/robots.txt-wont-save-you/the-ai-vacuum-at-work-featured_hu_a56ed3ea4f01d547.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The AI vacuum hard at work&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Is it too late? The ever hungry AI titans demand more and more data that is vacuuming up the entirety of the internet. You just got off a boring Zoom call? &lt;em&gt;Chomp&lt;/em&gt;.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; Checked Facebook for upcoming birthdays or said hello to a friend? &lt;em&gt;Slurp&lt;/em&gt;.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; Take a peak of your friend&amp;rsquo;s recent vacation on Instagram? &lt;em&gt;Mmmm&lt;/em&gt;.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; How about the latest news aggregated by X? &lt;em&gt;Scrumptious&lt;/em&gt;.&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; Afterward, you look for nearby restaurants on Google because you are getting hungry? &lt;em&gt;Delicious&lt;/em&gt;.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; Every action on these platforms feeds the insatiable blob of AI training models.&lt;/p&gt;
&lt;p&gt;But we aren&amp;rsquo;t functioning in our own spaces when feeding these AI models. As a user of these platforms we are beholden to the profiteering whims of their owners. In the past this has been funded indirectly with advertisements or directly with subscription fees but further profit extraction now relies on gathering behavior data to train AI. Yet the gathering of this data isn&amp;rsquo;t limited to the platform itself. There simply isn&amp;rsquo;t enough data. It needs more!&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Subsequently, leading AI companies have turned to the wider public internet. Scraping data from message forums, news articles, blogs, Wikipedia pages, images, and whatever else it can find to feed and further refine AI models. But it hasn&amp;rsquo;t been enough. In 2021, OpenAI was running out of content to consume and created a speech recognition tool called Whisper for no other reason than to transcribe more than a million hours of YouTube videos to give itself more content.&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; Anything reachable on the public internet is available for consumption, even millions of copyrighted articles from &lt;em&gt;The New York Times&lt;/em&gt;.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; But how is this massive trawling system technically performed?&lt;/p&gt;
&lt;p&gt;When you want to see a web page you type in the name in the address bar, hit enter, and it loads. Disregarding all other underlying systems like IP addresses and DNS for simplicity, the browser sends what is called a &lt;code&gt;HTTP GET&lt;/code&gt; request. The process begins when you hit enter, which instructs the browser to send a &lt;code&gt;GET&lt;/code&gt; request to the server to obtain whatever resource at the specified directory, such as a web page or an image.&lt;/p&gt;
&lt;p&gt;The request itself includes a URL, which states the website&amp;rsquo;s location, and various headers, such as the User-Agent, which provides information about whoever is making the request. The server processes this request and responds with the desired stuff, which might be a video, image, or text. Once the client receives the response, the browser renders the content for the user to view.&lt;/p&gt;
&lt;p&gt;As an example, the below &lt;code&gt;GET&lt;/code&gt; request is being sent to the website &lt;code&gt;www.example.com&lt;/code&gt; and is requesting resources from the directory &lt;code&gt;/path/to/resource&lt;/code&gt;. The &lt;code&gt;User-Agent&lt;/code&gt; and &lt;code&gt;Accept&lt;/code&gt; fields show that the client is using Windows 10 and the Chrome web browser.&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-http" data-lang="http"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#a6e22e"&gt;GET&lt;/span&gt; /path/to/resource &lt;span style="color:#66d9ef"&gt;HTTP&lt;/span&gt;&lt;span style="color:#f92672"&gt;/&lt;/span&gt;&lt;span style="color:#ae81ff"&gt;1.1&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Host&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;www.example.com&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;User-Agent&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Accept&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Accept-Language&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;en-US,en;q=0.5&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;Connection&lt;span style="color:#f92672"&gt;:&lt;/span&gt; &lt;span style="color:#ae81ff"&gt;keep-alive&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;But these &lt;code&gt;GET&lt;/code&gt; requests can be easily automated as part of scripts or software. This is where web scrapers come into play. These are automated software programs that work by systematically extracting data from websites, allowing anyone to gather vast amounts of information efficiently and at massive scale. They navigate through web pages and collect relevant data points such as text, images, and links. Scrapers parse the HTML structure of web pages to identify and extract desired content.&lt;/p&gt;
&lt;p&gt;Additionally, there are no rules about what you have state in &lt;code&gt;User-Agent&lt;/code&gt;. Yes, &lt;a href="https://knowyourmeme.com/memes/just-go-on-the-internet-and-tell-lies"&gt;people just go on the internet and tell lies&lt;/a&gt;. A &lt;code&gt;GET&lt;/code&gt; request could state they are making a request from an iPhone when in fact it is just software running on a Linux server. This matters because in an ideal world all client requests would have the correct stated &lt;code&gt;User-Agent&lt;/code&gt; so that website administrators could manage appropriate access. If there was a need to block the &lt;a href="https://developers.cloudflare.com/fundamentals/reference/cloudflare-site-crawling/"&gt;Cloudflare Always Online&lt;/a&gt; crawler it could easily be blocked by denying, dropping, or ignoring any &lt;code&gt;HTTP GET&lt;/code&gt; requests with the below &lt;code&gt;User-Agent&lt;/code&gt;:&lt;/p&gt;
&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;"&gt;&lt;code class="language-http" data-lang="http"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;&lt;span style="color:#960050;background-color:#1e0010"&gt;Mozilla/5.0 (compatible; CloudFlare-AlwaysOnline/1.0; +http://www.cloudflare.com/always-online)
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;One way website owners can manage &lt;code&gt;User-Agent&lt;/code&gt; access is through the contents of the &lt;code&gt;robots.txt&lt;/code&gt; file. The &lt;code&gt;robots.txt&lt;/code&gt; file serves as a guideline for web crawlers and scrapers on how to interact with the site&amp;rsquo;s content. Located in the root directory of a website, this file specifies which parts of the site should be crawled and indexed and which parts should be ignored. If you didn&amp;rsquo;t want Google indexing your website for any reason you would tell them not to from this file. By setting rules for user agents, website administrators can control the access of web crawlers, protecting sensitive information, managing server load, and optimizing the indexing process. The contents of the &lt;code&gt;robots.txt&lt;/code&gt; file helps manage a balance between accessibility and privacy, ensuring that only the desired content is made available to search engines and other automated agents.&lt;/p&gt;
&lt;p&gt;Any &lt;code&gt;HTTP GET&lt;/code&gt; requests do not have to obey the contents of &lt;code&gt;robots.txt&lt;/code&gt;. The file is a convention rather than a strict protocol. Compliance is voluntary and based on the good behavior of web crawlers. It serves purely as a guideline for well-behaved web crawlers and robots, instructing them on which parts of a website they are allowed to crawl and index. Malicious bots or poorly designed crawlers might ignore the &lt;code&gt;robots.txt&lt;/code&gt; file and access areas of a website they were instructed not to visit.&lt;/p&gt;
&lt;p&gt;The reasons for filtering certain &lt;code&gt;User-Agent&lt;/code&gt; requests are endless. In the context of AI crawlers, it can be used to prevent well-behaved web scrapers that state the correct &lt;code&gt;User-Agent&lt;/code&gt; information in their request. The major newspaper &lt;em&gt;The New York Times&lt;/em&gt; started solidifying the prohibition of using its content to train AI models in the summer of 2023.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; This is expectedly pragmatic due to the fact that their primary product is selling publicly available text and images, which has necessitated the fabrication of a strong &lt;code&gt;robots.txt&lt;/code&gt; file. As of July 12, 2024 &lt;a href="https://www.nytimes.com/robots.txt"&gt;it discourages 26&lt;/a&gt; &lt;code&gt;User-Agents&lt;/code&gt; from the all encompassing root directory of &lt;code&gt;/&lt;/code&gt;. The popular site Reddit took the same measures recently but went further and disallowed everyone&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt; on their &lt;a href="https://www.reddit.com/robots.txt"&gt;robots file&lt;/a&gt;. This is due to them selling user built data directly to Google for the tidy sum of $60 million.&lt;sup id="fnref:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The sentiment of using a robustly defined &lt;code&gt;robots.txt&lt;/code&gt; file to protect a site has spread to more independent platforms like personal blogs. &lt;a href="https://roelant.net/en/2023/im-blocking-ai-crawlers/"&gt;Roelant&lt;/a&gt;, &lt;a href="https://neil-clarke.com/block-the-bots-that-feed-ai-models-by-scraping-your-website/"&gt;Neil Clarke&lt;/a&gt;, and &lt;a href="https://coryd.dev/posts/2024/go-ahead-and-block-ai-web-crawlers/"&gt;Cory Dransfeldt&lt;/a&gt; have all shared their experience about updating their &lt;code&gt;robots.txt&lt;/code&gt; file to block AI crawlers. The makers of the &lt;a href="https://pika.pika.page/"&gt;Pika&lt;/a&gt; blogging platform even &lt;a href="https://pika.pika.page/posts/your-pika-robots-txt-file"&gt;baked the hardened settings&lt;/a&gt; into everyone&amp;rsquo;s &lt;code&gt;robots.txt&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;While I applaud these website fortifications I have several fundamental doubts about its efficacy. The primary is about the truthfulness of the &lt;code&gt;User-Agent&lt;/code&gt; field in requests. While many AI companies set this field correctly when crawling there are cases of it being obfuscated and ignored.&lt;/p&gt;
&lt;p&gt;In June of 2023, Robb Knight found out that the Perplexity web scraper bot was not defining the appropriate &lt;code&gt;User-Agent&lt;/code&gt; in requests.&lt;sup id="fnref:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; The expected &lt;code&gt;User-Agent&lt;/code&gt; designation was &lt;code&gt;PerplexityBot&lt;/code&gt;, which was missing, and the actually provided information pointed to a user on Windows 10 using Chrome. The tech magazine &lt;em&gt;Wired&lt;/em&gt; later confirmed Mr. Knight&amp;rsquo;s findings and went even further in finding that the Perplexity bot was frequently inaccurate and performed crawling from undocumented IP addresses.&lt;sup id="fnref:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;My own experience with OpenAI&amp;rsquo;s ChatGPT has left a similar apprehension about supposed &lt;code&gt;User-Agent&lt;/code&gt; settings. My robots file specifically blocks &lt;code&gt;User-agent: ChatGPT-User&lt;/code&gt;, which is supposedly used when performing live tasks for human users. Yet, when asking the 4o model to summarize one of my recent blog posts it does so without any issue. Pressing ChatGPT to a variety of half truth answers. The immediate response stated:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I accessed the content using standard browsing tools without specifying a particular user-agent setting. This allows the browsing tool to simulate regular web browsing behavior, enabling the retrieval of information from most websites.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Then I asked it to be specific.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;I don’t have the capability to specify or reveal the user-agent settings used during web browsing. My responses are based on the content retrieved through standard web browsing tools provided by OpenAI.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Later inquiries state the below agent is used when accessing websites.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;When accessing websites, the user agent string typically used by my browsing tool is designed to mimic a modern web browser. It usually looks like this:
&lt;code&gt;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36&lt;/code&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;It then goes on to explain why using that particular agent is helpful for whichever reasons. One of reasons stood out to me.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Avoid detection and blocking by websites that might restrict access based on non-standard user agents.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;I haven&amp;rsquo;t seen any news articles about ChatGPT 4o bypassing the instructions of &lt;code&gt;robots.txt&lt;/code&gt; specifically. I also have no real way of pulling connection logs as this blog is hosted on Cloudflare Pages with almost no tracking. Additionally, the agent settings ChatGPT shared might very well be a fluke. A dreamed up hallucination that plagues all AI models or a misinterpretation of my query. It could also be relying on a cached version of my blog from Bing. But it doesn&amp;rsquo;t really matter the method because the result is that even with a specific statement in &lt;code&gt;robots.txt&lt;/code&gt; my blog post was gobbled up.&lt;/p&gt;
&lt;p&gt;Another point is the sheer breadth and dynamism of what website administrators are facing. As billions pour into the AI sector how are we supposed to keep up with this or that new company that formed over the course of a few days? Or there might be new web scraper companies formed in the fringes of the AI industry built entirely to extract data where ever possible. They could both legally insulate and satiate the hunger of the main AI models. Heightened maintenance requirements for keeping &lt;code&gt;robots.txt&lt;/code&gt; updated is not sustainable for most companies or independent creatives. Then we are faced with prior existential question about if it&amp;rsquo;s even effective? Perplexity&amp;rsquo;s behavior and ChatGPT 4o accessing my website are only compounded by the recent revelation from Reuters that multiple AI companies are ignoring &lt;code&gt;robots.txt&lt;/code&gt;.&lt;sup id="fnref:14"&gt;&lt;a href="#fn:14" class="footnote-ref" role="doc-noteref"&gt;14&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;However, we shouldn&amp;rsquo;t give up hope in the face of these daunting AI vacuums. There are services popping up like &lt;a href="https://darkvisitors.com/"&gt;Dark Visitors&lt;/a&gt; that introduces a dynamic component to the contents of your &lt;code&gt;robots.txt&lt;/code&gt; file. Another easy method is frequently checking &lt;em&gt;The New York Times&lt;/em&gt; website for their &lt;code&gt;robots.txt&lt;/code&gt; to get the most up to date and relevant agents to block. The question about how pragmatic this approach is in what Matthew Butterick calls a &lt;em&gt;feel-good theatrical gesture&lt;/em&gt;&lt;sup id="fnref:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; is up to the organization or individual to decide.&lt;/p&gt;
&lt;p&gt;For a more aggressive approach that doesn&amp;rsquo;t rely on the power of suggestion, you could use a web application firewall (WAF) to outright drop bot traffic. This would require individuals who are technically inclined and needs more care than just simply updating a text file. However, ready made services like Cloudflare&amp;rsquo;s Bot Categories&lt;sup id="fnref:16"&gt;&lt;a href="#fn:16" class="footnote-ref" role="doc-noteref"&gt;16&lt;/a&gt;&lt;/sup&gt; are available for those who realize &lt;code&gt;robots.txt&lt;/code&gt; aren&amp;rsquo;t enough. Cloudflare&amp;rsquo;s approach utilizes WAF rules to allow or block certain web scrapers at the network layer. This approach would produce better blocking enforcement as it drops undesirable network traffic.&lt;/p&gt;
&lt;p&gt;More nuanced approaches to prevent wholesale AI theft are available that are quickly gaining in popularity. Methods and tools like Nightshade or Glaze&lt;sup id="fnref:17"&gt;&lt;a href="#fn:17" class="footnote-ref" role="doc-noteref"&gt;17&lt;/a&gt;&lt;/sup&gt; can poison data such as images as it is ingested by AI models. Everything looks normal to human eyes but to AI the style, content, and interpretation is completely askew. The result is that the AI model produces an extremely flawed or simply wrong output. Yet a flaw was found in Glaze by researchers in early July.&lt;sup id="fnref:18"&gt;&lt;a href="#fn:18" class="footnote-ref" role="doc-noteref"&gt;18&lt;/a&gt;&lt;/sup&gt; The flaw was quickly patched&lt;sup id="fnref:19"&gt;&lt;a href="#fn:19" class="footnote-ref" role="doc-noteref"&gt;19&lt;/a&gt;&lt;/sup&gt; but reveals an ongoing arms race between the creators and AI titans devouring them up. The unfortunate take away is that creators need to be ever vigilant while AI crawlers only need a small lapse for content to be available before it goes into the deep and mysterious belly of AI training models.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Cristiano Lima-Strong and David DiMolfetta, “Zoom’s Privacy Tweaks Stoke Fears That Its Calls Will Be Used to Train AI,” &lt;em&gt;Washington Post&lt;/em&gt;, August 8, 2023, &lt;a href="https://www.washingtonpost.com/politics/2023/08/08/zooms-privacy-tweaks-stoke-fears-that-its-calls-will-be-used-train-ai/"&gt;https://www.washingtonpost.com/politics/2023/08/08/zooms-privacy-tweaks-stoke-fears-that-its-calls-will-be-used-train-ai/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;James Vincent, “Facebook’s Next Big AI Project Is Training Its Machines on Users’ Public Videos,” &lt;em&gt;The Verge&lt;/em&gt;, March 12, 2021, &lt;a href="https://www.theverge.com/2021/3/12/22326975/facebook-training-ai-public-videos-digital-memories"&gt;https://www.theverge.com/2021/3/12/22326975/facebook-training-ai-public-videos-digital-memories&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;Geoffrey A. Fowler, “Your Instagrams Are Training AI. There’s Little You Can Do About It.,” &lt;em&gt;Washington Post&lt;/em&gt;, September 28, 2023, &lt;a href="https://www.washingtonpost.com/technology/2023/09/08/gmail-instagram-facebook-trains-ai/"&gt;https://www.washingtonpost.com/technology/2023/09/08/gmail-instagram-facebook-trains-ai/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Sarah Perez, “X’S Privacy Policy Confirms It Will Use Public Data to Train AI Models,” &lt;em&gt;TechCrunch&lt;/em&gt;, September 6, 2023, &lt;a href="https://techcrunch.com/2023/09/01/xs-privacy-policy-confirms-it-will-use-public-data-to-train-ai-models/"&gt;https://techcrunch.com/2023/09/01/xs-privacy-policy-confirms-it-will-use-public-data-to-train-ai-models/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Ben Schoon, “Google’s Updated Privacy Policy Doubles Down on Using Your Data for Training AI,” &lt;em&gt;9to5Google&lt;/em&gt;, July 3, 2023, &lt;a href="https://9to5google.com/2023/07/03/google-privacy-policy-ai-training-data/"&gt;https://9to5google.com/2023/07/03/google-privacy-policy-ai-training-data/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Jared Kaplan et al., “Scaling Laws for Neural Language Models,” &lt;em&gt;arXiv&lt;/em&gt;, January 23, 2020, &lt;a href="https://arxiv.org/pdf/2001.08361"&gt;https://arxiv.org/pdf/2001.08361&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Cade Metz et al., “How Tech Giants Cut Corners to Harvest Data for A.I.,” &lt;em&gt;The New York Times&lt;/em&gt;, April 9, 2024, &lt;a href="https://www.nytimes.com/2024/04/06/technology/tech-giants-harvest-data-artificial-intelligence.html"&gt;https://www.nytimes.com/2024/04/06/technology/tech-giants-harvest-data-artificial-intelligence.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Michael M. Grynbaum and Ryan Mac, “New York Times Sues OpenAI and Microsoft Over Use of Copyrighted Work,” &lt;em&gt;The New York Times&lt;/em&gt;, December 27, 2023, &lt;a href="https://www.nytimes.com/2023/12/27/business/media/new-york-times-open-ai-microsoft-lawsuit.html"&gt;https://www.nytimes.com/2023/12/27/business/media/new-york-times-open-ai-microsoft-lawsuit.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Jay Peters and Wes Davis, “The New York Times Blocks OpenAI’s Web Crawler,” &lt;em&gt;The Verge&lt;/em&gt;, August 21, 2023, &lt;a href="https://www.theverge.com/2023/8/21/23840705/new-york-times-openai-web-crawler-ai-gpt"&gt;https://www.theverge.com/2023/8/21/23840705/new-york-times-openai-web-crawler-ai-gpt&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;Alex Heath, “Reddit Blocks AI Bots From Crawling Its Website,” &lt;em&gt;The Verge&lt;/em&gt;, June 25, 2024, &lt;a href="https://www.theverge.com/2024/6/25/24185984/reddit-robots-txt-fight-ai-bots-scraping-crawlers"&gt;https://www.theverge.com/2024/6/25/24185984/reddit-robots-txt-fight-ai-bots-scraping-crawlers&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:11"&gt;
&lt;p&gt;Jason Koebler, “Google Is Paying Reddit $60 Million for Fucksmith to Tell Its Users to Eat Glue,” &lt;em&gt;404 Media&lt;/em&gt;, May 23, 2024, &lt;a href="https://www.404media.co/google-is-paying-reddit-60-million-for-fucksmith-to-tell-its-users-to-eat-glue/"&gt;https://www.404media.co/google-is-paying-reddit-60-million-for-fucksmith-to-tell-its-users-to-eat-glue/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:12"&gt;
&lt;p&gt;Robb Knight, “Perplexity AI Is Lying About Their User Agent,” &lt;em&gt;Robb Knight&lt;/em&gt; (blog), June 15, 2024, &lt;a href="https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/"&gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:13"&gt;
&lt;p&gt;Dhruv Mehrotra and Tim Marchman, “Perplexity Is a Bullshit Machine,” &lt;em&gt;WIRED&lt;/em&gt;, June 19, 2024, &lt;a href="https://www.wired.com/story/perplexity-is-a-bullshit-machine/"&gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:14"&gt;
&lt;p&gt;Katie Paul, “Exclusive: Multiple AI Companies Bypassing Web Standard to Scrape Publisher Sites, Licensing Firm Says,” &lt;em&gt;Reuters&lt;/em&gt;, June 21, 2024, &lt;a href="https://www.reuters.com/technology/artificial-intelligence/multiple-ai-companies-bypassing-web-standard-scrape-publisher-sites-licensing-2024-06-21/"&gt;https://www.reuters.com/technology/artificial-intelligence/multiple-ai-companies-bypassing-web-standard-scrape-publisher-sites-licensing-2024-06-21/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:14" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:15"&gt;
&lt;p&gt;Matthew Butterick, “AI Scraping &amp;amp; Publicly Available Web Data,” &lt;em&gt;Matthew Butterick&lt;/em&gt; (blog), June 22, 2024, &lt;a href="https://matthewbutterick.com/chron/ai-scraping-and-publicly-available-web-data.html"&gt;https://matthewbutterick.com/chron/ai-scraping-and-publicly-available-web-data.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:16"&gt;
&lt;p&gt;Reid Tatoris and Pawel Klimek, “Easily Manage AI Crawlers With Our New Bot Categories,” &lt;em&gt;The Cloudflare Blog&lt;/em&gt;, June 14, 2024, &lt;a href="https://blog.cloudflare.com/ai-bots/"&gt;https://blog.cloudflare.com/ai-bots/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:16" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:17"&gt;
&lt;p&gt;Benj Edwards, “University of Chicago Researchers Seek to ‘Poison’ AI Art Generators With Nightshade,” &lt;em&gt;Ars Technica&lt;/em&gt;, October 25, 2023, &lt;a href="https://arstechnica.com/information-technology/2023/10/university-of-chicago-researchers-seek-to-poison-ai-art-generators-with-nightshade/"&gt;https://arstechnica.com/information-technology/2023/10/university-of-chicago-researchers-seek-to-poison-ai-art-generators-with-nightshade/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:17" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:18"&gt;
&lt;p&gt;Robert Hönig, Javier Rando, Nicholas Carlini, and Florian Tramèr, &amp;ldquo;Adversarial Perturbations Cannot Reliably Protect Artists From Generative AI,&amp;rdquo; &lt;em&gt;arXiv&lt;/em&gt;, June 17, 2024, &lt;a href="https://arxiv.org/pdf/2406.12027"&gt;https://arxiv.org/pdf/2406.12027&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:18" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:19"&gt;
&lt;p&gt;Ashley Belanger, “Tool Preventing AI Mimicry Cracked; Artists Wonder What’s Next,” &lt;em&gt;Ars Technica&lt;/em&gt;, July 5, 2024, &lt;a href="https://arstechnica.com/tech-policy/2024/07/glaze-a-tool-protecting-artists-from-ai-bypassed-by-attack-as-demand-spikes/"&gt;https://arstechnica.com/tech-policy/2024/07/glaze-a-tool-protecting-artists-from-ai-bypassed-by-attack-as-demand-spikes/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:19" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Exceptions For Removing Private Autonomous Systems in BGP</title><link>https://rb.ax/blog/exceptions-for-removing-private-autonomous-systems-in-bgp/</link><pubDate>Wed, 19 Jun 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/exceptions-for-removing-private-autonomous-systems-in-bgp/</guid><description>&lt;p&gt;Quite a while ago, I got assigned to what seemed like a straightforward network task: turning up a simple cross connect with an external company using eBGP for route advertisement. However, this mundane and simple task would lead me to a greater understanding of BGP quirks and exceptions.&lt;/p&gt;
&lt;p&gt;To set the stage, our network and the other company’s network needed to advertise routes to each other on a stable and robust cross connect. We set up eBGP peering, ensuring everything was configured correctly. For this example let&amp;rsquo;s say my company was using private BGP AS &lt;code&gt;64512&lt;/code&gt; while the other company was using &lt;code&gt;65534&lt;/code&gt;. The peering came up without any problems. But after further verification, I realized there was a small snag to writing this off as completed.&lt;/p&gt;
&lt;p&gt;The other company was receiving everything except one specific subnet advertisement from our router. It was rather peculiar that all the other subnets were making it over fine. Only this single subnet wasn&amp;rsquo;t making it across. Everything seemed fine on our end and the engineer I was working with at the other company claimed their configuration was equally sound. I began to doubt everything. What could possibly be wrong?&lt;/p&gt;
&lt;p&gt;After much back-and-forth, meticulous troubleshooting, and pulling in other senior engineers, we discovered the culprit: overlapping private BGP AS numbers. Both our network and the external company’s network were using an identical private AS numbers. But not in the obvious way you might think. However, this caused a peculiar problem that made the &lt;code&gt;remove-private-as&lt;/code&gt; command on our Cisco IOS router ineffective.&lt;/p&gt;
&lt;h2 id="understanding-removal"&gt;&lt;a href="#understanding-removal"&gt;Understanding Removal&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;A large enterprise network environment frequently uses the &lt;code&gt;remove-private-as&lt;/code&gt; command in their perimeter to sanitize information before it goes out to whichever vendor or client. It is designed to strip private BGP AS numbers (64512-65534) from the &lt;code&gt;AS_PATH&lt;/code&gt; attribute in BGP route advertisements. This is helpful when setting up peering relationships to other large enterprises that might have unique networks that would conflict with your own. The normally useful BGP attribute information is no longer relevant and can be safely discarded as you are traversing across two widely different entities.&lt;/p&gt;
&lt;p&gt;But the information cleansing feature of &lt;code&gt;remove-private-as&lt;/code&gt; is also a risk. Without deeper knowledge of the other company&amp;rsquo;s network there are potential chances for conflict. According to Cisco’s documentation about &lt;a href="https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13756-32.html"&gt;removing private autonomous system numbers in BGP&lt;/a&gt; we hit an edge case that caused this specific subnet to not propagate over to the other company&amp;rsquo;s router.&lt;/p&gt;
&lt;p&gt;The root cause of the problem arose because the subnet we were advertising contained the other company&amp;rsquo;s AS number of &lt;code&gt;65534&lt;/code&gt; in the &lt;code&gt;AS_PATH&lt;/code&gt; attribute. Somewhere deeper in my company&amp;rsquo;s network this subnet originated in an area with the same private BGP AS number as the one we had chosen to use for this cross connect. When our router evaluated the subnet for the purposes of sanitizing it with &lt;code&gt;remove-private-as&lt;/code&gt; it saw the other company’s private BGP AS number in the &lt;code&gt;AS_PATH&lt;/code&gt; and consequently did not remove the private BGP AS of &lt;code&gt;65534&lt;/code&gt;. Per the previously linked Cisco documentation:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If the AS_PATH contains the AS number of the eBGP neighbor, BGP does not remove the private AS number.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;With the &lt;code&gt;AS_PATH&lt;/code&gt; attribute unmodified our router sent this subnet advertisement over to the other company&amp;rsquo;s router. But once the subnet arrived it led to the other company’s router dropping the advertised subnet because it saw its own AS number in the &lt;code&gt;AS_PATH&lt;/code&gt;, causing the BGP loop prevention mechanism to kick in. Their router thought there was a routing loop and correctly discarded the route.&lt;/p&gt;
&lt;p&gt;Realizing this overlap was the root cause took some time. We initially suspected everything from misconfigurations to legacy hardware issues. Once we pinpointed the overlapping AS numbers as the issue, it was easy to draft a solution. We had to strip the private AS numbers further within our network to resolve the BGP discard issue. Specifically, we made a router further within our network perform the &lt;code&gt;remove-private-as&lt;/code&gt; AS_PATH stripping. After implementing the fix, the &lt;code&gt;remove-private-as&lt;/code&gt; command worked as intended, and the subnet in question propagated over to the other company without a hitch.&lt;/p&gt;
&lt;h2 id="lessons-learned"&gt;&lt;a href="#lessons-learned"&gt;Lessons Learned&lt;/a&gt;&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Double-Check AS Numbers:&lt;/strong&gt; When dealing with eBGP, always verify that your private AS numbers do not overlap with those of your external peers. Even on private cross connections. It’s a simple step that can save hours of troubleshooting.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Understand Your Tools:&lt;/strong&gt; Knowing how commands like &lt;code&gt;remove-private-as&lt;/code&gt; work can help you understand why things break. &lt;a href="https://www.cisco.com/c/en/us/support/docs/ip/border-gateway-protocol-bgp/13758-36.html"&gt;Cisco’s documentation&lt;/a&gt; is incredibly helpful for understanding the nuances of these commands. They don&amp;rsquo;t always do exactly as they say. It was an error on my part thinking the command wouldn&amp;rsquo;t have exceptions.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Expect the Unexpected:&lt;/strong&gt; Network configurations can be tricky, and what seems like a minor detail can lead to significant issues. Always be prepared for the unexpected and approach troubleshooting with an open mind outside of normal configuration checks.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;I find it funny how a small detail like overlapping private BGP AS numbers can cause such a quagmire. It is only inevitable that something intended to be used strictly inside a company&amp;rsquo;s network would cause these issues when connecting to another network. However, these experiences are what make us better network engineers as it pushes us to have a better understanding of the protocol fundamentals. They teach us to be meticulous, to understand the tools at our disposal, and to always plan on learning more.&lt;/p&gt;
&lt;p&gt;In the world of networking, it’s the insignificant details that cause the biggest headaches. An overlap of private BGP AS numbers taught me a valuable lesson about broadening your view of a network and having a better awareness of the commands I use on a daily basis. By sharing this story, I hope to shed light on a unique yet important BGP situation and help fellow network engineers avoid wasting their maintenance windows.&lt;/p&gt;</description></item><item><title>A Traditional Wedding In China</title><link>https://rb.ax/blog/a-traditional-wedding-in-china/</link><pubDate>Thu, 04 Jan 2024 10:30:00 -0700</pubDate><guid>https://rb.ax/blog/a-traditional-wedding-in-china/</guid><description>&lt;p&gt;&lt;figure aria-label="The local family carrying the dowry offering from the pavilion to their house down the street. Notice the smoke in the distance from the firecrackers going off. The lady in the foreground is carrying ducks and chickens in a basket."&gt;
 &lt;img
 alt="The local family carrying the dowry offering from the pavilion to their house down the street. Notice the smoke in the distance from the firecrackers going off. The lady in the foreground is carrying ducks and chickens in a basket."
 title="The local family carrying the dowry offering from the pavilion to their house down the street. Notice the smoke in the distance from the firecrackers going off. The lady in the foreground is carrying ducks and chickens in a basket."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_75b5d121987bf42a.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_1ad63e18c395eee3.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_777312224f2da8c5.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_b3157fbf2aa2abf8.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_752f848425b2d56e.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_db0f5c5c3c9a1476.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_18a5cde199ba4da0.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The local family carrying the dowry offering from the pavilion to their house down the street. Notice the smoke in the distance from the firecrackers going off. The lady in the foreground is carrying ducks and chickens in a basket.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After witnessing &lt;a href="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/"&gt;2,760 kilometers of China&lt;/a&gt; all I wanted to do was sleep but my wife wouldn’t let me. We had just arrived in Kunming after twelve hours of travel, which by all accounts was just effortless sitting in a large comfortable chair. Yet, as any long-distance traveler knows, the sitting is the worst part. It wasn’t just normal fatigue either, I was at the onset of an aggressive cold or flu that needed a rapidly mounted defense that could only be served with a bed, pillow, and blanket. I’ve heard that flight attendants say that social rules start to break past twelve hours of travel. I was on the precipice.&lt;/p&gt;
&lt;p&gt;From within the regional train station we headed to the taxi pick up area. Our final destination was at a nearby mall to eat dinner with the groom’s friends, who also had just arrived. But it was New Year’s Day and the crowd was insurmountable. Since the mall was only about a mile and a half away we decided to walk.&lt;/p&gt;
&lt;p&gt;Dragging our luggage across the historic cobblestone area of Kunming would have been charming if not for my fragile condition. We had made the bold choice to purchase a tough rolling Pelican luggage container to protect the gifts we had brought for the bride’s family. We packed, among other things, several glass bottles of whiskey made locally in Utah. The toughness of the case was invaluable but came at a high cost to mobility and ease of use that only got worse with the uneven cobblestone.&lt;/p&gt;
&lt;p&gt;After some trudging we arrived at the Shuncheng Shopping Center (顺城购物中心) and went up escalators a few stories to reach the restaurant. Everyone else had arrived about an hour earlier, flying in on fancy airplanes. We were the stragglers on our archaic 350 km/h bullet train. The group was very international, with some of the groom’s friends from Singapore and the Philippines. I’m sure their first impression of me was muted since all I did was sip herbal tea and zone out.&lt;/p&gt;
&lt;p&gt;As we sat at dinner my wife was attempting to book our hotel in the nearby area. For some reason our original reservation had fallen through and on our walk to the restaurant she had spotted another hotel that caught her eye. While this process was playing out, the bride and groom to be both commented on my poor condition and offered to order some medicine. In my confused tired stupor I politely declined since we were about done with dinner and I didn’t want to wait long to head to the hotel. However, they politely reminded me that this was China and it would only be a matter of minutes before it arrived.&lt;/p&gt;
&lt;p&gt;This might confuse residents of the United States or other countries but it only highlights the otherworldly capabilities of technology and the service industry in China. A few minutes later, a Meituan (美团) delivery driver in a yellow jacket walked into the restaurant with a bag from a local pharmacy and handed off the delivery. I was amazed along with the rest of the group and this sparked a broader conversation about how there were no comparisons in other countries for this convenience. The leading comparison in the United States would be a few hour delivery from Amazon to a nearby locker. But this was ordered and delivered specifically to our location in a matter of less than 10 minutes.&lt;/p&gt;
&lt;p&gt;With medicine in hand, my wife and I headed to our hotel at the Crowne Plaza Kunming City Center (昆明中心皇冠假日酒店). As we had done in Beijing, we decided to elevate our hotel accommodations with a spacious corner suite overlooking the nearby river for ¥845 or about $120. We were overjoyed with the affordability of services in China after being repeatedly shell-shocked on all our past vacation trips. A similar hotel room would be ten or twenty times more expensive in New York City or London. To be fair, hotels and other services are rather expensive in larger Chinese cities like Shanghai and Beijing. But once you get farther off the beaten path the rates tend to dip rather rapidly. The funny thing is that Kunming’s population is about 8.5 million, which is approximately the same as New York City.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Our corner suite at the Crowne Plaza hoten in Kunming, China."&gt;
 &lt;img
 alt="Our corner suite at the Crowne Plaza hoten in Kunming, China."
 title="Our corner suite at the Crowne Plaza hoten in Kunming, China."
 width="1920"
 height="1440"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_405b826f38839f30.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_38ae9308aae19481.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_5bd1e95d8f185d44.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_bc8b99e6696b7ce2.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_10470773717084f9.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_f15fec468474a3f3.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room_hu_21d6cde47c42419c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Our corner suite at the Crowne Plaza hoten in Kunming, China.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;With a glorious ten hours of sleep I felt reborn the next morning. I excitedly watched the sun rise across the city and the waking population begin to crowd the streets. We quickly ate breakfast at the hotel and started our walk to meet up with the rest of the group. Our plan was to start the next stage of travel toward the bride’s home town to begin the wedding celebrations.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A sunrise view from our hotel room in Kunming, China. The fair weather was such a relief after being in Beijing."&gt;
 &lt;img
 alt="A sunrise view from our hotel room in Kunming, China. The fair weather was such a relief after being in Beijing."
 title="A sunrise view from our hotel room in Kunming, China. The fair weather was such a relief after being in Beijing."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_1dc50f5821fe4124.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_db7df2f8fbda3be3.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_d544f743839acb2d.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_7c2adedc89afceca.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_bd5fa5e102a48546.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_fa5af289777b0c6.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/kunming-hotel-room-sunrise_hu_fd5852d153e7cf5b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A sunrise view from our hotel room in Kunming, China. The fair weather was such a relief after being in Beijing.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Ferrying yourself around in a big city in China is much like anywhere else. There exists an Uber-like application called DiDi that is extremely affordable. However, our group’s situation called for many more people and with a much longer distance to cover. The nearby Luliang County was about an hour and a half drive away and we needed several cars to fit everyone and their luggage. The bride to be ended up recruiting several DiDi drivers and negotiated a separate rate based on the fact that they were already heading back to their family after working throughout the week in Kunming. Their extra bonus was us buying them lunch at a famous duck restaurant we were planning on stopping at on the way.&lt;/p&gt;
&lt;p&gt;Strapping luggage to the roof of some cars and Tetris-ing other bags within other cars we eventually got the caravan situated. It was a bit of shame to leave Kunming so quickly because the city seemed so charming with the fair weather and metropolitan feel. As we left the city the car was quiet due to the language barrier. There were only a few in the collective group that were fluent in Chinese and none were in our specific car. I attempted a rudimentary question to the driver with Google Translate: Could you please play your favorite music? He adjusted his radio station and a few seconds later Taylor Swift started playing over the speakers. Everyone in the car had a good laugh and I commented to my wife that no matter where I go on the planet I couldn’t escape Taylor Swift. I’ll never know if that driver was humoring me, the white American, or if he actually was a devout Swiftie.&lt;/p&gt;
&lt;p&gt;We stopped in Yiliang County, which was about halfway to our destination, to have lunch at a regionally famous duck restaurant. Xuecheng Restaurant (学成饭店) supposedly had humble beginnings from a small restaurant but is now a multi-story and multi-building compound that could seat hundreds. The bride to be commented that whenever they drive back home they stop at this restaurant.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The widespread adoption of Lazy Susans for all large dining tables is simply brilliant on the part of Chinese culture. Faces have been pixelated for privacy."&gt;
 &lt;img
 alt="The widespread adoption of Lazy Susans for all large dining tables is simply brilliant on the part of Chinese culture. Faces have been pixelated for privacy."
 title="The widespread adoption of Lazy Susans for all large dining tables is simply brilliant on the part of Chinese culture. Faces have been pixelated for privacy."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_5f705daeae996151.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_27764ac6d7df8974.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_2211b86c8b6975b1.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_a0ba63b09ee5cf60.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_2bd532641b0c8e08.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_8957371388ba9623.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-table_hu_cfd3b5030893d1e.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The widespread adoption of Lazy Susans for all large dining tables is simply brilliant on the part of Chinese culture. Faces have been pixelated for privacy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;We were ushered into a large room and seated at a giant table that had an equally oversized Lazy Susan. After a flurry of ordering in Chinese the dishes started arriving. Their famous roast duck, vegetables of various preparation, squash soups, steaming dumplings, and a multitude of other dishes. Up to this point in the trip there had been a sort of boring average of food dishes that didn’t live up to the exotic stereotypes of Chinese cuisine. In an attempt to push the culinary boundary for myself and the rest of the group I scoured the menu for something more outside the standard Western diet. I was rewarded on a random page, which had a dish that included bamboo larva, adolescent bees, and silk worms. All deep fried. Disregarding wide opposition from the rest of the group we ordered the teenage bee dish, which ended up being rather delicious with the texture and taste of over cooked popcorn.&lt;/p&gt;
&lt;p&gt;Throughout this whole time my wife was admiring the finely crafted menu they had provided. It was a large fabric bound catalog with color images of all the dishes available to order. She mentioned to the bride to be, half joking and fully serious, if we could ask the staff if we could buy one of the menu catalogs. After asking a staff member over I could see the exact second the conversation reached the unusual question. With raised eyebrows and mouth agape the staff person stammered a bit and then went off to get a manager. Once the manager returned the bride to be attempted a spirited negotiation to purchase the catalog but was rebuffed, even at two to three times the expected price. I have no idea what that price range would be but it ended up being more about the staff suspecting us of being rival business spies that would copy elements of their wildly successful restaurant.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The beautiful menu in question. Perhaps we&amp;rsquo;ll convince the staff next time."&gt;
 &lt;img
 alt="The beautiful menu in question. Perhaps we’ll convince the staff next time."
 title="The beautiful menu in question. Perhaps we&amp;rsquo;ll convince the staff next time."
 width="1920"
 height="1440"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_f505beb849bc49b6.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_d8f2f49998b6facd.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_9616f7fd4faa9bb1.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_43eac3b3daa73ffb.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_9ff73f3857662c1a.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_bd5384c08a74dfa1.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/xuecheng-restaurant-menu_hu_c3bfa6f916fb8adc.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The beautiful menu in question. Perhaps we&amp;rsquo;ll convince the staff next time.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Once we were done eating we met up with our DiDi drivers, who were eating at a separate place within the restaurant and started the last half of the drive towards Luliang County. The drive gave a great presentation of the region’s geography and insight into normal travel in rural China. Between Yiliang County and Luliang County there is the Stone Forest National Geological Park (石林风景名胜区). We could see parts of it from the highway but didn’t stop since we had to make it to the family’s house for the ceremonies to start. They were all waiting for the international group to arrive.&lt;/p&gt;
&lt;p&gt;As we drove into Luliang County I could see why the bride to be described it as the countryside. In the comparative context next to Kunming it was incredibly small at only 610,000 people. But this minor city was still larger than my hometown of Salt Lake City in Utah. Furthermore, there were the hallmarks of Chinese civil infrastructure all over with wide highway boulevards, industrial factories, and an energetic commercial downtown.&lt;/p&gt;
&lt;p&gt;Traversing across the bustling heart of the city gave way to agrarian buildings. Thousands of greenhouses for miles in every direction supercharged the growing capabilities for the farmers in the area. It was hardly necessary since the weather was so fair. I had kept my winter coat on hand since we left Beijing but it had been left unworn since arriving in Kunming. A simple shirt and pants were suitable during the daytime. The weather was comparable to something between Los Angeles and San Diego in the winter.&lt;/p&gt;
&lt;p&gt;The local family’s house was on an unmarked narrowly paved road next to a canal. A small neighborhood surrounded by fields and fields of greenhouses. I was sitting in the front passenger seat of the DiDi and was first to spot the celebrating house. Red traditional adornments were plenty to signify the occasion. The most common was the Chinese character for double happiness, 囍. The house itself was busy with people milling about but there was also a pavilion just down the street where there was even more people.&lt;/p&gt;
&lt;p&gt;The DiDi vehicles parked and we began to unload all the luggage while the bride to be’s family welcomed and greeted our group. Since there were only two people in the entire group that understood Mandarin and English our ability to communicate was limited and we all deferred to warm smiles and patience as the relevant information of who was who got translated to either side. As this was happening, I saw the local uncles unfurling a more than fifty-foot red ribbon in the middle of the road. I would find out later it was not actually a ribbon.&lt;/p&gt;
&lt;p&gt;With the pleasantries wrapping up we were shooed about a hundred feet down the street to a neighborhood pavilion where party preparation was ongoing. Our group wasn’t exactly sure what was happening since our designated translators had been occupied elsewhere. With a short walk we arrived to the covered and crowded pavilion. I quickly realized this was the food preparation headquarters because near the front were several low tables displaying the butchered sections of an immensely large pig. However, I would soon learn that the pig had alternative purposes, at least initially. Towards the back of the pavilion I could see people hard at work processing and cooking food. There were giant stands made out of cinderblocks with propane burners firing up impressively large woks and steamers. The scale of preparation was just immense.&lt;/p&gt;
&lt;h2 id="bride-price-聘金"&gt;&lt;a href="#bride-price-%e8%81%98%e9%87%91"&gt;Bride Price (聘金)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;While admiring the industry of food there was a bit of commotion at the pavilion entrance. The uncles were yelling at each other as they circled the tables with the pig. But they weren’t yelling, they were coordinating. With a collective lift, all the tables were hoisted up and started their exit from the pavilion and towards the bride’s house. At the same time rapid gunshots started to ring out at our destination. The red ribbons, which I found out later were several different fifty foot strands, were actually Chinese firecrackers (baozhu 爆竹). As someone who has repeatedly experienced fireworks in the United States I had thought I was prepared for any other country’s flavor of fireworks. But Chinese firecrackers are especially violent and are quite disarming.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A better view of the butchered pig as we left the pavilion. It took three tables and a few baskets to carry all of the dowry items."&gt;
 &lt;img
 alt="A better view of the butchered pig as we left the pavilion. It took three tables and a few baskets to carry all of the dowry items."
 title="A better view of the butchered pig as we left the pavilion. It took three tables and a few baskets to carry all of the dowry items."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_9e864ddd3f5c3543.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_7a373fac8b0c12aa.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_70de245dcd576b80.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_8f4b0e937c01d107.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_3e55fe6b6a80f7ce.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_14cf222a5a1973d7.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-initial_hu_e477608afdada342.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A better view of the butchered pig as we left the pavilion. It took three tables and a few baskets to carry all of the dowry items.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The local family carrying the dowry offering from the pavilion to their house down the street. A few hundred feet of firecrackers were set off to celebrate the groom&amp;rsquo;s arrival. Also notice the aunt in the foreground is carrying ducks and chickens in a basket."&gt;
 &lt;img
 alt="The local family carrying the dowry offering from the pavilion to their house down the street. A few hundred feet of firecrackers were set off to celebrate the groom’s arrival. Also notice the aunt in the foreground is carrying ducks and chickens in a basket."
 title="The local family carrying the dowry offering from the pavilion to their house down the street. A few hundred feet of firecrackers were set off to celebrate the groom&amp;rsquo;s arrival. Also notice the aunt in the foreground is carrying ducks and chickens in a basket."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_75b5d121987bf42a.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_1ad63e18c395eee3.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_777312224f2da8c5.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_b3157fbf2aa2abf8.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_752f848425b2d56e.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_db0f5c5c3c9a1476.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-procession-featured_hu_18a5cde199ba4da0.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The local family carrying the dowry offering from the pavilion to their house down the street. A few hundred feet of firecrackers were set off to celebrate the groom&amp;rsquo;s arrival. Also notice the aunt in the foreground is carrying ducks and chickens in a basket.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The procession reached and entered the bride’s home. People crowded in to watch the ceremony unfold. The tables were placed together on the floor near a small shrine in the living room. I asked the groom what the shrine was about. He explained that it was for the family’s ancestors, which they paid respects to almost daily. He pointed out several cigarettes speared by incense sticks that were burning. These were the favorite cigarettes of the great grandmother, he explained, and that was how they honored her.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The family shrine in their living room with the consolidated bride price gifts as presented to the ancestors for review."&gt;
 &lt;img
 alt="The family shrine in their living room with the consolidated bride price gifts as presented to the ancestors for review."
 title="The family shrine in their living room with the consolidated bride price gifts as presented to the ancestors for review."
 width="1920"
 height="1440"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_3e6b09a256cd5096.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_b527a95a31adb880.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_876cb1b7de9c78ef.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_66e20d6976a334ef.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_3025674ddeedbec0.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_aca960a5104efae3.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-ceremony-shrine_hu_439072e8e11eb6ad.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The family shrine in their living room with the consolidated bride price gifts as presented to the ancestors for review.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;With the tables arranged together in front of the shrine, a ceremony began to unfold. As the family spoke in Mandarin my eyes wandered to the contents of the table, which had items I didn’t notice before. In all fairness to myself, a giant butchered pig is extremely visually distracting. Regardless, I began to identify other neatly arranged items on the tables. There was 24 karat gold jewelry, high end baijiu alcohol, large discs of dry aged pu’er black tea, chickens, ducks, and a very large stack of cash. Prayers written on paper were lit on fire and placed in a metal bin before the family’s shrine. A few more words were spoken and then it was all over. People dispersed and the pig was taken away to be refrigerated.&lt;/p&gt;
&lt;p&gt;The rest of the foreign group and I had so many questions but the bride and groom were busy talking to the future in-laws. Another mini-ceremony of exchanging gifts was taking place, which left the groom with a surprised expression on his face. When he finally came over to the group to explain the events of the past thirty minutes he explained that the bride’s family had just given them a house in the nearby city of Kunming. He further clarified that this was normally a gift provided by the groom or his family but since he was from the United States the local family wanted to provide this key component for them.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A portion of the bride price was given back to the groom as a gift to the couple. In addition, they also were given a house in the nearby large city of Kunming."&gt;
 &lt;img
 alt="A portion of the bride price was given back to the groom as a gift to the couple. In addition, they also were given a house in the nearby large city of Kunming."
 title="A portion of the bride price was given back to the groom as a gift to the couple. In addition, they also were given a house in the nearby large city of Kunming."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_42e6b1ac5d36416f.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_e1db1479df60d909.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_6c5cc35347c3be1c.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_5ce290bc8ae0455a.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_688aa2c7e70b5ba8.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_3bf106b0925650.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/dowry-apartment-gift_hu_29994e5aa11b8aa3.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A portion of the bride price was given back to the groom as a gift to the couple. In addition, they also were given a house in the nearby large city of Kunming.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Further explanation for the rest of the prior ceremony followed. Apparently, the procession towards the bride’s home was the groom’s payment of the bride price (pìn jīn 聘金) in addition to the dowry ceremony (jiàzhuāng 嫁妆).&lt;/p&gt;
&lt;p&gt;The bride price is something traditionally put together by the groom and offered to the bride’s family. The value of this gift expresses the serious intent for marriage and also publicly advertises a certain level of social clout for both the groom and bride’s family to the rest of the community. The bulk of what was presented on the tables was this bride price. In overall value, it equaled to about a mid-five figure amount in United States dollars. This gift is kept by the bride’s family for a period of time, usually a few years, as an insurance policy in case the groom mistreats or divorces the bride. After that time has elapsed without issue, the amount is usually given back to the groom and bride.&lt;/p&gt;
&lt;p&gt;The dowry was also included in this ceremony. In Chinese tradition the bride’s family presents gifts in response to the bride price being paid. In this case, it was a return of a small portion of cash from the bride price and the house in Kunming.&lt;/p&gt;
&lt;p&gt;As the formalities of the day were over the local family invited us to relax in their home for the next few hours while the first evening’s feast was prepared. Some of our group relaxed and took naps on the couch while other, more adventurous members like my wife, went outside to explore the surrounding neighborhood.&lt;/p&gt;
&lt;p&gt;The wedding festivities had attracted kids from the surrounding houses and they were zipping up and down the narrow street on their electric scooters. My wife got the attention of a few kids and convinced them to let her borrow one of them to explore the neighborhood with ease. The endeavor looked fun, but having missed my runs for the past few days, I chose to walk while my wife zoomed through the streets.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A crossroad on my walk through the neighborhood. Luliang County is nestled in a flat valley with some modest mountains to the east."&gt;
 &lt;img
 alt="A crossroad on my walk through the neighborhood. Luliang County is nestled in a flat valley with some modest mountains to the east."
 title="A crossroad on my walk through the neighborhood. Luliang County is nestled in a flat valley with some modest mountains to the east."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_ebc6bc58153c9fcd.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_8cdd9f455c9c1bce.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_94c2fce929b83486.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_712b937e07935cdb.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_f974838fc23f8e60.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_4dd05039da11e773.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-greenhouses_hu_57aa8f08554514f4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A crossroad on my walk through the neighborhood. Luliang County is nestled in a flat valley with some modest mountains to the east.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The surrounding farmland was a collection of lush fields with a variety of crops. For the fields that weren’t covered by greenhouses I could see cabbages, artichokes, and lettuce growing. Many of the homes reminded me of Idaho, in the United States, with a practical and pragmatic approach to fortifying the structure. It was charming and reminded me of my childhood spending time at my Grandmother’s ranch outside Soda Springs, Idaho.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="I cut through the farming plots through this side road. The tricycle in the distance is the older lady I met briefly."&gt;
 &lt;img
 alt="I cut through the farming plots through this side road. The tricycle in the distance is the older lady I met briefly."
 title="I cut through the farming plots through this side road. The tricycle in the distance is the older lady I met briefly."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_f71c157b5c89f07f.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_9e87a673b63da032.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_6922c295c76509e0.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_7c365cad300eba64.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_c50d208b432874f3.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_1fc41aa86b42b5a2.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/luliang-county-walk-grandma_hu_dccd06a8444782ef.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;I cut through the farming plots through this side road. The tricycle in the distance is the older lady I met briefly.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;As I made my walking loop back towards the wedding home I slowly caught up to an older lady biking on a tricycle. Once I got next to her I gave her a hearty nǐ hǎo! (你好) to say hello. She looked at me for a second and then just let out a loud belly laugh and kept laughing as I continued walking past her. Now, you’ll have to take a second to understand the insane context of this situation. Here I am, the only white person in probably a hundred miles in any direction. On top of that, I am walking by myself far away from any tourist or major population center. It would be like seeing an English gentlemen strolling through a cornfield in Nebraska.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The supposedly paltry dinner we were served the first night of wedding celebrations."&gt;
 &lt;img
 alt="The supposedly paltry dinner we were served the first night of wedding celebrations."
 title="The supposedly paltry dinner we were served the first night of wedding celebrations."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_bcae0884bfaad514.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_28375d250974e09f.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_db5f5eda7caaa853.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_aec7271032f1e07c.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_982605d49d47f7c0.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_41f86ac7ebbf776c.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-first-night-feast_hu_7172748a5bd9abb4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The supposedly &lt;em&gt;paltry&lt;/em&gt; dinner we were served the first night of wedding celebrations.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The first dinner feast was starting when I got back from my walk. The bride gave us all a disclaimer that it wasn’t a respectable feast, at least compared to the dinners planned for later. She said this specific meal was meant to be a rather simple one as a reward for the workers who were preparing food over the course of the wedding celebrations. But no one in the foreign group or I could tell this was anything short of decadent. The meal consisted of roast duck, steamed chicken, cabbage stir fry, daikon pork soup, lettuce rice wraps, pork soup, fried peanuts, broccoli stir fry, white rice, braised pork soup, and two kinds of hot sauce. We found out while eating that it is a Chinese cultural necessity to plate a number of unique dishes equal to the number of people sitting at a table plus one. So in our case, we had 8 people at our table and 9 unique dishes.&lt;/p&gt;
&lt;h2 id="ganbei-干杯"&gt;&lt;a href="#ganbei-%e5%b9%b2%e6%9d%af"&gt;Ganbei! (干杯)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;At the conclusion of dinner, the celebration shifted gears from culinary appreciation to aggressive alcoholic debauchery. The local uncles descended on our table carrying blue bottles of báijiǔ (白酒), a ubiquitous Chinese spirit with an alcohol content hovering near 60 percent.&lt;/p&gt;
&lt;p&gt;The bride explained that the uncles wished to toast our arrival and thank us for traveling so far. There was, however, a catch. The majority of our foreign contingent, including the groom’s parents and extended family, did not drink for religious reasons. Looking to us with a mix of hope and apology, the bride asked if my wife and I would serve as tributes in their place. I wanted to be a hero but my wife was more apprehensive. We agreed. Little did I know that saying &amp;ldquo;yes&amp;rdquo; would inaugurate a marathon.&lt;/p&gt;
&lt;p&gt;We received small paper cups filled with the clear liquid. “Ganbei!” (干杯) the uncles yelled. I took a polite sip. It tasted like strong Japanese sake mixed with vodka. The groom noticed my small sip and corrected me, saying that I had to consume the entire cup whenever the toast-giver says ganbei, as it literally translates to &lt;em&gt;dry cup&lt;/em&gt;. Right after finishing the cup an uncle immediately attacked it, refilling to the same point. I could see the momentum for the evening building up quickly and I could only mutter, “dear God” loud enough for my wife to hear as I looked at her with excited apprehension.&lt;/p&gt;
&lt;p&gt;As this was happening the pavilion was reconfigured. Dinner dishes were consolidated and coupled with drinking snacks such as local fruits and peanuts. Boxes of baijiu and Chinese beer were stacked around the tables like a wall of easy access.&lt;/p&gt;
&lt;p&gt;What followed was a pyramid scheme of drinking in a race to intoxication. My wife and I relocated with the groom and bride to a table with the uncles. They invited us to eat snacks while we drank and to pace ourselves. However, this seemed more like a loose recommendation rather than actual practice. What followed was that members of a certain table would travel as a group together to the other tables. Stopping at each one to toast that table and honor them. This process repeated as other tables got up and did their respective rounds to all the other tables. Each cycle splashing more and more baijiu down my throat. The yelling of ganbei was only interrupted by other ganbei’s. In some cases, the uncles were competing with one another by accomplishing certain feats of drinking. One would finish off the last of an entire baijiu bottle and claim the other had to catch up.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A few local uncles playing a drinking game with each other that was a more advanced version of rock, paper, and scissors. There was no shortage of food available to us while playing drinking games and toasting. It would have been very helpful if it weren&amp;rsquo;t for the fact that I was already incredibly full from dinner."&gt;
 &lt;img
 alt="A few local uncles playing a drinking game with each other that was a more advanced version of rock, paper, and scissors. There was no shortage of food available to us while playing drinking games and toasting. It would have been very helpful if it weren’t for the fact that I was already incredibly full from dinner."
 title="A few local uncles playing a drinking game with each other that was a more advanced version of rock, paper, and scissors. There was no shortage of food available to us while playing drinking games and toasting. It would have been very helpful if it weren&amp;rsquo;t for the fact that I was already incredibly full from dinner."
 width="1920"
 height="1440"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_87c61cc662c04976.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_f2c6462dd67955b.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_459d7e57528a2315.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_c81e435191b1e8f6.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_46ba92d05b0cd356.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_7ec8035309f9fdf1.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/drinking-feast-with-snacks_hu_4d7182b04fd0d1a6.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A few local uncles playing a drinking game with each other that was a more advanced version of rock, paper, and scissors. There was no shortage of food available to us while playing drinking games and toasting. It would have been very helpful if it weren&amp;rsquo;t for the fact that I was already incredibly full from dinner.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I had never consumed this much alcohol in my life. I’m normally impacted by alcohol rather rapidly and this was no different. However, on a sustained level I thought I was operating with some functionality. That is, until the uncles noticed I had trouble sitting up at the table. They quickly switched me to light beer and urged me to eat more snacks. The toasting continued with the light beer and it thankfully didn’t hit nearly as hard as the baijiu.&lt;/p&gt;
&lt;p&gt;One thing I did learn from this experience was the social etiquette behind toasting in Chinese culture. Like many things in Asian society, it required you being aware of your age and standing in relation to the person you were toasting with. Based on that dynamic, you would clink your glass together at a lower point if the other person was more senior. This got a bit tricky because the senior person often placed their hand below your cup and would prevent you from going lower. In my intoxicated state I took this cultural norm a step further by going ridiculously lower than the other person’s cup. In some cases, all the way to the ground, which made the bride’s mother laugh on more than one occasion.&lt;/p&gt;
&lt;p&gt;Although it seemed longer, the drinking marathon only lasted about two and half hours after a 5 p.m. dinner. I really appreciated their punctual method since it gave me time to coast off a bit of intoxication prior to bedtime. After drinking in the pavilion we moved back to the house to start singing karaoke. The bulk of songs available in the system were Chinese but there were a few standout hits from the United States, including Celine Dion’s “My Heart Will Go On” and Aqua’s “Barbie Girl.”&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Two of the family uncles enjoying some karaoke. Faces have been pixelated for privacy."&gt;
 &lt;img
 alt="Two of the family uncles enjoying some karaoke. Faces have been pixelated for privacy."
 title="Two of the family uncles enjoying some karaoke. Faces have been pixelated for privacy."
 width="1920"
 height="1440"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_bfc5310239d71829.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_9d3377140aa42a20.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_e17ec390b3d02be4.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_2991dcb871345316.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_18f84418afde1761.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_201118efc09486e6.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/drinking-karaoke_hu_3c7b71490e297ac6.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Two of the family uncles enjoying some karaoke. Faces have been pixelated for privacy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;When the evening finally wrapped up the bride’s local family ferried our group to a local hotel that one of the uncles had rented out for the wedding. It was a few miles away in the downtown area. My wife and I slammed down several bottles of water and some electrolytes before going to bed to stave off a severe hangover in the morning.&lt;/p&gt;
&lt;p&gt;The following day I felt ambitious enough to go on a &lt;a href="https://www.strava.com/activities/10483173083"&gt;8.22-mile jog&lt;/a&gt; along the nearby Nanpan River before our planned late breakfast at a local hot-pot restaurant. To make it back to the area where my hotel was I had to go through an industrial section of the city, which led to many weird looks from the locals. A white man in a fluorescent yellow jacket dodging large transport trucks on a tight road. On the last section of my run before crossing the river I did get a surprising cheer from a local at a farmer’s supply store who yelled out in rather good English, “Good job!”&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="This fish hot-pot meal was a much needed relief from the recent cool weather and to ease the symptons of over-drinking the night prior. Much of southern China does not centrally heat their businesses or homes. There really isn&amp;rsquo;t a need for it as the coldest it gets in the wintertime is easily addressable with a thick coat. So warm meals take on additional importance."&gt;
 &lt;img
 alt="This fish hot-pot meal was a much needed relief from the recent cool weather and to ease the symptons of over-drinking the night prior. Much of southern China does not centrally heat their businesses or homes. There really isn’t a need for it as the coldest it gets in the wintertime is easily addressable with a thick coat. So warm meals take on additional importance."
 title="This fish hot-pot meal was a much needed relief from the recent cool weather and to ease the symptons of over-drinking the night prior. Much of southern China does not centrally heat their businesses or homes. There really isn&amp;rsquo;t a need for it as the coldest it gets in the wintertime is easily addressable with a thick coat. So warm meals take on additional importance."
 width="1920"
 height="1440"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_c10eb52aa1f69fe9.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_c46e3c4a0361eb2.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_f4872f3e5d41265c.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_82ce50c4815ab261.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_6f48704c9a7b7997.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_16869f85ebf9d1af.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/luliang-hot-pot_hu_edc9527da4017103.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;This fish hot-pot meal was a much needed relief from the recent cool weather and to ease the symptons of over-drinking the night prior. Much of southern China does not centrally heat their businesses or homes. There really isn&amp;rsquo;t a need for it as the coldest it gets in the wintertime is easily addressable with a thick coat. So warm meals take on additional importance.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;About an hour later we were sitting at a local fish hot-pot restaurant. It was the most perfect meal since the weather had cooled off dramatically into the 40s Fahrenheit on top of a growing fatigue from the previous evening’s drinking. Perhaps I have overdone it with the longer morning run when I should have rested for recovery. A steamy hot fish soup broth was basically nirvana at that point.&lt;/p&gt;
&lt;p&gt;The rest of the second day held no specific events for the wedding itself. The remaining friends of the groom arrived from Singapore at around dinner time, which we ate at the pavilion near the bride’s home. Towards the end of dinner the uncles wanted to drink again to celebrate the groom’s friends arriving. However, after recounting the story of last night the groom’s friends pleaded to defer any drinking to the next day for the culmination of celebration. I happily joined in this pleading as I was beginning to really feel the impact of the first night’s drinking.&lt;/p&gt;
&lt;h2 id="gatecrash"&gt;&lt;a href="#gatecrash"&gt;Gatecrash&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Early on the third day we began with the wedding gatecrash. The start time for most wedding events are fit to auspicious times as determined from traditional Chinese numerology and astrology. Fortunately for us, this couple’s start time was at a semi-normal 8:30 a.m. but I was told about some couples that had to start at three or four in the morning. Additionally, I refer to this ceremony as &lt;em&gt;gatecrash&lt;/em&gt; because of the groom’s Singaporean heritage. In mainland China, however, it is colloquially known as jiēqīn yóuxì (接亲游戏), or &lt;em&gt;games to receive the groom&lt;/em&gt;, and sometimes dǔmén yóuxì (堵门游戏), &lt;em&gt;games to block the door&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Because the groom was American and lacked a local home, the logistics of the ceremony were adapted. Instead of the traditional procession from the groom’s house to the bride’s house, the family stationed the bride at the rented hotel downtown. This would allow the ceremony to conclude at her family&amp;rsquo;s home.&lt;/p&gt;
&lt;p&gt;The gatecrashing began with the groom’s entourage storming the hotel. Upon reaching the entrance, they hit a wall of the bride&amp;rsquo;s male relatives. Pleading was useless and moved no one. This is a boisterous and loud affair. The only language understood here was the red envelope. The groomsmen slid envelopes containing small amounts of yuan to the guards until the human barricade dissolved enough for them to pass by. The friction set the tone for the rest of the games as a gauntlet for the groom to prove his dedication and love for the bride.&lt;/p&gt;
&lt;p&gt;On the third floor, the bridesmaids launched their first volley. They presented a napkin marked with five distinct lipstick prints taped to the door. The groom’s task was to identify his bride’s lips.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The groom evaluating the five different lipstick marks."&gt;
 &lt;img
 alt="The groom evaluating the five different lipstick marks."
 title="The groom evaluating the five different lipstick marks."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_5b28545c65a01359.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_3ea2085f5784455d.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_5fadf8a2721a0e55.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_837783dfc5a72ad5.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_2fd46e5e8ffa2235.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_a40a3b61b97c2444.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-lipstick-identification_hu_53985651b8bb120d.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The groom evaluating the five different lipstick marks.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Even after solving the puzzle, the door remained shut. The bridesmaids demanded a toll. Only after sliding a thicker stack of red envelopes under the door did the barrier finally open. We crammed into the hotel room to spectate. The bride sat quietly on the bed in her striking red wedding dress, while her bridesmaids acted as generals conducting a grand defense. They sternly and loudly present the terms to the groom and the groomsmen.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The groom passing red packets underneath the door as payment to the bridesmaids. They kept insisting for more and more before they would open the door."&gt;
 &lt;img
 alt="The groom passing red packets underneath the door as payment to the bridesmaids. They kept insisting for more and more before they would open the door."
 title="The groom passing red packets underneath the door as payment to the bridesmaids. They kept insisting for more and more before they would open the door."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_3f0c81a18cbc272f.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_6f10b8f99688b800.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_be7f074c37e8ec5d.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_941b73bc3f219ae3.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_d289ad8443effb1c.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_b3fbba4367318743.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-red-packet-bribery_hu_2f3640d66eefadff.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The groom passing red packets underneath the door as payment to the bridesmaids. They kept insisting for more and more before they would open the door.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The first battery was trivia. &lt;em&gt;What was the exact date of their first date? What is her favorite tea shop in Kunming? How many text messages did you send her last month?&lt;/em&gt; The groom knew some but others required frantic investigating on his phone. When he faltered, the bridesmaids demanded immediate financial penalties with additional red envelopes.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The bride in her wedding dress while her bridesmaids vet the groom and groomsmen. Her face has been pixelated for privacy."&gt;
 &lt;img
 alt="The bride in her wedding dress while her bridesmaids vet the groom and groomsmen. Her face has been pixelated for privacy."
