News from KW29.2025

New week, new wews: Nine interesting contributions from week 14.7 – 20.7 (KW29-2025) a personal summary as compilation, two Viewed in detail and provided with more details – again across my ‘wews’ world.

LZA of data | ConniMemes | Chrome exploit | Netflix&Sell | Netflix&Pay | FritzOS 8.20 | NIS2@VOICE | CFTC Bill | Cyberpunk2077

Article 1

The Difficulty of Archiving Meaningful Data in the Long Term

Monday to the lead t3n, article about long-term backup, okay then let's see how it goes right. Let's start small: What is this long-term archiving?

Long-term archiving (LZA) refers to the long-term storage and permanent availability of information over years or decades. Digital data is not just about storage, but about ensuring integrity, authenticity and accessibility despite technological change. This is also the main theme with which the author Frederike Kaltheuner on t3n busy

The digital paradox

A central problem of the digital age: While embarrassing videos seem to remain on the Internet forever, important content is systematically lost. Historically significant digital documents, tweets from political movements or websites often disappear faster than they can be archived.

Main challenges

1. Technical compatibility

  • Media ageing: Digital storage media have limited lifespans (CD-R: 5-10 years, DVD-RAM: 30 years, hard disks: several years)
  • obsolescence: Hardware and software are quickly becoming obsolete, suitable readers are disappearing from the market
  • Format problems: Proprietary file formats can no longer be opened

2. Content challenges

  • Fragmented content: Modern platforms such as TikTok or Instagram Stories generate fleeting, personalized content
  • Loss of context: It's not just about the content, it's also about who was shown what and why.
  • Löchrige archives: Many digital archives are incomplete or arbitrarily curated

3. Legal obstacles

  • copyrights: Digital Rights Management (DRM) makes it difficult to copy and migrate
  • Proprietary systems: Closed formats impede long-term archiving

Solutions

Migration and standardization

  • Regular transfer to new storage media before expiration
  • Use of open standards (TIFF, PNG, XML, PDF/A, OpenDocument)
  • Emulation of old systems to preserve the original environment

Storage technologies

  • Cloud storage: Advantages of professional maintenance, but dependency on providers
  • Local NAS systems: Full control, but greater ownership
  • Alternative media: Ceramic media, M-DISC (up to 1,000 years), even DNA storage

Organisational measures

  • Distributed storage at different locations
  • Cryptographic checksums for integrity assurance
  • Maintenance of metadata for findability

Particular importance for public administration

Legal requirements

  • Commercial Code and Tax Code require long-term retention
  • GDPdU (Principles on data access and verifiability of digital documents)

Social functions

  • transparency: Traceability of State actions
  • Securing evidence: Legal Disputes and Enlightenment
  • Historical research: Analysis of social developments
  • accountability: Responsibility to the public

Current problems

Platform dependency

Restrictions on resources

  • High costs for continuous data maintenance
  • Data volume grows faster than available bandwidth
  • Difficult selection: What is worthy of archiving?

conclusion

The long-term archiving of digital data is a complex task that poses technical, organizational and legal challenges. Without systematic solutions, a digital memory hole threatens our time and important social developments worth protecting could be lost for future generations, while trivial content survives.

The key message could be summarised as follows: We need accessible digital archives not only for historians in 50 years, but for ourselves – today, tomorrow next year. Without collective digital memory, collective responsibility also falls by the wayside.


Article 2

Conni Memes and the Limits of Artistic Freedom

Anyone who has been on the internet this week may have also seen you, Conni, the Carlsen publishing house ‘Meme Mädel’

When children's book characters become Internet phenomena. The popular children's book character Conni has developed into a viral Internet phenomenon. What began as harmless memes, however, led to a public controversy between Carlsen Verlag and the meme community. The case raises fundamental questions about the limits of artistic freedom, the protection of trademark rights and responsibility towards children.

