Posts tagged ‘surveillance’

Small personal 25C3 wrap-up

January 4th, 2009

The 25th Chaos Communication Congress (25C3) that took place from the 27th to 30th December 2008 in Berlin was an excellent meeting – like all *C3s I participated so far. The topic “noting to hide” was a theme that was found in many talks about technology and society. Some of my personal highlights were Dan […]

As reported yesterday, the German province Bavaria officially gave the police the right to use tools to scan computers of potential criminals starting from August 1st (the media call these tools “Bundestrojaner” – ferderal Trojan horse – in this case “Bayerntrojaner” – Bavarian Trojan horse). Looks really like another chapter of “We lost the war” […]

Here is just a quick link to an article about privacy and security by Bruce Schneier at Wired. He explains the wrong perception regarding the trade-off between these two values. The debate isn’t security versus privacy. It’s liberty versus control. […] If you set up the false dichotomy, of course people will choose security over […]

Happy new 2008 1984. Germany has now the data retention but this doesn’t mean that we cannot fight back. Via Roland‘s delicious links I stumble across Anonymouse.org. This proxy lets you surf any page anonymously in a very easy solution if you don’t want to set up Tor or JAP. Only disadvantage is it’s low […]

Frank and Ron filled the “told you so”-karma with the annual Security Nightmares presentation/brainstorming. After a short retrospect they had a look into the crystal ball. Some predictions that were mentioned: hijacking of industrial robots will increase people will go to jail due to wrong time zone configuration of log servers more flash memory problems […]

EN: Hacking-paragraph, biometric passports … German politicians decided in the last time against the recommendations of IT/security specialists (german). Next law in the pipe: telecommunication data retention. The benefits of this law are very low, the effort of the implementation is quite high and the potential of abuse of the stored data (german) is tremendous. […]