---
blogpost: true
date: 1.1.2023
author: Tobias
location: Stuttgart
category: links, 2023
tags: links, 2023
language: Deutsch
---

# Links für 2023 KW 52

Meine \"Wollte ich noch Lesen\"-Liste, zusammengefasst von [Neural
Chat](https://huggingface.co/TheBloke/neural-chat-7B-v3-3-GGUF).

**[OsmAPP](https://osmapp.org/#7.00/48.9449/8.8366)**:

The article introduces an OpenStreetMap app that allows users to search
and explore various locations worldwide. Based on data from millions of
contributors, it offers a user-friendly interface with editing options
and includes features like map layers and POI editing. Future updates
may include navigation and favorite places management. Contributions and
suggestions can be made through Github while the app benefits from
Mapillary, Fody, Wikipedia, OpenStreetMap, MapTiler, and project support
for images and maps.

------------------------------------------------------------------------

**[American Cars Are Huge And Unsafe, But Automakers Don\'t Want The
Simple
Solution](https://jalopnik.com/american-cars-are-huge-and-unsafe-but-automakers-dont-1851126751)**:

This article highlights the growing size of cars and their increased
impact on accident fatalities compared to smaller vehicles. While
automakers focus on complex technological solutions to reduce accidents,
one simpler option is to make cars smaller. The chief engineering and
technology officer for Stellantis, Ned Curic, discussed this issue in an
interview but didn\'t specifically suggest making cars smaller for the
US market. Instead, he emphasized advancing active safety using smart
vehicle features enabled by sensors and cameras. However, these
technological solutions may add to repair costs, data security risks,
and initial purchase prices, raising questions about whether they truly
ensure car safety.

------------------------------------------------------------------------

**["You can't do that because I hate
you."](https://bvisness.me/you-cant/)**:

In this article, a programmer expresses frustration with programming
tooling and software that lacks intuitive functionality or gives unclear
instructions. The author discusses several instances of complex
interactions with programming tools like Python, Rust, and Cargo that
led to confusion or failed attempts at using specific features. This
experience has made the programmer feel disrespected by developers and
highlights the need for better support, guidance, or simplification in
tooling design.

------------------------------------------------------------------------

**[Using Alpine can make Python Docker builds 50×
slower](https://pythonspeed.com/articles/alpine-docker-python/)**:

Alpine Linux is often recommended as a base image in Docker images
because it makes images smaller and speeds up builds. However, when
using Python applications, it can cause various issues such as slower
build times, larger image sizes, and potential runtime bugs due to the
difference between musl and glibc C libraries. To get around these
issues, one might consider alternatives like Debian-based base images or
Alpine Edge, which includes more up-to-date packages. Overall, it is not
recommended to use Alpine Linux as a base image for Python applications
due to the drawbacks mentioned above.

------------------------------------------------------------------------

**[It\'s time to put REST to
rest](https://sollecitom.github.io/software-product-development-blog/posts/2023/2023-09-22-put-rest-to-rest/)**:

REST (Representational State Transfer) remains widely used in HTTP APIs
today, but a recent article argues that it is fundamentally flawed. The
author suggests that instead of manipulating data structures, HTTP APIs
should focus on business-specific operations to make them easier to
understand, use, and maintain. A new approach involving commands and
queries for these operations has been proposed as an alternative to
traditional RESTful API design methods. This method could offer benefits
such as simplified validation, improved batching capabilities, and
better differentiation between HTTP protocol errors and
application-level results. The author concludes that focusing on
business operations rather than data structures can significantly
enhance the overall effectiveness of an HTTP API.

------------------------------------------------------------------------

**[The Dark
Arts](https://www.lesswrong.com/posts/djWftXndJ7iMPsjrp/the-dark-arts)**:

Lyrongolem discusses his experience with \"Ultra-BS,\" a technique used
in debate where one creates arguments that are obviously illogical but
still coherent enough to confuse or overwhelm opponents. This technique
relies on the fact that most people don\'t have sufficient knowledge on
the subject matter and therefore won\'t be able to refute it
effectively. The idea is to craft complex logical structures with
seemingly reasonable premises, even if they are not provably true. This
allows debaters to maintain a perceived credibility and control over the
narrative without actually providing factual evidence or substance.

------------------------------------------------------------------------

**[The Worst Kind of Programmer](http://mikhailian.mova.org/node/284)**:

This article discusses a real-life scenario where two skilled
programmers led their respective frontend and backend development teams
in a project but ended up causing problems to the overall progress due
to their focus on advanced technologies and complex solutions. Their
actions resulted in a disjointed product, leading to a high turnover
rate among developers, increased costs, and difficulty in refactoring
the code in the future. The author proposes potential solutions like
simplified languages, agile methodologies, and DevOps practices to
tackle this issue and promote better collaboration within teams.

------------------------------------------------------------------------

**[Cold-blooded
software](https://dubroy.com/blog/cold-blooded-software/)**:

In 2004, during a natural history lecture, the professor presented a
painted turtle hatchling as an example of cold-blooded animals\' ability
to survive freezing. The concept of being cold-blooded relates to these
animals adapting their metabolism to match environmental temperature,
unlike warm-blooded animals like humans which maintain stable body
temperatures. This analogy is also applied to software projects, where
cold-blooded ones use stable technology and rely less on external
services, making them more resilient over time. The author shares an
example of a cold-blooded project powering their blog, demonstrating the
benefits of this approach in maintaining functionality for years without
modifications.

------------------------------------------------------------------------

**[37C3: Unlocked -
media.ccc.de](https://media.ccc.de/b/congress/2023)**:

This article compilation covers various topics including hacking,
technology, security, space exploration, digital forensics, reverse
engineering, and more. It includes discussions on Polish trains\'
digital rights management, iPhone research projects, space
communications, open source software development, assistive technology
for the visually impaired, and railway communication protocol security.

------------------------------------------------------------------------

**[Hochwasser an der Enz: Land unter bei
Oberriexingen](https://www.stuttgarter-nachrichten.de/inhalt.hochwasser-an-der-enz-land-unter-bei-oberriexingen.c6199caf-860b-4df3-9c28-d739c3bce693.html)**:

Die Ortseinfahrt nach Oberriexingen im Kreis Ludwigsburg ist seit Montag
gesperrt, weil die Enz über ihre Ufer getreten ist. Warnungen für
weitere Überschwemmungen in der Region gab es bereits früher, und die
Lage könnte weiter verschlechtert werden. Eine Durchfahrt erfolgt auf
eigenes Risiko. Auch der Busverkehr kann beeinträchtigt sein. Am frühen
Dienstagmorgen scheint es ruhig zu gewesen sein, aber nachfolgende
starker Regen führte wieder zu einer Ansteckung des Enz-Pegels.

------------------------------------------------------------------------

**[Para-infectious brain injury in COVID-19 persists at follow-up
despite attenuated cytokine and autoantibody responses - Nature
Communications](https://www.nature.com/articles/s41467-023-42320-4?error=cookies_not_supported&code=172120e1-9e60-4f82-8ed9-bd2dd7257886)**:

This study investigated the neurological complications associated with
COVID-19 infection by measuring levels of brain injury markers,
inflammatory mediators, and autoantibodies in participants at different
stages of the disease. The results showed that these markers were
elevated during both the acute phase and convalescent phases,
particularly in those who had experienced a neurological complication of
COVID-19. This suggests an ongoing neuroglial injury related to a
dysregulated immune response following SARS-CoV-2 infection, potentially
identifying targets for therapy.

------------------------------------------------------------------------

**[GENERATION
JUNK](https://walterkirn.substack.com/p/generation-junk)**:

The author describes their frustrations with various products that cease
functioning soon after purchase. Despite a citrus juicer from the 1940s
lasting for decades, coffee grinders, appliances and other goods often
stop working after just one year or have low quality from the beginning.
The article discusses potential causes for this issue, including
government regulations, trade arrangements with China, weak-link
computer chips in items that don\'t require them, and a degradation of
everything human. Some of the author\'s Twitter followers attribute
these problems to environmental concerns, capitalism, or a decline in
product quality over time. While acknowledging these perspectives, the
author expresses a concern for the world where products are not made to
endure, leading people to lose faith and interest in the future.

------------------------------------------------------------------------

**[Outlook/Hotmail is no longer blocking my mail
server](https://taoshu.in/net/outlook-delist.html)**:

In this article, a user shares their experience of de-listing their mail
server address from Microsoft\'s blocklist. They ran the server on an
Oracle Cloud with no cost and successfully deployed mail to major
providers without any issues. However, they encountered problems when
sending emails to Hotmail/Outlook users due to Microsoft blocking their
IP address based on S3150 rules. The user tried multiple approaches to
resolve this issue but eventually found that Microsoft unblocked their
server after testing via Telnet. They emphasize the importance of
defending self-hosting rights and communicating freely through email as
part of the Internet\'s foundation.