The Controversy and Carlsen's Clarification

Initially created by shortening or ravenous Media reports Various publications misunderstandings about Carlsen's position too Conni memes. The Internet responded promptly with bite reflex and the danger of the Streisand effect. More and sometimes really extreme memes flooded the network. The publisher was prompted to comment in detail, clarifying three key points:

No general action against memes: Carlsen Don't threaten everyone Meme creators with lawsuits, but only requests deletion in specific cases. Affected are inhumane, racist, violence-glorifying and pornographic depictions as well as commercial uses without permission.

Protection of authors, not enrichment: The focus is on the rights of creatives and the protection of their livelihoods – particularly relevant in the light of current AI developments.

Respect for satire figure: The publisher is generally pleased with the popularity of Conni-Memes, but insists on clear limits. So please, with a sense of proportion!

Source: Carlsen Verlag Commentary on Linkedin
Source: Carlsen Verlag, commentary on Linkedin

The field of tension of interests

Trademark protection with a sense of proportion

Carlsen's differentiated approach shows a middle ground: While harmless, humorous memes are tolerated, the publisher draws clear boundaries when it comes to problematic content. This strategy is understandable – Conni has been built over 30 years as a positive identity figure for children and is intended to convey values such as ‘empathy, friendship and solidarity’.

Commercial use without permission is another problem: Companies often use Conni memes unknowingly for advertising purposes, thereby infringing copyrights. According to information, voluntary deletion is usually carried out – judicial steps have not been necessary so far.

Child Protection as an Ethical Guideline

The child protection aspect gives the case special explosiveness. Unlike adult content or neutral brands, this is a figure created specifically for children. Problematic representations can not only damage the brand image, but also disturb children who happen to encounter such content.

Artistic freedom within borders

What is interesting is Carlsen's recognition of the creative meme culture. The publisher is pleased with the ‘playful and funny contributions’ and thus implicitly recognises the cultural value of harmless memes. This attitude is clearly different from blanket prohibitions of other trade mark owners.

Legal and social classification

copyrights in the digital age

Carlsen's reference to AI developments illustrates the topicality of the topic. At a time when intellectual property is increasingly being digitally transformed and reproduced, publishers need to redefine their position. The case shows: Selective trademark protection It can be more effective than blanket bans.

Social responsibility

The controversy also reveals a social dilemma: How far can creative freedom go when it affects vulnerable groups? Carlsen's focus on really problematic content (racism, glorification of violence, pornography) is widely supported by society.

Lessons learned: A model for the future?

For rights holders

Carlsen's communication strategy shows: Transparency and differentiation can defuse conflicts. Instead of blanket bans, clear criteria and open communication about the motives help.

For the meme community

Most meme creators show understanding when the legal background is explained to them. Enlightenment often works better than warnings.

For society

The case demonstrates that creative freedom and responsibility do not have to be opposites. If all parties involved make their positions transparent, compromises can be found.

conclusion

Balance instead of extreme positions! The Conni controversy exemplifies how digital culture and traditional legal systems can develop constructively. Carlsen's nuanced position -Tolerance for harmless creativity with clear limits on problematic content - could become the model for similar cases.

The decisive factor is the knowledge: Neither blanket bans nor boundless freedom will Complexity of digital culture fair. Rather, differentiated approaches are needed that take both creative expression and social responsibility seriously.

The fact that judicial action has not been necessary so far clearly shows: Dialogue and education can be more effective than legal threats. A hopeful signal for future conflicts between traditional media companies and the digital creative scene.


Article 3

Google Chrome browser exploits in circulation, please be sure to update

Chrome security vulnerabilities: CVE-2025-6558 and CVE-2025-6554 – Detailed analysis:

Overview of the current threat situation

Google Chrome is currently under acute security pressure from two critical vulnerabilities that are already being actively exploited by attackers. The security gaps CVE-2025-6558 | EUVD-2025-21546 and CVE-2025-6554 | EUVD-2025-19675 This poses a serious threat to millions of Chrome users worldwide and requires immediate action.

And not only Chrome as a browser, since now a state number of other browsers also as a substructure the Chromium base They are all likely to be affected as well. Possibly even further endangered due to own update. Some may not even know that chromium is underneath or integrated in it, I think of the eMail Client TheBat or the Samsung Internet browser. Please patch, folks.

