{"id":2493,"date":"2017-07-29T23:55:41","date_gmt":"2017-07-29T21:55:41","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=2493"},"modified":"2023-08-06T21:50:59","modified_gmt":"2023-08-06T19:50:59","slug":"spying-on-everyone-cheap-and-simple","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/29\/spying-on-everyone-cheap-and-simple\/","title":{"rendered":"Spying on everyone &#8211; Cheap and Simple"},"content":{"rendered":"<h1>Introduction<\/h1>\n<p>Espionage, or less formally \u201csyping\u201d has become a huge public topic in Summer 2013. Edward Snowden revealed that The American NSA (National Security Agency) and the allied Great Britain GCHQ (Government Communications Headquarters) are surveilling, storing and examing all network traffic in- and outbound the US and Great Britain. The debate covered the Newspapers front pages over month and subsequently more and more information was unrevealed. The citizens of the various states on the other hand refused on accepting these actions. But not many things changed politically, moreover the secret (and illegal) activities were made legal in public presence in countries such as the US, Great Britain and Germany. Reminding of George Orwells\u2019 novel \u201c1984\u201d. Still though, things changed in digital communication such as more attempts and request of encryption of messages and data.<\/p>\n<p><!--more--><\/p>\n<p>But not only espionage of millions was a present topic the last century, also spying on specific being or a small group of persons was thematized in the Series of the MI6 Agent, James Bond. The use of tiny gadgets was put in to focus every movie. They were hidden in Pens, Watches, Cars or any other object imaginable. It was not rarely mentioned how expensive and seldom these devices were.<\/p>\n<p>Leaving the thoughts of spying governments behind, with their immense financial possibilities. It seemed unlikely that a normal Person can use such methods or access such devices.<\/p>\n<p>Still tough, espionage has a scent of a forbidden adventure. And thinking thus what a normal person could do might inspire one\u2019s imagination. Filming people in secret: What is my neighbor doing (in my garden) once I am at work? Recording voices and sounds: What did the customers discuss while the salesman left the room? Or tracking people or objects: Where is my dog going? Is my wife soon home?<\/p>\n<p>&nbsp;<\/p>\n<h1>Espionage and the legal situation in Germany<\/h1>\n<p>The MI5 defines espionage as a collection of information, classified secret or confidential without the permission of the legal owner.<\/p>\n<p>Information can be any part of data. Digital or physical. It can be a piece of Text, an Image, a Video or just Meta-Data. &nbsp;Since it is classified confidential or secret it must inherit a certain value. And the owner of the information must not know of the access and collection of data, bypassing authorization. In the end, power was granted. &nbsp;However, laws are projecting this special kind of personal authorization breach.<\/p>\n<p>German law is very strict at this. In the \u201cStrafgesetzbuch\u201d (penalty code) \u00a7 202a it states:<\/p>\n<blockquote><p>Wer unbefugt sich oder einem anderen Zugang zu Daten, die nicht f\u00fcr ihn bestimmt und die gegen unberechtigten Zugang besonders gesichert sind, unter \u00dcberwindung der Zugangssicherung verschafft, wird mit Freiheitsstrafe bis zu drei (3) Jahren oder mit Geldstrafe bestraft.<\/p><\/blockquote>\n<p>An English equivalent:<\/p>\n<blockquote><p>Whoever tries to grant access to data, that is not designated for her or him and that is specially protected against illegal access, under the exploration of this protection will be punished with up to three years in prison or a financial penalty.<\/p><\/blockquote>\n<p>The core is the special protection of the information in combination with the authorization:<\/p>\n<p>If the Information is not specially protected and probably easy to obtain the law doesn\u2019t apply. On the other hand the it is clear that if a person does grant access it can be specially protected.<\/p>\n<p>But what is about spy gadgets? They are restricted at the \u201cTelekommunikationsgesetz\u201d (telecommunications act) \u00a7 90. It states that it is forbidden to own, distribute or produce transmitters that are covered with objects of daily life and specially designed for taking a picture from another person. Penalties are up to two years in prison or with financial penalty up to 500,000 \u20ac.<\/p>\n<p>Interestingly there is a close connection between transmitter and taking a picture. Imagine a device does take a picture but won\u2019t transmit it, is not covered by this law.