------------------------------------------------------------------------

**[Reindeer Sleep and Eat Simultaneously, Saving Precious Time in the
Short Arctic
Summer](https://www.smithsonianmag.com/science-nature/reindeer-sleep-and-eat-simultaneously-saving-precious-time-in-the-short-arctic-summer-180983495/)**:

Reindeer are able to chew their cud and simultaneously enjoy non-REM
sleep, allowing them to conserve time during their short Arctic summer
when both sunlight and food availability is limited. This unique
sleeping pattern helps reindeer maintain a consistent amount of sleep
throughout the year without disrupting crucial eating habits needed for
energy storage. Neuroscientist Melanie Furrer and colleagues found that
ruminating animals display brain activity typical of non-REM sleep,
helping them obtain mental benefits while they nourish their bodies.
This adaptation might be essential to reindeer\'s survival in extreme
Arctic environments as it enables the efficient use of vital resources
like food and rest.

------------------------------------------------------------------------

**[How We Turned the Tide in the Roach
Wars](https://www.theatlantic.com/podcasts/archive/2023/11/cockroach-bait-invention-combat/676167/)**:

A remarkable story tells of how an American invention known as Combat
eradicated a major cockroach problem in the US during the 1980s. The
product was so successful that it contributed to reducing the number of
complaints about cockroaches by 93% within a decade. However, despite
its triumph over the roach menace, Combat has since faced behavioral
resistance from the insect population and is now undergoing a
resurgence. While this development doesn\'t threaten the existence of
humanity, it does raise questions regarding public health and
environmental concerns associated with pesticide usage.

------------------------------------------------------------------------

**[Yikes! The \$60,000 Hyundai Ioniq 5 Battery Replacement Saga
Continues](https://www.autoevolution.com/news/yikes-the-60000-hyundai-ioniq-5-battery-replacement-saga-continues-226590.html)**:

Hyundai\'s Ioniq 5 is a promising zero-emission crossover SUV, offering
many cool features and appealing aesthetics, but the ownership
experience has its downsides. A few Canadian owners faced issues such as
expensive insurance, pricy fast-charging, more frequent tire replacement
needs, and lengthy repairs. Despite these challenges, EVs like Ioniq 5
do offer benefits; they can serve as home power sources with
bidirectional charging or be used for powering camping gear. However,
addressing issues with the high cost of replacing battery packs after
minor damage to protective panels is essential for improving overall EV
ownership experience and ensuring their contribution towards
sustainability.

------------------------------------------------------------------------

**[4-year campaign backdoored iPhones using possibly the most advanced
exploit
ever](https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/)**:

Researchers recently presented findings related to a four-year-long
backdoor operation that infected iPhones of Russian security firm
Kaspersky employees. The attackers exploited an undocumented hardware
feature and four critical zero-day vulnerabilities, allowing them full
control over the devices and access to sensitive data. With
sophisticated tactics, the attacks aimed at devices from Apple, Macs,
iPods, iPads, Apple TVs, and Apple Watches while evading advanced memory
protection mechanisms. The targeting of secret features by unknown
attackers raises questions about their intentions and capabilities.

------------------------------------------------------------------------

**[Supported
Robots](https://valetudo.cloud/pages/general/supported-robots.html)**:

This article provides a comprehensive summary of more than 30 different
robots supported by Valetudo, and offers details on each robot\'s
manufacturer, specifications, rooting process, and Valetudo binary
information. It highlights various aspects that may affect the
compatibility and functionality of these robots with Valetudo, including
brand-specific cloud implementations and potential challenges during the
rooting process. The article also lists notable hardware revisions among
some robot models from various brands like Xiaomi, Dreame, Roborock,
Viomi, Cecotec, Proscenic, and Commodore. The article aims to help users
navigate through the technical aspects of using Valetudo with their
specific vacuum robots and provide relevant guidelines for successful
integration.

------------------------------------------------------------------------

**[Docs deserve more respect --- Rami
James](https://www.ramijames.com/thoughts/docs-deserve-more-respect)**:

This article recounts the author\'s journey in technical writing since
1999, focusing on creating useful documentation for various projects.
The writer shares their thoughts on what makes good documentation and
offers concrete rules essential for a successful documentation product.
They emphasize that docs should tell stories, be searchable, and form
part of a larger strategy. In addition, they must be well-designed,
well-maintained, targeted to the specific audience, address pain points,
and evolve along with products. Documents are seen as an integral part
of a product\'s success, impacting user experience, developer advocacy,
brand perception, and overall business performance.

------------------------------------------------------------------------

**[Ask HN: Should I medicate my
ADHD?](https://news.ycombinator.com/item?id=38780642)**:

An individual diagnosed with ADHD as a child has been working without
medication and considers their condition a superpower, allowing them to
hyperfocus. Recently, they began questioning if they\'ve been working
harder than necessary and whether medication would be helpful. They seek
advice from others in the same situation, balancing between maintaining
their unique abilities and exploring potential aid.

------------------------------------------------------------------------

**[10 Things Software Developers Should Learn about
Learning](https://cacm.acm.org/magazines/2024/1/278891-10-things-software-developers-should-learn-about-learning/fulltext)**:

The article is titled \"10 Things Software Developers Should Learn about
Learning\" by Neil C. C. Brown, Felienne F. J. Hermans, and Lauren E.
Margulieux. It discusses various aspects of learning for software
developers in light of cognitive psychology research. Here are the most
important points from each section:

- Human Memory Is Not Made of Bits - Human memory is not as precise or
reliable as computer memory due to its biological complexity, and it can
be modified through reconsolidation when accessed. Spreading activation
is a process where related information becomes conflated with target
information, making recall unreliable but also contributing to
problem-solving insights.

- Human Memory Is Composed of One Limited and One Unlimited System -
Long-term memory is functionally limitless while working memory has
limited capacity at birth, which can be expanded by chunking information
together. Cognitive load (intrinsic and extraneous) should be considered
when learning new skills or tools to optimize efficiency.

- Experts Recognize, Beginners Reason - Experts have an advantage in
problem-solving due to their ability to recognize patterns from
long-term memory, freeing up cognitive resources for higher-level
reasoning. This is a result of dual-process theories where system 1
(fast and driven by recognition) contrasts with system 2 (slower and
focused on reasoning).

- Understanding a Concept Goes from Abstract to Concrete and Back - The
semantic wave approach suggests that learning abstract concepts requires
continuous switching between the abstract definition and diverse
examples, leading to deeper understanding through recognizing
connections between details and the concept\'s definition.

- Spacing and Repetition Matter - According to the spacing effect,
humans learn problem-solving concepts best by spacing out their practice
across multiple sessions, days, or weeks. This allows for consolidation
of information in long-term memory and reduces cognitive load while also
allowing rest periods that speed up the consolidation process.

- The Internet Has Not Made Learning Obsolete - While knowledge is
readily available online, memorizing it can be more efficient due to
faster access and avoidance of cognitive drain from context switching or
filtering out extraneous information during a search. Additionally,
searching may rob the brain of the benefits of memory-strengthening
effects associated with recalling information.

- Problem-Solving Is Not a Generic Skill - Although humans do have some
generic problem-solving skills, they are less efficient than
domain-specific skills like programming or chess. Attempts to teach
problem-solving as a specific skill for various aspects of development
are ineffective because these skills cannot be transferred between
domains easily.

- Expertise Can Be Problematic in Some Situations - The
expertise-reversal effect suggests that hints and guides designed for
beginners can become more distracting than useful for experts, while the
expert blind-spot problem indicates difficulty in seeing things through
a beginner\'s eyes once an individual becomes an expert. Tacit knowledge
can also make it challenging for experts to verbalize their processes
effectively when training others.

- The Predictors of Programming Ability Are Unclear - Research has
shown that various factors such as gender, age, academic major, race,
prior performance in math, prior experience with another programming
language, and perceptions of CS do not predict programming ability
accurately. Aptitude tests for programming have generally been
ineffective due to poor predictive accuracy.

- Your Mindset Matters - The fixed versus growth mindset concept
suggests that individuals who approach tasks with a belief in their
abilities being malleable tend to persist through difficulties more
consistently than those with a fixed mindset, which aligns with an
aptitude view of ability as innate and unchanging. However, it\'s
important to remember that maintaining a growth mindset can be difficult
due to shifts towards a fixed mindset during setbacks or failure, but
these can be overcome with practice.

The article also provides recommendations for both recruiting and
learning/training in software development based on the above points.

------------------------------------------------------------------------

**[The World's Most Famous Cryptographic
Couple](http://cryptocouple.com/)**:

The fictional characters Alice and Bob were invented to simplify the
understanding of cryptology research. Originally introduced by authors
Ron Rivest, Adi Shamir, and Leonard Adleman in their paper on digital
signatures and public-key cryptosystems, they have since become central
figures in various fields like game theory, quantum cryptography,
physics, and economics. Initially depicted as abstract characters, they
were later personified through images that often portrayed them in
heteronormative and gendered ways. The ubiquitous presence of Alice and
Bob has led to their use in pop culture with references found in music,
comics, and digital media. As more females enter these fields, the
gender dynamics surrounding these characters have also evolved,
resulting in different interpretations of their fictional lives and
relationships.

------------------------------------------------------------------------

**[Multicellularity arose several times in the evolution of
eukaryotes](https://onlinelibrary.wiley.com/doi/10.1002/bies.201200143)**:

Here\'s a summary of the key points made in the article:

1\) The study focuses on Dictyostelium discoideum, which is a model
organism that provides insight into the origins of multicellularity,
sociality, development, and cell biology.

