Decadent thought leads to decadent language, which leads to even more decadent thought... and a vicious vortex of decay and corruption ensues. Is the process accidental or deliberate?
In "Politics And The English Language", George Orwell compares sloppy language to a sloppy drunkard.
i. Never use a metaphor, simile or other figure of speech which you are used to seeing in print.
ii. Never use a long word where a short one will do.
iii. If it is possible to cut a word out, always cut it out.
iv. Never use the passive where you can use the active.
v. Never use a foreign phrase, a scientific word or a jargon word if you can think of an everyday English equivalent.
vi. Break any of these rules sooner than say anything outright barbarous.
They describe pirates as a bellwether, and explain (approximately) what a wether is... while decorously omitting the difference between a ram and a wether. In a nutshell, a wether is castrated.
Legal bloggers Ken Clark and Lawrence Veregin representing the combined intellectual property team of Aird and Berlis LLP and Aird and McBurney LP predict the beginning of the end of online piracy in Canada, and describe how Take Down and Stay Down will work --in Canada-- via real time site blocking.
On hacking, Mary B. Ramsay and Grant P. Dearborn of Schumaker Loop and Kendrick discuss the devious ways of Hackers and the risk from phishers phishing. Never give your email address and PW in order to open an attachment, even if it appears to have come from your better half or significant other.
The news has covered the Colonial Pipeline and the JBS meat packer hacks but less has been said about the hacking of iConstituent, perhaps because the latter is less inconvenient to the public.
Apparently, according to at least two sources, sixty members of the US Congress have been hacked or phished, and as a result they lost their access to iConstituent. If you notice a pause in the begging letters and emails, you might infer that your Congressperson's internet hygiene is --or was-- substandard. Maybe if your trusted Congressperson sends you an attachment or link, you should not open it or click through.
On that happy note...