<\/p>\n<p>In general, other laws apply eventually:<\/p>\n<ul>\n<li>Pers\u00f6nlichkeitsrecht (right of identity)\n<ul>\n<li>Right of self-developing freely<\/li>\n<\/ul>\n<\/li>\n<li>Recht am eigenen Bild (right of personal image)\n<ul>\n<li>e.g. forbidding the use of the own image<\/li>\n<\/ul>\n<\/li>\n<li>Brief-\/Fernmeldegeheimnis (secrecy of telecommunication and mail)\n<ul>\n<li>e.g. it is not allowed inspect a Letter unauthorized<\/li>\n<\/ul>\n<\/li>\n<li>And other personal related laws<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h1>Spy gadgets &amp; possibilities<\/h1>\n<p>So, can spy gadgets be obtained and used in private?<\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/PhoneBlackAndWhite-800px.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2494\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/29\/spying-on-everyone-cheap-and-simple\/phoneblackandwhite-800px\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/PhoneBlackAndWhite-800px.png\" data-orig-size=\"566,800\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"PhoneBlackAndWhite-800px\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/PhoneBlackAndWhite-800px.png\" class=\"alignnone size-medium wp-image-2494\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/PhoneBlackAndWhite-800px-212x300.png\" alt=\"\" width=\"212\" height=\"300\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/PhoneBlackAndWhite-800px-212x300.png 212w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/PhoneBlackAndWhite-800px.png 566w\" sizes=\"auto, (max-width: 212px) 100vw, 212px\" \/><\/a><\/p>\n<p>Looking at the image above we realize that this device inherits all small sensors to spy: A small camera, a small microphone, GPS-Sensors. Smartphones were the first devices who brought all sensors together and gave them to the masses. Availability of the single components grew dramatically and the prices sunk.<\/p>\n<p>Since most new cars also inherit those sensors the trend is stable.<\/p>\n<p>And covering them as daily devices? Allowed, once they do not incorporate a sending ability if take pictures (or record a video). Sending, when recording a GPS-Signal on the other hand is allowed.<\/p>\n<p>The important thing is that no other (personal) laws must be broken, like those mentioned earlier.<\/p>\n<p>Discussed yet:<\/p>\n<ul>\n<li>Legal justification<\/li>\n<li>Availability<\/li>\n<li>Price<\/li>\n<\/ul>\n<h5>Looking that the Price a bit more detailed:<\/h5>\n<p>Buying specially designed spy devices in Germany is a bad idea: The devices are mostly built in China, imported and then resold. The price margin is the price booster.<\/p>\n<p>Instead of ordering in Germany, it is clever to order directly in China. Simple and safe with aliexpress for example, the Chinese Amazon equivalent. Prices for mail to Germany: Under two Euros. Hilariously cheap. The devices on the other hand aren\u2019t expensive either.<\/p>\n<p>&nbsp;<\/p>\n<h1>GPS-Tracker<\/h1>\n<p>GPS-Tracker mainly consist of two components:<\/p>\n<ul>\n<li>A GPS-Sensor\n<ul>\n<li>For tracking the exact position<\/li>\n<\/ul>\n<\/li>\n<li>A Sim-Card\n<ul>\n<li>For establishing a connection to the internet or other mobil devices<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The initial configuration step happens via SMS or USB to configure the tracker. Any subsequent requests or commands are sent with SMS and the response received via SMS.<\/p>\n<figure style=\"width: 1000px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/gps-tracking-1.png\" alt=\"\" width=\"1000\" height=\"654\"><figcaption class=\"wp-caption-text\">Webinterface: GPS-Tracker<\/figcaption><\/figure>\n<p>Advanced trackers also provide a conformable web interface to configure or control the tracker or inspect the position or the path the tracker was moved along. Advance trackers can also comunicate over the mobil network for providing such tracking services.<\/p>\n<p>GPS-Trackers also provide functions like GPS-Fancing, Distance warning, Battery warning and much more.<\/p>\n<h4>Examples:<\/h4>\n<figure style=\"width: 366px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/Rastreador-Veicular-Protable-Mini-A8-GPRS-Auto-Kinder-GSM-GPRS-Tracker-GPRS-Tracking-Adapter-Locator-Echtzeit.jpg\" width=\"366\" height=\"366\"><figcaption class=\"wp-caption-text\">GPS-Tracker: 6.30\u20ac, Mail (to Germany): 1.63 \u20ac<\/figcaption><\/figure>\n<figure style=\"width: 339px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/Mini-Spy-Tracking-Finder-Ger-t-Auto-Auto-Haustiere-Kinder-Motorrad-Tracker-KEINE-batterie.jpg\" width=\"339\" height=\"254\"><figcaption class=\"wp-caption-text\">GPS-Tracker: 6.04 \u20ac, Mail (to Germany): Free<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Or covered GPS-Trackers:<\/strong><\/p>\n<figure id=\"attachment_2495\" aria-describedby=\"caption-attachment-2495\" style=\"width: 192px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb2.