buc.ci is a Fediverse instance that uses the ActivityPub protocol. In other words, users at this host can communicate with people that use software like Mastodon, Pleroma, Friendica, etc. all around the world.
This server runs the snac software and there is no automatic sign-up process.
Es gibt aktuell kein echtes Cloudflare-Äquivalent in Europa.
Warum?
Weil Cloudflare nicht „nur CDN“ ist, sondern ein integrierter Stack:
DNS + SSL + Reverse Proxy + Edge + Security – und das im Free-Tier.
Europäische Anbieter wie Bunny, OVH oder Gcore sind stark – aber jeweils nur Bausteine:
Wer Cloudflare ersetzen will, baut eine Architektur aus mehreren Komponenten – und übernimmt selbst die Integration.
Bequemlichkeit vs. Souveränität.
#Cloud #CDN #DigitalSovereignty
Wir patchen unsere Server zu Tode, aber am Ende öffnet jemand ein ".vbs"-File in WhatsApp Desktop. Game over. (wirklich so schnell!)
Der aktuelle Microsoft Defender Report zu einer neuen WhatsApp-Malware-Kampagne ist ein Lehrstück in Sachen "Living off the Land" (LotL). Während wir nach neuen, komplexen Exploits suchen, nutzen die Angreifer einfach das, was auf Windows-System tooltechnisch von Haus aus gegeben ist... und tarnen es so gut, dass selbst erfahrene Admins zweimal hinschauen müssen.
Das Problem: Social Engineering trifft auf System-Tools. Die Attacke startet nicht auf dem Handy, sondern dort, wo wir uns sicher fühlen: am Arbeitsplatz. Per WhatsApp kommen schädliche VBS-Skripte (Visual Basic Script). Wer klickt, startet eine Kette, die so "stealthy" ist, dass sie fast schon wieder elegant wirkt 😏
Die technische Wunde: Die Tarnkappen-Taktik. Die Angreifer nutzen keine offensichtliche Malware, sondern verbiegen das System:
#Masquerading: Legitime Windows-Tools wie curl.exe und bitsadmin.exe werden in versteckte Ordner kopiert und in netapi.dll oder sc.exe umbenannt. Die PE-Metadaten bleiben gleich, aber der Name täuscht simple Systemaktivität vor.
#Cloud-Weaponization: Die Payloads liegen auf AWS, Tencent oder Backblaze. Wer filtert schon legitimen Cloud-Traffic komplett weg?
UAC-Bruteforcing: Das Skript versucht so lange mit Admin-Rechten zu starten, bis der User genervt auf "Ja" klickt oder die Registry-Einträge für UAC-Prompts im Hintergrund manipuliert wurden.
Die Lösung: Härtung statt nur Detektion, denn leider reicht ein reiner Virenscanner hier nicht, wenn das Tooling "legit" ist.
What to do:
1️⃣ Script-Execution blocken: wscript.exe und cscript.exe haben in User-Verzeichnissen (besonders AppData oder ProgramData) nichts verloren.
2️⃣ Metadata-Monitoring: EDR-Tools müssen auf Diskrepanzen zwischen Dateiname und OriginalFileName in den PE-Headern triggern.
3️⃣ User-Education: WhatsApp ist im Business-Kontext ein riesiger blinder Fleck. Anhänge dort sind genauso kritisch zu prüfen wie E-Mail-Attachments.
Am Ende landet ein unsigniertes MSI-Paket auf dem Rechner, das via AnyDesk den direkten Remote-Zugriff erlaubt. Die Backdoor ist offen, und der Angreifer sitzt mit im Büro 🫱🏻🫲🏾 Zeit für eine weitere Tasse Kaffee...
#Cybersecurity #ThreatIntelligence #MicrosoftDefender #LivingOffTheLand #InfoSec
If you are attending #RSAC this year, Alex Pinto and I are presenting session CLS-W09 "The Impact of Security Usability Challenges in Cloud Environments".
We will present research that reviews 500+ organizations and 5,000+ distinct #cloud environments that demonstrate how the available secure configuration options are being used and reveals how usability, standardization choices in UI / #UX can shape #security outcomes.
Learn more and register now at https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755192044047001WRoa
📺 https://peer.adalta.social/w/6BWgzcEPiCDKWRWo8NEvuy
🔗 [🇩🇪🇺🇸🇫🇷](https://adalta.info/articles/prstn_microsoft_116323685646568155_fr)
🔗 [ℹ️](https://www.heise.de/news/iX-Workshop-Mastering-Azure-Administration-der-Azure-Cloud-Services-11219181.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&utm_source=mastodon")
Une opportunité stratégique pour consolider l'expertise dans l'environnement Azure.
Did a quick video on the #cybersecurity breach of FBI Director, Kash Patel's e-mail and why you could be next.
#cybersecurity #infosec #servers #vps #servers #email #hackers #vulnerabilities #opensource #cloud #microsoft #google
https://www.youtube.com/watch?v=1o6TK-QjTPw&feature=youtu.be
I teach cybersecurity. And I genuinely don't know what to tell my students after this one. Federal reviewers spent years trying to get basic encryption documentation from Microsoft for its GCC High government cloud. They couldn't get it. One reviewer called the system a "pile of spaghetti pies," with data traveling from point A to point B the way you'd get from Chicago to New York: a bus to St. Louis, a ferry to Pittsburgh, and a flight to Newark. Each leg is a potential hijacking. They knew this. They said this out loud in writing. Then they approved it anyway in December 2024, because too many agencies were already using it. 🔐 That's not a security review. That's a hostage negotiation. Two things in this story should make every CISO and CIO uncomfortable:
🧩 Microsoft built its federal cloud on top of decades of legacy code that it apparently can't fully document itself
👮 "Digital escorts" often ex-military with minimal software engineering backgrounds are the firewall between Chinese engineers working on the system and classified U.S. networks 🤦🏻♂️
The scariest line in the whole ProPublica investigation isn't the "pile of shit" quote. It's this: FedRAMP determined that refusing authorization wasn't feasible because agencies were already using the product. Read that again. The security review process reached a conclusion based on sunk cost, not risk. Ex Post Facto Fallacy
If that logic holds, the compliance framework is just documentation theater. And right now, CISA is being hollowed out, so there are fewer people left to even run the theater.
https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/
#Cybersecurity #Microsoft #FedRAMP #Leadership #RiskManagement #security #privacy #cloud #infosec
Gestern Abend hat wieder jemand erfahren, dass die #Cloud auch nur der Computer von jemand anderem ist.
