window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Authorization

A G I O S
  • Apple ID mutiert zum Apple Account

Apple ID mutates into Apple Account – A step with hidden intentions?

2024-03-24T13:31:00+01:00Categories: Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Apple ID mutates into Apple Account - Apple changes its strategy: Apparently, the US company is about to make a huge move by significantly changing its Apple ID. Not a marketing gag but, as always, a significant strategic move by Apple Starting this fall, Apple plans to convert the Apple ID into the Apple Account. This is definitely not a marketing gimmick. Nor is this a frivolous decision, but rather one that the company has prepared very carefully, as always. Apple stands for innovation and continuous improvement of the user experience. With the planned changeover from the "Apple ID" to the "Apple Account", the company is signaling its continued commitment to user-friendliness and data protection.

  • Ghostbusters Attack - Facebooks Geheimkrieg & Lausch-Attacken

Ghostbusters cyber attack – Facebook’s secret war & eavesdropping attacks

2024-03-28T11:39:04+01:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Snapchat users eavesdropped on by a man-in-the-middle attack by Facebook - Facebook has probably deliberately bypassed Snapchat encryption. As part of a class action lawsuit against Facebook, documents have now been made public that once again provide explosive material in the Facebook scandal surrounding data protection and data sovereignty. Facebook's action against Snapchat was probably more aggressive than ever thought.

  • Identitätsmanagement und Vertrauensmodelle in digitalen Infrastrukturen

Identity management and trust models in digital infrastructures

2024-02-01T09:43:03+01:00Categories: IT infrastructure, IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Identity and access management and trust models in digital infrastructures are the invisible architectures that hold our digitally networked world together. In an era in which our lives increasingly take place online, complex networks interacting with digital identities, protocols and standards form the basic technical infrastructures that we use every day. And in the middle of it all: trust-based identities.

  • v.l.n.r.: Christiane Fritsch, Luise Kranich, Thomas Lohninger, Uwe Kraus, Anja Lehmann, Peter Parycek, Brian Behlendorf, Torsten Loddersteddt, Ulrich Weinberg, Ariane Jäger - copyright Felix Adler

SPRIND prototyping competition for digital wallets

2024-05-30T18:29:28+02:00Categories: Prototyping|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

In the first nomination round of the prototyping competition in SPRIND's EUDI Wallet Prototypes innovation competition, 6 teams were nominated. A remarkable milestone for digital identities and an efficient approach to developing digital technologies. This competition clearly differs from traditional public tenders due to its prototypical approach and emphasizes the importance of agile and user-centric software applications.

  • Zero Trust - Jenseits von VPN: Warum das Virtual Private Network im Schatten von Zero Trust steht

Zero Trust – Beyond VPN: Why the Virtual Private Network is in the Shadow of Zero Trust

2023-12-08T08:57:26+01:00Categories: Cryptography, IT infrastructure, IT Security, Podcast, Software Architecture, Software development|Tags: , , , , , , , , , , , , , , , , , , , , , , |

Zero Trust - Beyond VPN: Why the Virtual Private Network is in the Shadow of Zero Trust - Easy to Understand: A Compact Guide to a Zero Trust Strategy Based on the Zero Trust Framework In this fifth Rock the Prototype Podcast episode, it's all about the revolutionary topic of IT security: zero trust. We wonder why the tried-and-true Virtual Private Network (VPN) is increasingly taking a back seat in the age of Zero Trust. Learn why implementing a Zero Trust approach requires new alternatives and how modern technologies can complement or even replace VPN. Dive into full of insights around IT and innovation.

Go to Top