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2495\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/29\/spying-on-everyone-cheap-and-simple\/gpstrackerusb2\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb2.png\" data-orig-size=\"192,192\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"\" data-image-description=\"&lt;p&gt;GPS-Tracker: Cloaked as portable USB-Charger&lt;\/p&gt;\n\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb2.png\" class=\"wp-image-2495 size-full\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb2.png\" alt=\"\" width=\"192\" height=\"192\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb2.png 192w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb2-150x150.png 150w\" sizes=\"auto, (max-width: 192px) 100vw, 192px\" \/><\/a><figcaption id=\"caption-attachment-2495\" class=\"wp-caption-text\">GPS-Tracker cloaked as portable USB-Charger<\/figcaption><\/figure>\n<p>Here you might track where a person travles and how long the person remains. Notice that theres no chance seeing what it really is.<\/p>\n<figure id=\"attachment_2496\" aria-describedby=\"caption-attachment-2496\" style=\"width: 278px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb.png\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"2496\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/07\/29\/spying-on-everyone-cheap-and-simple\/gpstrackerusb\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb.png\" data-orig-size=\"278,192\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"gpstrackerusb\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb.png\" class=\"wp-image-2496 size-full\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/07\/gpstrackerusb.png\" alt=\"\" width=\"278\" height=\"192\"><\/a><figcaption id=\"caption-attachment-2496\" class=\"wp-caption-text\">GPS-Tracker coverd in car USB-Charger<\/figcaption><\/figure>\n<p>You can stick this in your cars cigarette lighter and get your cars position at a parking lot\u2026.or see where you wife drives?<\/p>\n<p>The scary thing about these things is: You would never know that this is actually a GPS-Tracker and thus never recognice it.<\/p>\n<h1>Spycam<\/h1>\n<p>Their main components are:<\/p>\n<ul>\n<li>Mini cam\n<ul>\n<li>In order to take picutures or record a video<\/li>\n<\/ul>\n<\/li>\n<li>SD-Card or internal flash memory\n<ul>\n<li>For storing the pictures or video<\/li>\n<\/ul>\n<\/li>\n<li><em>Microphone (optional)<\/em>\n<ul>\n<li>For recording voices and sounds<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Spycams have often two modes:<\/p>\n<ul>\n<li>Manual recording\n<ul>\n<li>Person actively starts the recording of a video<\/li>\n<\/ul>\n<\/li>\n<li>Automatic triggering\n<ul>\n<li>Once something changes in the observed area, recording starts automatically or a picture will be shot (motion detection)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The recorded videos are extracted in the end via USB or SD-Card.<\/p>\n<h3>Examples:<\/h3>\n<figure style=\"width: 800px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/nx4248_9.jpg\" alt=\"\" width=\"800\" height=\"600\"><figcaption class=\"wp-caption-text\">Cloak: Powerbank, Functions: Camera, Microphone, Motionsensor<\/figcaption><\/figure>\n<p>Possible: Charge the smartphone while recording a collegue entering his password<\/p>\n<p>&nbsp;<\/p>\n<figure style=\"width: 800px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/px3798_2.jpg\" alt=\"\" width=\"800\" height=\"600\"><figcaption class=\"wp-caption-text\">Cloak: Watch, Functions: Camera<\/figcaption><\/figure>\n<p>Camera and IR-Sensor hidden at the bottom over the 25, 30 and 35.<\/p>\n<p>Possible: Walk through the factory and record the production secrets.<\/p>\n<p>&nbsp;<\/p>\n<figure style=\"width: 800px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/px8211_2.jpg\" alt=\"\" width=\"800\" height=\"600\"><figcaption class=\"wp-caption-text\">Cover: Pen, Functions: Camera<\/figcaption><\/figure>\n<p>Or attached to your shirt?<\/p>\n<p>&nbsp;<\/p>\n<figure style=\"width: 800px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/nx4271_3.jpg\" alt=\"\" width=\"800\" height=\"600\"><figcaption class=\"wp-caption-text\">Cloak: Picture frame, Features: Camera (IR as well)<\/figcaption><\/figure>\n<p>Camera hidden at the lower left.