Account von Unberechtigten übernommen. #microsoft verweigert die Rückübertragung. 26k Mails für Fremde einsehbar. Adressbuch aus Outlook weg. Daten unverschlüsselt in der Cloud weil MS den Leuten suggeriert, das wäre okay.
Cloud ist okay. Wenn man darüber nachgedacht hat und weiß, wie man sich absichert. Einfach alles quasi aus Versehen zu nutzen was die Techbros einem anbieten, ist jedenfalls ein sicherer Weg, doll auf die Nase zu fallen.
"For years, reviewers said, Microsoft had tried and failed to fully explain how it protects sensitive information in the cloud as it hops from server to server across the digital terrain. Given that and other unknowns, government experts couldn’t vouch for the technology’s security.
Such judgments would be damning for any company seeking to sell its wares to the U.S. government, but it should have been particularly devastating for Microsoft. The tech giant’s products had been at the heart of two major cybersecurity attacks against the U.S. in three years. In one, Russian hackers exploited a weakness to steal sensitive data from a number of federal agencies, including the National Nuclear Security Administration. In the other, Chinese hackers infiltrated the email accounts of a Cabinet member and other senior government officials.
The federal government could be further exposed if it couldn’t verify the cybersecurity of Microsoft’s Government Community Cloud High, a suite of cloud-based services intended to safeguard some of the nation’s most sensitive information.
Yet, in a highly unusual move that still reverberates across Washington, the Federal Risk and Authorization Management Program, or FedRAMP, authorized the product anyway, bestowing what amounts to the federal government’s cybersecurity seal of approval. FedRAMP’s ruling — which included a kind of “buyer beware” notice to any federal agency considering GCC High — helped Microsoft expand a government business empire worth billions of dollars."
https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government
#Microsoft #FedRAMP #USA #Trump #CyberSecurity #Cloud #CloudComputing
Question about personal cloud storage.
I've been using dropbox for years but I'd like to switch to a non-US alternative.
What are some good free based cloudstorage options for personal use?
I was looking at Icedrive but I'm not sure about it 🤔
#Recommend #Cloud #CloudStorage #PersonalUse #Dropbox #Alternative
Great #video by @garyhtech on why #BSD will never own the cloud.
#Linux owns the #cloud and frankly I'm fine with that. #FreeBSD doesn't need to compete with Linux in this area. It may not have the massive ecosystem, but given its strengths, it functions just fine for back end #infrastructure, in general and niche use cases.
People frequently tout FreeBSD for #ZFS and #Jails but honestly I think #Ports and #Poudriere are huge selling points
This is going to be an ongoing trend of high #computing #cloud prices. Pivoting to private and self managed #cloud is going to this year's #datacenter #business trend.
Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.
---
A federal program created to protect the government against cyber threats authorized a sprawling Microsoft cloud product, despite the company’s inability to fully explain how it protects sensitive data.
https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government?utm_source=mastodon&utm_medium=social&utm_campaign=mastodon-post
#News #Microsoft #Cybersecurity #Government #Technology #Tech #Cloud
This is having a huge impact on the #cybersecurity industry with ripple effects being felt around the world with #china increasing #security. The only way to be secure is to use #opensource since with #cots solutions you can never be sure what the hardware/asic/firmware is really doing. #finance #business #investing #cloud
🚨 A major change in federal cybersecurity quietly took place. The General Services Administration, which handles government purchasing, has updated its IT security rules to match the Department of Defense’s strict CMMC standards. For federal contractors, simply checking boxes isn’t enough. 🛡️
If you work with Controlled Unclassified Information, strong security is now a must for government contracts. The GSA now expects Zero Trust principles 🔒, including proof of encryption, multi-factor authentication, and ongoing monitoring. This change also carries legal risks ⚖️ if you can't demonstrate real compliance, your company could face lawsuits under the False Claims Act.
📑 The GSA now requires CMMC-level security documentation for contracts with civilian agencies.
⏱️ These compliance requirements apply right away to new contract opportunities and awards.
⚠️ Federal contractors now face greater legal risk if they misrepresent their cybersecurity readiness.
✅ Zero Trust data principles are no longer just a best practice; they're now required as the standard.
https://www.forbes.com/sites/emilsayegh/2026/02/07/a-quiet-policy-shift-just-redefined-entire-federal-cybersecurity-landscape/
#FederalContracting #ZeroTrust #CyberCompliance #GSA #security #privacy #cloud #infosec #cybersecurity
God I hate how much the 'recent' folder in Apple macOS has screwed up people's knowledge of where files are stored.
Most beginning to intermediate computer users have no idea where their files are, how to find them, or how to organize them.
Also, automatically forcing people to save onto the Cloud rather than their computers in a way that automatically limits their storage capacity and degrades their user experience is wrong.
The price increase from Hetzner made me rethink my personal infrastructure ..
- Migrated last service off an old auction server
- Moved the content of my StorageBox to my FreeBSD ZFS
- Migrated and cancelled a CPX42 VPS instance
- Migrated and cancelled a CAX21 VPS instance
One more CX23 is currently in the process of being virtualized on my Proxmox cluster.
The Mastodon instance burningboard.net is still running there as cloud instances. But the price of those resources will only increase by ~4€/Month and I don't want to migrate it again (Just moved on the current system in December 2025)
So in the end, the Hetzner bill will be considerably lower in the future, since I reduced my infrastructure footprint by a lot and consolidated things on my bare metal servers in a CoLo datacenter 🙂
Sometimes a trigger like that can break through the laziness and have a positive outcome 🥳
#selfhosting #hetzner @hetzner #proxmox #infrastructure @tux #cloud
Ich werde meinen Kindern durchaus Windows und macOS zeigen – nicht um sie daran zu gewöhnen, sondern um ihnen zu erklären, was da wirklich passiert. #Telemetrie, die sich nicht vollständig abschalten lässt. Datenschutzoptionen, die wie echte Kontrolle aussehen, aber vor allem der Beruhigung dienen. Und überall das sanfte Schubsen Richtung #Cloud, Microsoft-Konto, Apple-ID. Das nennt sich #Nudging – und es ist kein Zufall, sondern Teil des Designs. Wer das einmal durchschaut hat, sieht solche Systeme nicht mehr als Werkzeug, sondern als kontrollierte Umgebung im Interesse des Anbieters.
