Posted by: Dahni | March 12, 2015

Texting and Social Media

short url to this post:

By Dahni
© 2015, all rights reserved


When I was young, we did not have the Internet, any kind of cell phones, computers, e-mail, Twitter, Facebook and such as these. Before you say, “OMG” or think, ‘Oh NO, just know, we still had texting and social media!  I suspect these have been around in some form or another, for as long as, people have been on the planet.

God sent a text to Moses, even if it was written in stone. The words, “written in stone” are, apropos to this post because, when we think of these words today, we think of something being, permanent. Well, Moses broke the original, but God must have had the data saved on a server because, He sent it to Moses again. 🙂

Today, we might think we can edit or even delete, but there is a good possibility that there is still a record of it somewhere in, ‘the cloud.’ So, be careful what you text, message, post and share, in the first place! Would you want your words to harm others that could also, come back to hurt you?

As an after thought, you know, maybe the first physician’s prescription (scrip) was, from God to Moses?

“Take two tablets and call me in the morning.” 🙂


God’s text to Moses

There are many, many examples of early texting and social media. How about Thomas Jefferson?

Thomas Jefferson texting in, 1776

Thomas Jefferson texting in, 1776

What about George Washington, when he crossed the Delaware River? Maybe he doodled or drew a picture and wrote out a text to his wife, Martha?

Dear Martha, 

Crossed the Delaware today. Long going. Don’t wait up for me.

 George  🙂

Dear Martha,  Crossed the Delaware today. Long going. Don't wait up for me.  George

George Washington crossing the Delaware

Texting has continued from generation to generation. It was an effective messaging system. I would imagine this system was invented by girls and as the following picture shows, they were pretty good about keeping it private and most others, unaware.


Early texting and social media

The girl’s school book could be a software ‘security suite’ (antivirus and etc.) or a shield, blocking the GPS (Global Position Satellite), from tracking its location. Notice the subtle, almost non-existence of the ‘soft hand off.’

In cellular telephone communication, a “soft hand off” refers to the overlapping of repeater coverage zones, so that every cell phone set (each student) is always well within range of at least one repeater (another student).

The two girls involved in the ‘soft hand off’,’ appear to be paying attention. But what they are really doing is, making sure the information is secure and privacy is not breached.

Before the ‘soft hand off,’ pinging was first done. “Pinging’ is, a query of another computer on a network (another student) to determine whether there is a connection to it. Most likely, this was done by the girl in front, by reaching behind her and touching the girl in back. This “pinging” was also, to let her know, she wanted to transmit (send a message). 🙂

And random speed tests were routinely performed, to test the speed of their networks. This was often done while their teacher’s head was turned away from them. Yes, how fast did the ‘hand off’ need to be, before their teacher turned around? 🙂

But the early texting and social media began as, very simple tools for communication.


The notes could be very simple, just a piece of folded paper.

Oh, and there were pictures too (SMS – short message service and MMS – multimedia messaging service)! 🙂


Early social media – messaging with images

Just cut and paste photos or pictures into a book, quickly flip the pages and voilà (or if you must use – walah), VIDEO! 🙂

Example of early social media, multimedia messaging service (MMS) 🙂

Folded paper in triangular shapes evolved texting and social media. Names were written so the delivery system could get the text, to the intended person. It was also, considered to be, private messaging.


Early ‘In Boxes’ or “You’ve Got Mail!” This could also, be an example of, unwanted mail or ‘spam.’:)


Even the simple triangular-shaped text message, saw expressive changes.

Probably not a lot of guys were texting years ago, but they did find a use, for the folded paper triangle. 🙂

Was this the beginning of, "Monday morning quarterbacks?" :)

Was this the beginning of, “Monday morning quarterbacks?” 🙂

Other shapes and complex folding, artistic expression and inventiveness, took texting and social media, to new heights.


Design & thought went into this


There has always been, “An app for that!” 🙂


Lots of different designs and thought!


For: Information, Instruction and even – Transformation!

Today, we have the Internet (information super highway) and (ISPs) Internet service providers (home, business and school networks). And our mail servers and hand-held devices, for texts and all our content is, the delivery system. There has always been a delivery system, even if just passing notes from, person to person. These things are important to our lives. They have always been important. Having a secure delivery network is important and has always been important. No one wants to be hacked and have their data compromised. And there is and have always been consequences, when our security and data is breached.

Years ago, a man gave me some advice that was true then and it’s true now:

  1. There’s nothing for FREE, someone’s going to pay, one way or another.
  2. You can always find what you’re looking for, just make sure you’re looking, for what you find.
  3. There’s no such thing as, total security.

To these, I would like to add that if you understand the above three things and are willing to take the risks, just make sure that IF, you are hacked and your data is compromised, the damage is minimal!

Early example of risk-taking. :)

Early example of risk-taking with minimal risks. 🙂

Yes, in the picture above, there are risks. But if security is breached, there are no names and it is, difficult to trace the source of the sent message. Since there are no names, the recipient can deny it was, ever intended for them. 🙂

Sometimes the networks became unavailable, by flooding them with useless data or they were interrupted (‘denial of service’). Sometimes data and security was compromised. And sometimes, entire networks were shut down.


Their whole network was hacked! 🙂

To follow are, just some of the consequences of being hacked and having one’s data compromised.