2\) Dictyostelium is used as a model for animal multicellularity because
many key features are shared between the two, such as cell adhesion,
communication and signaling, differentiation, and development. Despite
deep evolutionary divergence, many genes crucial to these processes in
animals are found in Dictyostelium.

3\) The authors argue that while there are structural and molecular
similarities between animal multicellularity and Dictyostelium\'s form
of aggregation-based multicellularity, this does not necessarily imply a
common ancestral origin for the two forms of multicellularity. Instead,
they suggest that these similarities may be due to independent
convergence or co-option of similar mechanisms across deep evolutionary
time.

4\) The authors conduct phylogenetic analyses on α-catenin and β-catenin
proteins, which are involved in cell adhesion and signaling in both
Dictyostelium and animals. They find that while there is some evidence
for convergence between the two organisms at the molecular level (e.g.,
similar functions performed by different protein homologs), this does
not support a common ancestral origin of multicellularity for
Dictyostelium and animals.

5\) The authors suggest that the widespread distribution of genes
involved in multicellularity across unicellular organisms supports the
view that these genetic tools were already present in microbial lineages
but co-opted for new purposes within multicellular organisms, rather
than arising at the base of the Metazoa as was previously thought.

6\) They conclude by emphasizing the importance of acknowledging and
studying the diversity and complexity of unicellular eukaryotes when
making deep evolutionary inferences about the origins of
multicellularity in animals like humans.

------------------------------------------------------------------------

**[Moderna's mRNA cancer vaccine works even better than
thought](https://www.freethink.com/health/cancer-vaccine)**:

Adding Moderna\'s in-development cancer vaccine to standard treatments
for melanoma significantly reduces survivors\' risk of death or
recurrence. The vaccine instructs the body to make proteins unique to
cancer cells, preparing it to quickly attack new cancer cells and
preventing recurrences. Combining the vaccine with Keytruda, a Merck
FDA-approved treatment, has reduced high-risk patient chances of
recurrence or death by 49% in a median of three years after treatment,
compared to Keytruda alone. The companies have launched phase 3 trials
with over 1,000 participants for the combination cancer therapy and
intend to launch it under accelerated approval by 2025 if successful.

------------------------------------------------------------------------

**[www.whataaabout.com](https://www.whataaabout.com/)**:

**TODO**

------------------------------------------------------------------------

**[List of cognitive
biases](https://en.wikipedia.org/wiki/List_of_cognitive_biases)**:

Cognitive biases are systematic patterns of deviation from norm and
rationality in judgment, often involving mental shortcuts that can
affect belief formation, reasoning processes, decision-making, and human
behavior in general. These biases include anchoring bias (overreliance
on one trait or piece of information), apophenia (perceiving meaningful
connections between unrelated things), availability heuristic
(overestimating the likelihood of events with greater \"availability\"
in memory), cognitive dissonance (the perception of contradictory
information and mental toll that results from it), egocentric bias
(reliance too heavily on one\'s own perspective), extension neglect
(ignoring relevant information in decision-making processes), framing
effect (drawing different conclusions based on how information is
presented), logical fallacies like Gambler\'s fallacy and Berkson\'s
paradox, prospect theory involving biases such as loss aversion and
status quo bias, self-assessment biases including Dunning--Kruger effect
and Illusion of explanatory depth, truth judgment biases like belief
bias and the Illusory truth effect, association fallacies (attributing
greater accuracy to authority figures), attribution bias
(overemphasizing personality-based explanations for others\' behaviors),
conformity biases (going along with popular opinions or trends), ingroup
bias (Preference for members of one\'s own group over those outside),
and memory biases like misattribution errors, conservatism or regressive
bias, consistency bias, serial position effect, and spacing effect.

------------------------------------------------------------------------

**[Rescuing the Druid Halsin - Baldur\'s Gate III Guide -
IGN](https://www.ign.com/wikis/baldurs-gate-3/Rescuing_the_Druid_Halsin)**:

Wondering how to get rid of a pesky parasite? Rescuing Halsin could be
just the key. This Act One quest is part of the Finding a Cure main
storyline and takes you through tricky battles and challenges to
potentially find the cure for your party. You\'ll work your way through
many locations, including Emerald Grove, The Blighted Village, Goblin
Camp, Pits of the Goblins, Worg Pens, Moonrise Towers, and eventually,
the Mountain Pass. Along the journey, you\'ll meet fascinating
characters such as Aradin, Guard Gurgon, One, Two, and Three, Raphael,
Minthara, Priestess Gut, Halsin, Nettie, Zevlor, Kagha, Rath, and
various enemies like Worgs, Goblins, Skeletons, Treespeakers, Fungal
Titans, and the Absolute. Following a series of events to rescue Halsin
and take down several leaders like Drog Ragzlin, Minthara, and Priestess
Gut, you may come closer to discovering the cure for your
parasite-ridden party members. Through the mission\'s ups and downs, you
will experience a mix of encounters - some tougher than others but all
critical steps towards locating a solution. Remember to utilize your
surroundings, equipment, spells, abilities, and allies to navigate these
challenges, keep your goals in mind, maintain your party\'s health and
morale, and most importantly, stay persistent.

------------------------------------------------------------------------

**[Schöpfer aus
Kupfer](https://www.servusmarktplatz.com/p/Sch%C3%B6pfer-aus-Kupfer/SM139538/)**:

The article mentions a product from Waldviertel, Waidhofen an der Thaya
that cannot be delivered to the chosen country at this moment, with its
price being €59.00 (including tax). Sharing it on Facebook and sending
via email are also mentioned. However, there is a statement about a
specific issue saying \"not available,\" while another individual says
they don\'t have it, implying unavailability of the product for them
too.

------------------------------------------------------------------------

**[Donald E. Knuth: 30 Jahre Weihnachtsvorlesungen frei
verfügbar](https://www.golem.de/news/donald-e-knuth-30-jahre-weihnachtsvorlesungen-frei-verfuegbar-2312-180612.html)**:

Die Stanford University hat alle Weihnachts-Vorlesungen des Informatik-
und Mathematikexperten Donald E. Knuth auf YouTube veröffentlicht und in
einer Playlist organisiert. Hinzu kommen 22 Videos aus der Aha-Serie,
die sich mit mathematischen Problemstellungen beschäftigt, und weitere
17 Videos über den Textsatzsystem TeX. Knuth erhielt 1974 den Turing
Award für seine Arbeit an Algorithmen in seinem Werk \"The Art of
Computer Programming\". Der Playlist ist zugänglich unter
<https://www.youtube.com/playlist?list=PL53D2D2F669CD4B80>

------------------------------------------------------------------------

**[Herkunftsnachweise: Ökostrom darf wieder zweimal verkauft
werden](https://www.golem.de/news/herkunftsnachweise-oekostrom-darf-wieder-zweimal-verkauft-werden-2312-180478.html)**:

Dieser Artikel erzählt von den Problemen mit dem System der
Herkunftsnachweise für erneuerbaren Strom in einigen europäischen
Ländern, insbesondere Island und Norwegen. Aufgrund eines
Doppelanrechnungssystems können Unternehmen, welche aufgrund dieser
Anrechnungen keine kostroffizienten Emissionsbilanzen besitzen, die
Herkunftsnachweise erwerben. Aufgrund der fehlenden Kriterien für eine
Zustzlichkeit des Stroms bei einem Kostromkunden wurde das System von
verschiedenen Seiten in Frage gestellt. In Norwegen ist dieser Umstand
im Grunde akzeptiert und es gibt kaum Kontrolle, ob Unternehmen
tatsächlich nur erneuerbaren Strom verwenden oder Herkunftsnachweise
beziehen. Dieser Missbrauch des Systems wird allerdings nicht als
wesentliche Problematik angesehen. Im Gegensatz dazu besteht in
Deutschland eine Exportstoppfr Doppelanrechnungen von erneuerbaren
Strom, die wiederum aber aufgehoben wurde. Der Isländische
Energieminister hat 2021 behauptet, dass sich die norwegischen Regeln
entsprechend anpassen werden, um dieses Problem zu lösen. In Deutschland
hingegen wird bei Frderprogrammen auf Herkunftsnachweise gesetzt, wobei
jedoch in Norwegen ein anderes System angewandt wird:
Industrieunternehmen können sich dort Kosten für indirekte
Kohlendioxidemissionen ausgleichen lassen, die etwa durch den
europäischen Emissionshandel anfallen, und dies ist an eine bestimmte
Menge erneuerbarer Energie gekoppelt. Aktuell ist der Ausbau von
Wasserkraftwerken in Island hin zum Betrieb mit grner Strom in Gang,
wobei die Herkunftsnachweise dazu beitragen sollen, dass diese Anlagen
erneuerbar bleiben. Die isländische Regierung hat Pläne, um 2040 nur
noch mit erneuerbaren Energien zu produzieren, woran die Verwendung der
Herkunftsnachweise maßgeblich beteiligt sein könnte. Die kostenfreie
Versorgung von Aluminiumherstellern in Island und anderen Ländern mit
erneuerbaren Energien wird nicht durch Herkunftsnachweise erzeugt,
sondern durch den Ortshaftungsprinzip im Rahmen des Vertrags über die
Arbeitende Gemeinschaft (ACG). Die AIB hat eine Reihe von europäischen
Ländern, darunter Deutschland, Österreich und die Schweiz, 2017
gesperrt, um Herkunftsnachweise für erneuerbaren Strom einzuführen. Die
Sperre wurde jedoch bereits nach kurzer Zeit wieder aufgehoben,
allerdings ohne Kritik aus dem Umweltbundesamt, das 2018 die Aktivitäten
des deutschen Bundesministeriums für Wirtschaft und Klimaschutz
beklagte.