CVE-2025-6558: Critical ANGLE vulnerability

Technical details

  • CVSS score: 8.8 (high)
  • Affected component: ANGLE (Almost Native Graphics Layer Engine) and GPU processes
  • Vulnerability type: Insufficient validation of untrusted inputs
  • discovery: 23 June 2025 by Google's Threat Analysis Group (TAG)

The vulnerability lies in the ANGLE component, an open source graphics abstraction layer that translates graphics commands (OpenGL ES API calls) into platform-specific APIs such as Direct3D, Metal, Vulkan or OpenGL. The main problem is the incorrect handling of GPU commands from unreliable sources, especially WebGL websites.

Attack mechanism

Attackers can create specially crafted HTML pages that exploit vulnerabilities in ANGLE and GPU process logic. This makes it possible to execute malicious code within the GPU process and achieve a so-called ‘sandbox escape’. This allows attackers to break out of browser isolation and gain far-reaching system access.

Particularly dangerous: The attack only requires a visit to a correspondingly manipulated website, which massively exacerbates the risk situation.

Further details can be found e.g. in this post.

CVE-2025-6554: V8 JavaScript Engine Vulnerability

Technical details

  • CVSS score: 8.8 (high)
  • Affected component: V8 JavaScript and WebAssembly Engine
  • Vulnerability type: Type-confusion vulnerability
  • discovery: 25 June 2025 by Clément Lecigne (TAG)

This vulnerability is a type-confusion vulnerability that occurs when object types are misinterpreted in the code. This can lead to attackers running foreign code or accessing protected storage areas.

Possible impact

  • Complete system takeovers
  • Program crashes
  • Execution of malicious code already by visiting manipulated websites

Other Vulnerabilities in the Current Update

The Chrome security update addresses a total of six vulnerabilities:

  1. CVE-2025-7656: Integer overflow in the V8 JavaScript engine (CVSS 8.8)
  2. CVE-2025-7657: Use-after-free gap in WebRTC (CVSS 8.8)
  3. Three Other Vulnerabilities: Details not yet published

Importance for Cybersecurity 2025

Fifth Zero-Day Exploit of the Year

CVE-2025-6558 marks the fifth zero-day exploit fixed in Google Chrome this year. This worrying accumulation shows:

  • March 2025: Sandbox Escape for espionage against Russian government agencies
  • May 2025: Zero-day gap for account caps
  • June 2025: Two more zero-days in the V8 JavaScript engine
  • July 2025: CVE-2025-6558 and CVE-2025-6554

Targeted attacks

The discovery by the Threat Analysis Group suggests that these vulnerabilities may be used for targeted attacks by government-backed actors or professional cybercriminals.

Affected versions and updates

Chrome versions before the update

  • All Chrome versions prior to 138.0.7204.157 affected by CVE-2025-6558
  • All Chrome versions prior to 138.0.7204.96/97 affected by CVE-2025-6554

Current secure versions

  • Windows: 138.0.7204.157/.158
  • macOS: 138.0.7204.157/.158 and 138.0.7204.92/93, respectively
  • Linux: 138.0.7204.157 and 138.0.7204.96, respectively
  • Android: 138.0.7204.157
  • iOS: 138.0.7204.156

Important: Impact on other browsers

Since many other web browsers are based on the Chromium code, these are also vulnerable:

  • Microsoft Edge
  • Brave browser
  • Opera
  • Vivaldi
  • Samsung Internet

These browser manufacturers will soon also provide appropriate security updates or have already started.

Immediate measures for users

1. Version check

Check if you are using one of the secure versions:

About the Chrome menu (three points) → Help → About Google Chrome

2. Immediate update

chrome://settings/help

Type this URL into the Chrome address bar to automatically check for updates.

3. Browser restart

After the update, a complete restart of the browser is required.