<\/p>\n<p>Track who enters your house, they will only see a nice <strong>picture<\/strong>. You will see <strong>them<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h1>Ethical acceptable espionage<\/h1>\n<p>Spying on collegues or employees is a sad fact in the most countries in the world, also Germany has such problems (Telekom, LIDL, &#8230;) But spying on people can be a valid option. Imagining old people with demencia. Often it is not possible to track people with demencia constantly. If they walk away in a confused state nobody knows where they went and cause stress for both, the confused person and the caretaker. Having such people tracked is valid as long as it has a protective manner not limiting them in their right and freedom. This topic will grow bigger since the number of old people is growing and so the numbers of people with demencia or other diseases with distraction and confusion. Being able to take action as soon as they walk away due to the alarm of a geofance, makes it easy to bring the person back and reduce the stress level.<\/p>\n<p>Personal protection is also a valid topic, as long as no others are harmed by that supervision. This is imaginable at a balcony a burglar used to intrude the home. A hidden camera can support the person by brining back the feeling of safty and help to identify other possible burglars.<\/p>\n<p>Parental duties also incorporate a level of supervision. It might be an option tracing a four year old child walking to kindergarden, knowing it got save there. But is it also ok if it is seven?<\/p>\n<p>&nbsp;<\/p>\n<h1>Final thoughts<\/h1>\n<p>It is interesing to see how simple and cheap one can get spy devices on the market. Times where this was a pure imagination have passed. Anybody can be a James Bond to some point. And technology makes it simple to use spy devices in order to track and record people. This is fun on one hand, but on the other it is good if the devices are used with cautions. In elderly care for example, or a mental home. Whenever people lose their orientation and end up in confusion and distraction position tracking can help the people and the caretaker to minimize danger and stabilize treatment.<\/p>\n<p>Espionage in a personal environement must be transparent and clearly communicated, e.g. when the neighbours visit. It must be clear that the balkony is surveilled.<\/p>\n<p>Whenever espionage is used for protection rather then control it can be justified. If control is the basis of espionage then missuse is likly to happen and pervert the cause.Thus, should not happen at all.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Espionage, or less formally \u201csyping\u201d has become a huge public topic in Summer 2013. Edward Snowden revealed that The American NSA (National Security Agency) and the allied Great Britain GCHQ (Government Communications Headquarters) are surveilling, storing and examing all network traffic in- and outbound the US and Great Britain. The debate covered the Newspapers [&hellip;]<\/p>\n","protected":false},"author":579,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26,651],"tags":[],"ppma_author":[724],"class_list":["post-2493","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-secure-systems","category-system-designs"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":20620,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/10\/04\/pal\/","url_meta":{"origin":2493,"position":0},"title":"Palantir: An uncanny company?","author":"Niklas Janssen","date":"4. October 2021","format":false,"excerpt":"In the future data privacy could be one of the biggest issues of our time with growing supervision capabilities from big enterprises and governments. China is a telling example of what could happen if data privacy and anonymity on the internet is completely eroded. On the other hand, there is\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"image of multiple hard disks","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/pexels-panumas-nikhomkhai-1148820-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/pexels-panumas-nikhomkhai-1148820-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/pexels-panumas-nikhomkhai-1148820-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/pexels-panumas-nikhomkhai-1148820-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/pexels-panumas-nikhomkhai-1148820-scaled.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/pexels-panumas-nikhomkhai-1148820-scaled.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4290,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/09\/10\/web-server-with-user-registration-and-guestbook-with-image-upload\/","url_meta":{"origin":2493,"position":1},"title":"Web server with user registration and guestbook with image upload","author":"ok043","date":"10. September 2018","format":false,"excerpt":"Overview The users access the website where they have the option to the view the guest book, register or log in. To register the user has to provide a username, an email address and a secure password (more than 8 characters, upper and lowercase characters, numbers and special characters). Then\u2026","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"Project architecture","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/cloudcraft1-1024x576.