 title="The bride in her wedding dress while her bridesmaids vet the groom and groomsmen. Her face has been pixelated for privacy."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_b57ce3a643440518.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_bf91f539cdc8ee3b.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_83be00806c2fdc1.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_74381cfd0a3f486.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_7b50cde814fbd372.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_3329bd1eb5590cc0.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-bride_hu_c1827b9776525ba8.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The bride in her wedding dress while her bridesmaids vet the groom and groomsmen. Her face has been pixelated for privacy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Next, the groomsmen had to craft a message of love using only their teeth. They were given slices of white bread and sixty seconds to nibble each piece into legible characters. They opted for English to keep it simple, producing an unoriginal &amp;ldquo;I LOVE U.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;The final challenge tested agility. The bridesmaids plastered the suited groomsmen with sticky notes, then gave them one minute to shake them off without using their hands. The room erupted in laughter as the men gyrated and jiggled to dislodge the paper. Despite some questionable tactics to beat the clock, the bridesmaids mercifully accepted the victory. The groom then swept the bride into his arms, carrying her out of the hotel to head for the tea ceremony. With the conclusion of the games the bride was carried by the groom out of the room and out of the hotel. Their next destination was the local family home to take pictures and lastly, perform the tea ceremony.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Sticky notes being placed on the groomsmen prior to the challenge. They had to get all of them off without using their hands or arms. The groomsmen narrowly met their deadline."&gt;
 &lt;img
 alt="Sticky notes being placed on the groomsmen prior to the challenge. They had to get all of them off without using their hands or arms. The groomsmen narrowly met their deadline."
 title="Sticky notes being placed on the groomsmen prior to the challenge. They had to get all of them off without using their hands or arms. The groomsmen narrowly met their deadline."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_e6326231823c5eec.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_dea3e73da621f55.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_69757ba487395cf6.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_eb04df2ba37c6f02.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_85247d552162198c.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_642245b3d5641d59.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/gatecrash-sticky-notes_hu_a19fd593fca725f9.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Sticky notes being placed on the groomsmen prior to the challenge. They had to get all of them off without using their hands or arms. The groomsmen narrowly met their deadline.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Ferrying a large amount of people from the hotel back to the family’s home took some time even with the recruitment of a few additional DiDi drivers. My wife was finally successful in getting a DiDi driver arranged through WeChat. She had spent the past few days incorporating her credit card and passport into the gauntlet of WeChat but had to deal with additional scrutiny because she was foreign. But at least we now had a tiny bit more autonomy to move around by calling whichever DiDi ride was needed.&lt;/p&gt;
&lt;h2 id="tea-ceremony"&gt;&lt;a href="#tea-ceremony"&gt;Tea Ceremony&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;After some wedding pictures the family started setting up for the tea ceremony (jìng chá 敬茶). A velvety red cushion placed on the floor in front of two chairs in the middle of the room. It would be the last and probably most endearing ceremony that highlights the structure of filial piety in Chinese culture. The process basically has the bride and groom offering tea to their family elders and are in turn bestowed with gifts and well wishes. Yet the ceremony defines the actual emotional precipice where the couple is married. The amount of tears and sniffling was certainly a testament to that realization for me and other foreigners. Almost as if the previous ceremonies and celebrations were just a lot of fun the family was having together but now it was a serious culmination to the entire wedding.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A member of the family drinking tea as offered by the groom. Faces have been pixelated for privacy."&gt;
 &lt;img
 alt="A member of the family drinking tea as offered by the groom. Faces have been pixelated for privacy."
 title="A member of the family drinking tea as offered by the groom. Faces have been pixelated for privacy."
 width="1920"
 height="1275"srcset="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_3bab1000c3fd492e.webp 480w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_d30978ffd46e4496.webp 768w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_986f9ecce97b0902.webp 1024w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_15fb6c593d459fba.webp 1366w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_e88c1133d0f03e0e.webp 1600w, https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_dbd63c36963adeb6.webp 1920w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/a-traditional-wedding-in-china/wedding-tea-ceremony_hu_6cd5e4a935ead415.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A member of the family drinking tea as offered by the groom. Faces have been pixelated for privacy.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;At first, it was the oldest family elders. The bride and groom presented tea to them and said a few formal words, which responded to by the elders and a gift. This was usually a red envelope but also included some openly displayed gifts, 24-karat gold jewelry, or stacks of yuan bills wrapped in red ribbon. Then came the turn of the parents. This was challenging for a few of them. The bride was oldest and the parents had no practice giving away their children to a new life. Lastly came aunts and uncles and then important relations to the family.&lt;/p&gt;
&lt;p&gt;I was part of that last category. It was a good venue to formally inaugurate my wife’s and my entrance into their social hierarchy. Although our gifts to the couple were standard, cash and a 24-karat gold bracelet, we possessed an unexpected advantage: my ethnicity. Another element of all these ceremonies is that they take place in public and rely on generating clout for both the bride and also the groom’s family. Everyone can see the thickness of the red envelopes given by each guest. They can also see how many items of 24-karat gold are on the tray when gifted to the bride. These are sometimes referred to as mianzi (面子) and or lian (臉) with the loose English connotation of &lt;em&gt;saving face&lt;/em&gt;. Another ingredient in this formula was how many foreigners traveled across the world to attend a wedding. Wow, you must be so important and loved! Thus, for the first time in my life, my skin color was used to increase the social standing of a few people.&lt;/p&gt;
&lt;p&gt;I received some coaching prior to taking a seat in front of the couple. I was instructed to say &lt;em&gt;chá shì tián de&lt;/em&gt; (茶是甜的) after receiving the cup of tea from the bride. This approximately translates to saying that the tea is sweet. I received the cup. I drank a bit. I struggled to say the phrase since I was so nervous. There were a few giggles from the gathered family and perhaps I said something ridiculous or sounded like Brad Pitt in &lt;em&gt;Inglourious Basterds&lt;/em&gt; but at least my part in the ceremony was over.&lt;/p&gt;
&lt;p&gt;A grand feast started after the tea ceremony where the level of fanciness had increased quite a bit. Now the tables were covered in a nicer red synthetic fabric rather than plastic. The cups were red and gold while the main courses were meant to showcase all of the hard work of the event staff preparing dishes over the past several days.&lt;/p&gt;
&lt;p&gt;With the new foreign arrivals from Singapore, the local uncles had another group to focus on for celebratory drinking games. There was another pyramid cycle of Ganbei! shots as groups toasted to different tables. It wasn’t quite the level of debauchery as the first evening but there were still several casualties. A few people from the Singapore group threw up from the amount of drinking and thereafter hid away in a bedroom upstairs to avoid the pressure from the local uncles. We didn’t stay up terribly late into the evening. In part because the hard drinking tapered off at around 7:30 p.m. and also because we’d be moving on to Lijiang early the next day.&lt;/p&gt;</description></item><item><title>Riding the World's Longest High-Speed Train Line</title><link>https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/</link><pubDate>Mon, 01 Jan 2024 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/</guid><description>&lt;p&gt;&lt;figure aria-label="Watching the entire country of China zoom by my window at 350 km/h. These high rises in Wuhan were impressive."&gt;
 &lt;img
 alt="Watching the entire country of China zoom by my window at 350 km/h. These high rises in Wuhan were impressive."
 title="Watching the entire country of China zoom by my window at 350 km/h. These high rises in Wuhan were impressive."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/view-from-high-speed-beijing-to-kunming-train-featured_hu_e902feb7a9a9c7c0.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/view-from-high-speed-beijing-to-kunming-train-featured_hu_6f4feadab9b8ad92.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/view-from-high-speed-beijing-to-kunming-train-featured_hu_bfcadd67300b1491.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/view-from-high-speed-beijing-to-kunming-train-featured_hu_3df5324570b6b891.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/view-from-high-speed-beijing-to-kunming-train-featured_hu_3a2aeb39843e5515.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/view-from-high-speed-beijing-to-kunming-train-featured_hu_c9a3bf3385a54e4c.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Watching the entire country of China zoom by my window at 350 km/h. These high rises in Wuhan were impressive.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;A frequent oversight foreign travelers make is underestimating the size of a country they are visiting. I once overheard travel plans from tourists visiting the American West that involved visiting the Grand Canyon, Las Vegas, and Los Angeles confined to the space of 2 days with a car as transportation. For those unfamiliar with the area, this is insanity. I respect the ambition and ruthless efficiency that would fit as much sight-seeing as possible in a travel itinerary both limited by time and money. But this aggressively paced eyeballing gets away from the point of leisure travel and succumbs to the existential drive of &lt;a href="https://www.merriam-webster.com/dictionary/FOMO"&gt;FOMO&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Is there a way to balance a relaxed vacation and sight-seeing together? I arrogantly thought it would be possible when my wife and I decided to book a trip on the longest bullet train line in the world. The 2,760 kilometer Beijing-Kunming high-speed train line (京昆高速动车组列车) is the longest&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; of China&amp;rsquo;s vast network of high-speed rail. For a loose baseline, in my home country of the United States, it has 735 kilometers of high-speed train lines in operation and another 275 under construction. Comparatively, China has built 40,474 kilometers&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; and has another 13,063 under construction.&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; China is rapidly out pacing all other nations in the world for high-speed train line infrastructure.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Map of high speed train lines in China from the 2023 High-Speed Rail Atlas drafted by the International Union of Railways."&gt;
 &lt;img
 alt="Map of high speed train lines in China from the 2023 High-Speed Rail Atlas drafted by the International Union of Railways."
 title="Map of high speed train lines in China from the 2023 High-Speed Rail Atlas drafted by the International Union of Railways."
 width="1535"
 height="1275"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/high-speed-train-lines-in-china_hu_67307a78cfc269a.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/high-speed-train-lines-in-china_hu_a9c7ae867a72f1dc.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/high-speed-train-lines-in-china_hu_9213c430d0af7afa.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/high-speed-train-lines-in-china_hu_5dd4e20e53273a3a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/high-speed-train-lines-in-china_hu_271c2b04ac853717.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Map of high speed train lines in China from the 2023 High-Speed Rail Atlas drafted by the International Union of Railways.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;There was a simple requirement to get from Beijing to Kunming in the span of a day. The easiest method would have been a commercial flight lasting about 3 hours and 45 minutes. While quick and easy, we would get a limited and abstractly distant view of China&amp;rsquo;s heartland. Further down the trade-off scale was the high-speed train. It would be zipping along on the ground at 350km/h but would provide a somewhat closer view along the several thousand kilometer route.&lt;/p&gt;
&lt;p&gt;Two nights before departing we purchased our first class tickets for approximately ¥1,911 ($273). There were business seats available but at double the price of first class, it made little trade-off sense. In retrospect, it would have been worth it because each seat was an enclosed pod with a lay flat feature. That feature would have been invaluable later after I became progressively sicker.&lt;/p&gt;
&lt;h2 id="early-start"&gt;&lt;a href="#early-start"&gt;Early Start&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The day began brutally early at 04:15 to get packed before leaving the hotel at 05:10. Everything was done in a bleary haze as a consequence of staying up the night before for New Year&amp;rsquo;s Eve and fresh jet lag. Arriving at the Beijing West railway station (北京西站) at around 05:35 left us with time to find our platform and look around the station.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Arriving at the Beijing West Railway Station at 5:40 AM."&gt;
 &lt;img
 alt="Arriving at the Beijing West Railway Station at 5:40 AM."
 title="Arriving at the Beijing West Railway Station at 5:40 AM."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/beijing-west-railway-station_hu_f0761f18c6f852d.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/beijing-west-railway-station_hu_b366d91135ae335f.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/beijing-west-railway-station_hu_96ea213d6d488a97.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/beijing-west-railway-station_hu_669a4c782a378749.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/beijing-west-railway-station_hu_a82761bd5efb9d3c.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/beijing-west-railway-station_hu_fda9f26d2b0f6423.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Arriving at the Beijing West Railway Station at 5:40 AM.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Our first stop was to speak with an employee about getting our reserved seats placed together. Booking 2 nights prior had given no options for selecting our seats and they were instead assign on check-in. For much of the journey this wouldn&amp;rsquo;t have been a problem since people trading assigned seats in order to sit together was common.&lt;/p&gt;
&lt;p&gt;The last task we wanted to accomplish before boarding was getting hot coffee. While we had been able to gather enough food and snacks for our trip the night before, the frozen haze outside and fresh jet lag required an antidote. But paying for it was tricky.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A cup of coffee in a bag is pretty unbalanced but keeps the inevitable travel spill from happening."&gt;
 &lt;img
 alt="A cup of coffee in a bag is pretty unbalanced but keeps the inevitable travel spill from happening."
 title="A cup of coffee in a bag is pretty unbalanced but keeps the inevitable travel spill from happening."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wechat-pay-coffee-in-beijing_hu_f7e0e0f62071ec96.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wechat-pay-coffee-in-beijing_hu_84d31fb889f60cb9.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wechat-pay-coffee-in-beijing_hu_27343f3ada60c8c5.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wechat-pay-coffee-in-beijing_hu_42fc16b4ef6276a6.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wechat-pay-coffee-in-beijing_hu_481cb8f8a24a5f46.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wechat-pay-coffee-in-beijing_hu_65c1dc7befc7887c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A cup of coffee in a bag is pretty unbalanced but keeps the inevitable travel spill from happening.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;A thing to note for buying things in China is that it always requires WeChat Pay or Alipay.&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; My wife had anticipated this and was on the last steps of finally getting WeChat Pay working. After a few more submissions to WeChat support it started working and we frantically rushed to buy coffee before our 07:00 departure.&lt;/p&gt;
&lt;p&gt;Rolling out of the Beijing West railway station was smooth and dark at 07:05. The sun hadn&amp;rsquo;t risen yet and the glare of the interior cabin lights prevented a lot of visibility. But in a city as large as Beijing there were a variety of lit buildings to see on the way out.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Example seating from First Class. Business class was about double the price but had lay flat enclosed pods."&gt;
 &lt;img
 alt="Example seating from First Class. Business class was about double the price but had lay flat enclosed pods."
 title="Example seating from First Class. Business class was about double the price but had lay flat enclosed pods."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/first-class-seating-near-beijing_hu_e4dd1b784697b734.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/first-class-seating-near-beijing_hu_fdc32a2c259a0c59.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/first-class-seating-near-beijing_hu_20d0caf5df221244.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/first-class-seating-near-beijing_hu_b71e1ac616a0ff69.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/first-class-seating-near-beijing_hu_12852c957144bb91.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/first-class-seating-near-beijing_hu_c15a1f20dad55637.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Example seating from First Class. Business class was about double the price but had lay flat enclosed pods.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;From about 07:30 to 10:00 was the best part of the train ride. Not due to anything about the train, geography, or weather. But because the flu or cold I didn&amp;rsquo;t know I had started fiercely and promptly at 10:00. You&amp;rsquo;ll then have to forgive me for a front loaded account of the train route since the last half was exclusively a useless attempt at miserable sleep.&lt;/p&gt;
&lt;h2 id="cell-towers"&gt;&lt;a href="#cell-towers"&gt;Cell Towers&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;There was a frozen winter haze lingering as we left metropolitan Beijing. With the rising sun to the east it made for an ethereal view of the transitioning landscape. By the time things were visible we were in an area with clusters of houses surrounded by farm land. The rapid change from a nation&amp;rsquo;s capital to rural agrarian fields was jarring. But after watching the landscape zoom by I noticed technology was keeping up with us. At any given time there were about 3 to 5 cell towers visible along the train route spread out across the empty fields.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="It is common for trains in China to have hot water dispensers for making hot tea or instant noodles. I saw several people wandering around with stacks of instant noodles looking for the train car with the dispenser."&gt;
 &lt;img
 alt="It is common for trains in China to have hot water dispensers for making hot tea or instant noodles. I saw several people wandering around with stacks of instant noodles looking for the train car with the dispenser."
 title="It is common for trains in China to have hot water dispensers for making hot tea or instant noodles. I saw several people wandering around with stacks of instant noodles looking for the train car with the dispenser."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/noodles-on-the-train_hu_38a8bb2ed214b373.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/noodles-on-the-train_hu_673fc1b660ff6fad.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/noodles-on-the-train_hu_4942f82573ac4656.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/noodles-on-the-train_hu_ecdc19dfee155a93.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/noodles-on-the-train_hu_1535a68c19e44eae.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/noodles-on-the-train_hu_4fb942b763f019bf.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;It is common for trains in China to have hot water dispensers for making hot tea or instant noodles. I saw several people wandering around with stacks of instant noodles looking for the train car with the dispenser.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I had noticed the benefits of this infrastructure in Beijing. 5G reception had been solid while at any train station, airport, or other popular area. I noticed a local we were traveling with hadn&amp;rsquo;t hesitated to make several calls while underground in the Beijing metro. But in all these urban situations the 5G antennas are better blended into the environment. You can&amp;rsquo;t hide much in an empty field.&lt;/p&gt;
&lt;p&gt;This is another area of infrastructure China has been intensely investing in over the past few years. From April to June in 2023 there were 600,000 5G base stations built, bringing the nation&amp;rsquo;s total to 3 million.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; The rapid build out is meant to provide the foundation for adding $290 billion to the Chinese economy by 2030.&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The proliferation of these cell towers kept up along the entire route. Wi-Fi was available from the train but it would drop in and out periodically. After about 30 minutes of trying to use it I turned it off and stayed on the rock solid 5G. Even as we dove into underground tunnels last for several minutes the 5G connection never dropped.&lt;/p&gt;
&lt;h2 id="empty-high-rises"&gt;&lt;a href="#empty-high-rises"&gt;Empty High-Rises&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Another landscape feature I noticed as we progressed across China was the distribution of high density residential buildings. I’ve played my share of &lt;em&gt;Sim City&lt;/em&gt; and &lt;em&gt;Cities: Skylines&lt;/em&gt; and I know you can’t go straight to high-rises for residential housing. You first require a suburban sprawl until demand gets high enough to transition to denser buildings. What I saw instead from the train was isolated groups of 3-5 high-rise buildings surrounded by miles and miles of empty farm land.&lt;/p&gt;
&lt;p&gt;If a comparable number of residents were housed in the United States they would be spread out in single family homes and encompass the entirety of the surrounding square mileage. While the advantages and disadvantages of either setup are the concern of civil engineering post-doctoral researches, I found the different approach fascinating.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Wuhan from the train station."&gt;
 &lt;img
 alt="Wuhan from the train station."
 title="Wuhan from the train station."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wuhan-station-from-the-train_hu_f51377f056eae3d6.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wuhan-station-from-the-train_hu_6af1835b637701.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wuhan-station-from-the-train_hu_44924abadde12374.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wuhan-station-from-the-train_hu_edeebf97db0b6f7f.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wuhan-station-from-the-train_hu_672d4d3c3dc39b3e.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/wuhan-station-from-the-train_hu_35a45ae94ae74370.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Wuhan from the train station.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Many of these high-rises showed signs of being inhabited but occasionally there were a few that were objectively empty or unfinished. The presence of laundry, decorations, chairs, or other items on balconies isn’t the most scientific method to determine total occupancy. But it’s something. However, in many cases, the buildings were bare skeletons and lay unfinished. Sure, construction might have been ongoing, yet the lack of activity and the fatigued age of concrete is recognizable if you’re close enough.&lt;/p&gt;
&lt;p&gt;Subsequent reading about these empty buildings showed that China’s real-estate sector has been contracting after years of aggressive growth. Real-estate accounts for 29% of the country’s total GDP but 20% of total urban housing properties (65 million) were vacant in 2021.&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; The National Bureau of Statistics shared a more modest value of 7.2 million in 2023 but coupled it with a rare public critique stating there weren’t enough people in China to fill them all.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;This staggering amount of vacant properties will be a huge drag on the future growth of the Chinese economy. But certain people have rapidly adapted to the economic reality. Farmers near Shenyang have re-purposed a nearby abandoned neighborhood of palatial homes. They started plowing land between homes for crops with other areas setup as livestock corrals and formerly empty garages are now used for hay storage.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;h2 id="tunnels-in-the-south"&gt;&lt;a href="#tunnels-in-the-south"&gt;Tunnels in the South&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The geography was flat from Beijing to Wuhan with the occasional cropping of gentle hills. As we dove southward the terrain became much more rugged. Subsequently, the duration of tunnels began to extend longer and longer with diminishing views above ground. In many cases, the duration exceeded several minutes with a brief flash above ground before going into another round of darkness. The tunnels are pragmatic but frustrating. To keep the trajectory of a high-speed train you need to adapt construction to the harsh accommodations of the terrain. Blasting through hills and mountains to maintain a smooth and comfortable 300km/h.&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="As the train ride progressed into the late afternoon and evening it created a bronze sheen to the entire southern region. Combined with the hills, clearer air, and vibrant vegetation it was entirely unfair to frozen Beijing."&gt;
 &lt;img
 alt="As the train ride progressed into the late afternoon and evening it created a bronze sheen to the entire southern region. Combined with the hills, clearer air, and vibrant vegetation it was entirely unfair to frozen Beijing."
 title="As the train ride progressed into the late afternoon and evening it created a bronze sheen to the entire southern region. Combined with the hills, clearer air, and vibrant vegetation it was entirely unfair to frozen Beijing."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/scenery-from-the-train-in-the-south_hu_4aa8c209b10086fc.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/scenery-from-the-train-in-the-south_hu_83ef8e97d0d2600.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/scenery-from-the-train-in-the-south_hu_8dca2cf8edd61447.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/scenery-from-the-train-in-the-south_hu_d4f8ea33709f42f2.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/scenery-from-the-train-in-the-south_hu_1ca2ade62cab69f3.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/scenery-from-the-train-in-the-south_hu_f0c8ec1a247c9c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;As the train ride progressed into the late afternoon and evening it created a bronze sheen to the entire southern region. Combined with the hills, clearer air, and vibrant vegetation it was entirely unfair to frozen Beijing.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The frustrating part is the chronic air pressure adjustment for passengers. As we entered and left each tunnel the air pressure would change enough to be uncomfortable. Similar to how you would experience taking off or landing in a commercial airline. However, with a marathon of tunnels it quickly became fatiguing and made me realize my oncoming sickness was sinus related. I struggled to keep a consistent air pressure equilibrium for my ears with the rapid entry and exit from the endless tunnels. This made the last third of the train line the most uncomfortable and battered me into attempting to nap for the rest of the ride.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Your fearless author, defeated."&gt;
 &lt;img
 alt="Your fearless author, defeated."
 title="Your fearless author, defeated."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/sick-and-tired-of-this-train-ride_hu_2f8bec8109108a29.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/sick-and-tired-of-this-train-ride_hu_c1b9503c5863a9bd.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/sick-and-tired-of-this-train-ride_hu_60c452ac65fe0f66.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/sick-and-tired-of-this-train-ride_hu_d28dff9c7e2a72.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/sick-and-tired-of-this-train-ride_hu_94a253755851e605.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/sick-and-tired-of-this-train-ride_hu_494aa10b911ec488.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Your fearless author, defeated.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Missing out on the last section of the train line was a shame but there is a limit to how much you can power through illness. The setting sun combined with the impressive mountains and hills covered in solar panels was a step up from the flat emptiness of the northern portion of the train line.&lt;/p&gt;
&lt;p&gt;We arrived in Kunming at approximately 18:30, making the trip about 11 hours and 25 minutes long. To get to our final destination we had to take another 35 minute regional train ride to downtown Kunming.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Sunrise from our hotel balcony in Kunming the following morning. The moderate temperature in the south was a welcome change from frosty Beijing."&gt;
 &lt;img
 alt="Sunrise from our hotel balcony in Kunming the following morning. The moderate temperature in the south was a welcome change from frosty Beijing."
 title="Sunrise from our hotel balcony in Kunming the following morning. The moderate temperature in the south was a welcome change from frosty Beijing."
 width="1600"
 height="1063"srcset="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/kunming-the-following-morning_hu_73a644378cdaf384.webp 480w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/kunming-the-following-morning_hu_2689b84f22fd02c6.webp 768w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/kunming-the-following-morning_hu_698ead9060aa869d.webp 1024w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/kunming-the-following-morning_hu_cc95efe0598ef7d0.webp 1366w, https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/kunming-the-following-morning_hu_c8cd1158c76ae589.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/riding-the-worlds-longest-high-speed-train-line/kunming-the-following-morning_hu_8ac922313e5d74f0.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Sunrise from our hotel balcony in Kunming the following morning. The moderate temperature in the south was a welcome change from frosty Beijing.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;While my experience was flawed by getting progressively sicker during the trip I would wholeheartedly recommend experiencing the currently longest high-speed train line yourself. Zooming across the entirety of a nation from the comfort of a big chair is as amazing as flying. It would be helpful to be more responsible and get a good night’s rest before setting out on the journey. Despite being miserable for the last part of the trip I thoroughly enjoyed seeing everything across China. From the changing terrain to the variety of people at each station getting off and on it was a rewarding exposure. While not as intimate as walking the full 2,760 kilometers, it got us from Beijing to Kunming in a day.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Press Trust of India, “China Launches Longest Bullet Train,” &lt;em&gt;The Economic Times&lt;/em&gt;, January 5, 2017, &lt;a href="https://economictimes.indiatimes.com/news/international/business/china-launches-longest-bullet-train/articleshow/56359517.cms"&gt;https://economictimes.indiatimes.com/news/international/business/china-launches-longest-bullet-train/articleshow/56359517.cms&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Ali Ahmed, “20 Countries with Largest High Speed Rail Network,” &lt;em&gt;Yahoo Finance&lt;/em&gt;, September 6, 2023, &lt;a href="https://finance.yahoo.com/news/20-countries-largest-high-speed-205613438.html"&gt;https://finance.yahoo.com/news/20-countries-largest-high-speed-205613438.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;International Union of Railways, “High-Speed Rail Atlas 2023,” &lt;a href="https://uic.org/"&gt;https://uic.org/&lt;/a&gt;, December 2023, &lt;a href="https://uic.org/IMG/pdf/atlas_uic_2023.pdf"&gt;https://uic.org/IMG/pdf/atlas_uic_2023.pdf&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Shira Ovide, “Don’t Even Try Paying Cash in China,” &lt;em&gt;The New York Times&lt;/em&gt;, January 28, 2021, &lt;a href="https://www.nytimes.com/2020/10/27/technology/alipay-china.html"&gt;https://www.nytimes.com/2020/10/27/technology/alipay-china.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Stephen Chen, “China Built More 5G Base Stations in 3 Months Than US Did in 2 Years,” &lt;em&gt;South China Morning Post&lt;/em&gt;, July 20, 2023, &lt;a href="https://www.scmp.com/news/china/science/article/3228259/china-built-more-5g-base-stations-3-months-us-did-2-years"&gt;https://www.scmp.com/news/china/science/article/3228259/china-built-more-5g-base-stations-3-months-us-did-2-years&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Juan Pedro Tomás, “China Ends Q1 With 2.64 Million 5G Base Stations,” &lt;em&gt;RCR Wireless News&lt;/em&gt;, April 24, 2023, &lt;a href="https://www.rcrwireless.com/20230424/5g/china-ends-q1-2-million-5g-base-stations"&gt;https://www.rcrwireless.com/20230424/5g/china-ends-q1-2-million-5g-base-stations&lt;/a&gt;.‌&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Rupendra Brahambhatt, “The Story of China’s Ghost Cities and Its 65 Million Empty Homes,” &lt;em&gt;Interesting Engineering&lt;/em&gt;, October 29, 2021, &lt;a href="https://interestingengineering.com/culture/chinas-ghost-cities-and-its-65-million-empty-homes"&gt;https://interestingengineering.com/culture/chinas-ghost-cities-and-its-65-million-empty-homes&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Albee Zhang and Ryan Woo, “Even China’s 1.4 Billion Population Can’t Fill All Its Vacant Homes, Former Official Says,” &lt;em&gt;Reuters&lt;/em&gt;, September 24, 2023, &lt;a href="https://www.reuters.com/world/china/even-chinas-14-bln-population-cant-fill-all-its-vacant-homes-former-official-2023-09-23/"&gt;https://www.reuters.com/world/china/even-chinas-14-bln-population-cant-fill-all-its-vacant-homes-former-official-2023-09-23/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Katherine McLaughlin, “See Inside a Ghost Town of Abandoned Mansions in China,” &lt;em&gt;Architectural Digest&lt;/em&gt;, August 1, 2023, &lt;a href="https://www.architecturaldigest.com/story/see-inside-a-ghost-town-of-abandoned-mansions-in-china"&gt;https://www.architecturaldigest.com/story/see-inside-a-ghost-town-of-abandoned-mansions-in-china&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;The Beijing-Kunming high-speed line travels at 350 km/h between Beijing and Wuhan but slows down to 300km/h from Wuhan to Kunming. Likely due to the demanding geography.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Learning After 2,255 Miles</title><link>https://rb.ax/blog/learning-after-2255-miles/</link><pubDate>Sun, 31 Dec 2023 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/learning-after-2255-miles/</guid><description>&lt;p&gt;&lt;figure aria-label="A beautiful 10.84 mile run in the early morning outside of Sun Valley, Idaho. I was camping in a valley to the north of Ketchum. It was rather cold in the early morning despite being August."&gt;
 &lt;img
 alt="A beautiful 10.84 mile run in the early morning outside of Sun Valley, Idaho. I was camping in a valley to the north of Ketchum. It was rather cold in the early morning despite being August."
 title="A beautiful 10.84 mile run in the early morning outside of Sun Valley, Idaho. I was camping in a valley to the north of Ketchum. It was rather cold in the early morning despite being August."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/sun-valley-idaho-featured_hu_75eec62dabe39c08.webp 480w, https://rb.ax/blog/learning-after-2255-miles/sun-valley-idaho-featured_hu_48a164e95efe9d6b.webp 768w, https://rb.ax/blog/learning-after-2255-miles/sun-valley-idaho-featured_hu_f45bfb53d5b2956a.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/sun-valley-idaho-featured_hu_3250eea5565cfa3b.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/sun-valley-idaho-featured_hu_b3aef6458df83e6f.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/sun-valley-idaho-featured_hu_5d9aa3ea9064cf3a.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;A beautiful &lt;a href="https://www.strava.com/activities/9654685593"&gt;10.84 mile run&lt;/a&gt; in the early morning outside of Sun Valley, Idaho. I was camping in a valley to the north of Ketchum. It was rather cold in the early morning despite being August.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;In 2023, I ran a total of 2,255 miles with a cumulative 147,877 feet of elevation gain. This was similar to the 2,165 miles and 181,394 feet of elevation gain in 2022.&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th style="text-align: left"&gt;Month&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Distance (miles)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Elevation (feet)&lt;/th&gt;
 &lt;th style="text-align: center"&gt;Time&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;January&lt;/td&gt;
 &lt;td style="text-align: center"&gt;185&lt;/td&gt;
 &lt;td style="text-align: center"&gt;8,232&lt;/td&gt;
 &lt;td style="text-align: center"&gt;33h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;February&lt;/td&gt;
 &lt;td style="text-align: center"&gt;157&lt;/td&gt;
 &lt;td style="text-align: center"&gt;7,694&lt;/td&gt;
 &lt;td style="text-align: center"&gt;29h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;March&lt;/td&gt;
 &lt;td style="text-align: center"&gt;174&lt;/td&gt;
 &lt;td style="text-align: center"&gt;6,991&lt;/td&gt;
 &lt;td style="text-align: center"&gt;34h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;April&lt;/td&gt;
 &lt;td style="text-align: center"&gt;175&lt;/td&gt;
 &lt;td style="text-align: center"&gt;7,900&lt;/td&gt;
 &lt;td style="text-align: center"&gt;33h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;May&lt;/td&gt;
 &lt;td style="text-align: center"&gt;193&lt;/td&gt;
 &lt;td style="text-align: center"&gt;11,121&lt;/td&gt;
 &lt;td style="text-align: center"&gt;36h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;June&lt;/td&gt;
 &lt;td style="text-align: center"&gt;190&lt;/td&gt;
 &lt;td style="text-align: center"&gt;10,912&lt;/td&gt;
 &lt;td style="text-align: center"&gt;35h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;July&lt;/td&gt;
 &lt;td style="text-align: center"&gt;235&lt;/td&gt;
 &lt;td style="text-align: center"&gt;27,031&lt;/td&gt;
 &lt;td style="text-align: center"&gt;51h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;August&lt;/td&gt;
 &lt;td style="text-align: center"&gt;238&lt;/td&gt;
 &lt;td style="text-align: center"&gt;24,196&lt;/td&gt;
 &lt;td style="text-align: center"&gt;46h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;September&lt;/td&gt;
 &lt;td style="text-align: center"&gt;167&lt;/td&gt;
 &lt;td style="text-align: center"&gt;9,843&lt;/td&gt;
 &lt;td style="text-align: center"&gt;33h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;October&lt;/td&gt;
 &lt;td style="text-align: center"&gt;199&lt;/td&gt;
 &lt;td style="text-align: center"&gt;15,322&lt;/td&gt;
 &lt;td style="text-align: center"&gt;38h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;November&lt;/td&gt;
 &lt;td style="text-align: center"&gt;197&lt;/td&gt;
 &lt;td style="text-align: center"&gt;10,564&lt;/td&gt;
 &lt;td style="text-align: center"&gt;78h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td style="text-align: left"&gt;December&lt;/td&gt;
 &lt;td style="text-align: center"&gt;141&lt;/td&gt;
 &lt;td style="text-align: center"&gt;8,071&lt;/td&gt;
 &lt;td style="text-align: center"&gt;31h&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Reaching my annual goal of 2,000 miles has been rewarding specifically towards solidifying a habit of daily running. This is because reaching such an absurd number of miles can only be achieved through consistent effort. You can’t really binge run that many miles in the last few months of the calendar year without injury.&lt;/p&gt;
&lt;p&gt;In the years prior to 2022 I approaching running sporadically and inconsistently. The only effort I put in was near the build up before big races. This isn’t particularly helpful to building a strong running foundation. I found the results of those 12 or 16 week programs helpful in finishing several challenging 50K races but it was exactly that, just finishing. I didn’t feel strong and had to push hard to complete. I was really just surviving and never reached the thriving stage.&lt;/p&gt;
&lt;p&gt;However, with the consistent running regime I have been doing for the past 2 years it has filled the weak gaps in my strength and endurance. With a baseline of about 40-45 miles per week I can safely and most importantly, casually approach longer runs when the opportunity presents itself. For instance, it is very rewarding being able to tour a travel destinations over the course of 10 to 15 miles. You get to see a lot compared to the casual strolling you normally do as a tourist.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The last run of the year circled the Forbidden City in Beijing for 9.55 miles. Most of the run was normal but when trying to head back to my hotel I foolishly looped around the entire perimeter of a major government compound. There were armed military and police patrols everywhere and it was a slog getting through eight security checkpoints in the space of a few miles. I only found out later this was Zhongnanhai (中南海) that houses the leadership of the Chinese Communist Party and the State Council. I&amp;rsquo;m definitely on some watch list."&gt;
 &lt;img
 alt="The last run of the year circled the Forbidden City in Beijing for 9.55 miles. Most of the run was normal but when trying to head back to my hotel I foolishly looped around the entire perimeter of a major government compound. There were armed military and police patrols everywhere and it was a slog getting through eight security checkpoints in the space of a few miles. I only found out later this was Zhongnanhai (中南海) that houses the leadership of the Chinese Communist Party and the State Council. I’m definitely on some watch list."
 title="The last run of the year circled the Forbidden City in Beijing for 9.55 miles. Most of the run was normal but when trying to head back to my hotel I foolishly looped around the entire perimeter of a major government compound. There were armed military and police patrols everywhere and it was a slog getting through eight security checkpoints in the space of a few miles. I only found out later this was Zhongnanhai (中南海) that houses the leadership of the Chinese Communist Party and the State Council. I&amp;rsquo;m definitely on some watch list."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/beijing-forbidden-city_hu_ea545f83d623aa24.webp 480w, https://rb.ax/blog/learning-after-2255-miles/beijing-forbidden-city_hu_c4d694da30e7bf0b.webp 768w, https://rb.ax/blog/learning-after-2255-miles/beijing-forbidden-city_hu_9d2623f79330aa85.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/beijing-forbidden-city_hu_ff68e1bb633fe319.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/beijing-forbidden-city_hu_47869ff06a03cba8.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/beijing-forbidden-city_hu_7885639999d40f97.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The last run of the year circled the Forbidden City in Beijing for &lt;a href="https://www.strava.com/activities/10465112884"&gt;9.55 miles&lt;/a&gt;. Most of the run was normal but when trying to head back to my hotel I foolishly looped around the entire perimeter of a major government compound. There were armed military and police patrols everywhere and it was a slog getting through eight security checkpoints in the space of a few miles. I only found out later this was Zhongnanhai (中南海) that &lt;a href="https://en.wikipedia.org/wiki/Zhongnanhai"&gt;houses the leadership&lt;/a&gt; of the Chinese Communist Party and the State Council. I&amp;rsquo;m definitely on some watch list.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h2 id="myrtl-routine"&gt;&lt;a href="#myrtl-routine"&gt;Myrtl Routine&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;While my running has been consistent, I do peak up in volume during the late summer when the weather is best. My average monthly mileage peaks consistently in July and August. Unfortunately, or fortunately, these peaks forcibly reveal weaknesses in my overall fitness. Mainly from the point that when you are running for several hours you tend to over work certain muscles while neglecting others. To perform at the highest levels of running injury free, a certain level of supporting exercises are needed. And I always neglect these essential exercises. This has manifested as &lt;em&gt;patellofemoral pain syndrome&lt;/em&gt; (PFP syndrome) and &lt;em&gt;iliotibial band syndrome&lt;/em&gt; (ITB syndrome) on more than several occasions from 2022 to late 2023.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The pinnacle run of the year. While I only enjoyed this beautiful area for 13.18 miles I still think about it regularly. This was up Grandjean along Baron Creek in central Idaho. The Sawtooth Wilderness area is so remote you have to fill out a backcountry permit, even for day trips."&gt;
 &lt;img
 alt="The pinnacle run of the year. While I only enjoyed this beautiful area for 13.18 miles I still think about it regularly. This was up Grandjean along Baron Creek in central Idaho. The Sawtooth Wilderness area is so remote you have to fill out a backcountry permit, even for day trips."
 title="The pinnacle run of the year. While I only enjoyed this beautiful area for 13.18 miles I still think about it regularly. This was up Grandjean along Baron Creek in central Idaho. The Sawtooth Wilderness area is so remote you have to fill out a backcountry permit, even for day trips."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/grandjean-via-baron-creek_hu_532f90a1d6961949.webp 480w, https://rb.ax/blog/learning-after-2255-miles/grandjean-via-baron-creek_hu_fd2820576c9ddf26.webp 768w, https://rb.ax/blog/learning-after-2255-miles/grandjean-via-baron-creek_hu_adbe24eac3db096a.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/grandjean-via-baron-creek_hu_833542dbd55674b.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/grandjean-via-baron-creek_hu_da12c1d70c86198d.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/grandjean-via-baron-creek_hu_294405b4d3557cd0.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The pinnacle run of the year. While I only enjoyed this beautiful area for &lt;a href="https://www.strava.com/activities/9681213986"&gt;13.18 miles&lt;/a&gt; I still think about it regularly. This was up Grandjean along Baron Creek in central Idaho. The Sawtooth Wilderness area is so remote you have to fill out a backcountry permit, even for day trips.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Yet, in both years I didn’t learn my lesson and neglected the appropriate supplemental exercises until I couldn’t walk due to the pain from runner’s knee. But the protagonist here does eventually learn his lesson. After the idiotic failure of late 2023 I set out to find the best supporting exercise that was simple to remember and implement after every run. This led me to the &lt;em&gt;Myrtle Routine&lt;/em&gt;, which I have been performing religiously after each of my runs since September 2023.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A great example of using running to assist with efficient exploration of northern London on a short but productive 5.58 mile run along Regent&amp;rsquo;s Canal Towpath and Regent&amp;rsquo;s Park. There were still many tourists around but a lot less than the hoardes next to Parliament."&gt;
 &lt;img
 alt="A great example of using running to assist with efficient exploration of northern London on a short but productive 5.58 mile run along Regent’s Canal Towpath and Regent’s Park. There were still many tourists around but a lot less than the hoardes next to Parliament."
 title="A great example of using running to assist with efficient exploration of northern London on a short but productive 5.58 mile run along Regent&amp;rsquo;s Canal Towpath and Regent&amp;rsquo;s Park. There were still many tourists around but a lot less than the hoardes next to Parliament."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/regents-canal-towpath_hu_d4bdb7640c37697.webp 480w, https://rb.ax/blog/learning-after-2255-miles/regents-canal-towpath_hu_7c116663749ce22d.webp 768w, https://rb.ax/blog/learning-after-2255-miles/regents-canal-towpath_hu_81678c869892c07.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/regents-canal-towpath_hu_aa41912fa5ba5526.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/regents-canal-towpath_hu_49cb02bd200d7693.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/regents-canal-towpath_hu_f4f585caf7d50ecd.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A great example of using running to assist with efficient exploration of northern London on a short but productive &lt;a href="https://www.strava.com/activities/10294226680"&gt;5.58 mile run&lt;/a&gt; along Regent&amp;rsquo;s Canal Towpath and Regent&amp;rsquo;s Park. There were still many tourists around but a lot less than the hoardes next to Parliament.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The routine was developed by coach &lt;a href="https://www.coachjayjohnson.com/"&gt;Jay Johnson&lt;/a&gt; and involves several movements outside of normal running. The goal is to equalize the asymmetrical strength in your hips, butt, and supporting muscles. The routine can be done in a few minutes after my run, making it hard for my brain to provide any rational excuse to skip it. The supporting movements summarize to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clams&lt;/li&gt;
&lt;li&gt;Lateral Leg Raise&lt;/li&gt;
&lt;li&gt;Donkey Kicks&lt;/li&gt;
&lt;li&gt;Donkey Whips&lt;/li&gt;
&lt;li&gt;Fire Hydrant&lt;/li&gt;
&lt;li&gt;Knee Circle, Forward&lt;/li&gt;
&lt;li&gt;Knee Circle, Backward&lt;/li&gt;
&lt;li&gt;Hurdle Trail Leg, Forward&lt;/li&gt;
&lt;li&gt;Hurdle Trail Leg, Backward&lt;/li&gt;
&lt;li&gt;Lateral Leg Swing&lt;/li&gt;
&lt;li&gt;Linear Leg Swing&lt;/li&gt;
&lt;li&gt;Linear Leg Swing, Bent Knee&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The quantity of each movement varies from around 5 to 10 depending on my weekly mileage, impatience, and leg fatigue. As my legs get tired from a high mileage or significant elevation gain week I correspondingly increase the Myrtl repetitions for a semblance of load equivalency. My logic follows if I am stressing my muscles used by normal running movement I also need to equally stress these other supporting muscles.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Out with my dogs in the foothills of the mountains above where I live in Utah. They really enjoy being out in the soft winter snow and I try to always get out after a fresh storm."&gt;
 &lt;img
 alt="Out with my dogs in the foothills of the mountains above where I live in Utah. They really enjoy being out in the soft winter snow and I try to always get out after a fresh storm."
 title="Out with my dogs in the foothills of the mountains above where I live in Utah. They really enjoy being out in the soft winter snow and I try to always get out after a fresh storm."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/learning-after-2255-miles/davis-creek-trail-utah_hu_46e242079da3eb3b.webp 480w, https://rb.ax/blog/learning-after-2255-miles/davis-creek-trail-utah_hu_aaee1bf94aa02290.webp 768w, https://rb.ax/blog/learning-after-2255-miles/davis-creek-trail-utah_hu_af64b5de60a0d970.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/davis-creek-trail-utah_hu_b55b296ba2b0ff69.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/davis-creek-trail-utah_hu_b155518df16ee2c5.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/davis-creek-trail-utah_hu_8c2fdc822a8309ae.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Out with my dogs in the foothills of the mountains above where I live in Utah. They really enjoy being out in the soft winter snow and I try to always get out after a fresh storm.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I have saved a few bookmarks for the Myrtl routine to easily reference, including a PDF from &lt;em&gt;&lt;a href="https://steelcityendurance.com/wp-content/uploads/2015/12/myrtl_routine.pdf"&gt;Steel City Endurance&lt;/a&gt;&lt;/em&gt; that is easy to keep available on my phone. A more hands on demonstration video from &lt;em&gt;&lt;a href="https://www.runnersworld.com/video/a20783755/the-myrtl-routine/"&gt;Runner’s World&lt;/a&gt;&lt;/em&gt; or &lt;em&gt;&lt;a href="https://www.runnerspace.com/video.php?video_id=8190"&gt;Runner Space&lt;/a&gt;&lt;/em&gt; is helpful to get a reminder of the correct form for each movement.&lt;/p&gt;
&lt;h2 id="swap-plans"&gt;&lt;a href="#swap-plans"&gt;SWAP Plans&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;With my fitness baseline solidified from running consistently I can approach intermediate and advanced training plans with more confidence. I have tried a few different ones over the years and all have their specific uses for achieving goals of distance, terrain, or time. My interest in trail running has been surprisingly consistent over the past few years and in turn I need plans that can adequately prepare me for a lot of elevation gain.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A buffet of parks in London over 8.12 miles in late November. After leaving my hotel I went through St. Jame&amp;rsquo;s Park, Green Park, Hyde Park, Kensington Gardens, The Rose Garden, and a final bit through the Buckingham Palace Garden. Where ever I go, I seem to be drawn to a wealth of green nature."&gt;
 &lt;img
 alt="A buffet of parks in London over 8.12 miles in late November. After leaving my hotel I went through St. Jame’s Park, Green Park, Hyde Park, Kensington Gardens, The Rose Garden, and a final bit through the Buckingham Palace Garden. Where ever I go, I seem to be drawn to a wealth of green nature."
 title="A buffet of parks in London over 8.12 miles in late November. After leaving my hotel I went through St. Jame&amp;rsquo;s Park, Green Park, Hyde Park, Kensington Gardens, The Rose Garden, and a final bit through the Buckingham Palace Garden. Where ever I go, I seem to be drawn to a wealth of green nature."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/hyde-park-london_hu_ff1d5b8bdcb06f71.webp 480w, https://rb.ax/blog/learning-after-2255-miles/hyde-park-london_hu_a63f9d6151b85ef6.webp 768w, https://rb.ax/blog/learning-after-2255-miles/hyde-park-london_hu_c8a1d508996dd9aa.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/hyde-park-london_hu_77b398b8a6cf9c82.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/hyde-park-london_hu_3ce00759d67c9692.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/hyde-park-london_hu_ad97430d134ab13.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A buffet of parks in London over &lt;a href="https://www.strava.com/activities/10289225986"&gt;8.12 miles&lt;/a&gt; in late November. After leaving my hotel I went through St. Jame&amp;rsquo;s Park, Green Park, Hyde Park, Kensington Gardens, The Rose Garden, and a final bit through the Buckingham Palace Garden. Where ever I go, I seem to be drawn to a wealth of green nature.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The &lt;a href="https://www.trailrunnermag.com/training/training-plans-training/an-advanced-50-mile-training-plan/"&gt;50&lt;/a&gt; and &lt;a href="https://www.trailrunnermag.com/training/trail-tips-training/you-can-run-100-miles"&gt;100&lt;/a&gt; mile plans from David and Megan Roche’s &lt;em&gt;&lt;a href="https://swaprunning.com/training-plans"&gt;Some Work All Play&lt;/a&gt;&lt;/em&gt; (SWAP) team fulfills this requirement perfectly. These plans have a natural approach to working in methods that build elevation stamina. They also provide a level of mileage and effort flexibility that gives me the ability to adjust my training exertion depending on that particular cycle. During some training cycles I am putting in a tremendous amount of training effort to show up the younger runners in my family. But other times I approach the cycle more passively to maintain fitness.&lt;/p&gt;
&lt;h2 id="mountain-legs"&gt;&lt;a href="#mountain-legs"&gt;Mountain Legs&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The most beneficial element of the SWAP training plans are the elevation oriented strength training exercises. They vary from what are called &lt;em&gt;&lt;a href="https://www.trailrunnermag.com/training/trail-tips-training/3-minute-mountain-legs/"&gt;Mountain Legs&lt;/a&gt;&lt;/em&gt; and &lt;em&gt;&lt;a href="https://www.trailrunnermag.com/training/trail-tips-training/8-minute-speed-legs/"&gt;Speed Legs&lt;/a&gt;&lt;/em&gt; depending on the training schedule. For &lt;em&gt;Mountain Legs&lt;/em&gt; it would call for 20 to 50 repetitions of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Single-Leg Rear Lunge&lt;/li&gt;
&lt;li&gt;Single-Leg Step-Ups&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure aria-label="Fresh out of winter prison I tried my best enjoy a nice long 10.01 mile run at Strawberry Reservoir in Utah until a thunderstorm brought me back to the reality of early spring. Even though it was late May there was still snow in the foothills and the trees were just barely budding."&gt;
 &lt;img
 alt="Fresh out of winter prison I tried my best enjoy a nice long 10.01 mile run at Strawberry Reservoir in Utah until a thunderstorm brought me back to the reality of early spring. Even though it was late May there was still snow in the foothills and the trees were just barely budding."
 title="Fresh out of winter prison I tried my best enjoy a nice long 10.01 mile run at Strawberry Reservoir in Utah until a thunderstorm brought me back to the reality of early spring. Even though it was late May there was still snow in the foothills and the trees were just barely budding."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/strawberry-reservoir_hu_c191d235e6678071.webp 480w, https://rb.ax/blog/learning-after-2255-miles/strawberry-reservoir_hu_6f16a92624035299.webp 768w, https://rb.ax/blog/learning-after-2255-miles/strawberry-reservoir_hu_f0a10bdecce2087e.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/strawberry-reservoir_hu_4a95112add83e363.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/strawberry-reservoir_hu_9121a6261225fd39.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/strawberry-reservoir_hu_958f009bc37399f4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Fresh out of winter prison I tried my best enjoy a nice long &lt;a href="https://www.strava.com/activities/9159414941"&gt;10.01 mile run&lt;/a&gt; at Strawberry Reservoir in Utah until a thunderstorm brought me back to the reality of early spring. Even though it was late May there was still snow in the foothills and the trees were just barely budding.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;And then for &lt;em&gt;Speed Legs&lt;/em&gt; you’d do 10 to 20 of the following except double for the single-leg step-ups:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Alternating rear lunges on each leg&lt;/li&gt;
&lt;li&gt;Bulgarian split squats on each leg&lt;/li&gt;
&lt;li&gt;Single leg Romanian deadlifts&lt;/li&gt;
&lt;li&gt;Goblet squats&lt;/li&gt;
&lt;li&gt;Single-leg step-ups&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;figure aria-label="I snapped one of my carbon fiber Black Diamond trekking poles on this 18.19 mile run in the middle of July. It had a good long life. It will be missed."&gt;
 &lt;img
 alt="I snapped one of my carbon fiber Black Diamond trekking poles on this 18.19 mile run in the middle of July. It had a good long life. It will be missed."
 title="I snapped one of my carbon fiber Black Diamond trekking poles on this 18.19 mile run in the middle of July. It had a good long life. It will be missed."