Recommendations for companies

IT security policies

  • Immediate notification all IT administrators
  • Use of automatic software distribution systems for fast roll-out
  • prioritisation these updates before other software updates
  • monitoring the browser versions in the corporate environment

Additional safeguards

  • Implementation of web filtering and antivirus solutions
  • Training employees on safe browser use
  • Regular security audits of browser configurations

Long-term security strategy

Browser diversification

Businesses should consider not relying solely on Chrome, but using a mix of different browsers to spread the risk. The attack vector is only so rewarding because the Chromium browser technology is now so widespread.

Automatic updates

Enabling automatic updates is essential, as zero-day exploits are often exploited within hours of their discovery.

Threat intelligence

The proliferation of Chrome Zero Days demonstrates the need for improved threat intelligence and proactive security measures.

conclusion

The current Chrome vulnerabilities CVE-2025-6558 and CVE-2025-6554 pose a serious and immediate threat. The fact that both vulnerabilities are already actively exploited makes an immediate update unavoidable.

The accumulation of five zero-day exploits in Chrome within a year is a clear warning signal for the entire IT security industry. Users and businesses need to rethink their browser security strategy and implement proactive measures.

The updates should be treated as a critical security measure and ideally implemented within 24 hours of availability.


Article 4

Netflix and Sell

Massive crackdown on illegal streaming network

Summary: In a large-scale police action against illegal streaming services, five suspects were arrested in a large-scale raid against illegal streaming network in Bavaria and Hamburg. Source: City-News.de.

The raid was carried out by officers of the Weiden Criminal Police together with the Central Office Cybercrime Bavaria, where nine objects were searched in the Bavarian districts of Tirschenreuth and Pfaffenhofen an der Ilm as well as in Munich and Hamburg. Sources: heise online | Press Augsburg.

Main Suspects and Allegations: The main suspect is a 25-year-old software developer. The defendants are accused of illegally distributing paid streaming services such as Netflix. One of the accused is also accused of serious sexual offenses.

Scope of the action: More than 100 operational staff from different departments were involved in the action. During the deployment, servers were seized and digital evidence was secured on a large scale.

Cybercrime in Bavaria:
Arrest warrants for illegal streaming gangs - Law & Politics.

Investigations have been ongoing for a long time – the criminal police had set up a special investigation team, which worked intensively on this case before the searches and arrests took place.

Je by source There are also Other interesting info In addition:

Since the beginning of 2024, the investigation of the cybercrime commissioner of the Weiden criminal police in the case is already underway. "Since, according to the investigation findings, the suspects had a high level of IT knowledge and correspondingly high-quality equipment, the investigation and the use of digital traces and the clarification of the complicated server network were particularly in focus", says a press release from the police headquarters in Upper Palatinate on Friday.

For a fast data backup on site, the mobile forensics laboratory ‘Paladin’ of the Police Headquarters of Upper Franconia was consulted. Chic video with a little more details from 2021 available via this link.


Article 5

Netflix and Pay

Streaming giants such as Amazon, Disney and Netflix in criticism: German cultural policy becomes counter-taxation

That I can still experience that, unbelievable. ⁇

If Netflix & Co. is to be asked to checkout

The German media landscape is undergoing a transformation. What once seemed unthinkable now becomes a political reality: In an interview, Minister of State for Culture Wolfram Weimer targets, among other things, the major streaming platforms and calls for more responsibility for the German production site. You will also find a report from Stefan Krempel on Heise politics.

The problem: Digital monopolies threaten the diversity of opinion “We can't let this go”: Weimer's battle announcement to the streaming giants

When the Minister of State for Culture calls for a digital turnaround

Wolfram Weimer chooses drastic words. “We are experiencing a revolutionary process”, says the Minister of State for Culture about the upheavals in the German media landscape. His diagnosis is as clear as it is alarming: The digital transformation threatens not only individual industries, but also the diversity of opinion in Germany as a whole. His answer is as radical as it is controversial.
“We have structural disruptions across the media system from digital platforms and streaming providers”, Weimer analyses the situation with unusual clarity. Almost the entire media business – from development to production to evaluation – is facing massive changes that are ‘changing and distorting’ the market.

