Since blogging apparently doesn’t work for me lately I’ll try microblogging for 30 days. Here’s my twitter feed.
Another 30 day-project: I don’t drink any alcohol for 30 days. For me alcohol = beer. I don’t usually drink anything other than beer. But beer, I drink a lot. Not as in large quantities at a time, but being Austrian a beer here and there just seems natural. Once you are conscious about it, you realize how many opportunities there are for that one beer.
I am into this project for 16 days now. Honestly I would not have felt comfortable letting everybody know about it on day one – chances were I would not be able to stick to my plan. But now I am certain that it will work.
If that makes me sound like an addict on detox, it’s not what I wanted to suggest. It’s just that during the first week my resolution was tested 5 out of 7 days: You know, friends and colleagues asking about an after work beer. The obligatory beer after the jazz gig. The waiter at that Italian restaurant asking me if I would fancy a Peroni. “No” became an important word. Some people around me keep teasing be, but it only makes me stronger now, because it reminds me about my decision of not drinking beer for 30 days.
I own a Pebble Steel for quite some time now, and I still love it. Good battery life and not too many, but useful features. It was a no-brainer that I joined their latest record-breaking kickstarter campaign for the new Pebble time as an early bird.
At the same time I had to do something that I do with almost any piece of hardware that I own and that lets me do it: Write some code for it! Sometimes it’s just the mandatory hello world, but this time it’s a watchface for the Pebble:
I was amazed by how little time it took me to write (or should I say copy and paste) the code. I’ve uploaded the watchface to the Pebble app store so that it can be installed by everybody who owns a Pebble and the source code can be found on github. Please let me know what you think of it and keep the hacker spirit high by writing code for every piece of hardware that you own!
Thank you all for dropping by in 2014! For those who care, here are the blog stats that wordpress sent me for 2014: http://jetpack.me/annual-report/16165614/2014/
I wish you and your loved ones all the best for 2015! Hope to see you again this year!
For as long as I can think I’ve had one or more songs every year that were like my own personal summer soundtrack. When I hear one these songs they put me right back in time by bringing back memories, smells, tastes, feelings, …
So here is this year’s song:
What is interesting to note is that it makes use of different German accents.
I just felt like posting another youtube video of a song I’ve been digging lately. Enjoy!
Public-Key Cryptography is a truly magical thing and I often wonder why we don’t use it more often. We go on and complain about how it is too easy for government agencies to look into our digital lives, while we do have all the tools to prevent it. Only we don’t use them and we don’t seem to ask facebook, gmail and so on to use them – not that they would. The funny part is that it would not require a lot of effort, because computers could automatically do all of that stuff in the background. All that would be needed is that we were able to securely store one, long password (the private key).
In a nutshell public-key cryptography is a mathematical concept that allows us to encrypt a message that is intended to be read by just one person and to sign something to guarantee that it really came from you.
Let’s take a closer look: public-key cryptography is based on a pair of keys, lets call them #1 and #2. When one uses key #1 to encrypt a message one can only decrypt it again using key #2. The same is true for a message encrypted with key #2 – it can only be decrypted using key #1. In other words the two keys are kind of reversible operations that work in both directions. For instance
- Plain text -> Apply Key #1 -> Cypher Text -> Apply Key #2 -> Original Plain Text
- Plain text -> Apply Key #2 -> Cypher Text -> Apply Key #1 -> Original Plain Text
- Plain text -> Apply Key #2 -> Cypher Text -> Apply Key #2 -> Nonsense
- Plain text -> Apply Key #2 -> Cypher Text -> Try something -> Nonsense
In addition to that it is important to know that it is (almost) impossible to find the keys from the Plain text and/or the Cypher Text.
Usually a person or entity (lets call this entity Alice) creates a pair of keys, where one is made public (the public key) and where the other key is kept secret. There are two typical use cases:
- Anyone can encrypt a message using the public key and send it to Alice. Only Alice and nobody else (e.g., someone who intercepts the cypher text) will be able to read the plain text when only Alice knows her secret key. – This use case is also called “Public-key encryption”.
- Alice can encrypt a message using her private key and send it to anyone. If it can be decrypted using the Alice’s public key, one has a guarantee that the original message really came from Alice. – This use case is also called “Digital signing”.
The secret key is Alice’s crown jewel that she must not lose or share with anyone, because anyone in possession of the secret key can do what Alice can do. Well that is why it’s called the secret key.
Again, all of this can stay in the background and as it can be done for you by software on your computer/phone/…, that has access to your locally stored secret key. If you are interested in implementing some of this stuff in your life, you might want to take a look at
- GNU Privacy Guard (e.g., for protecting your e-mails)
- Threema (for protecting texting on your phone)
Just by reading this article and by understanding it, you should have a pretty good idea about what level of protection encryption can give you and where potential problems may lie. Again, never forget: your secret key is your crown jewel that you must never share and that your software must never leak. By the way, this is something that is especially hard to check with closed source software and also something that the heartbleed bug may have caused.
“I am from Europe” is a phrase that I’ve found myself using quite frequently lately. I don’t just use it because Europe is much easier to explain than ___________ (fill in any European country you can think of), but because Europe is more than that.
I mean of course the statement is true from a geographical perspective, but then again it is more than that. Europe for me is the notion that there is this geographically large region that is so diverse in terms of culture and lifestyle but that still shares a set of unwritten core values, that every one of us can relate to and rely on.
I am aware of the stereotypes that all of use have. Germans are overly correct, the British can’t cook, Polish people are ueber-Catholic, Greeks are lazy and Spanish men are macho men on siesta. However if you dig deeper, if you are willing to immerse yourself in one or more of the “other” European cultures, you will find that there are more things that we have in common than those that separate us. – I mean except for the French, who I never really liked or understood. But then again, they enrich our union as much as you and I do.
Sometimes I am wondering what Europe must look like from the outside. Probably like someone suffering from Schizophrenia. Someone with so many voices inside and no clear, single voice to the outside. But that is alright, because when it comes to the important issues, everybody can and should rely on our common understanding. We do believe in human rights, in social welfare for those who need it and in an economic system that encourages everybody to thrive based on his or her personal talents but one that should leave nobody behind.
From the inside it is probably a little bit like marriage. – There are good times and bad times, and things are far from perfect. Every now and then we are put on trial, and at the same time we often don’t appreciate what we have because of the union. But even if one party has to give in and do something that might hurt, we are better off as a union.
At the end of the day it comes down to this: I am in awe of what Europe is and more than that of what it can become: A super-powered peace-keeping instrument and a diverse, flourishing system with shared values and the inherent ability to see challenges from multiple perspectives. It’s now on us to act and voice our vision for Europe, so don’t miss the elections http://www.elections2014.eu/
A while ago I stumbled across a TED talk in which Matt Cutts presents the idea of trying something new for 30 days.
If you are as bad at sticking to resolutions as I am, I highly recommend giving it a try. 30 days really seems “just about the right amount of time“.
Here are some of the 30 days projects that I have done and blogged about so far:
- May 2017: 30 Sound Bites for 30 Days
- March 2017: Fastenzeit + A Pic A Day for 30 Days
- October 2015: Active for 30 Days
- September 2015: Microblogging for 30 Days
- March 2015: No Beer for 30 Days
- April 2014: Food Porn for 30 Days
- March 2014: Removing clutter for 30 Days
- January 2014: Blogging for 30 Days
- October 2012: Escape for 30 Days