 width="1600"
 height="1200"srcset="https://rb.ax/blog/learning-after-2255-miles/old-aqueduct-trail-farmington_hu_3f73f1435e79f2b5.webp 480w, https://rb.ax/blog/learning-after-2255-miles/old-aqueduct-trail-farmington_hu_3a7beb757449d7f6.webp 768w, https://rb.ax/blog/learning-after-2255-miles/old-aqueduct-trail-farmington_hu_9279458417dbe251.webp 1024w, https://rb.ax/blog/learning-after-2255-miles/old-aqueduct-trail-farmington_hu_c07f4a8d741ac6fb.webp 1366w, https://rb.ax/blog/learning-after-2255-miles/old-aqueduct-trail-farmington_hu_8d784d238fed7bda.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/learning-after-2255-miles/old-aqueduct-trail-farmington_hu_8be74abf3a39ffb8.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;I snapped one of my carbon fiber Black Diamond trekking poles on this &lt;a href="https://www.strava.com/activities/9463909129"&gt;18.19 mile&lt;/a&gt; run in the middle of July. It had a good long life. It will be missed.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;While this steady increase in training acumen over the years has been personally rewarding I am not anywhere closer to becoming competitive. I still trudge along on flat roads at about 8 to 10 minutes per mile and frequently do haggard death marches up the steep hills on my long runs. But the foundation I have been building has been greatly minimizing the discomfort and pain of those situations. Enjoyment and challenge have replaced misery and struggle.&lt;/p&gt;</description></item><item><title>How to Setup Dynamic DNS with Cloudflare and Edgemax</title><link>https://rb.ax/blog/how-to-setup-dynamic-dns-with-cloudflare-and-edgemax/</link><pubDate>Tue, 21 Nov 2023 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/how-to-setup-dynamic-dns-with-cloudflare-and-edgemax/</guid><description>&lt;p&gt;I&amp;rsquo;m a big proponent of building a home network of whatever size or complexity. For technical and non-technical people it can help you understand the fundamentals of how the internet works. One small part of those fundamentals is giving yourself the ability to connect to your house from anywhere in the world. You can do that with a public IP address but what happens when your modem reboots and that IP address changes?&lt;/p&gt;
&lt;p&gt;This is where a tool like Dynamic DNS can be very helpful. On top of an easier to remember DNS hostname it also automatically updates itself to whatever new public IP address you get. There are a lot of different ways to use Dynamic DNS. However, for my own setup, I have my domain hosted with Cloudflare and my hardware is a Ubiquiti Networks EdgeMax EdgeRouter Pro running EdgeOS &lt;code&gt;v2.0.9-hotfix.7&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;The steps for setting this up are outlined in the &lt;a href="https://help.ui.com/hc/en-us/articles/204976324-EdgeMAX-Custom-Dynamic-DNS-with-Cloudflare"&gt;UniFi Help Center&lt;/a&gt;. But further context is needed in many cases.&lt;/p&gt;
&lt;p&gt;Once connected to your router, enter configuration mode with &lt;code&gt;configure&lt;/code&gt; and apply the dynamic DNS hostname. Specify the appropriate interface that has the public IP address. In my case it was &lt;code&gt;eth1&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;set service dns dynamic interface eth1 service custom-cloudflare host-name subdomain.domain.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Specify the credentials used by the Edgerouter to connect to Cloudflare&amp;rsquo;s API. The &lt;code&gt;login&lt;/code&gt; parameter is the email address used to access the Cloudflare dashboard. The &lt;code&gt;password&lt;/code&gt; value is the &lt;em&gt;Global API Key&lt;/em&gt; found on the &lt;a href="https://dash.cloudflare.com/profile/api-tokens"&gt;API Tokens page&lt;/a&gt; under &lt;em&gt;My Profile&lt;/em&gt;.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;set service dns dynamic interface eth1 service custom-cloudflare login ryan@ryan.com
set service dns dynamic interface eth1 service custom-cloudflare password xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Specify the protocol the Edgerouter will be using in order to format messages correctly.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;set service dns dynamic interface eth1 service custom-cloudflare protocol cloudflare
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Define a domain for the Cloudflare zone. If using &lt;code&gt;subdomain.domain.com&lt;/code&gt; this would be &lt;code&gt;domain.com&lt;/code&gt;.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;set service dns dynamic interface eth1 service custom-cloudflare options zone=domain.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Before committing and saving this new configuration make sure the necessary &lt;code&gt;A&lt;/code&gt; record on the Cloudflare portal have been added. This DNS record would have the type of &lt;code&gt;A&lt;/code&gt; and the name would be &lt;code&gt;subdomain&lt;/code&gt; and the content doesn&amp;rsquo;t necessarily matter but I put a private IP address to avoid any conflicts. The value will just get automatically updated later anyway. Additionally, the proxy status should be &lt;code&gt;DNS only&lt;/code&gt; with an &lt;code&gt;Auto&lt;/code&gt; TTL. The changes can then be committed and saved to the configuration.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;commit
save
exit
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;If everything is working you will see the &lt;code&gt;A&lt;/code&gt; record IP address update itself after a few minutes. Further verification can be obtained from the Edgerouter, which will share the status and latest timestamp.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;ryan@router:~$ show dns dynamic status
interface : eth1
ip address : x.x.x.x
host-name : subdomain.domain.com
last update : Tue Nov 21 12:36:03 2023
update-status: good
&lt;/code&gt;&lt;/pre&gt;</description></item><item><title>The Product You Bought is Not the Product You Own</title><link>https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/</link><pubDate>Mon, 13 Nov 2023 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/</guid><description>&lt;p&gt;&lt;figure aria-label="Rosie the Robot cleaning the house"&gt;
 &lt;img
 alt="Rosie the Robot cleaning the house"
 title="Rosie the Robot cleaning the house"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/Rosie_cleaning_Jetsons-featured_hu_1742261e2677e3df.webp 480w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/Rosie_cleaning_Jetsons-featured_hu_77f3a587754107.webp 768w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/Rosie_cleaning_Jetsons-featured_hu_acadafd9294c5186.webp 1024w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/Rosie_cleaning_Jetsons-featured_hu_23eebae474c4534b.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/Rosie_cleaning_Jetsons-featured_hu_164cb9f2ecce7d82.jpg"loading="eager"
 decoding="sync"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Imagine yourself living in some Jetsons technological utopia. You go down to the robot store and buy the latest &lt;a href="https://www.home-assistant.io/"&gt;helper model&lt;/a&gt;. Of the many benefits listed, one is to make your home life easier. Anything from opening the door when you get home, making you delicious meals, keeping the house clean, walking the dog, and everything else that would establish domestic tranquility.&lt;/p&gt;
&lt;p&gt;Several blissful years later, a &lt;a href="https://chamberlaingroup.com/press/a-message-about-our-decision-to-prevent-unauthorized-usage-of-myq"&gt;message arrives&lt;/a&gt; from the door company (Chamberlain Group). You find that odd because you’ve had no issues with this door and your robot helper opening it for you. In the message, the company shares that there are dangerous and nefarious robots that &lt;em&gt;might&lt;/em&gt; make your door not as secure as you think. &lt;a href="https://cultural-phenomenons.fandom.com/wiki/Danger,_Will_Robinson"&gt;Danger, Will Robinson&lt;/a&gt;! The only fix, the company states, is by using their own secure robot (MyQ) that can open and close your door for you. The risk of using your own robot is simply too high!&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Cat burglar from the Jetsons"&gt;
 &lt;img
 alt="Cat burglar from the Jetsons"
 title="Cat burglar from the Jetsons"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/cat_burglar_hu_33fa850ef456ce16.webp 480w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/cat_burglar_hu_4de95ea77553f7e5.webp 768w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/cat_burglar_hu_5defcaa952637e51.webp 1024w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/cat_burglar_hu_ebc3bb6e5886509e.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/cat_burglar_hu_505a2d25cc4eee36.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After reading this message you glance suspiciously at your trusty robot helper. What is it hiding? Has it been the one stealing your socks to sell on the black market? Relieved that the door company cares so much about improving their product, you wait a few days for the new robot to arrive.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Miss Gamma"&gt;
 &lt;img
 alt="Miss Gamma"
 title="Miss Gamma"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/miss_gamma_hu_f2902815fa77758e.webp 480w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/miss_gamma_hu_8b319774c2ac542d.webp 768w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/miss_gamma_hu_34ebf7cefdad8070.webp 1024w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/miss_gamma_hu_b8d3b72977dabe0e.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/miss_gamma_hu_d2c969af60092560.jpg"decoding="async"
 loading="lazy"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Unpacking the new robot leads to a bit of a surprise. The model is several versions old and its torso has been replaced with a screen. Booting it up and configuring it isn&amp;rsquo;t too much of a hassle. You scoot the robot to be near the door so it can perform its intended duties.&lt;/p&gt;
&lt;p&gt;You soon realize why the screen is there.&lt;/p&gt;
&lt;p&gt;Whenever you get near your front door the robot’s screen brightens showing an image:&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Amazon Key In-Garage Delivery partnership with Chamberlain Group&amp;rsquo;s MyQ"&gt;
 &lt;img
 alt="Amazon Key In-Garage Delivery partnership with Chamberlain Group’s MyQ"
 title="Amazon Key In-Garage Delivery partnership with Chamberlain Group&amp;rsquo;s MyQ"
 width="1179"
 height="1274"srcset="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/amazon-key-advertisement_hu_bb61119b1d43b272.webp 480w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/amazon-key-advertisement_hu_9c003950f9f46586.webp 768w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/amazon-key-advertisement_hu_4a3266aacb622a2d.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/amazon-key-advertisement_hu_255e901897d0361c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Amazon Key In-Garage Delivery partnership with Chamberlain Group&amp;rsquo;s MyQ&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;You try to scroll across the screen in order to hide the advertisement but it just shows another. The next advertisement is for the latest sleek flying car. It also has a new secure robot from the door company.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Honda&amp;rsquo;s in-vehicle garage door control with Chamberlain Group&amp;rsquo;s MyQ"&gt;
 &lt;img
 alt="Honda’s in-vehicle garage door control with Chamberlain Group’s MyQ"
 title="Honda&amp;rsquo;s in-vehicle garage door control with Chamberlain Group&amp;rsquo;s MyQ"
 width="1179"
 height="1265"srcset="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/honda-myq-advertisement_hu_84263088d6d44917.webp 480w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/honda-myq-advertisement_hu_2e5211136d8efe5b.webp 768w, https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/honda-myq-advertisement_hu_42a2828bae04ce0b.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-product-you-bought-is-not-the-product-you-own/honda-myq-advertisement_hu_9c6cb1d8c7ecd9f5.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Honda&amp;rsquo;s in-vehicle garage door control with Chamberlain Group&amp;rsquo;s MyQ&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Frustrated, you begin to doubt the intentions of the door company. Your original helper robot didn’t have a screen. It was able to do everything you asked of it without shoving an advertisement in your face. Maybe the robot helper company has something to say about this?&lt;/p&gt;
&lt;p&gt;Shuffling through old messages you find it. A saddened statement from the robot helper company (Home Assistant). “&lt;a href="https://www.home-assistant.io/blog/2023/11/06/removal-of-myq-integration/"&gt;We regret to inform you that the door company has blocked us from using our lineup of robots on your door&lt;/a&gt;”. The truth starts to become a bit more complicated with this additional perspective.&lt;/p&gt;
&lt;p&gt;Behind this message is another, an invitation to the public technology forum &lt;a href="https://news.ycombinator.com/item?id=38188162"&gt;discussing this very situation&lt;/a&gt;! While there are many opinions and facts offered it seems the majority have stripped the door company’s security claim for brazen market consolidation. Regardless, you really just want to be able to open and close your door without having to look at an advertisement.&lt;/p&gt;
&lt;p&gt;Reading farther into the public discussion you spot someone’s solution to the problem. A simple gadget called &lt;a href="https://paulwieland.github.io/ratgdo/"&gt;ratgdo&lt;/a&gt; that attaches to your door, which allows your trusty old helper robot to open and close the door as much as you please. All while not having to look at the advertisement riddled screen of the door company robot!&lt;/p&gt;</description></item><item><title>Xfinity's 10G is Deceptive Marketing</title><link>https://rb.ax/blog/xfinitys-10g-is-deceptive-marketing/</link><pubDate>Sat, 17 Jun 2023 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/xfinitys-10g-is-deceptive-marketing/</guid><description>&lt;p&gt;Super Bowl LVII had a 60 second commercial that tried to dupe the American public. Xfinity marketing their new 10G service along with the achievement of getting a man on the moon was a pairing that wouldn&amp;rsquo;t be missed by anyone. Somehow we had skipped from 5G past 6G, 7G, 8G, and even 9G! What an engineering feat to be praised along with the moon landing. Their arrogant marketing slogan stated, &amp;ldquo;The next generation 10G network. Only from Xfinity. One giant leap for mankind.&amp;rdquo;&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;Yet, the reality of Xfinity&amp;rsquo;s 10G service is a lot more depressingly complicated. The G after the 10 might lead you to believe it is twice as good as your phone&amp;rsquo;s 5G but it isn&amp;rsquo;t even related to cellular connectivity. Also, it isn&amp;rsquo;t another common networking term used to denote gigabit connections. This begs the question, what on earth is 10G even supposed to mean? Did the cable industry just pull a term out of thin air? Well, yes.&lt;/p&gt;
&lt;p&gt;Per Xfinity, &amp;ldquo;The Xfinity 10G Network is the new brand for our next-generation network.&amp;rdquo;&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; Additionally, the R&amp;amp;D lab of the cable industry, CableLabs, simply calls it a &amp;ldquo;combination of technologies.&amp;rdquo;&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; The most exciting admission of absolute vagueness is when Xfinity describes that, &amp;ldquo;all our internet plans are powered by the Xfinity 10G Network.&amp;rdquo;&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; So you could have a 1G home internet plan packaged with a 5G phone all on Xfinity&amp;rsquo;s 10G network. Yet each of these three G&amp;rsquo;s refer to different things. Their marketing team couldn&amp;rsquo;t have chosen a more confusing term to dub their new next-generation network.&lt;/p&gt;
&lt;p&gt;Telecommunication companies frequently play fast and loose by blending marketing terms with technical specifications. It is to be expected in order to derive quick and snappy terms that the consumer can readily understand, even if abstractly. What sounds better? An excerpt from the Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications-2020 (IMT-2020)&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; or using phrases like &amp;ldquo;&lt;a href="https://www.t-mobile.com/coverage/4g-lte-5g-networks"&gt;mobile gaming at a new level&lt;/a&gt;,&amp;rdquo; or &amp;ldquo;&lt;a href="https://www.verizon.com/5g/"&gt;get a movie in minutes or a song in seconds&lt;/a&gt;&amp;rdquo;? Other examples might include marketing the new 5G cellular network when 4G was commonplace. A normal consumer doesn&amp;rsquo;t need to know exactly how much faster 5G is compared to 4G but at the very least they know it is better.&lt;/p&gt;
&lt;p&gt;Nothing is awry with this practice. It helps translate in real terms what a consumer can expect after paying for a service without requiring a Ph.D. in electrical engineering. The average person does not need or care to know the technical specifications of how modern telecommunication infrastructure works. Just like with many other aspects of our modern lives we rely on others having specialized knowledge to keep everything working. Most don&amp;rsquo;t know the engineering behind their local electrical systems or natural gas distribution. The architecture of providing internet access is no different. These things just work and only exist as an abstraction in the periphery of most people&amp;rsquo;s modern life.&lt;/p&gt;
&lt;p&gt;The problem with Xfinity&amp;rsquo;s usage of the term 10G is a deceptive abuse of the public&amp;rsquo;s collective association with the term. For cellular data connectivity, a number and a G on your phone antenna icon has been around since 3G, which kicked off in 1998.&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; This association could have only been further reinforced into the public psyche with the rise of mobile phone usage and the adoption of 4G in 2008 and 5G in 2019. Anyone using a phone over the past decade would have seen this multiple times per day on their phone&amp;rsquo;s status bar.&lt;/p&gt;
&lt;p&gt;However, the G in this context is mostly grounded in reality. Well, maybe more like low earth orbit reality. It refers to a generation of technology for cellular connectivity as it evolves over time. But it also shares a bit of ambiguity. There are services like 5G E, which is actually 4G&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; and 5G TF, which only shares aspects of true 5G.&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt; Despite these nuances there is still a level of technological direction with the term. Consumers can follow the approximate logic that subsequent cellular generations will provide better service.&lt;/p&gt;
&lt;p&gt;This is the reality where Xfinity and the rest of the cable industry brought their idiotic marketing term into the world. Dragging the confused public while riding the coattails of the cellular industry is incredibly deceptive and misleading. An industry executive was even quoted as blatantly demeaning 5G when they were releasing 10G.&lt;sup id="fnref:9"&gt;&lt;a href="#fn:9" class="footnote-ref" role="doc-noteref"&gt;9&lt;/a&gt;&lt;/sup&gt; Tech news publication &lt;em&gt;The Verge&lt;/em&gt; succinctly described the appeal of the marketing term being rolled out as having, &amp;ldquo;something that’s twice as many Gs as 5G wireless.&amp;rdquo;&lt;sup id="fnref:10"&gt;&lt;a href="#fn:10" class="footnote-ref" role="doc-noteref"&gt;10&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt;The marketing ambiguity doesn&amp;rsquo;t stop with the cellular industry. Another commonly used term in computer networking is 10G. This refers to a 10 gigabit per second network connection. That would be 10,000 megabits per second. Specifically, Xfinity is developing an actual 10G program&lt;sup id="fnref:11"&gt;&lt;a href="#fn:11" class="footnote-ref" role="doc-noteref"&gt;11&lt;/a&gt;&lt;/sup&gt; that uses DOCSIS 4.0 to achieve download speeds of 10 gigabits per second and an upload speed of 6 gigabits per second. Such capacity would significantly alter the way consumers interact with services on the internet.&lt;/p&gt;
&lt;p&gt;While Xfinity has made progress with full duplex amplification&lt;sup id="fnref:12"&gt;&lt;a href="#fn:12" class="footnote-ref" role="doc-noteref"&gt;12&lt;/a&gt;&lt;/sup&gt; it is still vetting full duplex amplifier prototypes.&lt;sup id="fnref:13"&gt;&lt;a href="#fn:13" class="footnote-ref" role="doc-noteref"&gt;13&lt;/a&gt;&lt;/sup&gt; Rollout to the general public might be a ways off but I wonder how their marketing terms will play out during that campaign. Coalescing under the 10G umbrella is most likely, given the marketing foundation they are currently building. They could then quietly remove references to 10G as a simple brand term and deliver a product with actual 10G speeds.&lt;/p&gt;
&lt;p&gt;Who am I kidding. That all sounds too easy and unreflective of their current marketing team. If a 6G cellular service is prevalent at this future date maybe Xfinity will rebrand everything to 12G.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Update on January 31, 2024&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As reported by &lt;em&gt;Ars Technica&lt;/em&gt;,&lt;sup id="fnref:14"&gt;&lt;a href="#fn:14" class="footnote-ref" role="doc-noteref"&gt;14&lt;/a&gt;&lt;/sup&gt; the National Advertising Review Board recommended that Comcast discontinue the use of &amp;ldquo;10G&amp;rdquo; to describe their network.&lt;sup id="fnref:15"&gt;&lt;a href="#fn:15" class="footnote-ref" role="doc-noteref"&gt;15&lt;/a&gt;&lt;/sup&gt; We can thank Verizon and T-Mobile for bringing this challenge. It seems there are at least some limits to deceptive marketing going unchecked in the telecommunications industry.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Dailymotion, “Xfinity ‘The Next Giant Leap’ Super Bowl 2023 Commercial with Will Forte - Video Dailymotion,” n.d. &lt;a href="https://www.dailymotion.com/video/x8i8bft"&gt;https://www.dailymotion.com/video/x8i8bft&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Xfinity, “Xfinity 10G Network,” n.d. &lt;a href="https://www.xfinity.com/10g"&gt;https://www.xfinity.com/10g&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;CableLabs, “10G: The Next Great Leap in Broadband,” 2019. &lt;a href="https://www-res.cablelabs.com/wp-content/uploads/2019/08/26064924/10G-The-Next-Great-Leap-in-Broadband1.pdf"&gt;https://www-res.cablelabs.com/wp-content/uploads/2019/08/26064924/10G-The-Next-Great-Leap-in-Broadband1.pdf&lt;/a&gt;&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;“Xfinity 10G Network.”&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;International Telecommunication Union, “IMT-2020 (a.k.a. ‘5G’),” n.d. &lt;a href="https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt-2020/Pages/default.aspx"&gt;https://www.itu.int/en/ITU-R/study-groups/rsg5/rwp5d/imt-2020/Pages/default.aspx&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Helen Sydney Adams, “From 1G to 6G, Here’s a Generation Technology Timeline.” &lt;em&gt;Manufacturing Digital&lt;/em&gt;, May 8, 2022, &lt;a href="https://manufacturingdigital.com/technology/from-1g-to-6g-heres-a-generation-technology-timeline"&gt;https://manufacturingdigital.com/technology/from-1g-to-6g-heres-a-generation-technology-timeline&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Jacob Kastrenakes, “AT&amp;amp;T Misleads Customers by Updating Phones with Fake 5G Icon,” &lt;em&gt;The Verge&lt;/em&gt;, January 7, 2019, &lt;a href="https://www.theverge.com/2019/1/7/18172355/att-fake-5g-logo-rolling-out-samsung-lg"&gt;https://www.theverge.com/2019/1/7/18172355/att-fake-5g-logo-rolling-out-samsung-lg&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;Jacob Kastrenakes, “Verizon’s 5G Home Internet Is Sort of Real, Sort of Fake.” &lt;em&gt;The Verge&lt;/em&gt;, October 2, 2018, &lt;a href="https://www.theverge.com/2018/10/2/17927712/verizon-5g-home-internet-real-speed-meaning"&gt;https://www.theverge.com/2018/10/2/17927712/verizon-5g-home-internet-real-speed-meaning&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:9"&gt;
&lt;p&gt;Jon Brodkin, “Envious of 5G Hype, Cable Cos. Unveil Potentially Confusing ‘10G’ Trademark,” &lt;em&gt;Ars Technica&lt;/em&gt;, January 8, 2019, &lt;a href="https://arstechnica.com/information-technology/2019/01/envious-of-5g-hype-cable-cos-unveil-potentially-confusing-10g-trademark/"&gt;https://arstechnica.com/information-technology/2019/01/envious-of-5g-hype-cable-cos-unveil-potentially-confusing-10g-trademark/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:9" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:10"&gt;
&lt;p&gt;Sheena Vasani, “Comcast’s Symmetrical Multi-Gigabit Internet Test Is a Preview of next Year’s ‘10G’ Rollout.” &lt;em&gt;The Verge&lt;/em&gt;, December 12, 2022, &lt;a href="https://www.theverge.com/2022/12/12/23505779/comcast-multi-gigabit-10g-docsis-40-cable-fiber-isp"&gt;https://www.theverge.com/2022/12/12/23505779/comcast-multi-gigabit-10g-docsis-40-cable-fiber-isp&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:10" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:11"&gt;
&lt;p&gt;Comcast, “Comcast Completes World-First Live 10G Connection - Xfinity 10G Network,” August 11, 2023, &lt;a href="https://corporate.comcast.com/press/releases/comcast-live-10g-connection-4-gig-symmetrical-speeds"&gt;https://corporate.comcast.com/press/releases/comcast-live-10g-connection-4-gig-symmetrical-speeds&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:11" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:12"&gt;
&lt;p&gt;Diana Goovaerts, “Comcast Completes DOCSIS 4.0 Puzzle with Amplifier Test.” &lt;em&gt;Fierce Telecom&lt;/em&gt;, September 20, 2022, &lt;a href="https://www.fiercetelecom.com/telecom/comcast-completes-docsis-40-puzzle-amplifier-test"&gt;https://www.fiercetelecom.com/telecom/comcast-completes-docsis-40-puzzle-amplifier-test&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:12" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:13"&gt;
&lt;p&gt;Diana Goovaerts, “Comcast Gets Its First Prototype DOCSIS 4.0 Amps from CommScope.” &lt;em&gt;Fierce Telecom&lt;/em&gt;, February 27, 2023, &lt;a href="https://www.fiercetelecom.com/telecom/comcast-gets-its-first-prototype-docsis-40-amp-commscope"&gt;https://www.fiercetelecom.com/telecom/comcast-gets-its-first-prototype-docsis-40-amp-commscope&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:13" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:14"&gt;
&lt;p&gt;Jon Brodkin, “Comcast Reluctantly Agrees to Stop Its Misleading ‘10G Network’ Claims,” &lt;em&gt;Ars Technica&lt;/em&gt;, January 31, 2024, &lt;a href="https://arstechnica.com/tech-policy/2024/01/comcast-to-stop-calling-entire-network-10g-as-name-is-ruled-misleading/"&gt;https://arstechnica.com/tech-policy/2024/01/comcast-to-stop-calling-entire-network-10g-as-name-is-ruled-misleading/&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:14" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:15"&gt;
&lt;p&gt;BBB National Programs, “National Advertising Review Board Recommends Comcast Discontinue Use of ‘10G’ When Referring to the Name of Its Network,” January 31, 2024, &lt;a href="https://bbbprograms.org/media-center/dd/comcast-10g-xfinity"&gt;https://bbbprograms.org/media-center/dd/comcast-10g-xfinity&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:15" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>SpongeBob Balenciaga and a Beta Review of Adobe Firefly</title><link>https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/</link><pubDate>Thu, 13 Apr 2023 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/</guid><description>&lt;p&gt;&lt;figure aria-label="A space mining station as interpreted by Adobe Firefly"&gt;
 &lt;img
 alt="A space mining station as interpreted by Adobe Firefly"
 title="A space mining station as interpreted by Adobe Firefly"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-1-featured_hu_4cd8e2b3e35adf3f.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-1-featured_hu_3dd774304dbea0db.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-1-featured_hu_d7e82ddb7245be9c.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-1-featured_hu_ec3aff24442b7755.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-1-featured_hu_46f9f83dcabab1ac.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-1-featured_hu_b2165e24c540b14b.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;A space mining station as interpreted by Adobe Firefly&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After the onslaught of AI driven engines in early 2023 I was instantly intrigued with the generative capabilities of image generation. While ChatGPT is a monumental milestone in AI progress it does not carry the same spectacle as algorithmically generated images.&lt;/p&gt;
&lt;p&gt;Many of us have seen the incredible art built with a few simple prompts. Works that could be the highlight of an artist&amp;rsquo;s portfolio yet were brought into existence in mere seconds. Futuristic space scenes at the cutting edge of what we deem as reality. Fantastical portraits of medieval warriors with armor as detailed as something you would see in a museum.&lt;/p&gt;
&lt;p&gt;Yet much of the foundation of how these images are generated results from a vast vacuuming of original artwork across the internet. The AI algorithms are not bringing these beautiful images out of the void of nothingness. It is mass plagiarization. The source is large swaths of artists, which is rehashed and called its own.&lt;/p&gt;
&lt;p&gt;A specific example is with &lt;a href="https://waxy.org/2022/11/invasive-diffusion-how-one-unwilling-illustrator-found-herself-turned-into-an-ai-model/"&gt;artist Hollie Mengert&amp;rsquo;s work in late 2022&lt;/a&gt;. After someone trained Stable Diffusion to recreate her style it democratized all her work without permission. The initial defense of the method was that the output from the AI trained model was new art and separate. This goes into a gray area of copyright law and morality.&lt;/p&gt;
&lt;p&gt;This kind of morally questionable foundation kept me away from trying it out. I didn&amp;rsquo;t want to contribute to a vast operation of repacking artists work. It is within this situation that Adobe Firefly announced its Beta program and I excitedly signed up.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_portrait-of-male-warrior&amp;ndash;red-velvet&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;ornate-gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;lord-of-the-rings_art-baroque-baroque_96422"&gt;
 &lt;img
 alt="Firefly_portrait-of-male-warrior–red-velvet–beard–blue-glowing-eyes–ornate-gold-armor–regal–gold-halo–lord-of-the-rings_art-baroque-baroque_96422"
 title="Firefly_portrait-of-male-warrior&amp;ndash;red-velvet&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;ornate-gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;lord-of-the-rings_art-baroque-baroque_96422"
 width="1408"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-2_hu_427fd5d55c879860.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-2_hu_ab5bda58c22a4ea0.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-2_hu_b8534bd5f151b1d0.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-2_hu_99c1b2022e4dff4a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-2_hu_6cbea9d02e026550.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_portrait-of-male-warrior&amp;ndash;red-velvet&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;ornate-gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;lord-of-the-rings_art-baroque-baroque_96422&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Being a company based on creating tools for artists I anticipated that Adobe would approach the intellectual property issue with more care than others in the field. And true enough I was presented with the below notice after signing up:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;We train Firefly using Adobe Stock and other diverse image datasets which have been carefully curated to mitigate against harmful or biased content while also respecting artist’s ownership and intellectual property rights.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;And so off I went into the beta. As of early April 2023 there are only 2 services available within Firefly. An AI image generator (text to image) and text effects, which applies the stated texture to the defined letters. Other aspects of the service are still being developed:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inpainting&lt;/strong&gt;
Use a brush to add, remove, or replace objects in an image. Generate the new fill with a text prompt.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Personalized results&lt;/strong&gt;
Generate images based on your own object or style.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Text to vector&lt;/strong&gt;
Generate editable vectors from a detailed text description.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Extend image&lt;/strong&gt;
Change the aspect ratio of your image with a single click.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;3D to image&lt;/strong&gt;
Generate images from the interactive positioning of 3D elements.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Text to pattern&lt;/strong&gt;
Generate seamlessly tiling patterns from a detailed text description.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Text to brush&lt;/strong&gt;
Generate brushes for Photoshop and Fresco from a detailed text description.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Sketch to image&lt;/strong&gt;
Turn simple drawings into full-color images.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Text to template&lt;/strong&gt;
Generate editable templates from a detailed text description.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;There is a wall of examples for both working services complete with the text prompts that generated them. This is incredibly useful for a noobie like myself to build the correctly written text parameters. The learning curve is present but nowhere near the challenge of becoming proficient in Photoshop or Premiere Pro.&lt;/p&gt;
&lt;p&gt;My initial generated images were just a stretch of the imagination. To see what was actually possible with the impossible. My wife certainly loved it since she loves dinosaurs.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_dinosaur-programmer-hard-at-work&amp;ndash;asian_95918"&gt;
 &lt;img
 alt="Firefly_dinosaur-programmer-hard-at-work–asian_95918"
 title="Firefly_dinosaur-programmer-hard-at-work&amp;ndash;asian_95918"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-3_hu_3ef78d13ef5e3a4f.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-3_hu_a1694aeaa13cba8d.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-3_hu_dc391b35fe1f4a2b.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-3_hu_f8cb7cb6432b05ee.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_dinosaur-programmer-hard-at-work&amp;ndash;asian_95918&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_running-from-dinosaurs-in-a-ballgown&amp;ndash;synthwave_art-vibrant_colors-dramatic_light_18498"&gt;
 &lt;img
 alt="Firefly_running-from-dinosaurs-in-a-ballgown–synthwave_art-vibrant_colors-dramatic_light_18498"
 title="Firefly_running-from-dinosaurs-in-a-ballgown&amp;ndash;synthwave_art-vibrant_colors-dramatic_light_18498"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-4_hu_37a2361469356e05.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-4_hu_2d4d20893642495.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-4_hu_a6818f3fbde6c086.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-4_hu_6bde34f181bad236.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_running-from-dinosaurs-in-a-ballgown&amp;ndash;synthwave_art-vibrant_colors-dramatic_light_18498&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;As with other AI image generation software suites it really struggles to accurately depict appendages. The same goes for the anatomy of a human&amp;rsquo;s facial structure. While the AI model seems to keep it together with a few general prompts it falls apart once you get past a certain number of text specifications. Maybe it is trying too hard to qualify all text parameters yet failing to maintain when a human would deem as a cohesive face. Scaling back the number of text parameters resolves this issue and returns a bit of creative autonomy back to the AI model.&lt;/p&gt;
&lt;p&gt;![firefly-beta-5.webp&amp;quot; caption=&amp;ldquo;Firefly_portrait-of-caucasian-male-warrior&amp;ndash;red-velvet&amp;ndash;ornate-gold-armor&amp;ndash;medieval&amp;ndash;angelic-halo-of-light&amp;ndash;backlit-by-dark-magical-portal&amp;ndash;high-fantasy_art-baroque-dramatic_light-vibrant_colors-fantasy-dark_52548](firefly-beta-5.webp &amp;ldquo;firefly-beta-5.webp&amp;rdquo; caption=&amp;ldquo;Firefly_portrait-of-caucasian-male-warrior&amp;ndash;red-velvet&amp;ndash;ornate-gold-armor&amp;ndash;medieval&amp;ndash;angelic-halo-of-light&amp;ndash;backlit-by-dark-magical-portal&amp;ndash;high-fantasy_art-baroque-dramatic_light-vibrant_colors-fantasy-dark_52548&amp;rdquo;)&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_portrait-of-caucasian-male-warrior&amp;ndash;red-velvet&amp;ndash;ornate-gold-armor&amp;ndash;medieval&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;regal&amp;ndash;halo&amp;ndash;single-ray-of-sunlight_art-baroque-dramatic_light_41703"&gt;
 &lt;img
 alt="Firefly_portrait-of-caucasian-male-warrior–red-velvet–ornate-gold-armor–medieval–beard–blue-glowing-eyes–regal–halo–single-ray-of-sunlight_art-baroque-dramatic_light_41703"
 title="Firefly_portrait-of-caucasian-male-warrior&amp;ndash;red-velvet&amp;ndash;ornate-gold-armor&amp;ndash;medieval&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;regal&amp;ndash;halo&amp;ndash;single-ray-of-sunlight_art-baroque-dramatic_light_41703"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-6_hu_bdde94582e3f06bf.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-6_hu_7cac7e880286c4aa.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-6_hu_67125169109942a.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-6_hu_a64498121e6f80ea.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_portrait-of-caucasian-male-warrior&amp;ndash;red-velvet&amp;ndash;ornate-gold-armor&amp;ndash;medieval&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;regal&amp;ndash;halo&amp;ndash;single-ray-of-sunlight_art-baroque-dramatic_light_41703&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;As a gamer, I first turned to Sci-Fi and Fantasy categories to really drive down into what was possible with a very specific prompt. While AI generation is &lt;a href="https://kotaku.com/steam-pc-ai-generated-art-midjourney-youtube-valve-1849531585"&gt;currently going poorly for games&lt;/a&gt; it has the potential to became the &lt;a href="https://www.polygon.com/23465326/artificial-intelligence-prompt-video-games-and-movies"&gt;future model of creating exactly what you want&lt;/a&gt; in the next decade. Yet, in these initial stages it would be useful to have some sort of dynamic character creation. This could promote a much higher re-playability factor. Guard rails could be put in place by the developers to guide the story in a specific trajectory. Or we could embrace the limitless and see what a real sandbox-like game dynamic adventure could take the audience.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_portrait-of-male-warrior&amp;ndash;blue-velvet&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;ornate-gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;classicism_art-baroque_23436"&gt;
 &lt;img
 alt="Firefly_portrait-of-male-warrior–blue-velvet–beard–blue-glowing-eyes–ornate-gold-armor–regal–gold-halo–classicism_art-baroque_23436"
 title="Firefly_portrait-of-male-warrior&amp;ndash;blue-velvet&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;ornate-gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;classicism_art-baroque_23436"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-7_hu_774cef99b67e1734.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-7_hu_310fa6a797693721.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-7_hu_b7449b409413b9f5.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-7_hu_4fc1a86c9659bee5.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_portrait-of-male-warrior&amp;ndash;blue-velvet&amp;ndash;beard&amp;ndash;blue-glowing-eyes&amp;ndash;ornate-gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;classicism_art-baroque_23436&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;![firefly-beta-8.webp&amp;rdquo; caption=&amp;ldquo;Firefly_portrait-of-warrior&amp;ndash;blue-velvet&amp;ndash;ornate&amp;ndash;gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;classicism_art-baroque_23436](firefly-beta-8.webp &amp;ldquo;firefly-beta-8.webp&amp;rdquo; caption=&amp;ldquo;Firefly_portrait-of-warrior&amp;ndash;blue-velvet&amp;ndash;ornate&amp;ndash;gold-armor&amp;ndash;regal&amp;ndash;gold-halo&amp;ndash;classicism_art-baroque_23436&amp;rdquo;)&lt;/p&gt;
&lt;p&gt;The results could be incredible. Or horrific. Generative AI models restricted purely to building games or entertainment in general could have greater moral flexibility compared to real world AI instances. As long there was some sort of disclaimer at the beginning saying such. This work is a piece of fiction&amp;hellip;&lt;em&gt;blah blah blah&lt;/em&gt;. With entertainment as a get out of jail free card we could be in for a wild ride in future games. Popular titles such as Rimworld already have &lt;a href="https://preview.redd.it/4ekpz04667031.png?width=1184&amp;amp;format=png&amp;amp;auto=webp&amp;amp;v=enabled&amp;amp;s=db47a0ff0dd32924df483cc60401871ded35aee4"&gt;players notching off which Geneva Convention articles they have violated&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_futuristic-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland&amp;ndash;detailed_art-vibrant"&gt;
 &lt;img
 alt="Firefly_futuristic-excavator-vehicles–mining-space-station-with-furnace-in-background–glowing-windows–jagged-mountains-obscuring-horizon–barren-landscape–mining-pit–industrial-wasteland–detailed_art-vibrant"
 title="Firefly_futuristic-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland&amp;ndash;detailed_art-vibrant"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-9_hu_eab25d353f262002.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-9_hu_7ac1b8436de7aeab.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-9_hu_9a1cd7e4452eb4ec.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-9_hu_a66d653bca9ccd86.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-9_hu_a4ce5bd6420034f.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-9_hu_8234931c88e8fde3.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_futuristic-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland&amp;ndash;detailed_art-vibrant&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_futuristic-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dar"&gt;
 &lt;img
 alt="Firefly_futuristic-excavator-vehicles–mining-space-station-with-furnace-in-background–glowing-windows–jagged-mountains-obscuring-horizon–barren-landscape–mining-pit–industrial-wasteland_art-vibrant_colors-dar"
 title="Firefly_futuristic-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dar"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-10_hu_db9eef1ff3ad0a70.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-10_hu_ea37c644e471cb17.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-10_hu_14243ca6cdc4700b.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-10_hu_2831cf000ffdef1c.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-10_hu_e5f12e6117fb0062.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-10_hu_ac761f04106ae696.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_futuristic-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dar&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_space-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dark"&gt;
 &lt;img
 alt="Firefly_space-excavator-vehicles–mining-space-station-with-furnace-in-background–glowing-windows–jagged-mountains-obscuring-horizon–barren-landscape–mining-pit–industrial-wasteland_art-vibrant_colors-dark"
 title="Firefly_space-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dark"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-11_hu_cc1aaab1878677d1.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-11_hu_83d4864aa1cc9abe.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-11_hu_1c53a0fc0d51bef1.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-11_hu_61315e812d865b77.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-11_hu_b1ec28d29b350227.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-11_hu_63df9292966af173.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_space-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dark&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_space-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dark-sci"&gt;
 &lt;img
 alt="Firefly_space-excavator-vehicles–mining-space-station-with-furnace-in-background–glowing-windows–jagged-mountains-obscuring-horizon–barren-landscape–mining-pit–industrial-wasteland_art-vibrant_colors-dark-sci"
 title="Firefly_space-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dark-sci"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-12_hu_a079f41fe0d83a88.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-12_hu_c512f1c9010d84ad.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-12_hu_d2f541cc4ef15411.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-12_hu_2d7a64346383e7b.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-12_hu_42cfd1527054ba09.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-12_hu_206c725b9902ec8b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_space-excavator-vehicles&amp;ndash;mining-space-station-with-furnace-in-background&amp;ndash;glowing-windows&amp;ndash;jagged-mountains-obscuring-horizon&amp;ndash;barren-landscape&amp;ndash;mining-pit&amp;ndash;industrial-wasteland_art-vibrant_colors-dark-sci&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_space-station&amp;ndash;dark-mountains&amp;ndash;desolate-landscape&amp;ndash;space-ships-docking&amp;ndash;mining-operation_art-science_fiction-golden_hour-wide_angle-digital"&gt;
 &lt;img
 alt="Firefly_space-station–dark-mountains–desolate-landscape–space-ships-docking–mining-operation_art-science_fiction-golden_hour-wide_angle-digital"
 title="Firefly_space-station&amp;ndash;dark-mountains&amp;ndash;desolate-landscape&amp;ndash;space-ships-docking&amp;ndash;mining-operation_art-science_fiction-golden_hour-wide_angle-digital"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-13_hu_f13f9ce48deea2d0.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-13_hu_47280637fbe4d82f.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-13_hu_2a93c36c5160435d.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-13_hu_e61bf61b562dbac6.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-13_hu_d01c5bfda65fce8b.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-13_hu_c1463bd345210a4e.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_space-station&amp;ndash;dark-mountains&amp;ndash;desolate-landscape&amp;ndash;space-ships-docking&amp;ndash;mining-operation_art-science_fiction-golden_hour-wide_angle-digital&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;More traditional art is also possible. Some of the generated lithographs and line etchings appeared as if they were out of a very old historical book. A few of the prompts produced some odd ambience in the line etchings, which made it look like a middle school kid just learned Photoshop image effects. But this could be easily toned down with the correct curation of text parameters.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="explorer-portrait&amp;ndash;mountain-man&amp;ndash;beard&amp;ndash;fur-clothing&amp;ndash;bw&amp;ndash;dramatic-light&amp;ndash;photo&amp;ndash;next-to-river&amp;ndash;tired&amp;ndash;epic-landscape-background&amp;ndash;french&amp;ndash;line-etching_art"&gt;
 &lt;img
 alt="explorer-portrait–mountain-man–beard–fur-clothing–bw–dramatic-light–photo–next-to-river–tired–epic-landscape-background–french–line-etching_art"
 title="explorer-portrait&amp;ndash;mountain-man&amp;ndash;beard&amp;ndash;fur-clothing&amp;ndash;bw&amp;ndash;dramatic-light&amp;ndash;photo&amp;ndash;next-to-river&amp;ndash;tired&amp;ndash;epic-landscape-background&amp;ndash;french&amp;ndash;line-etching_art"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-14_hu_3aec1c3d3358c8b.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-14_hu_2782a1544667a98e.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-14_hu_51ff5fd53d3d2d68.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-14_hu_f1846402bf78cb95.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;explorer-portrait&amp;ndash;mountain-man&amp;ndash;beard&amp;ndash;fur-clothing&amp;ndash;bw&amp;ndash;dramatic-light&amp;ndash;photo&amp;ndash;next-to-river&amp;ndash;tired&amp;ndash;epic-landscape-background&amp;ndash;french&amp;ndash;line-etching_art&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_lithograph&amp;ndash;landscape&amp;ndash;grand-mountains&amp;ndash;forest&amp;ndash;bw&amp;ndash;ornate&amp;ndash;detailed_art"&gt;
 &lt;img
 alt="Firefly_lithograph–landscape–grand-mountains–forest–bw–ornate–detailed_art"
 title="Firefly_lithograph&amp;ndash;landscape&amp;ndash;grand-mountains&amp;ndash;forest&amp;ndash;bw&amp;ndash;ornate&amp;ndash;detailed_art"
 width="1792"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-15_hu_ab948001c7692b6a.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-15_hu_a746a5c4850e7d1e.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-15_hu_4db874be084c008d.webp 1024w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-15_hu_84d3e672cde6f136.webp 1366w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-15_hu_2c4e27a0e14965c7.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-15_hu_6a78cb30863b4680.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_lithograph&amp;ndash;landscape&amp;ndash;grand-mountains&amp;ndash;forest&amp;ndash;bw&amp;ndash;ornate&amp;ndash;detailed_art&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After sharing a few of these results with some family members I received the challenge to create SpongeBob Balenciaga. As of April of 2023, the current cultural meme is styling various narrative flavors into Balenciaga. While &lt;a href="https://knowyourmeme.com/news/ai-generated-harry-potter-by-balenciaga-video-goes-viral-proving-that-ai-video-is-up-next-in-memes"&gt;Harry Potter was first&lt;/a&gt;, Star Wars and Lord of the Rings closely followed. It seems to be a mad rush to Balencaiga-ify everything else before the cultural moment passes.&lt;/p&gt;
&lt;p&gt;The initial prompt was a classic human and AI misunderstanding. With no cultural knowledge about the cartoon character &lt;em&gt;SpongeBob SquarePants&lt;/em&gt;, the AI model drew something very literally. The result was a Tim Burton mixed with &lt;a href="https://www.youtube.com/watch?v=OWBFKL6H7rI"&gt;Salad Fingers&lt;/a&gt; horror creature.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_SpongeBob-squarepants&amp;ndash;Balenciaga-style_art-dark"&gt;
 &lt;img
 alt="Firefly_SpongeBob-squarepants–Balenciaga-style_art-dark"
 title="Firefly_SpongeBob-squarepants&amp;ndash;Balenciaga-style_art-dark"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-16_hu_2e060aa1213683fc.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-16_hu_cbe699bcb662ffa2.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-16_hu_5f1b53a663ca3c3e.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-16_hu_a4816975d9fd36d.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_SpongeBob-squarepants&amp;ndash;Balenciaga-style_art-dark&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After realize I had to guide the AI model literally it turned in the right direction. Rather than relying on a cultural phrase that an AI model couldn&amp;rsquo;t generally understand I gave it a literal outline of what I wanted.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_square-sponge-wearing-sunglasses-and-pants&amp;ndash;Balenciaga-style&amp;ndash;gothic&amp;ndash;high-fashion_photo_74156"&gt;
 &lt;img
 alt="Firefly_square-sponge-wearing-sunglasses-and-pants–Balenciaga-style–gothic–high-fashion_photo_74156"
 title="Firefly_square-sponge-wearing-sunglasses-and-pants&amp;ndash;Balenciaga-style&amp;ndash;gothic&amp;ndash;high-fashion_photo_74156"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-17_hu_7847c89fa51db323.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-17_hu_ac30a35ce04b7fe0.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-17_hu_eeb0fc1e036aa73b.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-17_hu_d35296188518be84.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_square-sponge-wearing-sunglasses-and-pants&amp;ndash;Balenciaga-style&amp;ndash;gothic&amp;ndash;high-fashion_photo_74156&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The second result is rather entertaining in two ways. It drew exactly what I wanted but also because it put together a Hitler Squidhands from Grease. But overall the new direction was promising because the foundational parameters were being outputted. The next steps were to refine the output in an artistic direction closer to how I expected a SpongeBob Balenciaga would appear. The resulting prompts didn&amp;rsquo;t vary a terrible amount but made a significant difference in the output.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_high-fashion&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;urban&amp;ndash;black-clothing_cartoon-hyper_realistic_54277"&gt;
 &lt;img
 alt="Firefly_high-fashion–square-yellow-sponge-wearing-sunglasses–fashion-show–Balenciaga–urban–black-clothing_cartoon-hyper_realistic_54277"
 title="Firefly_high-fashion&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;urban&amp;ndash;black-clothing_cartoon-hyper_realistic_54277"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-18_hu_ec670c724d119fa9.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-18_hu_70e3a9ec150b2c80.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-18_hu_b4b758199c5a1ca3.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-18_hu_ad0dc0d95b57dd6f.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_high-fashion&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;urban&amp;ndash;black-clothing_cartoon-hyper_realistic_54277&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_high-fashion&amp;ndash;square-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;urban&amp;ndash;black-clothing_photo-pixel"&gt;
 &lt;img
 alt="Firefly_high-fashion–square-sponge-wearing-sunglasses–fashion-show–Balenciaga–urban–black-clothing_photo-pixel"
 title="Firefly_high-fashion&amp;ndash;square-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;urban&amp;ndash;black-clothing_photo-pixel"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-19_hu_3f13b80126f75391.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-19_hu_d4f28d8ae731f360.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-19_hu_3b8a465c5663479d.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-19_hu_4a1b1d87b6eeb375.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_high-fashion&amp;ndash;square-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;urban&amp;ndash;black-clothing_photo-pixel&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The departure from using &amp;lsquo;gothic&amp;rsquo; and the specification of a &amp;lsquo;yellow&amp;rsquo; sponge started to really make a difference. During this time I was also playing with various styles like pixel art, photo realism, and others to see a good path forward.&lt;/p&gt;
&lt;p&gt;The next round of images started to get very close my original goal. The background of sand dudes was a frustration tactic on my part. I was not able to specify &amp;lsquo;underwater&amp;rsquo; or &amp;lsquo;seafloor&amp;rsquo; in the parameters without some odd output. Additionally &amp;lsquo;beach&amp;rsquo; or similar words kind of skewed the results in a way I didn&amp;rsquo;t want to go. One thing I do want to note is the hyper realistic sponge for the female model. I struggled to repeat the usage of such a sponge later on in the process. Per the &lt;a href="https://firefly.adobe.com/"&gt;video from Adobe Firefly&lt;/a&gt; this might be possible in the future where you could keep a specific element.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit&amp;ndash;muscular_cartoon-maximalism"&gt;
 &lt;img
 alt="Firefly_fashion-show–square-yellow-sponge-wearing-sunglasses–fashion-show–Balenciaga–black-clothing–sand-dunes–backlit–muscular_cartoon-maximalism"
 title="Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit&amp;ndash;muscular_cartoon-maximalism"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-20_hu_996829c22ce3549a.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-20_hu_639de42583dcd3a5.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-20_hu_8eba89763566ef6b.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-20_hu_14c4f96f46863346.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit&amp;ndash;muscular_cartoon-maximalism&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit_cartoon-maximalism_96214"&gt;
 &lt;img
 alt="Firefly_fashion-show–square-yellow-sponge-wearing-sunglasses–fashion-show–Balenciaga–black-clothing–sand-dunes–backlit_cartoon-maximalism_96214"
 title="Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit_cartoon-maximalism_96214"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-21_hu_bce0aaa03c537b03.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-21_hu_94f84ec4a4b64e32.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-21_hu_5da1115ceabfe3c0.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-21_hu_71e8f0f043c1e1a9.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit_cartoon-maximalism_96214&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The man&amp;rsquo;s head looks like a cheese cube at first glance. Since there is no current way to modify a specific element of the image output I was left with regenerating or changing the text. As I mentioned before, if you start adding too many text parameters to the input the output begins to break. I presume this is the AI model attempting to fulfill all requests into the output but not realizing it is breaking reality in the process.&lt;/p&gt;
&lt;p&gt;The last few prompts were minor in change but were repeatedly regenerated to see what the AI model could come up with next. Since there was no substantive changes to the text prompt I am not sure the process is easily repeatable. You just had to keep regenerating and hope for a desirable output. And yet here are my two candidates for SpongeBob SquarePants Balenciaga from Adobe Firefly (Beta):&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="underwater&amp;ndash;backlit&amp;ndash;ornate-coral-forest-in-background&amp;ndash;caucasian-male-body&amp;ndash;high-fashion_photo-hyper_realistic"&gt;
 &lt;img
 alt="underwater–backlit–ornate-coral-forest-in-background–caucasian-male-body–high-fashion_photo-hyper_realistic"
 title="underwater&amp;ndash;backlit&amp;ndash;ornate-coral-forest-in-background&amp;ndash;caucasian-male-body&amp;ndash;high-fashion_photo-hyper_realistic"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-22_hu_288f311337d8aae8.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-22_hu_c5ac068824c23688.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-22_hu_86a5714ed77c02e7.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-22_hu_71ba405000816322.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;underwater&amp;ndash;backlit&amp;ndash;ornate-coral-forest-in-background&amp;ndash;caucasian-male-body&amp;ndash;high-fashion_photo-hyper_realistic&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit&amp;ndash;muscular_cartoon-maximalism"&gt;
 &lt;img
 alt="Firefly_fashion-show–square-yellow-sponge-wearing-sunglasses–fashion-show–Balenciaga–black-clothing–sand-dunes–backlit–muscular_cartoon-maximalism"
 title="Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit&amp;ndash;muscular_cartoon-maximalism"
 width="1024"
 height="1024"srcset="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-23_hu_3ddb63d611541ac1.webp 480w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-23_hu_db13b118be0ef642.webp 768w, https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-23_hu_432191bb4d13f542.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/spongebob-balenciaga-and-a-beta-review-of-adobe-firefly/firefly-beta-23_hu_918c968f2200be75.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Firefly_fashion-show&amp;ndash;square-yellow-sponge-wearing-sunglasses&amp;ndash;fashion-show&amp;ndash;Balenciaga&amp;ndash;black-clothing&amp;ndash;sand-dunes&amp;ndash;backlit&amp;ndash;muscular_cartoon-maximalism&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;For a service in beta and a non-trained AI shaper on his lunch break, I think the output is very powerful. With additional training time for the AI model and an experienced human shaper the results could be indistinguishable from real illustrators and possibly photographers. The transformative implications of this capability are still in the early stages of all industries. I am equally horrified and extremely excited to see where it goes.&lt;/p&gt;</description></item><item><title>Rattlesnake Flat and Reid Neilson Draw</title><link>https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/</link><pubDate>Fri, 07 Apr 2023 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/</guid><description>&lt;p&gt;&lt;figure aria-label="The newly upgraded 4Runner with mammoth 35 inch tires."&gt;
 &lt;img
 alt="The newly upgraded 4Runner with mammoth 35 inch tires."
 title="The newly upgraded 4Runner with mammoth 35 inch tires."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/4runner-in-san-rafael-swell-featured_hu_dd9db29ea45490.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/4runner-in-san-rafael-swell-featured_hu_e258631de5768ec8.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/4runner-in-san-rafael-swell-featured_hu_574ae2f28016258e.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/4runner-in-san-rafael-swell-featured_hu_2f073c0294d22f95.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/4runner-in-san-rafael-swell-featured_hu_639ffa120aa05299.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/4runner-in-san-rafael-swell-featured_hu_54dd961c1661d19.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The newly upgraded 4Runner with mammoth 35 inch tires.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;m good at avoiding social engagements. It is all the easier when you have a hobby that can take you far away into the wilderness. On Easter Weekend I put this expertise into play and ended up touring a portion of the San Rafael Swell Recreation Area located in central Utah.&lt;/p&gt;
&lt;p&gt;Many people end up at the majestic cliffs dubbed &lt;em&gt;The Wedge&lt;/em&gt; in the northern part of the Swell. But there is a great deal more to see. I had previously visited &lt;a href="https://rb.ax/blog/black-dragon-canyon/"&gt;Black Dragon Canyon&lt;/a&gt; and The Wedge, which were each beautiful in their own unique ways. Yet there could be more beauty out there and I was going to find it.&lt;/p&gt;
&lt;p&gt;I approached the Swell from the north through Price. The weather was surprising fair for early April. While overcast in the morning with in the 50s F it usually warmed to the mid 80s and sunny in the afternoon. I took highway 10 south and diverted to the Green River Cutoff Road. This eventually led to Buckhorn Draw Road that squiggles and descends through the majestic canyon next to The Wedge.&lt;/p&gt;
&lt;p&gt;There are many camp sites along the canyon and a few could have provided beautiful sunset or sunrise pictures. The canyon extends at a diagonal from the north west to the south east. This would allow for a dramatic contrast of sunlight. But there was a lot of time left in the day and I continued on southward into the swell.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="My furry copilot, Dietrich. He loves driving around and exploring but doesn&amp;rsquo;t really like camping. After a few minutes of checking things out he sits and waits at the 4Runner door."&gt;
 &lt;img
 alt="My furry copilot, Dietrich. He loves driving around and exploring but doesn’t really like camping. After a few minutes of checking things out he sits and waits at the 4Runner door."
 title="My furry copilot, Dietrich. He loves driving around and exploring but doesn&amp;rsquo;t really like camping. After a few minutes of checking things out he sits and waits at the 4Runner door."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/dietrich-the-off-road-copilot_hu_909a594f2a3265db.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/dietrich-the-off-road-copilot_hu_3372e55c2120878a.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/dietrich-the-off-road-copilot_hu_f67baed0edc5b2d0.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/dietrich-the-off-road-copilot_hu_a9224a4472456d.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/dietrich-the-off-road-copilot_hu_29601055358efcbf.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/dietrich-the-off-road-copilot_hu_efbedbaa65eb5bc6.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;My furry copilot, Dietrich. He loves driving around and exploring but doesn&amp;rsquo;t really like camping. After a few minutes of checking things out he sits and waits at the 4Runner door.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After crossing the San Rafael River the land opened to the desert and plateaus. There are many branching roads in this section. Around Calf Mesa and down Cane Wash, Oil Well Flat, or Road Hollow. All trails looked inspiring but I was aiming for a timid trip. My 4Runner had gone under the knife the week prior with new suspension and tires. I was re-learning my truck and what was rubbing where. Not the best time to push my limits.&lt;/p&gt;
&lt;h2 id="rattlesnake-flat"&gt;&lt;a href="#rattlesnake-flat"&gt;Rattlesnake Flat&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;I stuck to the timid Buckhorn Draw Road until around &lt;em&gt;&lt;a href="https://goo.gl/maps/xkNrHCqBp73dgJQZ8"&gt;The Sinkhole&lt;/a&gt;&lt;/em&gt; near I-70. I forked off here to the Rattlesnake Flat area and found a &lt;a href="https://goo.gl/maps/vhVouhkFJetHhQC26"&gt;dispersed campsite in an area&lt;/a&gt; covered by shrubby cedar trees.&lt;/p&gt;
&lt;p&gt;There was a cellular radio tower on the nearby plateau, which gave me the best 5G connection I&amp;rsquo;ve ever experienced. I&amp;rsquo;m sure me and the other 3 people connected to the tower were barely pushing 1% of capacity. As I didn&amp;rsquo;t have a specific destination past where I had just arrived, it was helpful to have a data connection to plan for the next two days of exploring the area.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The lone 5G capable cell tower near Rattlesnake Flat. While not Ultra Capacity 5G it still had amazing speeds."&gt;
 &lt;img
 alt="The lone 5G capable cell tower near Rattlesnake Flat. While not Ultra Capacity 5G it still had amazing speeds."
 title="The lone 5G capable cell tower near Rattlesnake Flat. While not Ultra Capacity 5G it still had amazing speeds."
 width="1600"
 height="1066"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/rattlesnake-flat-cell-tower_hu_c7921ed96c270991.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/rattlesnake-flat-cell-tower_hu_ebd5952a233905f3.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/rattlesnake-flat-cell-tower_hu_6e3fa9ff5a6a607c.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/rattlesnake-flat-cell-tower_hu_eb9a8e20828708ae.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/rattlesnake-flat-cell-tower_hu_2e5edad13029e82.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/rattlesnake-flat-cell-tower_hu_27bfa35826c0157f.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The lone 5G capable cell tower near Rattlesnake Flat. While not &lt;em&gt;Ultra Capacity&lt;/em&gt; 5G it still had amazing speeds.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Fix-it-Pass, the Eva Conover Trail, and Devil&amp;rsquo;s Racetrack had been on my shortlist for the past few years. All are challenging trails and require capable vehicles driven with finesse. I had recently entered the realm of capable vehicle with 35&amp;quot; tires but I was mere hours into it. To ease into more challenging terrain I decided to scout around the beginnings of these trails until I ran out of time.&lt;/p&gt;
&lt;p&gt;On the following morning I got back on Buckhorn Draw Road and headed West back to the I-70 on-ramp. However, I didn&amp;rsquo;t get back on the highway but crossed it to reach the Heart of Sinbad Road. Taking me farther away from the dramatic landscape of the San Rafael Reef, I entered the boring southern central flat plateau.&lt;/p&gt;
&lt;p&gt;While making good time I decided to take a detour to see if I could reach the West side of the San Rafael Reef. How great would it be to discover an unheard of majestic view of the Reef? On an &lt;a href="https://maps.app.goo.gl/vPiVC8MuY6RRgSfL8"&gt;unnamed road crossing&lt;/a&gt; I went South East. The scrubby flat landscape gently descended and the plateau started to mildly breakup with the beginning of Georges Draw.&lt;/p&gt;
&lt;p&gt;While trying to get to the Reef I overlooked an interesting slot canyon. &lt;a href="https://www.americansouthwest.net/slot_canyons/crawford_draw/canyon.html"&gt;Crawford Draw&lt;/a&gt; trail head was just a short detour off the road I was traveling and could have been a good shelter from the growing heat of the day.&lt;/p&gt;
&lt;p&gt;Instead I kept pressing South East. Eventually I &lt;a href="https://maps.app.goo.gl/HTuMVtMySzLLHit16"&gt;ran out of road&lt;/a&gt; with a significant hike left to reach the Reef. Although it was early April the temperature must have been in the upper 80s. Not necessarily a problem for myself but for my entirely black haired German Shepherd buddy it would have been rather unpleasant.&lt;/p&gt;
&lt;h2 id="reid-neilson-draw"&gt;&lt;a href="#reid-neilson-draw"&gt;Reid Neilson Draw&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Returning back to the crossroads with the Heart of Sinbad Road I started to make my way into the Reid Nelson Draw. A fun aspect of this road is that it goes underneath I-70. There is a plain concrete passageway underneath that is a fun change up from the normal overpass bridges. The south side of the dirt road is aggressively eroded where the concrete meets the dirt. In order to ease the transition there are piles of rocks stacked up to accommodate vehicles.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="For a bunch of stacked rocks these were surprisingly stable. I can only imagine how wild things get when flash floods come through here."&gt;
 &lt;img
 alt="For a bunch of stacked rocks these were surprisingly stable. I can only imagine how wild things get when flash floods come through here."
 title="For a bunch of stacked rocks these were surprisingly stable. I can only imagine how wild things get when flash floods come through here."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/reid-neilson-draw-tunnel-crossing_hu_a75d22a6976a1146.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/reid-neilson-draw-tunnel-crossing_hu_720042b7920195a9.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/reid-neilson-draw-tunnel-crossing_hu_7b72d99aac72fd16.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/reid-neilson-draw-tunnel-crossing_hu_d06242231c56130.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/reid-neilson-draw-tunnel-crossing_hu_aab3797800cfd8b6.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/reid-neilson-draw-tunnel-crossing_hu_5e7a063e2f999922.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;For a bunch of stacked rocks these were surprisingly stable. I can only imagine how wild things get when flash floods come through here.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Once on the north side of I-70 the road becomes radically backcountry. The ruts are sometimes extreme and will flex your suspension to a creaky limit. It was here that I heard and felt the tolerances my new 35&amp;quot; tires had on my small 4Runner wheel wells. I can only imagine this condition is due to the isolated nature of the section of road coupled with use limited to only aggressive off-road vehicles.&lt;/p&gt;
&lt;p&gt;Past the tunnel, much of the terrain is a flat and gentle plateau that wraps around the south side of Fix-it-Pass. But this is a bit misleading because the roads are heavily rutted and sometimes brings your vehicle to an uneasy angle. But this has the benefit of making the area isolated from the general population. There aren&amp;rsquo;t going to be large camping trailers or minivans trawling over the deep ruts. Additionally, there are plenty of spots to camp scattered along the edge of the plateau with great views of Fix-it-Pass.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Being secluded away from the main trail behind cedar trees was great but dealing with the dried cow pies was not."&gt;
 &lt;img
 alt="Being secluded away from the main trail behind cedar trees was great but dealing with the dried cow pies was not."
 title="Being secluded away from the main trail behind cedar trees was great but dealing with the dried cow pies was not."
 width="1600"
 height="1066"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/camping-spot-near-fix-it-pass_hu_922861818d5ad882.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/camping-spot-near-fix-it-pass_hu_5df431b401f92148.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/camping-spot-near-fix-it-pass_hu_bcfb22a8ce187e8f.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/camping-spot-near-fix-it-pass_hu_3548aeea40fd4d4c.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/camping-spot-near-fix-it-pass_hu_135cc5488b64cd77.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/camping-spot-near-fix-it-pass_hu_8e9d288474d9f8b8.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Being secluded away from the main trail behind cedar trees was great but dealing with the dried cow pies was not.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I chose a camping spot farther back in a secluded area of large cedar trees. The valley was heavily used by grazing cattle, which resulted in dried cow pies being everywhere. The nearby sandstone cliffs made for a dramatic outlined against the sky as it got dark.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A long exposure night scene at camp. The weather was fair and it cooled off nicely in the evening to make a gentle fire very enjoyable."&gt;
 &lt;img
 alt="A long exposure night scene at camp. The weather was fair and it cooled off nicely in the evening to make a gentle fire very enjoyable."
 title="A long exposure night scene at camp. The weather was fair and it cooled off nicely in the evening to make a gentle fire very enjoyable."
 width="1600"
 height="1067"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/night-scene-near-fix-it-pass_hu_a0d7ed5d0b0bcd02.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/night-scene-near-fix-it-pass_hu_15e9e5b7a0a5c5af.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/night-scene-near-fix-it-pass_hu_db3c7d40e576277d.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/night-scene-near-fix-it-pass_hu_beafb5fa5557a8e9.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/night-scene-near-fix-it-pass_hu_dfe94bc786799da.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/night-scene-near-fix-it-pass_hu_e8365de94e73ca14.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A long exposure night scene at camp. The weather was fair and it cooled off nicely in the evening to make a gentle fire very enjoyable.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The following morning I went on a sandy hike to the nearby pictographs. I had to take the road the long way around due to the stealthy presence of cactus between all the ruddy desert grass. Protecting the feet of my dog was worth the sacrifice of extra walking.&lt;/p&gt;
&lt;p&gt;Seeing the pictographs was unique because they were both isolated yet trashed. It took significant capability to reach them and I doubt most people driving by on the nearby interstate would even know they were there. But on top of that the grazing cattle in the area seemed to have loved hanging out near the pictographs because there were a huge concentration of dried cow pies right next to it. I imagine the fence built around the pictograph area was built specifically to keep out the aggressive bowels of these grazing cattle.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Sunset overlooking Fix-it-Pass."&gt;
 &lt;img
 alt="Sunset overlooking Fix-it-Pass."
 title="Sunset overlooking Fix-it-Pass."
 width="1600"
 height="1066"srcset="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/sunset-at-fix-it-pass_hu_d72a133b85dbc92f.webp 480w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/sunset-at-fix-it-pass_hu_a00b96ee657e98e1.webp 768w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/sunset-at-fix-it-pass_hu_db4623de3b5fd610.webp 1024w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/sunset-at-fix-it-pass_hu_415f2e59ff520a43.webp 1366w, https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/sunset-at-fix-it-pass_hu_d37bb38773f265f7.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rattlesnake-flat-and-reid-neilson-draw/sunset-at-fix-it-pass_hu_45585494a4f0e336.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Sunset overlooking Fix-it-Pass.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After spending some time witnessing history it was starting to get warmer and I headed back to camp with my dog slogging along. He loves exploring with me but with his medium length black hair it makes for a uncomfortable experience if the weather is at all warm. Luckily we made it back to camp and we both cooled off in the shade and drank plenty of water.&lt;/p&gt;
&lt;p&gt;I had planned on staying for a few hours longer by just relaxing and enjoying the area but I saw a text from my family announcing Easter dinner would be that afternoon. After a few days of enjoying the San Rafael Swell area I packed up and headed back home.&lt;/p&gt;</description></item><item><title>Rock Hunting at the Dugway Geode Beds</title><link>https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/</link><pubDate>Sat, 19 Nov 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/</guid><description>&lt;p&gt;&lt;figure aria-label="Biggest geode we found"&gt;
 &lt;img
 alt="Biggest geode we found"
 title="Biggest geode we found"
 width="1440"
 height="1440"srcset="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-featured_hu_b8eea37016ba7cea.webp 480w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-featured_hu_46ea403fd90fba28.webp 768w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-featured_hu_3cd202ae7cb74f85.webp 1024w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-featured_hu_1f60d8809a404cac.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-featured_hu_f8e5e9ae1dbe0505.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Biggest geode we found&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;While touring most gift shops in the west you might encounter beautiful hollow rocks with giant crystals inside. In the most general terms these are called geodes. After seeing some locations in Utah where you can dig them up for free I have been planning to go. After seeing enough epically priced geodes in gift shops you begin to wonder if they are just trying to price gouge the tourists or they are in fact, rare. I remember seeing some geodes larger than 5 feet priced at $60,000.&lt;/p&gt;
&lt;p&gt;This particular geological expedition was to the &lt;a href="https://goo.gl/maps/JaEveW2VYpAwD2ue6"&gt;Dugway Geode Beds&lt;/a&gt; in the Utah West Desert. Managed by the Bureau of Land Management, this federal piece of land is pretty far from any sort of civilization and notorious for chewing up tires on the roads to get there. Since I live in the northern portion of the Salt Lake City metropolitan area my best route was by I-15, I-80, Highway 36, and lastly, Pony Express Road. However, on the way home we instead took Highway 196, which proved pretty quick becuase there were no small towns or traffic lights all the way to I-80.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Geode digging"&gt;
 &lt;img
 alt="Geode digging"
 title="Geode digging"
 width="1440"
 height="1234"srcset="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-digging_hu_a4719af37b02e096.webp 480w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-digging_hu_3ab33e846d8d7cd8.webp 768w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-digging_hu_f85abdff17f65c1b.webp 1024w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-digging_hu_27f64512f8ae02b9.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-digging_hu_2b1cfd906a297a17.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Geode digging&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;My sister had visited this spot the year prior and shared that they had gotten a flat tire on the drive out. Well, to be exact, they got the flat while trying to reach Topaz Mountain, which is a little bit to the south. Their vehicle isn&amp;rsquo;t exactly a dedicated for off roading so I wrote off the experience as something I probably wouldn&amp;rsquo;t have to deal with. Well, to place your mind at ease we didn&amp;rsquo;t actually get a flat but we saw the horrors of the potential. Over the course of driving in and out there were 3 abandoned trailers with mangled tires and 2 vehicles with flats. I actually stopped to help one since they needed an impact gun to get off a stubborn bolt. After seeing this wasteland of carnage I considered myself very fortunate to not have gotten a flat.&lt;/p&gt;
&lt;p&gt;The Geode Beds themselves are a collection of mounds that cover a few acres. I&amp;rsquo;m not sure if the BLM excavated the area for visitors or the landscape is simply formed from so many diggers over the years. Without any knowledge of where to start my wife and I just selected a few random spots and started digging. This was pretty idiotic of us but on this particular day we were flying by the seat of our pants and were just excited to be out there.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Geode crew"&gt;
 &lt;img
 alt="Geode crew"
 title="Geode crew"
 width="1440"
 height="1029"srcset="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-crew_hu_3d1c70853ba14b7f.webp 480w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-crew_hu_be2f6561b07cc546.webp 768w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-crew_hu_76275fe9ce948383.webp 1024w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-crew_hu_102a6f5bc40ee2b9.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-crew_hu_255c1f4632a01ad1.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Geode crew&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After digging for about 2 hours we had finally figured out what geodes looked like on the outside and so became a lot more efficient towards the last 30 minutes of excavating. I wonder how much more efficient we could have been if we had done a little geological studying before setting out on this trip. It would have been helpful to know what depth most geodes sit at within the dirt. The landscape has enough contours to start digging at a certain depth if it was needed.&lt;/p&gt;
&lt;p&gt;Luckily, in the last 15 minutes or so, we found a sizable mango sized geode. This might have been lucky taking pity on us wasting so much time digging in random places but the geode is big enough to have made the whole trip worth it. Regardless, if we had just come home with the scrap geodes, the experience of the trip was reward enough itself.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The 4Runner was a great chariot across miles and miles of washboard dirt roads."&gt;
 &lt;img
 alt="The 4Runner was a great chariot across miles and miles of washboard dirt roads."
 title="The 4Runner was a great chariot across miles and miles of washboard dirt roads."