------------------------------------------------------------------------

**[GitHub - djsime1/awesome-flipperzero: 🐬 A collection of awesome
resources for the Flipper Zero
device.](https://github.com/djsime1/awesome-flipperzero)**:

This article highlights a collection of resources for the Flipper Zero
device, including FAQs, databases and dumps, applications and plugins,
firmware options, graphics and animations, various modules and cases,
off-device tools, notes and references, tutorials on using the device
and troubleshooting, a community wiki, disassembly guides, related
projects, alternative applications, and more. It emphasizes that it is
not affiliated with Flipper Devices Inc.

------------------------------------------------------------------------

**[W-L student prompts police investigation after allegedly using a
device to turn off nearby iPhones \|
ARLnow.com](https://www.arlnow.com/2023/12/19/__trashed-8/)**:

A cybersecurity incident at Washington-Liberty High School led to
disrupted classes and a police investigation. A student used an
electronic device within the school, causing nearby iPhones to turn off.
The student was identified, but no charges have been sought yet as
investigations continue. Arlington Public Schools shared tips on general
cybersecurity measures to maintain device security.

------------------------------------------------------------------------

**[Stupid Patent of the Month: Selfie
Contests](https://www.eff.org/deeplinks/2023/12/stupid-patent-month-selfie-contests)**:

This article expresses concern over software patents, particularly those
related to online contests. The Electronic Frontier Foundation (EFF)
argues that such patents, like Patent No. 8,655,715 held by Opus One\'s
company \"Contest Factory,\" claim ownership of basic human activities
and harm people\'s rights to participate in online culture. Contest
Factory has filed lawsuits against several companies over their
involvement in various online contests, asserting patent infringement on
everyday use of computers and voting processes. The article highlights
the issue of software patents harming digital freedoms and challenges
these practices at both the patent owner and government levels.

------------------------------------------------------------------------

**[The war of the
workstations](https://www.theregister.com/2023/12/25/the_war_of_the_workstations/)**:

This article discusses a forgotten war of the past which has shaped
modern computing. It explores the differences between Lisp and Smalltalk
machines in their prime. These were powerful computers with unique
development environments that could edit live code on the fly, making
them more dynamic than today\'s computers. The article dives into how
these systems lost to simpler solutions like the Unix system. Despite
these complex systems being less efficient and more fragile, they held
advantages over contemporary technology at their peak. The article ends
by reminding readers of a time when computing was much different, and
how the choices made then have left their impact on today\'s digital
world.

------------------------------------------------------------------------

**[Is software getting worse? - Stack
Overflow](https://stackoverflow.blog/2023/12/25/is-software-getting-worse/)**:

In this article discussing the state of modern app development, various
opinions are presented on why apps have become larger, slower, and more
bug-prone over time despite recent advances in hardware capabilities. A
significant factor is said to be the lack of focus on software quality
as compared to feature delivery. The market environment for consumer
software is also pointed out as a major contributing issue, where users
expect free or low-cost apps while software creators rely on other
revenue streams, leading to bloated and slow-running apps. Despite this
current situation, the author remains hopeful that in the future there
will be more emphasis on efficiency, technical debt reduction, and
improved economic exchange in the app development industry.

------------------------------------------------------------------------

**[The dark side of social media on youth mental
health](https://www.psypost.org/2023/12/the-dark-side-of-social-media-on-youth-mental-health-215179)**:

In May 2023, the U.S. Surgeon General issued a public advisory
highlighting the links between social media and youth mental health
issues due to conventional beauty standards. Research shows that media
content can lead to mental illness, disordered eating, and body image
dissatisfaction in both men and women across different communities.
Social media is suspected to play a role in worsening young people\'s
mental health, with studies pointing out its impact on diet and exercise
patterns. While social media has benefits, such as connecting with
supportive communities, the use of social platforms contributes to
unrealistic expectations and negative effects on mental health. These
factors contribute to the development of eating disorders. Toxic beauty
content includes promoting cosmetic procedures, pro-eating disorder
content, clean eating posts, and false sense of connection for weight
loss and appearance change. To tackle this issue, policy changes may
include increased social media company transparency, child data privacy
standards, and tax incentives discouraging companies from manipulating
images. Families can reduce their screen time by creating phone-free
zones, while adults can model healthy social media behaviors and
encourage children to focus on building connections and engaging in
meaningful activities.

------------------------------------------------------------------------

**[Baldur\'s Gate 3: How To Level Up
Fast](https://www.thegamer.com/baldurs-gate-3-fastest-xp-leveling-tips-tricks/)**:

In Baldur\'s Gate 3, XP plays a critical role in leveling up characters
and enhancing their abilities. The game follows a similar experience
system to most CRPGs and Fifth Edition D&D. Players earn XP through
defeating enemies, completing quests, and exploring the world. Level
progression is generally consistent in each Act, with varying levels of
difficulty. Combat remains the primary source of XP in the game,
followed by questing. Inspiration also grants XP for performing actions
related to a character\'s background. Players should focus on leveling
up through various sources while prioritizing side quests and exploring
during their playthrough.

------------------------------------------------------------------------

**[Baldur\'s Gate 3: Achtung, einige Quests haben einen versteckten
Timer, von dem euch das Spiel nichts
erzählt](https://www.gamepro.de/artikel/baldurs-gate-3-achtung-einige-quests-haben-einen-versteckten-timer-von-dem-euch-das-spiel-nichts-erzaehlt,3399106.html)**:

In Baldur\'s Gate 3, manche Missionen können von kleineren
Entscheidungen beeinflusst werden. Wenn Spieler nicht vorsichtig sind
oder übersehen einfache Details, kann dies zu unerwünschten Folgen
führen wie zusätzlichen Inhalten sperren oder Charaktere sterben.
Beispiele für solche Missionen sind das Smaragd-Ritual, Bardin im
Smaragd-Hain und die Harpien am Strand. Die Komplexität des Spiels kann
zu ungeplanten Zeitkonsequenzen führen. Es gibt auch Hinweise darauf,
dass es weitere verborgene Faktoren geben könnte.

------------------------------------------------------------------------

**[Electricity That\'s Too Cheap To
Meter](https://shkspr.mobi/blog/2023/12/electricity-thats-too-cheap-to-meter/)**:

The article highlights the challenges in making nuclear power affordable
and its failure to live up to expectations as a cheap, safe, and clean
source of energy. Construction and decommissioning costs for nuclear
power plants remain high compared to their electricity production cost.
In contrast, renewable energy sources such as wind power have provided
an abundance of electricity at times leading to consumers being paid for
their usage. While the world still requires base-load electricity
sources, renewables offer promising alternatives that may one day make a
significant contribution to global energy needs.

------------------------------------------------------------------------

**[Baldur\'s Gate 3: Tipps, Tricks und Lösungen im
Anfänger-Guide](https://www.eurogamer.de/baldurs-gate-3-tipps-tricks-und-losungen-im-anfanger-guide#section-2)**:

Baldur\'s Gate 3 has a complex story that revolves around the characters
and their journey through different lands while also dealing with
various plot twists, challenges, and enemies they encounter along the
way. The game features numerous quests where players need to make
crucial decisions that impact the plot. Furthermore, it offers various
character customization options, allowing players to create their own
unique protagonist tailored to their personal preferences. Combat in the
game is turn-based, with a heavy focus on strategy and making use of
different classes\' special abilities. Players can also interact with
the environment, using elements such as fire, wind, and earth to their
advantage in combat situations. Additionally, the game features an
intricate crafting system where players can create new items or upgrade
existing ones using materials they gather through exploration. The
relationship between characters is another important aspect of the
storyline, with several romance options available for players to
explore. Overall, Baldur\'s Gate 3 provides a rich and immersive gaming
experience that challenges players on both strategic and emotional
levels.

------------------------------------------------------------------------

**[x86 Assembly Language Programming with
Ubuntu](http://www.egr.unlv.edu/~ed/x86.html)**:

This article discusses how to use the x86-64 instruction set within the
context of University level assembly language and systems programming
courses. Emphasizing its applicability on popular processors, it focuses
on using the Ubuntu 64-bit Operating System. Although the provided code
is designed for testing in various Linux-based 64-bit OSs, it has
specifically been tested with Ubuntu versions 14, 16, and 18 LTS. The
x86 programming text and examples are available in PDF format.