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/cloudcraft1-1024x576.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/09\/cloudcraft1-1024x576.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":7097,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2019\/10\/23\/supply-chain-on-ethereum-network\/","url_meta":{"origin":2493,"position":2},"title":"Supply chain on Ethereum Network","author":"nr037","date":"23. October 2019","format":false,"excerpt":"600 million people - almost every tenth in the world - fall ill every year with contaminated food, 420,000 of them die (cf. World Health Organization 2019). The main reason for this are supply chains that can not be properly traced back to the source of the contamination (cf. Yiannas\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/ethereum-blockcahin.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/ethereum-blockcahin.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/ethereum-blockcahin.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/ethereum-blockcahin.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/ethereum-blockcahin.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2019\/08\/ethereum-blockcahin.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1912,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/02\/28\/microservices-legolizing-software-development-2\/","url_meta":{"origin":2493,"position":3},"title":"Microservices &#8211; Legolizing Software Development II","author":"Korbinian Kuhn, Steffen Mauser","date":"28. February 2017","format":false,"excerpt":"Part two will take a closer look on how caching improves the heavy and frequent communication within our setup.","rel":"","context":"In &quot;System Designs&quot;","block_context":{"text":"System Designs","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Caching-01.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Caching-01.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Caching-01.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Caching-01.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Caching-01.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":27440,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/27\/how-i-improved-the-network-security-of-my-live-chat-application-architecture-on-aws\/","url_meta":{"origin":2493,"position":4},"title":"How I Improved the Network Security of My Live Chat Application Architecture on AWS","author":"Jannik Scheider","date":"27. February 2025","format":false,"excerpt":"In an increasingly connected world, the need for robust security measures for cloud infrastructures is constantly growing. Applications that are accessible over the internet must be secured in a way that prevents unnecessary exposure of sensitive backend components. A fully public Virtual Private Cloud (VPC) architecture may be sufficient for\u2026","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2748,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/08\/31\/developing-a-chat-server-and-client-in-the-cloud\/","url_meta":{"origin":2493,"position":5},"title":"Developing a Chat Server and Client in the Cloud","author":"Jan-Niklas Keck","date":"31. August 2017","format":false,"excerpt":"Introduction During the Lecture \"Software Development for Cloud Computing\" I decided to develop a Cloud based Chat Application with the help of IBM's Bluemix. The Application consists of 3 separate Applications: Chat Server: Allows Clients to connect to it, manages the Chat-Channels\/Users and relays messages sent from a client to\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/toolchain-deploy.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/toolchain-deploy.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/toolchain-deploy.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/toolchain-deploy.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":724,"user_id":579,"is_guest":0,"slug":"mk297","display_name":"mk297","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/e49bb4c2cb99b275c24f597b0ae136db08db2e31faaf343323ed3ed35ac7142b?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/2493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/579"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=2493"}],"version-history":[{"count":8,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/2493\/revisions"}],"predecessor-version":[{"id":25501,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/2493\/revisions\/25501"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=2493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=2493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=2493"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=2493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}