The effects are dramatic: Publishers, filmmakers and TV companies are under enormous pressure and many are in ‘existential concerns’. At the same time, Amazon, Disney and Netflix make high sales in Germany without investing in the domestic production site. Weimer describes the result with a term that shapes his entire strategy: ‘There was an unbalance.’

More than market failures: A threat to democracy

For Weimer, this is about more than economic upheaval. His central thesis: ‘There are de facto media monopolies of American origin here.’ The consequence is an existential threat: “The diversity of opinion in Germany is under threat, so we need to address this.”

This assessment is part of Weimer's broader cultural-political vision. The cultural sector is ‘under pressure from the right and left’ and authoritarian tendencies come ‘from the right, from the left, from Islamism, from dictatorships’. In this context, the streaming debate becomes a battle for ‘liberal, civil society’, which ‘must keep the space of the centre open and wide’.

The triad: Helping, opening up, overcoming monopolies

He summarises Weimer’s solution strategy in a concise ‘triad’: "Helping, opening up and overcoming monopolies". In concrete terms, this means a three-fold offensive:

1. More state funding: The federal government is already spending more than 100 million euros on film funding, the incentive funding has been increased to 30 percent of the production volume. "There will be more," Weimer promises.

2. Investment obligation for streaming providers: “Whoever does business in Germany in the future, benefits from the German market and tax-financed support should be obliged to invest again in German film productions. That is only fair.”

3. A digital levy: Weimer envisages an additional levy for the large platforms, about which he is already ‘in intensive discussions’.

The Chancellery meeting: Diplomacy or confrontation?

Next week, Weimer invites the streaming providers to a summit meeting in the Chancellery. It will be clear whether he chooses the diplomatic path or relies on confrontation. His choice of words leaves little room for manoeuvre: “We cannot let this go.”

Legally, the Minister sees himself on the safe side: "European law explicitly allows for an investment obligation." France serves as an example, where streaming providers have had to invest at least 20 percent of their revenues in European productions since 2021, or Switzerland, which has implemented Lex Netflix since 2024.

The industry in crisis: Self-criticism is also needed

However, Weimer's criticism is not only directed against the streaming giants. The German film industry must also ‘open up’: “Too many films are produced by the audience. It makes no sense that films are subsidised with a lot of money and then only the director’s friends watch it.”

This criticism hits a sore point of German film funding. Weimer's demand is unequivocal: ‘Whoever makes films should think mainly of the audience.’ This is not necessarily about blockbusters – ‘It is enough for me if German films are liked by many people again.’

The example of Switzerland shows how it can work: Winter Palace is the The first Swiss television series, It was co-produced with the US streaming service Netflix. Such cooperation is likely to increase in Switzerland in the future. Since January 2024, the «Lex Netflix» international streaming services such as Netflix, Disney+ or Prime Video, 4% to reinvest their profits generated in Switzerland in domestic film and television production. The Swiss Film Funding Act became 2022 Accepted by the people.
The fears that this reinvestment requirement would lead to extremely rising prices have not yet come true, as Switzerland, along with Denmark, is the country in which streaming providers are to be found. pay the most This direct comparison is not fair.

Democratic feedback as a cultural policy objective

Weimer's link between public success and democracy is interesting: Successful German films have ‘something to do with democratic feedback’. This makes the number of cinemagoers a political category – a thoroughly controversial approach that raises questions about the relationship between freedom of art and market success. Despite his combative rhetoric, Weimer does not stand on firm political ground. His colleague in the cabinet, Minister of Economic Affairs Katherina Reiche (CDU), thinks little of his ‘platform solo’. Signals are also mixed internationally – the EU Commission has removed a digital tax from its budget framework plan.

More than media policy: A Cultural Manifesto

Weimer's initiative goes far beyond traditional media policy. His warning against authoritarian tendencies ‘from the right and left’, his fight against ‘media monopolies of American origin’ and his emphasis on the threatened ‘diversity of opinion’ make clear: These are fundamental questions of cultural self-assertion. This is particularly evident in his handling of controversial cultural events. He wants to make the documenta ‘greater and brighter’, but ‘we will not accept anti-Semitism’. When ‘rights attack the famous Bauhaus’, he says ‘clearly: We don't like that.”