------------------------------------------------------------------------

**[Constellations are Younger than
Continents](https://www.lesswrong.com/posts/YMakfmwZsoLdXAZhb/constellations-are-younger-than-continents)**:

The song Bold Orion wrongly claims that constellation Orion has
witnessed the rise and fall of continents; however, continental changes
occur over timescales of tens or hundreds of millions of years, while
stars have lifetimes in billions of years. Constellations are patterns
formed by stars in our night sky, with most being distant from each
other, gravitationally interacting only if part of stellar associations.
The constellation Orion is an unusual case, as its seven brightest stars
appear to move slowly within the constellation due to their association;
they\'re young and large, meaning they have short lives. Orion will last
longer before its bright stars burn out and turn supernova.
Constellations change with time, but not on a scale that allows
observing continental movements.

------------------------------------------------------------------------

**[Promi mit
T](https://stadtlandflussonline.net/c/de/511/T/Promi-mit-T/)**:

This article lists notable names, mostly consisting of entertainers and
athletes, along with some brands. A summary would be hard to create
without the context of the original article or knowing its purpose.
However, these people and entities are seemingly being connected in some
way, possibly implying connections, comparisons, or tributes within a
particular field (entertainment, sports), or simply as part of a larger
list.

------------------------------------------------------------------------

**[Test Smarter, Not Harder: Focus on Outcomes, Not
Outputs](https://markus.oberlehner.net/blog/test-smarter-not-harder-focus-on-outcomes-not-outputs/)**:

In product management, understanding the distinction between output and
outcome is crucial. Output refers to the direct results of our efforts
while outcome focuses on delivering valuable results that matter to
customers and align with overall business goals. When it comes to
testing in software development, efficiency and streamlined processes
should be prioritized over focusing solely on output metrics like test
numbers or code coverage. By adopting a balanced approach, tests can
help accelerate the journey towards building better software more
efficiently.

------------------------------------------------------------------------

**[Copy, Acquire, Kill--- How Meta could pull off the most extraordinary
pivot in tech
history](https://www.fromjason.xyz/p/notebook/copy-acquire-kill-how-meta-could-pull-off-the-most-extraordinary-pivot-in-tech-history/)**:

This article suggests that Meta\'s sudden interest in ActivityPub and
Mastodon seems to be part of a longer-term plan. A theory posits that
Meta\'s objective behind the Threads-to-Mastodon initiative may be
related to App.net, a previous microblogging platform that tried to
compete with Twitter. The idea is for Meta to create a platform like
Threads.net, which would offer interoperability, content ownership, and
revenue share programs for smaller developers. This could lead to a
significant shift in the social media landscape if successful. However,
various challenges remain. The article discusses potential motivations
behind this plan, including anti-trust concerns, regulations, and
monetization strategies.

------------------------------------------------------------------------

**[How to run a small social network site for your
friends](https://runyourown.social/)**:

Running your own social network site can provide you with control over
the platform\'s rules and policies, as well as the ability to modify its
software according to your community\'s needs. It involves a lot of work
in terms of managing the server, maintaining the codebase, and ensuring
that the community remains cohesive through group activities and shared
norms. While it can be challenging, it also offers unique opportunities
for building a tailored online environment that aligns with your values
and those of your community members.

------------------------------------------------------------------------

**[Cheapest and Most Expensive Appliances to Run Each
Year](https://moneytransfers.com/news/2023/01/09/cheapest-and-most-expensive-appliances-to-run-each-year)**:

In 2022, global energy prices increased by 60% due to the Russia-Ukraine
conflict, causing many households worldwide, particularly in the US,
financial strain. As predicted, prices are expected to fall by 11% in
2023, leaving people still struggling with high electricity bills. In
the US, electricity costs vary across different regions: West -
\$0.18/kWh; Pacific - \$0.25/kWh (Los Angeles); South - \$0.15/kWh;
Northeast - \$0.16/kWh; and Midwest - \$0.14/kWh. Air conditioning usage
leads to the highest energy consumption, costing up to \$1,062 per year
in the US. Meanwhile, LED light bulbs are the most economical to run at
an estimated monthly average of \$0.29. Factors such as remote work can
also contribute to higher energy bills. By focusing on areas like
swapping air conditioners for fans, using energy during off-peak times,
and reducing hot water consumption from household appliances, households
can potentially save money on their energy bills.

------------------------------------------------------------------------

**[A simple theory of cancel
culture](https://josephheath.substack.com/p/a-simple-theory-of-cancel-culture)**:

The article examines cancel culture as a phenomenon influenced by social
media rather than political or cultural factors. It focuses on the
increased ability of people to recruit third parties for conflicts,
escalating them beyond private issues. Cancel culture leads to the
magnification of minor violations and the intimidation of individuals
and institutions that were previously unaffected. However, there is hope
for positive change as senior administrators become more accustomed to
online mobs, and younger generations learn how to efficiently translate
their online dominance into real-world political effectiveness. Overall,
cancel culture has its challenges but may eventually lead to a better
understanding of conflict management on social platforms.

------------------------------------------------------------------------

**[Your Car Is Tracking You. Abusive Partners May Be,
Too.](https://www.nytimes.com/2023/12/31/technology/car-trackers-gps-abuse.html)**:

A woman in the US discovered her estranged husband was tracking her
movements using a connected car app after she fled their home due to
abuse. Christine Dowdall found out about this service, mbrace from
Mercedes-Benz, when she noticed unusual messages on her vehicle\'s
display screen. Despite trying to remove his digital access to the car
several times, Dowdall could not do so as her husband had a better
credit score and they shared loan and title of the car. Both Mercedes
and Tesla have faced lawsuits related to controlling partners using
connected cars for harassment.

------------------------------------------------------------------------

**[Public Domain Day 2024 \| Duke University School of
Law](https://web.law.duke.edu/cspd/publicdomainday/2024/)**:

The article you provided is about Public Domain Day 2024, which
celebrates the entry of thousands of copyrighted works from 1928 into
the public domain on January 1st, 2024. This includes books, plays,
films, musical compositions, and sound recordings that can be freely
used by anyone without permission or fee. The article also discusses the
impact of copyright term extensions and how they have led to a shrinking
global public domain.

The following are some key points from the article:

- On January 1st, 2024, works from 1928 will enter the US public domain
after a 95-year term of copyright protection. This includes famous works
such as D.H Lawrence\'s \"Lady Chatterley\'s Lover\" and Bertolt
Brecht\'s \"The Threepenny Opera.\"

- The entry into the public domain allows for greater creativity,
access to cultural materials that might otherwise be lost or forgotten,
and learning from both joyful and sobering aspects of our history. It
also provides material for artists and writers to build upon and inspire
new works.

- However, many older works are not commercially viable anymore and
have been locked away due to copyright restrictions, leading to the loss
of a significant part of our cultural heritage. This is particularly
true for silent films from the 1920s, where preservation efforts were
hindered by long copyright terms.

- The article also highlights the complexity of copyright law and how
difficult it can be for users to determine what material is free to use
without legal liability. It emphasizes the importance of a clearer
system that would benefit artists, citizens, and entrepreneurs alike.

- Despite the consensus among policymakers, economists, and academics
that lengthy copyright extensions impose more harm than good, countries
continue to extend their copyright terms due to trade deals that require
harmonization. This leads to an irrational transfer of wealth from the
public domain to a small subset of rights owners.

- The article also mentions the existence of \"invisible public
domain\" works that may already be in the public domain due to
non-renewal or failure to comply with formalities required for copyright
protection, but are still considered copyrighted due to practical
barriers such as difficulty finding relevant copyright information.

- Finally, the article concludes by expressing a bittersweet sentiment
about the celebration of Public Domain Day - while it is a cause for joy
and gratitude for the new works entering the public domain, there is
also regret over the unnecessary losses caused by long copyright terms
that lock away millions of older works from future creators and the
public.

In summary, Public Domain Day 2024 marks an important milestone in
allowing greater access to our cultural heritage while highlighting the
need for a more rational and efficient system governing our collective
culture.

------------------------------------------------------------------------

**[Email addresses are not good \'permanent\' identifiers for accounts
December 30,
2023](https://utcc.utoronto.ca/~cks/space/blog/tech/EmailAddressesBadPermanentIDs)**:

The article discusses using email addresses as permanent identifiers
within a system. While it may seem logical due to their widespread
usage, this approach has limitations. People\'s email addresses change
frequently, and organizations are not legally obligated to maintain
these changes. Using email addresses exclusively for account recovery
can lead to problems if they become nonfunctional or get reassigned. It
is better to have an independent internal identifier that remains
constant throughout a user\'s account lifecycle.

------------------------------------------------------------------------

**[Instant Messaging: Protocols are "Commons", Let's Take Them Seriously
/
ProcessOne](https://www.process-one.net/blog/instant-messaging-protocols-are-commons-lets-take-them-seriously/)**:

An article discusses the lack of an open and universally accepted
exchange protocol in instant messaging, still prevalent thirty years
after its emergence. The Jabber/XMPP protocol, which aimed to enable
communication between messaging platforms, has been overshadowed by
proprietary messaging services that leverage internet giants\' power.
XMPP and the newer Matrix protocol are examples of open protocols, but
both have failed to break this barrier, despite their potential in
interoperability. This situation highlights the importance of
collaboration in digital communication through an open foundation that
allows healthy competition. Despite France promoting a secure messaging
service called Olvid, it is proprietary and does not promote
interoperability, making it less significant in the global market
compared to standardized open protocols.