/kuk
The digital town square is getting a upgrade ito defend against synthetic reality. YouTube just announced the expansion of AI-assisted deepfake detection tools, specifically prioritizing politicians and journalists. This move acknowledges the truth that voices and faces can be cloned in seconds and we need more than just manual reporting to survive.
The system uses a combination of facial recognition and audio analysis to identify content that has been manipulated. While no tool is perfect, this is a major step toward protecting the integrity of public discourse. You should watch how these tools evolve, as the ability to verify what is human and what is synthetic will soon be the most valuable currency on the internet.
🧠 YouTube is expanding its detection algorithms to automatically flag synthetic likenesses.
⚡ The tool focuses on protecting individuals most likely to be targets of misinformation campaigns.
🎓 Content creators must now disclose when they use generative AI to depict real people.
🔍 This expansion is part of a broader industry push to secure the 2026 election cycle.
https://www.theverge.com/ai-artificial-intelligence/891678/youtube-is-expanding-its-ai-deepfake-detection-tool-to-politicians-and-journalists
#Deepfakes #AIGovernance #DigitalIntegrity #MediaPolicy #security #privacy #cloud #infosec #cybersecurity #DeepFakes
The honeymoon phase of AI-driven productivity is meeting the harsh reality of system stability. Amazon has officially updated its internal policies to require senior engineers to sign-off for any code changes assisted by generative AI. This move follows a series of significant service disruptions—referred to internally as "high blast radius" incidents—where AI-generated code led to major product outages.
For a company that values speed and a "you build it, you run it" culture, this is a massive shift. It turns out that while AI can write code in seconds, the cost of an error at AWS scale can be measured in hours of downtime and millions in lost revenue. We are seeing a necessary correction: AI is a powerful assistant, but it cannot yet be trusted with the keys to the kingdom without a seasoned human expert verifying the logic.
🧠 Amazon now mandates senior review for all AI-assisted code deployments.
⚡ The policy change follows a spike in high-priority Sev2 incidents.
🎓 Senior engineers must now act as the ultimate "bar raisers" for synthetic code.
🔍 This internal friction highlights the hidden costs of AI-driven development.
https://arstechnica.com/ai/2026/03/after-outages-amazon-to-make-senior-engineers-sign-off-on-ai-assisted-changes/
#EngineeringManagement #CloudComputing #GenerativeAI #security #privacy #cloud #infosec #cybersecurity
📺 https://peer.adalta.social/w/hPPyaEb1ejbRXxb33ySk41
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_JKHEDYNA/1)
🔗 [ℹ️](https://my.matterport.com/show/?m=NvGiKXi31Yg")
Matterport's 3D digital twins are evolving from marketing novelties into core operational infrastructure for capital-intensive facilities.
📺 https://peer.adalta.social/w/2qhLy9Rsnjg1sFRM76Vmmn
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_JKHEDYNA/1)
🔗 [ℹ️](https://my.matterport.com/show/?m=NvGiKXi31Yg")
Virtuelle Rundgänge transformieren physische Infrastrukturen in multifunktionale digitale Assets.
Office.eu launches as 100% European-owned alternative to Microsoft 365/Google Workspace, built on Nextcloud/Collabora with EU-only data centers. 🧩
Aims for digital sovereignty amid Big Tech data scandals and US CLOUD Act risks, offering docs, email, calendars, and video on open-source stack. 🛡️
🔗 https://www.siliconrepublic.com/enterprise/office-eu-and-the-want-for-a-digitally-sovereign-europe
#TechNews #OpenSource #Privacy #Security #Government #Europe #EU #IT #Microsoft #Office #Tech #Cloud #FOSS #Linux #OfficeEU #DigitalSovereignty #Nextcloud #US #Google #BigTech
Verteuerte Hardware: KI-Konzerne verhindern den Ausstieg aus der Cloud
Es bewegt sich auf ein Cloud-Lock-In zu. Hardware wird immer teurer, wenn man sie überhaupt bekommt. Das gefällt natürlich den Anbietern für Clouddienste und Hyperscalern.
If you use #AWS and #EC2 you must be rich or poor at #investing is what wholesale pricing tells us.
For just under about 100Gbit of data transfer look at how much the #cloud will cost?
It reminds of the time where people believed "pay per minute" on the cell phone was getting you better pricing.
Of course I cannot share our costs we could sell multiple factors more bandwidth to our clients for $157K USD per month!
@mergy Sorry to hear about this, you are not alone with #cybersecurity and #abuse issues. I find most of these situations are either hacking attempts or competitors. If you are getting hit hard and there is no ransom, it is often something personal or competition related.
What makes me angry is to see which #networks these come, most of the time they are public #cloud providers who ignore #abuse complaints about #DDOS and #Hacking.
Rule number one
The species of homo sapiens can be so ignorant
Our team has been reviewing a multi 100G #DIA deployment for a client project in the US. The US works well for projects which do not require #privacy or #cybersecurity
We are also able to offer a superior private, dedicated DIA internet solutions for things like #AI #Kubernetes #Docker for a fraction of the price as insecure and shared #Cloud services.
It is still critical to choose smart locations and providers in the US for the best performance and reliability.
#Iran admits to striking the #AWS #Cloud #datacenter in the #GCC country of #Bahrain due to its infrastructure being used in the war against Iran.
It is clearly the same reason why the two datacenters in the #UAE were targeted as well.
If you are in the #GCC #Gulf area you need to make sure your infrastructure is located locally on non-US controlled and affiliated infrastructure.
This why a lot of smart companies and individuals have dealt with #Techrich.