One of the girls above, sent a ‘private message’ to another girl. Think of the classroom as the Internet and the other two girls as the Internet Service Provider (ISP) and a Mail Server. Well, they were all hacked, probably by a curios (nosy) boy, who seized the text or message. He made such a commotion in grabbing the note, he dropped it. The teacher, (Internet Police, FCC, NSA etc.) saw it on the floor. The teacher read the note. As we have been told and know today, we should not expect much security because, there is, “No reasonable expectation of privacy!” 🙂

The message had the girl’s name that sent it and the name of the girl it was intended for. Based on the location of the sender to the receiver and the guilty look on all four of their faces, the teacher was able to triangulate the source(s) and shut down their network. 🙂

The teacher had all four girls stand up and walk away from the rest of the class, to the back of the room. Then the teacher read the note aloud to the rest of the class, making them an example. Yep, this is what happens, when security is breached and your data is compromised! 🙂

And the boy hacker? He was NOT discovered and would go undetected. He would live, to hack another day. 🙂

Oh, and identity theft is, nothing new. The same boy hacker became, an identity thief. Kids handwriting, pretty much, all look the same. Yep, the handwriting of the young, just-learned-to-write age is, nearly identical. Like our mail clients, they all, pretty much, use the same standard fonts or type. 🙂

But anyway, the boy wrote out a fake text (phishing), put one girls name on it – From: and a boy’s name – To:. Then he passed it to another child and watched and waited, for every participant to get caught. Yep, it’s called phishing – the attempt to acquire sensitive information or a certain response (get others into trouble) by, pretending to be someone else, putting the blame on someone else and messing up the whole delivery system, so it can’t be traced back to him. 🙂

"Keep it secret! Keep it Safe!"

“Keep it secret! Keep it Safe!”

In ‘Lord of the Rings,’ by J.R. Tolkien, even middle earth were texting and social media-ing.’ And what advice did Gandalf the Gray wizard, give to, Frodo Baggins? Referring to the ‘one ring’ he said, “Keep it secret! Keep it Safe!”

Before continuing here, I should point out that neither “texting” or “texter” (one that sends a text) are real words. Spell checkers and auto correct usually highlight both with the dreaded red underline. Most dictionaries, do not define these words unless, they also, define slang. Slang is, basically, what the words “texting” and “texter” are. 🙂

Well, despite the risks, texting and social media is much more than, just having fun. One of the early texting and social media platforms of my youth was, one that most guys in my class, did not participate in that much. But I loved it!

It had several names and it is still, a preferred texting and social media application, by a select group. Some call this ‘The Chatterbox.’ Others call it, ‘The Fortune Teller’ There may be other names, for this phenomenon in other places and countries, but those are the two most common. I call it, BRILLIANT!


‘The Chatterbox’ or ‘The Fortune Teller’ – early texting and social media

These could be simple or really marvels of expression and artistic, awe-inspiring works.

Starting with just a square piece of paper, these were carefully folded. Colors and/or colored designs were often seen on the outside of the ‘Chatterbox’ or ‘Fortune Teller.’ Inside were often numbers from, 1 -8. As the flap was lifted under each number, there was a message (secret or private text message) or a fortune or special surprise like, “Who will you marry?” There were specific ways to operate, this early ‘hand-held device’ (early computer). 🙂

This was one of the first computers to incorporate touch, as in, ‘touch screen’  technology! 🙂

And there were specific ways to extract the data. see video below 🙂

Now, you might think that the child or the adult making this has, “too much time on their hands.” You might believe that they should be studying; paying attention in class, instead of  goofing around and just, ‘playing.’ But play is, the primary work of education, for children of all ages. Why just look at what this ‘Chatterbox’ or ‘Fortune Teller’ is, really all about!

Folding paper? Origami comes to mind. It is an art form. But it also, involves mathematics (numbers 1-8 in the correct order and in counting) and geometry, making a unique three dimensional (3D) shape, just from a flat piece of paper and folding triangles and then squares. Scissors were used to cut between the internal triangles, so underneath each number, a separate message or fortune would be found. This all, requires skill, precision and hand-eye coordination. Colors and designs necessitate a fundamental understanding of art formation, technique and art appreciation. Writing numbers, uses writing skills and practice, makes it legible so, anyone (anyone to whom it is intended) can read it. Reading is, obviously involved. Then, there is language and in this country, it is English. Sentence structure, grammar, figures of speech and imagination are all connected and utilized, to write interesting messages and fortunes. Now if you have ever made or seen a ‘Chatterbox’ or ‘Fortune Teller,’ you probably never thought about all these things coming into play? I didn’t! I just thought they were BRILLIANT and cooooool! But they are, an art form and a science as well as, an employer of other subjects, required to, construct them! 🙂


‘The Chatterbox’ or ‘The Fortune Teller’ expanded

If caught playing with one or making one or sending one at the wrong time or to the wrong person or if it gets seized, remember to minimize your risks in the content you share! In this country, The United States, we have many rights and freedoms in our Constitution. One is, the freedom of speech. But IF you do not want your security breached or your data compromised, minimize the risks. If you don’t want the consequences of a breach, don’t try to compromise the privacy of others! Say what you mean and mean what you say, but there’s no excuse, for being mean! Let your texting and social media be, as safe as is possible and build up/edify others, just as you would desire the same, for yourself.

At the end of this post is, a You Tube video on, ‘HOW’ to make a ‘Chatterbox’ or a ‘Fortune Teller.’ It is not only a fun thing, for children to make, but something which will teach much and teach about texting and social media. And “children,” could be, of any age, old enough to make them. And that goes for the older children too, say, 150 years of age or older. 🙂

These paper, hand-held, touch computers could also, be used as party favors or gifts, for children of any age. Imagine a dinner table with one of these at each place setting. Perhaps they could be used, for entertainment and to promote conversation and unity, after dinner?

Texting and social media has evolved, but the principles; the fundamentals will always be the same as the first time they were used. Even today, I still think these ‘Chatterboxes’ or ‘Fortune Tellers’ are fun, awesome and BRILLIANT! Isn’t this really, what texting and social media is for! Have fun! Be Safe! Be edifying! 🙂





Just I-Magine,


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.


%d bloggers like this: