Plenty of services use a standard email-address as login token. This has advantages: The user doesn’t need to remember another keyword and the service provider knows that the email address is unique and can be verified. But there’s one BIG problem: Other people know your email-address and – with it – 50% of your login credentials. How to to eat the cake AND eat it? Read More →

Here is the general idea: I wanted to have a record player that looks nice, spins at the appropriate rpm, is able to display matching labels and where the tone arm tracks the playing song in real time – in other words – the record should end depending on the length of the song.  All of that should work without any interaction.

Read More →

In March 2015, it became publicly known that Hillary Clinton, during her tenure as United States Secretary of State, had used her family’s private email server for official communications, rather than official State Department email accounts maintained on federal servers. So – Let’s talk a little bit about Clinton’s emailgate. Read More →

Here’s the situation: The San Bernardino shooter was in possession of an iPhone. It is locked and will delete all  of its content  after 10 unsuccessful tries. The government went to Apple and asked for help unlocking the phone. The only way that this is supposed to be possible is a special knit update for this particular phone would allow the government an unlimited number of tries to get the phone unlocked. Read More →