 width="1440"
 height="1028"srcset="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-chariot_hu_3c741d5bccf06f88.webp 480w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-chariot_hu_729a36b4b77a4d.webp 768w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-chariot_hu_f3aa8ba7440921c4.webp 1024w, https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-chariot_hu_46007fd45ba9782.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/rock-hunting-at-the-dugway-geode-beds/geode-chariot_hu_6d7ae6f95cce0027.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The 4Runner was a great chariot across miles and miles of washboard dirt roads.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Cleaning up the geodes, tools, dogs, and 4Runner afterwards was quite the chore. The clay dirt common in the area ended up being in the same species as cement. My dogs had begun limping towards the end of our stay and on examination it turned out to be the clay collecting in balls between their paws with small stones wedged in. Getting this out wasn&amp;rsquo;t exactly straightforward since the clay had attached itself to their paw&amp;rsquo;s fur so you couldn&amp;rsquo;t pull it directly out. The same situation applied for our digging tools and the 4Runner. I have already visited the car wash a few times and there is still clay caked into my wheel wells despite the direct application of the power washing sprayer nozzle. It&amp;rsquo;ll certainly take a few more car washes to get it all off.&lt;/p&gt;</description></item><item><title>Garage Innovators</title><link>https://rb.ax/blog/garage-innovators/</link><pubDate>Sat, 12 Nov 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/garage-innovators/</guid><description>&lt;p&gt;&lt;figure aria-label="3D printers in the LabOps Laboratory"&gt;
 &lt;img
 alt="3D printers in the LabOps Laboratory"
 title="3D printers in the LabOps Laboratory"
 width="1440"
 height="1200"srcset="https://rb.ax/blog/garage-innovators/labops-dashmount-11-featured_hu_1586f77405d018cf.webp 480w, https://rb.ax/blog/garage-innovators/labops-dashmount-11-featured_hu_5ffcd29cf8b750d1.webp 768w, https://rb.ax/blog/garage-innovators/labops-dashmount-11-featured_hu_2eb429ea040bf1fc.webp 1024w, https://rb.ax/blog/garage-innovators/labops-dashmount-11-featured_hu_9f2f1df82b4d325.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/labops-dashmount-11-featured_hu_ed8d3a29ae56f124.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;3D printers in the LabOps Laboratory&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This article was later published on &lt;a href="https://trail4runner.com/2022/12/13/small-businesses-start-ups-5th-gen-4runner/"&gt;Trail4Runner.com&lt;/a&gt; on December 13, 2022. All images are owned by the respective individuals.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Have you ever worked on your 4Runner and an idea for a modification popped into your head? Perhaps something that would make your life easier or solve a unique problem? If so, consider yourself a junior member of the inventor’s club. In this article, we want to highlight five members of this club who went one step further and brought their simple yet effective custom 5th Gen 4Runner products to the community.&lt;/p&gt;
&lt;p&gt;Taking your idea to the next step might seem formidable, but there’s never been a better time to do so. There are 3D printers available for just a few hundred dollars and almost limitless YouTube videos to soak up whatever sweet knowledge you need. Not only can you order entirely custom-printed circuit boards in as little as 24 hours, but you can also establish an online store reaching basically anyone in just a few clicks (or taps).&lt;/p&gt;
&lt;p&gt;These modern tools have made the development of an idea into a product much easier. However, the road is still long and full of hurdles, setbacks, and sometimes even entirely alternative paths. A major theme shared by all of the folks listed in this article is that it’s critical to be resilient during the long process of developing your invention into a viable product.&lt;/p&gt;
&lt;p&gt;Your 3D-printed product might perform admirably in Northern California but become brittle in the extreme winters of Canada or warped from the hellfire of summer in Arizona. No matter the issue, you will have to adapt and overcome it while still pushing forward.&lt;/p&gt;
&lt;p&gt;This isn’t to say being an inventor is all doom and gloom. Taking an abstract concept in your head and physically forming it into an object another human being will pay you money for is a major milestone. It’s extremely difficult but incredibly rewarding!&lt;/p&gt;
&lt;p&gt;To help others that are on this journey, we asked these inventors for any insight and knowledge that they could offer to the next great creator out there.&lt;/p&gt;
&lt;h2 id="1-lab-ops-gear-dash-mount-by-john"&gt;&lt;a href="#1-lab-ops-gear-dash-mount-by-john"&gt;1. &lt;a href="https://www.instagram.com/labopsgear/"&gt;Lab Ops Gear Dash Mount&lt;/a&gt; by John&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;figure aria-label="Early version of a 3D printed Labops dashmount"&gt;
 &lt;img
 alt="Early version of a 3D printed Labops dashmount"
 title="Early version of a 3D printed Labops dashmount"
 width="1440"
 height="1081"srcset="https://rb.ax/blog/garage-innovators/labops-dashmount-4_hu_4ca3ad7c05b7760f.webp 480w, https://rb.ax/blog/garage-innovators/labops-dashmount-4_hu_82ac69d6fc1ca6e0.webp 768w, https://rb.ax/blog/garage-innovators/labops-dashmount-4_hu_7ae254b651f64908.webp 1024w, https://rb.ax/blog/garage-innovators/labops-dashmount-4_hu_f0ff489f4d0a599a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/labops-dashmount-4_hu_aeecb8b11392199a.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Early version of a 3D printed Labops dashmount&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Our first product is a very subtle dashboard mount, which looks incredibly OEM+. This was entirely the goal of the inventor, John, and his company, &lt;a href="https://trail4runner.com/2022/11/28/labops-gear-dash-mount-v2-review-5th-gen-4runner/"&gt;LabOps Gear, maker of the non-drill dash mount&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;He wasn’t really a fan of drilling his dash and the overly wide size of traditional mounts like the &lt;a href="https://trail4runner.com/2020/08/12/ics-fabrication-4runner-dash-mount/"&gt;ICS Fab&lt;/a&gt; or &lt;a href="https://trail4runner.com/2018/05/04/t4rpam-dash-mount/"&gt;Expedition Essentials&lt;/a&gt; but still needed a solution to mount his phone and gadgets. While cleaning his 4Runner one day, he noticed a separate piece of the dashboard trim just in front of the digital clock. After seeing that, he started to fabricate a piece that would fit. About eight versions later the first usable prototype worked surprisingly well.&lt;/p&gt;
&lt;p&gt;Through word of mouth, his product became a hot commodity. John bought two more 3D printers to keep up with demand since each mount took about 14 hours to print. Even still, demand continued to grow and John started to explore the possibility of creating an injection-molded model of his mount.&lt;/p&gt;
&lt;p&gt;Transitioning from a 3D printed mount to injection molded introduced a variety of engineering issues. John had to learn about injection flow patterns and a variety of other hurdles to overcome. In the end, changing over to an injection molded model was better since it had more structural integrity despite having less width in certain parts of the mount.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Injection molded compared to 3D printed"&gt;
 &lt;img
 alt="Injection molded compared to 3D printed"
 title="Injection molded compared to 3D printed"
 width="1440"
 height="1081"srcset="https://rb.ax/blog/garage-innovators/labops-dashmount-1_hu_a682df8f84906e77.webp 480w, https://rb.ax/blog/garage-innovators/labops-dashmount-1_hu_2745b9a0939a5304.webp 768w, https://rb.ax/blog/garage-innovators/labops-dashmount-1_hu_a83b05bdf6e600b3.webp 1024w, https://rb.ax/blog/garage-innovators/labops-dashmount-1_hu_f8b0ff5b4b243101.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/labops-dashmount-1_hu_62f2df8ea4f64e2.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Injection molded compared to 3D printed&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;John, who has a Ph.D. in Biochemistry, is no stranger to the prototyping and engineering process of developing a solution. However, much of the work involved with designing the dashboard mount in CAD software was entirely new to him.&lt;/p&gt;
&lt;p&gt;His only regret was not starting with professional CAD software at the beginning. After transitioning from freeware CAD software he had to re-learn all of the fundamentals again, which took a significant amount of time. Professional CAD software is by no means cheap but there might be alternatives available such as education discounts or classes at your local community college that come with a software license.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Being a new vendor in the overlanding community has been surprisingly pleasant for John. He shared that there has been a general willingness to accept new products and ideas. In addition, people have been incredibly patient and tolerant of delays while John and LabOps Gear have grown and adapted to the higher product demand; all while transitioning from a 3D printed version to an injection-molded dashboard mount.&lt;/p&gt;
&lt;p&gt;John said he attributed this to the innate quality of people who enjoy the outdoors and the camaraderie that goes along with it.&lt;/p&gt;
&lt;h2 id="2-extended-fuse-cover-by-minh"&gt;&lt;a href="#2-extended-fuse-cover-by-minh"&gt;2. &lt;a href="https://www.instagram.com/4runner.tx/"&gt;Extended Fuse Cover&lt;/a&gt; by Minh&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;figure aria-label="The Extended Fuse Cover accomodates extra room for many 4Runner electrical modification connections"&gt;
 &lt;img
 alt="The Extended Fuse Cover accomodates extra room for many 4Runner electrical modification connections"
 title="The Extended Fuse Cover accomodates extra room for many 4Runner electrical modification connections"
 width="1440"
 height="1152"srcset="https://rb.ax/blog/garage-innovators/extended-fuse-cover-6_hu_1fe8530e51c6c8b2.webp 480w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-6_hu_a6ca0b4afeff98de.webp 768w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-6_hu_3ab093dca2295ab8.webp 1024w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-6_hu_b9ef3125ad78a075.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/extended-fuse-cover-6_hu_eb9d6c4d31945635.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The Extended Fuse Cover accomodates extra room for many 4Runner electrical modification connections&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Many of our 4Runners have enough added modifications to make our cabin fuse box a delicious spaghetti bowl of electrical taps, splices, and add-a-fuses.&lt;/p&gt;
&lt;p&gt;The resulting blob of wires usually prevents the OEM fuse cover from fitting back on and so it usually gets left off. There are many aftermarket extended fuse covers available but inventor Minh found they really weren’t up to his exacting standards.&lt;/p&gt;
&lt;p&gt;While trying to develop an improved version, he tucked away his OEM cover with one of the prototypes. At this moment he realized mounting the OEM cover directly onto the extended cover was the best way to keep track of it and display the relevant fuse diagram.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Early challenges with 3D printing"&gt;
 &lt;img
 alt="Early challenges with 3D printing"
 title="Early challenges with 3D printing"
 width="1440"
 height="1200"srcset="https://rb.ax/blog/garage-innovators/extended-fuse-cover-4_hu_d3121887fcfefcf6.webp 480w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-4_hu_18fd874131e7d3f8.webp 768w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-4_hu_18cb6b7f7565da53.webp 1024w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-4_hu_f77a5dedc17f37f.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/extended-fuse-cover-4_hu_e19fb2ef1c3bf21.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Early challenges with 3D printing&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Combining the OEM and extended fuse covers together forced him to redraft his first prototype almost completely. Minh shared that he kind of regrets spending so much time on the first version since it was scrapped entirely anyway. Hindsight is 20/20 and had Minh not spent so much time on that first draft, who knows if he would have had the same realization.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Minh&amp;rsquo;s 3D printing station"&gt;
 &lt;img
 alt="Minh’s 3D printing station"
 title="Minh&amp;rsquo;s 3D printing station"
 width="1440"
 height="1200"srcset="https://rb.ax/blog/garage-innovators/extended-fuse-cover-1_hu_a02d28705732b105.webp 480w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-1_hu_aedf63cb653ce9de.webp 768w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-1_hu_aef359cb09774607.webp 1024w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-1_hu_50352c1ad4d39af7.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/extended-fuse-cover-1_hu_521350b5ffad09c5.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Minh&amp;rsquo;s 3D printing station&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Minh is rather humble and was skeptical if a single invention made him actually an inventor. However, if you keep up with his Instagram or TikTok you can see the level of tinkering, innovation, and prototyping transparency easily puts him in this category.&lt;/p&gt;
&lt;p&gt;His discussions about the virtues of PETG plastics over ABS and PLA for rigidity, durability, and heat resistance are both fascinating and educational. It is rare to see someone so open to publicly sharing their design issues and work process while engaging directly in long conversations with strangers.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Perseverance is invaluable in the face of technical challenges"&gt;
 &lt;img
 alt="Perseverance is invaluable in the face of technical challenges"
 title="Perseverance is invaluable in the face of technical challenges"
 width="1440"
 height="1200"srcset="https://rb.ax/blog/garage-innovators/extended-fuse-cover-5_hu_11422410dd298e50.webp 480w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-5_hu_3faf5974f9475118.webp 768w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-5_hu_550d911611d9d626.webp 1024w, https://rb.ax/blog/garage-innovators/extended-fuse-cover-5_hu_6d31449052776d0b.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/extended-fuse-cover-5_hu_113616366043e756.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Perseverance is invaluable in the face of technical challenges&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;To carry on a theme, Minh was also direct about being resilient and open during the development process. After the major re-work of his first 2010-2019 extended fuse cover prototype, Minh went through a further 56 revisions, 12 of which were major design changes.&lt;/p&gt;
&lt;p&gt;Additionally, there were some close to Minh who shared skepticism about spending so much time on something as benign and simple as a fuse cover. Yet, through all of this, he was able to turn a healthy profit. This has only fueled his workshop’s expansion and desire to further develop custom 5th Gen 4Runner products.&lt;/p&gt;
&lt;h2 id="3-wifey-air-system-by-al"&gt;&lt;a href="#3-wifey-air-system-by-al"&gt;3. &lt;a href="https://sponsoredbywifey.com/2018/01/08/arb-dual-air-compressor-system/"&gt;Wifey Air System&lt;/a&gt; by Al&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;figure aria-label="The Wifey Air System"&gt;
 &lt;img
 alt="The Wifey Air System"
 title="The Wifey Air System"
 width="1440"
 height="962"srcset="https://rb.ax/blog/garage-innovators/wifey-air-system-1_hu_51de399e17f86ae1.webp 480w, https://rb.ax/blog/garage-innovators/wifey-air-system-1_hu_df0c0398f51cffef.webp 768w, https://rb.ax/blog/garage-innovators/wifey-air-system-1_hu_6c5137290ca472bb.webp 1024w, https://rb.ax/blog/garage-innovators/wifey-air-system-1_hu_fce49f905184bd9b.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/wifey-air-system-1_hu_4cc35b5b52069955.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The Wifey Air System&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;While Al enjoys wheelin’ with his friends almost every weekend, he didn’t particularly enjoy the task of airing up and down. As a result, he bought one of those four-way hoses to do it more efficiently. He shared that his first time using it was also his last.&lt;/p&gt;
&lt;p&gt;The whole process of untangling the hoses, laying them out for all four tires only to do the same in reverse once finished seemed like a lot of tedious work. Not to mention all the associated gear taking up a storage spot in your vehicle that had to be easily accessible.&lt;/p&gt;
&lt;p&gt;Looking for built-in hose systems lead Al to a lot of dead ends. Eventually, Al came across one company that seemed to share his vision for a hose system. He eagerly emailed them but with no response after a few days, he gave them a call that went unanswered. Al found out that this company went out of business so his ideal hose setup was still unavailable anywhere on the market. The only thing left to do was to make it himself.&lt;/p&gt;
&lt;p&gt;The first week was a flurry of online orders for fittings, hoses, and quick connectors. Excited about the potential of sharing a working prototype with his friends on a weekend trip, Al worked a few late nights getting everything assembled and working.&lt;/p&gt;
&lt;p&gt;The result was a solid first prototype that even lasted until he later sold his 4Runner. The inaugural Wifey Air System had everyone gathering around his 4Runner to see it working.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The initial Wifey Air System setup"&gt;
 &lt;img
 alt="The initial Wifey Air System setup"
 title="The initial Wifey Air System setup"
 width="1440"
 height="809"srcset="https://rb.ax/blog/garage-innovators/wifey-air-system-4_hu_dc6d0210f406a77f.webp 480w, https://rb.ax/blog/garage-innovators/wifey-air-system-4_hu_919fe1b9b20fe148.webp 768w, https://rb.ax/blog/garage-innovators/wifey-air-system-4_hu_41546afad1e2063.webp 1024w, https://rb.ax/blog/garage-innovators/wifey-air-system-4_hu_aa5442f6ccd530df.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/wifey-air-system-4_hu_e0510786f085306a.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The initial Wifey Air System setup&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Al wasn’t in it for the money. He had just built an awesome system that was easy to use and tucked neatly away under the vehicle; so why not share it with everyone? He did just that and you can even see a full parts list on some of his older YouTube videos. Even with a full parts list, there were a few people who didn’t have the time or interest in assembling it themselves. Al built those people kits on occasion but his overall order volume wasn’t high.&lt;/p&gt;
&lt;p&gt;It wasn’t until a prominent fabrication company reached out and offered to build his built-in air system as a purchasable kit that Al started getting serious. At that time, he had noticed a few exact clones of his air system being offered on the market. If people wanted to pay for a pre-made kit with his publicly available parts list, then why couldn’t he make some money too?&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A later iteration of the Wifey Air System"&gt;
 &lt;img
 alt="A later iteration of the Wifey Air System"
 title="A later iteration of the Wifey Air System"
 width="1440"
 height="1081"srcset="https://rb.ax/blog/garage-innovators/wifey-air-system-3_hu_fe48877b019808f3.webp 480w, https://rb.ax/blog/garage-innovators/wifey-air-system-3_hu_337470167bd95b69.webp 768w, https://rb.ax/blog/garage-innovators/wifey-air-system-3_hu_702c628eeac525e8.webp 1024w, https://rb.ax/blog/garage-innovators/wifey-air-system-3_hu_2a34b03897bfd2d3.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/wifey-air-system-3_hu_bfcfbb9308784557.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A later iteration of the Wifey Air System&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The evolution of the Wifey Air System from open source to being offered as a product is a testament to consumer demand. There is a distinct possibility of sharing your secret recipe with the world while still being able to offer a product. The real question is if Al is still sponsored by wifey or if this built-in air system has started to cover the bills.&lt;/p&gt;
&lt;h2 id="4-sd-off-road-mount-by-derek"&gt;&lt;a href="#4-sd-off-road-mount-by-derek"&gt;4. &lt;a href="https://www.instagram.com/sdoffroadmt/"&gt;SD Off Road Mount&lt;/a&gt; by Derek&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;&lt;figure aria-label="A brilliant aluminum plate to consolidate several systems in your 4Runner&amp;rsquo;s engine bay"&gt;
 &lt;img
 alt="A brilliant aluminum plate to consolidate several systems in your 4Runner’s engine bay"
 title="A brilliant aluminum plate to consolidate several systems in your 4Runner&amp;rsquo;s engine bay"
 width="1440"
 height="1029"srcset="https://rb.ax/blog/garage-innovators/sdoffroad-mt-3_hu_ca497d85dff6b9ce.webp 480w, https://rb.ax/blog/garage-innovators/sdoffroad-mt-3_hu_708024dfc968994b.webp 768w, https://rb.ax/blog/garage-innovators/sdoffroad-mt-3_hu_5006ff85236f6a14.webp 1024w, https://rb.ax/blog/garage-innovators/sdoffroad-mt-3_hu_f56b7fc7b93f8ba8.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/sdoffroad-mt-3_hu_5273a2034d7e8354.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A brilliant aluminum plate to consolidate several systems in your 4Runner&amp;rsquo;s engine bay&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;When I was looking to start the foundation of my 4Runner’s electrical modifications last year, there were a ton of options for mounting a solid-state switch in my engine bay.&lt;/p&gt;
&lt;p&gt;I was pretty greedy and wanted my onboard air compressor, switches, fuse block, and bus bar to all fit together on the same tray. However, I couldn’t find a product that had that much real estate. Sure, there were many that combined a few of those components together but none I saw that did everything. This is especially true for the Switch Pros’ requirement of being mounted vertically for warranty purposes.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="SD Off Road Mount installed and being wired"&gt;
 &lt;img
 alt="SD Off Road Mount installed and being wired"
 title="SD Off Road Mount installed and being wired"
 width="1440"
 height="1029"srcset="https://rb.ax/blog/garage-innovators/sdoffroad-mt-2_hu_9c9daa0e24a8fdd4.webp 480w, https://rb.ax/blog/garage-innovators/sdoffroad-mt-2_hu_86ba76f60ade5fe0.webp 768w, https://rb.ax/blog/garage-innovators/sdoffroad-mt-2_hu_abd5f5fe281d0019.webp 1024w, https://rb.ax/blog/garage-innovators/sdoffroad-mt-2_hu_97a14b6fd57f7a11.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/garage-innovators/sdoffroad-mt-2_hu_cd3c8723f3b87e90.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;SD Off Road Mount installed and being wired&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;It took me a while, but I eventually came across the SD Offroad Mount. Operating directly out of his Instagram page rather than a website is a bit unorthodox. However, it makes sense for a single man with a garage workshop.&lt;/p&gt;
&lt;p&gt;In a conversation with Derek in late 2021, he acknowledged being just one guy in a huge off-roading world with a successful product because people believed in what they saw.&lt;/p&gt;
&lt;h2 id="5-anytime-backup-camera-by-brian"&gt;&lt;a href="#5-anytime-backup-camera-by-brian"&gt;5. &lt;a href="https://www.anytimebackupcamera.com/"&gt;Anytime Backup Camera&lt;/a&gt; by Brian&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Anytime Backup Camera: Check Price
Our last innovator highlight is a product you would think could come stock directly from Toyota. The &lt;a href="https://trail4runner.com/2019/08/16/anytime-backup-front-camera/"&gt;Anytime Backup and Front Camera system (updated version)&lt;/a&gt; let you view your OEM backup camera whenever you want and adds a front camera to boot.&lt;/p&gt;
&lt;p&gt;Brian has broken the fascist tyranny of the reverse gear over backup cameras everywhere! Using this camera during off-roading can prove invaluable for checking approach angles or how close that sharp rock is getting.&lt;/p&gt;
&lt;p&gt;The original motivation for putting together this wiring kit stemmed from Brian’s goal of not messing with the stock wiring of his newly purchased 4Runner. Why modify the core of your vehicle’s electrical system when with a few clicks you can get enough wiring to shame a 1999 Radio Shack?&lt;/p&gt;
&lt;h2 id="final-thoughts"&gt;&lt;a href="#final-thoughts"&gt;Final Thoughts&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Custom 5th Gen 4Runner products play a large role in the mods world. Not every large company can allocate the time and money for what some would consider niche products. This is where inventors fill the void for the community’s needs.&lt;/p&gt;
&lt;p&gt;Some of the folks listed in this article had engineering backgrounds; one even had a Ph.D. However, as shared at the beginning of this article, the amount of information available to us is almost boundless. If you have an idea for something you don’t know how to build, the internet can teach you so many things!&lt;/p&gt;
&lt;p&gt;Everyone listed here has a day job and did most of their learning in their spare time. You don’t need to spend hours every day either, take your time, and that knowledge will compound. There isn’t really anything that you couldn’t eventually master or at the very least become competent with.&lt;/p&gt;
&lt;p&gt;While there might be really niche fields that don’t have thousands of video tutorials, you can be assured that there is some content out there, somewhere.&lt;/p&gt;</description></item><item><title>Running Kings Peak</title><link>https://rb.ax/blog/running-kings-peak/</link><pubDate>Sun, 28 Aug 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/running-kings-peak/</guid><description>&lt;p&gt;&lt;figure aria-label="On the highest point in Utah but only halfway done for the day."&gt;
 &lt;img
 alt="On the highest point in Utah but only halfway done for the day."
 title="On the highest point in Utah but only halfway done for the day."
 width="1440"
 height="1081"srcset="https://rb.ax/blog/running-kings-peak/summit-featured_hu_1d1b7148e1cad4be.webp 480w, https://rb.ax/blog/running-kings-peak/summit-featured_hu_30cf1af4c73f98a9.webp 768w, https://rb.ax/blog/running-kings-peak/summit-featured_hu_889e618f43e2a471.webp 1024w, https://rb.ax/blog/running-kings-peak/summit-featured_hu_6521ceee8a00215b.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/running-kings-peak/summit-featured_hu_c7deab9b1a8add15.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;On the highest point in Utah but only halfway done for the day.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;While I have avoided formal running races so far this year I was still drawn to running iconic natural features of my surrounding area. Some of these locations include the internationally known Grand Canyon in a brutal rim-to-rim-to-rim single day ultra marathon. I might attempt this sometime in 2023 if I can maintain consistent training. Another nearby feature on my list was the highest peak in the state of Utah, Kings Peak. Name after Clarence King&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;, I am not sure if the title of the peak should be possessive or simply plural. Regardless, the long approach and high altitude makes this mountain formidable to digest in a single day.&lt;/p&gt;
&lt;p&gt;The start of the most commonly used trail to get to Kings Peak is from Henry&amp;rsquo;s Fork trail head. Depending on your origin you might approach this location from the North or the West. A work colleague that lives in southern Salt Lake City told me they reached the trail head from the West by Highway 150 and then Forest Road 58, 73, 17, and finally 77. My source location was farther north so I arrived at the trail head from the North by passing through Evanston, Fort Bridger, Mountain View, Lonetree, and finally over Forest Road 77.&lt;/p&gt;
&lt;h3 id="sleep"&gt;&lt;a href="#sleep"&gt;Sleep&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;There are camping sites at Henry&amp;rsquo;s Fork trail head and dispersed options abound but my last minute decision was to simply sleep in my car as close as possible to the trail head. I had actually re-mounted my roof top tent the day prior and planned on simply &lt;em&gt;stealth&lt;/em&gt; sleeping in the parking lot. After arriving at about 10:30 PM I realized my gamble would be perfectly fine as I could see a number of converted sprinter vans in the parking lot with lights on inside and some moderate activity in the parking lot. It seemed mostly just bathroom visits as people were getting ready to go to sleep. In retrospect I assume this kind of parking lot camping was normal for these self-contained camper vans but it was pretty unfamiliar to me. After situating myself I quickly opened up my tent and went to bed with plans to get up at around 5:45 AM.&lt;/p&gt;
&lt;p&gt;It was certainly my own idiocy for sleeping fifty feet from the trail head that funneled dozens of people from the civilized world of automobiles into the backpacking nirvana of the Northern Uintas. Feel free to dismiss this next section as the whining of someone that didn&amp;rsquo;t concern themselves with logical deduction. To be fair, I can understand people walking by in the noisy gravel parking lot, car doors opening or closing, or bathroom doors creaking, but I never expected to hear Led Zeppelin&amp;rsquo;s &lt;em&gt;Black Dog&lt;/em&gt; at a quarter after two in the morning blasting from a newly arrived car just a few slots down. Staying true to my passive aggressive personality I simply chose to climb out my tent for a bathroom break in the hopes that they would see there were actual people sleeping nearby. Either this maneuver to the bathroom worked or my timing simply meshed with their bedtime and the music faded out.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Early portion of Kings Peak Trail"&gt;
 &lt;img
 alt="Early portion of Kings Peak Trail"
 title="Early portion of Kings Peak Trail"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/running-kings-peak/forest_hu_88a6afcbfd366464.webp 480w, https://rb.ax/blog/running-kings-peak/forest_hu_fa9d6fd3b73de6fb.webp 768w, https://rb.ax/blog/running-kings-peak/forest_hu_aa0e6fc3b096d99e.webp 1024w, https://rb.ax/blog/running-kings-peak/forest_hu_477cb3eb19d3dd71.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/running-kings-peak/forest_hu_52ed6a3531544d19.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Early portion of Kings Peak Trail&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The peace was short lived until a bit after 4 AM when this rock-n-roll car had their friends arrive to start their hike to celebrate a group member&amp;rsquo;s birthday. This was another oversight on my part because many people who do Kings Peak in a day start at about four or five in the morning in order to summit prior to afternoon thunderstorms. You would be safe to write off the hours of four to six in the morning near the trail head simply due to the traffic of people and cars. This might be relevant information to one such as myself who is notoriously lazy in the morning and sleeps as late as possible in all situations. While I realize most of these encounters are my own stupid fault it might bring some clarity to future travelers and their plans for attempting Kings Peak.&lt;/p&gt;
&lt;h3 id="morning-trail"&gt;&lt;a href="#morning-trail"&gt;Morning Trail&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Dragged into consciousness in the dark and cold morning I finally got up and ready at a little past six. The morning temperature was brisk in the low forties yet the sky was beginning to lighten up with the rising sun. My starting time was at 6:50 and the elevation in the parking lot sat at approximately 9,446 feet. Much of the first six miles of the trail winds along the river over small foothills with scraggly rocks dotting the dirt path. These weren&amp;rsquo;t a problem in the morning when I was fresh but became a huge problem later on in the day when my legs were tired and my coordination lagged. My pace for this first portion varied between 12:08 to 14:14 minutes per mile. The terrain here is very forgiving to a slow jog and I only slowed down when it became too rocky.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Henry&amp;rsquo;s Fork River makeshift bridge"&gt;
 &lt;img
 alt="Henry’s Fork River makeshift bridge"
 title="Henry&amp;rsquo;s Fork River makeshift bridge"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/running-kings-peak/bridge_hu_86c3ae3c8c46cace.webp 480w, https://rb.ax/blog/running-kings-peak/bridge_hu_1bfd6e7c76f214b7.webp 768w, https://rb.ax/blog/running-kings-peak/bridge_hu_e315eb76bc011333.webp 1024w, https://rb.ax/blog/running-kings-peak/bridge_hu_6ac43b5d273cdca8.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/running-kings-peak/bridge_hu_15b823c98b31eb31.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Henry&amp;rsquo;s Fork River makeshift bridge&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;At about the mid-point of mile five you cross over the river in an endearing bridge and the terrain starts to open up into high mountain meadows. The initial section of the run has a certain mountain beauty but is rather claustrophobic. It is only until you get higher up that you see the grandness of the Uintas&amp;rsquo; alpine terrain. There aren&amp;rsquo;t any jagged snow covered peaks but the lack of trees and the unique rock gives it a very different appearance. My speed at this part of the run was slightly slower since I began to feel the impact of the higher altitude. It came in at around 12:44 to 18:46 minutes per mile.&lt;/p&gt;
&lt;p&gt;Between mile seven and the first part of ten is a treasure trove of camping locations that backpackers gobbled up. Passing by them early in the morning as they were preparing breakfast and sitting by their campfires was very picturesque. I met a few on the trail that had camped in this area and I must admit it would be tempting to utilize the base camp method in the future. Halving the total distance of the trail would have made it immensely enjoyable. However, that would come at a slight cost of lugging all the required equipment up to said backpacking spot. In any case I think future attempts by me on this trail would either require additional training to make it easier to relying on a base camp to tamper down the physical toll.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Near Dollar Lake"&gt;
 &lt;img
 alt="Near Dollar Lake"
 title="Near Dollar Lake"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/running-kings-peak/alpine-meadow_hu_7f3f3d87df9570cb.webp 480w, https://rb.ax/blog/running-kings-peak/alpine-meadow_hu_47510242d7c37dd2.webp 768w, https://rb.ax/blog/running-kings-peak/alpine-meadow_hu_4f60648be7d871ac.webp 1024w, https://rb.ax/blog/running-kings-peak/alpine-meadow_hu_c87c278b17971a1a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/running-kings-peak/alpine-meadow_hu_a81c916291496a40.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Near Dollar Lake&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;My pacing decision in the morning ascent was overly aggressive. The thought process behind this mindset was that this was my yearly race and required a certain gusto to be invested in my effort. Such thinking was misplaced due to not resting my body over a week or two with a taper period. This is required in all training plans in order to push your body without injury. Additionally, my morning nutritional foundation was sorely lacking. In normal circumstances I consume a meal replacement shake (Huel) with approximately four to eight hundred calories about an hour before starting. This fueling method has proven critical for me in approaching long weekend runs with enough stamina to maintain a certain pace throughout. But I skipped this particular breakfast meal in the hopes of delaying bowel movement over the course of the day. The fear was that once above tree line there would be no source of privacy. This was pretty juvenile of me and should not have been a concern. It would have been much wiser to simply stay the course with my developed long run habits.&lt;/p&gt;
&lt;h3 id="shortcuts"&gt;&lt;a href="#shortcuts"&gt;Shortcuts&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Towards the end of mile ten you approach the wide saddle of Gunsight Pass at about 11,881 feet. The slog up this steep section is just a preparatory portion to sort of wake you up from the rolling hills of the previous ten miles. Once at the top you can either take the normal Gunsight Trail or do a bit of cheating with the Dome Peak Cutoff Trail. I took the Dome Peak Cutoff trail as it stayed at the higher elevation as you taking the bend around Dome Peak. It doesn&amp;rsquo;t make sense to me to take Gunsight Trail back down in altitude to simply waste the calories you just burned ascending the saddle. There is a large caveat with taking the Cutoff Trail due to the rough, rocky, and steep terrain. The trail itself is also not specifically defined so I lost it several times myself. But overall, the shortcut saves you several miles and certainly several hundred feet of elevation loss and gain.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Approaching Gunsight Pass Saddle"&gt;
 &lt;img
 alt="Approaching Gunsight Pass Saddle"
 title="Approaching Gunsight Pass Saddle"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/running-kings-peak/saddle_hu_5230cf904796186.webp 480w, https://rb.ax/blog/running-kings-peak/saddle_hu_e53688d8e3c4cb73.webp 768w, https://rb.ax/blog/running-kings-peak/saddle_hu_cd7a9a02906411af.webp 1024w, https://rb.ax/blog/running-kings-peak/saddle_hu_bccca5f189ad4b35.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/running-kings-peak/saddle_hu_8436bfdf6ef9ee17.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Approaching Gunsight Pass Saddle&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Once around the bend of Dome Peak there is a shallow valley between yourself and the beginning of the Kings Peak summit. Some stick to the Cutoff Trail at the base of Dome Peak in an effort to maintain altitude as you approach the Toilet Bowl area. This is exactly what I did in my ascent but regret it in retrospect due to the extremely rocky nature of the path. It does indeed accomplish the goal of maintaining altitude since you basically stay at the same height of the Gunsight Pass saddle. But at mile 12 and with the summit shortly ahead it would be best to save your legs. A better path would be to descend slightly and cut across the least rocky part of the valley. It will take you down in altitude a bit but will save your legs from rock hopping along the valley edge. Once across the valley you can merge with the normal Uinta Highline Trail that is well defined and mostly rock free. Due to taking the rocky and steep path my pace continued to decline with the higher altitude at between 18:45 to 27:05 minutes per mile.&lt;/p&gt;
&lt;h3 id="rock-scree-ascension"&gt;&lt;a href="#rock-scree-ascension"&gt;Rock Scree Ascension&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;After reaching the base of the summit I took a break since it was protected from the wind. There are spots along the spine trail that are shielded from the mountain winds but I wanted to keep my momentum all the way to the peak. As with other rocky parts of this area you can easily lose the trail because there is no way for a worn out pathway to develop. I relied heavily on taking chronic pauses to both catch my breath and also look around for the most logical footpath forward. The pausing approach to the ascent became invaluable with the rising altitude of the trail. It became very apparent after surpassing 11,200 feet while approaching the saddle and got worse with every step. In some segments I would over exert myself and a massive headache would ensue, as if I was holding my breath while running up a flight of stairs. In turn, I would take a quick break and the feeling would subside.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Endless rock scree on Kings Peak Ridge"&gt;
 &lt;img
 alt="Endless rock scree on Kings Peak Ridge"
 title="Endless rock scree on Kings Peak Ridge"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/running-kings-peak/kings-peak-ridge_hu_1a62a31b8db470a6.webp 480w, https://rb.ax/blog/running-kings-peak/kings-peak-ridge_hu_a715b96fe90cb2b8.webp 768w, https://rb.ax/blog/running-kings-peak/kings-peak-ridge_hu_f138c47deb15901c.webp 1024w, https://rb.ax/blog/running-kings-peak/kings-peak-ridge_hu_958b15c6fa0a841f.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/running-kings-peak/kings-peak-ridge_hu_f17f64c4a8404984.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Endless rock scree on Kings Peak Ridge&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The final ascent of the summit was rather drawn out. The summit is quite far to the south from where you start on the spine and is misleading in perceived distance. My pace suffered greatly here with the rock hopping and the incredible altitude of 13,528 feet. It brought a resulting 33:55 to 50:53 minutes per mile from the twelfth and fifteenth mile. At the top the views were pretty grand in all directions. I was lucky enough to summit at a time when the weather was sunny, clear, and with only isolated gusts of wind. What amazed me most about the summit was the fact that the wooden hand held sign remained after so many years. I would imagine the peak is subject to extreme weather events on a regular basis and somehow it just sits there tucked away between some rocks.&lt;/p&gt;
&lt;p&gt;The descent was an attempt at another shortcut, which failed. Rather than following the spine trail I tried to cut down the summit at an aggressive slope but was thwarted by an ocean of loose rocks and small boulders. My progress was slow and frustrating and I would consider this portion of the trail the most frustrating. If you go too fast you could easily fall and break a variety of things on your body. Not to mention the incredible distance away from civilization you are it near the summit and the resulting cost of medical rescue. Certainly much more prudent to take it slow and steady over the sea of rocks. For the descent miles before reaching the saddle I only managed a pace of approximately thirty minutes per mile.&lt;/p&gt;
&lt;h3 id="slow-descent"&gt;&lt;a href="#slow-descent"&gt;Slow Descent&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Following the descent of the Gunsight Pass saddle my pace picked back up again in an effort to achieve my goal time of seven hours from car to car. I was able to keep this last ounce of effort going between miles sixteen to nineteen at 10:07 to 14:57 minutes per mile. Towards the middle endpoint of this run it became very apparent that my legs and body were extremely exhausted. If I continued to attempt to run it would only be a matter of time before I would wipe out. The risk was due to the previously mentioned scraggly rocks dotting the path of the lower trail miles. Small sections would be bare dirt and would invite a slow easy jog without question. Yet these bundles of rocks would show up at a whim and create a dangerous area of uneven ground ripe for twisting an ankle or tripping me up. I can remember in about three instances where I rolled my ankle dangerously close to a serious injury due to an errant rock my tired legs couldn&amp;rsquo;t manage past.&lt;/p&gt;
&lt;p&gt;The fear of injuring myself was the core reason for slowing down to a walk towards the twilight of this run. Yet there was another tier of exhaustion that followed afterwards. At about mile nineteen I hit a level of tiredness I only experience every few years. In this situation it was a combination of lack of calories, distance, altitude, and excessive rock hopping. It made everything seem monumental, such as walking over a small hill and the annoyance of trying to walk over rocky sections of the trail. In other ways it also brought to mind the incredible physical limits I had put my body through but in some degree of insanity it was still going. I didn&amp;rsquo;t find it pleasurable in any way but I certainly was amazed at the survival like stamina a person experiences towards the end of a hard physical activity. It is frequently amazing and is a great insight into your absolute physical limitations. Power walking the last few miles gave me a pace between miles 20 to 24.73 of between 16:22 to 20:14 minutes per mile.&lt;/p&gt;
&lt;p&gt;I am pleased with my performance given that it was my first time to the area and my first time at semi-high altitude. I plan to visit the trail in the next year or two for another attempt. I would be very interested in seeing my performance after training with more altitude gains in my training runs and incorporating a really aggressive caloric intake throughout the run. I didn&amp;rsquo;t really feel pressured with water but I should have probably upped my intake over the course of the run, especially with the altitude factor.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.strava.com/activities/7717783394"&gt;Strava Activity&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;h3 id="statistics"&gt;&lt;a href="#statistics"&gt;Statistics&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Distance: 24.73 miles&lt;/li&gt;
&lt;li&gt;Moving Time: 8:01:45&lt;/li&gt;
&lt;li&gt;Elapsed Time: 8:38:09&lt;/li&gt;
&lt;li&gt;Pace: 19.28/mi&lt;/li&gt;
&lt;li&gt;Elevation Gain: 5,482 feet&lt;/li&gt;
&lt;li&gt;Calories: 3,284&lt;/li&gt;
&lt;li&gt;Humidity: 56%&lt;/li&gt;
&lt;li&gt;Wind Speed: 7.8 mi/h&lt;/li&gt;
&lt;li&gt;Wind Direction: SW&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="food--water"&gt;&lt;a href="#food--water"&gt;Food &amp;amp; Water&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;2 liters water in pack bladder&lt;/li&gt;
&lt;li&gt;1.18 liters water in front bottles (40 ounces)&lt;/li&gt;
&lt;li&gt;5 small packets of apple sauce&lt;/li&gt;
&lt;li&gt;2 Kind bars&lt;/li&gt;
&lt;li&gt;2 packets of Goldfish&lt;/li&gt;
&lt;li&gt;Saltstick electrolyte pills&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="gear"&gt;&lt;a href="#gear"&gt;Gear&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ciele Hat&lt;/li&gt;
&lt;li&gt;REI Sahara Shade Hoodie&lt;/li&gt;
&lt;li&gt;Mountain Hardwear Crater Lake T-Shirt&lt;/li&gt;
&lt;li&gt;New Balance Core Impact Running Shorts&lt;/li&gt;
&lt;li&gt;Hoka Speedgoat Shoes&lt;/li&gt;
&lt;li&gt;Feetures Socks&lt;/li&gt;
&lt;li&gt;Body Glide&lt;/li&gt;
&lt;li&gt;Black Diamond Trekking Poles&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;&lt;/li&gt;
&lt;li&gt;Arc&amp;rsquo;Teryx Norvan 14 pack&lt;/li&gt;
&lt;li&gt;Ultimate Direction 20 ounce bottles&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Kings_Peak_(Utah)"&gt;Kings Peak (Utah)&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;I didn&amp;rsquo;t actually use these the entire trip but probably should have. It is just that I don&amp;rsquo;t use them during my training runs. But it would be great to spread the effort from my legs to my upper body in steep ascent situations.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>4Runner Scuba Mod</title><link>https://rb.ax/blog/4runner-scuba-mod/</link><pubDate>Fri, 05 Aug 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/4runner-scuba-mod/</guid><description>&lt;p&gt;Mechanical engineering is a subject of fascination for me. By that I mean watching loads of Youtube videos where I&amp;rsquo;m spoon food complex topics and nothing actually hard or challenging. When our family&amp;rsquo;s vacuum died when I was a young teenager, I asked if I could take it apart to see if I could get it working again. Dissecting this seemingly dead appliance was like taking a basic engineering class. I could see at various steps how mechanical energy was transferred from belts to rotating brushes and everything else that goes along with electric motors. So when I heard about the &lt;em&gt;scuba mod&lt;/em&gt; people were doing to their 4Runner&amp;rsquo;s differential, I had to understand why it was even necessary. And not like the hours of equations my engineering roommate in college used to do. But more like a 5 minute YouTube educational video. Something much more digestible.&lt;/p&gt;
&lt;p&gt;At the most fundamental level, I found out the &lt;a href="https://www.youtube.com/watch?v=SOgoejxzF8c"&gt;purpose of a vehicle differential&lt;/a&gt;. It is basically a method for providing power to wheels that might be rotating at different speeds. For instance, going around a corner, the inside tire would rotate less than the outside tire. Something like &lt;strong&gt;N&lt;/strong&gt;left &amp;gt; &lt;strong&gt;N&lt;/strong&gt;right for a right hand turn. I vaguely remember this being a problem with toy cars I used to play with as a child. How scarred am I to have been forced through a differential-less upbringing?!&lt;/p&gt;
&lt;p&gt;This simple yet incredibly brilliant mechanism is housed in that giant steel blob between your rear tires. I&amp;rsquo;ve heard it affectionately called the differential &lt;em&gt;pumpkin&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/em&gt; housing. The encasing both protects the differential itself and also provides a container for the associated lubricant that keeps everything running smoothly. I was having a difficult time picturing the inside of a differential but &lt;a href="https://www.youtube.com/watch?v=9-yG3D3JBRs"&gt;luckily stumbled across this video that uses a clear cover where you can peak inside&lt;/a&gt;. They even show the behavior of the lubricant at 0, 15, and 30 mph. While I was watching this video I distinctly noticed that the &lt;em&gt;pumpkin&lt;/em&gt; isn&amp;rsquo;t completely full. The top half is simply empty air. When you go fast the lubricant definitely ends up everywhere inside the &lt;em&gt;pumpkin&lt;/em&gt;. But the whole thing isn&amp;rsquo;t necessarily filled to the brim like I thought it would be. Why? Because the air in the &lt;em&gt;pumpkin&lt;/em&gt; is a buffer.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Differential breather vents"&gt;
 &lt;img
 alt="Differential breather vents"
 title="Differential breather vents"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/4runner-scuba-mod/differential-breather-vents_hu_66e8a0037fb3ef65.webp 480w, https://rb.ax/blog/4runner-scuba-mod/differential-breather-vents_hu_d1ff3f9e803cedf0.webp 768w, https://rb.ax/blog/4runner-scuba-mod/differential-breather-vents_hu_5651bb37afc9ae0e.webp 1024w, https://rb.ax/blog/4runner-scuba-mod/differential-breather-vents_hu_913139201c204fc8.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/4runner-scuba-mod/differential-breather-vents_hu_a0dc6e6dc398ecef.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Differential breather vents&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Heat will be generated from moving mechanical components. For example, if I were to drive for a few hours my differential would heat up. In this case, the heat is transferred from the components of the differential gears to the lubricant, which expands in total volume and pushes extra air out of the differential housing. Once I stop driving, everything will cool off and cause the lubricant to contract, which creates a low pressure state in the housing and allows for the outside higher air pressure to push back in. This transfer of air pressure is able to happen through a differential breather or axle vent. It is basically a little vent on top of your &lt;em&gt;pumpkin&lt;/em&gt; that allows air to move and protects against minor splashes and rain water.&lt;/p&gt;
&lt;p&gt;This back and forth pressure regulation process works as the Toyota engineer gods intended until you go and do something to mess it all up. Such as crossing a river or flooring it through that deep muddy puddle. Now we have a warm piece of steel that is plunged into icy cold mountain stream water. This will rapidly cool off your differential and create a low pressure state inside the housing. If the water is deep enough or hits just right your breath/vent point could end up fully submerged and it will only be able to draw in water instead of air. It goes without saying that this is not great for your differential.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Differential vent"&gt;
 &lt;img
 alt="Differential vent"
 title="Differential vent"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/4runner-scuba-mod/differential-vent_hu_70b6bef6fee15184.webp 480w, https://rb.ax/blog/4runner-scuba-mod/differential-vent_hu_82af6e8ec21785cb.webp 768w, https://rb.ax/blog/4runner-scuba-mod/differential-vent_hu_d463f21396e6a59a.webp 1024w, https://rb.ax/blog/4runner-scuba-mod/differential-vent_hu_107f94213f6717c9.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/4runner-scuba-mod/differential-vent_hu_ec2f1823b6c5de57.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Differential vent&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;This is where the scuba modification comes in. It simply moves that vent point to somewhere higher and more protected on the vehicle. There are &lt;a href="https://www.amazon.com/ARB-170112-Differential-Breather-Kit/dp/B00QBQYNF0/ref=sr_1_1?crid=1NF3DHKW9ZOHE&amp;amp;keywords=arb+diff+breather+kit+4runner&amp;amp;sprefix=arb+diff+breather+kit+4runner%2Caps%2C115&amp;amp;sr=8-1"&gt;all-in-one kits available from ARB&lt;/a&gt; and you can see a detailed installation log &lt;a href="https://www.toyota-4runner.org/5th-gen-t4rs/215741-rear-differential-breather-mod-dummies.html"&gt;here&lt;/a&gt;. Yet the type of plastic the ARB kit uses isn&amp;rsquo;t ideal in climates where it frequently gets cold. The material will end up becoming brittle and break. This is especially true in the rear area where the plastic line will constantly flex to accommodate vertical travel of the axle in relation to the chassis. Why not instead use something like a fuel line rubber hose, which has a proven track record of being used on vehicles in all types of climates?&lt;/p&gt;
&lt;p&gt;Below is a list of parts needed for moving the differential and e-locker breather points. The main guide I followed was this &lt;a href="https://www.youtube.com/watch?v=1MFW8YK9dx0"&gt;YouTube video&lt;/a&gt; in addition to a &lt;a href="http://www.toyota-4runner.org/5th-gen-t4rs/214695-e-locker-differential-breather-install-trail-edition.html"&gt;similar type installation&lt;/a&gt; on a 4Runner forum. I would be dubious about mounting the differential breather inside your fuel cap area because it can get incredibly dusty in there. I instead mounted my breather in the engine compartment behind the driver&amp;rsquo;s side fuse box.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B072R3TSSH/ref=ppx_yo_dt_b_asin_title_o00_s00?ie=UTF8&amp;amp;psc=1"&gt;Brass Barb Tee Fitting 1/4&amp;quot; x 1/4&amp;quot; x 1/8&amp;quot;&lt;/a&gt; - The 2 1/4&amp;quot; ends are for the differential connection and the main air intake. The smaller single 1/8&amp;quot; end connects to the E-Locker output.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B0013FXTTU/ref=ppx_yo_dt_b_asin_title_o01_s00?ie=UTF8&amp;amp;psc=1"&gt;1/4&amp;quot; Fuel Line at 25ft&lt;/a&gt; - I still have a portion of this left over after install. It will be helpful to have on hand in case I go with a higher suspension lift and have to patch in more hose. There are a lot of things you could do with a rubber hose. I used some cut down the middle to be an edge guard on my little propane tank.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B01H79JUQQ/ref=ppx_yo_dt_b_asin_title_o01_s01?ie=UTF8&amp;amp;psc=1"&gt;Toyota 90404-51026 Intake Air Control Valve Union&lt;/a&gt; - Replaces the differential valve stem. Confirmed fit on 2021 4Runner TRD Off Road.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B076Q7QVNM/ref=ppx_yo_dt_b_asin_title_o01_s00?ie=UTF8&amp;amp;psc=1"&gt;Stainless Steel Hose Clamps 3/8&amp;quot; - 5/8&amp;quot;&lt;/a&gt; - Used on all connections.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B081RNTML1/ref=ppx_yo_dt_b_asin_title_o01_s01?ie=UTF8&amp;amp;psc=1"&gt;Mini Oil Air Intake Filter Cleaner&lt;/a&gt; - There are a variety of products that would work here. The only requirement is that it has to fit the 1/4&amp;quot; fuel line hose.&lt;/li&gt;
&lt;li&gt;Zip Ties - Purchase from a local hardware store. I doubled these up on points of stress such as turns or spots where there was limited mounting. There is a risk of this plastic eventually breaking but hopefully it will be a while due to the lack of movement.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Installation of the mod is very straightforward. Just remember the entire goal is to move the air vent to a safer location. The first step is locating both your differential breather and e-locker breather underneath your 4Runner. The differential breather is pretty easy since it is on the top driver&amp;rsquo;s side of the &lt;em&gt;pumpkin&lt;/em&gt; on your rear axle. The stem has a loose cap and can simply be unscrewed with the appropriately sized wrench. The e-locker breather was slightly higher and mounted on a cross beam on the chassis. I was able to remove the e-locker cap by hand since it is just a simple plastic insert.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Differential elocker vent location"&gt;
 &lt;img
 alt="Differential elocker vent location"
 title="Differential elocker vent location"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/4runner-scuba-mod/differential-elocker-vent-locations_hu_c7281a8ba651eaa1.webp 480w, https://rb.ax/blog/4runner-scuba-mod/differential-elocker-vent-locations_hu_8da5484a8f78fa23.webp 768w, https://rb.ax/blog/4runner-scuba-mod/differential-elocker-vent-locations_hu_f05bdc217f1f22cc.webp 1024w, https://rb.ax/blog/4runner-scuba-mod/differential-elocker-vent-locations_hu_8a52d96ecc0ddd92.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/4runner-scuba-mod/differential-elocker-vent-locations_hu_34545db0ad8889ce.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Differential elocker vent location&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;With both of those removed you have to perform the most complicated part of this modification, which is determining the mount location and hose length for the brass tee. In the end, your differential breather at 1/4&amp;quot; will connect to the brass tee in addition to the e-locker breather at 1/8&amp;quot;. The remaining 1/4&amp;quot; brass tee connection is for the line to your new breather location. While the e-locker connection and the hose to your new breather location are mostly static, the connection to your differential vent is very dynamic. Since the differential &lt;em&gt;pumpkin&lt;/em&gt; is on the rear axle it will move up and down based on the terrain your vehicle is going over. With that in mind you need to cut your differential vent hose to an appropriate length to accommodate this vertical movement. Also be sure to revisit this hose length in case you install a higher lift, bigger tires, or an extended travel setup.&lt;/p&gt;
&lt;p&gt;Next up is routing the rubber hose from the brass tee to the engine bay or where ever you plan on mounting the breather. I don&amp;rsquo;t have a specific map of where I ran my hose but the general goal is to avoid sources of heat, moving parts, and to stay higher in the chassis to prevent the hose from scrapes.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Differential breather location"&gt;
 &lt;img
 alt="Differential breather location"
 title="Differential breather location"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/4runner-scuba-mod/differential-breather-location_hu_7ba92cf926ac036e.webp 480w, https://rb.ax/blog/4runner-scuba-mod/differential-breather-location_hu_8cc3f09e00691856.webp 768w, https://rb.ax/blog/4runner-scuba-mod/differential-breather-location_hu_ddd8f7647ce4d9e7.webp 1024w, https://rb.ax/blog/4runner-scuba-mod/differential-breather-location_hu_bcfab663ce02d1ef.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/4runner-scuba-mod/differential-breather-location_hu_b3aa17b7fc4d1bcd.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Differential breather location&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Lastly, after you get to a point that is ideal you simply trim the hose and pop on the mini air intake filter. While I have seen some fabricate or re-use a bracket to mount this filter all I did was zip tie it to the main electrical line bracket. The hose and filter and very lightweight and will cause almost no stress on this mount point so I thought it would have been overkill for a dedicated bracket.&lt;/p&gt;
&lt;p&gt;With your differential and e-locker breather points now elevated and protected you can rest at ease during your next river or massive puddle encounter. If you are really after it, you might consider your next modification a snorkel to really allow for serious water activities.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;&lt;a href="https://www.toyota-4runner.org/4th-gen-t4rs/159372-placing-floor-jack-under-rear-differential.html"&gt;scw1991 on T4R.org&lt;/a&gt;&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Dost Thou Even Tag?</title><link>https://rb.ax/blog/dost-thou-even-tag/</link><pubDate>Sat, 16 Jul 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/dost-thou-even-tag/</guid><description>&lt;p&gt;The Instagram overlanding (off-roading) community was scolded in late 2021. I&amp;rsquo;ve been thinking about it since it happened. It caused quite a hullabaloo at the time and there was a brief period of drama. The source was what some saw as a chronic style of behavior in perpetuating a cycle of advertising self-exploitation. The practices of prominent community accounts were called out directly as setting bad examples that trickled down to less known members trying to make a name for themselves. For a community usually oriented around beautiful outdoor pictures and aggressively equipped vehicles, it was an unusual flare up of drama. However, it was well a deserved gut check for the blossoming overlanding community. This brand new hobby has grown exponentially over the past few years. The ask was simple. In order to fix the problem we simply had to adhere to a simple request:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Stop tagging brands (especially overland brands) on your posts.&lt;/p&gt;
&lt;p&gt;—ryans4runner&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This call to action was made by an account with a relatively small amount of followers but this is a bit misleading. It is actually just a hobby account for the professional photograph Ryan Resatka. But who is this person and why should we care about what he has to say? While some members of the overlanding community start out with a small amount of followers and work to gain footing in the community he actually did the reverse. His primary Instagram account is popular&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; in a general sense. But even more so when compared to the scope of overlanding numbers where average popular accounts hover in the tens of thousands. It would be fair to say that Mr. Resatka is a professional Instagram user and thereafter branched out with a secondary account into the overlanding sphere. We can safely assume he understands the financial exchange aspect of creative work, dealing with commercial organizations that consume such work, and sophisticated social media management.&lt;/p&gt;
&lt;p&gt;In order to understand Mr. Resatka&amp;rsquo;s request, it would be helpful to draw out the style of posts among several popular Instagram accounts in the overlanding community. Picture a rugged sport utility vehicle traversing a pristine landscape. The vehicle is aggressively geared and visually boasts that any terrain could be easily conquered. It could be the digital incarnation of a perfect vehicle configuration that would provide the most memorable outdoor trip of your life. Tens of thousands of dollars in extra modifications ranging from tires, suspension, lights, steel fabricated bumpers, in-vehicle cabinetry, communication antennas, multiple electronic screens filling the driver&amp;rsquo;s seat like a fighter jet, and an incredible variety of others you might not even know exist yet (but that you&amp;rsquo;ll want once you see).&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Example Instagram post with tagging"&gt;
 &lt;img
 alt="Example Instagram post with tagging"
 title="Example Instagram post with tagging"
 width="1440"
 height="1942"srcset="https://rb.ax/blog/dost-thou-even-tag/fearless-4r_hu_14eb5e5f52965619.webp 480w, https://rb.ax/blog/dost-thou-even-tag/fearless-4r_hu_19ab425e46ecc33e.webp 768w, https://rb.ax/blog/dost-thou-even-tag/fearless-4r_hu_ffed87fddcfbbd43.webp 1024w, https://rb.ax/blog/dost-thou-even-tag/fearless-4r_hu_7d2e6679edd8e716.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/dost-thou-even-tag/fearless-4r_hu_eb466bfa9d9ac767.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Example Instagram post with tagging&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Consider a person brand new to the hobby of overlanding encountering this epic post from a prominent community member with ten of thousands of followers&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt;. When you pick up a new hobby the variety of choices are overwhelming. Which proven products are the best suited to accomplish what you want to do? Seeking guidance, new joiners frequently look to these popular social media accounts within the hobby to inspire or guide them. This in turn incentivizes companies to sponsor those popular accounts in order to gain the best advertising.&lt;/p&gt;
&lt;p&gt;Instagram has made this coupling between content and product even easier. As you view this post, you tap it with your finger and a cloud of product tags show up. Since configurations can involve a large number of items this cloud of tags can completely block out the vehicle itself. This comically ironic to me. Each tag links to a vendor more than willing to sell you this newest greatest most capable modification that will assuredly make your car camping experience all the better. All these factors slammed into the same image creates the perfect medium for a company to allure new or returning customers. This tagging relationship between content creator and product advertisement is par for the course among all social media platforms. Anyone who has been alive in the past decade has been exposed to this situation within social media or with traditional advertising from all years prior. Companies pay the creator of advertising content and people buy the product.&lt;/p&gt;
&lt;p&gt;Mr. Resatka&amp;rsquo;s isn&amp;rsquo;t calling for an end to this relationship. He is calling for people to come back to it. He claims the problem is that a large number of people in the Instagram overland community simply use product tagging purely for exposure and completely ignore the other half of the exchange. This other half is some sort of financial exchange, which is probably front and center to Mr. Resatka since it sustains his annual income. Everyone in the overlanding community has sold themselves short by only expecting exposure and nothing more. Companies prey on this universal desire. Why would a company pay a photographer or other creative artist when a simple call to action from their social media account could garner hundreds of fan submitted content for the bankrupting price of $0? Sure, an amount of that content could be unusable on a quality level. However, consider the up and coming ambitious photographer who sees an easy pipeline to have their content widely published. It only takes a few hundred of such individuals to fully sustain a company&amp;rsquo;s social media presence on a year round basis.&lt;/p&gt;
&lt;p&gt;I will be fair in acknowledging that this strained relationship is not isolated to the outdoor or overlanding community. Many S&amp;amp;P500 companies drive community hashtag campaigns to drive up excitement for their product or service. The easiest example I can think of is in the tourism sector and specifically with airline companies. Many plaster their terminals or boarding gates with giant blown up images of exotic and often tropical locations. You can see the photographer&amp;rsquo;s Instagram username on the bottom of these. Visually ingesting the image(s) gives your brain two distinct expectations. The first is primarily about the image giving you desire to be there since it is so beautiful that leads to paying for the service or product to physically travel there. The second is a hopeful lure that hints if your image is good enough it can also be blazoned on the wall of an international airport boarding gate. Thousands of people will walk by &lt;em&gt;your&lt;/em&gt; image with &lt;em&gt;your&lt;/em&gt; name and you will become incredibly popular for that sunrise picture you snapped in Kauai.&lt;/p&gt;
&lt;p&gt;This relationship is also problematic because it ignores the same historical exchange between parties that was outlined earlier. Sure, the airline company might pay out a small few hundred dollar fee to these individuals that most consider adequate. However, consider the millions of dollars spent on an advertisement campaign on a global level. That picture you took in Kauai could be used across social media campaigns, billboards, advertisement posters, websites, company blog posts, commercials, flyers, and whatever other advertising mediums I left out. The small fee you were awarded now seems rather inadequate based on how much this company has spread your image around. You might see your compensation alternatively through the lens of wide international exposure for your social media presence. From this perspective it would be wise to somehow quantify your dollar-to-new-follower ratio that you find acceptable. If you were to get an extra 500-2,000 followers from your picture making it around the world would you find that an acceptable reward?&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Example Instagram post with tagging from @gun.rnr"&gt;
 &lt;img
 alt="Example Instagram post with tagging from @gun.rnr"
 title="Example Instagram post with tagging from @gun.rnr"
 width="1440"
 height="1950"srcset="https://rb.ax/blog/dost-thou-even-tag/gun-rnr_hu_6037a2c77a483f51.webp 480w, https://rb.ax/blog/dost-thou-even-tag/gun-rnr_hu_eb7e420081f83752.webp 768w, https://rb.ax/blog/dost-thou-even-tag/gun-rnr_hu_5f586e4ae340d4a7.webp 1024w, https://rb.ax/blog/dost-thou-even-tag/gun-rnr_hu_f1bb8402ea2c1c5f.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/dost-thou-even-tag/gun-rnr_hu_4bd28457e40b2fbb.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Example Instagram post with tagging from @gun.rnr&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The nascent overlanding industry depends on people finding this an acceptable reward. I have seen the behavior normalized with social media campaigns that ask all to use tag #xyz in order to be featured in their social media feed. With tens of thousands of followers this is enticing to many people. Not only does this fast track submissions directly to the company it also sidesteps the entire process of negotiating any sort of fair reward exchange between the submitter and the company. In absolute legal terms, this behavior is illegal, as the companies are relying on the social media tag #xyz in order to determine copyright licensing and redistribution. Consider a world famous artist publishing their work but include an extra #xyz tag on their post. Would that give a commercial business the copyright permission to redistribute that artist&amp;rsquo;s piece of work as they saw fit? Absolutely not, but such behavior is now considered normal by many overlanding social media campaigns.&lt;/p&gt;
&lt;p&gt;You might think differently about the value of social media exposure when you see the reimbursement tiers companies usually pay out. A common amount to license your image for usage on a company&amp;rsquo;s social media account or website can pay $500 annually. Or, for for digital ads it would be around $5,000 per year. It gets even wilder for full universal usage rights that can run past $20,000 to $30,000&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; annually. These amounts are just for still photographs. Videos can fetch approximately 1.6 to 2 times as much. All of this is limited to a 12 month basis. Giving your creative license away for something in perpetuity could demand a much more significant jump in reward. Based on these amounts do you know where you would switch from accepting exposure to an actual financial reward? Starting this scenario at the low end, do you believe 500 new followers will increase your &lt;em&gt;personal brand&lt;/em&gt; value by $1 each? If we take this example further would you rather have 2,000 new followers or $5,000? The popularity long game might still be some people&amp;rsquo;s choice but I must ask the question of when they plan on beginning the monetization of their social media presence? If it is at some distance point in the future where you&amp;rsquo;ll have hundreds of thousands of followers you might not actually be able to make money at that point in time. Since in the process of getting that far you would have effectively ruined any sort of financial exchange model by offering your services for basically no reimbursement. It is simply pragmatic to expect a financial reward early in your planned social media career.&lt;/p&gt;
&lt;p&gt;To wrap up this section we can move on to the last and largest category of people in this dynamic: those who have no intention of earning money from social media tagging or licensing their images. I find myself within this category and I can see the perspective of some who are dismissive about the need to censor their social media posts. Since we are not part of the financial exchange process it doesn&amp;rsquo;t really matter if we interrupt it by posting our casual weekend forays into the wilderness. We are here just to share fun times and talk about what we enjoy among other like minded individuals. There is only a slight adjustment we need to do in this situation to help out those who choose to be in the financial exchange process. We can stop tagging overlanding companies in our posts and instead use community tags to build our hobby up on social media. As an extra benefit, this helps us avoid getting exploited by the same companies we used to espouse.&lt;/p&gt;
&lt;p&gt;I would also claim there is an appropriate time and place to tag companies in posts. One example might be a post that is directly covering a product the company makes. It makes sense in this situation since the context of your post is directly related to that company. But when you habitually add a company&amp;rsquo;s tag to every post for the purpose of wider exposure it becomes more problematic. Another example would be to promote a very small company with a great product into a wider audience. There are a few examples of this situation and it brings me joy that the capabilities of modern technology provide many with a platform to bring their ideas to market. The extended fuse box cover from 4runner.tx&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; and the flush OEM-like dash mount from labopsgear&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; come to mind as pristine examples of community funded products that filled a niche product need in the hobby.&lt;/p&gt;
&lt;p&gt;Some of these companies start out as a guy out in their garage tinkering with whatever and genuinely need the support of others to get things rolling. This sentiment kind of expires at a certain point but I don&amp;rsquo;t really know when that threshold would be met. We aren&amp;rsquo;t privy to any financial books so it would be hard to see when that supposed community support perspective should be withdrawn. The evolution of companies like this is an inherent problem to the overlanding community. Many products are new to market over the past decade and depend on community advertisement to launch. But it seems that they remain in that behavior arc even when pushing millions of dollars of revenue.&lt;/p&gt;
&lt;h2 id="tldr"&gt;&lt;a href="#tldr"&gt;tl;dr&lt;/a&gt;&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Do not let companies use your content without fair compensation.&lt;/li&gt;
&lt;li&gt;Use community hashtags that are not company driven.&lt;/li&gt;
&lt;li&gt;Only promote very small companies.&lt;/li&gt;
&lt;/ol&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;&lt;a href="https://www.instagram.com/ryans4runner/"&gt;https://www.instagram.com/ryans4runner/&lt;/a&gt;&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;&lt;a href="https://www.instagram.com/ryanresatka/"&gt;About 580,000 as of 2022&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;This directly correlates to perceived authority, unfortunately. What type of social media account are you going to trust more, someone with ten of thousands of followers or another with 46?&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;These amounts are based on public comments made by Mr. Resatka. Alternative sources on pricing information might include software application fotoQuote, however, Mr. Resatka claimed that such amounts should be doubled to reach fair pricing levels.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;&lt;a href="https://www.instagram.com/labopsgear/"&gt;labopsgear&lt;/a&gt;&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;&lt;a href="https://www.instagram.com/4runner.tx/"&gt;4runner.tx&lt;/a&gt;&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Iron Mine Lake</title><link>https://rb.ax/blog/iron-mine-lake/</link><pubDate>Tue, 05 Jul 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/iron-mine-lake/</guid><description>&lt;p&gt;&lt;figure aria-label="Bird&amp;rsquo;s eye view of Iron Mine Lake."&gt;
 &lt;img
 alt="Bird’s eye view of Iron Mine Lake."
 title="Bird&amp;rsquo;s eye view of Iron Mine Lake."
 width="1440"
 height="959"srcset="https://rb.ax/blog/iron-mine-lake/iron-mine-lake-featured_hu_6a2435189920407e.webp 480w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-featured_hu_931e98e48218cae9.webp 768w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-featured_hu_31242b55f616e932.webp 1024w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-featured_hu_2720d804b4f0a70c.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/iron-mine-lake/iron-mine-lake-featured_hu_cba02fda06d661f9.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Bird&amp;rsquo;s eye view of Iron Mine Lake.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I knew it was a bad idea going into the mountains in early July. But I ignored all the wisdom my father had tried to pass onto me from his backpacking adventures as a kid with his own father. The advice was pretty simple and logical. To avoid mosquito Armageddon, wait until the first week of August before venturing into the mountains. This is because high altitude temperatures stall the Spring thaw and the subsequent drying out of the terrain. Subsequently, this delays the lifecycle of mosquitoes in the mountains by about a month or two from the lower elevation equivalent. While it might seem safe in the heat of July at a lower elevation the vampire party is at its peak in the mountains. In the context of this advice a lower elevation would be somewhere around 4,000 feet while the mountains are anywhere between 7,000 to 10,000 feet.&lt;/p&gt;
&lt;p&gt;I had an arrogantly different conclusion. My daily runs had become enjoyable in the summer heat and the spring onslaught of bugs had tapered off. Early July along the Wasatch Front showcases the greenery of Spring before it is dried out by the marathon of Summer heat. I thought it would be great to escape the valley for a cool mountain adventure while everything was still lush and wildfires hadn&amp;rsquo;t yet clogged the air. But for whatever reason the advice from my dad didn&amp;rsquo;t resurface and caution my plans.&lt;/p&gt;
&lt;p&gt;I joined the fleeing holiday crowds on I-15 going East towards Park City. Climbing through canyons along the way I passed countless RVs and towed camping trailers. The summer vacation energy was strong. I think the kids call it a &lt;em&gt;vibe&lt;/em&gt; these days. I felt energized by this rather than crowded because they were all headed for designated camp sites on easy dirt roads. My competition of mid sized off road vehicles had a much lighter presence on the highway. Passing through the last city of Kamas was the pinnacle of this vibe energy. People had stopped at gas stations and were stocking up on snacks. The parking lots of the local grocery store and summer burger joints were packed and everyone had a cheerful optimism for the upcoming vacation.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Camping at Iron Mine Lake."&gt;
 &lt;img
 alt="Camping at Iron Mine Lake."
 title="Camping at Iron Mine Lake."
 width="1440"
 height="960"srcset="https://rb.ax/blog/iron-mine-lake/iron-mine-lake-camp_hu_503ddca0e75e16c5.webp 480w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-camp_hu_990873e999fc5f74.webp 768w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-camp_hu_80ce62a4d03af898.webp 1024w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-camp_hu_ecba9b0d343d0c65.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/iron-mine-lake/iron-mine-lake-camp_hu_5831dc60561443ea.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Camping at Iron Mine Lake.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Proceeding into the Uinta-Wasatch-Cache National Forest on Highway 150 I felt a bit daunted by the steep canyon walls on both sides. I had never ventured up into them and they seemed incredibly high to a point where I couldn&amp;rsquo;t see the tops from the windows of my 4Runner. The road to my destination went along the edge of the south canyon wall starting at Forest Road 037 with a quick transition to 414 all the way around Iron Mine Mountain. I noticed some strange noises and movement along the bumpy road. My tent mounted on my roof rack had become loose and was swaying left and right with every bit of rough terrain. One piece of advice from my father I had remembered was to always have a few tools on hand when going on any length of trip. Whipping out my appropriate tighteners I got the tent re-centered and tightened back down after some choice words. The fusion of a tubular basket style roof rack did not exactly work well enough with the tent that relied on t-channels slots. If I was ever going to find happiness in the future either the tent or the roof rack would have to be swapped out to avoid constantly loose mounting brackets.&lt;/p&gt;
&lt;p&gt;Turning the corner to reveal Iron Mine Lake in all its green lush early summer glory was worth the drive itself. The weather was beautiful that day with a few puffy clouds. I couldn&amp;rsquo;t feel more lucky when I arrived with no one else around and my pick of campsites around the lake. Arriving at the North end of the lake I felt like the area was a bit low and marshy and decided to drive around to the South side. Luckily, the South end proved a bit higher and dryer with a great spot right next to the water with some grass. I realized this spot also had a better transit advantage, being at the end of the lake road, which proved helpful in avoiding explorers in UTVs blazing by my camp.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Iron Mine Lake camp spot."&gt;
 &lt;img
 alt="Iron Mine Lake camp spot."
 title="Iron Mine Lake camp spot."
 width="1440"
 height="960"srcset="https://rb.ax/blog/iron-mine-lake/iron-mine-lake-ground_hu_78f53fdbe96e2b57.webp 480w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-ground_hu_1f612a3ef3ab9823.webp 768w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-ground_hu_480afb4579bd8569.webp 1024w, https://rb.ax/blog/iron-mine-lake/iron-mine-lake-ground_hu_fd1783591d0ebb11.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/iron-mine-lake/iron-mine-lake-ground_hu_5d564155520372d7.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Iron Mine Lake camp spot.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I was lulled into a false sense of safety with the heat of the early afternoon and a slight breeze suppressing most mosquitoes. I took the opportunity to take a short hike around the lake and surrounding area. It seemed that some of the Southern roads ended in restricted logging areas that hadn&amp;rsquo;t been used in some time. I found that rather amusing because in every location I&amp;rsquo;ve been at within the Uinta-Wasatch-Cache National Forest there has been some sort of active or inactive logging operation. I don&amp;rsquo;t assign any sort of morality to that but rather just see it as funny. There is certainly a degree of resource management being performed by the Forest Service and I would be interested in talking with a ranger at some point in the future about it.&lt;/p&gt;
&lt;p&gt;I got really excited around dinner time since it was my first time with a fridge in the wilderness. Ice cold beverages, fruits, and even a compartment for frozen items. I&amp;rsquo;m totally a sucker for ice cream sandwiches and now consider them a staple on all summer camping trips. I admit this luxury is a bit much for some but I find a certain degree of comfort very reassuring and relaxing when out in the boonies.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="4Runner fridge and cabinet setup."&gt;
 &lt;img
 alt="4Runner fridge and cabinet setup."
 title="4Runner fridge and cabinet setup."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/iron-mine-lake/wilderness-fridge_hu_2f8b20c6bb09ffa0.webp 480w, https://rb.ax/blog/iron-mine-lake/wilderness-fridge_hu_346afd42d1061895.webp 768w, https://rb.ax/blog/iron-mine-lake/wilderness-fridge_hu_908ff684cb0eb2c4.webp 1024w, https://rb.ax/blog/iron-mine-lake/wilderness-fridge_hu_1f25ed215a9741da.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/iron-mine-lake/wilderness-fridge_hu_b321f0cd1b25a66b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;4Runner fridge and cabinet setup.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After dinner was finished for both myself and my dear puppy things began to both get bad and also good. The breeze seemed to die down as the sun was setting and the midday heat started to fade. Both of these factors slowly revealed the true amount of mosquitoes hiding in the area. Donning a jacket to protect my arms and neck I realized I had forgotten any sort of bug spray. Like absolutely nothing. It was just me, any sort of protecting clothing, and my tent to protect me from the rising horde. My dog, who at first, loved running around chomping on the various flying insects. But as time progressed it became so bad he kind of just looked up at me and seemed to ask, &lt;em&gt;why?&lt;/em&gt; Yet, as all this was rapidly progressing into insanity the terrain became painfully beautiful with the setting sun.&lt;/p&gt;
&lt;p&gt;There is the famous introduction in the Charles Dickens novel &lt;em&gt;A Tale of Two Cities&lt;/em&gt; where he states it was the best of times and the worst of times. I felt this was a great description of my experience during the sunset at Iron Mine Lake. On one hand you have this beautiful alpine lake surrounded by lush green grass and trees with rolling hills that are each crested by the amber sunset. Yet access to this beauty comes with a dreadful price of vampiric flying death mosquitoes in legions upon legions. For me, the beauty was too great and I willingly paid the price until it became too much.&lt;/p&gt;
&lt;p&gt;Without any bug spray I thought the next best thing would be campfire smoke so I quickly made a small fire. I stood directly in the smoke in the hopes of warding off the mosquitoes while I flew my drone around to take pictures. This act of lung self-sabotage was partially successful but eventually it became less effective as the count of mosquitoes became colossal. Pacing about the camp I refused to give up in the face of the beauty of Iron Mine Lake. Tying my hood as close as possible I whipped out my camera to get a few images of the lake with the setting sun. I wouldn&amp;rsquo;t have thought something as simple as leveling my camera would take so long due to the amount of mosquitoes. Since I had no gloves I could barely use my hands for more than a few seconds before a dozen mosquitoes would hungrily land.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="This could have been a great view."&gt;
 &lt;img
 alt="This could have been a great view."
 title="This could have been a great view."
 width="1440"
 height="961"srcset="https://rb.ax/blog/iron-mine-lake/lake-chair-view_hu_4bce0b3885d7a3b0.webp 480w, https://rb.ax/blog/iron-mine-lake/lake-chair-view_hu_b957f7952da0bebd.webp 768w, https://rb.ax/blog/iron-mine-lake/lake-chair-view_hu_95bf718ca16b2d37.webp 1024w, https://rb.ax/blog/iron-mine-lake/lake-chair-view_hu_76b81e190d72a660.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/iron-mine-lake/lake-chair-view_hu_3ab5f12c8f33f2d7.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;This could have been a great view.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I reached my breaking point after about a half hour of trying to take images with my camera. I could barely perform normal tasks outside the confines of my 4Runner or tent. I couldn&amp;rsquo;t imagine what an adventure it would be to use the restroom in such a dangerous environment. Heaven forbid if you were to take more than 20 seconds to finish with a huge amount of soft vulnerable flesh exposed to the ever present vampiric cloud. I most of all felt bad for my dog without the ability to swat away mosquitoes from the few exposed spots on his body.&lt;/p&gt;
&lt;p&gt;With defeat in my mind I packed up camp to hopefully find higher ground with less mosquitoes to somehow salvage the trip. At site after site I stopped to grab an image of the sunset landscape but was faced with clouds of mosquitoes. I was hunted even on the high canyon edge where I thought a breeze would help settle things down. I could have just set up anywhere and we could have tucked away for the night in the tent but I felt absolutely defeated in my preparation and planning. Home was only an hour and a bit away so I headed back while trying to review what I could have done better.&lt;/p&gt;
&lt;p&gt;In retrospect the best source of protection would have been some sort of bug shelter. It was a pain to climb up and down to the tent for periods of respite. I think a bug net attachment for my awning would have been invaluable. With it, I could have cooked, eaten, and relaxed inside with or without the need for bug spray. I could have even popped the drone outside and piloted from safety. Another solution it would have provided was a location to use the restroom without being attacked. Additionally, while I am skeptical on the effectiveness of bug spray with such high numbers of mosquitoes I am sure it would have helped in some degree. I hope to take all of these lessons and combine them with some patriarchal advice for more successful trips in the future.&lt;/p&gt;</description></item><item><title>Halfway at 1,000 Miles</title><link>https://rb.ax/blog/halfway-at-1000-miles/</link><pubDate>Sun, 19 Jun 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/halfway-at-1000-miles/</guid><description>&lt;p&gt;&lt;figure aria-label="New running shoes are always a beauty to look at before they get sloshed across the roads of the world."&gt;
 &lt;img
 alt="New running shoes are always a beauty to look at before they get sloshed across the roads of the world."
 title="New running shoes are always a beauty to look at before they get sloshed across the roads of the world."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/halfway-at-1000-miles/shoes-featured_hu_43f8705d87330411.webp 480w, https://rb.ax/blog/halfway-at-1000-miles/shoes-featured_hu_e669bb4260710b83.webp 768w, https://rb.ax/blog/halfway-at-1000-miles/shoes-featured_hu_b07ca7e5bd30c108.webp 1024w, https://rb.ax/blog/halfway-at-1000-miles/shoes-featured_hu_b723f7b5d6c0ba34.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/halfway-at-1000-miles/shoes-featured_hu_6eb2537cfab08b35.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;New running shoes are always a beauty to look at before they get sloshed across the roads of the world.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;For some reason in late December of 2021 I decided to give into the pressure of social media. This wasn&amp;rsquo;t Facebook or Instagram but rather on Strava, the bicycling and running tracking application. The virtues of this platform are lightyears ahead of what one might call &lt;em&gt;normal&lt;/em&gt; social media. But there can still be a dark side, even with physical exercise. Some can use it as a platform of globalized hyper-competition or social comparison and consequently push themselves into physical overtraining injuries or in the case of William Flint pursuing a &lt;em&gt;segment record&lt;/em&gt; in 2010, death&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt;. On the Strava platform a segment is a virtual course that is competed over by users of the application for speed and number of efforts. If you aren&amp;rsquo;t the fastest in your area you could always try for the next best title of &lt;em&gt;Local Legend&lt;/em&gt; for the raw number of attempts at a course. You can imagine this sort of virtual competition could amplify up rapidly in some cities.&lt;/p&gt;
&lt;p&gt;While I consider myself physically fit I came to the realization long ago that there would always be someone faster or tougher than me. This is pretty apparent when I look at some local Strava segments and the associated fastest times. As I am only a few miles away from a nearby high school these segments are disproportionately quick and leave most individuals over 25 or 30 with little hope of retaking the segment as the fastest. Instead, I was brought into the lure of annual running mileage.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Snowy Day on the Trail."&gt;
 &lt;img
 alt="Snowy Day on the Trail."
 title="Snowy Day on the Trail."
 width="1440"
 height="1079"srcset="https://rb.ax/blog/halfway-at-1000-miles/trail-snow_hu_9d045fe1ffc0d917.webp 480w, https://rb.ax/blog/halfway-at-1000-miles/trail-snow_hu_2a1ebdcd015cb1c6.webp 768w, https://rb.ax/blog/halfway-at-1000-miles/trail-snow_hu_7ec2e329a7e45810.webp 1024w, https://rb.ax/blog/halfway-at-1000-miles/trail-snow_hu_90098b1a20674249.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/halfway-at-1000-miles/trail-snow_hu_39a9ed3c39d492f7.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Snowy Day on the Trail.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Once the end of the year rolls around, many Strava users share their yearly mileage. Consider it similar to a year end summary like Spotify does with listening habits. Its a fun way to brag to your peers and show some unique quirks about your individual habits. Some runners might showcase their altitude gains while on Spotify you could share that you listened to &lt;em&gt;Never Gonna Give You Up&lt;/em&gt; over 100 times in the course of the previous 11 months. These posts on Strava gave me the hope that with an annual mileage goal I could sustain a running habit at a desired level without the need for a trail or road race at the end. I definitely needed the structure going forward with my mileage in the off-season showing up as a rollercoaster. Some weeks the motivation would hit and I&amp;rsquo;d ramp up to 30 or 45 miles over 7 days. The following week I&amp;rsquo;d be tired, the motivation would fade, or I just didn&amp;rsquo;t care enough because there was no end race goal in the training pipeline. Such thinking is especially easy to fall into when the temperature outside has been below freezing for the past few weeks or when it is pitch black at the only time you can fit a run into your schedule.&lt;/p&gt;
&lt;p&gt;Armed with the general concept of an annual goal the only thing left was determining just exactly how much I should commit for the year. I have a habit of underestimating many things in my life so I thought it would be prudent to do an amount no more than a third more than what I had been doing the previous few years. Which was approximately 1,350 to 1,675 miles annually from about 2018 to 2021. We then end up at a figure of 2,000 miles for the year. I almost fell victim to further pressure from social media to increase that amount as most others were going for 2,500 or 3,000. Instead I held fast at my modest but ambitious goal. The objective was to improve my personal running consistency and not to compete against individuals most certainly in a different point in their running goals.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The same trail system as above but in the summer."&gt;
 &lt;img
 alt="The same trail system as above but in the summer."
 title="The same trail system as above but in the summer."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/halfway-at-1000-miles/path_hu_ae32fe5bdc264437.webp 480w, https://rb.ax/blog/halfway-at-1000-miles/path_hu_8c9b5f0da0d1fdd7.webp 768w, https://rb.ax/blog/halfway-at-1000-miles/path_hu_a5f677e90341f548.webp 1024w, https://rb.ax/blog/halfway-at-1000-miles/path_hu_e5a87b84baa3ad7b.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/halfway-at-1000-miles/path_hu_74db94616610b7ff.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The same trail system as above but in the summer.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The beginning was pretty easy. There is a lot of energy in January from the New Year and the new habits of most around you. I tried to ride this wave as long as possible until the inevitable doldrums of February. Some weeks I barely hit the weekly minimum. But most people wouldn&amp;rsquo;t blame you for minimizing your exposure to sub-zero temperatures and freezing rain storms. I told myself that once summer rolled in it would be a much different story for weekly mileage. Being outside in June or July is a blessing while the same is a curse in January or February. March and April aren&amp;rsquo;t much better and can be risky in some cases. The weather can be quite pleasant in the early or mid-spring but a rogue thunderstorm can sharply lower the temperature and introduce dangerous conditions, especially in not carrying the required equipment. On one run in the early spring this year the weather was sunny and in the 60s. Off I went on a 10 mile run in shorts and a short sleeved shirt. However, about halfway through the run a thunderstorm snuck out from the other side of the mountains and lowered the temperature about 20-25 degrees with some extensive precipitation. By the time I made it back to my house I wasn&amp;rsquo;t able to perform basic tasks with my hands because they were so cold. In order to muster the motor skills to put the key in my door lock and turn it required several minutes of rubbing my arms and hands in an attempt to get them warmed up.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Up above Brighton Ski Resort."&gt;
 &lt;img
 alt="Up above Brighton Ski Resort."
 title="Up above Brighton Ski Resort."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/halfway-at-1000-miles/brighton_hu_ccec99ea06487b79.webp 480w, https://rb.ax/blog/halfway-at-1000-miles/brighton_hu_78a8271850d9a2aa.webp 768w, https://rb.ax/blog/halfway-at-1000-miles/brighton_hu_b5e95f347da8b83d.webp 1024w, https://rb.ax/blog/halfway-at-1000-miles/brighton_hu_bc51bd61d6fae353.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/halfway-at-1000-miles/brighton_hu_2f2ebe598b1b4710.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Up above Brighton Ski Resort.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Towards the end of Spring I encountered the only sizable road block in my training with patellofemoral pain (Runner&amp;rsquo;s Knee). Normally my approach to training is pretty cautious and I always back off in mileage with any recurring pain. But with the weekly mileage goal it kept my efforts and a consistent high in a manner my body had never experienced. Additionally, in an effort to sort of &lt;em&gt;cheat&lt;/em&gt; my way to high weekly mileage I was doing almost entirely road running. I say this is cheating since it most often involves almost no altitude gain or decline and requires little in the way of cognizant awareness when pumping out long runs. This method specifically backfired on me due to the repetitive nature of road running where as before I was frequently exposed to the variations of trail running. I say this as a description of your foot placement and terrain encountered over the course of a particular run. The amount of work your legs, hips, and feet do over the course of running an uneven and rocky trail is exponentially more than a flat, paved, and straight pathway. The lack of movement on road running can leave certain muscles, ligaments, and stabilizers neglected. Consequentially this can lead to &lt;em&gt;unevenness&lt;/em&gt; in your legs and hips. After introducing trail running once a week back into my schedule and perform some targeted hip stabilizer routines&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; I was able to reduce the pain entirely within about a month.&lt;/p&gt;
&lt;p&gt;Once summer hit I had established my routine and mostly addressed any injuries. So I started experimenting with sizable weekly mileage increases up to 50 and in some cases 60 per week. I was pretty hesitant to approach 60 since the year prior I had gotten some random burst of motivation and peaked out of nowhere at 61 miles during late summer. However, this resulted in what I assume were stress fractures that spiraled the rest of the summer to less than 20 miles per week due to the pain. But this year was a bit different with my incredibly strong base mileage of about 40 per week. I decided to creep up using the 10% rule and regressing downward every third week for recovery. This method has proven invaluable for me and I can happily report that the 60 mile week was difficult but without lasting injury.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="On the Frogtown Trail in Los Angeles, California."&gt;
 &lt;img
 alt="On the Frogtown Trail in Los Angeles, California."
 title="On the Frogtown Trail in Los Angeles, California."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/halfway-at-1000-miles/losangeles_hu_e0852036162b6e43.webp 480w, https://rb.ax/blog/halfway-at-1000-miles/losangeles_hu_90cec58ee682bfb0.webp 768w, https://rb.ax/blog/halfway-at-1000-miles/losangeles_hu_3b2004cf7208ef6b.webp 1024w, https://rb.ax/blog/halfway-at-1000-miles/losangeles_hu_42e370bcf7361a6a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/halfway-at-1000-miles/losangeles_hu_cc03c1a8d7304fa1.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;On the Frogtown Trail in Los Angeles, California.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;At the halfway point in my 2,000 mile goal I consider myself in a strong position to finish it out. This new style of running has transformed the act of running from an erratic aberration of activity to a consistent presence in my everyday life. I have begun to see the perspective of some runners who I had thought were previously a bit crazy for their random solo marathons in the mountains. Such acts are now within my physical capabilities and introduce new possibilities into outdoor adventure. I am planning on running the trail to the tallest peak in Utah, Kings Peak, in late August. The trail is between 24 to 27 miles and the average hiker covers it in a day or two of walking. While running certainly compacts the beautiful experience of traversing through nature I would consider it just a few more miles per hour away from the most basic method of hiking. I hope to carry this style of adventure forward, which could provide pristine access to a variety of outdoor locations.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;&lt;a href="https://www.newstatesman.com/social-media/2021/10/thedarksideofstrava"&gt;The dark side of Strava: What happens when users lose control&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;&lt;a href="https://www.coachmag.co.uk/running/7014/combat-runner-s-knee-with-this-seven-step-workout"&gt;Runner’s Knee Exercises To Improve Your Strength Before Injury Strikes&lt;/a&gt;&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Trin-Alcove Bend</title><link>https://rb.ax/blog/trin-alcove-bend/</link><pubDate>Sun, 22 May 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/trin-alcove-bend/</guid><description>&lt;p&gt;&lt;figure aria-label="Feeling tiny in grandness of the geography."&gt;
 &lt;img
 alt="Feeling tiny in grandness of the geography."
 title="Feeling tiny in grandness of the geography."
 width="1440"
 height="959"srcset="https://rb.ax/blog/trin-alcove-bend/trin-alcove-bend-featured_hu_46be7ad9f63c79d7.webp 480w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-bend-featured_hu_4a7dc2ff5057c1c.webp 768w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-bend-featured_hu_265b7dd814283e32.webp 1024w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-bend-featured_hu_569fd820a9c71e40.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/trin-alcove-bend/trin-alcove-bend-featured_hu_571228ed54f0a040.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Feeling tiny in grandness of the geography.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;On the cusp of summer my excitement to get out into the world had gotten as high as it could have. Leaving my house no longer required a coordination of equipment to stay warm. No excessive amounts of coats, jackets, sleeping bags, thick socks, and everything that would protect you from an unforgiving cold environment. Instead, the dawning possibility of the environment not stealing all your precious body heat was quickly becoming a reality. Yet the roads going into the mountains were closed for another week&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; and undoubtedly snow ridden and damp. Instead, I heeded the call the desert. Perusing around on Google Maps and Gaia GPS, I settled on seeing the Trin-Alcove Bend on the Green River.&lt;/p&gt;
&lt;p&gt;It wasn&amp;rsquo;t my first choice. Since the weather called for a high in the lower 70s F I tried to find a few spots along the Green River that would let me sit on a sandy beach and read while my dogs played in the river. While these unicorn-like locations do exist they were unfortunately behind private land. I wasn&amp;rsquo;t able to figure this out until I was at the spots physically. Things look different on the aerial view of Google Maps and the satellite shots are frequently out of date.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Adventure puppies."&gt;
 &lt;img
 alt="Adventure puppies."
 title="Adventure puppies."
 width="1440"
 height="960"srcset="https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner-dogs_hu_7c154bdb3dabe3ca.webp 480w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner-dogs_hu_b3061529756414e1.webp 768w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner-dogs_hu_e5c4ee0e0115b23a.webp 1024w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner-dogs_hu_1e1c68daddfaa455.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner-dogs_hu_62e922142ca27913.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Adventure puppies.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The path to this area starts in the city of Green River, Utah. With the area to the south being remote I made sure to top off my vehicle&amp;rsquo;s gas before heading south on the Airport Road. This quickly turns into the Lower San Rafael Road, which is also called County Road 1010. Parts of the road meander southward near the Green River while others are a ways away leaving you to enjoy the extreme desolation of the desert.&lt;/p&gt;
&lt;p&gt;There are a few natural attractions along the way, including Crystal Geyser and Fossil Point. While Crystal Geyser is across the river it is still a neat place to stop and explore. There are a few mining operations in the area and you can several farm-like compounds dotted along the shore of the river. The taller hill directly across from Crystal Geyser has favorable 5G T-Mobile service spots. Down the hill to the south is a lowland expanse filled with scrubby grasses and bushes. While not particular soft or comfortable, it would be a good spot if the weather was extremely windy.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Trin-Alcove and the Grean River."&gt;
 &lt;img
 alt="Trin-Alcove and the Grean River."
 title="Trin-Alcove and the Grean River."
 width="1440"
 height="960"srcset="https://rb.ax/blog/trin-alcove-bend/trin-alcove-green-river_hu_2b2f7ab28c6938e8.webp 480w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-green-river_hu_a39326aa400f657a.webp 768w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-green-river_hu_49710ff7dfc49fff.webp 1024w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-green-river_hu_50ff0882e10945ff.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/trin-alcove-bend/trin-alcove-green-river_hu_54c820199a8a87c4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Trin-Alcove and the Grean River.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The rest of my time was spent exploring side roads and trying to find little nooks to camp in. I always try to do this for future me. As I said before, things are misleading on an aerial maps perspective and sometime that secluded spot gets missed. Adding a way point to keep it in your camping spot bank is a great way to pay yourself forward. Another possibility I was looking at was a road that went all the way from the main 1010 to the Green River. This proved unsuccessful due to the fact that the road conditions were incredibly primitive at best. I was pressed for time and couldn&amp;rsquo;t give them their respective allotment of vetting.&lt;/p&gt;
&lt;p&gt;Arriving at the Trin-Alcove Bend was underwhelming at first. The huge curve of the river is evident when you arrive but doesn&amp;rsquo;t show its full grandness until you take a short hike down the hill to get a better perspective. After relocating my eyeballs to the appropriate spot, was I flooded with feelings I had experienced at places like the Grand Canyon or Horseshoe Bend in Page, Arizona. It made me feel small, insignificant. A speck in the time line wherein this emerald green river had been tirelessly working away.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Trin-Alcove canyons."&gt;
 &lt;img
 alt="Trin-Alcove canyons."
 title="Trin-Alcove canyons."
 width="1440"
 height="959"srcset="https://rb.ax/blog/trin-alcove-bend/trin-alcove-canyons_hu_bae314066042a1b0.webp 480w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-canyons_hu_1ed084f9780ac9e0.webp 768w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-canyons_hu_7b6890bf43a8999c.webp 1024w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-canyons_hu_ac82a5cb9e9383bf.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/trin-alcove-bend/trin-alcove-canyons_hu_d998fa325d52886b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Trin-Alcove canyons.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;At places like these I experience a rapid succession of nihilism and existentialism. But I find it incredibly rewarding to my personal perspective. The goal posts of my life are placed back where they should be. Value forgotten is renewed and time regains is preciousness.&lt;/p&gt;
&lt;p&gt;Personal philosophy aside, the camping footprint above the bend is decidedly tight. There is an overly large parking area at the farthest end of the road. A smaller spot is available before it. This would be good if there was another group setup in either spot, leaving options available to enjoy the bend.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Camp setup at the Trin-Alcove area."&gt;
 &lt;img
 alt="Camp setup at the Trin-Alcove area."
 title="Camp setup at the Trin-Alcove area."
 width="1440"
 height="959"srcset="https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner_hu_a24a126c76a56ecf.webp 480w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner_hu_78bdee87bcc8497e.webp 768w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner_hu_206b1d369fe1301a.webp 1024w, https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner_hu_4e8f267686c41a35.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/trin-alcove-bend/trin-alcove-4runner_hu_c7e2d20b2078ec31.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Camp setup at the Trin-Alcove area.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Being high on a cliff with little rock formations around you is a distinct comfort problem at this location. The wind was mild during my stay here but was excessive in a roof top tent. It might have been the direction of wind in relation to my tent but my tent walls flapped without end all night. I can&amp;rsquo;t imagine the experience if there was real wind in play.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;The Forest Service and other similar organizations usually open these roads after Memorial Day, depending on weather conditions.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Installing the C4 Fabrication Overland Bumper on a 2021 4Runner</title><link>https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/</link><pubDate>Sun, 24 Apr 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/</guid><description>&lt;p&gt;&lt;figure aria-label="The bumper&amp;rsquo;s inaugural trip to the High Uintas Wilderness."&gt;
 &lt;img
 alt="The bumper’s inaugural trip to the High Uintas Wilderness."
 title="The bumper&amp;rsquo;s inaugural trip to the High Uintas Wilderness."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/c4-bumper-featured_hu_44a96bfac844cb6d.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/c4-bumper-featured_hu_54341a38e30936fb.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/c4-bumper-featured_hu_4bd374636d62cc2c.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/c4-bumper-featured_hu_c9469fa032ea06a0.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/c4-bumper-featured_hu_3ac0714d96b61857.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The bumper&amp;rsquo;s inaugural trip to the High Uintas Wilderness.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;As a fair warning to readers, this guide is not meant as a step by step instruction replacement from C4 Fabrication themselves&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; or professional Toyota mechanics&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;. I sincerely recommend consulting the product&amp;rsquo;s installation guide as a source of definitive information and a variety of community reviews to get a more encompassing image of a potential future project. Please consider this article as more of a personal review and collection of tips for the installation of this product.&lt;/p&gt;
&lt;h2 id="motivation-to-install"&gt;&lt;a href="#motivation-to-install"&gt;Motivation to Install&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;I used to live in Page, Arizona, which is a far jaunt from any sort of major metropolitan area. Combine that with my wife&amp;rsquo;s professional obligations and our own family visits it made for hundred of hours of driving. Being so far from civilization increased our risk of hitting wildlife on quiet country roads. The most common were deer. I can&amp;rsquo;t count the number of times we nearly hit deer while driving in the late evening. It was incredibly stressful to drive portions of U.S. Highway 89 in Southern Utah. Combining the fatigue of the tail end of a six hour drive with the very common risk of a semi-large animal crossing in front of your vehicle made for an exhausting experience. You always had to have your car&amp;rsquo;s high beams on while you squinted at either side of the road for signs of movement. At the time we drove a VW station wagon, which was a solid German vehicle but left you feeling a but vulnerable since you were low on the road to say a semi-truck or larger SUV.&lt;/p&gt;
&lt;p&gt;The danger to human and animal life became so wide spread that the state of Utah built a wildlife highway barrier between Kanab, Utah and Page, Arizona in late 2013&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt;. The Utah Department of Transportation estimated that prior to the barrier being erected there were 100 to 105 collisions per year between vehicles and deer. This is a rather low statistic when you consider that over the 5 years following the building of the structure the study associated with the initiative tracked 78,610 mule deer migrating through various access points&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt;. This made the migration project the most successful in the United States. The next comparable migration project was in Nugget Canyon, Wyoming at only approximately 49,000 mule deer.&lt;/p&gt;
&lt;p&gt;I would agree that my exposure on Highway 89 was a bit skewed it nonetheless fortified my perception of needing some sort of protection. It wasn&amp;rsquo;t exactly the first brick in the basis of my feeling. When I was younger my step dad totaled his truck on a highway near Flagstaff, Arizona after hitting an elk. I wasn&amp;rsquo;t even around when it happened but the images of the aftermath of his truck certainly stayed with me. But after relocating to Salt Lake City, Utah most of these thoughts would lie dormant. Deer became things I only saw on trail runs in the early morning. That was until I purchased my 4Runner and realized I would be returning to many of these country roads and the risk of wildlife collisions along with it.&lt;/p&gt;
&lt;p&gt;I decided to purchase the C4 Fabrication Overland bumper with full headlight loops to primarily decrease the risk of major damage to my vehicle during a wildlife collision. Many might decry the substantial risk of a vehicle with a high center of gravity and the pronounced rigidity of a steel front bumper during a collision creating more risk. But I understand a portion of this vehicle modification is purely psychological. At the very least I can say that with the bumper&amp;rsquo;s presence I drive much more deliberately and smoothly as I can feel the weight whenever driving. The secondary reason for getting this bumper is the better approach angles and capacity for future larger tires. My current tire size at 275/70R17 might not seem very large compared to most builds but I am planning an upgrade sometime in 2023 that would suit this aggressive bumper a bit better. The final reason I chose this bumper was purely for vanity. I really enjoy the aggressive look, especially with the associated C4 front skid plate that continues the sharply angled line towards the bottom of the vehicle&amp;rsquo;s profile. The tires are also exposed from the front on either side that really shows the knobby tread of off road tires.&lt;/p&gt;
&lt;h2 id="preparation"&gt;&lt;a href="#preparation"&gt;Preparation&lt;/a&gt;&lt;/h2&gt;

&lt;h3 id="parts-and-tools"&gt;&lt;a href="#parts-and-tools"&gt;Parts and Tools&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://c4fabrication.com/collections/4runner-2014/products/4runner-overland-series-front-bumper-5th-gen-2014"&gt;C4 Fabrication 4Runner Overland Series Front Bumper&lt;/a&gt; - My options included a 30&amp;quot; light bar cutout, full height bull bar with headlight hoops, and a washer tank skid plate.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.warn.com/vr-evo-10-s-103253"&gt;WARN 103253 VR EVO 10-S Winch&lt;/a&gt; - The general guideline in sizing a winch would be 1.5 times your vehicle weight. If you wanted more peace of mind it would be very easy to upgrade to the 12-S. I stayed at 10,000 pounds to save some money and also make winch a tad faster since the gearing ratio is different and slower on the 12-S.&lt;/li&gt;
&lt;li&gt;Power Steering Fluid - There are a lot of options available here but to save myself a headache or potential major issue I simply went into my nearby Toyota Dealership and told them what I was doing and they gave me the correct product. They even verified a single bottle was enough to refill my power steering fluid reservoir. Shady Amazon resellers can&amp;rsquo;t touch that level of confidence.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bajadesigns.com/squadron-sport/"&gt;Baja Designs S8 Series LED Light Bar&lt;/a&gt; - 30&amp;quot; length with amber lenses and the driving/combo pattern.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bajadesigns.com/squadron-sport/"&gt;Baja Designs Squadron Sport LED Lights&lt;/a&gt; - I went with amber lenses and the wide cornering pattern.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B07CSPGVFJ/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;Fog Light Connectors&lt;/a&gt; - These H11 H8 connectors allowed me to utilize my OEM 4Runner fog light connector plugs rather than cutting any stock wires.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B074DMPH8P/ref=ppx_yo_dt_b_asin_title_o03_s00?ie=UTF8&amp;amp;psc=1"&gt;16 and 14 Gauge Wire&lt;/a&gt; - There are many cheaper alternatives but these wires are 99.99% copper rather than copper clad aluminum. This will help conductivity but it is required to have complete weather sealing to avoid oxidization. I have seen some solar wires that are aluminum clad copper to avoid weathering but it probably isn&amp;rsquo;t needed if you have healthy sealing.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B07GFXHH91/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;th=1"&gt;Crimping Tool for Heat Shrink Connectors&lt;/a&gt; - In retrospect, I would have actually gotten the crimper in the 8 or 11 piece package because the die is swappable with other crimper dies. This becomes really important if you have plans to add Baja Design lights since they use Weather Pack Connectors.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/DEWALT-DCE530B-Cordless-Heat-Tool/dp/B07RJDRS6Y/ref=sr_1_1?crid=3KMVYXHXH1PYS&amp;amp;keywords=dewalt%2Bheat%2Bgun&amp;amp;qid=1651118494&amp;amp;sprefix=dewalt%2Bheat%2Bgu%2Caps%2C134&amp;amp;sr=8-1&amp;amp;th=1"&gt;Heat Gun&lt;/a&gt; - Critical to achieving water tight sealing on your cabling connections. This thing eats batteries like no one&amp;rsquo;s business. Maybe consider a corded version.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B089D82FLG/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;Heat Shrink Tubing Kit&lt;/a&gt; - Make sure all the components you are buying is Marine Grade. You vehicle is exposed to a great deal of environmental variation and all this stuff needs to hold up. This Wirefy brand seems to be universally respected, even within the DIY Solar community.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B07124B886/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;th=1"&gt;Heat Shrink Wire Connector Kit&lt;/a&gt; - I got the large 540 piece kit since I will be using it for my own future modifications and other electronics I setup around the house.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B000JNNWQ2/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;Wire Strippers&lt;/a&gt; - Having decent wire strippers is critical for your sanity since this project requires a ton of wire stripping. If you plan on doing a lot more of your own electrical work in the future it would be helpful to upgrade to a more elegant stripper 😏 like the &lt;a href="https://www.amazon.com/dp/B00BC39YFQ?ref_=cm_sw_r_cp_ud_dp_FCB6EM6X771FXHS7JY6B"&gt;Klein 11063W&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/dp/B005MR516Y?ref_=cm_sw_r_cp_ud_dp_D6CJJYQ6QX7Y8M7QXBF8"&gt;Dymo Label Maker&lt;/a&gt; - Labelling your cables makes it look both professional and also keeps everything organized. When you are working on something in months or years in the future you will know exactly what goes where.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B09SZ5C81Z/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&amp;amp;th=1"&gt;Heat Shrink Tube Labels&lt;/a&gt; - Many of the off-brand suppliers are good quality and are considerably cheaper than Dymo specific. Most of my labels were either 1/2&amp;quot; or 3/4&amp;quot;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="new-bumper-preparation"&gt;&lt;a href="#new-bumper-preparation"&gt;New Bumper Preparation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Since C4 Fabrication does not powder coat any of their products I actually shipped the bumper directly to a local company rather than to my house. This saves the hassle of a double trip to and from your house to the powder coating company. After I got the bumper back I inspected the entire surface area for any missed sections. There were a few spots that I could tell were used to hang the bumper during powder coating application and subsequently were not properly covered. It was an easy fix to do a couple coats of spray paint on those spots to discourage any rust from starting. There are lot of nooks and crannies on this bumper that aren&amp;rsquo;t easily reachable once installed so this step is key before installing.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Installing lights and winch on new bumper."&gt;
 &lt;img
 alt="Installing lights and winch on new bumper."
 title="Installing lights and winch on new bumper."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-prep_hu_c5eef34a9c640157.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-prep_hu_e028a0ebd5d08487.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-prep_hu_16019f7297dc8fd8.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-prep_hu_97070641f4de21c8.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-prep_hu_bbbf66cc172f7bc3.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Installing lights and winch on new bumper.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I set up my bumper on a rubber pad in my garage with a floor jack holding up the front to somewhat mimic the orientation of being installed. Having the bumper semi-upright helped a lot when aiming the thirty inch light bar and fog lights. While the bumper wasn&amp;rsquo;t perfectly level I simply went off the winch bottom mounting plate to get a sense of what a true ninety degree angle would look like after installation. Getting the lights on the bumper was very straightforward and the only time consuming portion was simply getting the light angle as correct as I thought possible. There are some slots built into the bumper that allow for interior access even after installation but the angles for applying tools to bolts are not very forgiving. So it is best to get things right before rather than depending on afterward.&lt;/p&gt;
&lt;p&gt;For the positioning of the winch I regret not positioning it closer to the vehicle. I was worried about clearing the radiator and air conditioning lines so I placed it as far forward as possible. I think this contributes slightly to some vibrations I am seeing with the bumper on extremely rough roads due to the fact that the heavy weight of the bumper is not directly in line with main bolt location. In other words, the center of gravity of the winch overhangs out to the front a bit when if it was closer to the vehicle it would be more in line with the support of the OEM bumper bolts. Regardless, I plan on adjusting this in the future when I have my front skid plate off. The two front bolts of the winch are exposed with slots in the bumper but the rear can only be accessed by angling in a tool near the skid plate area. So depending on your skid plate setup you might have easier or harder access to those rear winch bolts once the bumper is on your vehicle.&lt;/p&gt;
&lt;h3 id="marking-the-cutting-line"&gt;&lt;a href="#marking-the-cutting-line"&gt;Marking the Cutting Line&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Before removing anything from the 4Runner I measured and marked on the bumper for where it would be required to later cut. Describing the locations and points of measurements with words would be rather difficult so I would strongly encourage watching C4&amp;rsquo;s video or Timmy the Toolman&amp;rsquo;s. Keep in mind that the general goal of this step is simply to have a horizontal flat cut through your plastic bumper with about a half inch gap between the plastic bumper and the new steel bumper.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Measuring before cutting."&gt;
 &lt;img
 alt="Measuring before cutting."
 title="Measuring before cutting."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/cutting-measure_hu_f5fcea0a503eb8ba.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/cutting-measure_hu_9734b627784b83c2.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/cutting-measure_hu_bcfac6940534ab89.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/cutting-measure_hu_170f3bcf53afa802.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/cutting-measure_hu_7b342b32e45dfc4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Measuring before cutting.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h3 id="tss-sensor-relocation"&gt;&lt;a href="#tss-sensor-relocation"&gt;TSS Sensor Relocation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;One thing to note is that my 4Runner had a slightly different center mesh setup that most I saw. There was actually a mounting location for my vehicle&amp;rsquo;s TSS sensor right in the center of the plastic mesh, which had to be cut through in order to achieve the same horizontal line across. Luckily, the TSS sensor itself can be unplugged and put to the side in order to avoid the risk of cutting through it. I thought this prudent considering a Toyota Technician at the dealership told me it was a pretty expensive part to replace.&lt;/p&gt;
&lt;p&gt;There was no new location to mount the TSS sensor so I simply zip-tied it back to the plastic bumper at reasonable angle. I chose a position above the bulk of the steel in the new bumper but lower than the headlight loops. The goal was to have the sensor have some sort of unobstructed &lt;em&gt;view&lt;/em&gt; in front of the vehicle. I have had a lot of problems with the sensor erroring out while driving in this rudimentary location and thought I would be forever plagued with these notifications in the driver&amp;rsquo;s LED screen.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="4Runner TSS OEM mount."&gt;
 &lt;img
 alt="4Runner TSS OEM mount."
 title="4Runner TSS OEM mount."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/tss-oem-mount_hu_d3c8a39c679d149a.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/tss-oem-mount_hu_4f291f95ec654dc9.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/tss-oem-mount_hu_62c419e7b18db007.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/tss-oem-mount_hu_4592756dcd8b414e.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/tss-oem-mount_hu_9d724e2ca0bc68f1.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;4Runner TSS OEM mount.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;However, during the summer of 2022, C4 Fabrication began offering a TSS relocation bracket&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; that I intend on purchasing in the near future. I can&amp;rsquo;t vouch for how successful the bracket would make TSS perform but I do know that TSS can be re-calibrated if you take it into a Toyota Dealership. While I never expect to regain a factory performance of TSS I certainly hope one day I can have it perform at least reasonably well enough to stop constantly erroring and disabling itself.&lt;/p&gt;
&lt;h3 id="disassembling-the-stock-bumper"&gt;&lt;a href="#disassembling-the-stock-bumper"&gt;Disassembling the Stock Bumper&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Once I had my lines marked on the plastic portion of the bumper I began removing most of the front bumper. Most components were surprising easily to remove and I followed the instructions outlined by C4 Fabrication. The hardest part were the bracket tabs connecting the plastic bumper to the wheel wells. These screw tabs have been forever my enemy over the course of several other modifications. I find myself looking up videos about their removal&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; every time I encounter them, which helps quite a bit in avoiding breaking them or becoming irrationally angry.&lt;/p&gt;
&lt;h2 id="power-steering"&gt;&lt;a href="#power-steering"&gt;Power Steering&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Out of all the steps of installing this new C4 Fabrication Overland bumper the power steering portion is what intimidated me the most. I can easily bolt brackets here and there or custom wire things with specialized deutsch connectors but messing with the factory power steering lines took me out of my comfort zone. The premise of installing this third party power steering cooling reservoir is to achieve a greater clearance for the new bumper to sit tighter to your vehicle. Without it I would be faced with an aluminum line directly in line with where the winch sits on the new steel bumper. In an effort to avoid performing this step I looked around at other people&amp;rsquo;s installations where they didn&amp;rsquo;t add the new power steering reservoir. I only found a few examples but the amount of bending required in the stock power steering lines gave me some hesitancy. Would I rather have a third party power steering cooling reservoir with proven performance or push my OEM power steering aluminum lines to their limit? Ultimately, I decided to leave my comfort zone and install the new reservoir.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="4Runner without front bumper."&gt;
 &lt;img
 alt="4Runner without front bumper."
 title="4Runner without front bumper."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/4runner-naked_hu_2bd3eeeb92ab66bc.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/4runner-naked_hu_bf7b0bb6cfbc70d1.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/4runner-naked_hu_4349b36287e9faeb.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/4runner-naked_hu_d7edda8dca5680cc.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/4runner-naked_hu_b087bd143dbd8e2b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;4Runner without front bumper.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After removing the bulk of the stock bumper you can see the power steering line going across in front of the radiator and the subsequent need to have it relocated. I&amp;rsquo;m not sure why the Toyota 4Runner has so much open space in the front area but the designing engineers certainly embraced all the open area to seemingly run the power steering cooling line as far out from the radiator as possible. Perhaps there are certain lengths required for the air dams to perform effectively that made the stock bumper have so much room in the front but I really don&amp;rsquo;t know.&lt;/p&gt;
&lt;p&gt;Removing the stock power steering cooling line involves jettisoning all the metal portions while keeping the rubber parts that are located more within the interior of the engine bay. These lines are of course filled with power steering fluid so draining them is a requirement. The way to perform this drainage in the most controlled manner is to locate the L sections of the metal lines on either side of bumper. Approaching one side first you simply undo the metal line at that junction and thereafter use a flathead screwdriver inserted into the line to leverage bending it so that it points downward. The bulk of the fluid should drain with this method and it should be repeated on both sides. Keep in mind that to eek out the last little bits of fluid you can turn the vehicle&amp;rsquo;s steering wheel back and forth to work liquid through the line. The car should not be turned on during this step to avoid damaging the power steering fluid pump.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Removing power steering Lines and fluid."&gt;
 &lt;img
 alt="Removing power steering Lines and fluid."
 title="Removing power steering Lines and fluid."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/powersteering-drain_hu_f35879f646897848.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/powersteering-drain_hu_ff7c7c2ea542b8f1.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/powersteering-drain_hu_2c086d6732082440.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/powersteering-drain_hu_1013f374e87f3b15.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/powersteering-drain_hu_2033b0374c9fe068.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Removing power steering Lines and fluid.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After the metal lines are remove and the fluid is drained you can begin the installation of the new power steeling cooling reservoir. I located the reservoir to the lower left of the radiator if you were facing the vehicle. The location was fine with the provided power steering rubber hose replacements. The two foot hose went out from the top of the reservoir up to the left to meet directly with the main vehicle reservoir. The other hose was slightly longer at forty-eight inches and came out of the bottom of the reservoir bending over the top and going across the radiator to the right to meet up with the old location of the power steering line location to reform the closed loop. Getting the hoses onto the reservoir apparatus is greatly helped by adding a little power steering fluid coating to lubricate the hose coupling. Additionally, I took cut up sections of the old hose to create small protective rubber sleeves for the new hose at points where abrasion would become a problem.&lt;/p&gt;
&lt;p&gt;During the preparation stage for this project I looked up various types of power steering fluids that were compatible with the 4Runner. There were quite a variety of results and available products that were kind of overwhelming. To avoid any mishap by introducing a non-compatible fluid I simply visited my local Toyota Dealership. They were able to lookup the exact fluid I needed and also the exact number of ounces required to completely refill the new cooling loop.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="New power steering radiator."&gt;
 &lt;img
 alt="New power steering radiator."
 title="New power steering radiator."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/new-powersteering-radiator_hu_44f05a70f6929863.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/new-powersteering-radiator_hu_70b3941851d8e1a2.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/new-powersteering-radiator_hu_1a5216d91475f7aa.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/new-powersteering-radiator_hu_c74b31fabc605242.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/new-powersteering-radiator_hu_2e02b9e7fe6e5699.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;New power steering radiator.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Adding power steering fluid back into the vehicle is easy but requires a bit of massaging. While the 4Runner was still off I poured in enough to hit the fill line in the main engine bay power steering reservoir. After I hit that line I turned the steering wheel back and forth to work liquid into the cooling line. This might make the reservoir &lt;em&gt;gurgle&lt;/em&gt; a bit and splash a bit of power steering fluid our if the cap isn&amp;rsquo;t full covering the top opening. Repeating this process a few times until I hit the fill line I finally turned the vehicle on and repeated the same process with the help of the power steering fluid pump helping out. A final tip would be to check the power steering level after driving around the block for a bit and also after your next longer drive over fifty or one-hundred miles.&lt;/p&gt;
&lt;p&gt;Before moving on from this step I made sure to gently bend the air conditioning line that sits in front of the radiator. I wanted as much room for the internal components and the steel bumper itself to sit flush with the vehicle. This provides the greatest approach angle from the bumper and also gives greater room for access components of the winch if any future maintenance is needed. The aluminum line is firm but not immovable. I was strong but careful in pushing it back into the vehicle in order to avoid any crimps or excessive bending that would lead to a small leak.&lt;/p&gt;
&lt;h2 id="cutting"&gt;&lt;a href="#cutting"&gt;Cutting&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Up until this point I had been only modifying the internals of my 4Runner and it was finally time to bring the front bumper under the knife. This part had me slightly stressed but for some reason the power steering relocation was the larger mountain for me to climb. Cutting in a straight line was seemingly not too difficult but proved to be rather tricky. I ended up going with the recommendation from the C4 Fabrication installation video by using the angle grinder to cut through the plastic bumper. I do own a Dremel tool and also a reciprocating saw, which is what Timmy the Toolman used in their installation. Based on the size and approach angle of the Dremel tool it did not feel like I could get a flat angle while cutting across. The cutting disk simply did not extend far enough. On the other side of the spectrum I felt that the reciprocating saw had too much lateral movement while cutting and wouldn&amp;rsquo;t give enough control to get a clean line.&lt;/p&gt;
&lt;p&gt;Ultimately going with the angle grinder proved effective but there were a few caveats during cutting that I wanted to note. Due to the round shape of the grinder blade it became hard to approach the indents of the plastic bumper. In some cases I had to approach from the front and back in multiple phases in order to get the cut fully into the bumper. Another issue I experienced was that if I went too slow during the cut the angle grinder blade would heat up considerably and melt parts of the plastic bumper. This would cause some plastic to collect into clumps along the edge of the reveal. Breaking them off was simple and easy but in some cases it would chip the paint in small bits. I probably wouldn&amp;rsquo;t have had this heating problem with a reciprocating saw but I certainly got more control by cutting with the angle grinder. To clean up the edge after cutting simply involves using a file along the rough parts to bring everything absolutely even and smooth.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Plastic bumper after trimming."&gt;
 &lt;img
 alt="Plastic bumper after trimming."
 title="Plastic bumper after trimming."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-trim_hu_bf7c6febf18ede30.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-trim_hu_e3ba0b2415472e29.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-trim_hu_e694c31f7389b74f.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-trim_hu_74e34fa3aa3ddf18.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/bumper-trim_hu_e661502ed4dcf6b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Plastic bumper after trimming.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After completing the cut of the bumper you might consider adding some sort of edge trim&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; to the bottom of the plastic bumper. The sort with a heat activated adhesive would work best to stay in place. This could help discourage any paint chipping or wear on the plastic edging now that it has been damaged by aftermarket cutting. I actually did not add any edge trimming but I plan to in the near future to specifically avoid any further paint chipping at the plastic bumper edges.&lt;/p&gt;
&lt;h2 id="mounting-the-bumper"&gt;&lt;a href="#mounting-the-bumper"&gt;Mounting the Bumper&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Getting the bumper up onto my 4Runner definitely required a second pair of hands. In addition, I used a hydraulic jack in the center to help support the bulk of the weight to avoid physical strain. With the jack in the center both myself and the person helping me only really had to focus on balancing the steel bumper while we adjusted angle and height to get it on the vehicle. One tip I found invaluable from C4 was to thread the top bolt of the bumper mounting point in backwards. Having these bolts sticking out towards the front gives a perfect spot to hang the bumper up on while you add in the other bolts in the correct direction.&lt;/p&gt;
&lt;p&gt;Once all the main and supporting bolts are in place you want to make sure the new steel bumper is balanced across both sides of the vehicle and the gap between itself and the plastic bumper is equal at all parts. The guideline from C4 was to have about a half inch gap between the two in order to allow for flexing while off-roading and other unique vehicle situations. A half inch might look a bit too much when you are near the vehicle but if you step back a bit it all blends in together and is less obvious. I went for a gap slightly smaller than a half inch and I can already see some rubbing on either side of the steel bumper from coming into contact with the plastic bumper trim above.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Trimming the mudflaps."&gt;
 &lt;img
 alt="Trimming the mudflaps."
 title="Trimming the mudflaps."
 width="1440"
 height="960"srcset="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/mudflap-trimming_hu_c774246f13c6157e.webp 480w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/mudflap-trimming_hu_34e7ce982c82bba2.webp 768w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/mudflap-trimming_hu_5d423276adbdfb64.webp 1024w, https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/mudflap-trimming_hu_9c4e11c5eb71bae2.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/installing-the-c4-fabrication-overland-bumper-on-a-2021-4runner/mudflap-trimming_hu_8e24c31fbedeb179.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Trimming the mudflaps.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;I started trimming the mudflap area prior to mounting the new steel bumper but only finished afterwards. This was due to seeing the profile of the bumper in comparison to the level of trimming I had been doing on the mudflap area. I also added a few zip ties in key spots to keep the plastic from flopping around. This isn&amp;rsquo;t specifically needed since the plastic is so rigid but does help increase the coverage of the mudflaps now that my tires were fully exposed. I am sure things will get incredibly muddy in that area of the vehicle so keeping some level of mudflap coverage is helpful, especially when preventing the elements from getting into your engine bay or near semi-critical components.&lt;/p&gt;
&lt;h2 id="wiring"&gt;&lt;a href="#wiring"&gt;Wiring&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;To have a trim wiring setup with the new fog lights to the OEM connectors I bought some pre-wired H11 connectors&lt;sup id="fnref:8"&gt;&lt;a href="#fn:8" class="footnote-ref" role="doc-noteref"&gt;8&lt;/a&gt;&lt;/sup&gt;. On the other end of those I added the Delphi Weatherpack connectors in order to connect to the Baja Squadron Sport plugs. The result was a small footprint connector that didn&amp;rsquo;t involve cutting the OEM fog log connections. Any slack in the wiring was simply zip-tied up a bit to get away from direct mud exposure.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=w6GxuO_aKBk"&gt;2014+ 4runner Front Bumper Installation Guide by C4 Fabrication&lt;/a&gt;&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=s7NS5MPX73w"&gt;C4 Fabrication Front Bumper Install - 5th Gen 4runner (Part 1) by Timmy The Toolman&lt;/a&gt; and &lt;a href="https://www.youtube.com/watch?v=vdFb4eIDUaE"&gt;C4 Fabrication Front Bumper Install - 5th Gen 4runner (Part 2) by Timmy The Toolman&lt;/a&gt;&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;[UDOT builds fence near Kanab to prevent car versus deer collisions] (&lt;a href="https://www.ksl.com/article/25120824/udot-builds-fence-near-kanab-to-prevent-car-versus-deer-collisions"&gt;https://www.ksl.com/article/25120824/udot-builds-fence-near-kanab-to-prevent-car-versus-deer-collisions&lt;/a&gt;)&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;&lt;a href="https://trid.trb.org/view/1659701"&gt;U.S. Highway 89 Kanab-Paunsaugunt Wildlife Crossing and Existing Structures Research&lt;/a&gt;&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;&lt;a href="https://c4fabrication.com/collections/4runner-2014/products/4runner-tss-relocation-kit"&gt;4Runner TSS Relocation Kit&lt;/a&gt;&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=Ob5ZahLgoVc"&gt;How to Remove Toyota Inner Fender Clips&lt;/a&gt;&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;&lt;a href="https://www.amazon.com/Cowles-T5602-Edge-Trim-Black/dp/B001EA0LJK?th=1"&gt;Cowles T5602 Edge Trim&lt;/a&gt;&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:8"&gt;
&lt;p&gt;&lt;a href="https://www.amazon.com/gp/product/B07CSPGVFJ/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;MUYI Fog Light Connector&lt;/a&gt;&amp;#160;&lt;a href="#fnref:8" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Black Dragon Canyon</title><link>https://rb.ax/blog/black-dragon-canyon/</link><pubDate>Tue, 01 Feb 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/black-dragon-canyon/</guid><description>&lt;p&gt;&lt;figure aria-label="Entering the early part of the canyon"&gt;
 &lt;img
 alt="Entering the early part of the canyon"
 title="Entering the early part of the canyon"
 width="1440"
 height="959"srcset="https://rb.ax/blog/black-dragon-canyon/black-dragon-2-featured_hu_1a72f10eb45c42ff.webp 480w, https://rb.ax/blog/black-dragon-canyon/black-dragon-2-featured_hu_5f41cb246f39f39e.webp 768w, https://rb.ax/blog/black-dragon-canyon/black-dragon-2-featured_hu_4188cf09f060dbe1.webp 1024w, https://rb.ax/blog/black-dragon-canyon/black-dragon-2-featured_hu_d9e72c595b9bc3e8.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/black-dragon-canyon/black-dragon-2-featured_hu_9ebed59717ccd11.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Entering the early part of the canyon&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Some fair weather in early February convinced me to finally give some new camping equipment a test run. All of it had been lying around since the previous Black Friday. The 0 F rated sleeping bag kept encouraging me to brave the winter weather. You&amp;rsquo;ll be warm in my fluffy embrace it kept saying to me. So I finally did it. But not to the true test of winter in norther Utah like a true survivalist. Instead, I wandered around on Google Maps around central Utah where the weather was a bit more forgiving. The images of Black Dragon Canyon impressed me most and the steep walls convinced me it was my destination for that weekend.&lt;/p&gt;
&lt;p&gt;As you will see from the images, the location get its name from the impressive walls that widely curve their way through seemingly solid sandstone. The walls become even more reptilian when you see the long sinewy black stains draping down the sides of the canyon. Located in the southern part of the San Rafael Swell, Black Dragon Canyon is an impressive site that is just minutes off I-70. Since there is no real exit for the canyon you will have to watch for the sign and gate. It is on the right hand sign of the westbound side of the highway. There is a tunnel underneath but I can&amp;rsquo;t be certain if it would give access from exiting on the eastbound side. If you come up to the gate and it looks closed it might actually just have the chain wrapped around the post to keep cattle from the highway. Just make sure to close it back up after going through. From there it is just a few minutes up a dirt road to get into the deepest parts of the canyon.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Where the I-70 highway splits through the San Rafael Reef."&gt;
 &lt;img
 alt="Where the I-70 highway splits through the San Rafael Reef."
 title="Where the I-70 highway splits through the San Rafael Reef."
 width="1440"
 height="959"srcset="https://rb.ax/blog/black-dragon-canyon/black-dragon-1_hu_c564ff979982aad5.webp 480w, https://rb.ax/blog/black-dragon-canyon/black-dragon-1_hu_423e1fa7233a2a8a.webp 768w, https://rb.ax/blog/black-dragon-canyon/black-dragon-1_hu_c82faae5682dc2.webp 1024w, https://rb.ax/blog/black-dragon-canyon/black-dragon-1_hu_9d12d6265cd2652e.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/black-dragon-canyon/black-dragon-1_hu_3b4955abbe8bc1bb.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Where the I-70 highway splits through the San Rafael Reef.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The part of the canyon where the walls start to resemble a giant black dragon."&gt;
 &lt;img
 alt="The part of the canyon where the walls start to resemble a giant black dragon."
 title="The part of the canyon where the walls start to resemble a giant black dragon."
 width="1440"
 height="959"srcset="https://rb.ax/blog/black-dragon-canyon/black-dragon-5_hu_a65682755355287c.webp 480w, https://rb.ax/blog/black-dragon-canyon/black-dragon-5_hu_3b45ffd84844f3dd.webp 768w, https://rb.ax/blog/black-dragon-canyon/black-dragon-5_hu_772d31d50ad1554a.webp 1024w, https://rb.ax/blog/black-dragon-canyon/black-dragon-5_hu_5be829f88271d8fd.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/black-dragon-canyon/black-dragon-5_hu_fa666464eda10e08.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The part of the canyon where the walls start to resemble a giant black dragon.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Most of the trail was tolerable but in several sections I had to drop down sandstone steps and it would hit my 4Runner&amp;rsquo;s bumper frame."&gt;
 &lt;img
 alt="Most of the trail was tolerable but in several sections I had to drop down sandstone steps and it would hit my 4Runner’s bumper frame."
 title="Most of the trail was tolerable but in several sections I had to drop down sandstone steps and it would hit my 4Runner&amp;rsquo;s bumper frame."
 width="1440"
 height="960"srcset="https://rb.ax/blog/black-dragon-canyon/black-dragon-6_hu_aaa65588fb7bfdc.webp 480w, https://rb.ax/blog/black-dragon-canyon/black-dragon-6_hu_96f7d54c9057f6c3.webp 768w, https://rb.ax/blog/black-dragon-canyon/black-dragon-6_hu_c64de6b6bfe6f937.webp 1024w, https://rb.ax/blog/black-dragon-canyon/black-dragon-6_hu_53906df3a6e1662d.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/black-dragon-canyon/black-dragon-6_hu_858ab2f6a619bdcb.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Most of the trail was tolerable but in several sections I had to drop down sandstone steps and it would hit my 4Runner&amp;rsquo;s bumper frame.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Depending on your level of adventure you can also approach the canyon from the west for a semi-challenging off-road day trip. This starts from the west by exiting to Lawrence Road, which transitions to Buckhorn Draw Road, Jerry&amp;rsquo;s Flat Loop, and finally to Black Dragon Road. Much of the first third is rather boring dirt roads but the last part of the road gets quite challenging. There are a few spots some extra care for tire placement and approach, even with my slightly lifted 4Runner. This would be a walk in the park for a vehicle with rock sliders and a lift over 2-3 inches. Much of the challenge of this last part was due to natural elements of the terrain. There were parts directly on sandstone that had warn away in a step-like fashion that created sizable drop offs as you went down the trail. Other tough spots were in the dry riverbeds you crisscross. Rainstorms and flooding in the desert can shuffle the sand and rocks into a very challenging situation.&lt;/p&gt;
&lt;p&gt;If you plan on making a longer trip out of visiting Black Dragon Canyon be aware that camping is prohibited in some sections of the canyon. There are signs designating when this rule takes effect and my trail application (GaiaGPS) had some map notes about the restriction. I didn&amp;rsquo;t even make it that far since I got a late start from my house and ended up sleeping about halfway to the canyon.&lt;/p&gt;
&lt;p&gt;The weather wasn&amp;rsquo;t that bad for January as I set out for my trip. I knew the temperature dropped significantly at night but the warmth of the daytime was another element of subconsciously misleading myself. As I left the highway and onto the dirt road I actually opened my windows to cool off. A bit of this was due the exhilaration of tackling some parts of the trail in completely darkness. I didn&amp;rsquo;t have any fancy overlanding lights and so took it slow along cliffs and around bends. Such care builds up a metabolic exchange so I was pretty relieved to get out of the car at the site I had picked to camp. However, after leaving the warmth of a running vehicle combined a with progressively more vicious wind I quickly became cold. But I had prepared for this! Whipping out my fancy new fluffy 0 F sleeping bag at first was the greatest feeling. The impending cold of the night must have been scared. I was going to sleep like the king of warm fluffiness despite some harrowing desert canyon winds outside. More realistically, the cold night simply kept at its uncaring and relentless job. And it certainly did.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Bird&amp;rsquo;s Eye View at Black Dragon Canyon."&gt;
 &lt;img
 alt="Bird’s Eye View at Black Dragon Canyon."
 title="Bird&amp;rsquo;s Eye View at Black Dragon Canyon."
 width="1440"
 height="959"srcset="https://rb.ax/blog/black-dragon-canyon/black-dragon-3_hu_8da82b12209ade93.webp 480w, https://rb.ax/blog/black-dragon-canyon/black-dragon-3_hu_62b8177fa3305646.webp 768w, https://rb.ax/blog/black-dragon-canyon/black-dragon-3_hu_53d10418cf9b5b4b.webp 1024w, https://rb.ax/blog/black-dragon-canyon/black-dragon-3_hu_10160e08bd36d995.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/black-dragon-canyon/black-dragon-3_hu_a1f14cf1ac48ca31.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Bird&amp;rsquo;s Eye View at Black Dragon Canyon.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Over the course of the night I woke up about every hour as I got increasingly cold. I started my night with a simple outfit of sweat pants and a shirt. There are some orthodox people out there that swear you shouldn&amp;rsquo;t complicate your sleeping situation with extra layers and that even sometimes they work counterintuitively to staying warm. This rapidly became fake news as I donned more and more layers to reach a warmer temperature equilibrium. Over the course of several hours I eventually ended up with some thick wool socks, sweatpants, fleece jacket, and a beanie. The wardrobe allowed me to get warm enough to sleep for a solid two hours. I got through the rest of the night until the coldest part at around 5AM, which got into the low teens, Fahrenheit. While I could feel the lines of stitching in the sleeping back from the cold or warmth that part wasn&amp;rsquo;t what woke me up. It was my freezing eyeballs and nose. The only piece of clothing I don&amp;rsquo;t own is a jacket for my eyeballs and I&amp;rsquo;m not sure I have seen such an item at any outdoor equipment store. I realize that a full ski getup could accomplish the same thing but things like this don&amp;rsquo;t enter your mind as you are packing when you are an amateur winter camper.&lt;/p&gt;
&lt;p&gt;Thankfully the sun brought warmer temperatures in the morning. Continuing onward on the road eventually brought me to the beginnings of Black Dragon Canyon. Coming from the longer west route is almost better since the terrain slowly changes and the grand culmination of the geography ends with Black Dragon Canyon itself. The alternative is leaving I-70 and immediately entering the canyon, which is impressive, but the drawn out story of the terrain is a bit halted.&lt;/p&gt;
&lt;p&gt;On top of the impressive geographic features of the canyon there are some stunning petroglyphs on the walls. Unfortunately, some newer graffiti has been added as well. I can understand the irony that older graffiti is somehow more sacred and anthropologically significant while &amp;ldquo;&lt;em&gt;Trevor 2006&lt;/em&gt;&amp;rdquo; is met with derision. Older but still modern graffiti is also rather fascinating. I find early 20th century markings as equally fascinating as the native ones from hundreds of years prior. It is rather fascinating psychology to see what the benchmark or cutoff threshold is for people. Some might think nothing less than a few hundred years old to be worth their time. I think anything older than 75-100 years is rather fascinating. But definitely nothing within the past 20. If federal officials were to leave Trevor&amp;rsquo;s carving intact until around 2081 then I might consider coming back.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Modern and old graffiti in Black Dragon Canyon."&gt;
 &lt;img
 alt="Modern and old graffiti in Black Dragon Canyon."
 title="Modern and old graffiti in Black Dragon Canyon."
 width="1440"
 height="960"srcset="https://rb.ax/blog/black-dragon-canyon/black-dragon-7_hu_a50e64f50582d32c.webp 480w, https://rb.ax/blog/black-dragon-canyon/black-dragon-7_hu_a65bb1630f1d43a7.webp 768w, https://rb.ax/blog/black-dragon-canyon/black-dragon-7_hu_1d65e29d3804b109.webp 1024w, https://rb.ax/blog/black-dragon-canyon/black-dragon-7_hu_561156b4e1fcb07.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/black-dragon-canyon/black-dragon-7_hu_c2e6dea6a89f7d76.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Modern and old graffiti in Black Dragon Canyon.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;</description></item><item><title>Starting the Electrical Foundation of my 4Runner</title><link>https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/</link><pubDate>Tue, 18 Jan 2022 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/</guid><description>&lt;p&gt;&lt;figure aria-label="The Switch Pros SP-9100, SD Offroad Mount Tray, and ARB Twin Compressor ready for assembly."&gt;
 &lt;img
 alt="The Switch Pros SP-9100, SD Offroad Mount Tray, and ARB Twin Compressor ready for assembly."
 title="The Switch Pros SP-9100, SD Offroad Mount Tray, and ARB Twin Compressor ready for assembly."
 width="1440"
 height="1465"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp1-featured_hu_7845e27fb94072b0.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp1-featured_hu_6d87534ee23c0f9f.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp1-featured_hu_5534385495701b27.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp1-featured_hu_9c5c46804f681f3a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp1-featured_hu_34d6084a1307effa.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The Switch Pros SP-9100, SD Offroad Mount Tray, and ARB Twin Compressor ready for assembly.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;As a fair warning to readers, this guide is not meant as a step by step instruction replacement. I sincerely recommend consulting each product&amp;rsquo;s installation guide as a source of definitive information. Please consider this article as more of a personal review and collection of tips for these products.&lt;/p&gt;
&lt;h2 id="foundation-components"&gt;&lt;a href="#foundation-components"&gt;Foundation Components&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;I have grand plans for years of adventures and a long list of modifications for my 2021 Toyota 4Runner. It remains unknown if I will fulfill all my aspirations but in order to achieve any of them I needed a solid electrical foundation to efficiently springboard future modifications. I have read many stories of people installing modification after modification and their engine compartment ended up being an inevitable spaghetti bowl of cables. Not only is this clutter hard to diagnose and fix if the need arises it can also be dangerous since it isn&amp;rsquo;t isolated away from your vehicle&amp;rsquo;s core electrical system. This is when fuse blocks, bus bars, and solid state switches into play.&lt;/p&gt;
&lt;h3 id="fuse-block"&gt;&lt;a href="#fuse-block"&gt;Fuse Block&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Probably the most affordable and beneficial thing to add to your vehicle when accommodating a variety of electrical modifications is a fuse block. This little device basically acts like the fuse panel in your home. It protects from electrical overcurrent along each isolated circuit. Instead of starting a fire in your vehicle engine compartment you might instead just have a bad fuse you replace for a few dollars or less. A universal best practice is that the capacity should reflect approximately 125% of your overall calculated load of whatever you intend to run through it. For a 12 amp light bar it would be ideal to use a fuse with a rating of 15 amps. Some really high draw modifications like a winch wouldn&amp;rsquo;t necessarily go through a fuse block but I run my 80 amp (40A x 2) twin compressor through it. The reasoning behind this is that a winch already has a fuse installed inline to the cable that you hook up directly to the battery. So it accomplishes the same safety feature, albeit in a more cable cluttered manner. But its also a balancing act to be able to include the majority of your accessories while a few outliers remain, which is perfect fine. For my own purposes I went with a Blue Sea SafetyHub 150, which was part of the package that I purchased from SD Offroad.&lt;/p&gt;
&lt;h3 id="solid-state-switch"&gt;&lt;a href="#solid-state-switch"&gt;Solid State Switch&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;As the second part of the solution, the solid state switch, is much more advanced and quite a bit more expensive. The purpose of a switch is to consolidate all your devices into a single universal panel. Rather than trying to fit a switch for your light bar, ditch lights, compressor, side lights, rock lights, and whatever else onto your dashboard, you can instead just combine them all into a single sleek panel. The most popular products for this come from either Switch Pros or sPOD. There are certainly ways to achieve the same end result with a do-it-yourself approach but it requires quite a bit more electrical design and fabrication. If you are a fan of electronics and tinkering it is certainly worth a look. Although I find myself tinkering more and more these days I decided to go with a Switch Pros SP-9100 to save some time and provide a stable and safe foundation for my vehicle. The mad scientist stuff&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; will be coming up soon enough! This model had some great community feedback and the feature set suited my needs perfectly. Some considerations you might take when choosing a solid state switch model is to simply map out your anticipated modifications in a list and their amperage draw. Be aware that some electrical needs won&amp;rsquo;t to be switched and shouldn&amp;rsquo;t be a part of your anticipate design. A fridge will most often be plugged into your secondary power source and won&amp;rsquo;t generally be switched on and off like a light bar would. Another example I previously mentioned would be the winch since the amperage draw is so high it would not be feasible to route it through an incorporated solid state switch that had a maximum draw limit of 35 amps.&lt;/p&gt;
&lt;h3 id="onboard-air-compressor"&gt;&lt;a href="#onboard-air-compressor"&gt;Onboard Air Compressor&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Another foundational modification to consider in this great initial project is an off-roading oriented glamping modification: the onboard air compressor. There are cheaper ways to inflate your tires. I have actually owned a little mobile air compressor for several years that has served me well. The only problem is that the little guy can only work for so long before overheating. This can be a major time sink for off-roading because you are inflating all four of your tires to suite your terrain and speed. To save time I found myself skipping airing down or airing up at locations where I probably should have done so just to avoid the long wait for my compact air compressor to work through all four tires. Lowering your tire air pressure isn&amp;rsquo;t just for tackling aggressive terrain. Mild dirt roads can be made smooth by taking a little air out of your tires from their paved highway levels of PSI. For the sake of efficiency I decided to go with a crazy fast ARB twin air compressor. This thing is a beast and inflates all four of my tires without a whisper of slowing down. Being mounted in the engine bay also saves a tiny bit of room in the back and prevents me from ever forgetting to bring it along.&lt;/p&gt;
&lt;h3 id="mount"&gt;&lt;a href="#mount"&gt;Mount&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;To bring all three items together required a not so common vehicle bay mount. There are quite a few available in a wide variety of orientations and combinations, however, I didn&amp;rsquo;t see many on the market that could consolidate a fuse block, a solid state switch, and a large twin air compressor into a single platform. Also, the solid state switch mounting point needs to be vertical since if you mount a Switch Pros SP-9100 horizontally the warranty is actually voided. After some time looking around on various sites and forums I came across the SD Offroad Mount Tray. The product was a little new when I came across it and was only being sold from a guy&amp;rsquo;s Instagram account rather than a traditional website or storefront. This might be a little sketchy to some but I have been coming to enjoy little shops like this more and more. With the huge availability of 3D Printers and other fabrication tools it gives a person with a great idea the platform to publish that idea into the physical world. There are a few other shops I have plans to become a patron of in the future for their original ideas that were successfully implemented into great products. Regardless, this mount tray fit all my needs and past customers seemed to be pleased with the product so I reached out. After a few questions from Derek about my future plans and needs we decided on package and a price. Besides the mount he included the Blue Sea SafetyHub 150, 8 slot bus bar, circuit breaker, 3 fuses (125A, 2x40A), and the rest of the items needed to get everything connected. Prices on fuses, bus bars, and everything else were in line with market rates, if not just a little below.&lt;/p&gt;
&lt;h2 id="parts-and-tools"&gt;&lt;a href="#parts-and-tools"&gt;Parts and Tools&lt;/a&gt;&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.instagram.com/sdoffroadmt/"&gt;SD Offroad Mount Tray&lt;/a&gt; - Probably the best way to combine your Switch Pros, fuse block, and ARB Twin Compressor into a single package under your hood. Currently the only way to buy this is to send a message to Derek on Instagram.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sdhqoffroad.com/products/switch-pros-sp-9100-8-switch-panel-power-system"&gt;Switch Pros SP-9100&lt;/a&gt; - The brains of the operation.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sdhqoffroad.com/products/arb-twin-air-compressor-kit?_pos=5&amp;amp;_sid=8805c7f12&amp;amp;_ss=r"&gt;ARB Twin Air Compressor 12V&lt;/a&gt; - Model number is CKMTA12. Most American auto DC voltage uses 12V whereas 24V is present in other countries.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ragofabrication.com/products/arb-hose-coupling-0740112?_pos=1&amp;amp;_sid=1cbd3a201&amp;amp;_ss=r"&gt;ARB Hose Coupling 0740112&lt;/a&gt; - There a few types of this model floating around so make sure to get the correct one. In order to fit the ARB Twin Compressor it needs to be a 1/4 x 18 NPT male fitting.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B08CMKQ3DS/ref=ppx_yo_dt_b_asin_title_o01_s00?ie=UTF8&amp;amp;psc=1"&gt;ARB Fitting Plug 0740113&lt;/a&gt; - Pricy piece of plastic but it will keep your fancy new twin compressor dust free on the inside. This cap will fit both the 0740112 and 0740113 models of hose coupling. For the life of me I don&amp;rsquo;t understand why ARB simply doesn&amp;rsquo;t include this with the hose coupling itself.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sdhqoffroad.com/collections/10-current-toyota-4runner-electrical/products/10-current-toyota-4runner-sdhq-built-switch-pros-9100-keypad-mount?variant=6918479347747"&gt;SDHQ Off Road SP-9100 Keypad Mount&lt;/a&gt; - (Optional) This replaces a section of your dashboard in order for the SP-9100 keypad to sit a bit more flush. It isn&amp;rsquo;t exactly flush but it looks a bit better. SDHQ recently started &lt;a href="https://sdhqoffroad.com/collections/10-current-toyota-4runner-electrical/products/10-current-toyota-4runner-send-us-your-oem-panel-switch-pros-sp-9100-keypad-mount"&gt;offering a mail in service&lt;/a&gt; where they modify your existing dashboard panel to fit the keypad.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B08BYZ2HQK/ref=ppx_yo_dt_b_asin_title_o06_s00?ie=UTF8&amp;amp;th=1"&gt;Crimp Battery Cable Ring Terminals 10-4 Gauge&lt;/a&gt; - Useful to have on hand if you are terminating cables that are outside the 22-10 gauge set I link later on. I used these to terminate the ARB compressor positive and negatives to avoid using the provided unnecessarily long wiring kit. You should consider purchasing a more robust hydraulic or impact crimper to handle these larger gauges.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B07GFXHH91/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;th=1"&gt;Crimping Tool for Heat Shrink Connectors&lt;/a&gt; - In retrospect, I would have actually gotten the crimper in the 8 or 11 piece package because the die is swappable with other crimper dies. This becomes really important if you have plans to add Baja Design lights since they use Weather Pack Connectors.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/DEWALT-DCE530B-Cordless-Heat-Tool/dp/B07RJDRS6Y/ref=sr_1_1?crid=3KMVYXHXH1PYS&amp;amp;keywords=dewalt%2Bheat%2Bgun&amp;amp;qid=1651118494&amp;amp;sprefix=dewalt%2Bheat%2Bgu%2Caps%2C134&amp;amp;sr=8-1&amp;amp;th=1"&gt;Heat Gun&lt;/a&gt; - Critical to achieving water tight sealing on your cabling connections. This thing eats batteries like no one&amp;rsquo;s business. Maybe consider a corded version.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B089D82FLG/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;Heat Shrink Tubing Kit&lt;/a&gt; - Make sure all the components you are buying is Marine Grade. You vehicle is exposed to a great deal of environmental variation and all this stuff needs to hold up. This Wirefy brand seems to be universally respected, even within the DIY Solar community.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B07124B886/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;th=1"&gt;Heat Shrink Wire Connector Kit&lt;/a&gt; - I got the large 540 piece kit since I will be using it for my own future modifications and other electronics I setup around the house.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B000JNNWQ2/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;Wire Strippers&lt;/a&gt; - Having decent wire strippers is critical for your sanity since this project requires a ton of wire stripping. If you plan on doing a lot more of your own electrical work in the future it would be helpful to upgrade to a more elegant stripper 😏 like the &lt;a href="https://www.amazon.com/dp/B00BC39YFQ?ref_=cm_sw_r_cp_ud_dp_FCB6EM6X771FXHS7JY6B"&gt;Klein 11063W&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B001HW6QA8/ref=ppx_yo_dt_b_asin_title_o09_s00?ie=UTF8&amp;amp;psc=1"&gt;Anti-Seize Lubricant&lt;/a&gt; - Used on the bolts at the bottom of the support arm. They go into the wheel well and will be frequently exposed moisture and road salt.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B000I1RSNS/ref=ppx_yo_dt_b_asin_title_o08_s00?ie=UTF8&amp;amp;th=1"&gt;Threadlocker&lt;/a&gt; - I went with Loctite Blue 242 here because Red seemed like overkill. This is mainly used on the nuts that are on the bottom of the mount tray.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mainframecustom.com/shop/cable-sleeving/teleios-cable-sleeving/lc-teleios-black-25ft/"&gt;Cabling Sleeving&lt;/a&gt; - (Optional) For the above and beyond person who wants to waste hours and hours for that extra &amp;lsquo;gram worthy slick setup. I used Teleios Black at 4mm. You might have to source this elsewhere if you wanted to sleeve the larger gauge cables in your setup.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/dp/B005MR516Y?ref_=cm_sw_r_cp_ud_dp_D6CJJYQ6QX7Y8M7QXBF8"&gt;Dymo Label Maker&lt;/a&gt; - Labelling your cables makes it look both professional and also keeps everything organized. When you are working on something in months or years in the future you will know exactly what goes where.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.amazon.com/gp/product/B09SZ5C81Z/ref=ppx_yo_dt_b_search_asin_title?ie=UTF8&amp;amp;th=1"&gt;Heat Shrink Tube Labels&lt;/a&gt; - Many of the off-brand suppliers are good quality and are considerably cheaper than Dymo specific. Most of my labels were either 1/2&amp;quot; or 3/4&amp;quot;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="assembling"&gt;&lt;a href="#assembling"&gt;Assembling&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;For your own sanity and the sanity of anyone you reside with it would be best to lay all components out on a flat work bench or kitchen table. Cabling and assembling everything in the engine bay would be a monumentally painful endeavor. I plopped my stuff down on the kitchen counter for a few weeks and spent some time here and there when I got the chance. However, if you have experience with wiring and aren&amp;rsquo;t adding any custom sleeving it would be rather easy to assemble it all in a few hours. The biggest time sink during my install was the custom sleeving, applying red heat shrink tubing, and labelling all sides of the cable terminations. In retrospect I would have forgone the custom sleeving but done everything else identically. The black nylon sleeves certainly gave a great look but for the time spent I don&amp;rsquo;t think it was worth it. My motivation was from this wizard that &lt;a href="https://www.instagram.com/p/CNMFnJtH-cB/"&gt;made it look like a high end custom gaming computer&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Wiring the Switch Pro while mounted."&gt;
 &lt;img
 alt="Wiring the Switch Pro while mounted."
