🔗️ Just another public link collection for privacy, security, and tech stuff

Clean authorization control in serverless functions
Learn to properly structure your serverless code to achieve perfect authorization through a simple example use case

Top instant money provider service hacked, over a million users possibly affected
Ingo Money confirms breach but doesn't share further details

Microsoft: Hässlicher Weihnachtspulli mit Windows-XP-Wiese
Microsoft bringt die sechste Auflage seines Ugly Christmas Sweaters. Auf Karl Klammer folgt Bliss – so der Name des ikonischen Windows-XP-Hintergrundbildes.

Mobile Phones And The Question Of Declining Sperm Quality
In a world increasingly reliant on technology, a pressing question arises: can our dependence on gadgets, particularly mobile phones, be affecting our health in unexpected ways? A growing body of rese...

Single-piece Tank Chassis Goes Robotic
[EXTREME3DPRINT] has a new version of their print-in-place tank chassis: the PiPBOT now accepts drop-in motors (in the form of 360° rotation servos), RC receiver, and battery pack to make a functiona...

Low-Power Wi-Fi Includes E-Paper Display
Designing devices that can operate in remote environments on battery power is often challenging, especially if the devices need to last a long time between charges or battery swaps. Thankfully there are some things available that make these tasks a little easier, such as e-ink or e-paper displays which only use power when making changes to the display.

Azure Homelab
For those who asked, yes, the #AzureArc, #AzureStackHCI, #AzureIoT lab is very much alive and kicking 🤟🏻 I also published the spec a while back, enjoy 🤓

Innenraum-Luftqualität: Ikea bringt smartes Messgerät auf den Markt
Innenraum-Luftqualität: Ikea bringt smartes Messgerät auf den Markt

Wie gefährlich sind diese QR-Codes?
Der Bedarf an bequemen und kontaktlosen Transaktionen führte zu einer weit verbreiteten Verwendung der Quick-Response-Technologie (QR-Codes). Was übersehen wurde: Die übermäßige Abhängigkeit von der QR-Code-Technologie ist mit Risiken neuer Cyber-Bedrohungen verbunden. Wie kann man sich schützen?