@publicvoit@graz.social cover
@publicvoit@graz.social avatar

publicvoit

@publicvoit@graz.social

The PIMfluencer

Bio: https://karl-voit.at/about/

Influencing myself all the time.

Hide my German posts via selecting your preferred language(s) via:
Preferences→Other→Filter languages

Mutes accounts that are using CWs without meeting my definition of "warning".

Stands with 🇺🇦

#PIM #FOSS #Emacs :emacs: #orgmode :orgmode: #Orgdown #bicycle #decentralization #security #privacy #Austria #Graz :graz:

Joined Mastodon 2017-11

Indexed on tootfinder

NOT political correct!

This profile is from a federated server and may be incomplete. For a complete list of posts, browse on the original instance.

publicvoit , to random German
@publicvoit@graz.social avatar

Ich finde es wirklich schade, dass in der Öffentlichkeit die immer so negativ dargestellt wird.

Der behindert uns dort, der Datenschutz macht nur Arbeit, der Datenschutz ist umständlich, ...

Dabei wird vergessen, dass die der unsere persönlichen Daten schützt! 🛡️

Dort, wo der Datenschutz Probleme verursacht, ist vermutlich auch das zugrundeliegende Geschäftsmodell problematisch. ⚠️

Und die korrekte Umsetzung der DSGVO für Firmen ist auch nicht sooo kompliziert.

publicvoit , to random
@publicvoit@graz.social avatar

More and more previews stop working these days. Current example: my feed aggregator.

I want to emphasize that I've warned about that years ago:

Don't Contribute Anything Relevant in Like Reddit, , and for most parts of my arguments even :
https://karl-voit.at/2020/10/23/avoid-web-forums/

ALT
  • Reply
  • Loading...
  • publicvoit , to random
    @publicvoit@graz.social avatar

    Russian Hackers Breach Microsoft
    https://www.techopedia.com/news/russian-hackers-breach-microsoft-expert-analysis

    After Chinese(?) hackers infiltrated & most probably all connected systems for years without being noticed, the Russians do seem to have stolen important source code.

    Takeaways: isn't able to protect their most important assets. They don't even notice hackers in their systems for a long period of time. When your threat model relies on secret source code, you're not coding good .

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines