On April 21, 2021, the European Union (EU) proposed new artificial intelligence (AI) legislation called the EU Artificial Intelligence (AI) Act or the European AI Regulation. This proposed legislation is… Read More »The European AI Regulation – Pros & Cons
The acquisition of the social network Twitter by billionaire Elon Musk inspired us to write a blogpost about the social role of social media. In our blog post on microtargeting,… Read More »Twitter, Facebook & Co. – Pros & Cons of Social Media
The General Data Protection Regulation (GDPR) has been in force in the European Union, Iceland, Lichtenstein and Norway for more than 4 years. Since then, this regulation has set a… Read More »European Courts increasingly insist on Compliance with the GDPR
Google Analytics is the most widely used tracking tool worldwide, accounting for an estimated 50-80% of all websites. From the perspective of data protection and privacy, however, its use has… Read More »7 Reasons why You Should Use ViOffice Analytics instead of Google Analytics
“Almost everyone in the world will be identifiable” – This quote comes from an investor meeting of the US company Clearview AI, which specializes in face recognition using artificial intelligence… Read More »Face Recognition and its Impact on Privacy
On February 14 we show our love not only to our beloved ones, but also for Free, Open Source Software (FOSS) and the Free Software Community. One year after our… Read More »February 14 – Let’s celebrate ‘I Love Free Software Day’
Free, Open Source Software is often times labeled as “unfit for critical infrastructure” by those not working in the field or by stakeholders of proprietary software companies. Contrary, Open Source advocates would reply with the exact opposite, so which one is true?
Privacy is generally perceived as a problem on individual level, although it has an important, often neglected social component. We highlight the central issues and how they can be solved.
E-mail is one of the oldest, most widely used and widespread messaging and web protocols on the internet. But how can communication via e-mail be securely and reliably encrypted?