•   
  •   

Style Federal government allows the use of state trojans for all secret services

18:55  21 october  2020
18:55  21 october  2020 Source:   zdnet.de

Victoria Beckham's hair stylist reveals the secret to healthy hair

  Victoria Beckham's hair stylist reveals the secret to healthy hair And it has a whole host of other benefits tooCelebrity hairstylist, Jason Collier, who styles the locks of Beckham, has revealed the secret to healthy, glossy hair: collagen.

Überwachung (Bild: Shutterstock) © DEFAULT_CREDIT surveillance (Image: Shutterstock) The intelligence services are supposed to clear up "serious threats to the democratic constitutional state and the free democratic basic order". The means of education also include monitoring messengers such as WhatsApp.

The new constitutional protection law passed today by the federal government allows all German secret services to use so-called state Trojans. The aim is that "serious threats to the democratic constitutional state and the free democratic basic order" are cleared up more quickly. The Bundestag still has to approve the law.

20 secrets your DNA could reveal

  20 secrets your DNA could reveal Testing DNA is at an all-time high thanks to advancements in the medical field and the increase in popularity of at-home DNA testing kits. DNA is a complex molecule that is passed down from your parents. In other words, it is the code that contains all the information about you. This means that it contains information about your ancestry, the way you might react to certain medical treatments… and other secrets about you.

Officially it says: “The draft law regulates the possibilities for the source telecommunications monitoring (source TKÜ). This is particularly important for monitoring digital and encrypted communication, which often takes place via messenger services. The source TKÜ starts in the end device before the messages are technically encrypted or when they are decrypted again. The regulation of the sources TKÜ does not expand the legal possibilities of telecommunication surveillance, but ensures that the perpetrators can no longer evade the investigation by choosing the means of communication.

The draft law provides for adjustments to the law of the intelligence services to clear up serious threats to the democratic constitutional state and the free democratic basic order. At the same time, the prerequisites for improved and expanded control of TKÜ measures are being created by the G10 Commission. In order to improve the fight against right-wing extremism, an expanded monitoring of individuals is also planned. In addition, the information link between the Office for the Protection of the Constitution and the MAD will be improved. ”

The secret box: the broadcast of the program canceled at the last moment, Faustine Bollaert apologizes

 The secret box: the broadcast of the program canceled at the last moment, Faustine Bollaert apologizes © Starface The secret box: the broadcast of the program canceled at the last moment, Faustine Bollaert apologizes This Friday, October 9, The secret box was eagerly awaited on France 3. The show presented by Faustine Bollaert missed his fans. But the tennis match between Novak Djokovic and Stéfanos Tsitsipás at Roland Garros dragged on, forcing the cancellation of this meeting. The small screen seems orphaned this Friday, October 9 .

Numerous criticisms of the new law

In addition to critical contributions from numerous opposition politicians and network activists, the Association of the Internet Industry, eco, protested the new law. The main focus here is on the obligation of Internet providers and telecommunications companies to cooperate with the Federal Intelligence Service and the constitutional protection authorities: Companies should in future, by order of the authorities, set up a diversion in order to forward "suspicious" data packets to the authorities, which they then only later send to the actual recipient.


Video: Secret services should be allowed to read WhatsApp & Co. (dpa)

The Association of the Internet Industry is critical of this expansion of the cooperation and cooperation obligations, especially with regard to data protection and IT security requirements on the Internet. In practice, this would not only result in disproportionate cuts in their business models for companies, there would also be a risk of substantial losses in the confidentiality and integrity of digital communication.

Princess Beatrice thanks fans three months after secret wedding to Edoardo Mapelli Mozzi

  Princess Beatrice thanks fans three months after secret wedding to Edoardo Mapelli Mozzi Princess Beatrice breaks social media silence three months after wedding to Edoardo Mapelli Mozzi

says eco board member Klaus Landefeld: “We position ourselves clearly against anti-constitutional efforts and reject any form of extremism. But the now planned constitutional protection law has the potential to thwart trust in the security and integrity of digital communication. With all due understanding for the tasks and concerns of the German intelligence services: This law will endanger IT security on the Internet, if not even lead to a loss of confidence and a clear step backwards for all digitization processes in society and the economy! ”

This applies in particular if the state uses so-called zero-day exploits to deploy the state Trojans, according to the association: “The exploitation of such security gaps means a great risk, both for companies and for citizens. It must not become common practice in intelligence work. The users are confronted by the extended cooperation and cooperation obligations of the providers with considerable losses of the confidentiality and integrity of their digital communication! " also known as "Quellen-TKÜ Plus", an online search of the affected devices with access to the stored data of the users. Because all technically necessary modules and methods for comprehensive data access would already be installed on the affected devices. The only rule of law is a prohibition on the use of found data that is older than the date of the order: “This is extremely inadequate in terms of both the rule of law and the constitution. Regrettably, the courts will once again have to decide whether this change in the law, in which fundamental rights are extremely restricted, a source TKÜ anchored and the search of stored data via state trojans is to be introduced, is at all constitutional, ”said Landefeld.

In addition, the Association of the Internet Industry emphasizes that the upcoming expansion of the definition of telecommunications services to include messenger services within the meaning of the upcoming TKG amendment represents an additional source of uncertainty. Here, too, eco points out that the intended measures run the risk of bypassing the application and rather lead to competitive disadvantages for the providers. Legal security is of fundamental importance for the providers concerned.

WEBINAR

Every second counts when it comes to endpoint protection: Why disarming in real time is crucial

Carsten Maceus, Systems Engineer at Fortinet, explains in this webinar what a modern IT security architecture should look like in companies. He illustrates this using the example of a football stadium where Bengalos, speedsters, stewards and spectators act. Exciting.

Register now and watch the webinar recording

THIS bodyweight exercise was a secret fitness weapon of Mike Tyson (and Anthony Joshua). Can YOU do it? .
We're kidding. Please don't try this INSANE move at home.I would like to point out that the bodyweight exercise we are going to discuss here is by no means a beginner move. On the contrary. I would not recommend anyone even trying to perform it without having been training like Tyson for a fair while. Not only is it rather dangerous for beginners, but this calisthenics exercise also requires strong muscles. TL;DR: kids, don’t try this at home.

usr: 2
This is interesting!