Bevorzugen Sie Deutsch? Einige Artikel und mehr über mich gibt es auch in meiner Muttersprache.

Today, any device is networked, not only our personal devices, but anything from the fridge to the power plant. This implies endless possibilities, but also possibilities galore for anything to go wrong. Decades of thorough theoretical and hands-on experience enables me to guide you toward the right solution for anything networked. Learn more…

Recent technical essays

  • «Right to be Forgotten» void with AI?
    In a recent discussion, it became apparent that «unlearning» is not something machine learning models can easily do. So what does this mean to laws like the EU «Right to be Forgotten»?
  • Post Quantum and Homomorphic Encryption made easy
    Major challenges in computer and information security are the advent of quantum computers and the need to trust your data to (cloud) service providers. New cryptography is supposed to help, but they look daunting. At their core, however, they are […]
  • How does ChatGPT work, actually?
    ChatGPT is arguably the most powerful artificial intelligence language model currently available. We take a behind-the-scenes look at how the “large language model” GPT-3 and ChatGPT, which is based on it, work.
  • Identifying AI art
    AI art is on the rise, both in terms of quality and quantity. It (unfortunately) lies in human nature to market some of that as genuine art. Here are some signs that can help identifying AI art.
  • The FTX crypto exchange and its spider web
    Yesterday, the U.S. Securities and Exchange Commission (SEC) released its indictment against Sam Bankman-Fried. It details the financial entanglements of FTX, Alameda Research and more than a hundred other companies and individuals. We have tried to disentangle these allegations somewhat […]
  • Reproducible AI Image Generation: Experiment Follow-Up
    Inspired by an NZZ Folio article on AI text and image generation using DALL•E 2, I tried to reproduce the (German) prompts. Someone suggested that English prompts would work better. Here is the comparison.
  • Web3 for data preservation? (Or is it just another expensive P2P?)
    Drew Austin raises an important question in Wired: How should we deal with our accumulated personal data? How can we get from randomly hoarding to selection and preservation? And why does his proposed solution of Web3 not work out? A […]
  • «The Cloud» does not exist
    What is cloud anyway? And why are not all clouds the same? An overview to create clarity. The topic of the cloud is currently on everyone’s lips again, and decisions are pending in many places. Clarity is essential for assessing […]

All blog posts…

Let’s stay in touch!

Receive a mail whenever I publish a new post.

About 1-2 Mails per month, no Spam.



Apache (4) Blockchain (15) Cloud Storage (11) Data Protection (5) Denial of Service (8) DNS (11) DNS-SD (6) DNSSEC (6) Fast Routers (20) Federated Services (6) Forwarding Lookups (4) FPGA (4) Hash Tables (8) Identity Management (6) Internet of Things (8) Intrusion Detection (6) JSXC (10) Linux (19) Mac OS X (5) Mobile Networks (7) MPLS (4) Multicast (15) NAT traversal (4) Network Processors (4) NTP (6) NTS (6) Opportunistic Networks (9) Peer-to-Peer (23) Privacy (15) Quality of Service (9) Replication (4) Security (51) Service Discovery (5) Social Networks (8) Timestamps (6) TLS Interposer (6) Traffic Engineering (9) Trust (8) Ubuntu (7) Usability (6) Web Applications (11) WISEchat (5) XML (8) XMPP (11) Zeroconf (6)