Today I've been having trouble accessing the Microsoft 365 Admin Portal (https://admin.microsoft.com/Adminportal/), because it seems that "res.cdn.office.net" is being blocked by Google Safe Browsing. Can anybody confirm this?
I remember the good old days.
Every company had its own server room and multitudes of folks like me not only had a job, but were available to provide a two banana and three banana level advice to the company for free...
...these days when a company wants quality IT expertise they have to pay hourly rate through their nose, and their "infrastructure" is in the big, bad, planet eating #datacentre owned by a billionaire (which is what a #cloud is)
This is the risk when using #public #cloud services that you don't control. Sometimes systems become so large that it is too difficult to differentiate from a real DDOS attack from legitimate traffic spikes and patterns. I'm still shocked at how many large companies use public services like a shared #CDN:
Wie gelingt der Zugriff auf #Wechselrichterdaten ganz ohne Cloud?
Wer ein #Balkonkraftwerk hat, interessiert sich sicherlich für die laufende #Energieerzeugung. Viel zu oft benötigt man dafür eine App mit #Cloudverbindung ins Internet. Für die lokalen #Datenverarbeitung im #Heimnetzwerk ist das unerwünscht. Ich konnte meinen #Wechselrichter direkt ins #WLAN hänge und die #Cloud deaktiveren.
Vous uploadez, il compresse, Nextcloud sourit ✅
Le guide complet pour l'optimisation automatique des médias est arrivé ! Un script universel, des workflows aux petits oignons et vos précieux gigas préservés, même sur du matériel reconditionné 📦🔥
Le Step-by-Step complet est ici :
🔗 https://wiki.blablalinux.be/fr/optimisation-automatique-medias-nextcloud
Often, we entrust a single company with the keys to our entire lives. Conduent is one of those companies and they manage the vast digital paperwork for government agencies and state payrolls. This week they lost 12 billion records. It is the largest data failure in history, and we built a system with a single point of failure. Thieves now have the data to file for your tax refund or steal your benefits. The volume of this leak means your identity is likely available for sale. You must act to protect your money before a criminal uses your name.
🧠 12 billion records leaked from government service portals.
⚡ Social Security numbers and bank details are now public.
🎓 Criminals use this data to intercept unemployment checks.
🥶 Freeze your Credit NOW to stop identity thieves from opening new loans‼️
https://gizmodo.com/likely-the-largest-breach-in-u-s-history-what-you-need-to-know-about-the-conduent-fiasco-2000725930
#DataBreach #Privacy #CyberSecurity #security #privacy #cloud #infosec #cybersecurity
Google is fixing a big problem that most people don't realize we have. Our current encryption relies on math that quantum computers will eventually break, very easily. To prevent future hackers from reading today's data, Google is deploying post-quantum cryptography within HTTPS certificates.
This change uses the ML-KEM algorithm to protect connections. By changing how keys work, Google protects your private information before quantum computers can access it. Security is about winning the race against a threat that does not exist yet. 🔐
🧠 Google is using ML-KEM to protect HTTPS certificates from future quantum attacks.
⚡ Engineers use hybrid key exchanges to maintain compatibility with older systems.
🎓 Post-quantum cryptography protects data stolen today from being read in a decade.
🔍 The shift helps define new global standards for internet privacy.
https://arstechnica.com/security/2026/02/google-is-using-clever-math-to-quantum-proof-https-certificates/
#QuantumSecurity #Google #Encryption #security #privacy #cloud #infosec #cybersecurity
I spent the evening as a part of the Evanta Chicago CIO Inner Circle. As a Gartner company event, the room was filled with leaders navigating a tough 2026 budget cycle. We moved past the honeymoon phase of new tech to discuss how to turn high expectations into measurable financial results, all centered around AI, of course.
The consensus was clear. We cannot rely on static plans when the market moves this fast. Success depends on our ability to shift resources toward tools that actually address business bottlenecks.
🧠 AI adoption needs a single owner to bridge the gap between IT and the board.
⚡ Pivot your strategy the moment a project stops showing value.
🎓 Operational resilience requires a better way to calculate risk.
🔍 Focus on finding revenue gains instead of just saving time.
https://www.evanta.com/cio/chicago/chicago-cio-inner-circle-9277
#Chicago #CIO #Gartner #Leadership #CTO #CISO #AI #security #privacy #cloud #infosec #cybersecurity #Evanta #Gartner
@RHR_International
Another part of the world, the Caribbean, is rethinking whether or not dependency on US-based cloud infrastructure is a wise move.
#digitalsovereignty #cloud
https://www.caribbeanlife.com/data-nullius-and-the-caribbeans-search-for-digital-sovereignty/
Marco Rubio warnt vor „Daten-Lokalisierung“. Das heißt: Daten sollen im Land bleiben. Die USA nennen das „Störung“. Ich nenne es digitale Selbstverteidigung. Wer unsere Verwaltung, Schulen und Firmen an US-Clouds kettet, macht uns erpressbar. Genau darum ist der Digital Independence Day wichtig. Wir brauchen eigene System, Infrastruktur und Wege.
#CCC #Cloud #Souveraenitaet #DigitalIndependenceDay #DIDay #EinfacheSprache
As expected, cloud providers have started increasing their prices because of the AI bubble.
This time it's Hetzner
https://www.hetzner.com/pressroom/statement-price-adjustment/
@carnage4life I keep quoting a variation of this thought to colleagues, because I think it helps us each frame our situation:
The impact to expect from AI tends to be predicted by one's reaction to hearing that junior team members are shipping to production at 20x their previous rate.
I have to admit, I'm noticing "20x junior DevOps" outcomes across most cloud services I interact with, lately.
I'm personally looking for alternatives to those services, but it takes time to switch. I might microblog on that journey later.
But I'm certainly not angry at any of the up-and-coming 20x junior DevOps folks! We need them!
But I do also look forward to when they mature into 1x senior DevOps folks.