------------------------------------------------------------------------

**[The X220 ThinkPad is the Best Laptop in the
World](https://bt.ht/posts/x220/)**:

The author praises the X220 ThinkPad as the greatest laptop ever made
due to its near-perfect build quality, abundance of functional ports,
excellent keyboard design with additional Trackpoint, competitive
battery life, and high repairability level. They credit Lenovo for
providing a detailed maintenance manual alongside the hardware
components\' simplicity. The author acknowledges that the laptop might
be heavier than newer models but still considers it superior in terms of
overall performance, functionality, and longevity.

------------------------------------------------------------------------

**[Android Data Encryption in
depth](https://blog.quarkslab.com/android-data-encryption-in-depth.html)**:

1\. What is Android File-Based Encryption (FBE) and how does it work?
Android File-Based Encryption (FBE) is a feature that provides
encryption for individual files rather than the whole device. It uses
strong crypto algorithms to protect each file, ensuring that only the
correct credentials can access its contents. FBE works by encrypting
each file individually and then associating it with a unique key. The
keys are derived from master key for the directory tree. This approach
makes it more resilient to attacks, since any single failure in
decryption will not result in the loss of all data on the device.
Furthermore, it enables granularity in managing access permissions for
files.

\### 2. What is Android Device Encryption (ADE) and how does it differ
from File-Based Encryption? Android Device Encryption (ADE), previously
called Whole Disk Encryption (WDE), encrypts all data on a device\'s
storage, including system files. It protects both the user data and
Android system files by using strong crypto algorithms. A key difference
between FBE and ADE is that while FBE secures individual files with
separate encryption keys, ADE uses only one master key for the entire
disk, making it easier to manage but less resilient to attacks compared
to FBE.

\### 3. What are the main components of Android data encryption that
this article discusses? The article focuses on File-Based Encryption
(FBE) and Device Encrypted (DE) keys in a device with multiple users.
The two mechanisms for authentication are Gatekeeper Trusted Application
for devices without security chips, and Weaver Trusted Application when
security chips are available. FBE uses a single master key derived from
the directory tree while DE protects the files independently with
individual keys. Gatekeeper is responsible for password validation and
access management, whereas Weaver works by storing pairs of keys and
values in a security chip to manage authentication.

------------------------------------------------------------------------

**[Unsichtbare Hand des Strommarktes: Merit-Order im Detail
erklärt](https://www.telepolis.de/features/Unsichtbare-Hand-des-Strommarktes-Merit-Order-im-Detail-erklaert-9577502.html)**:

Die Liberalisierung des europäischen Strommarktes führte zur Einführung
der Merit-Order, einem Preisbildungsmechanismus an den
Großhandelsmärkten. Sie bestimmt, wie sich der Bruttoverbrauchspreis
bildet, indem sie die Einsatzreihenfolge von Kraftwerken nach ihren
Produktionskosten ordnet. Die Merit-Order dient zur Optimierung der
Stromversorgung und berücksichtigt nicht investitionsbezogene Kosten.
Starker Bedarf kann aber zu Preissteigerungen führen, was Probleme für
die Weiterentwicklung des Strommarkts erzeugen könnte.

------------------------------------------------------------------------

**[Wir können entweder Milliardäre oder Demokratie haben. Nicht
beides.](https://www.telepolis.de/features/Wir-koennen-entweder-Milliardaere-oder-Demokratie-haben-Nicht-beides-9578117.html)**:

Im Vorfeld der US-Parlamentswahlen 2024 wird auf Medienexperten warten,
sieht man u. a. zu Kandidaten und deren Durchsetzungsfähigkeit, Swing
States oder Wahlmannschaften sowie möglichen Wahlergebnissen.
Gelegentlich werden auch Themen wie die Notwendigkeit der
Ungleichheitsbeseitigung in den USA angesprochen, die jedoch nur als
unvermeidbares Ergebnis unserer Wirtschaft gesehen wird. Allerdings
besteht diese ungleiche Verteilung von Reichtum aus einer bewussten
Planung und der Vorstellung, dass was gut für Milliardäre auch gut für
die Gesellschaft ist. Ein neu veröffentlichtes Bericht von UBS zeigt,
dass Milliardäre zum ersten Mal in neun Ausgaben des Berichts mehr
Vermögen durch Erbfolge als durch Unternehmertum angehoben haben. Es
wird vorausgesagt, dass sich diese Tendenz im nächsten Jahrzehnt
festigern dürfte, da mehr als 1000 Milliardäre ihre Kinder erben werden,
was dem Vermögen des gesamten Vereinigten Königreichs entspräche. Daher
ist die Umverteilung des Reichtums angesichts dieser Unterschiede
zentral für eine Rettung der amerikanischen Demokratie.

------------------------------------------------------------------------

**[Preissturz bei Wohnungen und Häusern: Was Käufer wissen
sollten](https://www.telepolis.de/features/Preissturz-bei-Wohnungen-und-Haeusern-Was-Kaeufer-wissen-sollten-9581960.html)**:

Der deutsche Immobilienmarkt war im dritten Quartal 2023 von einem
starken Preisrückgang betroffen, besonders bei Ein- und
Zweifamilienhäusern. Expertinnen sind skeptisch in Bezug auf baldige
Markterholung, da die Anzahl der abgeschlossenen Wohnbauten im Jahr 2023
erheblich weniger als 2022 betragen könnte und bis 2025 möglicherweise
sogar noch weiter sinken. Obwohl Bundesbauministerin Klara Geywitz
optimistisch ist, sieht das Institut für Wirtschaftsforschung eine
weitere Steigerung der Immobilienpreise als nicht wahrscheinlich an. Die
Zunahme des Preisniveaus in Deutschland seit 2010 sei vor allem auf
Finanzspekulationen zurückzuführen, da sich die Mieten und Preise
deutlich erhöht haben.

------------------------------------------------------------------------

**[Bauern gegen Agrardiesel-Kürzung: Wie berechtigter Protest von rechts
vereinnahmt
wird](https://www.telepolis.de/features/Bauern-gegen-Agrardiesel-Kuerzung-Wie-berechtigter-Protest-von-rechts-vereinnahmt-wird-9582004.html)**:

Im Artikel wird die Annahme einer bevorstehenden Generalstreik-Situation
in Deutschland kritisch betrachtet und aufgearbeitet, wie sie von
Linksbewegungen erwartet werden könnte. Stattdessen würde ein
Generalstreik eine Forderung aus der Selbstorganisation der
Lohnabhängigen eintreten, ähnlich wie in der Veranstaltungsreihe
„Vergessene Arbeitskämpfe" dargelegt wurde. Der Rechtspopulistische
Ansatz der Bauernproteste gegen die Haushalts- und Energiepolitik
verbindet sich zunehmend mit rechten politischen Gruppen, wie etwa der
AfD. Die Verbindungen zwischen den konservativen
Landwirtschaftsorganisationen und der Partei waren jedoch vorher bereits
bestehend, wobei auch Teile der CDU in diese Vernetzung involviert sind.
Es ist klar, dass die Beteiligung von Linker Bewegungen an diesen
Protesten nicht beabsichtigt ist, da das Thema keine relevante Rolle
spielt und der Schwerpunkt auf dem Wettbewerb innerhalb des
Landwirtschaftssektors liegt. Dennoch besteht eine Gelegenheit für die
linken Gruppen, sich in diesem Umfeld besser zu verstehen, um
potentiellen Verbündeten und allen Beteiligten die Notwendigkeit einer
gesellschaftlichen Veränderung näherzubringen.

------------------------------------------------------------------------

**[Milliardenverlust: S21-Kostenexplosion seit zehn Jahren
eingepreist](https://www.telepolis.de/features/Milliardenverlust-S21-Kostenexplosion-seit-zehn-Jahren-eingepreist-9579612.html?seite=all)**:

Der Bahnprojekt Stuttgart 21 wurde immer teurer und teurer, obwohl der
Disaster schon 2013 bekannt war. Eine Kostenexplosion führte zu einem
Anstieg der Ausgaben von früheren geschätzten neun Milliarden Euro auf
mindestens elf Milliarden Euro mit einem \"Puffer\" von 11,5 Milliarden
Euro. Das Projekt sollt im Gegenzug die Kapazitäten des vorhandenen
Bahnhofs verbessern, was durch eine Digitalisierung und neue
Tunnelbauten erreicht werden soll. Allerdings wird berichtet, dass das
Hauptprojekt länger dauern könnte als geplant, da es Fehlplanungen,
Verzögerungen im Innenausbau der Bahnhofshalle und Probleme mit einem
Partnerunternehmen gaben. Dadurch kann sich die Digitalisierung des
Bahnknotens nicht allein um die Mängel wettmachen. Die Kosten könnten
insgesamt bis in die 2040er Jahre hinausgehen, was unter Umständen zu
weiteren zehn Milliarden Euro führen könnte.