 title="Wiring the Switch Pro while mounted."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp2_hu_99f3a7a3d963c0e9.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp2_hu_ef7b788c0f5a40.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp2_hu_20f89ae3810ed250.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp2_hu_6d8fbc13aeed16ce.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp2_hu_c9666540b12f6402.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Wiring the Switch Pro while mounted.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;To kick off the installation and guide us for the rest of the installation is to realize there are simply 8 electrical switches on the Switch Pros SP-9100. Every action during the install is to provide an elegant platform to complete the electrical connection of those switches. The first action requires us to connect each of the 8 switches from the SP-9100 to an individual slot on the bus bar. As you can see in the above image the SP-9100 is vertically mounted very close to the bus bar. The connections on the SP-9100 exit out horizontally, which creates your first design problem you must creatively overcome. I didn&amp;rsquo;t want a larger curved loop of cables so I made all my connections in a rather tight circle back around to the bus bar. A great source of potential cable arrangements is to view the posts on the SD Offroad Mount Instagram page. There are a wide variety of approaches to taming this mane of cables into the bus bar.&lt;/p&gt;
&lt;h3 id="bus-bar"&gt;&lt;a href="#bus-bar"&gt;Bus Bar&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Using a bus bar for our 8 switches isn&amp;rsquo;t electrically helpful but it creates a semi-permanent and modular system for completing our electrical connections. The connection from the SP-9100 is intended to be semi-permanent and static while the other side of the bus bar connections are modular. This way you don&amp;rsquo;t have to fiddle with the SP-9100 side of the bus bar when future projects dictate different needs. You can simply disconnect the other side of the bus bar and move things as needed. This comes at a cost of introducing a point in your electrical system to environmental degradation and connection issues. If you already have a permanent system configuration planned out it would be much better to directly connect your devices directly to the SP-9100 and forego the bus bar entirely. Switch-Pros even advises this on their website&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt;. But if you are like me and have a ever changing outlook on your modification endgame it is incredible helpful to have the modularity of a bus bar.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Labels for each Switch Pro connection will make future troubleshooting a bit easier."&gt;
 &lt;img
 alt="Labels for each Switch Pro connection will make future troubleshooting a bit easier."
 title="Labels for each Switch Pro connection will make future troubleshooting a bit easier."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp3_hu_37fa9eca955de6f3.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp3_hu_5b0bc485ba6b6151.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp3_hu_205bb9a7e2a0a9d1.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp3_hu_ce7ba0b3224cfe66.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp3_hu_c706f79abd980b5b.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Labels for each Switch Pro connection will make future troubleshooting a bit easier.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The current capacity for each of the 8 switches of the SP-9100 is outlined in the list below. Switches 1-4 are limited to 18A while 5-8 have a larger 35A capacity. These values are purely maximum and can be adjusted in the SP-9100 mobile application. As an example, on switch 1, my connected device is the trigger wire for my ARB twin air compressor and it is rated down to 5A. The trigger wire is basically an on/off switch for the compressor and doesn&amp;rsquo;t need any more current. There are many more features the SP-9100 can do such as strobe, 10% light output dimming, and a variety of trigger actions&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt;. Another convenient thing about using the SP-9100 is that the fuses are built inline within the device. So you can connect all of your devices directly into the SP-9100 without those bulky inline fuses. The only catch is that if you exceed 85% of the switch load and you can&amp;rsquo;t move to a higher capacity switch they do recommend adding a relay or fuse inline&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt;.&lt;/p&gt;
&lt;h3 id="switch-pros-sp-9100-wires"&gt;&lt;a href="#switch-pros-sp-9100-wires"&gt;Switch Pros SP-9100 Wires&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Brown - Switch 1 - (18A)&lt;/li&gt;
&lt;li&gt;Red - Switch 2 - (18A)&lt;/li&gt;
&lt;li&gt;Orange - Switch 3 - (18A)&lt;/li&gt;
&lt;li&gt;Yellow - Switch 4 - (18A)&lt;/li&gt;
&lt;li&gt;Pink - T1 - (Trigger)&lt;/li&gt;
&lt;li&gt;Black - Ground&lt;/li&gt;
&lt;li&gt;White - LT - (Light Dimming Trigger)&lt;/li&gt;
&lt;li&gt;Blue - Ignition&lt;/li&gt;
&lt;li&gt;Green - Switch 5 - (35A) 2 Wires&lt;/li&gt;
&lt;li&gt;Blue - Switch 6 - (35A) 2 Wires&lt;/li&gt;
&lt;li&gt;Purple - Switch 7 - (35A) 2 Wires&lt;/li&gt;
&lt;li&gt;Grey - Switch 8 - (35A) 2 Wires&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For the higher amperage switches from 5-8 you can simply twist both copper strands together before crimping down. Make sure you don&amp;rsquo;t cut the black, pink, white, or blue cables. These cables are connected elsewhere and shouldn&amp;rsquo;t be trimmed until you know the exact needed length.&lt;/p&gt;
&lt;h2 id="installation-preface"&gt;&lt;a href="#installation-preface"&gt;Installation Preface&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Based on the guide from SD Offroad there are several cycles of putting the mount tray in your engine bay and removing it for adjustments. While these steps seem useless when you could simply pop the tray in one go they are actually a measured approach to make the install easier. The incremental approach helps the installer make the required fitment adjustments as you go along while specific screws or support brackets are easily reachable rather than at an inverted right angle with only an inch of clearance. I was a bit pigheaded and did the install in many fewer steps and in the end I paid my time and frustration tax. Its almost as if guides are meant to make things easier. Somehow my logical reaction is to completely avoid the instructional guidelines since I know best. Spoiler: I don&amp;rsquo;t.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Stock 4Runner back right engine bay."&gt;
 &lt;img
 alt="Stock 4Runner back right engine bay."
 title="Stock 4Runner back right engine bay."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp4_hu_4d39476045b3fb8e.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp4_hu_b2ab44e2deac9657.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp4_hu_6e943adb288e84f7.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp4_hu_a81c26377eea0a15.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp4_hu_20251b41c1d07150.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Stock 4Runner back right engine bay.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h3 id="pre-installation"&gt;&lt;a href="#pre-installation"&gt;Pre-Installation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Placement of the mount tray is pretty straight forward. My 2021 model had a few differences from the SD Offroad Mount installation guide but it wasn&amp;rsquo;t anything major. The only physical modification required before being able to get the tray in was to file off the retention tab of the steel plate to the right of the smaller &lt;em&gt;RELAY &amp;amp; FUSE&lt;/em&gt; black box. Getting the retention tab out of the way opens up the use of a required threaded mounting hole for the tray support bracket.&lt;/p&gt;
&lt;p&gt;Another preparation required before getting the tray installed would be to run the longer SP-9100 wires from the engine bay into the vehicle cab. This would be the pink, white, and blue wires. Disconnecting the wire harness from the SP-9100 would be appropriate here in order to get the most flexibility. I chose to puncture through the circular black rubber grommet in order to get these wires through, however, there are probably more appropriate conduits available. I certainly recommend researching this further and I consider it one of my oversights when performing this installation. The grommet was actually a pain to work with since any pressure from either direction would unseat the perimeter flange lip. Getting it back to a sealed state was a major pain due to the tight space around the grommet on both the engine compartment and cabin sides. However, it is critical to get the grommet back in place as it is the only mechanism to stop water and anything else from entering the cabin for that rather large hole.&lt;/p&gt;
&lt;h3 id="installation"&gt;&lt;a href="#installation"&gt;Installation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;After these items are taken care of you can loosely install the tray. Make sure to coat the bottom leg support bolts with anti-seize lubricant since they exit directly within the wheel well. They will be directly exposed to the harshest conditions you&amp;rsquo;ll be driving in. The bolts also might be a bit firm when screwing them in for the first time but that is just the OEM plugs being forced out. When checking hood clearance for the tray it is a bit tricky to see if things are bashing into each other. I stuck my phone into the engine bay while taking a video and closing the hood in order to get an idea of physical clearance. My 2021 model has a fire retardant fabric on the bottom of the hood and is slightly pressed against by the vertical ARB compressor coupling. There are ways to modify the angle of the coupling mount on the ARB but I didn&amp;rsquo;t think it was necessary with my minimal amount of contact. I have seen other kinds of couplings, such as pure brass right angle hardware that might better fit in your intended setup.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Checking clearance when closing the hood."&gt;
 &lt;img
 alt="Checking clearance when closing the hood."
 title="Checking clearance when closing the hood."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp5_hu_8091991637daa00f.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp5_hu_7773c517fb3d428f.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp5_hu_94b2951e281c11b4.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp5_hu_6f0d8ef5ffd56ef7.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp5_hu_777212bd19be499c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Checking clearance when closing the hood.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;One last point involves skipping the rivet installation for the mount tray. While the SD Offroad installation includes this as a step during installation I found that the mount tray was stable enough with all the other hardware to not warrant putting in the rivet. This might change after the physical stress of traversing over several thousand miles of washboard roads over the next year or two but I will monitor it closely, as I do with all my other bolted on modifications. Another reason for not installing the rivet was just avoiding an extra bolt to take out in case any access to the engine bay fuse box is needed. This is a minor reason and would only amount to saving a minute or two down the line.&lt;/p&gt;
&lt;h2 id="electrical"&gt;&lt;a href="#electrical"&gt;Electrical&lt;/a&gt;&lt;/h2&gt;

&lt;h3 id="arb-twin-compressor-wiring"&gt;&lt;a href="#arb-twin-compressor-wiring"&gt;ARB Twin Compressor Wiring&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;This compressor is fast but requires two 40A connections. This exceeds the maximum draw of even the larger capacity switches on the SP-9100 so you have to power it directly from the battery. I accomplished this by wiring both 40A connection to the SafetyHub 150 with a 40A MIDI fuse for each. This involved heavily re-working the supplied wire harness from ARB and chopping out the blocky inline fuses. But such a clean up is my whole reason for this electrical foundation. I could shorten the wire harness to a respectable length to avoid wire spaghetti and also using the SafteyHub 150 as intended. You can still use your SP-9100 to turn it off and on by simply connecting the ARB&amp;rsquo;s trigger wire. Credit here to SR5Camper on the tundras.com forums&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; for the great idea of both cleaning up the ARB wiring harness and also involving the SP-9100 for triggering the ARB.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Getting everything arranged is quite a challenge. Especially with the larger gauge wires."&gt;
 &lt;img
 alt="Getting everything arranged is quite a challenge. Especially with the larger gauge wires."
 title="Getting everything arranged is quite a challenge. Especially with the larger gauge wires."
 width="1440"
 height="1921"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp10_hu_7e0e08fe9e487b28.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp10_hu_64f7d624bf29d1eb.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp10_hu_33d5214c8270f75a.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp10_hu_4b981eaceb4b228a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp10_hu_34fcb9319ba1ec5e.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Getting everything arranged is quite a challenge. Especially with the larger gauge wires.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h3 id="add-a-fuse-circuit-tap"&gt;&lt;a href="#add-a-fuse-circuit-tap"&gt;Add-a-Fuse Circuit Tap&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Moving on to the cabin wiring, I wanted to specifically include a section in this guide for the correct add-a-fuse orientation. I have seen many examples of incorrect orientation, which defeats the entire purpose of fuses and exposes you and your vehicle to increased chance of electrical fault. Without the benefit of a fuse the electrical current can flow unchecked and can burn up wires or at worst, start a fire. This risk is exponentially more than the average car owner since the off-roading community commonly exposes our vehicles to some of the harshest environmental conditions available. A great way to learn more is with this &lt;a href="https://www.youtube.com/watch?v=NW0QaQaU41Y"&gt;Add a Fuse Video Guide&lt;/a&gt; that I have re-watched many times in order to get installations correct and safe. The video is full of relevant information for this install and correctly instructed me that my 2021 4Runner uses a low profile mini fuse (in the cabin box), how to chose a fuse to piggyback off, the correct orientation for my add-a-fuse, and most importantly of all, how to determine the hot and cold aisle for an automotive fuse box.&lt;/p&gt;
&lt;p&gt;The most helpful first step would be to determine what kind of fuse type your vehicle is using. It could be anything from ATC/ATO, ATM mini, Micro2, or a Low Profile Mini. Knowing what type you have will make ordering or picking up the correct add-a-fuse kit that much easier. I was in a rush when I grabbed mine from the local AutoZone and got the incorrect size (ATM Mini). While it connects just fine, the spacing is tight and in the future I will have to cut it out in order to add the correct size so it fits much better. You can see in the very last image of this article my semi-bent add-a-fuse in the top left of the image. The size is a bit too much and it rubs up against a metal sheet underneath the steering wheel.&lt;/p&gt;
&lt;p&gt;The next step would be to review your available fuses and tap a non-critical service. Alternatively, if there are any open fuse slots they should be used first before leeching off another. In my case I had an empty fuse slot I tried to use for the SP-9100 Blue wire (ignition) but it was always powered, which is what I didn&amp;rsquo;t want. So I had to move on to another fuse in order to get the correct type. You should absolutely not tap any fuses labelled with critical services such as ABS, brakes, air bags, cooling, engine control modules and other mechanisms that are critical to the operation of the vehicle. After testing and validating a few locations in my own fuse box I ended up tapping the 10A tail lights for the SP-9100 white wire (light dimming trigger) and the 10A KDSS for the blue wire (ignition). While KDSS is incredible critical, my 4Runner actually doesn&amp;rsquo;t have it and so should be completely fine to tap.&lt;/p&gt;
&lt;h3 id="cutting-a-fuse-in-half"&gt;&lt;a href="#cutting-a-fuse-in-half"&gt;Cutting a Fuse in Half&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;The methodology for selecting my fuse tap locations can be demonstrated in the previously linked video. The basic summary is to find the type of power going to a fuse and thereafter identifying the positive and negative side of the rail. Your car&amp;rsquo;s electronics are powered by three separate types of power. The first is switched power that is provided when the vehicle is actually running the engine. The second is switched (RAP) and is powered when the ignition is engaged by the engine isn&amp;rsquo;t running and turn off after you open the door or a certain amount of time elapses. Think of something like your car radio or overhead lights that turn on after turning off your engine and remain on for maybe a minute or two or until you open a door. The third type is unswitched where power is supplied all the time. In order to figure out what fuses are provided by these types of power you need to cut a fuse in half.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Fuse testing."&gt;
 &lt;img
 alt="Fuse testing."
 title="Fuse testing."
 width="1440"
 height="1921"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp7_hu_4c4819bdb2947c97.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp7_hu_22448ea3e12a146c.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp7_hu_b9d9b5918d9044a9.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp7_hu_241b56eb21b9ae60.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp7_hu_f2beaa196f406629.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Fuse testing.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Cutting a fuse in half will give you a simple tool that can tell you if either side of fuse is energized or not. Fair warning that you will need a multimeter to help out here. Be aware that each fuse rail will have a negative side that will show no electrical charge in any state. If you see that behavior just keep a note of it since it is important later for correctly orientating the add-a-fuse tap. By taking this mangled fuse and plugging it into each fuse rail while the engine is completely off we can identify which fuses have unswitched power. For this application you don&amp;rsquo;t want to use those because it will needlessly drain your power when the vehicle is off. Further isolation with the ignition enabled but the engine still off can show us the switched (RAP) powered fuses. Lastly, with the engine running we can see which fuses are powered by purely switched power.&lt;/p&gt;
&lt;h3 id="tap-orientation"&gt;&lt;a href="#tap-orientation"&gt;Tap orientation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;figure aria-label="Tap orientation is important."&gt;
 &lt;img
 alt="Tap orientation is important."
 title="Tap orientation is important."
 width="1440"
 height="1921"srcset="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp9_hu_2213748bdfdfec0.webp 480w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp9_hu_f1787903d06c9456.webp 768w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp9_hu_c28733be94b67af5.webp 1024w, https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp9_hu_b6ec26dcf44e7db3.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/starting-the-electrical-foundation-of-my-4runner/sp9_hu_8f80a68a2f465ba.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Tap orientation is important.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;If during the course of your testing you found that some sides of fuses were completely dead you can use this critical information to correctly orient your add-a-fuse circuit taps. The internal circuity of an add-a-fuse requires that the prong on the opposite side of the wire is energized while the prong on the closer side is connected to your negative. If the add-a-fuse is plugged in backwards you essentially lose the protection of the fuse. In a previous image you can see me testing with a multimeter with a fuse cut in half. The output of 13.95V on the right hand side rail demonstrates that it is energized. Based on that information we can safely orient the add-a-fuse with the cable exiting the left side as shown in the above image.&lt;/p&gt;
&lt;h3 id="wiring-gauge"&gt;&lt;a href="#wiring-gauge"&gt;Wiring Gauge&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;All of the wiring is already supplied from the products purchased for this project but if you want a head start on wiring new accessories it would be helpful to know what size (gauge) wire you need. The company Blue Sea Systems has a &lt;a href="http://assets.bluesea.com/files/resources/newsletter/images/DC_wire_selection_chartlg.jpg"&gt;great chart outlining the needs for wire gauge based on distance and amperage&lt;/a&gt;. Since the American automotive DC voltage standard is 12.8V we are subject to making up the difference with high amperage draw to get anything of substance running.&lt;/p&gt;
&lt;h2 id="suggestions"&gt;&lt;a href="#suggestions"&gt;Suggestions&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Every project in almost any hobby has a balancing act of convenience, cost, and intention. The electrical foundation I have built is no different. There will be times in the future where I question my own judgement on selecting certain components and also deriding the architecture of product designers as I become more proficient with my gear. To save you the several year wait before I become enlightened I will make a few critiques of the entire setup. Hopefully this helps people going down the same path from needless frustration or some missing piece of information.&lt;/p&gt;
&lt;h3 id="location"&gt;&lt;a href="#location"&gt;Location&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;The engine bay near the starter battery is without a doubt the absolute best location for this assortment of gear. You have close access to wiring into the driver&amp;rsquo;s side cabin and high amperage wires only have to run a short distance to the main battery. Perhaps the biggest issue in the future will be access to the engine bay relay and fuse boxes. I been trying to avoid thinking about how much of a pain it will be to at first diagnose and thereafter fix any electrical issues that originate in those boxes. Lets take an example of some electrical issue in your vehicle. Instead of easily checking the vehicle&amp;rsquo;s main fuse box you will probably end up trying to identify the issue elsewhere because the time involved to remove the mount tray is considerable. Thus we have entirely erased decades of improving electrical troubleshooting efficiency by ignoring all these connections that were routed to a central location. The painful removal process for the mount tray isn&amp;rsquo;t any fault of its own. By itself it would be incredibly easy to unscrew 4 bolts. But the inherent nature of its purpose in bringing tons of wires together makes it a statically wired feature of your vehicle&amp;rsquo;s engine bay. When running wire for new accessories I trim everything to a neat fit-to-length amount. This might ultimately backfire when the pretty cabling becomes the main crux of getting access to the underlying relay and fuse box.&lt;/p&gt;
&lt;h3 id="layout-and-orientation"&gt;&lt;a href="#layout-and-orientation"&gt;Layout and Orientation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Another critique is the layout of the SD Offroad Mount Tray itself. There are many different styles of the mount and the respective arrangement of components. But for mine it felt cramped between the SP-9100, bus bar, and the SafetyHub 150 fuse block. To accommodate everything together involved a lot of cursing and finger mashing. The first aspect of this problem is the incredibly small space and orientation between the vertical SP-9100 and the horizontal bus bar. Realistically, you want the left side of the bus bar available since it is closest to the gap used for wiring cables. That only leaves the right hand side to wire up the SP-9100 at an insane angle. No matter how you wire the SP-9100 to the bus bar you will inevitably block the bus bar from above. I am not looking forward to the time when I try to plug in switches 5-8 as they are behind the fat wad of SP-9100 cables.&lt;/p&gt;
&lt;p&gt;In addition, the space between the bus bar and the fuse block is much too small. I would like to see more room on the fuse block side since it will get a lot more use than the SP-9100 bus bar. Pushing the fuse block mount location an inch to the left and expanding that cable access hole would ease a lot of my worries about the physical ease of installing, diagnosing, or removing connections from the fuse block.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;I&amp;rsquo;m currently designing a 4 cell 3,584 amp hour lithium iron phosphate battery bank complete with an inverter, AC power supply, and MPPT. Its going to look like a &lt;em&gt;Mad Max&lt;/em&gt;-like dumpster fire but will perform better than most consumer models generally available.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;&amp;ldquo;Should I use a Fuse Block for my output wires? No – connecting our output wires to a fuse block subjects the wires to water and corrosion, and essentially takes our Solid State, watertight system, and makes it subject to potential water damage and unreliable connections. It also adds unnecessary expense. We suggest using the heat-shrinkable butt splices (included in the installation hardware kit) OR soldering (and covering with heat shrink tubing) the power leads together.&amp;rdquo; &lt;a href="https://store.switchpros.com/sp9100-switch-panel-power-system/"&gt;Switch-Pros Frequently Asked Questions&lt;/a&gt;&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;&lt;a href="https://store.switchpros.com/sp9100-switch-panel-power-system/"&gt;Switch-Pros SP-9100 Switch Power Panel System&lt;/a&gt;&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;&amp;ldquo;Do I need to add Relays and/or Fuses? No – for installation of basic lights and electronics, you may connect the power leads directly to one another by soldering or using heat-shrinkable butt splices. Exceptions: if you are connecting loads that will exceed 85% of the circuit’s capacity OR if you are connecting accessories with inductive loads (compressors, pumps, large fans), then you SHOULD put a relay in line.&amp;rdquo; &lt;a href="https://store.switchpros.com/sp9100-switch-panel-power-system/"&gt;Switch-Pros Frequently Asked Questions&lt;/a&gt;&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;&amp;ldquo;&lt;em&gt;Just installed ARB twin on SDHQ mount wired to sp9100 two days ago. I scrapped the provided harness and made my own with CE electric 8AWG wire. Independent positives with maxi fuses, and combined ground wire including the small 20AWG wire to simplify things. The switch harness from ARB is a joke. Chop everything off except the purple wire, which is run to your switch pros. The wire was a little short for the routing I chose so I had to splice in an extension with some of the previously scrapped wire. I just snipped and sealed the other ground wire coming from the switch.&lt;/em&gt;&amp;rdquo; &lt;a href="https://www.tundras.com/threads/arb-twin-compressor-install-with-switch-pro-sp9100.81208/"&gt;ARB Twin Compressor Install WITH Switch Pro SP9100&lt;/a&gt;&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Broadwater Meadow</title><link>https://rb.ax/blog/broadwater-meadow/</link><pubDate>Mon, 06 Sep 2021 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/broadwater-meadow/</guid><description>&lt;p&gt;&lt;figure aria-label="Broadwater Meadow at sunset."&gt;
 &lt;img
 alt="Broadwater Meadow at sunset."
 title="Broadwater Meadow at sunset."
 width="1440"
 height="960"srcset="https://rb.ax/blog/broadwater-meadow/broadwater-meadow-featured_hu_98d1f4baac4820e.webp 480w, https://rb.ax/blog/broadwater-meadow/broadwater-meadow-featured_hu_533bdf14ee506a4a.webp 768w, https://rb.ax/blog/broadwater-meadow/broadwater-meadow-featured_hu_eb091df8bcf618fe.webp 1024w, https://rb.ax/blog/broadwater-meadow/broadwater-meadow-featured_hu_cb802f738c4a86ce.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/broadwater-meadow/broadwater-meadow-featured_hu_67e79fd8d5b4d296.jpg"loading="eager"
 decoding="sync"/&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;After the dirty kerfuffle earlier in the summer I decided to pursue some luxury camping conditions. Obviously, the great motivation here was to reduce the pounds of dirt my dogs could absorb into their fur. Another was to solicit my wife into the great outdoors with an easy and enjoyable camping experience. I always feel better blundering around and making obvious mistakes when I have my significant other along with me to cushion the blow to my ego when things inevitably go wrong. If I could just find the right camping location I might just might protect the dogs from themselves and provide my wife with another positive outdoor experience.&lt;/p&gt;
&lt;p&gt;Since I&amp;rsquo;ve been subject to unrealistic REI Co-Op advertisements my entire life I knew there were at least some locations in North America worthy of being in a magazine. Maybe there would even be a few in adventure ready Utah. You might have your own version of this location in your head but I will tell you my own. Imagine a grassy campground next to a modest river with majestic pine trees in the spots that don&amp;rsquo;t block your view. The view is a grand valley glowing in the twilight evening light. All the cozy people around the campfire appear to be in a perfect temperature equilibrium and are neither pestered by bugs or acute smoke inhalation. I know it is all a lie. But maybe I can achieve just one item out of this mental image: grass. Yes, the plant I spend my spring, summer, and fall butchering could be my savior when out in nature. This led me to another high altitude location in the High Uintas Wilderness at the softly named Broadwater Meadow.&lt;/p&gt;
&lt;p&gt;Its surprising how close Broadwater Meadow is to Highway 150 without being flooded by campers and trailers. You can thank the rough roads for gatekeeping the area from the unwashed masses. There are actually two routes to the meadow since FR416 loops to Highway 150 at a north and south location. I found both directions pretty rough in my 4Runner but the northern road was just slightly easier. Before getting off pavement you should be sure to stop at the Upper and Middle Provo River Falls viewpoint. This tourist spot was a bit crowded on a Sunday afternoon in the late summer but worth the stop to stretch the legs and let the dogs sniff around before we hit the last 30 minutes of dirt road to reach the meadow.&lt;/p&gt;
&lt;p&gt;On a Sunday late afternoon in early September we were able to claim a decent site for camping. Probably the best location is directly across the meadow on the south end, which you can see in the photograph above. That site is secluded a bit off FR416 whereas the rest of the spots along the meadow perimeter are within 20 feet of the road. So you might have people rolling by (or blazing like a bat out of Hell in the case of our side-by-side friends) your camp at any time of the day or night. Additionally, the view on the south site is better as you are looking north by north east to nearby Mount Cardwell. While not as epic as the view in nearby Christmas Meadow, it still provides for a natural visual endpoint while looking across the meadow rather than the muted hill you see above. Despite all the accolades for the south site, any spot around the meadow is great and will give you a relaxing experience in a semi-alpine environment.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Broadwater Meadow in the Afternoon."&gt;
 &lt;img
 alt="Broadwater Meadow in the Afternoon."
 title="Broadwater Meadow in the Afternoon."
 width="1440"
 height="960"srcset="https://rb.ax/blog/broadwater-meadow/broadwater-meadow-stream_hu_5a62206b9bb0e713.webp 480w, https://rb.ax/blog/broadwater-meadow/broadwater-meadow-stream_hu_334a274b909d4efa.webp 768w, https://rb.ax/blog/broadwater-meadow/broadwater-meadow-stream_hu_ac2fc98d0905b5ff.webp 1024w, https://rb.ax/blog/broadwater-meadow/broadwater-meadow-stream_hu_f59d1f3dda8fc404.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/broadwater-meadow/broadwater-meadow-stream_hu_44ef70634dbf3a7a.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Broadwater Meadow in the Afternoon.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;For dinner, rather than my normal freeze-dried dinner, I was blessed with a fine car camping dining experience. I am normally rather spartan with my food choices and embrace convenience and health rather than elegance and taste. Its not that I don&amp;rsquo;t enjoy finely prepared food but rather that I think the effort required is not warranted on a consistent and or daily basis. I have been known to spend over 12 hours smoking pork ribs yet this is not everyday. Alternatively, my wife will consistently create culinary masterpieces out of seemingly nothing if the mood strikes just right. Take the following example where all these conditions met together perfectly to see what she is capable of creating.&lt;/p&gt;
&lt;p&gt;One evening in the early summer of 2020 she asked what would be a good idea for dinner. Consider the world stage for a second here, where we are at the height of the coronavirus pandemic lockdown&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; and governments around the world had normalized staying at home 24/7. So there is a huge amount of free time at everyone&amp;rsquo;s disposal yet for some reason I didn&amp;rsquo;t take this into consideration when I responded with an easy cop-out of sloppy joes. Like I said earlier, my mind focuses on dishes that are either convenient or healthy. Sloppy Joes certainly fit this convenient profile. When I was younger this dish consisted of pan frying ground beef, adding a canned sauce, and slopping the result between some plain white bread buns. If you wanted to go the extra mile you could garnish your plate with some vegetables or anything else to make it a respectable meal. Altogether, this was something you could pretty easily make in fifteen or twenty minutes. Not a bowl-of-cereal-for-dinner fast but certainly not a time sink. My wife and I don&amp;rsquo;t specifically share the same cultural upbringing so this inherent example in my head was completely absent from hers.&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;In some locations this word is correct but in Utah it really just meant a loose request by local and state officials. I think if national store chains hadn&amp;rsquo;t imposed mask requirements I doubt most of the public would have even bothered on their own. So understand this word with caution, which could have translated into vastly different situations around the United States.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>Whitney Reservoir</title><link>https://rb.ax/blog/whitney-reservoir/</link><pubDate>Wed, 21 Jul 2021 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/whitney-reservoir/</guid><description>&lt;p&gt;&lt;figure aria-label="A small stream feeding into Whitney Reservoir."&gt;
 &lt;img
 alt="A small stream feeding into Whitney Reservoir."
 title="A small stream feeding into Whitney Reservoir."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/whitney-reservoir/whitney-stream-featured_hu_e2c21945ba967fdf.webp 480w, https://rb.ax/blog/whitney-reservoir/whitney-stream-featured_hu_10c2caeb964a9193.webp 768w, https://rb.ax/blog/whitney-reservoir/whitney-stream-featured_hu_67a50ac0d1ed81c7.webp 1024w, https://rb.ax/blog/whitney-reservoir/whitney-stream-featured_hu_e09ff6c491bb4d99.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/whitney-reservoir/whitney-stream-featured_hu_d57b9152c148826d.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;A small stream feeding into Whitney Reservoir.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Sometimes you need pleasantly boring. My first camping trip as an adult was certainly not at Whitney Reservoir but it seemed like the first one without any major issues. My first venture into the wilderness as a responsible adult was a backpacking trip into the Grand Canyon wilderness between Glen Canyon Dam and Lee&amp;rsquo;s Ferry. The trip was cut short after experiencing first hand how fast water is consumed in an arid desert. How could I have known the several guide books I read about being careful in the desert were actually true? Our rapid self-extraction from the area had us blazing trail across extremely steep sandstone cliffs, which has been the foundation of distrust my wife has maintained in my ability to read topographical maps. I was convinced the line spacing on the map was enough to indicate a gentle slope upward slope.&lt;/p&gt;
&lt;p&gt;I also can&amp;rsquo;t forget our intrepid determination to make it through the muddy North Rim of the Grand Canyon in our station wagon with tires worn down by tens of thousands of miles of driving. While attempting to dig, push, and swear our way through the mud we were passed by a local lodge tour van filled with bemused Japanese tourists eager to see the sunset at the rim of the Grand Canyon. In their attempt go around our stuck station wagon they themselves fell victim to the treacherous mud. I felt extremely vindicated with this result since the van itself was aggressively off-road equipped and had only made it as far as our admirable station wagon. Never mind the fact that we had ejected them from the path of the main road into the soft muddy shoulder. It wasn’t until two hours later that both vehicles were rescued by the lodge caretaker whom had only come out since the tour van never returned. Each experience prior to Whitney Reservoir seemed to be marred by unexpected (&lt;em&gt;unplanned&lt;/em&gt;) challenges that drastically changed the direction of said trip. Maybe such changes are to be expected and looked forward to as part of the charm of going on adventures. However, my perfectionist obsessive compulsive urges greatly disagree.&lt;/p&gt;
&lt;p&gt;To mitigate some of these challenges I adopted a 4x4 vehicle into the family. It has yet to be determined if I simply raised the stakes of potential consequences. With the confidence and capability such a vehicle brings it could take me to areas of the wilderness tens or hundreds of miles away from help or cell service. At least our station wagon kept me from getting too far off the beaten path where I could be stumbled upon by a local lodge van tour. This new capability is always in my mind and I strive to plan trips based this risk assessment and outright fear. Hopefully this judgment call will become more nuanced with experience. Based on all this I decided a very capable trip destination was in order. Herein we arrive at the selection of lovely Whitney Reservoir.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="My campsite nestled behind an outcropping of trees."&gt;
 &lt;img
 alt="My campsite nestled behind an outcropping of trees."
 title="My campsite nestled behind an outcropping of trees."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/whitney-reservoir/whitney-camp_hu_9e39a35bbbcc0c47.webp 480w, https://rb.ax/blog/whitney-reservoir/whitney-camp_hu_2d823be1dcc1e4c5.webp 768w, https://rb.ax/blog/whitney-reservoir/whitney-camp_hu_4396c1677af72900.webp 1024w, https://rb.ax/blog/whitney-reservoir/whitney-camp_hu_860fa5ca4b7238d0.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/whitney-reservoir/whitney-camp_hu_b90b1432b7de87be.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;My campsite nestled behind an outcropping of trees.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Whitney Reservoir is a man-made lake sitting at an approximate elevation of 9,200 feet in the northern central region of the Uinta-Wasatch-Cache National Forest. The area isn&amp;rsquo;t as eye catching as the Uinta mountain range but provides for a grandiose land area with large expanses for outdoor recreation. Geography in the immediate area is a bit more rolling hills as compared to the flat meadows and pronounced peaks of neighboring places like Christmas Meadows and King’s Peak. Most of the people in area seemed to be semi-local, if not at least regional-local. This gave off a more rugged and homey feel as compared to the easily accessed tourist centric spots in the area next to the highway. Most camps I saw were certainly repeat customers of the area and knew how to comfortably function autonomously in the wild.&lt;/p&gt;
&lt;p&gt;Veering west off U. S. Route 150 between the Bear River Ranger Station and Hayden Fork Campground I followed the signs along FR032 for Whitney Reservoir. While Google Maps might guide you on a faster route by utilizing FR081, this would be a mistake as the road is much more rugged and requires a significantly more capable vehicle than the comparatively calm washboards of FR032. While this statement is mostly true I can’t help but remember my own vehicle struggling on FR032. It seems that on an annual or semi-annual basis they re-grade the road during high summer season. I just so happened to chose a day of the week when the road was most chewed up by the Forest Service road grader. What was normally a simple dirt road was transformed into a loose dirt slurry. I was able to get over these segments of fresh road but a few trucks carrying long trailers had to wait until the grader finished its work. No further challenges were to be seen on the road to the reservoir. Several crossroads forked the path along FR032, however, signage was generous and fortunately there was no backtracking required.&lt;/p&gt;
&lt;p&gt;Whitney Reservoir itself sits between a few larger treed hills. The rolling terrain is mildly deceptive of the high altitude environment, which starts at approximately 9,200 feet. Residents of sea level cities might feel lethargic or out of breath doing normally easy activities like hiking the surrounding hills. I felt these effects despite my home in Utah being at 4,200 feet. You should also be wary of the rapidly moving isolated thunderstorms that can change summer to winter in short order. It would be best to carry an assortment of gear and clothing suited to a variety of weather conditions even in the middle of summer. You might get the privilege of staying at the four seasons during your trip. Depending on the time of year and previous winter’s snow pack levels will determine the height of the water table. As you can see in my photographs the water was quite low in the summer of 2021 and had been quickly replaced by grasses growing in the rich soil.&lt;/p&gt;
&lt;p&gt;While the entire area is formally considered as a dispersed camping area there are many campsites that have been well established. Much of these are clustered on mainly the north and west portions of the reservoir. I would highly recommend using an existing site as it is much better for the ecology of an area to reuse locations rather than trailblazing and disturbing new sections. I arrived in the area towards the late afternoon and subsequently got a poor choice of sites with others being occupied. Fortunately, I located a site with some minor tree coverage and which was close to the water.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Whitney Reservoir with Dietrich"&gt;
 &lt;img
 alt="Whitney Reservoir with Dietrich"
 title="Whitney Reservoir with Dietrich"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/whitney-reservoir/whitney-dietrich_hu_1b7c5540a3c7b796.webp 480w, https://rb.ax/blog/whitney-reservoir/whitney-dietrich_hu_1cbdf1edc1b501aa.webp 768w, https://rb.ax/blog/whitney-reservoir/whitney-dietrich_hu_cb89b1426b2d6150.webp 1024w, https://rb.ax/blog/whitney-reservoir/whitney-dietrich_hu_673a3214bef37783.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/whitney-reservoir/whitney-dietrich_hu_e6eced2ab69e8e3c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Whitney Reservoir with Dietrich&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;To get an idea of the area around my chosen camp site I usually take a stroll before setting everything up. This helps avoid situations you might find problematic. For instance, you wouldn&amp;rsquo;t want to setup camp next to an extremely steep ravine if you have a small child. Or you might even find all that separates you and the next camp is a single thin bush. It is certainly wise to just get a bearing of your area since the easy view from your vehicle might not reveal all the dirty secrets. In the course of my own walkabout I saw a large group of Jeeps had gathered in the camp next to mine and on the other side was an older couple who appeared to have been setup for a week or more. Not a bad combination despite getting a poor choice of sites.&lt;/p&gt;
&lt;p&gt;After setting up camp I quickly found out exactly how much dirt a dog can fit on its body. Well, not exactly to the gram, but maybe within a few pounds. The area I had chosen was entirely bare dirt and my dogs fully embraced it. I think by the time I had finished setting up the tent they had dug a few holes, ran around the 4Runner several hundred times, and rolled around to their heart&amp;rsquo;s content. Within the span of perhaps thirty minutes they had transformed from well manicured house dwelling man&amp;rsquo;s best friend to filthy hell hounds. Both of them certainly knew it and gave me that knowing eyeballing after plopping down in the dirt despite their elevated nylon beds being just a few feet away.&lt;/p&gt;
&lt;p&gt;Night comes soon when you start the day in the late afternoon. I tried my best to dust off my dear fur-balls before letting them in the tent but they were still filthy. I had to embrace it. I am certainly known for babying my dogs but I do it without guilt. With everyone settled down we tried to ship off to the land of dreams but kept getting yanked back. The nightlife sounds are pretty different from the suburbs to the high Uinta wilderness. The dogs couldn&amp;rsquo;t settle down with each new scary unknown animal making itself acoustically known. The suburbs also seemed to have followed us into the forest as the coolness of the evening revealed a raucous party across the reservoir. I do remember the phenomenon of sound traveling across bodies of water with the cool evening air. But such facts had been out of my head since Boy Scout camp twenty years prior.&lt;/p&gt;
&lt;p&gt;I have to pause here to reflect on the type of people you encounter in an outdoor wilderness type situation. In a generalized sense, it seems that your perceived level nature-lovingness is inversely proportionate to the distance away from civilization you find yourself recreating. To provide an example you could take the party crowd that travels a short distance away from wherever to setup shop and blow off steam. It is a great idea since if you did this same stunt in a city park you might get cited for public intoxication or similar. Moving along the spectrum we find groups that go just a bit farther but seemingly blow off steam by simply being outdoors and relaxing rather than bringing the entire karaoke sound system. There are definitely exceptions to this but I&amp;rsquo;m trying to generalize here so just hold off on that angry email. Finally, we arrive at people reaching the farthest distances away from society. Here I am picturing backpackers or homesteaders who appreciate nature itself as an integral part of their life besides just an area to relax. Based on this self-made spectrum of outdoorsyness I was rather confused about the presence of this party across the water. This location was several hours away from any major metropolitan area. However, this could be my city slicker mind making assumptions about the recreation habits of people in nearby small towns, which could spell disaster for my established people modeling matrix. Another theory is that these were indeed party goers from the big city and attacked the established spectrum by driving three hours for that prime time party location. The only thing I do know for certain is that I was incredibly lucky for the music to last to the responsible time of three in the morning.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Whitney Reservoir with Dietrich and Ulrich playing."&gt;
 &lt;img
 alt="Whitney Reservoir with Dietrich and Ulrich playing."
 title="Whitney Reservoir with Dietrich and Ulrich playing."
 width="1440"
 height="1080"srcset="https://rb.ax/blog/whitney-reservoir/whitney-dogs_hu_8e67f67c37300bd7.webp 480w, https://rb.ax/blog/whitney-reservoir/whitney-dogs_hu_bb7c3afd6366ac71.webp 768w, https://rb.ax/blog/whitney-reservoir/whitney-dogs_hu_9b3ff5cc13d496ed.webp 1024w, https://rb.ax/blog/whitney-reservoir/whitney-dogs_hu_fccfe05863b27c7a.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/whitney-reservoir/whitney-dogs_hu_36170cce55a3c410.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Whitney Reservoir with Dietrich and Ulrich playing.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Morning is always the best and the worst. Late nights bring heavy baggage that pull you back into sleep. Those bags can get incredibly heavy with chronic sleep loss or maybe just a single night of noisy neighbors. Yet there is the magic of sunrise, which is emphatically better than sunset simply because you sacrificed precious sleep. Couple this with a hot cup of coffee and a dog at your side make for what I previously dubbed as magical. Those kind of moments define trips. All the stupid shit up to that point shifts a bit into an amiable memory and suddenly becomes entirely worth the hassle to experience this moment. I see this process similar to climbing a mountain. The process is a grind, physically, and mentally. Waking up at some evil hour in order to summit at time XX:XX combined with the hours and hours of hiking to accomplish such a feat. However, once at the top it all seems worth it, even despite realizing you are only half way done.&lt;/p&gt;
&lt;p&gt;Following this enriching morning I walked the dogs along the reservoir shore and had another epiphany. If you combine extremely dirty dogs and water together things can in fact get even worse. By worse I mean that the previously powdered dirt transforms into numerous layers of caked mud. By then I had given up hope completely and reassured myself that their eighty pound frames could only accommodate so much raw mud.&lt;/p&gt;</description></item><item><title>The Shadow of the United States in Yemen</title><link>https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/</link><pubDate>Sat, 10 May 2014 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/</guid><description>&lt;p&gt;&lt;figure aria-label="U.S. Secretary of State John Kerry and Yemeni President Abdo Rabbo Mansour Hadi address reporters before their bilateral meeting at the U.S. Department of State in Washington, D.C., on July 29, 2013. U.S. Department of State"&gt;
 &lt;img
 alt="U.S. Secretary of State John Kerry and Yemeni President Abdo Rabbo Mansour Hadi address reporters before their bilateral meeting at the U.S. Department of State in Washington, D.C., on July 29, 2013. U.S. Department of State"
 title="U.S. Secretary of State John Kerry and Yemeni President Abdo Rabbo Mansour Hadi address reporters before their bilateral meeting at the U.S. Department of State in Washington, D.C., on July 29, 2013. U.S. Department of State"
 width="1440"
 height="958"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/kerry-and-hadi_hu_6fa7eee01ce71a50.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/kerry-and-hadi_hu_a904506070f10079.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/kerry-and-hadi_hu_ebd03971115e75b2.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/kerry-and-hadi_hu_84edf100c1db8884.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/kerry-and-hadi_hu_8f8a3b57a094d777.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;U.S. Secretary of State John Kerry and Yemeni President Abdo Rabbo Mansour Hadi address reporters before their bilateral meeting at the U.S. Department of State in Washington, D.C., on July 29, 2013. &lt;a href="https://www.flickr.com/photos/statephotos/9393854607"&gt;U.S. Department of State&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This paper was written as part of my International Security Studies master&amp;rsquo;s thesis while attending the University of Arizona.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="introduction"&gt;&lt;a href="#introduction"&gt;Introduction&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The state of Yemen has become the most recent battleground in the War on Terror. Within this conflict the splinter group Al-Qaeda in the Arabian Peninsula (AQAP) has emerged as a significant threat to both the Yemeni government and the United States of America. Yemen has lost physical territory to AQAP while being subject to numerous attacks and the US has had close calls with the ‘Christmas bomber’ and printer bombs. The US and Yemen have not been idle to these threats and have dramatically shifted their level of action within the region in recent years.&lt;/p&gt;
&lt;p&gt;However, these actions have proven ineffective and sometimes even counterproductive to effectively combating the danger and abilities of AQAP. The shadows of US foreign aid constraints on the Yemeni government are counterproductive to effectively combating AQAP and undermine the capabilities of the Yemeni state. An important part of this deduction comes from the analysis of state actions and their influences on civilians within the conflict between AQAP, Yemen, and the US. For instance, the utilization of mass arrests by Yemeni officials to meet US foreign aid requirements have only increased animosity towards the state government without accomplishing any counterterrorism measures. Such misconduct has done large amounts of damage to the domestic will in fighting AQAP. Much of the conduct of the Yemeni government has shown a near disregard for the domestic impact of some actions while focusing hypocritically on securing packages of international aid and military support. This is due to the massive importance of US foreign aid to the Yemeni national government. Another area of domestic erosion of political support is the prevalence of drone strikes carried out by the US in combating AQAP. Due to the prevalence of innocent civilians killed in such attacks the claims by US officials in dismantling AQAP are actually regressing. This could be due primarily to the ‘accidental guerilla’ phenomenon, as outlined by David Kilcullen. Current levels of foreign aid and military support are helping Yemen in many ways but not in its ability to effectively combat and suppress the actions of AQAP.&lt;/p&gt;
&lt;p&gt;Before approaching the immense domestic complications within Yemen a brief understanding of its formative history is helpful in understanding the perspective of Yemeni citizens, at least in the most general of terms. This explanation brings up many of the problems Yemen faces today including broad poverty, the southern separatists, and the northern rebellion. The southern secessionist movement is almost entirely understood through the division of north and south Yemen before unification in 1990. Thereafter, an introduction to the origins of al-Qaeda before the regional AQAP splinter group became dominant is helpful in seeing the necessity and justification of a US response. This subject closely brings into focus the critical importance of the relationship between US foreign aid and its constraining influence on domestic Yemeni politics. These constraints are shown through the examples of false mass imprisonment and the US drone strike campaign conducted within Yemen. The constraints of US foreign aid are largely due to the immense economic problems facing Yemen that will only worsen with falling production of oil, a primary industry in Yemen.&lt;/p&gt;
&lt;h2 id="history-of-yemen"&gt;&lt;a href="#history-of-yemen"&gt;History of Yemen&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;It was not until 1990 that the Republic of Yemen became a one state. Throughout most of its history, Yemen has ruled itself through the practice of tribalism despite the presence of Islamic dynasties and several empires (Sharp 2012, 2). Yemen’s rugged terrain and thin concentration of people has historically isolated much of the country from domination by a single political entity. This was to change, however, in the 1900s when much of the Arab world was experiencing substantial political changes, which subsequently split Yemen into two distinct polities. In the north, the Yemen Arab Republic took control from the Yemeni Imamate and in the South a movement of Marxists succeeded in establishing their own state (Sharp 2012, 3). These separate states existed until their eventual unification in 1990, which was thereafter governed by Ali Abdullah Saleh, a long time ruler of northern Yemen (Sharp 2012, 3). As with many other rulers throughout the Arab world, Saleh maintained power for a number of years until the events of the Arab Spring.&lt;/p&gt;
&lt;p&gt;In conjunction with the Egyptian revolution and the Tunisian revolution, the Yemeni revolution of 2011 heavily transformed the nation. Set off by both incidents in Tunisia and Egypt, Yemeni citizens began to demonstrate on a large scale in early 2011. According to the BBC, these mass protests were calling for lower unemployment, better economic conditions, protection for the constitution, and for longtime President Ali Abdullah Saleh’s resignation (Sinjab 2011). Reflective of the greater Middle Eastern region, deep poverty and limited economic options prompted the large protests in Yemen. The chronic problems of “economic recession, staggering poverty, dwindling oil and water resources, rapid population growth, and low literacy rates&amp;rsquo;&amp;rsquo; all contributed to a severely dissatisfied population (Hellmich 2012, 624). These reasons initially drew ten thousand protestors calling for Saleh’s resignation and eventually grew to twenty thousand protestors when Saleh did not immediately resign (Sinjab 2011). Saleh dismissed calls for his resignation, which led to fighting between various factions and the eventual bombing of the Presidential compound, injuring Saleh and forcing him to leave the country for medical attention.&lt;/p&gt;
&lt;p&gt;In the power vacuum that resulted in Saleh’s absence, multiple factions, including the Houthi rebellion in the north, the Southern Movement, and AQAP all gained substantial territory while the numerous factions within the central government were occupied with post-Saleh power scrambles. As the pressure to resign continued, Saleh eventually signed a thirty-day transfer of power to then Vice President al-Hadi. Thereafter, elections were held and al-Hadi was elected as the new president. Rather than heralding a new era of Yemeni politics, President al-Hadi signaled a continuation of the status quo, as he was the only candidate on the ballot (Hellmich 2012, 623). Despite these political troubles, a new government in Yemen has the potential to depart from past practices of political corruption that have soured its domestic image. Much of the population questions the legitimacy of the central government after seeing a large influx of foreign aid that more than often only benefited the elite (Winter 2010, 400). The legitimacy of the central government can be restored if reforms are implemented to correctly handle the numerous problems the Yemeni people face.
One such problem includes the tattered national economy that is undiversified and dependent on a single resource. As one of the poorest states in the Middle Eastern region, Yemen faces a variety of additional financial problems, including poverty, impending lack of oil, and a weak central government. Nearly half of the state’s 23 million people survive on less than two dollars per day (Ghobari and Sudam 2011) and around forty percent of Yemenis are unemployed (Plaut 2008). Ninety percent of Yemen’s exports are from oil, a resource that has been forecasted by the World Bank to run completely dry in Yemen within the next decade.&lt;/p&gt;
&lt;p&gt;Other problems facing Yemen are far more politically violent and incessantly drain the national treasury and national political will. The history of being two separate states has played a central role in creating these modern divisions within the state of Yemen. Once the Republic of Yemen became a unified state, the northern polity began to marginalize the southern region. Much of southern Yemen still views their “political, economic, and cultural” lives as being dominated by northern interests and personnel (Sharp 2012, 3). This has given rise to the South Yemen Movement, which seeks secession from the Republic of Yemen after its marginalization following the 1990 unification and 1994 civil war. Deep concerns were voiced by Vice President Salim al-Beidh following Yemeni unification due to subsequent violence and the strong marginalization of the south (“Yemen Profile”). President Saleh soon after dismissed Beidh. Beidh and other supporting parties declared independence from the Republic of Yemen in May of 1994, an action Saleh declared illegal (“Yemen Profile”). The Republic of Yemen successfully invaded South Yemen and retook all of the territory while Southern leaders were “sentenced to death in absentia” (“Yemen Profile”). The South Yemen secessionist movement found little support for years after the civil war and only reentered the public psyche during the Arab Spring events of 2011.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Map of Yemen. Source: Map Resources. Adapted by Congressional Research Service (July 2010)."&gt;
 &lt;img
 alt="Map of Yemen. Source: Map Resources. Adapted by Congressional Research Service (July 2010)."
 title="Map of Yemen. Source: Map Resources. Adapted by Congressional Research Service (July 2010)."
 width="1440"
 height="1079"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-map_hu_cb71b9f5984d42b0.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-map_hu_9a7f0fe00651dae1.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-map_hu_61a0870a1dcdb95e.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-map_hu_cc5a99b4710e4cb9.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-map_hu_de0b69096507cb44.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Map of Yemen. Source: Map Resources. Adapted by Congressional Research Service (July 2010).&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The secession of an entire southern region from Yemen is not the only rebellion the central government of Yemen faces. Another breakaway group that was driven into existence by a disagreement with state actions was the Houthi rebellion in North Yemen during 2004. Hussein al Houthi was the founder of the Houthi rebellion and advocated against Yemeni support for the United States’ War on Terror. Upsetting a key ally that was providing large sums of financial aid was not something the Saleh regime could adopt. During intense fighting and security operations in mid-2004, Hussein al Houthi was killed; however, his death only incensed the Houthi movement. Since 2005 the Houthi rebellion has numbered from one thousand fighters to an upward estimate of ten thousand in 2009 (Redwan 2012). When including non-operational supporters for the Houthi rebellion, this number increases dramatically. Ahmed Al-Bahri, an expert on Houthi affairs, has stated the number of Houthi followers as, “loyalists or fighters” range between 100,000 to 120,000 (Almasmari 2010). The Houthi rebellion is a deadly threat to the central government and killed an estimated 1,000 Yemeni security personnel between 2004 and 2008 (Freeman 2009, 1013). Moreover, between 250,000 and 350,000 people have been displaced within Yemen due to the Houthi rebellion (Hellmich 2012, 624). The degree to which this has influenced the state is tremendous. With a population of approximately twenty-four million, nearly half a million displaced individuals have proven a severe financial burden for the state government and humanitarian organizations. Ongoing military operations also add to the drain on resources that could be used much more effectively elsewhere. The chances of the conflict being resolved are tenuous at best as, “periodic cease-fires have been marred by intermittent skirmishes and mutual recriminations” (Winter 2010, 397). Such a poor progression into peace is not strictly limited to the Houthi rebellion and is a highlight of the final insurgency that is explored in this paper.&lt;/p&gt;
&lt;h2 id="history-of-al-qaeda-and-al-qaeda-in-the-arabian-peninsula"&gt;&lt;a href="#history-of-al-qaeda-and-al-qaeda-in-the-arabian-peninsula"&gt;History of Al-Qaeda and Al-Qaeda in the Arabian Peninsula&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The formation of the modern terrorist group al-Qaeda is a result of the actions of a single, wealthy man. Born in 1957 in Saudi Arabia as a son to a wealthy construction magnate, Osama bin Laden, according to Kenneth Katzman, “adopted militant Islamist views” while at university in Jeddah, where he graduated with a Civil Engineering degree (2005, 1). During the Soviet invasion of Afghanistan in the late 1970s, bin Laden, seeing an unjustified incursion on an Islamic nation, attempted to fund many of the Afghani freedom fighters with his own money (Katzman 2005, 1). In order to continue and reinforce this funding of Afghani mujahideen bin Laden sought to establish an international network of financial aid. This network was called Maktab al-Khidamat, which many consider to be the “organizational forerunner of al-Qaeda” (Katzman 2005, 2). At the cessation of the Soviet invasion of Afghanistan this network numbered between 10,000 to 20,000 operatives (Katzman 2005, 2). With the framework in place all that was needed was to operationalize many of the supporters of Maktab al-Khidamat. With the threat of Soviet incursion ending in Afghanistan, bin Laden’s mentor, Abdullah al-Azzam, urged the necessity of a “base” Islamic “rapid reaction force” (Katzman 2005, 2). This force would be able to respond worldwide to any perceived threat to Islamist people.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Yemen countryside. Source: Rod Waddington"&gt;
 &lt;img
 alt="Yemen countryside. Source: Rod Waddington"
 title="Yemen countryside. Source: Rod Waddington"
 width="1440"
 height="961"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-countryside_hu_91346f0954b3ba00.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-countryside_hu_b343c978339fafc7.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-countryside_hu_b098f9c3af27dfdc.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-countryside_hu_c3cfa046707c407e.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-countryside_hu_ae3e87637a033071.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Yemen countryside. Source: &lt;a href="https://www.flickr.com/photos/rod_waddington/33492968301/in/photolist-T2EdAH-oeq3ad-gBtbJK-78znz6-xfDjU-h14rdN-94kduv-xiNBh-iGWoaF-hHrx1P-xiNUo-xiPgn-pnrtba-xiQYK-nVhefJ-xiP4c-isVH3s-g1cont-xfDi6-gDc122-qLSMHv-Lfy4NM-xiNED-xiJF4-xfDnW-x4E4u-x4Fg4-rcrL1b-xiKtK-hPRLa9-fPHidH-oeop6W-x4Ffa-xiNq9-x4Fjr-bTA5yg-L8Qk92-xfDhy-x4F98-x4E5Q-nZcn63-2evEhki-2iUvY22-xiNKk-x4F5p-h5mEWm-giNf9H-xiNRw-xiNJb-xiNDr"&gt;Rod Waddington&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Such a rapid reaction force was not on the radar of the United States. The mujahideen fighting the Soviet occupation of Afghanistan were actually being supported by the US. By supplying stinger missiles and other means of support to freedom fighters the US was able to fight a proxy war against the Soviets. Even after the collapse of the Soviet Union the threat of Islamic fundamentalists was not piquing US security interests. In 1995 President Bill Clinton even signed Executive Order 12947 imposing sanctions on 12 terrorist factions that had stalled Middle East peace efforts that did not include bin Laden (Coll 2004, 277). This peaceful relationship would, however, change with the bombings of US embassies in Kenya and Tanzania in 1998 that killed roughly 300 people (Katzman 2005, 4). The change of bin Laden’s perception to motivate such an attack came through his perspective that the US tainted Saudi and Kuwaiti soil with their presence during the First Gulf War. In his logic, after offering aid to mujahideen fighters in Soviet Afghanistan the US was now guilty of the same sin in the Arabian Peninsula as the Soviets had been in Afghanistan, by interfering with Muslim populations.&lt;/p&gt;
&lt;p&gt;Al-Qaeda had been active within the region and Yemen before the formation of AQAP itself. An instance of terrorism in the area was the bombing of the USS Cole in 2000. Operatives killed 17 sailors and critically crippled a warship costing nearly a billion dollars with only a small watercraft laden with explosives (Johsen 2013, 72). Less than a year later the attacks of September 11, 2001 charged the US endeavor of bringing members of al-Qaeda to justice with a great deal more haste.&lt;/p&gt;
&lt;p&gt;The history of AQAP lies in the mirrored regionalization of the original al-Qaeda terrorist group. Al-Qaeda operated in Yemen and the surrounding region far before the USS Cole attack in 2000. Other bombings and suicide attacks occurred in the region until 2005 when much of al-Qaeda was presumed to have been decimated by US military and ally efforts. It was not until about four years later in 2009 that a video showed a declaration that a reemerged al-Qaeda in the region had formed into a concrete threat. Formally, AQAP was created by Abd al-Karim al-Wahayshi in a January 2009 announcement wherein he declared the Saudi Arabia and Yemen branches of al-Qaeda formed into AQAP (Hellmich 2012, 619). By consolidating the two groups, al-Wahayshi was able to secure power, increasing the effectiveness of pursuing regional goals. The new leader of a newly minted AQAP pledged to target Yemeni, Saudi Arabian, and Western interests within a regional and international context (Hellmich 2012, 619). These goals reflected many of al-Qaeda’s original pursuits but translated to a regional scale. Such parallels would seem inevitable considering many of AQAP’s members were originally part of al-Qaeda. Al-Wahayshi himself was originally an understudy to Osama bin Laden (Johnsen 2013, xv) and garnered much of his power through that past proximity. AQAP could therefore be considered a ‘franchise’ of the al-Qaeda parent company. This franchise has been thought to number among 200 to 300 members (Hellmich 2012, 621) and up to 1,000 (Ackerman and Shactman 2012). Ultimately, however, the most critical number of AQAP members is what the US deems a security threat. A defined number could carry the reinforcement or the retraction of substantial US domestic and military aid.&lt;/p&gt;
&lt;h2 id="impact-on-state-belligerents"&gt;&lt;a href="#impact-on-state-belligerents"&gt;Impact on State Belligerents&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Besides the previously mentioned vicious attack on the USS Cole other terrorist plots have been intended for US audiences. A notable example was the purported ‘underwear bomber’ or ‘Christmas bomber,’ Umar Farouk Abdulmutallab’s attempt to bomb flight 253 in 2009. Kate Stanton notes that multiple reports sourced Umar’s training as having originated from AQAP in Yemen (2010). Another plot was attempted by hiding explosives in the ink cartridges of printers during their transport on a cargo plane. Although unsuccessful, the attempted international reach of AQAP has alarmed many US policy-makers. According to some US intelligence officers AQAP incorporates the “greatest threat to America” (Cloud and Dilanian 2012). Additionally, some CIA analysts perceived AQAP as such an “urgent threat” to US national security in 2010 they urged officials to call for expanded operations in Yemen and increase military aid to $1.2 billion (Hellmich 2012, 618). However, such large financial investments would be difficult to appropriate in an environment already filled with Afghanistan, Iraq, and other counterterrorism projects. Additionally, an infusion of cash could further complicate the motivations the Yemeni government would pursue in abusing their citizens in attempts to garner more foreign aid. These concerns were ultimately overcome.&lt;/p&gt;
&lt;h2 id="foreign-aid-and-yemen"&gt;&lt;a href="#foreign-aid-and-yemen"&gt;Foreign Aid and Yemen&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;In order to understand some of the unusual measures taken by Yemen in reaching anti-terrorism goals we must review its history of international aid. Massive dragnet arrests at the urging of a foreign power do not exemplify normal state behavior but show the dedication of Yemeni leaders in obtaining external financial support. Foreign aid is critical to Yemen, in subsidizing the historically poor nation state and without it, Yemen would face a bleak situation on all fronts. The below World Bank graph shows the historical volatility of net official development assistance received by Yemen as noted in billions of U.S. dollars (2014).&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Yemen Foreign Aid from 1960 to 2014."&gt;
 &lt;img
 alt="Yemen Foreign Aid from 1960 to 2014."
