Categories
online accounts

Should You Use Social Logins? The Convenience, the Tech, and the Hidden Trade‑Offs

We’ve all been there: you land on a new website or digital service, you’re curious to try it out, and then—bam—you hit the “Create an account” wall. Suddenly you’re typing in your email address, inventing yet another password, and hoping you’ll remember it later. Unless you’re using a solid password manager that can generate and […]

Categories
email Messenger online accounts

Digital Sovereignty – Why It Concerns All of Us

The term “digital sovereignty” is currently on everyone’s lips—and for good reason. At the latest since the incident involving the Chief Prosecutor of the International Criminal Court, whose Microsoft email account was politically motivatedly blocked, resulting in the Court’s work being almost brought to a standstill for a period of time.This made it clear how […]

Categories
online accounts

What Does Incognito Mode Really Mean? A Realistic Look at Private Browser Windows

Many people use their browser’s incognito or private mode assuming it makes them particularly secure or anonymous online. But the truth is often quite different. To understand what this mode actually does — and what it doesn’t — it’s helpful to first take a closer look at what we really mean when we talk about […]

Categories
online accounts

How to Use the ePA Properly – Your Health Data, Your Decision

If you live in Germany, you’ve probably already heard: the electronic patient record (in German, elektronische Patientenakte or ePA) is coming – and it’s for all individuals with statutory health insurance. The system is being introduced using an opt-out process. This means: you will automatically receive an ePA – unless you actively object. What exactly […]

Categories
online accounts passwords

Passphrases, Passkeys, and Passwordless: What to use?

In a previous article, I covered password security in detail.  In this post, I want to dive deeper into terms like “passphrase”, “passkey”, and “passwordless”. These terms are often used interchangeably, but they are far from being the same. Additionally, we’ll revisit best practices for password security, as weak or insecure passwords remain the most common […]