------------------------------------------------------------------------

**[CDU-Spendenaffäre: Von schwarzen Kassen, Geheimnissen und dem Erbe
Wolfgang
Schäubles](https://www.telepolis.de/features/CDU-Spendenaffaere-Von-schwarzen-Kassen-Geheimnissen-und-dem-Erbe-Wolfgang-Schaeubles-9583580.html)**:

Wolfgang Schuble war ein wichtiges Mitglied der
Christlich-Demokratischen Union Deutschlands, einer konservativen
politischen Partei in Deutschland. Er starb im Alter von 81 Jahren und
war Teil des Skandals um illegale Parteispenden der CDU, die Ende der
1990er Jahre auf eine tiefe Verfassungskrise in Deutschland führte. Die
Affäre war über Spenden aus schwarzen Kassen, nicht offenkundigen
Geldern von Unternehmen und Einzelpersonen, die für den Wahlkampf
eingesetzt wurden. Vorherrschend waren Fragen nach Transparenz in der
Parteienfinanzierung und Reformbemühungen zur Verhinderung solcher
Vorgänge. Die CDU-Spendenaffäre hatte tiefgreifende politische
Auswirkungen, darunter Rücktritte führender CDU-Politiker und
Strafverfahren gegen Schuble und andere Politiker.

------------------------------------------------------------------------

**[Encrypted Remote Backups via rsync \| Baeldung on
Linux](https://www.baeldung.com/linux/rsync-encrypted-remote-backups)**:

8\. Analyzing the Encrypted Backup Scripts for Security 1. Overview

1.  This article describes two Bash scripts; sync.sh for making
    encrypted backups, and syncRestore.sh for restoring them. The
    scripts are designed to ensure data security by using file-based
    encryption tools instead of disk encryption. They can be used to
    create encrypted archives with rsync over ssh on a remote server
    while maintaining security, privacy, and flexibility.

2\. Encryption Method

1.  Both backup and restore scripts use gocryptfs in reverse mode for
    the encryption process, as it provides file-by-file encryption,
    allowing individual files to be accessed without needing to download
    or recover the whole backup archive. This technique ensures minimal
    load on the CPU and RAM and no demand for extra space on the local
    disk while still providing robust encryption.
2.  The scripts also require a strong password to protect sensitive data
    and maintain data integrity with hash verification during the
    decryption process, ensuring that there is no loss of files or data
    corruption.

3\. Security Considerations

The use of file-based encryption combined with rsync and ssh connections
provides an additional layer of security for our encrypted backups. This
method ensures:

1.  Data privacy: Encryption makes the data unusable to unauthorized
    entities, even if they gain access to the backup files or server
    storage.
2.  Protection against brute force attacks: The strength of the chosen
    password increases the difficulty for attackers to obtain encrypted
    data.
3.  Minimizing exposure risk: File-based encryption allows individual
    files to be accessed without the need to decrypt the entire archive,
    reducing potential exposure time.
4.  Continued encryption during transfer: All transfers between hosts
    are encrypted end-to-end as rsync uses SSH for secure connections,
    protecting data even if it passes through multiple intermediate
    servers or network components.

4\. Limitations and Improvements

While the scripts provide robust security measures, there are some
limitations to consider:

1.  Inadvertent exposure: If an attacker manages to obtain a single
    encrypted file from the backup, they could try different passwords
    or use brute-force techniques. It\'s crucial to choose strong and
    unique passwords for better security.
2.  Relying on SSH keys management: A successful attack on the remote
    server or the SSH key could lead to a breach of data privacy and
    encryption failure. Ensuring proper SSH keys management is
    essential.
3.  Backup consistency: When restoring backups, it\'s essential to
    ensure that the restored files are compatible with the local
    environment in terms of file format and system requirements. This
    requires careful testing before using them, possibly creating an
    up-to-date backup copy for emergency situations.

Improvements can be made by implementing more robust encryption
algorithms or integrating end-to-end encryption solutions across data
transfer, storage, and recovery stages to further enhance security.

------------------------------------------------------------------------

**[Two kinds of threads pools, and why you need
both](https://pythonspeed.com/articles/two-thread-pools/)**:

This article discusses how to set up thread pools in Python for
large-scale data processing and achieve optimal performance. Thread
pools are beneficial for both CPU-bound and network-bound tasks. For
CPU-bound tasks, you want exactly N threads running at any given time,
matching the number of CPU cores. Network-bound tasks require a
different approach, with the thread pool size focused on preventing
hitting resource limits without reaching concurrency levels that cause
other issues. In many cases, using two separate thread pools for CPU and
network tasks is more effective than trying to have one pool fit all
circumstances.

------------------------------------------------------------------------

**["Don't Mock What You Don't Own" in 5
Minutes](https://hynek.me/articles/what-to-mock-in-5-mins/)**:

A principle called \"Don\'t Mock What You Don\'t Own\" is discussed,
suggesting that when writing tests for real-world software with
dependencies on third-party libraries, it should be better to mock your
own objects instead of third-party ones. This approach leads to more
maintainable and testable business logic code. The article provides
examples on how to apply this principle using a DockerRegistryClient
class in Python. It also offers alternative approaches for complex
conditions involving external dependencies and discusses some related
tools and libraries available for testing HTTP clients.

------------------------------------------------------------------------

**[Fast tests for slow services: why you should use verified
fakes](https://pythonspeed.com/articles/verified-fakes/)**:

Test doubles are essential for writing efficient and robust test suites,
helping developers avoid the challenges posed by interacting with real
APIs in their code. Verified fakes take this concept further by ensuring
that fake client implementations behave exactly like their real-life
counterparts through additional testing. While they require extra effort
to set up and maintain, verified fakes are particularly useful when
dealing with slow or expensive APIs, frequent API use within the
codebase, or when handling mission-critical projects where avoiding
costly bugs is paramount.

------------------------------------------------------------------------

**[pretend](https://github.com/alex/pretend)**:

Pretend is a Python library that simplifies the process of creating
stubs, an object-oriented testing technique used in writing tests. It
allows developers to create pre-defined responses instead of performing
computations. The library helps in ensuring that your system responds as
expected for specific inputs and checks results without focusing on API
implementation details. This makes it easier for programmers to
concentrate on verifying the desired output rather than analyzing side
effects.

------------------------------------------------------------------------

**[37C3: Kartensperrsystem KUNO lud IT-Kundige zum Entsperren
ein](https://www.heise.de/news/37C3-Kartensperrsystem-KUNO-lud-IT-Kundige-zum-Entsperren-ein-9584267.html?view=print)**:

Beim Verlust oder Diebstahl einer Girokarte besteht die Gefahr, dass
jemand mit der Karte Einkäufe tätigen oder Geld abheben kann. Um dies zu
verhindern, gibt es zwei Sperrsysteme, den Sperrnotruf (116 116 oder
App) und KUNO (\"Kriminalitätsbekampfung im unbaren Zahlungsverkehr
unter Nutzung nichtpolizeilicher Organisationsstrukturen\"). Während der
Notruf nur Online-Zahlungen, Geldabhebungen und PIN-basierte
Bezahlvorgänge an Terminals blockiert, stößt KUNO darüber hinaus auf
Lastschriftverfahren in den meisten Verkaufsstellen des Einzelhandels.
Im Falle einer Sperre ist der Gang zur Polizeistation für
Girokarteinhaber jedoch immer sinnvoll. Inzwischen wurde aber auch ein
KUNO-Sicherheitslücken entdeckt, wobei es bei einer genaueren
Untersuchung im Self-Service-Bereich möglich ist, korrekt gesperrte
Karten wieder zu entsperren. Ein Sicherheitsforscher hat daraufhin ein
Rate-Limit eingeführt, um Abfragen für den Selbstbedienungsbereich zu
begrenzen und die Sicherheitslücken zu reduzieren.

------------------------------------------------------------------------

**[37C3: Kopierschutz AACS 2 für Ultra HD Blu-rays ist
geknackt](https://www.heise.de/news/37C3-Kopierschutz-AACS-2-fuer-Ultra-HD-Blu-rays-ist-geknackt-9584107.html?view=print)**:

Wissenschaftler haben einen umfassenden Angriff auf das aktuelle
Blu-ray-DRM präsentiert, der Schlüssel extrahieren und UHD-BD-Filme
beliebig abspielen lassen kann. Das Kopierschutzverfahren Advanced
Access Content System (AACS) in Version 2 für HD DVDs und Ultra HD
Blu-rays (UHD BD) mit 4K Auflösung (3840 × 2160 Pixel) hatte umgehenden
Versuchen zwar länger standhalten können als der Vorgänger AACS 1, aber
am Freitag auf dem 37. Chaos Communication Congress (37C3) in Hamburg
wurde nun ein \"End-to-End-Angriff\" auf das System zum digitalen
Rechtekontrollmanagement (DRM) vorgestellt. Er ermöglicht es,
AACS-2-Schlüsselmaterial zu extrahieren und damit UHD-BD-Filme auf jeder
Hardware abspielen sowie UHD-BD-Discs klonen. Die Forscher verwendeten
dabei Lücken in der Sicherheitsfunktion Software Guard Extensions (SGX)
von Intel und deren Update-Mechanismen, die eine wesentliche
Voraussetzung für AACS2 darstellen. In den betroffenen Geräten sind
schließlich auch Schlüssel extrahierbar geworden. Das Forschungsteam um
Adam Batori von der University of Michigan hat dabei weiters gezeigt,
wie die PowerDVD-Wiedergabe-Software für Blu-rays von CyberLink per
Reverse Engineering rekonstruiert werden kann. Das AACS-2-Protokoll ist
technisch gut konzipiert, doch sein Abhängigkeit von der Sicherheit der
SGX konnte es letztlich unterlaufen lassen.

