Archive for the 'IT security' Category

The Inconsistency of IT Security

IT security is self-defeating since it’s life blood, or call it success proposition, is an infinite tug-of-war without winners: don’t win at no loss. One wins, both them lose.


Continue reading ‘The Inconsistency of IT Security’


Dear Ms Chancellor, now DO something!

Dear Ms Chancellor,

Just Curio-US (Found on PInterest

Just Curio-US (Found on PInterest)

this post has sat in my outbox for months since I could anticipate your official answer:
“Thank you we will consider your opinion, but the affair has been closed.”

Dear Ms Chancellor, you and me, both we were born in the same country, the GDR.
We lived in it’s dual society and learned to tell the surface from the hidden meaning.
We got to know which rules to ignore, how to find loopholes and how to improvise in order to create some spaces of ingenuity and leeway.
Why? Because GDR’s ruling party, the SED, its border guards, and intelligence, the StaZi, operated on the same moral level: suspecting people for “counter-something” activities against the state and putting them under surveillance in order to let system prevail which only they understood.
Trust was a precious currency.

We know how that state ceased to exist. It was changed from the inside since “we were the people”.

Continue reading ‘Dear Ms Chancellor, now DO something!’

A needle without context …

… is nothing more than a straw in a haystack.

While reviewing some articles of the last years, I found an interesting study from 2011.
Entitled “Public Security: Simulation Need to Replace Conventional Wisdom“, that study proves a commonplace: Data without context is nothing.
Continue reading ‘A needle without context …’

Security vs. Freedom

If you speak German you may have a look at this:

Information Security: YES, YOU CAN!

As a sequel to my previous post, two questions arose.

1. What is the payoff of all sorts of digital trawling without reasonable suspicion?

2. Can anyone can actually opt out of all that digital trawling of the likes of PRISM or TEMPORA?
[Note: you find an answer to the second question at the end of this post.]

Continue reading ‘Information Security: YES, YOU CAN!’

Who owns data PRoperties in view of Information Security Measures?

The media currently ventilates a lot of heat about boundless governmental spying activities whereas the most citizens stay astoundingly calm.
As I however see the debate on PRISM and whatever emerges nowadays it goes back to a very old issue: code versus data.

Code belongs to an entity in order to work on data obtained from any valid source. Code emanates and absorbs data. Data can be ported much easier to any other code base than the code itself. But code itself is effectively useless without data.
Continue reading ‘Who owns data PRoperties in view of Information Security Measures?’

Why the Pirate Party does not appeal to German voters in 2013 (probably)

Germany is about to go to the ballot boxes this year on September 22nd. Piratenpartei Deutschland Logo

One party caught my interest as they serve the Germany’s nerds: the Pirate Party.
But since their first and much applauded appearance on the political scene of the European parliament in 2009, the Berlin Senate in 2011 and several other German regional parliaments the party’s fortune has changed.

Executives come and go, shame-flame one another. Today, the party appears as a vanity fair to the outsider, or better, a feast of hurt feelings served cold.

Continue reading ‘Why the Pirate Party does not appeal to German voters in 2013 (probably)’

Top Clicks

  • None