Redhat has a open source tool to tell you the status of your digital sovereignity
https://www.feedback.redhat.com/jfe/form/SV_1LGSam42lrM4Ddk
#programming #technology #Linux #redhat #cloud #networking #OpenSource #mathematics
ICE triples Azure data usage to 1.4PB (Jul'25-Jan'26), leans on AI Vision/Video Indexer for surveillance amid facial recognition, phone trackers, drones. ☁️
Reports challenge Microsoft's "no mass surveillance" stance despite contracts; employee concerns rise as policies clash with ICE enforcement reality. ⚖️
#TechNews #Privacy #Cybersecurity #Surveillance #AI #Cloud #Azure #Microsoft #ICE #DigitalRights #DataProtection #Ethics #FOSS #US #USA #Police #Trump #USpol
Nextcloud Hub 26 vorgestellt. Der Weg zur echten Datensouveränität https://fosstopia.de/nextcloud-hub-26-winter/ #Cloud #CloudComputing #Nextcloud #NextcloudHub #NextcloudHub26 #NextcloudHub26Winter
Watching humanoid robots take the stage at the Lunar New Year celebration in China 🇨🇳 means a shift in our relationship with robots. You might think of robots as stiff tools confined to factories. Buckle up... These machines show a level of coordination that mirrors our own biology. 🤯 The speed of development is incredible. It took decades to teach a machine to walk. We are now seeing them dance and interact in front of millions of people. This transition means the gap between high-level computation and physical reality is disappearing.
🧠 Humanoid models now use neural networks for movement.
⚡ China plans to lead global production by 2026.
🎓 Performance art tests the limits of machine balance.
🔍 Industrial applications will follow these public displays.
https://www.reuters.com/business/media-telecom/chinas-humanoid-robots-ready-lunar-new-year-showtime-2026-02-16/
#FutureOfWork #Robotics #Engineering #Innovation #AI #security #privacy #cloud #infosec #cybersecurity
UAT-9921 Deploys VoidLink Malware to Target Technology and Financial Sectors
https://thehackernews.com/2026/02/uat-9921-deploys-voidlink-malware-to.html
France launches "LaSuite," an open-source office suite for digital sovereignty, reducing reliance on foreign proprietary software. 🖥️
Built on Matrix/TChap, LiveKit/Visio, Grist, and Drive—all MIT-licensed for any organization to deploy. 🇪🇺
🔗 https://www.sinologic.net/en/2026-01/france-chooses-open-source-to-secure-european-sovereignty.html
#TechNews #OpenSource #France #French #DigitalSovereignty #FOSS #Matrix #Privacy #EU #Security #Software #Linux #SelfHost #Government #Europe #Data #IT #PublicSector #Microsoft #Office #Tech #Cloud #LibreOffice
💠 Holographic storage used to be the stuff of science fiction or expensive, failed experiments. We usually expect massive capacity at the cost of proprietary hardware that forces us to throw away everything we already built. HoloMem is taking a different path by making holographic tech work inside the tape libraries you already have in your data center. 😳 The move from magnetic tape to light-sensitive polymer ribbons is the core of this change. These cartridges look like standard LTO units but hold eleven times the data on a ribbon that is ten times shorter. Because the polymer is physically stable, you can turn off the air conditioning in your archive room and walk away for fifty years.
🧠 The system uses a five-dollar laser diode to write data as volumetric voxels.
⚡ One 200TB cartridge replaces more than ten LTO-10 tapes.
🎓 Software sees the HoloDrive as a standard LTO device for easy adoption.
🔍 Field trials in UK data centers show the tech works with existing robotic arms.
https://www.techtarget.com/searchstorage/news/366638887/HoloMem-demos-backward-compatible-holographic-storage
#Storage #DataCenter #TechTrends #security #privacy #cloud #infosec #cybersecurity #DataStorage #Archive #Backup #Tape #Storage #Data
Apple designed Lockdown Mode for people facing grave threats, but we're seeing it work in practice against federal forensics. During a recent investigation into a journalist, the FBI reported that it was unable to extract any data from an iPhone because the feature was enabled. It is rare for a software setting to hold its own against professional, state-level tools. 🔒 The strength of this mode comes from how it drastically reduces the attack surface of the device. By disabling just-in-time JavaScript and blocking most message attachments, it removes the entry points that forensic tools like GrayKey typically exploit. It also forces the device into a state in which biometrics are disabled, requiring a passcode that often carries stronger legal protections during a search.
🧠 Lockdown Mode specifically blocks wired data connections used by extraction hardware.
⚡ The FBI confirmed in court filings that its Computer Analysis Response Team was blocked.
🎓 Using this mode requires giving up features like shared photo albums and link previews.
🔍 Apple offers a $2 million bounty for anyone who can bypass these specific protections.
https://appleinsider.com/articles/26/02/04/iphone-lockdown-mode-will-protect-your-data-even-from-the-fbi
#Apple #CyberSecurity #DataPrivacy #InfoSec #security #privacy #cloud
The tech world is currently with OpenClaw, the open-source agent that finally gives AI hands. It can browse the web, execute terminal commands, and manage your emails. While offering a glimpse into a future of total automation, it's also become a textbook example of a security nightmare. The very features that make it useful—system access and persistent memory—are exactly what make it dangerous. 😱 The problem lies in the collapse of traditional security boundaries. OpenClaw operates as you, bypassing the sandboxing that usually protects your operating system from the browser. Because it can reason over and act on external content, a simple malicious email or a poisoned webpage can quietly steer the agent to exfiltrate your data or run harmful scripts. We are seeing thousands of instances exposed to the open internet with little to no authentication. ☠️
🧠 OpenClaw binds to all network interfaces by default, making it visible to the public internet.
⚡ Malicious skills in the community marketplace have been caught installing info-stealing malware.
🎓 Indirect prompt injection allows attackers to hijack the agent via the data it processes.
🔍 Security researchers have already identified critical RCE vulnerabilities with high CVSS scores.
https://www.fastcompany.com/91485326/openclaw-is-a-major-leap-forward-for-ai-and-a-cybersecurity-nightmare
#OpenClaw #AIAgents #InfoSec #TechEthics #security #privacy #cloud #infosec #cybersecurity
🇫🇷 The French government is sending a message about digital independence by ditching Microsoft Teams and Zoom for its own platform, Visio. This move is not about a lack of features but a calculated push for digital sovereignty. By 2027, every government department in France will communicate via this sovereign stack, ensuring that sensitive data remains subject to European law. The shift addresses a growing concern that relying on foreign cloud giants creates a strategic vulnerability. France is opting for an open-source architecture built on Django and React, hosted on the domestic Outscale cloud. This infrastructure removes the risk of external service disruptions while fostering a local tech ecosystem.