 title="Yemen Foreign Aid from 1960 to 2014."
 width="1566"
 height="1070"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-foreign-aid-1960-2014_hu_746eb0f6b90ed8cc.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-foreign-aid-1960-2014_hu_43a889a842cda5f4.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-foreign-aid-1960-2014_hu_43a0a5185ad63a6c.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-foreign-aid-1960-2014_hu_8e6fdc3895f22c85.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemen-foreign-aid-1960-2014_hu_751e3aaee5d94f94.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Yemen Foreign Aid from 1960 to 2014.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Although Yemen was not actually a state until 1990 the sovereign actors occupying its geographical space have been receiving aid since the 1960s. The current extreme aid relationship between the US and Yemen is truly anomalous in comparison to historical trends. According to Sheila Carapico, “the US never invested heavily in Yemen, nor have the Yemenis seen the US as a benefactor” (2006, 185). Carapico goes on to state that the past aid relationship Yemen had with other states was a lot stronger and between 1968-1980 amounted to $150 million from the USSR and $84 million from China (2006, 185). This again was dwarfed by OPEC states giving $399 million between 1973-1981. The two primary reasons for such foreign aid was the political solidarity from the USSR and China with the socialist South Yemen state and “as part of [Saudi Arabia’s] regional anticommunist strategy” (Carapico 2006, 193). As global politics began to shift in the early 1990’s the promise of socialist support began to fade with the collapse of the USSR and the immense test of the First Gulf war came upon Yemen.&lt;/p&gt;
&lt;p&gt;It was during the First Persian Gulf War in which Yemen gambled foreign aid support in what it believed a more appropriate course of action: by remaining neutral in the Iraq-Kuwait conflict (Cleveland and Bunton 2009, 494). Yemen was a rotating member of the Security Council when the United States was trying to pass resolution 678 in the United Nations, to secure the state of Kuwait from Iraqi invaders. Resolution 678 was the fundamental legal justification for the Allies to intervene under international law. When the issue came up for a vote, Yemen vetoed resolution 678 in favor of abstaining from military intervention in the Iraq-Kuwait conflict and instantly drawing the ire of the United States. Shortly after the vote, a high level US diplomat told the Yemeni diplomat, “this was the most expensive no-vote you ever cast” (Hellmich 2012, 625). Before Resolution 678, the US was giving Yemen a “token” $30 million in aid per year (Carapico 2006, 195). While not substantial in its own right the immense influence of the US on other institutions and states formed the hammer that would fall on Yemen. The US subsequently withdrew foreign aid from Yemen and advised other nations and organizations to do the same, as a punitive measure.&lt;/p&gt;
&lt;p&gt;The opposition to Resolution 678 certainly cost Yemen dearly. Within days the United States “stopped its $70 million aid program to Yemen” while the “World Bank and the International Monetary Fund moved to block loans to the country” (Hellmich 2012, 625). Besides large Western organizations, a few of the regional powers within the Middle East punished Yemen in order to maintain the support of the United States. Saudi Arabia expelled more than eight hundred thousand Yemeni workers. Meanwhile, fellow Gulf States followed suit by expelling an additional fifty thousand Yemeni workers cumulatively (Cleveland and Bunton 2009, 494). This had a huge impact on Yemen’s economy. Up to a million workers were employed in Saudi Arabia during the 1980s and “their remittances accounted for over 40 percent of the gross domestic product of both North and South Yemen” (Cleveland and Bunton 2009, 494). Despite the fact that Yemen could never have stopped the First Persian Gulf War, it did not save it from the profound financial ire of a severely displeased US.&lt;/p&gt;
&lt;p&gt;The waning level of foreign aid in 2005 illustrates a more contemporary occurrence of the foreign aid relationship Yemen had with the US. After tactically striking some of the key leadership of al-Qaeda in Yemen during the period between 2001-2005 the US dismissed any further need to pursue AQAP due to its limited threat.&lt;/p&gt;
&lt;p&gt;As the level of perceived threat from Yemen diminished, so did the amount of foreign military and domestic aid. Aid to Yemen dried up as the US cut its $20 million aid program and the World Bank downsized its aid package from $420 to $280 million (Hellmich 2012, 626). As one Yemeni expert has stated, “without al-Qaeda, Yemen was just one more poor country” (Johnsen 2013, 186). If a state did not contain a security threat related to international terrorism in the post 9/11 world the US diminished some of the more ‘basic’ struggles, such as civil war and rebellion. This was especially difficult for Yemen considering the heightened status that al-Qaeda brought to US security interests and military spending in the region. Following 9/11 the US aid amount given to Yemen in combating terrorism was strong but diminished in 2005 due to less terrorist threats.&lt;/p&gt;
&lt;p&gt;The modern relationship between the US and Yemen has recovered from this lull during the middle 2000s. Aid to Yemen in the fiscal year 2012 amounted to a staggering $356 million among a wide range of US agencies and accounted for the largest aid amount to Yemen ever (Sharp 2012, 14). Current aid in the fiscal year 2014 amounts to $142.6 million so far (Sharp 2014, 11). Please note that totals within report GAO-12-432R for FY2012 and FY2013 are incomplete.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Report Number GAO-12-432R 2009-2014."&gt;
 &lt;img
 alt="Report Number GAO-12-432R 2009-2014."
 title="Report Number GAO-12-432R 2009-2014."
 width="1339"
 height="1240"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2009-fy2014_hu_e82bf8ca3d46c4de.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2009-fy2014_hu_b3b2ca0d83e1227f.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2009-fy2014_hu_49ada1d0033cedfc.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2009-fy2014_hu_aebe189b58220272.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Report Number GAO-12-432R 2009-2014.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;This trend of increasing aid has been on the rise since the fiscal year 2007 due mainly to the dire straits of Yemen’s domestic scene and the threat of AQAP to regional and international affairs. From fiscal year 2007 to 2013, US aid in the millions has been, $61.914 in 2007, $26.296 in 2008, $123.382 in 2009, $299.071 in 2010, $159.70 in 2011, $316.48 in 2012, and $256 tentatively in 2013 (Sharp 2012, 20). Once again, please note GAO-12-432R has incomplete amounts for FY2012.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Report Number GAO-12-432R 2007-2012."&gt;
 &lt;img
 alt="Report Number GAO-12-432R 2007-2012."
 title="Report Number GAO-12-432R 2007-2012."
 width="1336"
 height="1196"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2007-fy2012_hu_6d9e0eb58c3422d6.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2007-fy2012_hu_2e861f1b6c05a207.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2007-fy2012_hu_c8a880e6e6523efb.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/us-foreign-aid-allocations-to-yemen-fy2007-fy2012_hu_47231e9d48a98097.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Report Number GAO-12-432R 2007-2012.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;In addition to the US other states contribute Yemen in an effort to stabilize its humanitarian situation. These states formed the ‘Friends of Yemen Group’ and moved to distribute $5.7 billion in aid to Yemen that had been pledged previously in 2006 (Sharp 2012, 12). Despite the vast amounts of money pouring into Yemen the kleptocratic tendencies and corruption of state officials will result in most of the money never helping the average citizen.&lt;/p&gt;
&lt;p&gt;With the large amount of aid going into Yemen it is necessary to note the effects of foreign aid on Yemen. Some critics focus on the potential for exploitation in the security field. If the nations giving aid to Yemen view their relationship from the perspective of security, Yemeni officials will continually exploit this fear for financial and political gain (Hill 2010, 10). However, the aid going into Yemen is not limited to security. Much of the humanitarian and investment aid Yemen receives is critical for Yemen’s future development, according to the international community and the Yemeni government (al-Shamahi 2012). Without much of the aid the US sends to Yemen the state would face profound domestic problems in addition to crippling potential future plans that are dependent on foreign aid. This dependency is dangerous, as declared by a 60% majority motion in a meeting of Yemeni citizens in 2012 (al-Shamahi). In this meeting the use of foreign aid by the Yemeni government caused more harm than good. While not representative of an entire society, such a declaration nonetheless signals that a segment of the population has recognized problems. The shadow of US foreign aid in Yemen has certainly demonstrated its constraints on the domestic actions of the Yemeni government. Despite these necessities the Yemeni dependency on foreign aid is rather obvious. Such a relationship is highlighted in its potential abuse in gaining additional aid by exaggerating security threats.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Weapons Provided to MOI through DOD’s Section 1207(n) Assistance Program. GAO-13-310. Publicly Released: Mar 20, 2013."&gt;
 &lt;img
 alt="Weapons Provided to MOI through DOD’s Section 1207(n) Assistance Program. GAO-13-310. Publicly Released: Mar 20, 2013."
 title="Weapons Provided to MOI through DOD’s Section 1207(n) Assistance Program. GAO-13-310. Publicly Released: Mar 20, 2013."
 width="1440"
 height="994"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/weapons-provided-to-yemen-gao_hu_1f3251a24a81b9a1.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/weapons-provided-to-yemen-gao_hu_f9c4ae50f8f5db9b.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/weapons-provided-to-yemen-gao_hu_b9c9d97a16d9edf3.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/weapons-provided-to-yemen-gao_hu_b8697012191017d6.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/weapons-provided-to-yemen-gao_hu_99d7f66c36e85582.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Weapons Provided to MOI through DOD’s Section 1207(n) Assistance Program. &lt;a href="https://www.gao.gov/products/gao-13-310"&gt;GAO-13-310&lt;/a&gt;. Publicly Released: Mar 20, 2013.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The central government of Yemen has a categorical incentive to continue the level of aid. Unfortunately, this has led to many analysts to conclude that Yemen is intentionally keeping conflicts, specifically the Houthi rebellion, as unresolved in order to secure international aid (Winter 2010, 400). A similar skepticism is shared of the Yemeni government’s relationship with AQAP, given that US aid is contingent upon fighting the terrorist group (Hellmich 2012, 621). More specifically, if Yemen was to meet artificial ‘progression levels’ set by external actors the state could secure foreign aid but at the expense of domestic legitimacy. Rather than focusing on domestic support that could ultimately be more valuable in fighting an insurgency the state has sourced its power to external actors. The Yemeni government can only operate within the parameters of external foreign aid and would likely collapse with all external aid cut off.&lt;/p&gt;
&lt;p&gt;Many of these domestic consequences are already manifesting themselves as complications within the national politics of Yemen. Even with current sustained levels of international aid Yemen is still one of the poorest Arab world states. In 2012 substantial political unrest during the Arab Spring caused the World Food program to increase rations by 2.7 million in only 8 months (Sharp 2012, 13). Food insecurity is one of many additional immediate needs required by a broad number of Yemeni citizens. Perhaps the long term problem and nonviolently solved dilemma facing Yemen is the end of its oil reserves. Despite the vast amounts of aid pouring into the Yemen state the ability of the national government to resolve long standing systemic issues is rapidly being constrained by falling oil production (Hill 2010, 4). Such a critical analysis of Yemen oil production is appropriate due to the fact that the industry’s revenue accounts for 90% of export profit and 75% of government income (Hill 2010, 7). The entire infrastructure and economy of Yemen is based around oil, and would be completely devastated without their primary resource. The World Bank has forecasted Yemen’s “petroleum output will fall to zero by 2017” (Fontaine and Exum 2010). This production loss has already been manifested, as two of the largest oil fields in Yemen decreased their production output by 12% between 2007 and 2010 (Hill 2010, 7). Without the primary resource of oil artificially sustaining the Yemeni government the central government could collapse (Plaut 2008). The overall trend therefore is the increasing importance of foreign aid to Yemen and its role in shaping domestic politics. Without an independent source of income the Yemeni government will be increasingly more dependent on foreign aid as oil production slowly wanes over the next decade.&lt;/p&gt;
&lt;h2 id="the-usual-suspects-everyone"&gt;&lt;a href="#the-usual-suspects-everyone"&gt;The Usual Suspects (Everyone)&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Following the events of 9/11 the ‘War on Terror’ began to reshape the relationship the US had with many states throughout the world. Aimed at combating the rise of global terrorism, certain US policies provided large funds to regimes that assisted in achieving such goals. Yemen’s pursuit of foreign aid from the US was successful in the initial frenzy following 9/11 but ultimately evaporated around 2005. Once the US lost interest, state officials had to rectify aggressive policy measures meant to secure US aid with how they had abused their citizens.&lt;/p&gt;
&lt;p&gt;Historically, Yemen had problems with terrorist groups and was therefore on track to be assisted by the US with domestic and military aid. The only problem, however, was that Yemen had not made any concrete demonstrations of anti-terrorist policies that were to US policy-maker’s satisfaction. Therefore, in 2001, Yemen made an effort to garner US support through the War on Terror by arresting “anybody it suspected of harboring support for al-Qaeda” (Hellmich 2012, 626). The demographic that was targeted was young men throughout the entire country that might be suspected of potentially supporting al-Qaeda. Rather than methodically utilizing police work or military intelligence the Yemeni state blindly rounded up a huge number of young men. Gregory Johnsen described this method by Yemeni officials as a “dragnet” that some guilty individuals got caught up in but “most were not” (2013, 77). The end goal might not have been to realistically detain actual members of al-Qaeda but to demonstrate actionable conduct to US officials. The conduct was able to win US financial support but ultimately at the cost of disenfranchising a large proportion of the Yemeni population. If the US had looked closer it would have witnessed its overall pursuit of suppressing regional al-Qaeda operations as having been unsuccessful due to the poor implementation by Yemeni officials.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The capital city of Sana&amp;rsquo;a in 1996. Built in a mountain valley at an altitude of 2,200 m, Sana&amp;rsquo;a has been inhabited for more than 2,500 years. In the 7th and 8th centuries, the city became an important center for the spread of Islam. We find this religious and political heritage in its 106 mosques, its 12 hammams and its 6,500 houses, all of which date from before the 11th century. The tower houses with many floors and the old adobe houses further add to the beauty of the site. Source: Werner Bayer"&gt;
 &lt;img
 alt="The capital city of Sana’a in 1996. Built in a mountain valley at an altitude of 2,200 m, Sana’a has been inhabited for more than 2,500 years. In the 7th and 8th centuries, the city became an important center for the spread of Islam. We find this religious and political heritage in its 106 mosques, its 12 hammams and its 6,500 houses, all of which date from before the 11th century. The tower houses with many floors and the old adobe houses further add to the beauty of the site. Source: Werner Bayer"
 title="The capital city of Sana&amp;rsquo;a in 1996. Built in a mountain valley at an altitude of 2,200 m, Sana&amp;rsquo;a has been inhabited for more than 2,500 years. In the 7th and 8th centuries, the city became an important center for the spread of Islam. We find this religious and political heritage in its 106 mosques, its 12 hammams and its 6,500 houses, all of which date from before the 11th century. The tower houses with many floors and the old adobe houses further add to the beauty of the site. Source: Werner Bayer"
 width="1440"
 height="888"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/sanaa-in-1996_hu_8484f4ff5e3c5c62.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/sanaa-in-1996_hu_7b33335d9477da16.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/sanaa-in-1996_hu_e07990652bb53424.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/sanaa-in-1996_hu_7687c7956065ecb3.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/sanaa-in-1996_hu_a3588b14f6fbb8cd.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The capital city of Sana&amp;rsquo;a in 1996. Built in a mountain valley at an altitude of 2,200 m, Sana&amp;rsquo;a has been inhabited for more than 2,500 years. In the 7th and 8th centuries, the city became an important center for the spread of Islam. We find this religious and political heritage in its 106 mosques, its 12 hammams and its 6,500 houses, all of which date from before the 11th century. The tower houses with many floors and the old adobe houses further add to the beauty of the site. Source: &lt;a href="https://www.flickr.com/photos/wbayercom/29011437946/in/photolist-LcDcKY-9MsaSV-Lfy572-rraRyG-22fFKov-4HDX2d-xiJPf-xiNns-L6eMij-xfD9K-xfDxb-xiKqk-xiJYa-LfyaWZ-27sZy-EJoed7-gmS1vf-L8QjDz-gD9Fd5-xfDvx-KiHgHu-L8Qm74-Lfy6PF-xiKAA-KPgiym-xiP5j-giNTzd-xiNLD-S8a43b-27sZj-xiKwb-xiKhW-xiQQH-T43tKb-ogxP1u-4gD2i-9P23d3-ThU9ap-T6s25B-iJpTov-9r4WXb-xiR2C-2mAJyCY-ThU8Bk-eFW1Gt-T6rYu6-2iUAk9D-aE72QW-ThUebB-ThU6ha"&gt;Werner Bayer&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Although AQAP is essentially a foreign group to Yemen, the terrorist cell has ultimately started a chain reaction of the ‘accidental guerilla’ as outlined by David Kilcullen. The ideology of al-Qaeda or AQAP might not be appealing to natives of Yemen but the violent “backlash” from state governments in combating guerrilla fighting creates the “majority of [al-Qaeda’s] strength” (Kilcullen 2009, 34). Throughout the years of conflict with AQAP, Yemen has lost territory, regained territory, faced kidnappings, bombings, suicide bombings, and assassination attempts. One of the most brazen was a suicide bombing that left 96 soldiers dead only a short distance from the presidential palace (Sohlman 2012, 250). The response from government forces to such widespread actions is undoubtedly equal in scope and severity. The same phenomenon occurs with AQAP and native reactions to false imprisonment and violent drone strikes from external actors. When an individual’s entire family is killed from a drone strike or is falsely imprisoned to meet external ‘goals,’ levels of animosity will increase. Or, at the very least, the tacit approval of insurgencies becomes more pronounced.&lt;/p&gt;
&lt;p&gt;However, some scholars disagree on the domestic perception of AQAP. Sarah Phillips notes that the “grassroots support” of AQAP is not as broad as many believe and the group’s ideology is not compatible with the domestic audience of Yemen (2011, 98). Rather than condemn the success of AQAP, Phillips recognizes Kilcullen’s phenomenon of the ‘accidental guerilla’ that results from blowback during disproportionate violence. The only way to get around this accidental characteristic is the establishment of a “legitimate and effective government” (2011, 99). Although not impossible, such a path would be beyond the ability of modern international relations. More to Phillips’ point is the isolation of government action as the primary source of antagonization in polarizing domestic audiences against state legitimacy. Without disproportionate violence from the state the presence of an insurgency such as AQAP would be less pronounced. The state can therefore be identified as exacerbating the problem into a more complicated problem in attempting to solve the original problem of insurgency.&lt;/p&gt;
&lt;p&gt;Being falsely arrested by the state would reinforce sympathies with insurgent causes for many individuals. A young male ripped from his home would strip many households of their primary source of labor and income due to the traditional nature of many Yemeni families. The substantial loss of domestic stability would have many families reeling through lost harvests and untended trades sitting idle. The young men themselves would end up in close proximity to actual criminals and terrorist members that could potentially influence their formerly innocent habits and ideology. Actual terrorists that attempted to sympathize with innocent prisoners would have the compounded effect of empathy wherein they are both members of the prison system. As innocent people entered the prison system in Yemen they might not have supported al-Qaeda but “they probably did by the time they were released (Hellmich 2012, 626). The callous conduct by Yemeni state officials dismissed the potentiality of disenfranchising a whole swath of their citizens. Yemen showed actionable conduct for US officials only at the cost of “those falsely arrested becoming more sympathetic to the terrorists’ cause” (Hellmich 2012, 626). No longer would the young man in a distant settlement be politically neutral when witnessing the conflict between insurgent AQAP members and Yemeni state forces. This individual might not become operational and participate in the conflict but the complete erosion of political will dangerously forces state resources to depend entirely on external foreign assistance. All these domestic costs were extracted at the price of US non-intervention in troubled Yemen and the maintenance of plentiful US foreign aid. This, of course, lasted only until the US saw AQAP as a non-threat in Yemen and withdrew much of its aid in 2005, as previously explained.&lt;/p&gt;
&lt;h2 id="innocent-people-will-die"&gt;&lt;a href="#innocent-people-will-die"&gt;“Innocent People Will Die”&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;In addition to the Yemeni military, the US military conducts operations in the conflict with AQAP by using unmanned aerial vehicles for reconnaissance and direct action. These drones operate through remote control and can provide accurate aerial intelligence in addition to being able to deliver substantial firepower to remote locations. Using more direct sources of physical violence, including special operations, have been determined to reduce the Yemeni government’s political legitimacy (Katz 2003, 42). Citizens view their central government as incapable of combatting a few hundred or thousand terrorists and must rely on the might of a foreign power to stay ahead. This effect would be magnified if there were actual US military personnel acting in a combat role within Yemen. It is therefore useful for the US to create a mechanical buffer zone with drones in order to avoid the political fallout. A better resolution would be the fortification of Yemeni military capabilities in combating AQAP independent of US drone campaigns. However, many US officials would be skeptical of Yemeni capabilities without US drone strike capabilities and other methods of guaranteeing security would have to be developed. Despite the rough transition period of moving away from drone strikes, the reclamation of independent Yemeni military capabilities would improve the political legitimacy of the regime enough for the difficulties to be worth it.&lt;/p&gt;
&lt;p&gt;The tribal region of Pakistan has been the most identifiable area of operations for drones in the media. This might have been accurate for ongoing US operations until 2012 when the number of drone strikes in Yemen surpassed the numbers in Pakistan. By the summer of 2012 there had been 23 drone strikes in Yemen during the year while Pakistan had 22 (Ackerman and Shactman 2012). Since 2002 there have been 154 drone strikes in Yemen with approximately 800 casualties including 97 civilians. (Murray 2013). Drones are not limited to operations with Yemen or the Middle East and have become the poster child for a new incarnation of modern war. However, these tools are not used indiscriminately, as all drone operations in Yemen are approved by Yemeni officials (Rohde 2012). On a US policy level, all drone strikes are individually approved by the US President (Becker and Shane 2012). With such requirements for drone strikes it is difficult to imagine weighing the costs and benefits of certain sets of intelligence when in reality there could be a number of innocent bystanders.&lt;/p&gt;
&lt;p&gt;The greatest mishap of utilizing drone strikes is not the determination of their effectiveness but their overall use. In an interview, former President Bill Clinton stated that no matter the precision of your weapons, “when you set them off, innocent people will die” (Coll 2004, 536). The former Vice Chairman of the Joint Chiefs of Staff, General Cartwright, has shared this sentiment recently. In a 2013 address to the Chicago Council on Global Affairs he stated he was seeing “blowback” effects due to the War on Terror drone campaign (Mazzetti and Shane 2013). It does not matter if the perceived validity of intelligence is nearly irrefutable there still exists a chance of error. This margin of error might represent half of a family ripped apart by the ‘precision’ of a laser guided missile. Guerrilla fighter expert David Kilcullen relates a prediction by Qiao Liang that states that the US must follow its defined rules or the “whole world won’t trust it” (2009, 7). It is with this estimation that the US is treading a very fine line between punishing the killers of innocent civilians while unintentionally becoming guilty of the same type of crime. This very line was tragically crossed in the summer of 2013, when three suspected members of al-Qaeda confronted a cleric behind a Mosque a US drone strike killed them all (Murray 2013). This might seem successful if the fact that the cleric just finished an aggressive sermon denouncing al-Qaeda was ignored. In an effort to exterminate members of al-Qaeda the US inadvertently murdered perhaps one of the driving forces behind anti-terrorism with the community. The community was in the beginning stages of slowly departing from al-Qaeda ideologically but is now in the midst of questioning state actions. This example is reflective in the greater difficulty the US is having in conducting effective military action with drones. One journalist even described it as the US helping Yemen with one hand while killing it with the other (al-Muslimi 2013). The Yemeni regime is not immune to this interpretation either. When President Abed Hadi met with the US CIA director a total of two drone strikes occurred during the time of the meeting (al-Muslimi 2013). While the timing may be a coincidence the interpretation by Yemeni citizens was that Hadi was becoming a US yes-man (al-Muslimi 2013).&lt;/p&gt;
&lt;p&gt;The implications for waning legitimacy are profound. US drone strike actions are tearing away its image in the eyes of the public. Such was the case when Farea al-Muslimi was able to testify before the US Congress earlier this year. In his testimony al-Muslimi was able to project the sentiments of his home villagers following the drone strike that killed a member of AQAP. Instead of arresting the man, al-Muslimi stated what terrorist propaganda could not achieve was instead accomplished “in one instant” by “one drone strike” (Savage 2013). Warping the rule of law in the eyes of Yemenis has seriously damaged the perceived legitimacy of US interests and in turn, to Yemeni state interests. The below U.S. State Department polling results reflect this public perception reality about U.S. military action within Yemen (Sharp 2012, 19).&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="INR Opinion Analysis."&gt;
 &lt;img
 alt="INR Opinion Analysis."
 title="INR Opinion Analysis."
 width="1440"
 height="685"srcset="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemeni-attitudes-towards-us-aid_hu_641a2d89ac5c5235.webp 480w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemeni-attitudes-towards-us-aid_hu_478a714f3fac54f1.webp 768w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemeni-attitudes-towards-us-aid_hu_f3828bf24e337984.webp 1024w, https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemeni-attitudes-towards-us-aid_hu_e9dcf4db8a1a964c.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/the-shadow-of-the-united-states-in-yemen/yemeni-attitudes-towards-us-aid_hu_b322e8ef836b3fc4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;INR Opinion Analysis.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h2 id="conclusion"&gt;&lt;a href="#conclusion"&gt;Conclusion&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The conflict between AQAP, Yemen, and the US has highlighted significant problems with external foreign aid and its effectiveness. The actions of the insurgent group AQAP has had a profound impact on the domestic and international relations of Yemen and the US. The US and Yemen have not been idle to these threats and have dramatically shifted their level of action within the region. However, these actions have proven ineffective and sometimes even counterproductive to effectively combating the danger and abilities of AQAP. The shadows of US foreign aid constraints on the Yemeni government are counterproductive to effectively combating AQAP and undermine the capabilities of the Yemeni state. Conduct by states within the Yemen conflict has seriously changed public perception. Unfortunately this public perception has mostly been migrated to a negative outlook. Some of these state actions are sadly justified due to the nature of poverty within Yemen. However, in the attempt to secure foreign aid from the US the Yemeni government dismissed more important domestic considerations. Additionally, the method of gaining such foreign aid with ‘dragnet’ policing effectively alienated a large demographic of citizens. Such motivational themes have seriously diminished the political legitimacy of the Yemeni regime. If US foreign aid was used to improve the quality of life for the majority of the domestic audience the outlook could be different but this is unfortunately not the case.&lt;/p&gt;
&lt;p&gt;External actions by US interests also prove problematic for ‘winning’ the conflict in Yemen. The efforts of drone strikes are ambitious in their aim at exterminating AQAP operatives but innocent casualties hinder the overall mission. This is especially compounded when town leaders are killed who were advocating anti-al-Qaeda ideology. Reactions by fellow townspeople are logically confused as to the aims of the US drone campaign. Although a strike may kill many more operatives than civilians the innocent deaths have significant impact nonetheless. Regular citizens are able to see the contradictory pursuits of punishing murderers while carrying a margin of error in committing murder anew. Overall, the pursuits of US foreign aid and policy in Yemeni are substantially constraining the national government in their ability to meet domestic needs and systemic requirements while combating AQAP.&lt;/p&gt;
&lt;h2 id="references"&gt;&lt;a href="#references"&gt;References&lt;/a&gt;&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Ackerman, S. &amp;amp; Shactman, N. (2012, June 14). Let’s admit it: The US is at war in 	Yemen, too. Wired. Retrieved from &lt;a href="http://www.wired.com/dangerroom/2012/06/yemen-war/all/"&gt;http://www.wired.com/dangerroom/2012/06/yemen-war/all/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;al-Maqtari, M. (2012, April 12). Oil in Yemen to run out in 12 years. Yemen Times. Retrieved from &lt;a href="http://www.yementimes.com/en/1563/news/696/Oil-in-Yemen-to-run-out-in-12-years.htm"&gt;http://www.yementimes.com/en/1563/news/696/Oil-in-Yemen-to-run-out-in-12-years.htm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Almasmari, H. (2012, Oct 5). Ahmed al-bahri expert in houthi affairs. Yemen Post. Retrieved from &lt;a href="http://yemenpost.net/Detail123456789.aspx?ID=3&amp;amp;SubID=1723&amp;amp;MainCat=4"&gt;http://yemenpost.net/Detail123456789.aspx?ID=3&amp;amp;SubID=1723&amp;amp;MainCat=4&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;al-Muslimi, F. (2013, August 11). America loses Yemeni people in drone war. Al Monitor. Retrieved from &lt;a href="http://www.al-monitor.com/pulse/originals/2013/08/america-loses-face-with-yemeni-1.html"&gt;http://www.al-monitor.com/pulse/originals/2013/08/america-loses-face-with-yemeni-1.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;al-Qaeda said to seize Yemen town amid turmoil. (2011, March 26). CBS News. Retrieved from &lt;a href="http://www.cbsnews.com/2100-202_162-20047565.html"&gt;http://www.cbsnews.com/2100-202_162-20047565.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;al-Shamahi, A. (2012, Sept 24). Is aid good for yemen?. The Guardian, Retrieved from &lt;a href="http://www.theguardian.com/global-development/poverty-matters/2012/sep/24/yemen-foreign-aid-good-debate"&gt;http://www.theguardian.com/global-development/poverty-matters/2012/sep/24/yemen-foreign-aid-good-debate&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Becker, J., &amp;amp; Shane, S. (2012, May 29). Secret ‘kill list’ proves a test of Obama&amp;rsquo;s principles and will. New York Times. Retrieved from &lt;a href="http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?_r=0&amp;amp;pagewanted=all"&gt;http://www.nytimes.com/2012/05/29/world/obamas-leadership-in-war-on-al-qaeda.html?_r=0&amp;amp;pagewanted=all&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Boucek, C. House Committee on Homeland Security, Subcommittee on Counterterrorism and Intelligence. (2011). Terrorist threat to the U.S. homeland – al-qaeda in the arabian peninsula (aqap). Washington, D.C.: Carnegie Endowment for International Peace.&lt;/li&gt;
&lt;li&gt;Carapico, S. (2006). No Quick Fix: Foreign Aid and State Performance in Yemen. Short of the Goal: US Policy and Poorly Performing States, Washington: Center for Global Development, 182-208.&lt;/li&gt;
&lt;li&gt;Cleveland, W., &amp;amp; Bunton, M. (2009). A history of the modern middle east. (4th ed ed.). Boulder: Westview Press.&lt;/li&gt;
&lt;li&gt;Cloud, D., &amp;amp; Dilanian, K. (2012, May 16). U.S. escalates clandestine war in yemen. Los Angeles Times. Retrieved from &lt;a href="http://latimesblogs.latimes.com/world_now/2012/05/washington-escalation-american-clandestine-war-yemen-us-troops-.html"&gt;http://latimesblogs.latimes.com/world_now/2012/05/washington-escalation-american-clandestine-war-yemen-us-troops-.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Coll, S. (2004). Ghost wars. New York: Penguin Books.&lt;/li&gt;
&lt;li&gt;Dana, P. (2010, January 27). U.S. military teams, intelligence deeply involved in aiding yemen on strikes. Washington Post. Retrieved from &lt;a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/01/26/AR2010012604239.html"&gt;http://www.washingtonpost.com/wp-dyn/content/article/2010/01/26/AR2010012604239.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Redwan, M. (2009, November 19). Pity those caught in the middle. Economist, Retrieved from &lt;a href="http://www.economist.com/node/14920092?story_id=14920092"&gt;http://www.economist.com/node/14920092?story_id=14920092&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;DeYoung, K. (2010, May 16). President obama executive order gives treasury authority to freeze yemeni assets in U.S. Washington Post. Retrieved from &lt;a href="http://www.washingtonpost.com/world/national-security/president-obama-executive-order-will-give-treasury-authority-to-freeze-us-based-assets-in-yemen/2012/05/15/gIQALWPUSU_story.html"&gt;http://www.washingtonpost.com/world/national-security/president-obama-executive-order-will-give-treasury-authority-to-freeze-us-based-assets-in-yemen/2012/05/15/gIQALWPUSU_story.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Downes, C. (2004). &amp;rsquo;targeted killings&amp;rsquo; in an age of terror: The legality of the Yemen strike. Journal of Conflict &amp;amp; Security Law, 9(2), 277-294.&lt;/li&gt;
&lt;li&gt;Fontaine, R., &amp;amp; Exum, A. (2010, January 5). Yemen&amp;rsquo;s coming disaster. Los Angeles Times. Retrieved from &lt;a href="http://articles.latimes.com/2010/jan/05/opinion/la-oe-fontaineexum5-2010jan05"&gt;http://articles.latimes.com/2010/jan/05/opinion/la-oe-fontaineexum5-2010jan05&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Freeman, J. (2009). The al Houthi insurgency in the north of yemen: An analysis of the shabab al moumineen. Studies in Conflict &amp;amp; Terrorism, 32(11), 1008-1019.&lt;/li&gt;
&lt;li&gt;Ghobari, M., &amp;amp; Sudam, M. (2011, January 20). Protests erupt in Yemen, president offers reform. Reuters. Retrieved from &lt;a href="http://af.reuters.com/article/tunisiaNews/idAFLDE70J2BZ20110120?pageNumber=3&amp;amp;virtualBrandChannel=0&amp;amp;sp=true"&gt;http://af.reuters.com/article/tunisiaNews/idAFLDE70J2BZ20110120?pageNumber=3&amp;amp;virtualBrandChannel=0&amp;amp;sp=true&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Hegre, H. (2004). The duration and termination of civil war. Journal of Peace Research, 41(3), 243–252.&lt;/li&gt;
&lt;li&gt;Hellmich, C. (2012). Fighting al qaeda in yemen? rethinking the nature of the islamist threat and the effectiveness of U.S. counterterrorism strategy. Studies in Conflict &amp;amp; Terrorism, 35(9), 618-633.&lt;/li&gt;
&lt;li&gt;Hill, G. (2010). Yemen: Fear of failure. Chatham House: Middle East and North Africa Programme, MENAP BP 2010(1).&lt;/li&gt;
&lt;li&gt;Johnsen, G. (2013). The last refuge. New York: W. W. Norton &amp;amp; Company.&lt;/li&gt;
&lt;li&gt;Johnsen, G. (2007). Yemen accuses Iran of meddling in its internal affairs. Terrorism Focus, 4(2), 3-4.&lt;/li&gt;
&lt;li&gt;Katz, M. (2003). Breaking the Yemen-al Qaeda connection. Current History, 102(660), 40-43.&lt;/li&gt;
&lt;li&gt;Katzman, K. Congressional Research Service, Foreign Affairs, Defense, and Trade Division. (2005). Al qaeda: Profile and threat assessment (RL33038).&lt;/li&gt;
&lt;li&gt;Kilcullen, D. (2009). The accidental guerrilla. New York: Oxford University Press.&lt;/li&gt;
&lt;li&gt;Lacina, B. (2006). Explaining the severity of civil wars. Journal of Conflict Resolution, 50(2), 276–289.&lt;/li&gt;
&lt;li&gt;Mason, T. D. (2009). The evolution of theory on civil war and revolution. In M. Midlarsky (Ed.), Handbook of War Studies III: The Intrastate Dimension (p. 63–99). Ann Arbor, MI: University of Michigan Press.&lt;/li&gt;
&lt;li&gt;Mazzetti, M, and S Shane. &amp;ldquo;As New Drone Policy Is Weighed, Few Practical Effects Are Seen.&amp;rdquo; The New York Times 21 Mar. 2013: n. pag. Web.&lt;/li&gt;
&lt;li&gt;Meernik, J., &amp;amp; Brown, C. (2007). The short path and the long road: Explaining the duration of US military operations. Journal of Peace Research, 44(1), 65-80.&lt;/li&gt;
&lt;li&gt;Murray, R. (2013, June 7). Anger at us drone war continues in yemen. Al Jazeera. Retrieved from &lt;a href="http://www.aljazeera.com/indepth/features/2013/06/201365122319329623.html"&gt;http://www.aljazeera.com/indepth/features/2013/06/201365122319329623.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Phillips, S. (2011). Al-qaeda and the struggle for yemen. Survival: Global Politics and Strategy, 53(1), 95-120.&lt;/li&gt;
&lt;li&gt;Plaut, M. (2008, November 20). Yemen &amp;lsquo;faces crisis as oil ends&amp;rsquo;. BBC. Retrieved from &lt;a href="http://news.bbc.co.uk/2/hi/middle_east/7739402.stm"&gt;http://news.bbc.co.uk/2/hi/middle_east/7739402.stm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Redwan, M. (2009, Nov 19). Yemen&amp;rsquo;s war: Pity those caught in the middle. Economist, Retrieved from &lt;a href="http://www.economist.com/node/14920092?story_id=14920092"&gt;http://www.economist.com/node/14920092?story_id=14920092&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Rohde, D. (2012). The Obama doctrine. Foreign Policy, April, Retrieved from &lt;a href="http://www.foreignpolicy.com/articles/2012/02/27/the_obama_doctrine?page=full"&gt;http://www.foreignpolicy.com/articles/2012/02/27/the_obama_doctrine?page=full&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Rollins, J. (2011). Al Qaeda and affiliates: Historical perspective, global presence, and implications for U.S. policy (7-5700R41070). Congressional Research Service.&lt;/li&gt;
&lt;li&gt;Ross, M. L. (2005). Resources and rebellion in aceh, indonesia. In P. Collier &amp;amp; N. Sambinas (Eds.), Understanding Civil War: Volume 2 (pp. 35-58). Washington, DC: World Bank.&lt;/li&gt;
&lt;li&gt;Savage, C. (2013, April 23). Drone strikes turn allies into enemies, Yemeni says. New York Times. Retrieved from &lt;a href="http://www.nytimes.com/2013/04/24/world/middleeast/judiciary-panel-hears-testimony-on-use-of-drones.html?_r=0"&gt;http://www.nytimes.com/2013/04/24/world/middleeast/judiciary-panel-hears-testimony-on-use-of-drones.html?_r=0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Schneider, G., Banholzer, L., &amp;amp; Haer, R. (2011). Cain’s choice: Causes of one-sided violence against civilians. In J. T. Georg (Ed.), War: An Introduction to theories and Research on Collective Violence (p. 57–82). Hauppauge, NY: Nova Science Publishers.&lt;/li&gt;
&lt;li&gt;Sharp, J. Congressional Research Service, Middle Eastern Affairs. (2012). Yemen: Background and U.S. relations (7-5700 RL34170).&lt;/li&gt;
&lt;li&gt;Sharp, J. Congressional Research Service, Middle Eastern Affairs. (2014). Yemen: Background and U.S. relations (7-5700 RL34170).&lt;/li&gt;
&lt;li&gt;Sinjab, L. (2011, February 3). Yemen protests: 20,000 call for president saleh to go. BBC. Retrieved from &lt;a href="http://www.bbc.co.uk/news/world-middle-east-12353479"&gt;http://www.bbc.co.uk/news/world-middle-east-12353479&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Sohlman, E. (2012). Al Qaeda in Yemen pushed back, but terrorism threat remains strong. Journal of the National Committee on American Foreign Policy,34(5), 249-254.&lt;/li&gt;
&lt;li&gt;Stanton, K. (2005, January 5). Thwarted bomb attack points spotlight at yemen. PBS. Retrieved from &lt;a href="http://www.pbs.org/newshour/extra/features/world/jan-june10/yemen_01-05.html"&gt;http://www.pbs.org/newshour/extra/features/world/jan-june10/yemen_01-05.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Is south yemen preparing to declare independence? (2011, July 8). Time. Retrieved from &lt;a href="http://www.time.com/time/world/article/0,8599,2081756,00.html"&gt;http://www.time.com/time/world/article/0,8599,2081756,00.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;U.S. Department of State, Bureau of Near Eastern Affairs. (2013). U.S. relations with yemen. Retrieved from website: &lt;a href="http://www.state.gov/r/pa/ei/bgn/35836.htm"&gt;http://www.state.gov/r/pa/ei/bgn/35836.htm&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Winter, L. (2010). Fragile state: Yemen in conflict. Current History, 109(731), 395-400.&lt;/li&gt;
&lt;li&gt;Whitlock, C., &amp;amp; Tate, J. (2011, July 19). U.S. increases planned aid to yemen in fight against al-qaeda. Washington Post. Retrieved from &lt;a href="http://www.washingtonpost.com/world/national-security/us-increases-planned-aid-to-yemen-in-fight-against-al-qaeda/2012/07/19/gJQAj3HsvW_story.html"&gt;http://www.washingtonpost.com/world/national-security/us-increases-planned-aid-to-yemen-in-fight-against-al-qaeda/2012/07/19/gJQAj3HsvW_story.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&amp;ldquo;Yemen, Rep. Data.&amp;rdquo; . The World Bank. 2014. Web. 3 May 2014. &lt;a href="http://data.worldbank.org/country/yemen-republic#cp_fin"&gt;http://data.worldbank.org/country/yemen-republic#cp_fin&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Yemen&amp;rsquo;s Saleh agrees to transfer power. (2011, November 24). Al Jazeera. Retrieved from &lt;a href="http://www.aljazeera.com/news/middleeast/2011/11/2011112355040101606.html"&gt;http://www.aljazeera.com/news/middleeast/2011/11/2011112355040101606.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Yemen profile. (2012, September 12). BBC. Retrieved from &lt;a href="http://www.bbc.co.uk/news/world-middle-east-14704951"&gt;http://www.bbc.co.uk/news/world-middle-east-14704951&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Documenting the Davis County Tea Party</title><link>https://rb.ax/blog/documenting-the-davis-county-tea-party/</link><pubDate>Thu, 12 Aug 2010 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/documenting-the-davis-county-tea-party/</guid><description>&lt;p&gt;&lt;figure aria-label="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."&gt;
 &lt;img
 alt="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."
 title="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."
 width="1600"
 height="1202"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-17-featured_hu_f3ee12024e120dc1.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-17-featured_hu_1759904e45bd56e0.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-17-featured_hu_ca1804eac12026d7.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-17-featured_hu_a80226f6a1d831c9.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-17-featured_hu_d2be119352ff9fa6.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-17-featured_hu_72b7fe2c398c929d.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;All images were taken on a Mamiya 645 Pro with a 80mm f/2.8 lens. Film used was Kodak Portra 400 while outdoors and Portra 800 for indoors.&lt;/p&gt;
&lt;p&gt;I saw this guy wearing tea bags on his colonial era hat on the news one night. I knew about the Tea Party movement yet it was still funny to see the little bags swing around as he talked to the interviewer. I thought it would make a great portrait with all those dangling accessories. It was the late spring of 2010 and the country was still reeling from the Great Recession. I had a newly minted Political Science bachelors degree but it didn&amp;rsquo;t seem to help with any of the hundreds of jobs I had applied to.&lt;/p&gt;
&lt;p&gt;I was bored waiting for some sort of job to materialize from my endless applications. I decided to continue my hobby of political photography essays I had originally started in college. These essays involved a series of images that convey a visual message rather focused on a political theme. In many cases the visual cues can give better, or at least different, insight into a political topics. Often with a greater view of humanity from a normally abstract topic only represented in words. This hobby was a natural combination of my fascination with politics and my love for documentary photography.&lt;/p&gt;
&lt;h2 id="a-grassroots-movement"&gt;&lt;a href="#a-grassroots-movement"&gt;A &amp;lsquo;Grassroots&amp;rsquo; Movement&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The Tea Party movement manifested after the financial meltdown of 2008 as a reaction to high taxes, government bailouts for big corporations, and perceived fiscal irresponsibility.&lt;sup id="fnref:1"&gt;&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref"&gt;1&lt;/a&gt;&lt;/sup&gt; It was named after the historic Boston Tea Party and so the associated iconography of tea bags and colonial era clothing was the standards of members to show their political affiliation. As far as specific policy, the group advocated for reduced government spending, lower taxes, and a strict originalist interpretation of the U.S. Constitution. You could think of it as a more fiscally conservative oriented section of the Republican Party rather than social issue zealots.&lt;sup id="fnref:2"&gt;&lt;a href="#fn:2" class="footnote-ref" role="doc-noteref"&gt;2&lt;/a&gt;&lt;/sup&gt; As the movement gained momentum, it influenced the national political landscape, particularly steering the policy of the Republican Party,&lt;sup id="fnref:3"&gt;&lt;a href="#fn:3" class="footnote-ref" role="doc-noteref"&gt;3&lt;/a&gt;&lt;/sup&gt; pushing for a return to conservative principles and limited government.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Senator Orrin Hatch (R-UT) held a town hall meeting at Farmington City Hall. Much of the meeting was fielding comments and questions by local citizens. The line to speak at the microphone (camera right) stretched to the back of the crowd throughout most of the meeting."&gt;
 &lt;img
 alt="Senator Orrin Hatch (R-UT) held a town hall meeting at Farmington City Hall. Much of the meeting was fielding comments and questions by local citizens. The line to speak at the microphone (camera right) stretched to the back of the crowd throughout most of the meeting."
 title="Senator Orrin Hatch (R-UT) held a town hall meeting at Farmington City Hall. Much of the meeting was fielding comments and questions by local citizens. The line to speak at the microphone (camera right) stretched to the back of the crowd throughout most of the meeting."
 width="1600"
 height="1184"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-35_hu_4fa17b608c093ba2.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-35_hu_6290134ca61e8bef.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-35_hu_f13531e4c0f526b4.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-35_hu_86878ab23bde6ba.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-35_hu_1416fc8308b615be.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-35_hu_af3a3b3875127074.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Senator Orrin Hatch (R-UT) held a town hall meeting at Farmington City Hall. Much of the meeting was fielding comments and questions by local citizens. The line to speak at the microphone (camera right) stretched to the back of the crowd throughout most of the meeting.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Members of the David County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot&amp;rsquo;s campaign in 2010."&gt;
 &lt;img
 alt="Members of the David County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot’s campaign in 2010."
 title="Members of the David County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot&amp;rsquo;s campaign in 2010."
 width="1262"
 height="1600"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-23_hu_e2feb344b831bf48.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-23_hu_b67a04222b0c2e67.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-23_hu_a37b254b9b0186c3.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-23_hu_878b0c3433303f6a.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Members of the David County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot&amp;rsquo;s campaign in 2010.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Members of the David County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates."&gt;
 &lt;img
 alt="Members of the David County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates."
 title="Members of the David County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates."
 width="1600"
 height="1262"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-21_hu_168aeb0622ed8256.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-21_hu_b08544b5dfb79bd4.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-21_hu_35766b201ad04c79.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-21_hu_956ac0fa30013043.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-21_hu_3b519ea15928f909.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-21_hu_b987ca918d6481a4.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Members of the David County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;The Tea Party movement was national in scope but prided itself in being grassroots derived. This claim is dubious yet it helped me locate a local chapter where I didn&amp;rsquo;t have to travel very far to attend events and gatherings. I won&amp;rsquo;t deny the simple fact that the Tea Party was active locally. This whole photography essay is based on individuals being active in my local community. My disagreement comes from funding, which was sourced primarily from the Koch brothers&lt;sup id="fnref:4"&gt;&lt;a href="#fn:4" class="footnote-ref" role="doc-noteref"&gt;4&lt;/a&gt;&lt;/sup&gt; at a national level through the group Americans for Prosperity.&lt;sup id="fnref:5"&gt;&lt;a href="#fn:5" class="footnote-ref" role="doc-noteref"&gt;5&lt;/a&gt;&lt;/sup&gt; I would, however, give weight to the statement that it was a grassroots movement within the fact that individuals were active in their respective geographic areas.&lt;/p&gt;
&lt;p&gt;I found the Davis County Tea Party chapter after a quick search on Facebook. In a message to the group administrator I explained my background, goals, and interest in documenting their gatherings if they would have me. They were more than happy to have me attend their meetings. I could only imagine the strong fervor they were operating in. In the late summer of 2010 the Tea Party movement was especially potent and lively. They would later sweep the primaries with victories that rocked the Republican Party.&lt;sup id="fnref:6"&gt;&lt;a href="#fn:6" class="footnote-ref" role="doc-noteref"&gt;6&lt;/a&gt;&lt;/sup&gt; Not only did this usurp traditional Republican members, it in fact helped maintain and lengthen the majority the conservativie bloc held in the House of Representatives.&lt;sup id="fnref:7"&gt;&lt;a href="#fn:7" class="footnote-ref" role="doc-noteref"&gt;7&lt;/a&gt;&lt;/sup&gt; They could only become a stronger and more validated movement by inviting a young student photographer to their meetings.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."&gt;
 &lt;img
 alt="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."
 title="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."
 width="1600"
 height="1184"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-3_hu_1a3b78a24cc389a2.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-3_hu_32ef9d028f1a021f.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-3_hu_82edab2b563479b.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-3_hu_7b6102530561cef6.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-3_hu_402577cfb5e8ed47.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-3_hu_a7200708c6f9489c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine."&gt;
 &lt;img
 alt="The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine."
 title="The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine."
 width="1600"
 height="1341"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-4_hu_a33341309d816339.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-4_hu_30da99d9f842b65f.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-4_hu_4234d3ba9af75607.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-4_hu_7483cb85f539d74e.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-4_hu_228429b4536afc67.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-4_hu_5b2c2b67d4abbf9a.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A central tenant of Tea Party doctrine is the opposition of federal power. In the Take Back Utah rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land."&gt;
 &lt;img
 alt="A central tenant of Tea Party doctrine is the opposition of federal power. In the Take Back Utah rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land."
 title="A central tenant of Tea Party doctrine is the opposition of federal power. In the Take Back Utah rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land."
 width="1600"
 height="1186"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-5_hu_ced3a2f933bd7ec8.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-5_hu_2718f5a3ba1e17bf.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-5_hu_83762722d76521d6.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-5_hu_379d3c981726a7ca.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-5_hu_d523371eec64c157.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-5_hu_379831910ee95759.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A central tenant of Tea Party doctrine is the opposition of federal power. In the &lt;em&gt;Take Back Utah&lt;/em&gt; rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A citizen of Davis County votes in late 2010."&gt;
 &lt;img
 alt="A citizen of Davis County votes in late 2010."
 title="A citizen of Davis County votes in late 2010."
 width="1600"
 height="1262"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-6_hu_858c49f8244993fc.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-6_hu_b2c8d14bb5543e0e.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-6_hu_4e18fbdc022f882b.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-6_hu_de46f619ce5d29fe.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-6_hu_5f905d4cdf93c181.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-6_hu_50c9b7f387165e5c.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A citizen of Davis County votes in late 2010.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;My introduction to the Davis County Tea Party was at the Mountain Road Evangelical Presbyterian Church. They got together on a semi regular basis in a group of 20 to 50 people. Each meeting had a central topic covered by a group member or an invited guest speaker. Another large portion of time spent was going over local candidates running for office and if their platform meshed with Tea Party ideals. After a litmus test of sorts they would invite members to participate in that candidates campaign through a variety of methods. In most cases that was canvassing neighborhoods, puttinig up signs, or canvassing over the phone. Additional group events were listed at the end of each meeting and were important for knowing when Tea Party oriented groups were orchestrating political rallies or other events nearby. For instance, when the National Doctors Tea Party group made a stop in Salt Lake City, the Davis County Tea Party group was vocal about getting times and date information distributed through their group.&lt;/p&gt;
&lt;p&gt;After my first meeting I was graciously invited to many of these extracurricular events and gatherings. The first event only a week later was attending the National Doctors Tea Party held political rally at the Utah State Capitol. The group was on a country wide road trip to garner support in opposition to Obamacare. While I had hoped for dangling tea bags from colonial hats I instead got white lab coats.&lt;/p&gt;
&lt;p&gt;A second summer gathering at the Utah State Capitol was the &lt;em&gt;Take Back Utah&lt;/em&gt; rally, which argued against the vast amount of federally owned land in Utah. The central tenant of the argument was along Tea Party doctrine but attracted a wide variety of other political groups, some of which were outside the Overton window.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Senator Orrin Hatch (R-UT) talking with members of Davis County Tea Party after a town hall meeting at Farmington City Hall. During the meeting he said he was glad people were &amp;lsquo;mad as hell&amp;rsquo; about the state of federal politics."&gt;
 &lt;img
 alt="Senator Orrin Hatch (R-UT) talking with members of Davis County Tea Party after a town hall meeting at Farmington City Hall. During the meeting he said he was glad people were ‘mad as hell’ about the state of federal politics."
 title="Senator Orrin Hatch (R-UT) talking with members of Davis County Tea Party after a town hall meeting at Farmington City Hall. During the meeting he said he was glad people were &amp;lsquo;mad as hell&amp;rsquo; about the state of federal politics."
 width="1186"
 height="1600"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-26_hu_6564b3ee892412c3.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-26_hu_baf3b32afab4b85b.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-26_hu_609d874e07953657.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-26_hu_f52d27e516d56bd0.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Senator Orrin Hatch (R-UT) talking with members of Davis County Tea Party after a town hall meeting at Farmington City Hall. During the meeting he said he was glad people were &amp;lsquo;mad as hell&amp;rsquo; about the state of federal politics.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Kirk Pearson poses for a photograph outside the Mountain Road Evangelical Presbyterian Church."&gt;
 &lt;img
 alt="Kirk Pearson poses for a photograph outside the Mountain Road Evangelical Presbyterian Church."
 title="Kirk Pearson poses for a photograph outside the Mountain Road Evangelical Presbyterian Church."
 width="1600"
 height="1184"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-27_hu_b18f6a52508d300a.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-27_hu_1efa90cb6337faee.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-27_hu_1af4547a7f4a2031.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-27_hu_6298cb5e2900b93c.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-27_hu_a2e1a96914eb4fe9.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-27_hu_3f9d78a042b4c4d3.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Kirk Pearson poses for a photograph outside the Mountain Road Evangelical Presbyterian Church.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot&amp;rsquo;s campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of the overall supplies. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households."&gt;
 &lt;img
 alt="Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot’s campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of the overall supplies. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households."
 title="Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot&amp;rsquo;s campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of the overall supplies. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households."
 width="1600"
 height="1260"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-31_hu_43eced482d6e302e.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-31_hu_52547bf4d9644c0a.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-31_hu_417e33b85de8b4af.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-31_hu_edc3af8ae3975cd3.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-31_hu_b1c698e34310589f.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-31_hu_b07b36afc9d62dca.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for Morgan Philpot&amp;rsquo;s campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of the overall supplies. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."&gt;
 &lt;img
 alt="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."
 title="The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul."
 width="1600"
 height="1169"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-33_hu_f2db5d763eeb33de.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-33_hu_a6747e102899eb26.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-33_hu_dcd88c176d600040.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-33_hu_9ae31e3f917793a4.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-33_hu_8df36b3e080e089a.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-33_hu_65977beb520a319d.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The National Doctors Tea Party made a stop at the Utah State Capital in the summer of 2010 to hold a rally in opposition of President Barack Obama’s proposed health care overhaul.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Most of the shadowing I did with this group was the politically mundane activities of theory reinforcement. There is only so many times you can hear the same political ideology at each meeting or rally being argued that you begin to tune it out. I say this with the utmost respect and as a holder of bachelor&amp;rsquo;s degree in political science. However, there was one specific instance of tense energy.&lt;/p&gt;
&lt;p&gt;Towards the end of summer, when the primaries were beginning to materialize, Senator Orrin Hatch started scheduling these town hall meetings in each of the counties. Even though Senator Hatch wasn&amp;rsquo;t up for re-election until 2012 he saw the writing on the wall of this exponentially growing political movement. And he was certainly a member of the Republican establishment that was getting &lt;em&gt;rocked&lt;/em&gt;. Getting in front of this energy would be crucial to him if he wanted any chance in 2012. The materialized energy in that town hall was everything I had heard about the Tea Party movement. Anger at the spending the federal government was doing, righteous indignation about big banks being bailed out when normal people had lost their homes, and the perceived socialization of the federal government through Obamacare.&lt;/p&gt;
&lt;p&gt;Question after question was posed to Senator Hatch from the seemingly endless line of people that stretched the length of the hall and started wrapping around the back. There was always an empty political platitude from each of the questions from the public, meant to draw a round of cheering support as they stepped away from the microphone. Some of the questions were directed at Senator Hatch for being a problem as part of the Republican establishment that had failed them. Some were just a venting from the public. Towards the end of the meeting Senator Hatch proclaimed he was happy people were &amp;ldquo;mad as hell&amp;rdquo; about the current political state.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for the Morgan Philpot campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of signs and leaflets. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households."&gt;
 &lt;img
 alt="Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for the Morgan Philpot campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of signs and leaflets. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households."
 title="Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for the Morgan Philpot campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of signs and leaflets. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households."
 width="1600"
 height="1262"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-1_hu_3e7e273ccd43b593.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-1_hu_35aecaad102d1f9.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-1_hu_6964f818dcda6d9b.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-1_hu_31fd065f6cfd19ba.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-1_hu_be1529f8bc90af47.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-1_hu_ed752a33f108c9ab.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Members of the Davis County Tea Party canvasing the surrounding suburbs and installing signs for the Morgan Philpot campaign in 2010. Segments of the neighborhood were assigned to teams, which were given a share of signs and leaflets. One of the provided materials was a map of household political affiliation. Much of this information is public record and allowed for these teams to skip certain politically affiliated homes and concentrate on unaffiliated households.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Members of the Davis County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates."&gt;
 &lt;img
 alt="Members of the Davis County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates."
 title="Members of the Davis County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates."
 width="1600"
 height="1262"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-15_hu_aea49fa4c0064b93.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-15_hu_86f619115020844.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-15_hu_1546b5d2647b226a.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-15_hu_76a5b8311da1436c.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-15_hu_93d0e93e5c5fa2aa.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-15_hu_95173f0c4f72d468.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Members of the Davis County Tea Party pooled funds together to rent a call center after normal business hours. A rough script was used to call voters within the district in order to spread education about Tea Party supported candidates.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine."&gt;
 &lt;img
 alt="The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine."
 title="The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine."
 width="1600"
 height="1341"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-20_hu_1d72423acbcd98b0.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-20_hu_c59383300fc7c96b.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-20_hu_28d9f0dd2774961a.webp 1024w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-20_hu_4824f95d74e31979.webp 1366w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-20_hu_fdea91cff3864f34.webp 1600w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-20_hu_40ddd8ea92a077d0.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;The Davis County Tea Party group held regularly meetings at local civic or religious buildings. Members here are pictured at their semi-regular location at the Mountain Road Evangelical Presbyterian Church. Each meeting was started with a prayer and was followed by the pledge of allegiance. The focus of meetings were varied but would usually include a review of a topic central to Tea Party doctrine.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A central tenant of Tea Party doctrine is the opposition of federal power. In the Take Back Utah rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land."&gt;
 &lt;img
 alt="A central tenant of Tea Party doctrine is the opposition of federal power. In the Take Back Utah rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land."
 title="A central tenant of Tea Party doctrine is the opposition of federal power. In the Take Back Utah rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land."