------------------------------------------------------------------------

**[Coastline
paradox](https://en.wikipedia.org/wiki/Coastline_paradox)**:

The coastline paradox is a phenomenon whereby the length of a
landmass\'s coastline does not have a well-defined measurement. It is
attributed to the fact that a coastline has features at all scales, from
large features such as bays and promontories to tiny fractions of a
millimeter. This results in a seemingly infinite variation in length
depending on how it\'s measured. The problem is distinct from measuring
other edges because it involves irregular landforms rather than simpler
structures. It was first explored by Lewis Fry Richardson, continued by
Benoit Mandelbrot, and later extended to include fractal surfaces.

The coastline paradox can be related to mathematics through concepts
like the Hausdorff dimension, which describes the space-filling property
of objects and determines how their size changes as they are magnified.
Measuring a coastline typically requires estimating its length using
varying measurement units, leading to different results. However, the
problem doesn\'t necessarily arise from the act of measuring but rather
arises when measuring specific natural phenomena like coastlines that
exhibit complex structures and patterns.

------------------------------------------------------------------------

**[Sufyaan\'s Website](https://sufyaan.me/subs/)**:

This article argues that subscriptions can be a financial trap, with
their relative affordability making us easily sign up for new services.
Humans are poor at predicting future needs and remembering active
subscriptions, causing unnecessary expenditure when subscriptions
continue even though they may no longer be useful. The author suggests
avoiding subscription-based products by carefully considering if the
service is truly needed and using a short-term approach to prevent
spending unnecessarily.

------------------------------------------------------------------------

**[The Google 0-day all Infostealer groups are exploiting. \|
InfoStealers](https://www.infostealers.com/article/the-0-day-all-infostealer-groups-are-exploiting/)**:

This article warns about a vulnerability in Google\'s cookies, allowing
them to stay active even after password changes and not expiring.
Cybercriminals take advantage of this issue. Despite being alerted, no
action has been taken by Google, possibly due to the perceived tradeoff
between user convenience and security. Multiple Infostealer groups have
exploited this vulnerability for their benefit.

------------------------------------------------------------------------

**[Amazon\'s Silent
Sacking](https://justingarrison.com/blog/2023-12-30-amazons-silent-sacking/)**:

In 2023, Amazon laid off approximately 27,000 employees, which
represents a small percentage of their overall workforce. The majority
of these layoffs occurred in the retail sector. To save on costs and
maintain high earnings, Amazon has been using methods like
return-to-office initiatives and enforcing reductions in compensation.
This shift in strategy can lead to an adverse effect on staff retention
and employee morale, potentially impacting business growth. Some experts
suggest that the company may start centralizing expertise to reduce
costs, which could result in challenges for teams focused on innovation
and maintaining high operational standards. Overall, these measures are
intended to improve Amazon\'s financial standing while facing increasing
competition in the tech industry.

------------------------------------------------------------------------

**[EU CRA: What does it mean for open source? - Bert Hubert\'s
writings](https://berthub.eu/articles/posts/eu-cra-what-does-it-mean-for-open-source/)**:

The final version of the Cyber Resilience Act (CRA) focuses mainly on
commercial activity, and most open-source projects should be in
clearance according to the law. Organizations like Python Foundation or
the Linux Foundation might fit as \"open-source software stewards\"
under the new rules. For these entities, they\'ll have light-touch
obligations regarding cybersecurity policy development, reporting of
vulnerabilities, and cooperation with market surveillance authorities,
among other duties. The CRA emphasizes the importance of due diligence
for integrators that use open source in their products. It also creates
a new process enabling industry to sponsor security documentation,
attestations, audits or even security work on open-source products,
encouraging collaboration between these industries and open-source
communities.

------------------------------------------------------------------------

**[Nibbles (video
game)](https://en.wikipedia.org/wiki/Nibbles_(video_game)?lang=en?lang%3Den?lang%3Den?lang%3Den?lang%3Den?lang%3Den?lang%3Den?lang%3Den?lang%3Den)**:

Nibbles is a video game inspired by the snake concept, created using
QBasic programming language. Developed in MS-DOS by Rick Raddatz and
included with versions 5.0 and above of MS-DOS, it involves guiding a
virtual snake through a space, consuming numbers to progress while
avoiding collisions. The game has single and multiplayer modes and
increases in difficulty over time as players advance.

------------------------------------------------------------------------

**[German word of the day:
Stoßlüften](https://www.thelocal.de/20190117/stolften)**:

\"Stolften\" is a German term that refers to the practice of letting
cold air enter a room by turning off the radiator and opening windows
for five minutes before closing them again and turning on the heating.
This process aims to refresh the air inside the room, maintaining a
better indoor climate without being heavily dependent on external
temperature conditions. It is commonly practiced in German schools,
particularly to prevent mold growth due to increased humidity levels.
However, some students may disagree with this practice, leading teachers
to advise them to dress warmer instead.

------------------------------------------------------------------------

**[Getting started with Fail2Ban on
Linux](https://ittavern.com/getting-started-with-fail2ban-on-linux/)**:

This article explains how to get started using Fail2Ban to secure Linux
servers by keeping them more secure against various internet-facing
services, such as brute-force login attempts. It discusses the process
of setting up Fail2Ban with Ubuntu as an example reference system and
its usage with SSH service through iptables as a firewall. The article
explains general concepts in Fail2Ban like checking logs, following
rules for adding suspicious IPs to deny lists, configuration options
such as bantime for duration of bans, and how to view banned hosts
within specific jails or globally. It also covers working on Fail2Ban
manually including unbanning or banning hosts and the process of testing
your configuration by attempting to connect with wrong credentials. The
text provides some advice on further reading if you want more in-depth
knowledge about filters and actions for custom services and email
notifications when an IP gets banned.

------------------------------------------------------------------------

**[Family testimony reveals new insights into how Hitler became
radicalised \| News](https://www.abdn.ac.uk/news/22651/)**:

The testimony of the Popp family, who took in Hitler during his time in
Munich before World War I, has revealed new insights into his
radicalization and development of antisemitic ideas. Professor Thomas
Weber, an expert on Hitler\'s politization and radicalisation, will use
this information as part of an online short course at the University of
Aberdeen focusing on understanding Hitler\'s turn towards radical
political ideologies. The Popps shared wartime letters from Hitler that
shed light on his motivations behind targeting Jews during a time when
he struggled with personal failures as an artist. This new evidence
contributes to the understanding of how people become susceptible to
catastrophic levels of extremism.

------------------------------------------------------------------------

**[Open Source Liability is Coming \| Developers
Alliance](https://developersalliance.org/open-source-liability-is-coming/)**:

The European Union is finalizing new rules that will hold open-source
creators and licensees responsible for any user harm caused by their
software. This shift could impact businesses using open source resources
or those who work on collaborative projects, as they may have to prove
their code didn\'t play a role in harmful incidents. The proposed change
aims to ensure consumers are compensated when faced with
software-related issues, but it remains uncertain how strict liability
will be applied and whether open-source contributors will be exempt from
responsibility when their work is used in commercial products causing
harm.

------------------------------------------------------------------------

**[Why large companies and fast-moving startups are banning merge
commits](https://graphite.dev/blog/why-ban-merge-commits)**:

This article discusses the differences between merging and rebasing
techniques in a git repository. It highlights how the rebase approach
has gained popularity among fast-moving companies, mainly due to its
ability to create cleaner histories and simpler branching. Rebasing
helps by avoiding merge conflicts and keeping branches stable. While
some criticisms remain regarding the complexity of Git commands and
limited support from GitHub, this technique is being adopted more
frequently in closed-source developments as a preferred workflow. The
article suggests that using tools like Graphite can automate certain
rebase processes, making it easier to manage branches without merging
commits.

------------------------------------------------------------------------

**[Intentionally buggy commits for fame---and
papers](https://lwn.net/Articles/853717/)**:

A university research project led to intentional bugs being inserted
into Linux\'s software, leading to a review of commits from the
University of Minnesota (UMN). Greg Kroah-Hartman is planning to revert
these commits and suggested ignoring future submissions with UMN.edu
email addresses, unless proven valid or they fix actual issues. This
incident has revealed weaknesses in the patching process and may result
in heightened scrutiny on new patches. A statement from UMN\'s Computer
Science department acknowledged the situation and initiated an
investigation.

------------------------------------------------------------------------

**[Playnite - video game library manager](https://playnite.link/)**:

Playnite is an open source video game library manager designed to unify
game interfaces from various services. It supports multiple platforms
and emulators, with customizable appearance, plugin compatibility,
fullscreen mode, controller support, and time tracking for in-game
hours. The app runs efficiently on large libraries, without installing
system dependencies or paywalls. Data is stored locally, ensuring user
privacy, and can automatically download game metadata for better
organization.

------------------------------------------------------------------------