🧠 The Visio platform integrates with Tchap, a secure messaging app based on the Matrix protocol.
⚡ French startup Pyannote provides the AI backbone for meeting transcripts and speaker identification.
🎓 The administration expects to save millions in annual licensing fees by using in-house software.
🔍 Data remains strictly within French jurisdiction to bypass foreign data access laws.
https://itsfoss.com/news/france-ditches-microsoft-teams-and-zoom/
#France #TechHistory #DigitalSovereignty #OpenSource #security #privacy #cloud #infosec #cybersecurity #FOSS
We spend billions on firewalls and zero-trust architecture, only to be undone by a copy-paste command by someone who should know better. The U.S. cyber defense chief "accidentally" feeding classified intelligence to an unsecured version of ChatGPT is the ultimate reminder that the greatest vulnerability in any system is the person using it. Technology is outpacing our muscle memory. When a tool feels like a helpful colleague, we treat it like one—forgetting that LLMs are basically giant, permanent digital sponges. If the person in charge of the nation's digital shield can trip over the AI threshold, your team probably is too.
🧠 Convenience is the enemy of confidentiality
⚡ Your data is the product, even in a chat box
🎓 Policy without automated guardrails is just a wish
🔍 The UI is designed to make you forget the risks
https://arstechnica.com/tech-policy/2026/01/us-cyber-defense-chief-accidentally-uploaded-secret-government-info-to-chatgpt/
#CyberSecurity #ArtificialIntelligence #Leadership #security #privacy #cloud #infosec #CISA
Zum Thema "ownCloud Infinite Scale" habe ich auf @gnulinux einen Artikel geschrieben:
We aren’t just fighting basic threats anymore; we’re up against algorithms that exploit our own behavior before we even realize we’ve been targeted. In cybersecurity, we've shifted from defending perimeters to defending identities in a world where seeing—and hearing—is no longer believing.
I recently spoke with InformationWeek about the escalating threat of AI-based attacks. From agentic AI to deepfakes, the gap between platform vulnerabilities is where the real danger lives. My take? If your security team is still relying on manual processes to fight automated attackers, you’re bringing a knife to a railgun fight. We’re doubling down on zero-trust and out-of-band authentication to ensure the person on the other end of the "urgent" request is who they claim to be.
🧠 Deepfakes are becoming extraordinarily dangerous and difficult to guard against.
⚡ Automated detection is no longer optional—it is the only way to keep pace with attacker speed.
🔍 Out-of-band authentication (OOBA) is critical for verifying identities through separate channels.
🎓 Closing the "natural gaps" between platforms is the primary goal of modern zero-trust.
https://www.informationweek.com/cybersecurity/slamming-the-door-on-ai-based-cybersecurity-threats
#CyberSecurity #AI #Leadership #ZeroTrust #InformationWeek #security #privacy #cloud #infosec #CIO #CISO @InformationWeek@flipboard.com @informationweek-InformationWeek @informationweek@bird.makeup
📺 https://peer.adalta.social/w/bDQg3TwLTruhLHDVV8aoGf
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LIV0PU1G/1)
Un commentaire sur les réseaux sociaux concernant l'exposition de Zak Pullen révèle une tension culturelle profonde entre conformisme et singularité artistique.
📺 https://peer.adalta.social/w/maALFXSgBAHAvu92RMV5yo
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LIV0PU1G/1)
A social media critique of Zak Pullen's exhibition reveals a cultural tension between conformity and artistic will.
📺 https://peer.adalta.social/w/enfEhGQQPM76toLRw5R2MZ
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LIV0PU1G/1)
Ein sozialer Medien-Kommentar zu Zak Pullens Ausstellung offenbart eine tiefere kulturelle Spannung zwischen Konformität und Eigenwillen.
Old man - 15 year Red Hat Engineer - yells at #cloud
About #containers #k8s #saas #blockchain #AI
📺 https://peer.adalta.social/w/8ZL5E1qF6gScjfXKHoTdv9
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_OZQHSVYX/1)
Un cheval rétif dans l'œuvre de Zak Pullen devient un symbole culturel et politique inattendu.
📺 https://peer.adalta.social/w/xAujxmAh5jz3E4d9ezdrqx
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_OZQHSVYX/1)
A personal reflection on Zak Pullen's exhibition reveals a quiet cultural tension between admiration for untamed subjects and social conformity.
📺 https://peer.adalta.social/w/jKPtxq6hAcwrbfQjr39VWp
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_OZQHSVYX/1)
Ein sozialer Medien-Kommentar zu Zak Pullens Ausstellung offenbart eine tiefere kulturelle Spannung zwischen Konformität und Eigenwillen.
Interview with a ‘Just use a VPS’ bro (OpenClaw version)
https://www.youtube.com/watch?v=40SnEd1RWUU
#cybersecurity #cloud-security #fun
📺 https://peer.adalta.social/w/tuYBhErBwiJHz3GM2eKdaS
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_JWNKFUBW/1)
Une faille de sécurité majeure force une mise à jour obligatoire et immédiate pour tous les déploiements.
📺 https://peer.adalta.social/w/uQWVWJZTc8pHQN82PfkMTm
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LQ1SR_LU/1)
Une vulnérabilité majeure dans les liens publics nécessite une mise à jour immédiate des déploiements.
📺 https://peer.adalta.social/w/58nJmg5JfXprntFVuweyZF
🔗 [🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_LQ1SR_LU/1)
A critical vulnerability in public links prompts an immediate, mandatory update for all OpenCloud deployments.
A Code Editor That Actually Scales
https://www.youtube.com/watch?v=kCWwrx51IS4
#encryption #ai-security #cloud-security
NAS KAUFEN: 2-BAY, 4-BAY ODER MEHR? DIE RICHTIGE NAS-GRÖSSE FINDEN
https://gadgetchecks.de/nas-kaufen-2-bay-4-bay-oder-mehr-die-richtige-nas-groesse-finden/
.