 width="1186"
 height="1600"srcset="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-24_hu_19973caadc22f074.webp 480w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-24_hu_1348e944659b463.webp 768w, https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-24_hu_9415eb25e2b8936a.webp 1024w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/documenting-the-davis-county-tea-party/Tea-Party-24_hu_f1544f52b353cf83.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A central tenant of Tea Party doctrine is the opposition of federal power. In the &lt;em&gt;Take Back Utah&lt;/em&gt; rally, many members of the Tea Party found support with other local groups in decrying the majority of Utah State lands being federally held. In the American West, this is especially relevant considering that Utah is 66.5% federal land.&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;‌
‌
‌&lt;/p&gt;
&lt;div class="footnotes" role="doc-endnotes"&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id="fn:1"&gt;
&lt;p&gt;Katie Connolly, “What Exactly Is the Tea Party?” &lt;em&gt;BBC News&lt;/em&gt;, September 16, 2010, &lt;a href="https://www.bbc.com/news/world-us-canada-11317202"&gt;https://www.bbc.com/news/world-us-canada-11317202&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:1" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:2"&gt;
&lt;p&gt;Andrew Neil. “The Tea Party: On the Road with America’s Right-Wing Radicals,” &lt;em&gt;The Guardian&lt;/em&gt;, October 30, 2010, &lt;a href="https://www.theguardian.com/world/2010/oct/31/tea-party-sarah-palin-andrew-neil"&gt;https://www.theguardian.com/world/2010/oct/31/tea-party-sarah-palin-andrew-neil&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:2" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:3"&gt;
&lt;p&gt;David Barstow, “Tea Party Lights Fuse for Rebellion on Right,” &lt;em&gt;The New York Times&lt;/em&gt;, February 15, 2010, &lt;a href="https://www.nytimes.com/2010/02/16/us/politics/16teaparty.html"&gt;https://www.nytimes.com/2010/02/16/us/politics/16teaparty.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:3" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:4"&gt;
&lt;p&gt;Suzanne Goldenberg, “Tea Party Movement: Billionaire Koch Brothers Who Helped It Grow,” &lt;em&gt;The Guardian&lt;/em&gt;, October 13, 2010, &lt;a href="https://www.theguardian.com/world/2010/oct/13/tea-party-billionaire-koch-brothers"&gt;https://www.theguardian.com/world/2010/oct/13/tea-party-billionaire-koch-brothers&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:4" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:5"&gt;
&lt;p&gt;Frank Rich, “The Billionaires Bankrolling the Tea Party,” &lt;em&gt;The New York Times&lt;/em&gt;, August 28, 2010, &lt;a href="https://www.nytimes.com/2010/08/29/opinion/29rich.html"&gt;https://www.nytimes.com/2010/08/29/opinion/29rich.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:5" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:6"&gt;
&lt;p&gt;Ewen MacAskill, “Tea Party Rocks Republicans with Sweeping Primary Victories,” &lt;em&gt;The Guardian&lt;/em&gt;, September 15, 2010, &lt;a href="https://www.theguardian.com/world/2010/sep/15/tea-party-republican-primary-victories"&gt;https://www.theguardian.com/world/2010/sep/15/tea-party-republican-primary-victories&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:6" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id="fn:7"&gt;
&lt;p&gt;Catherine E. Shoichet and Shannon Travis. “Election Projections Fuel Tea Party Fervor.” &lt;em&gt;CNN&lt;/em&gt;, November 3, 2010, &lt;a href="https://www.cnn.com/2010/POLITICS/11/03/tea.party/index.html"&gt;https://www.cnn.com/2010/POLITICS/11/03/tea.party/index.html&lt;/a&gt;.&amp;#160;&lt;a href="#fnref:7" class="footnote-backref" role="doc-backlink"&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;</description></item><item><title>China's Informal Democracy</title><link>https://rb.ax/blog/chinas-informal-democracy/</link><pubDate>Fri, 09 Apr 2010 10:30:00 -0600</pubDate><guid>https://rb.ax/blog/chinas-informal-democracy/</guid><description>&lt;p&gt;&lt;figure aria-label="Thousands of students from local colleges and universities march to Tiananmen Square, Beijing, on May 4, 1989, to demonstrate for government reform. AP Photo/Mikami"&gt;
 &lt;img
 alt="Thousands of students from local colleges and universities march to Tiananmen Square, Beijing, on May 4, 1989, to demonstrate for government reform. AP Photo/Mikami"
 title="Thousands of students from local colleges and universities march to Tiananmen Square, Beijing, on May 4, 1989, to demonstrate for government reform. AP Photo/Mikami"
 width="1440"
 height="1008"srcset="https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989-featured_hu_6a5cdddfb8bca839.webp 480w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989-featured_hu_b3cb53e9e502adf7.webp 768w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989-featured_hu_4b03fae425d610e6.webp 1024w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989-featured_hu_9b43227fb0824df8.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989-featured_hu_7c06e61076401809.jpg"loading="eager"
 decoding="sync"/&gt;&lt;figcaption&gt;Thousands of students from local colleges and universities march to Tiananmen Square, Beijing, on May 4, 1989, to demonstrate for government reform. AP Photo/Mikami&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;This paper was written as part of my Political Science bachelor’s thesis while attending Brigham Young University-Hawaiʻi. My advisor was Dr. Michael Murdock.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id="introduction"&gt;&lt;a href="#introduction"&gt;Introduction&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Over the past decade, the People’s Republic of China has experienced an exponential growth in the frequency and size of what China’s Public Security Ministry calls “mass incidents,” or commonly known as protests. According to the Security Ministry, over 87,000 mass incidents were reported in 2005 (Quek 2009). The amount reported in 2003 was fifty percent less (Quek 2009). Such astonishing numbers show an undeniable evolution in Chinese politics. On an ever-growing scale, it appears that Chinese citizens are turning to the political medium of protests to have their voices heard.&lt;/p&gt;
&lt;p&gt;The substantial growth in the amount of protests highlights two evolving characteristics of Chinese political participation. The first is that protests must be seen as the most viable way to politically participate because there are no other effective mediums. In a nation where there are only local elections and citizens have no real weight on the national scene it can cause problems. Large-scale protests are substantial methods in getting the attention of officials where letters and petitions would not. The second characteristic of changing Chinese political participation is the proliferation of this trend. The simple fact is that these growing rates of protests are affecting all of China and do not specifically target one region. Protests might occur more often in certain areas of China but in general vary across economic, geographic, and ethnic boundaries. In all of my research, there were no single, unyielding overall trends.&lt;/p&gt;
&lt;p&gt;Breaking from the historical stereotype of being a repressive government, bent on squashing any dissenting protests, the People’s Republic of China has entered a new era of cooperation and flexibility. Where the government would normally clamp down with violence, officials are listening and attempting to fulfill protestor’s requests. In some instances after protests had successfully swayed the government to act in their favor, official agents promised in the future to consult the public by going door to door (Jianmin, Pan 2009). Other cases included millions of dollars of planned projects being moved, put on hold, or heavily modified as a direct result of widespread popular protesting. Another case involved an entire industrial park of a city being closed wholly because of civilian protests (Cody 2005). To the cynical eye, such cases appear as exceptions to the normal outpouring of repressive measures used by Chinese military and police that are frequently published in the international media. Over the years, the average media reader has been put under a barrage of stories describing the horrific actions taken against protesters in China. This is due to the Western media’s focus on sensational and confrontational stories that sell. Despite this, the fact that these cooperative cases even exist is evidence to the evolving nature of the political process throughout the nation of China. The concessions protests are obtaining from the government every few weeks would be completely unheard only a few years ago.&lt;/p&gt;
&lt;p&gt;Again, drawing upon the cynical eye, it might appear that the rapidly growing amount of protests within the nation of China signals a broader trend of social instability. This might even go as far to triggering a loss of the government’s power and control over the nation. Rather than fortifying this perspective, the range of cases researched show the opposite. In every case except one, the reasons for protesting consisted of no anti-government sentiment aimed at any sort of revolution. Even with corruption cases, officials accused by protestors were not identified with the government, which strives to maintain party integrity. The most common reasons for protests were domestic and one-issue problems. These problems never really put the protesters in direct confrontation to the government in a manner where the citizens wanted to overthrow the regime. As we will see later, Chinese citizens desire stable and conservative living.&lt;/p&gt;
&lt;p&gt;Even with a growing trend of government cooperation, officials and police still strive to maintain public order. Protestors that do handle themselves in violent ways are accordingly arrested to keep the public safe and to stop damages (Eckholm 2002). This is a far departure from the precedent in China where simply presenting a dissenting opinion warranted an arrest or internment at a re-education camp. When Chinese citizens can present their demands to the public by protesting, even though it might contrast the government’s goals, they are in essence as politically evolved as any other Western nation.&lt;/p&gt;
&lt;p&gt;The status China is reaching is completely democratic but not in the traditional, Western definition. Through protests, the nation of China has reached a point where popular movements matter. Officials have started to recognize the importance of maintaining political stability and so are making concessions to achieve that end. Although they are non representative and informal, the growing number of protests embodies the method in which citizens can essentially vote. Protests that are successful have made China an informal democracy wherein the people can enact popular change.&lt;/p&gt;
&lt;h2 id="petitions-and-protests-within-china-imperial-and-republic"&gt;&lt;a href="#petitions-and-protests-within-china-imperial-and-republic"&gt;Petitions and Protests Within China: Imperial and Republic&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;As one of the most advanced ancient civilizations in the world, some of the imperial dynasties of China had a simple method of governmental petitioning. More or less a formal letter, xinfang and shangfang, or “Letters and Visits” was a form of extrajudicial action according to Elizabeth Lynch (2010). If a citizen experienced any sort of problem not solvable by a lower ranking official, they would write these requests to higher officials with more authority to decide on the case (Lynch 2010). The concept is that citizens whom have experienced corruption or negligence on the local level still maintain belief that a national, or federal official would be better. This would ensure a regime to last for a significantly longer amount of time. Modern democracies have adopted this ideology when citizens send letters to congressional representatives and other officials. Petitions are not as new as Western democracy but have existed for thousands of years throughout many Chinese dynasties.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Beijing&amp;rsquo;s new Letters &amp;amp; Visits Office - near the South 4th Ring Road. Source: Elizabeth M. Lynch"&gt;
 &lt;img
 alt="Beijing’s new Letters &amp;amp; Visits Office - near the South 4th Ring Road. Source: Elizabeth M. Lynch"
 title="Beijing&amp;rsquo;s new Letters &amp;amp; Visits Office - near the South 4th Ring Road. Source: Elizabeth M. Lynch"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/chinas-informal-democracy/petition-building_hu_2886954c551529e5.webp 480w, https://rb.ax/blog/chinas-informal-democracy/petition-building_hu_ad140878dd8454a7.webp 768w, https://rb.ax/blog/chinas-informal-democracy/petition-building_hu_f075c8800f3d4063.webp 1024w, https://rb.ax/blog/chinas-informal-democracy/petition-building_hu_2204d438f3e49a10.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chinas-informal-democracy/petition-building_hu_7ca309a72171d617.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Beijing&amp;rsquo;s new Letters &amp;amp; Visits Office - near the South 4th Ring Road. Source: &lt;a href="https://chinalawandpolicy.com/tag/qing-dynasty/"&gt;Elizabeth M. Lynch&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt;Following the last imperial government, the Qing dynasty, the system of petition was largely not used because of the tumultuous nature of power in the Chinese region. From 1911 to the establishment of the People’s Republic of China in 1949, residents within China had no singular government to petition. With the formation of the PRC the petition system was reincorporated but was undoubtedly highly regulated as the Chinese Communist Party sought to solidify opinion. Over the next sixty years the institution of petitioning continued but also grew into the modern problem it is today.&lt;/p&gt;
&lt;p&gt;Even though petitions have been useful for such a great length of time, the contemporary backlog of “Letters and Visits” has choked any chance of resolution for petitioners. According to Chinese statistics, as related by Elizabeth Lynch, the petitioning system in China receives roughly “five million petitions each year…many outside China consider it more around ten million…[and] is largely a failure” (2010). With the inundation of petitions, many citizens never resolve their claim and “are there for years” (Lynch 2010). Given a system so overwhelmed and unresponsive, the best way people have discovered to be heard is to create a protest that attracts the public’s attention. This is normally the last method since it is the most confrontational and dangerous but in some cases is easily progressed due to the bureaucratic tie-ups of petitioning. In the city of Huaxi, which will be discussed later, protestors attempted to use all other forms before using protests (Cody 2005). In a sense, Chinese citizens have reinvested their political communication by using protests when petitions are problematic. Chinese culture in itself might demand some sort of outlet for demands on authority and with one method exhausted they have utilizing another.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A &amp;rsquo;lawyer&amp;rsquo; of sorts to help others with the petitioning process - Beijing, China. Source: Elizabeth M. Lynch"&gt;
 &lt;img
 alt="A ’lawyer’ of sorts to help others with the petitioning process - Beijing, China. Source: Elizabeth M. Lynch"
 title="A &amp;rsquo;lawyer&amp;rsquo; of sorts to help others with the petitioning process - Beijing, China. Source: Elizabeth M. Lynch"
 width="1440"
 height="1080"srcset="https://rb.ax/blog/chinas-informal-democracy/petition-sorting_hu_1f5e90000dacb768.webp 480w, https://rb.ax/blog/chinas-informal-democracy/petition-sorting_hu_8822f0ff52798831.webp 768w, https://rb.ax/blog/chinas-informal-democracy/petition-sorting_hu_5b8c13c2cabafbe1.webp 1024w, https://rb.ax/blog/chinas-informal-democracy/petition-sorting_hu_99228802910b49ef.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chinas-informal-democracy/petition-sorting_hu_34d8c36151470455.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A &amp;rsquo;lawyer&amp;rsquo; of sorts to help others with the petitioning process - Beijing, China. Source: &lt;a href="https://chinalawandpolicy.com/tag/qing-dynasty/"&gt;Elizabeth M. Lynch&lt;/a&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h2 id="state-of-the-new-political-medium"&gt;&lt;a href="#state-of-the-new-political-medium"&gt;State of the New Political Medium&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The method of protesting in China has changed entirely from decades earlier. Not only is there a significant growth in the occurrence of protests but the tactics used on both sides are becoming extremely sophisticated. According to Murray Tanner, the amount of protests reported from 1993 to 1999 grew 268% (2004). In no year did the growth of protests fall below nine percent and even spiked to 25 and 67 percent in 1997 and 1998, respectively (Tanner 2004). A few years later between 2003 and 2005 the amount of protests increased another fifty percent in a matter of only two years (Quek 2009). Such inordinate growth signals that something is indeed occurring within the political system of China that cannot be easily reversed. No nation experiences such altering statistics without some sort of significant change in the political relationship between citizens and government. This could also, more specifically, be the unwritten expectations each party has for the other.&lt;/p&gt;
&lt;p&gt;The total unchecked growth in modern protests China is experiencing could be a result of many reasons. As mentioned before, the largely useless system of petitions has turned citizens to another way in communicating their grievances to the government. Another reason could be based on the idea of the “snowball” effect. When only one protests succeeds in achieving its aim, others look to their example as hope that their own goals can be reached through government concession. Once another protest succeeds the cycle continues, especially on a regional level such as with protests in the Taishi, where protests spread to other nearby villages (Cody 2005). An additional reason lies in the technologically advancing state of China. With the plethora of civil projects such as the Three Gorges dam and the nation wide high-speed bullet train project, the displacement of citizens is unavoidable. Compare this to periods of time decades ago when such large projects were unheard of. The final reason might be that the levels of dissatisfaction and corruption have risen in China during recent years. This reason also plays into using protests as an alternative source for communication but more specifically shows the fundamental problem of the current system. Dissatisfaction would explain the rise in protests because citizens are not normally in contact with core government functionaries. So they must turn to other means to achieve satisfaction. Despite the rising amount of protests there have also been changes in the way Chinese people and police approach protests.&lt;/p&gt;
&lt;h2 id="police-attitude-foundational-tremors"&gt;&lt;a href="#police-attitude-foundational-tremors"&gt;Police Attitude: Foundational Tremors&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Police have begun to treat protests differently over the past few years with their own specific aims at maintaining social stability. According to Murray Tanner, in an unusually transparent way, police are acknowledging cases of protest where before their existence was simply denied (2004). Also, in an effort to target the cause of protests, police come into contact with citizens before demonstrations are held. In any of China’s major cities these tactics include “employee buy-offs, repression, and divide and conquer tactics that any historian of Carnegie, Pinkerton and the early U.S. labor movement would instantly recognize” (Tanner 2004). This is a brilliant tactic utilized by the police of China. By targeting individuals, police separate the broad popular movement into manageable sections. Handling these small sections is much easier than facing the full popular movement that might consist of upwards to sixty thousand angry protestors. Without the mass crowds of fellow supporters, many individuals would crack under police pressure during a violent three on one engagement. Even with these questionable tactics, police also realize the situation the nation is in.&lt;/p&gt;
&lt;p&gt;Chinese police know that violence is not the solution to ending protests and the use of these tactics, such as combating anti-government demonstrations, are no longer justified. Police are “conceding that protest [are] widespread and [they] enjoy growing popular sympathy” according to Murray Tanner (2004). Furthermore they are “scrambling to learn new anti protest techniques aimed at containing and defusing, rather than brutally squelching, demonstrations” (Tanner 2004). Specifically from the change in popular opinion, the police of China have altered their actions accordingly. It is unsure whether the source of this change originated in the previously mentioned popular sympathy or official government instructions that could have in turn been influenced by popular sympathy. Undoubtedly it was a combination of all the above but looking at anything popular that influenced the entire system means something reached its mark. Besides the use of less violence, police and officials are increasingly aware that most protests are not aimed against the government. Modern Chinese police “increasingly admit that most demonstrators are motivated by legitimate grievances against rapacious managers and corrupt local officials, and are not just pawns of anti Communist conspirators (Tanner 2004). This is a significant impact on perspective for the police where in the era of Tiananmen Square, some protestors were seen as the enemy to the state. Now that police and government officials realize these citizens have credible grievances not aimed at revolution, it would be much easier for them to help them or step aside if directly confronted. It would also make it much harder for police to use violent repressive tactics on a group with a cause they would champion themselves if caught in the situation. This change in the definition and perception of protests has changed the whole way in which the government deals with them. Although violent cases still occur, such as the one in Taishi in late 2005, they are certainly on the decline compared to previous decades. What matters most is that the relationship between police and protestors has changed dramatically, which would allow for new, unprecedented outcomes.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="A truck is almost buried in people as it makes its way through the crowd of thousands gathered in Tiananmen Square in a pro-democracy rally, on May 17, 1989. AP Photo/Sadayuki Mikami"&gt;
 &lt;img
 alt="A truck is almost buried in people as it makes its way through the crowd of thousands gathered in Tiananmen Square in a pro-democracy rally, on May 17, 1989. AP Photo/Sadayuki Mikami"
 title="A truck is almost buried in people as it makes its way through the crowd of thousands gathered in Tiananmen Square in a pro-democracy rally, on May 17, 1989. AP Photo/Sadayuki Mikami"
 width="1440"
 height="933"srcset="https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--6_hu_90fcc0ebf4bb09b2.webp 480w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--6_hu_67f0879610612d58.webp 768w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--6_hu_443a326e1c0f4921.webp 1024w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--6_hu_55b7fd597d366548.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--6_hu_b6900c6790891c30.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;A truck is almost buried in people as it makes its way through the crowd of thousands gathered in Tiananmen Square in a pro-democracy rally, on May 17, 1989. AP Photo/Sadayuki Mikami&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h2 id="protestors"&gt;&lt;a href="#protestors"&gt;Protestors&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;As the police have evolved to deal with protests, so have citizens in becoming effective at protesting. Protestors have abandoned their tactics of “deliberately small-scale, self-contained [methods] they adopted in the 1990s to avoid repression” (Tanner 2004) and are expanding in the opposite way. In a growing trend, protests no longer fear the wide sweeping arm of the government because the government no longer acts that way. The consequences and punishments must have lessened or been less frequently utilized for something such as this to happen. Also, the government fears social instability. Going opposite of the 1990s, “protests are expanding in average size, becoming more organized and confrontational, and increasingly link demonstrators from several workplaces or neighborhoods” (Tanner 2004). It is astonishing to read such a change in the social scene in a matter of only a decade or two. Protestors are going against everything that made them survive a few years ago in what seemingly is now the successful method. This type of boisterous behavior further reveals not only the change in Chinese citizens but also their perception of the government and what they expect from it.&lt;/p&gt;
&lt;p&gt;Being able to organize large movements that are confrontational without being swiftly repressed by police speaks volumes about the recent transformation of the government. Without the government of two decades ago, Chinese protests are becoming more confident and expectant of their ability to demonstrate. A popular saying in China says, as related by Murray Tanner, “Causing a big ruckus wins you a big solution; a small ruckus wins a small solution; and without a ruckus, you get no solution” (2004). This has never been truer for Chinese citizens wishing to have their voices heard. Passing up methods such as the messy State Bureau of Letters and Calls that can last years (Lynch 2010), citizens turn to a medium that has been increasingly successful. There are really no other ways for citizens to grab the attention of senior officials. Protests are then probably the most significant modern method of viable political participation for Chinese citizens on matters above the local level or in the case of local corruption, the only method.&lt;/p&gt;
&lt;h2 id="weighty-political-medium"&gt;&lt;a href="#weighty-political-medium"&gt;Weighty Political Medium&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Today in China, protests are a significant medium in which citizens can be heard. Not only are protests “heard” by local officials, but also are often the tools used to reach a national audience. In addition to a national audience, protests are more able to reach the international theater with improvements in technology. Analysts and undergraduate researchers like myself look to protests in China as representations of trends and political transformations. It is certainly easier to look at exponentially growing trends of social demonstrations than the closed doors of the Chinese Communist Party. In the words of Wu Xian following a protest in Xiamen that moved a 1.4 billion dollar chemical facility, “The protest increased people’s awareness about democracy. People now know they can express their opinions and be heard” (Bristow 2008). Although this statement is probably unique to the situation in Xiamen, which will be discussed later, the mentality of that existing in China is surreal. The term surreal perfectly describes someone’s reaction to such a statement after studying the politics of China only fifteen years ago. With protestors’ modern successes there do exist specific parameters that add effectiveness to demonstrations.&lt;/p&gt;
&lt;p&gt;In probably the most obvious characteristic of effective protests, having a large attendance is absolutely necessary. With no protestors there is no protest. The more individuals that are part of the protest the more important it seems to local, national, and international viewers. This comes from basic democratic theory wherein the more people who support an idea the more “fit” it seems. If ten people in a city wanted a cleaner public transportation system and demonstrated, it would hardly matter to the government or media. Instead, if close to a thousand or even ten thousand demonstrated, the amount of attention and weight behind the protest increases dramatically over the previous example. This proves to be the result in nearly all the successful protests that obtained government concessions.&lt;/p&gt;
&lt;h2 id="outnumbered-in-huaxi"&gt;&lt;a href="#outnumbered-in-huaxi"&gt;Outnumbered in Huaxi&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;In the city of Huaxi, China, a protest erupted in the middle of 2005 following the chronic pollution from a nearby industrial park of mostly chemical plants that produced plastics. Following two weeks of a sort of camp sit-in, where elderly protestors occupied an industrial park with tents (Cody 2005), a crackdown of 3,000 police occurred. The elderly protestors had pitched tents in an effort to stop the pollution of the 82.3-acre park that the city had opposed from the beginning but had been forced in by municipal authorities (Cody 2005). In response to the crackdown, 20,000 peasants from the immediate region descended on the industrial park where police were tearing down tents and dispersing the elderly demonstrators. A battle ensued once the two groups made contact and the protestors “were in no mood to bow to authority” following four years of claims that the park had been causing significant environmental damage (Cody 2005). Since the protestors outnumbered the police significantly, the battle was won in the demonstrators favor and the industrial park was once again occupied. After police fled, protestors wrecked and flipped over cars. Comically, when migrant workers snuck into the courtyard later that day to scavenge for parts among destroyed vehicles, villagers called the police but they refused to respond (Cody 2005). With the industrial park once again under the control of the protestors, demonstrations continued until headway was made into closing the park.
Six of the thirteen factories were ordered to move out of Huaxi for good and officials organized groups that went around to peasant homes, urging them to stop their protests (Cody 2005). Once some of these conditions were met, the tents were taken down at the parks but “activists said they put the town council and officials on notice that if the factories started operating again, the tents [would] go back up” (Cody 2005). The audacity for these activists to threaten the government correlates with the invulnerable group mentality they had during the height of demonstrations. Rather than use extremely repressive tools, such as the military, officials are using surgically precise, smaller three on one tactics that were discussed in the last section. Even though police have vowed to begin an investigation into whom the leaders of the riots were, they will certainly be careful in conducting themselves.&lt;/p&gt;
&lt;p&gt;Following a drawn out ordeal that eventually ended in the industrial parks closure, the significance of numbers is demonstrated. Although this case is more of an overwhelming force of numbers it nonetheless signaled a distinct and popular opinion that the government had to respect. In two aspects the government had to respect the decision of the people, both in the incapacity to stop the protests, and the overwhelming popular majority. Going against the popular majority on the scale of Huaxi would create a fiasco the government has no desire to seek. Not to mention, the requests these protestors made are moderately reasonable and non-revolutionary. Nothing is really inherently changed in the power and legitimacy of the CCP by removing polluting factories next to a village. No one wants to live next to an eighty-acre industrial park that is destroying the local environment. The only thing threatening the government in this case is the snowball effect where other cities and villages demand that their needs are met. The number of those attending protests really influenced the types of decisions the government faced and was a factor in Huaxi. With more protestors, the success of the demonstrations becomes more realistic.&lt;/p&gt;
&lt;p&gt;Another characteristic of effective protests is the ability to draw attention to the demonstration. The whole point of protesting is to draw attention to an issue and the more attention you garner, the more successful the protest. Attention is gained from many things including the amount of people protesting, property damage you inflict, number of people who know about the protest, and the sensational worthiness of the incident causing the protest. Within the recent history of China, attention was not as attractive with the repressive nature of the government concerning ideology contrary to the Chinese Communist Party. But now with the growing proliferation of protests, unprecedented cooperation of the government, and rapid communication with new technology, increased attention only legitimizes a protest. The target audience of attention may be something only above the local or municipal government but could even include the international theater. At different levels the attention certainly equals a different response. A corruption protest covered by the media in the same province does not gain much effective attention. Comparatively, an incident broadcasted around the world draws both international pressure and the complete attention of national leaders.&lt;/p&gt;
&lt;p&gt;Even the national attention of the Chinese Communist Party can be valuable if officials are willing. After a protest involving tens of thousands of people in the city of Liaoyang, China, a team of “anti graft investigators” was sent to the city (Eckholm 2002). This act resulted in the arrest of several officials originally named in the protest. In another protest involving tens of thousands, farmers demonstrated to obtain better compensation after a dam was planned that would flood their land. Thereafter, the Pubugou dam project in the Sichuan province was put on hold by the intervention of the central government and a party official was sacked (Lim 2004). This is not always the case as the Tibetan protests before the 2008 Olympics in China show. Protestors experienced a fierce violent crackdown despite worldwide attention. This might change as China continues to integrate itself into the global economic and political scene where it does not want to sever potential trade deals with sensitive nations.&lt;/p&gt;
&lt;p&gt;Jumping ahead in an effort to steal the attention of senior officials on the national scene is not what protestors do regularly. Lower methods of calling on the government are far easier and less dangerous for both citizens and police. During the industrial park protest in Huaxi, China, villagers wrote an open letter to the municipal government following the leak of a confidential report. In this report Party Secretary Wang Wei warned, “pollution from the industrial park was a danger to residents and agriculture” (Cody 2005). Even with this evidence the municipal government “turned a deaf ear” (Cody 2005). Following the municipal rejection, villagers sent a delegation to the Zhejiang provincial headquarters in Hangzhou and Beijing. In Beijing, the delegation left petitions at the “premier&amp;rsquo;s” office and the State Environmental Protection Administration” (Cody 2005). Again the villagers were rejected and turned to the previously discussed protests. What this pre-case highlights is the last resort use of protests. Most individuals do not go outside with a sign and overturn cars after they are wronged; they usually seek normal methods of resolution. Chinese citizens are attempting to communicate with the government with various concerns and are not able to have them heard. A potential solution to forestalling these epic protests is opening up the petition system the protestors could not utilize in the Huaxi case. For the economic middle class in China, they are already familiar with how useless the lower system is and sometimes leap directly to protests.&lt;/p&gt;
&lt;h2 id="middle-class-protestors-poster-child"&gt;&lt;a href="#middle-class-protestors-poster-child"&gt;Middle Class: Protestors Poster Child&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Among any group of protestors in China, none are more effective than the affluent middle class. Rising from poverty over the last few decades, the Chinese middle class has filled the role of the nation’s growing economy. The Chinese Academy of Social Science’s report in 2004 defined the middle class as “families with assets valued from 150,000 [$18,137] to 300,000 yuan [$36,275]” (Zhigang 2004). Members of the Chinese middle class are able to do more than comfortably survive; they increasingly have modern appliances, luxury cars, and homes. With this increasing affluence, certain demands upon the government begin to form from the middle class. These demands are generally based in a desire for a “more sustainable and healthy development of the Chinese economy” (Zhigang 2004) for whatever specific reason. For a growing middle class, “the moderate and conservative ideology of the main stratum tends to be accepted as the mainstream ideology of a society and thus helps safeguard social stability by forcing out extremism” (Zhigang 2004). With this explanation it is easier to view the “mass-incident” growth in China in a much safer perspective.&lt;/p&gt;
&lt;p&gt;Members of the middle-class see actions outside of the moderate spectrum and wish to move back to something stable and moderated. Such incidents include both protests in Shanghai or Xiamen where projects were introduced that would negatively affect many citizens. In either case, property values of citizens would be extremely depreciated if the proposed projects were built. For any workingman with or without a family, this would prove unnecessarily uprooting. Getting kicked out of a house you just managed to get financing for or abandoning a symbolic “home” structure is far from stable. These cases will be discussed below. Besides the desire for the mainstream, middle class citizens also want a voice in the decisions affecting them. This is fulfilled either through government consultation or in the form of protest demonstrations.&lt;/p&gt;
&lt;p&gt;In addition to middle class citizens demanding more from the government they are also gaining much more respect from officials because of their importance. The middle class in China is significantly wealthier than the majority of the rest of the nation. Economic incentives for officials are thus an important motivation in keeping the middle class happy or satisfied. The government cannot easily brush aside individuals who make the economy run, unlike poor peasants. Additionally, the occupations of many middle class workers are of necessity to the efficiency of a community or a region. Take all middle class workers out of the city’s economy for a day during a protest and officials will certainly see the negative effects on the economy. This method could even work if the protests&amp;rsquo; political clout with officials is small. By taking hostage of the economy through mass absence, attention for a cause would rapidly be gained. With all the important factors associated with the middle class in its relation to society in general it is no wonder the following cases ended how they did. In both Xiamen and Shanghai the emerging power of the middle class played a substantial role in their positive outcomes. Looking at both of these cases dramatically illustrates the possible picture of a future China and where the majority of political power rests.&lt;/p&gt;
&lt;h2 id="xiamen-has-listened-to-the-opinions-expressed"&gt;&lt;a href="#xiamen-has-listened-to-the-opinions-expressed"&gt;Xiamen “has listened to the opinions expressed”&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;In the eastern province of Fujian, the city of Xiamen experienced a mass incident of its own in early 2008. Following a request by the government for the public opinion of a planned petrochemical plant in the southeastern part of town, there were “mass demonstrations” (Beck 2008) and public opposition. Exact numbers are unclear over the multiple accounts of the demonstration but were enough to create a situation that was “almost out of control” and included “thousands” (Beck 2008) when a government building was attacked. In addition to demonstrations, the use of modern technology was used to oppose the construction of the chemical plant. According to USA Today, nearly one million text messages were sent in “protesting possible pollution dangers” (2007). Despite the fluff that text messages might appear as, they are still a part of the demonstration process, if only at a lesser level of importance and effectiveness.&lt;/p&gt;
&lt;p&gt;The Xiamen protests were also different in another way because they involved more than the usual poor peasants. Protesters included “Xiamen’s rising middle class, who are educated, wealthy, and less willing to meekly accept government orders” (Bristow 2008). A sense of environmental awareness also comes from the middle class besides those who concentrate on it entirely. An individual surnamed Lin said during the Xiamen incident that, “economic development is fine, but not if it damages our environment and health” (Bristow 2008). The more realistic reason behind environmental concern is the property damage such projects are usually associated with. When the chemical plant was announced, an area near the planned location experienced a crash in real estate prices. Once the plant was effectively cancelled, real estate prices doubled in a matter of months (Bristow 2008). This goes back to the notion of a moderated, stable environment the middle class desires. Someone who recently put all his or her finances into a home and is threatened by a large project, such as Mrs. Lin, does not want their “investment damaged” (Bristow 2008). In an effort to avoid situations Mrs. Lin experienced and the public anger, officials are increasingly consulting the public. Such a public caring request by the government is rare in China. Not only did the government invite the public to express their opinions but conducted several more environmental assessments to explore the chemical plant’s impact. In an uncharacteristic way, the government of China might becoming more aware of the environmental impact of its rapid industrialization. USA Today notes that, “the…government, long indifferent to the environmental cost of China’s economy, has become more sensitive to pollution complaints after accidents that polluted rivers…disrupting water supplies to major cities” (2007). This perhaps reveals governmental experiences with past protests due to problems that could have easily been changed. Since the government in Fujian province was so careful in planning a chemical plant within Xiamen they must have had trouble with earlier projects. Previous projects must have caused damaging pollution that triggered protests or construction began on industrial plants without moderate public approval. Both of these reveal the level of care officials are handling themselves with in order to meet public satisfaction.&lt;/p&gt;
&lt;p&gt;After Xiamen, officials saw the response to their public opinion invitation, and were then aware of the broad public opposition to the project. Rather than going against an opinion, which had obviously been displayed, officials decided to scrap the chemical plant. Ding Guoyan, a deputy mayor, was quoted by a news agency in China saying, “The city government has listened to the opinions expressed and has decided, after careful deliberation, that the project must be re-evaluated” (USA Today 2007). Again, this signals a growing awareness of Chinese officials concerning popular opinion. With public consultation, officials are either afraid of a large public backlash or the trouble it brings. In any way, it signals a heightening and warming relationship between citizens and government.&lt;/p&gt;
&lt;h2 id="shanghai-bullet-train"&gt;&lt;a href="#shanghai-bullet-train"&gt;Shanghai Bullet Train&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;As part of China’s $300 billion dollar high-speed bullet train planned to link a majority of the east coast and sections of the interior, a link in Shanghai became a problem. The particular section that caused a public response was a connection from Shanghai to the southern city of Hangzhou and ultimately ended in a change of the train’s route (Powell 2009). The main claim of protestors was that the planned route of the train was too close to their homes. The proximity to their homes caused three problems in the eyes of protestors. One was that the train, which was a magnetic levitation train, would cause health problems from effects due to the strong magnets used on the train. Second, was that property values would plunge next to the route where the train would travel more than 220 miles per hour. The final reason was that the government did not consult the public as to whom the route of the train would affect (Kurtenbach 2009). In the end the route of the train was changed to avoid the most densely populated areas. Protestors actually “created enough of a ruckus that Premiere Wen Jiabao himself interceded and forced a change in the lines route” (Powell 2009). This entire incident breaks with the Chinese precedent of handling disputes raised by its citizens.&lt;/p&gt;
&lt;p&gt;It has been the practice of the government to ignore these disputes outright for much of the past decade. Shanghai, which has a population of only twenty million, has “relocated millions for urban renewal projects” (Kurtenbach 2009). Outside of Shanghai million more have undoubtedly been relocated for government projects. It is interesting that this specific case was able to successfully achieve their cause when others have obviously failed. The most appropriate explanation is a lucky combination of events, timing, and the characteristics of the protestors. Many of the protestors were middle class citizens, with “increasing affluence, [that] left many residents expecting more opportunities to be heard” (Kurtenbach 2009). Additionally, protestors have been utilizing other mediums to garner support for the demonstrations. These include being able to comment on a city government website (Chan, Klamann 2008) and meetings with local officials (Kurtenbach 2009). With all of these contributing factors the protestors were able to draw a positive response from the government and succeed.&lt;/p&gt;
&lt;h2 id="social-stability-primary-goal"&gt;&lt;a href="#social-stability-primary-goal"&gt;Social Stability: Primary Goal&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The most important goal for any successful government is achieving social stability. Without social stability little else can be achieved. This is not absolute social stability, as there are an infinite amount of reasons for people to not be satisfied with the government. Instead, the goal of achieving social stability is met by a majority of the population. With a majority of people happy with the government, the problems that would occur with larger ratios of instability would not plague the nation. The healthy ratio cannot be measured the same across many nations but is uniquely individual. For the government of the People’s Republic of China, however, attaining this ratio has lately been difficult. The growing phenomenon of “social unrest…is seen by the ruling Chinese Communist Party as the biggest challenge to its rule” (Quek 2009). In the government’s attempt to remedy this problem the recent success of so many protests are revealed. More often, demonstrators and protesters in China are getting what they want because of the threat of social unrest. Internal studies in China have even cautioned officials to comply with protests to avoid social unrest. Dr. Wang Erping from the Chinese Academy of Sciences said, “scholars researching the phenomenon have advised China’s leaders since 2005 to listen more to the voices and complaints of the ordinary people in order to minimize unrest” (Quek 2009). What results is the strangely formed political situation that modern China has developed. Although China is not as regimented as other Western nations, it seems to have adopted a type of informal democracy that has, so far, yielded powerful results.&lt;/p&gt;
&lt;p&gt;For China to have moved from the type of government it was during the Mao Zedong years to the increasingly co-operational one of today is tremendously significant for world politics. Not only does providing greater cooperation change politics internally but it may also influence international politics. It is only a matter of time before substantial influence is communicated to Chinese leaders on dissatisfactory foreign affairs decisions. Of course this new power can and will probably move to other areas of normally governmental responsibility. But for now, protests are simply achieving small, local goals. Even on this scale the transformation of China seems readily apparent. The West continually condemns the Chinese for being undemocratic but in fact they are moving to an informal democracy very rapidly. In all the cases discussed in this paper, the use of democracy has already been achieved. These popular protests have affected the decisions of government entities to a desired end result.&lt;/p&gt;
&lt;p&gt;&lt;figure aria-label="Pro-democracy protesters link arms to hold back angry crowds, preventing them from chasing a retreating group of soldiers near the Great Hall of the People, on June 3, 1989 in Beijing. Protesters were angered by an earlier attack upon students and citizens using tear gas and truncheons. People in the background stand atop buses used as a roadblock. AP Photo/Mark Avary"&gt;
 &lt;img
 alt="Pro-democracy protesters link arms to hold back angry crowds, preventing them from chasing a retreating group of soldiers near the Great Hall of the People, on June 3, 1989 in Beijing. Protesters were angered by an earlier attack upon students and citizens using tear gas and truncheons. People in the background stand atop buses used as a roadblock. AP Photo/Mark Avary"
 title="Pro-democracy protesters link arms to hold back angry crowds, preventing them from chasing a retreating group of soldiers near the Great Hall of the People, on June 3, 1989 in Beijing. Protesters were angered by an earlier attack upon students and citizens using tear gas and truncheons. People in the background stand atop buses used as a roadblock. AP Photo/Mark Avary"
 width="1440"
 height="946"srcset="https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--22_hu_86137b4337133c3d.webp 480w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--22_hu_b2a07ccf917ffb6.webp 768w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--22_hu_54ded3f365d48ff0.webp 1024w, https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--22_hu_2ea19dbae62f359b.webp 1366w"
 sizes="(min-width: 800px) min(54rem, 100vw), 100vw"
 src="https://rb.ax/blog/chinas-informal-democracy/Tiananmen_Square_protests_1989--22_hu_eb1c48674dfc81f.jpg"decoding="async"
 loading="lazy"/&gt;&lt;figcaption&gt;Pro-democracy protesters link arms to hold back angry crowds, preventing them from chasing a retreating group of soldiers near the Great Hall of the People, on June 3, 1989 in Beijing. Protesters were angered by an earlier attack upon students and citizens using tear gas and truncheons. People in the background stand atop buses used as a roadblock. AP Photo/Mark Avary&lt;/figcaption&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;h2 id="organic-democracy"&gt;&lt;a href="#organic-democracy"&gt;Organic Democracy&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Influencing governmental decision making by issuing a popular opinion is a loose but viable definition of democracy. Despite the medium used, something other than filling out a ballot can still be a popular opinion. If anything, attending a protest lasting longer than a few days and involving potentially violent consequences shows more commitment. Chinese citizens must profoundly believe in whatever their cause might be to participate in something so dangerous. Growing up in China, all citizens must have seen the long precedent of violent government suppression. Compare this to any other dusty Western democracy where a piece of paper is checked in a matter of minutes in order to vote. Often, the majority of citizens do not even vote. Certainly the growing trend in China is significantly more organically democratic than most other Western nations. When Chinese citizens decide to become committed to a cause they are much more dedicated than their Western counterparts because of the tremendous risk. This commitment will provide protests that citizens are genuinely supportive of and will avoid superfluous political battles often seen in the West.&lt;/p&gt;
&lt;p&gt;The goals that Chinese citizens campaign for will not be radical and in fact will be moderated to the mainstream middle class political ideology as previously covered. This is half the reason that officials in China are not fighting against this growing movement of informal democracy. The needs and desires of Chinese citizens are not as radical as the Chinese Communist Party has historically resisted and suppressed. All Chinese citizens want is a comfortable, conservative, and stable life. The other half of the reason is that the government can really do nothing about it. If the government did have the capability to ignore the common people they certainly would in order to benefit from fulfilling their own goals. But quiet the opposite is true, as the Chinese government is increasingly growing limber in accommodating the demands of protesters.&lt;/p&gt;
&lt;h2 id="flexible-communists"&gt;&lt;a href="#flexible-communists"&gt;Flexible Communists&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;When a nation that squashed student protests with tanks nearly two decades ago has now moved a billion dollar chemical plant after demonstrations, something has changed. Moving from Tiananmen Square to the relocation of a chemical plant in Xiamen has been a long road for the nation of China. At this point, the communist regime has never been so cooperative with its own citizens. This cooperation has not been the rare exception but has been a growing trend. Besides the cases mentioned in previous sections, there are many other protests that the Chinese government has listened to and has resolved in favor of demonstrators. Not only is the government more responsive to the demands of its citizens, it is increasingly flexible in fulfilling those demands. Either out of a heightened respect for the needs of civilians or the fear of social instability, the government has abandoned the precedent of nearly its entire existence. Regardless of the motivation behind the government being so flexible is the fact that it is indeed cooperative when historical precedent should deny it.&lt;/p&gt;
&lt;p&gt;In the previously discussed cases of Xiamen and Shanghai, the economic costs in complying with protestors were enough to make the government seem almost benevolent. The Xiamen chemical plant that had to be moved due to popular protests was a 1.4 billion dollar facility according to USA Today (2007). In the city the plant was later built, the cost for the plant was 2.6 billion dollars (Jacobs 2009). In addition to other costs, abandoning construction and moving the facility to a different city certainly accounted for a portion of the 1.2 billion dollar increase. For the project to even be approved for the new city of Chengdu, a portion of the construction budget had to be dedicated to ecological safeguards. Once this was promised the project continued with six percent of the budget dedicated to environmental protection (Jacobs 2009). Six percent of 2.6 billion turns out to be $156 million dedicated to avoiding the problem that got it kicked out of Xiamen. In Shanghai the government compensated residents who were in the path of the train’s route and were provided with new apartments (Kurtenbach 2009). This does not even cover the amount it cost the government to change the train’s route. In these two cases alone, billions of dollars were lost to the government and private companies to comply with protestors. If the Chinese government’s respect for their citizens could be quantified by monetary amounts, both these and the following cases would be surprising to any critical observer.&lt;/p&gt;
&lt;p&gt;Despite the subsequent cases being neither chronologically or geographically cohesive they are nonetheless representative of the government’s investment into the desires of its citizens. The most recent case involves attempted forced evictions of artists in Beijing by developer’s thugs. After a publicized protest the local government compensated the artists within the district six million Yuan, or $880,000 dollars (Tao 2010). Beside an out of character compensation, the local government vowed to start an investigation, install security cameras, repair damaged property, and protect the artists from future attack (Canaves 2010). In another case of protests opposing a planned chemical plant in Chengdu, $565 million dollars of the total project costs were relocated for environmental protection (Wong 2008). Additionally, the parent company stated, in an attempt to gain public support, “the Sichuan refinery project will install advanced equipment and improve environmental protection facilities with strict pollution preventions” (Wong 2008). Such measures by industry are extremely costly and dramatically reduce the profit margin.&lt;/p&gt;
&lt;p&gt;Sometimes entire projects are closed entirely. In Hunan province, the city of Liuyang closed their chemical factory “forever”-following protests of cadmium pollution (Le, Pomfret 2009). Highlighting the case of Huaxi again, it is important to note that the entire industrial park closed directly from protests by residents (Cody 2005). Also, in the city of Nansha, a five billion dollar oil refinery and petrochemical plant was moved after protests from the community (Shanghai Daily 2009). The economic significance of all these cases yields powerful insights into the government’s flexibility. Some are more economically logically than others such as the cadmium pollution incident. The amount of public health damage and political anger were not at all equal amounts in terms of absolute costs. More often than not, though, the costs to fulfill public demands were tremendously substantial.&lt;/p&gt;
&lt;p&gt;Garbage incinerators are also another hot topic in China as the government struggles to handle the growing urban populations with adequate garbage disposal. In the cities of Guangzhou, Beijing, and Quanzhou all planned projects faced trouble. Following a significant protest in Guangzhou the planned incinerator project was put on hold so that officials could start a half-year long consultation process with the public (Jianmin, Pan 2009). The closure of the plant not only costs money to abandon construction but also adds costs to maintain other types of garbage disposal processes. In the time it takes to install another garbage disposal process, it will cost the government a lot of money to keep the city moderately clean. In the city of Quanzhou, residents protested a polluting water treatment plant. The government responded by promising a reinforcement of environmental cooperation, a full environmental assessment, and free medical aid for those affected (Xinhua 2009). All of these measures were significantly costly.&lt;/p&gt;
&lt;p&gt;Certainly, at times, officials weighed the cost of going against the public with a significant lack of popular opinion and then decided which was more valuable. In this perspective it generally degrades the relationship of government to citizens because they are merely afraid and not genuinely interested in citizens&amp;rsquo; needs. As stated before, modern Chinese police “increasingly admit that most demonstrators are motivated by legitimate grievances…” (Tanner 2004). There probably exists a definite middle ground where officials care for their citizens in addition to fearing their power. Even if officials do not genuinely regard the welfare of their citizens as important it still signals a substantial growth in citizenry power. Chinese citizens have seized an unprecedented time by becoming increasingly effective at getting what they demand through demonstrations.&lt;/p&gt;
&lt;h2 id="official-accountability"&gt;&lt;a href="#official-accountability"&gt;Official Accountability&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;Not only are protestors able to convince the government of utilizing vast amounts of monetary resources to fulfill demands, they can also bring intense scrutiny on government or corporate officials. Official corruption throughout China can range from as high as Shanghai’s Communist Party Secretary Chen Liangyu, to lower officials (French 2007). The geographical range of corruption is wide throughout China but is more frequent in certain areas. When obvious abuses are happening, citizens become angry about it and accordingly protest. More often than not, the government ignores the protests. In some cases previously discussed, such as Liuyang, Liaoyang, and Luoyang, the opposite is the case. These three unique cases all ended with local government officials being sacked by either the municipal or national government. Following a disco fire in Luoyang that killed 309 and sparked massive protests about building codes, twelve officials were detained (CBS 2000). In Liaoyang, leaders who had been accused by protestors six months earlier were arrested following an investigation by the national government (Eckholm 2002). Not only does this signal a great deal of confidence locals can place in the national government but shows that the CCP is very interested in maintaining the integrity of the party.&lt;/p&gt;
&lt;p&gt;When the Xianghe Chemical Factory in Liuyang was discovered to be leaking cadmium into the surrounding region, officials did not immediately respond. Citizens then held a “number of high profile mass incidents, which turned violent and prompted media criticism of officials&amp;rsquo; failure to respond quickly” (Le, Pomfret 2009). With the added attention, demonstrators were able to get the plant closed down. Adding to the victory, the director of the plant and the head of the municipal Environmental Protection Bureau were also sacked (Le, Pomfret 2009). Given the gravity of the environmental poisoning that occurred, the government&amp;rsquo;s reaction would seem normal in any other country. For the Chinese, however, this is a significant step in recent times to make environmental protection a priority in fulfilling Hu Jintao’s “harmonious society” (French 2007). Normally, the People’s Republic of China is more concerned with modernizing its industry rather than hurting the profits of factories. After going about business with this attitude the Chinese government has perhaps seen the fallacy of disregarding the environment in the pursuit of low costs.&lt;/p&gt;
&lt;p&gt;Additional cases include the response of the government during the SARS outbreak in 2003 and a land seizure protest. In Linzhou, a city in the Zhejiang province, protests erupted after officials brought in SARS patients from another city and treated them incorrectly (USA Today 2003). After bringing in patients from Hujiayao, officials kept them at the police station in fear of contaminating the hospital. Protests erupted because citizens claimed officials were endangering the population due to patients being kept in non-medical facilities (USA Today 2003). With hundreds and protestors and the internationally watched SARS episode, the government fired the head of the city Disease Prevention Center and the Health Director for handling the patients improperly (USA Today 2003). Even though the government was quick to handle any sort of outbreak during the SARS episode, which was an international scare, protestors were able to draw attention specifically to their city. Without such a popular response many of the officials would most likely not have been punished as severely. After local officials paid no heed to farmers in Hanyuan, who would be flooded off their land due to a dam project, they protested over inadequate compensation (Lim 2004). The central government intervened after the municipal government could not handle the tens of thousands of protesters and closed construction on the dam. During the investigation, the national government sacked at least one official who had under compensated the farmers (Lim 2004). Giving into protestors might send the wrong message such as, “large scale protests are the best way to solve grievances” (Lim 2004). Officials decided to do this instead of risking immense social instability, which is the underlying reason behind the entire trend being discussed.&lt;/p&gt;
&lt;p&gt;Exploring these cases has presented two different explanations for the behavior of the Chinese government. One is that the government is now seeing the validity of most of these protesters&amp;rsquo; claims to injustice. Top leaders are undoubtedly aware of corruption throughout their vast nation and so must send messages to keep lower officials in line. There is perhaps no better way to dispose of corrupt officials than with the support of the local citizens. Giving citizens the ability to root out corruption provides them with substantial satisfaction in maintaining the integrity of the nation. More accurately, it also acts as a sort of safety valve where citizens can channel their frustration with the host of corruption problems throughout China. Rather than directing the 1.3 billion potential protestors at the whole Chinese government, national leaders are directing them at corrupt officials. This, in essence, saves the Chinese Communist Party from direct conflict while allowing citizens to sack former parts of the party. The second explanation is far more dangerous.&lt;/p&gt;
&lt;p&gt;The more likely reason is that the government is beginning to realize the power their vast population commands. Fearing social instability, national government officials are looking for ways to “buy off” demonstrators in an attempt to regain civil order. In most cases the demands of protestors are simple and easy to meet and are therefore far more readily utilized than repressing citizens. The latter would only fuel the fire in an ever-downward spiraling cycle of growing protests. For example, the request by the farmers in Hanyuan to stop the dam is rather easy to fulfill and would in turn send tens of thousands of angry farmers away from the streets. By a simple measurement of cost versus cost, the people of China have gained a substantial amount of bargaining power with the Chinese government. This has only been done after government officials realize the risk of social instability that comes with large, popular protests. More loosely, this also reflects a growing positive relationship between citizens and government. Additionally, improving relations might come from government fears about the potential energy of instability.&lt;/p&gt;
&lt;h2 id="conclusion"&gt;&lt;a href="#conclusion"&gt;Conclusion&lt;/a&gt;&lt;/h2&gt;

&lt;p&gt;The People’s Republic of China is experiencing the greatest political transformation since its revolutionary beginning. Through the medium of protests, the citizens of China are gaining additional power in obtaining governmental cooperation. In an unprecedented trend, a growth in the amount of protests and the effectiveness of those protests is undeniable. Between the years of 2003 and 2005 the amount of “mass incidents” grew by 50% and is continuing this growth, albeit at a lesser rate. On an ever-growing scale, it appears that Chinese citizens are turning to the political medium of protests to have their voices heard. The substantial growth in the amount of protests highlights two evolving characteristics of Chinese political participation. Firstly, large-scale protests are substantial methods in getting the attention of officials where letters and petitions would not. No other political method available to the common person in China is as effective in large numbers. Secondly, breaking from the stereotype of a repressive government, bent on stalling any dissenting protests, the People’s Republic of China has entered a new era of cooperation and flexibility. The amount of monetary resources the government invests in fulfilling demonstrators’ demands is growing substantially. The frequency of officials cooperating with protestors has increased dramatically. This is because social instability is the greatest problem facing the leaders of China and so they must be flexible in order to stop widespread unrest. The resulting political climate has radically changed relations between citizens and government in degrees never before seen.&lt;/p&gt;
&lt;p&gt;Although China is experiencing this radical change in their political climate, there are still tremendous problems with repression from the government. For every case I found where the protestors were able to garner governmental cooperation there were at least two where the demonstration was ignored or repressed. In numerous cities such as Taishi and Panlong, violent measures were taken by the government to quell the protests. In Dongzhou, near Shanwei, police opened fire on protestors and killed three by official count and more by witnesses (BBC 2005). Government actions worse than this still happen, such as the long crackdown of Falun Gong. Horrible things still happen in China but the main point is not related to the overall number of cooperative and uncooperative incidents of protests. What matters is the simple fact that cooperative protests are happening on an ever-increasing scale. A decade ago, any chance the government had in fulfilling protestor’s demands were slim to none. In the present day, protests of a large nature have hope in achieving what they go out to demonstrate. There is still a significant chance the protests will end badly with government repression but that chance is rapidly dwindling. This is because the government can no longer use such measures without causing further political instability and so they must cooperate.&lt;/p&gt;
&lt;p&gt;In studying this topic there were many research limitations. In order to gather as many cases as possible I used new articles as the primary source for all of my cases. In many instances the depth of reporting was lacking to a few paragraphs, which was barely adequate. With these accounts I attempted to find additional sources for the same case in order to provide a more wholesome picture. The process of gathering these cases was also limited.&lt;/p&gt;
&lt;p&gt;Using Google News Archives in addition to other news services’ archives such as Reuters, The New York Times, BBC, China Daily, and Xinhua News yielded few results. Unfortunately, there is no better way to search the vastness of contemporary media. The process could certainly be expedited and provide more results if there was familiarity with major past protests. Using these major protests as a gateway could allow for further cases as I did when branching out. Starting with high profile cases such as Xiamen I located the incident in Guangdong and Zhangzhou by looking at references in the articles. This technique could be recycled with other cases once an individual was familiar with major cases.&lt;/p&gt;
&lt;p&gt;Drawing from the media as a primary source for this paper creates a few problems. Since the media is a for profit institution, many of the stories covered by agencies were sensationalist and aimed to expose the shortfalls of the Chinese Communist Party governance. Rather than seeking a generalizable view about the outcome of protests, the media highlights the latest suppression with high conflict. These perspectives highlight the stereotype most Westerners view the nation of China. This does no affect specific cases since most journalists are eager to point out the success of Chinese citizens. Instead, this type of “good story” seeking attitude might abandon cases where the resolution was positive but lacked overall “newsworthiness”. As for the media within China, it is watched closely by the government and closely censored to avoid demonstration proliferation. Due to what some people call the “snow-ball” effect where the victory of one protest in a city creates expectations in another city, the government clamps down on information. This is perhaps the biggest culprit compared to any other research limitation. With government censorship in place to avoid the spread of protests, it is impossible to know the magnitude of victorious protests.&lt;/p&gt;
&lt;p&gt;The future of China seems headed in a specific direction due to the evidence of this research. Even with the specific bias of collecting specifically positive cases, the mere fact that these cases exist is a testament to the political transformation in China. Unlike the current view on China, which places it as a suppressive communist institution, it is in reality a far more democratic system. This democracy is not the traditional definition of democracy and is entirely informal. Rather than voting, the citizens of China attend protests to have their opinions be heard. The amount of people attending, the frequency, and the effectiveness of protests are all increasing. In an exponentially growing cycle, Chinese citizens see the trend and also wish to put forth their own voice. Responding to this cycle, the government realizes the immense power that citizens have. The future of this movement is assuredly mirrored to the past five years where protests increased in addition to government cooperation. The relationship between citizens and government will continually equalize as demonstrators increasingly make demands. Government officials will have to maintain their flexibility with protestors in order to maintain political stability despite most concessions being economically inefficient. In China of the immediate future, the political process looks increasingly informally democratic, with the power continually transferring to the people.&lt;/p&gt;
&lt;h2 id="references"&gt;&lt;a href="#references"&gt;References&lt;/a&gt;&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Beck, Lindsay. 2008. China says it will shift chemical plant after protests. Reuters. Mar 7. &lt;a href="http://uk.reuters.com/article/idUKPEK20193420080307"&gt;http://uk.reuters.com/article/idUKPEK20193420080307&lt;/a&gt; (accessed Feb 14, 2010).&lt;/li&gt;
&lt;li&gt;BBC. 2005. China official held over shooting. British Broadcasting Corporation. Dec 11. &lt;a href="http://news.bbc.co.uk/2/hi/asia-pacific/4517706.stm"&gt;http://news.bbc.co.uk/2/hi/asia-pacific/4517706.stm&lt;/a&gt; (accessed March 19, 2010).&lt;/li&gt;
&lt;li&gt;Bradsher, Keith. 2009. After Protest, Chinese Officials Halt Steel Mill Sale. Aug 16. &lt;a href="http://www.nytimes.com/2009/08/17/business/global/17ihtsteel.html?scp=7&amp;amp;sq=successful%20protests%20in%20china&amp;amp;st=cse"&gt;http://www.nytimes.com/2009/08/17/business/global/17ihtsteel.html?scp=7&amp;amp;sq=successful%20protests%20in%20china&amp;amp;st=cse&lt;/a&gt; (February 23, 2010).&lt;/li&gt;
&lt;li&gt;Bristow, Michael. 2008. China’s rising people power. British Broadcasting Corporation. Jan 22. &lt;a href="http://news.bbc.co.uk/2/low/asia-pacific/7195434.stm"&gt;http://news.bbc.co.uk/2/low/asia-pacific/7195434.stm&lt;/a&gt; (accessed February 5, 2010).&lt;/li&gt;
&lt;li&gt;Canaves, Sky. 2009. Factory Closure Strain China’s Labor Law. Wall Street Journal. Jan 17. 1 &lt;a href="http://online.wsj.com/article/SB123215043508192065.html"&gt;http://online.wsj.com/article/SB123215043508192065.html&lt;/a&gt; (accessed February 6, 2010).&lt;/li&gt;
&lt;li&gt;Canaves, Sky. 2010. Artists Protest Demolition Threats. Wall Street Journal. Feb 23. &lt;a href="http://blogs.wsj.com/chinarealtime/2010/02/23/artists-protest-demolition-threats/"&gt;http://blogs.wsj.com/chinarealtime/2010/02/23/artists-protest-demolition-threats/&lt;/a&gt; (accessed Feb 24, 2010).&lt;/li&gt;
&lt;li&gt;CBS News. 2000. China Fire Victims’ Relatives Protest: Building Declared One of Province’s Most Dangerous Three Years Ago. CBS News. Dec 28. &lt;a href="http://www.cbsnews.com/stories/2000/12/25/world/main259626.shtml"&gt;http://www.cbsnews.com/stories/2000/12/25/world/main259626.shtml&lt;/a&gt; (accessed March 14, 2010).&lt;/li&gt;
&lt;li&gt;Chan, Royston, and Edmund Klamann. 2008. Shanghai police break up “maglev” train protest. Reuters. Jan 13. &lt;a href="http://uk.reuters.com/article/idUKSHA328582._CH_.242020080113"&gt;http://uk.reuters.com/article/idUKSHA328582._CH_.242020080113&lt;/a&gt; (accessed October 20, 2009).&lt;/li&gt;
&lt;li&gt;Cody, Edward. 2005. For Chinese, Peasant Revolt is Rare Victory. Washington Post Foreign Service. Jun 13. &lt;a href="http://www.washingtonpost.com/wpdyn/content/article/2005/06/12/AR2005061201531.html"&gt;http://www.washingtonpost.com/wpdyn/content/article/2005/06/12/AR2005061201531.html&lt;/a&gt; (accessed Mar 6, 2010).&lt;/li&gt;
&lt;li&gt;Cody, Edward. 2005. In Chinese Uprisings, Peasants Find New Allies. Washington Post. Nov 26. &lt;a href="http://www.washingtonpost.com/wp-dyn/content/article/2005/11/25/AR2005112501364.html"&gt;http://www.washingtonpost.com/wp-dyn/content/article/2005/11/25/AR2005112501364.html&lt;/a&gt; (accessed Feb 15, 2010).&lt;/li&gt;
&lt;li&gt;Eckholm, Erik. 2002. Corruption Protest in China Leads to Charges, Top and Bottom. New York Times. Sep 13. &lt;a href="http://www.nytimes.com/2002/09/13/world/corruption-protest-in-china-leads"&gt;http://www.nytimes.com/2002/09/13/world/corruption-protest-in-china-leads&lt;/a&gt; to-charges-top-and-bottom.html?pagewanted=1 (accessed Mar 7, 2010).&lt;/li&gt;
&lt;li&gt;Elegant, Simon. 2008. China Protests: A New Approach?. Time. July 4. &lt;a href="http://www.time.com/time/world/article/0,8599,1820345,00.html"&gt;http://www.time.com/time/world/article/0,8599,1820345,00.html&lt;/a&gt; (accessed February 18, 2010).&lt;/li&gt;
&lt;li&gt;Foreman, William. 2008. Factory closure in China a sign of deeper pain. Fox News. Oct 19. &lt;a href="http://www.foxnews.com/wires/2008Oct19/0,4670,ASChinaFactoryWoes,00.html"&gt;http://www.foxnews.com/wires/2008Oct19/0,4670,ASChinaFactoryWoes,00.html&lt;/a&gt; (accessed February 8, 2010).&lt;/li&gt;
&lt;li&gt;French, Howard. 2007. Ire Over Shanghai Rails Lines May Signal Turning Point. New York Times. Aug 10. &lt;a href="http://www.nytimes.com/2007/08/10/world/asia/10train.html"&gt;http://www.nytimes.com/2007/08/10/world/asia/10train.html&lt;/a&gt; (accessed Oct 14, 2009).&lt;/li&gt;
&lt;li&gt;Jacobs, Andrew. 2010. Evicted Artists Protest After Attack in Beijing. New York Times. Feb 23. &lt;a href="http://www.nytimes.com/2010/02/24/world/asia/24china.html"&gt;http://www.nytimes.com/2010/02/24/world/asia/24china.html&lt;/a&gt; (accessed February 23, 2010).&lt;/li&gt;
&lt;li&gt;Jacobs, Andrew. 2009. Planned chemical plant in China moved after protests. New York Times. Jan 5. &lt;a href="http://www.nytimes.com/2009/01/15/world/asia/15iht-pollute.1.19382370.html"&gt;http://www.nytimes.com/2009/01/15/world/asia/15iht-pollute.1.19382370.html&lt;/a&gt; (accessed March 15, 2010).&lt;/li&gt;
&lt;li&gt;Jacbocs, Andrew. 2008. Parents’ grief turns to rage at Chinese Officials. New York Times. May 28. &lt;a href="http://www.nytimes.com/2008/05/28/world/asia/28ihtschools.1.13267815.html?pagewanted=1"&gt;http://www.nytimes.com/2008/05/28/world/asia/28ihtschools.1.13267815.html?pagewanted=1&lt;/a&gt; (accessed March 22, 2010).&lt;/li&gt;
&lt;li&gt;Jiao Wu, and Zuo Likun. 2010. Beijing to be more selective on garbage burner sites. China Daily. Feb 5. &lt;a href="http://www.chinadaily.com.cn/china/2010-03/05/content_9544606.htm"&gt;http://www.chinadaily.com.cn/china/2010-03/05/content_9544606.htm&lt;/a&gt; (accessed March 8, 2010).&lt;/li&gt;
&lt;li&gt;Jianmin, Li, and Wang Pan. 2009. Incinerator protests fire debate over China’s growing garbage problem. Xinhua News. Nov 26. &lt;a href="http://news.xinhuanet.com/english/2009-11/26/content_12544988.htm"&gt;http://news.xinhuanet.com/english/2009-11/26/content_12544988.htm&lt;/a&gt; (accessed March 22, 2010).&lt;/li&gt;
&lt;li&gt;Kurtenbach, Elaine. 2009. Shanghai residents protest train line construction. China Post. Aug 27. &lt;a href="http://www.chinapost.com.tw/china/local-news/shanghai/2009/08/27/222326/Shanghai"&gt;http://www.chinapost.com.tw/china/local-news/shanghai/2009/08/27/222326/Shanghai&lt;/a&gt; residents.htm (accessed October 17, 2009).&lt;/li&gt;
&lt;li&gt;Kurtenbach, Elaine. 2009. China chemical plant project moved after protests. San Francisco Chronicle. Jan 14. &lt;a href="http://www.sfgate.com/cgibin/article.cgi?f=/n/a/2009/01/13/financial/f203730S82.DTL&amp;amp;type=health"&gt;http://www.sfgate.com/cgibin/article.cgi?f=/n/a/2009/01/13/financial/f203730S82.DTL&amp;amp;type=health&lt;/a&gt; (accessed February 12, 2010).&lt;/li&gt;
&lt;li&gt;Lawrence, Dune. 2008. Fired Guangdong Factory Workers Clash With Police. Bloomberg. Nov 26. &lt;a href="http://www.bloomberg.com/apps/news?pid=20601089&amp;amp;sid=agxPP7.tXMvE&amp;amp;refer=china"&gt;http://www.bloomberg.com/apps/news?pid=20601089&amp;amp;sid=agxPP7.tXMvE&amp;amp;refer=china&lt;/a&gt; (accessed February 8, 2010).&lt;/li&gt;
&lt;li&gt;Le, Yu, and James Pomfret. 2009. China closes factory after cadmium pollution protest. Reuters. Aug 3. &lt;a href="http://www.reuters.com/article/idUSTRE57216H20090803"&gt;http://www.reuters.com/article/idUSTRE57216H20090803&lt;/a&gt; (accessed March 26, 2010).&lt;/li&gt;
&lt;li&gt;Lim, Louisa. 2004. China tries to calm dam protests. British Broadcasting Corporation. Nov 18. &lt;a href="http://news.bbc.co.uk/2/hi/asia-pacific/4021901.stm"&gt;http://news.bbc.co.uk/2/hi/asia-pacific/4021901.stm&lt;/a&gt; (accessed Mar 7, 2010).&lt;/li&gt;
&lt;li&gt;Lynch, Elizabeth. 2010. Movie Review: Zhao Liang’s “Petition: Court of Complaints”. China Law and Policy. Feb 8. &lt;a href="http://chinalawandpolicy.com/tag/qing-dynasty/"&gt;http://chinalawandpolicy.com/tag/qing-dynasty/&lt;/a&gt; (accessed April 1, 2010).&lt;/li&gt;
&lt;li&gt;Ma, Xiao, and Li Xinzhu. 2009. Incinerator goes up in smoke. China Daily. Nov 3. &lt;a href="http://www.chinadaily.com.cn/cndy/2009-11/03/content_8902728.htm"&gt;http://www.chinadaily.com.cn/cndy/2009-11/03/content_8902728.htm&lt;/a&gt; (accessed March 13, 2010).&lt;/li&gt;
&lt;li&gt;Powell, Bill. 2009. China’s amazing new bullet train. CNN. Aug 6. &lt;a href="http://money.cnn.com/2009/08/03/news/international/china_high_speed_bullet_train.fortune/i"&gt;http://money.cnn.com/2009/08/03/news/international/china_high_speed_bullet_train.fortune/i&lt;/a&gt; ndex.htm (accessed October 17, 2009).&lt;/li&gt;
&lt;li&gt;Qian, Wang. 2009. Villagers halt waste incinerator. China Daily. Dec 31. &lt;a href="http://www.chinadaily.com.cn/china/2009-12/31/content_9249207.htm"&gt;http://www.chinadaily.com.cn/china/2009-12/31/content_9249207.htm&lt;/a&gt; (accessed March 17, 2010).&lt;/li&gt;
&lt;li&gt;Quek, Tracy. 2009. China riots ‘won’t lead to rebellion’. Asia News Network. Dec 2. &lt;a href="http://www.asianewsnet.net/news.php?sec=1&amp;amp;id=3903"&gt;http://www.asianewsnet.net/news.php?sec=1&amp;amp;id=3903&lt;/a&gt; (accessed March 30, 2010).&lt;/li&gt;
&lt;li&gt;Reuters. 2007. China city tightens Internet control after protest. Reuters. Jul 6. &lt;a href="http://uk.reuters.com/article/idUKPEK4156920070706"&gt;http://uk.reuters.com/article/idUKPEK4156920070706&lt;/a&gt; (accessed February 12, 2010).&lt;/li&gt;
&lt;li&gt;Shanghai Daily. 2009. Oil Plant Relocation Decision hailed. Shanghai Daily. Aug 1. &lt;a href="http://www.china.org.cn/environment/news/2009-08/01/content_18247628.htm"&gt;http://www.china.org.cn/environment/news/2009-08/01/content_18247628.htm&lt;/a&gt; (accessed March 18, 2010).&lt;/li&gt;
&lt;li&gt;Tanner, Murray. 2004. Shades of Tiananmen: Protests now flourish in China. New York Times. Jun 3. &lt;a href="http://www.nytimes.com/2004/06/03/opinion/03iht-edtanner_ed3_.html"&gt;http://www.nytimes.com/2004/06/03/opinion/03iht-edtanner_ed3_.html&lt;/a&gt; (accessed Feb 13, 2010).&lt;/li&gt;
&lt;li&gt;Tao, Wen. 2010. Artists receive compensation for attack. Global Times. Mar 15. &lt;a href="http://www.globaltimes.cn/www/english/metro-beijing/update/society/2010-03/512936.html"&gt;http://www.globaltimes.cn/www/english/metro-beijing/update/society/2010-03/512936.html&lt;/a&gt; (accessed Feb 24, 2010).&lt;/li&gt;
&lt;li&gt;USA Today. 2003. Fresh SARS protests erupt in China. USA Today. May 6. &lt;a href="http://www.usatoday.com/news/world/2003-05-06-sars-protests_x.htm"&gt;http://www.usatoday.com/news/world/2003-05-06-sars-protests_x.htm&lt;/a&gt; (accessed February 20, 2010).&lt;/li&gt;
&lt;li&gt;USA Today. 2007. 1M messages protest China plant. USA Today. May 31. &lt;a href="http://www.usatoday.com/tech/products/2007-05-31-4149736879_x.htm"&gt;http://www.usatoday.com/tech/products/2007-05-31-4149736879_x.htm&lt;/a&gt; (accessed March 15, 2010).&lt;/li&gt;
&lt;li&gt;Wong, Edward. 2008. In China City, Protestors See Pollution Risk of New Plant. New York Times. May 6. &lt;a href="http://www.nytimes.com/2008/05/06/world/asia/06china.html?partner=rssnyt"&gt;http://www.nytimes.com/2008/05/06/world/asia/06china.html?partner=rssnyt&lt;/a&gt; (accessed March 16, 2010).&lt;/li&gt;
&lt;li&gt;Xinhua. 2009. Residents protest over sewage plant stench. Xinhua News. Sep 2. &lt;a href="http://www.chinadaily.com.cn/china/2009-09/02/content_8648448.htm"&gt;http://www.chinadaily.com.cn/china/2009-09/02/content_8648448.htm&lt;/a&gt; (accessed March 25, 2010).&lt;/li&gt;
&lt;li&gt;Yanmei, Xie. 2010. Stand-off in Beijing. China Dialogue. Feb 17. &lt;a href="http://www.chinadialogue.net/article/show/single/en/3497-Stand-off-in-Beijing"&gt;http://www.chinadialogue.net/article/show/single/en/3497-Stand-off-in-Beijing&lt;/a&gt; (accessed March 14, 2010).&lt;/li&gt;
&lt;li&gt;Yardley, Jim. 2008. China Sets Zones for Olympics Protests. New York Times. July 24. &lt;a href="http://www.nytimes.com/2008/07/24/sports/olympics/24china.html?partner=rssuserland&amp;amp;emc"&gt;http://www.nytimes.com/2008/07/24/sports/olympics/24china.html?partner=rssuserland&amp;amp;emc&lt;/a&gt; =rss&amp;amp;pagewanted=all (accessed February 20, 2010).&lt;/li&gt;
&lt;li&gt;Zhigang, Xin. 2004. Dissecting China’s ‘middle class’. China Daily. Oct 27. &lt;a href="http://www.chinadaily.com.cn/english/doc/2004-10/27/content_386060.htm"&gt;http://www.chinadaily.com.cn/english/doc/2004-10/27/content_386060.htm&lt;/a&gt; (accessed March 30, 2010).&lt;/li&gt;
&lt;/ul&gt;</description></item></channel></rss>