Rock the Prototype - Software development & Prototyping Titelbild

Rock the Prototype - Software development & Prototyping

Rock the Prototype - Software development & Prototyping

Von: Sascha Block - Rock the Prototype
Jetzt kostenlos hören, ohne Abo

Über diesen Titel

Rock the Prototype - Software Development & Prototyping is your podcast about exciting topics like software development, prototyping, software architecture, cloud, DevOps and much more. 

 We offer practical tips and insights for software developers and tech enthusiasts of all experience levels. Learn how to generate creative ideas, prototype innovative software and successfully implement software projects. 
 Rock the Prototype - Software Development & Prototyping: The Podcast for Practical Tips and Insights Subscribe to the Rock the Prototype Podcast now and let's rock the world of software development together! For more information, visit https://rock-the-prototype.com Wissenschaft
  • Episode 28 - Trust Union - Why standards and trust are Europe's true strengths
    Jan 28 2026
    🌏 **Trust Union** ⭐️ *Why Standards and Trust Are Europe’s True Strength* 🌐 🇪🇺 **Europe stays sovereign—built on trustworthy standards.** ✅ This episode is about a simple but hard truth: 🤝 **Trust isn’t a feeling — trust is engineering.** 👩‍💻 👨‍💻 🛠️ You’ll learn why standards are more sustainable than individual missions, why interoperability is a conscious renunciation of power 🤝, and why digital sovereignty ultimately remains an architectural decision 🏗️. We talk about: 👉 **Trust as a measurable system state** (tests, evidence, explainability) 🧪🔍 👉 **Root of Trust & supply chains** — trust doesn’t stop at your own code 🔐🔗 👉 **Governance:** responsibility must be visible 👁️📜 👉 **The AI Act as an engineering task** — regulation only becomes effective through implementation ⚙️🤖 👉 **Why black boxes fail in the long run** — especially in publicly funded environments 📦⚠️ If you want to understand how Europe builds stability while others bet on speed and dominance 🌍— then this episode is for you. 🇪🇺 **Europe needs systems that endure.** ✨ 🤝 **Trust emerges where infrastructure holds.** ☁️ 🎧 **Chapters — Rock the Prototype Podcast #28 Trust Union** 00:00:00 Trust Union – Why trust is Europe’s most important digital infrastructure 00:01:52 Rock the Prototype Song 00:03:30 Why power, speed, and dominance are not a sustainable answer for Europe’s future 00:05:20 Europe’s counter-model: trust is provable — claims are meaningless 00:06:05 Technology serves people: Europe’s alternative digital model 00:06:53 The state as an enabler: why innovation needs both freedom and security 00:07:30 Why trust is an engineering problem 00:07:38 Why trust is not a promise, but a technical state 00:08:24 Explainable, testable software: the foundation of legitimate digital systems 00:09:01 Resilience instead of hope: how systems earn trust 00:10:15 Why unverified software can’t maintain lasting legitimacy 00:09:58 Trust emerges through verifiable system properties 00:11:33 Europe’s true strength: why standards outlast missions 00:11:57 Decentralized, rule-of-law-based, robust: why Europe builds differently 00:10:37 Invariants over opportunism: Europe’s stable framework of order 00:10:41 Why law, standards, and responsibility are non-negotiable 00:11:02 Missions fade — standards remain 00:11:47 Standards as Europe’s shared language 00:12:00 Interoperability as a conscious renunciation of power 00:12:35 Replaceability is not a risk — it is the basis of trust 00:13:31 Trust needs infrastructure 00:13:52 Why trust scales only with verifiable infrastructure 00:15:53 Root of Trust: where trust begins in digital systems 00:16:30 Transparency means understanding — not blind trust 00:17:00 Why responsibility remains invisible without transparency 00:17:25 Supply chains: the biggest blind spot in modern software 00:17:53 Building blocks of a European trust system 00:18:47 The EUDI Wallet can anchor digital identity 00:17:15 Data protection and information security are not a contradiction 00:17:27 EUDI Wallet: digital identity needs verifiable standards 00:17:53 Trust emerges when infrastructure carries responsibility 00:18:04 From technology to governance: where trust is anchored 00:19:24 Governance makes responsibility visible 00:18:35 Why good governance clarifies accountability instead of preaching ideals 00:20:20 Artificial Intelligence - Closing the loop: technology, governance, and trust 00:20:52 The AI Act as an engineering task 00:21:15 Why AI doesn’t scale linearly — and exactly why it must be regulated 00:21:37 Big impact needs precise acceptance criteria 00:20:32 From regulation to systems: prototypes, validators, audit pipelines 00:21:00 Regulation becomes effective when it becomes infrastructure 00:22:34 Why black boxes have no future 00:24:01 Transparency reduces risk Visit **Website** 👉 [https://rock-the-prototype.com](https://rock-the-prototype.com) Follow us: 📺 **https://youtube.com/@Rock-the-Prototype**
    Mehr anzeigen Weniger anzeigen
    29 Min.
  • Episode 13 - Digital identities and identity access management
    Jan 1 2026