.
.
#nas #netzwerkspeicher #cloud #kaufberatung #wievielbay #bay #nasgröße #networkattachedstorage #raid #backupstrategie #datensicherung #hardwareguide #homelab #gadgets
France mandates open source "Visio" across government by 2027, replacing Teams, Zoom, and non-EU videoconferencing tools 🖥️
MIT-licensed app runs on French infrastructure for full data sovereignty and security control 🔒
Emphasizes user freedom while challenging Big Tech 💻
🔗 https://itsfoss.com/news/france-ditches-microsoft-teams-and-zoom/
#TechNews #OpenSource #Privacy #Security #Government #EU #Data #Sovereignty #IT #PublicSector #Digital #Microsoft #Office #Software #Tech #Cloud #FOSS #France #Danmark #LibreOffice #Linux #French
They say Chicago is the city of broad shoulders, but after yesterday’s FutureCon, I’d argue it’s the city of sharp minds. Despite the January chill, the energy was electric. It’s rare to have this many practitioners in one room who are equally committed to dismantling silos and building sturdier fortresses. The most sophisticated firewall in the world is useless without the human intelligence behind it. Yesterday wasn’t just about the tech stack; it was about the collective wisdom of a community that refuses to be outpaced by the threat landscape. If you missed it, you missed the blueprint for the year ahead.
🧠 Elite speaker insights on the shifting threat horizon
⚡ Real-time collaboration between C-suite and practitioners
🎓 Tactical takeaways for the 2026 security roadmap
🔍 Strengthening the local Chicago tech ecosystem
https://futureconevents.com/events/chicago-il-2026/
#CyberSecurity #FutureConCHI #CISO #security #privacy #cloud #infosec #FutureConChicago #CyberSecurityNews #CyberSecurityEvent #CyberSecurityConference #CISO #CyberLeaders #WomeninTech
NAS STATT CLOUD: WARUM LOKALE DATENSPEICHERUNG FÜR ENDKUNDEN WIEDER AN BEDEUTUNG GEWINNT
.
..
.
#nas #netzwerkspeicher #cloud #technologie #gadgets #nasvscloud #nasstattcloud
📺 https://peer.adalta.social/w/6scFoCWHFVZxzymCQrAFgu
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_IBALMXOL/1)
Geopolitical sanctions and cloud dependency render consumer IoT devices inoperable, creating a stark case study in supply chain and cybersecurity risk.
📺 https://peer.adalta.social/w/wbg2NQrv18nVoTQMxBwbwy📺 https://peer.adalta.social/w/wbg2NQrv18nVoTQMxBwbwy
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_W9U1WBWJ/1)
Smart home devices in Russia are failing due to geopolitical software dependencies, transforming cloud services into operational choke points.
📺 https://peer.adalta.social/w/dQ37fJ7TmthmgxXdtdqMz4
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_63OFUPK3/1)
Smart home devices in Russia are failing due to geopolitical disruption of cloud-dependent firmware and identity services, transforming software into a hard border.
📺 https://peer.adalta.social/w/gU25zAUA4KadixZe898rQK
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_IBALMXOL/1)
La dépendance au cloud et les sanctions géopolitiques provoquent une obsolescence forcée massive.
📺 https://peer.adalta.social/w/qvY7Enr5Yuw2ZDHs5iDBej📺 https://peer.adalta.social/w/qvY7Enr5Yuw2ZDHs5iDBej
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_W9U1WBWJ/1)
La dépendance logicielle au cloud transforme les appareils connectés en otages géopolitiques, privant les utilisateurs russes du contrôle de leurs propres équipements.
📺 https://peer.adalta.social/w/tnSu3iLXd76Ja9w5v8W9X1
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_63OFUPK3/1)
La dépendance logicielle au cloud devient un point de rupture géopolitique pour les objets connectés en Russie.
📺 https://peer.adalta.social/w/iXtsaGCb5Z6Ghb52Vvbn4x
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_IBALMXOL/1)
Geopolitische Sanktionen und Cloud-Abhängigkeit führen zum Funktionsverlust von Konsumelektronik.
📺 https://peer.adalta.social/w/spBJczF51EFpM4TVC7DFJZ📺 https://peer.adalta.social/w/spBJczF51EFpM4TVC7DFJZ
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_W9U1WBWJ/1)
Russische Smart-Home-Geräte werden durch Cloud-Abhängigkeit und geopolitische Sanktionen zu funktionslosen Objekten
📺 https://peer.adalta.social/w/qEYhbzhsi1gWjLK2P4XuxW
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_63OFUPK3/1)
Russische Smart-Home-Geräte werden durch Cloud-Abhängigkeit und geopolitische Sanktionen zu teuren Ziegeln
📺 https://peer.adalta.social/w/uTXt8BczS1oJbxFeWZzZLQ📺 https://peer.adalta.social/w/uTXt8BczS1oJbxFeWZzZLQ
[🇩🇪🇺🇸🇫🇷](https://p4u.xyz/ID_T2N81M54/1)
Ein praktischer Leitfaden zeigt, wie fünf Docker-Container eine komplette Produktivitäts-Stack ersetzen und volle Datenhoheit zurückgeben.
We have spent a decade chasing "frictionless" user experiences, but we forgot that friction is what gives us pause when we need it. New research shows that millions of users are at risk from SMS sign-in links designed to make their lives easier. It turns out, when you send a "magic link" via an unencrypted, legacy protocol like SMS, you aren’t just inviting the user in—you’re inviting anyone who can guess a simple URL string.
The arrogance of modern implementation is breathtaking. We are seeing services that use low-entropy tokens (easily guessed by incrementing a number) and links that never expire. This isn't just a technical glitch; it's a fundamental design failure. We’ve treated the phone number as a digital soul-tether, failing to realize that SMS is effectively a postcard sent through a crowd. If the link is the credential and public, the account is no longer yours.
🧠 Vulnerable tokens: Many services use predictable URL patterns that attackers can brute-force in minutes.
