Germany is not actually technophobic. As a country, we are looking back to a long tradition of embracing technology and innovation. A lot of the German technophobia you are seeing today has been created by German newspapers, notably the Springerpresse.
[Google and Facebook] hold on online spending has created a digital duopoly that is upending the advertising business. In 2015 they accounted for 75 per cent of all new online ad spending, according to Mary Meeker of Kleiner Perkins Caufield & Byers, the US venture capital fund. Several analysts estimate that excluding Google and Facebook, the digital ad industry actually shrank in the first half of 2016.
The root cause for German Internet policy stances, current law and the general hysteria versus all things Google, Facebook/WhatsApp, Apple, Ebay and Microsoft in the end come down to that single observation above. From that root comes the defensive position of German Springerpresse, and from their influence on German politics comes the current policy.
Understanding that is the key to successful influence on German politics.
Individual Network e.V. was a NGO of NGOs, a construct where local citizen network NGOs could be members. Individual Network would then make contracts with the German Science Network DFN and other providers and buy traffic rights in bulk, in order to allow its members to use this traffic for non-commercial, private use.
In order to allow local NGOs to connect to the German Science Network DFN locally using the local university lines, Individual Network had to have some connection to DFN in order to be a member and customer. In the end it was decided that Individual Network would finance two X.25 lines into DFN at 50% each, with the local NGO taking the endpoint financing the other half.
That is how the NGO I represented, Toppoint Mailbox e.V., ended up with a 9600 bps X.25 line on 1.10.1992. This ended the era of long-distance dialup at Toppoint Kiel (well, not quite) and introduced a permanent link to the Internet.
That was well before the first web servers, so SMTP, NNTP and FTP were the order to the day. People connected to Toppoint using dial-up modems, ISDN dial-ups or semi-permanent (pre-conncted) ISDN dialups. Speeds were up to 128 kbps, using channel bundling.
I had a PI/24 those days, for home use, costing me 50 DM, one time.
Also, people reminded me of …!mcshh!tpki!kriski!kris. Yes, we did not use DNS back then, but had to name all hosts in the path of a mail. And hostnames are globally unique (yep, that scales even less than IP V4).
Using electronic devices in the classroom seems to be a topic older than time, and the implementation often involved a lot of tedium. The problems and possible solutions are well understood in Germany (report about LTSP among other things), but the (purposefully) fragmented market for education in Germany is getting in the way here.
Biggest problem usually is keeping the machines clean and orderly, and keeping the data available across device loss. Children and teachers seem to be installing a lot of questionable software and extensions, and getting rid of these by setting up the machine seems to be the only way to be sure. So any school installation usually focuses on automatic fast imaging of the machines, and on server-side data storage for everything to make sure nothing is lost when a machine is lost or re-imaged.
Google is using a strategy called “Federated Learning” to keep privacy sensitive data being used for AI purposes private. They basically download a preliminary model to the phone, modify the data with the observed behavior on the phone and upload the diffs back to Google Cloud, where they merge it to the existing data.
Apple uses “Differential Privacy“, where they add noise to the data so that observed privacy sensitive data observed in the cloud for one user may or may not be actually true, but individual noise contributions even out statistically over the whole data set.
Meanwhile, #neuland talks about Datenkraken and does… nothing?
But he is also a Gamer, and he reviews Prey (The review is 100% Spoiler, if you care about these things) and in particular the story, the storytelling mechanisms used and their relationship and adequateness for the themes the game touches.
I know nothing about Prey, and am also only mildly interested. But the style of discussion and the view on story and storytelling was reminiscent of literature or theater criticism and review, the kind you get when you listen to Deutschlandradio or NDR Kultur over breakfast.
In a way, #neuland again, because this is precisely not how “high culture” in Germany deals with modern media – but it should.
The episode underscores the folly of the U.S. law enforcement demand that tech companies install backdoors into their devices and services.
the WSJ comments. This time the leak is an unintentional backdoor the NSA used to get onto devices. The NSA used the Vulnerabilities Equities Process to determine that ETERNALBLUE is burnt and informed Microsoft, which then promptly generated an urgent critical patch, which did not make it out to systems in the field fast enough.
There is little difference according to the WSJ between flaws being used as government backdoors, and intentional government backdoors, which may be detected and abused, or leaked. So this whole Wannacry(pt) thing is a very good example of what will happen with Government mandated backdoors in systems.
Holger Köpke got a USB stick (article in German) that supposedly is from data center equipment maker Rittal, unsolicited, in the mail. Of course he did not plug it into a device, it could be anything.
He then (from his first comment in the same article) set up a test VM on a scratch device, inserted the USB stick there and the stick identified not as USB memory, but as a USB HID, a keyboard. Seemed that he was right not to trust it. Sends a mail to Rittal explaining them why he thinks this is dangerous, and asks if this is indeed legit.