    👁 At a time when our interactions and transactions are increasingly shifting to the 📲 digital realm, understanding the invisible architectures that support our 🌐 online world is more important than ever. Digital identities and how they are managed form the backbone of our connected society, enabling us to navigate the digital space securely and efficiently. In this podcast episode, we start with the basics: ❇️ What exactly is a digital identity and why does it play such a crucial role in our online lives? ❇️ What does identity and access management mean and how does it contribute to the security and smooth functioning of digital services? We will also explore the differences between authentication and authorization and why these concepts are essential for protecting our digital identities. Join us on this journey to understand how digital identities affect our online lives and how IAM systems help secure and shape our digital existence. Support us: If you enjoyed our episode, please leave us a rating.💕 🙋‍♂️I'm Sascha Block, IT architect and your guide and moderator, and I'll give you an insight into what you can expect in the coming episodes. 👉**Subscribe to the Rock the Prototype podcast now**👈 so you don't miss a single episode. So, let's rock software development and prototyping together!🚀 Visit our **website** 👉 [https://rock-the-prototype.com](https://rock-the-prototype.com) to learn more about the podcast and find more exciting topics in our **blog** 👀[https://rock-the-prototype.com/blog/](https://rock-the-prototype.com/blog/) or in our **wiki**📌[https://rock-the-prototype.com/wiki/](https://rock-the-prototype.com/wiki/). 💕 We have lots more valuable content for you.🖖 We also welcome your feedback 💌 and suggestions 💬. Look forward to your next Rock the Prototype podcast episode! **RTP#13 – Digital Identities & Identity and Access Management (IAM): Security and Trust at the Heart of Digital Identity** Digital identities are the invisible backbone of our digital lives — from logging into email to using modern wallets for payments. In this episode of the Rock the Prototype Podcast, we explore what a *digital identity* is, why *Identity and Access Management (IAM)* is critical for secure digital services, and how authentication and authorization work together to protect users, organizations, and sensitive data. You’ll learn which building blocks shape digital identity systems today — including passwords, biometrics, multi-factor authentication, digital certificates, and online profiles — and why topics like data sovereignty and the “right to be forgotten” have become essential principles in identity management. We also widen the lens: secure digital identities don’t stop at national borders. Cross-border interoperability depends on shared trust models and international standards. That’s why Europe’s *EUDI Wallet* and the *Architecture Reference Framework* are so important right now, alongside regulations like *eIDAS* and cybersecurity requirements such as *NIS2*. We discuss how institutions like Germany’s *Federal Office for Information Security (BSI)* translate these supranational requirements into technical and operational security expectations. From there, we connect modern identity assurance to real-world examples: device-bound security and tokenization in wallet-based payments, and the much higher assurance levels required for government services, health data, and legally binding digital credentials. Privacy-preserving digital identity is another key part of the episode. We compare anonymity approaches like the *TOR network* with *Zero-Knowledge Proofs (ZKPs)* — explaining how ZKPs can prove identity validity without disclosing sensitive data. This ties directly to *Kerckhoffs’ principle*: security must hold even if everything about the system is public — except the secret key. Finally, we walk through core standards and protocols that power identity infrastructures...
    Mehr anzeigen Weniger anzeigen
    32 Min.
  • Episode 12 - SolarWinds Hack: The Invisible Cyber Theft
    Jun 16 2025
    Software Development in the Context of Cybersecurity & Protection Against Hackers and Cybercrime SolarWinds Hack: The Invisible Cyber Theft 🌐 Software development in the context of cybersecurity & protection against hackers and cybercrime 💡 Topics include: ✅ Advanced Persistent Threats (APT) ✅ Software vulnerabilities and deployment risks ✅ The Kerckhoffs Principle in modern cybersecurity ✅ Supply chain attacks as the new risk frontier ✅ How to build resilient and secure development structures ❇️ Welcome and a brief introduction to the topic. ❇️ SolarWinds Hack – A quick overview of the known facts: ❇️ Explanation of the events surrounding the SolarWinds Hack Timeline of key discoveries and public disclosures. Who is behind the SolarWinds Hack? ❇️ Discussion of the suspected attackers and their motives. Insights into the investigations and the current situation. How was the cyberattack discovered? ❇️ The story behind how the hack was uncovered. The role of IT security teams and whistleblowers. Details on the "Sunburst" backdoor: Technical analysis of the Sunburst backdoor. How the backdoor works and why it’s so dangerous. ❇️ Vulnerabilities in software: How do software vulnerabilities emerge, and how can they lead to incidents like these? ❇️ How secure are our systems and data really? A critical assessment of current security measures in companies and government agencies. Software vulnerabilities in the development process: Best practices for preventing such weaknesses. ❇️ Applying Kerckhoffs's Principle in modern cybersecurity: → See also: https://rock-the-prototype.com/en/cryptography/kerckhoff-principle/ The relevance of Kerckhoffs’s Principle for IT security. How this principle is applied today — and what it means for key secrecy. Maximum IT security and robust protection through transparency: ❇️ Arguments for more transparency in security architecture. - Examples of how transparency can help improve security. - Secure source code – Why deployment and secure data flows are the real battlegrounds of cybersecurity: - Why secure source code matters so much. - Discussion of deployment strategies and secure data flows. Support us: If you enjoyed this episode, please leave us a rating. 💕 👉 Subscribe now to the Rock the Prototype Podcast 👈 so you don’t miss an episode. Let’s rock software development & prototyping together! 🚀 Also visit our website 👉 https://rock-the-prototype.com to learn more about the podcast and explore other exciting topics in our blog 👀 https://rock-the-prototype.com/blog/ or in our wiki 📌 https://rock-the-prototype.com/wiki/ 💕 We have loads of valuable content for you. 🖖 We’d love to hear your feedback 💌 and suggestions 💬. Stay tuned for your next Rock the Prototype Podcast episode! Follow us on: ✅ YouTube ✅ LinkedIn
    Mehr anzeigen Weniger anzeigen
    32 Min.
Noch keine Rezensionen vorhanden