blog
21.01.2026 A patch for the NIS2 Directive
Who says that only software needs regular updates? Laws are similar, the process is just much more complicated.
blog
02.12.2025 Don't say "Jehova" to an LLM
What can Monty Python's "Life of Brian" tell us about LLM security?
blog
29.10.2025 How typosquatting tricked me (a bit)
Typosquatting is a popular method using similarly looking names to draw people into malicious content – such as phishing websites or fake software packages. It leverages our “brain optimization” that matches what we see with what we already know – even if it’s not exactly the same. I haven’t installed any shady software, but it’s still a good example how easily our brain could be used against us by utilizing our biases.
blog
16.10.2025 A review of the “Concluding report of the High-Level Group on access to data for effective law enforcement”
As I’ve written here, the EU unveiled a roadmap for addressing the encryption woes of law enforcement agencies in June 2025. As a preparation for this push, a “High-Level Group on access to data for effective law enforcement” has summarized the problems for law enforcement and developed a list of recommendations. Let’s have a look at this report.