⚡ Eternal sessions: Authentication links frequently fail to expire, leaving personal data exposed for years.
🎓 Massive scale: Over 700 endpoints across 177 services were found leaking sensitive financial and identity data.
🔍 False security: "Possession" of a link is being treated as "identity," bypassing the need for actual passwords.
https://arstechnica.com/security/2026/01/millions-of-people-imperiled-through-sign-in-links-sent-by-sms/
#TechLeadership #CyberSecurity #DigitalIdentity #security #privacy #cloud #infosec #cybersecurity
🇺🇸 America is hurtling toward an AI regulatory "Splinternet," and it isn't coming from overseas; it’s coming from within. As the federal government remains paralyzed by partisan gridlock on nearly every issue, individual states are rushing to fill the vacuum with their own AI mandates. We are witnessing the birth of a legislative patchwork that threatens to turn the American tech landscape into a navigational nightmare for startups and tech giants alike.
It is a fundamental disagreement over who gets to hold the leash on the most transformative technology of our century. When California, Texas, and New York each define "algorithmic bias" or "high-risk models" differently, compliance becomes an impossible burden on progress.
🧠 Regulatory Vacuum: Congressional inaction has forced states to create a chaotic patchwork of conflicting AI laws.
⚡ The Compliance Burden: Smaller AI firms face an existential threat as they struggle to navigate 50 different sets of rules.
🎓 Ideological Divide: The battle lines are drawn between "accelerationists" and "protectionists," with no middle ground in sight.
🔍 Global Stature: This internal friction risks slowing U.S. development while international rivals move toward unified standards.
https://www.technologyreview.com/2026/01/23/1131559/americas-coming-war-over-ai-regulation/
#AIRevolution #TechPolicy #Innovation #ArtificialIntelligence #security #privacy #cloud #infosec #cybersecurity #legislature #laws
Bitwarden upgrades its Premium & Families plans with new tools for proactive security 🛡️
Vault health alerts flag weak or exposed passwords 🔍
Password coaching & more 2FA key options enhance protection 🔑
Prices rise slightly, but free plan remains unchanged 🌐
🔗 https://bitwarden.com/blog/bitwarden-launches-enhanced-premium-plan/
#TechNews #Cybersecurity #Privacy #OpenSource #Infosec #DataSecurity #Encryption #Security #Password #Software #DigitalSafety #Cloud #Tech #Bitwarden #KeePass #PasswordManager #Passwords #2FA #MFA
Cloudflare misconfiguration behind recent BGP route leak
#cybersecurity #incident-response #cloud-security
‼️ Wer Windows 11 mit einem Online-#Microsoft-Konto nutzt, speichert seine #BitLocker-Schlüssel automatisch in der #Cloud.
Diese können bei einem rechtlichen Ersuchen an das #FBI weitergegeben werden, wie #Microsoft nun bestätigt hat. Eine lokale Speicherung ist möglich, aber nicht voreingestellt. Die Schlüssel liegen unverschlüsselt vor, was ein erhebliches #Sicherheitsrisiko und #Datenschutzrisiko darstellt.
We’ve spent the last few years treating AI like a science fair project—lots of cool pilots, very few polished products. But as we hit 2026, the mandate has shifted from "can we do this?" to "how does this actually work with everything else?"
I recently sat down with Kelsey Ziser at InformationWeek to discuss the latest industry obsession: embedded hardware AI. While the industry is racing to put an AI chip in every laptop, I’m still looking for the "why." For most of us, the browser is the office. Adding hardware-level complexity shouldn't be the default unless it solves a problem that the cloud can't.
🧠 2026 is the year of the 'Chief Integration Officer.'
⚡ Hardware AI must prove its worth against browser-based LLMs.
🎓 Governance and interoperability remain the biggest hurdles.
🔍 Stop chasing "ambient" novelty; start chasing scalable value.
https://www.informationweek.com/ai-innovations/as-cios-focus-on-ai-integration-new-ai-tools-complicate-the-agenda-in-2026
#AIIntegration #DigitalTransformation #InformationWeek #security #privacy #cloud #infosec #cybersecurity @InformationWeek@flipboard.com @informationweek-InformationWeek @informationweek@bird.makeup
ACM: overheid moet ingrijpen om Europese clouddiensten kans te geven.
https://tweakers.net/nieuws/244006/acm-overheid-moet-ingrijpen-om-europese-clouddiensten-kans-te-geven.html
#cloud #ACM
Le gouvernement va déployer une application française baptisée "Visio" (quelle originalité!) pour remplacer les autres logiciels utilisés pour les échanges entre agents de l'Etat face à la menace américaine et chinoise, annonce David Amiel, le ministre de la Fonction public. "Nous devons sortir de la dépendance aux outils américains et plus globalement non européens", ajoute le ministre dans La Tribune du dimanche. ll n'est jamais trop tard...
»Microsoft confirms it will give the FBI your Windows PC data encryption #key if asked—you can thank Windows 11's forced online accounts for that:
#Windows 11's online Microsoft Account requirement means your #PC is automatically backing up its data #encryption key to the #cloud, and #Microsoft says it will hand those over to the #FBI if requested via legal order«
Which companies have no #ITSecurity to hide and are then amazed that they have been/are being "hacked"?!
#EU #Parliament Calls For Detachment From US Tech Giants
The #EuropeanParliament is calling on the #EuropeanCommission to reduce dependence on U.S. tech giants by prioritizing EU-based #cloud , #AI , and open-source #infrastructure. The report frames " #European Tech First," public procurement reform, and Public Money, Public Code as necessary self-defense against growing U.S. control over critical digital infrastructure.
#opensource #security #privacy
It’s sure great that my own workplace relies on this gigantic corporation for mission critical stuff. I am not worried about it blowing up in our face at aaallll....
#Canada #DigitalSovereignty #Microsoft #Education #Work #M365 #Network #Cloud
DIE VORTEILE EINES NAS: MEHR SICHERHEIT, KONTROLLE UND FLEXIBILITÄT FÜR DATEN
.
.
.
#nas #vorteile #daten #sicherheit #cloud #netzwerkspeicher #gadgets