Weimer's offensive comes at a favorable time. In the budget deliberations, he "made more money for culture than ever before", despite the tense financial situation under Finance Minister Lars Klingbeil. These successes provide him with political capital for his ambitious plans. The question remains: Can Weimer’s ‘triad’ actually solve the problems diagnosed? His vision of a balanced media landscape is tempting, but the road to it is stony. The streaming providers will not voluntarily forgo billions in revenue, the digital industry will defend itself, and in their own government it rumbles.

conclusion

Irrespective of the evaluation of his concrete measures, Weimer has initiated an overdue discourse. His ‘unbalance’ diagnosis hits a neuralgic point in the digitised media society. The question of the relationship between global platforms and national cultural policy was long overdue.

The chancellor's office meeting with the streaming giants will become a litmus test for his strategy. Does he manage to get the providers to make voluntary concessions, or does he have to go the way of regulatory confrontation? The answer will not only determine the future of the German film industry, but also Weimer's credibility as a cultural-political actor.

‘We can't let this go’ – with this sentence Weimer has ushered in a new era. Whether it succeeds depends on his ability to reconcile vision and political reality. The German "Lex Netflix" modelled on the Swiss model could become a test case – not only for domestic cultural policy, but for the whole of Europe.

Sources: Swissinfo.ch | Tagesanzeiger.ch | Heise.de | Heise.de | RP-online.de


Article 6

Fritz OS 8.20 is live!

But don't be happy too early, so far only for the 7590

AVM has released Fritz!OS 8.20 and supplied the Fritz!Box 7590 as the first model with the update. The most important innovations for reading lazy as a video:

For everyone else, here's a summary of the highlights:

Fritz! Failsafe: A new Internet failure protection that automatically switches to alternative connections such as mobile phones in the event of malfunctions. (if they are permanently connected to the Fritzbox)

Improved online monitor: Now graphically displays the top consumers of the Internet connection and provides advanced overview of network utilization.

Smart home extensions: New possibilities for routine triggering (e.g. by phone calls or temperature thresholds) and extended control via Fritz!Smart Control 440.

Balcony power plant anyone? You can now read the feed-in performance live on a digital electricity meter with the intelligent FritzSmart Energy 250 current sensor.

Fritz!NAS Upload Share: Allows sharing folders via link via fritz.nas so other users can upload and download files.

Mesh improvements: Automatic device detection and intelligent networking for better stability and data throughput.

Other features: Text-to-speech for answering machines, simplified parental controls and Energy Efficient Ethernet for individual connections.

The update will be rolled out gradually – other Fritz!Box models will follow in the coming weeks. If you do not want to wait, you can manually update the AVM website download.


Article 7

NIS2 implementation critically considered

The VOICE user association uses its voice to draw attention to possible problems and grievances.

NIS2 implementation: Between security and reality, or security needs substance, not just laws

Cybersecurity is facing a new turning point: The NIS2 Directive aims to strengthen digital resilience across Europe. However, the current draft by the Federal Ministry of the Interior reveals a well-known dilemma – there is a considerable gap between well-meaning security goals and the reality of companies.

The cost gap: 76,000 euros versus reality

The IT user association VOICE raises the alarm: The additional costs estimated by the Ministry, amounting to an average of EUR 76,000 per company per year, were ‘significantly underestimated’. This assessment is particularly explosive, considering that, according to the draft, only 17 percent of companies have invested sufficiently in cybersecurity so far.

Straight medium-sized enterprises You will have to spend a lot more money (if you affected, What you need to find out for yourself) for security services, new technologies, and managing cloud dependencies. The discrepancy between political cost estimation and business reality is symptomatic of a deeper problem.

Two dimensions: Private liability, state immunity

The different treatment of the private and public sectors is particularly precarious. While private business executives can be held personally liable for cybersecurity failures, executives of federal agencies are exempt from this obligation. This asymmetry not only undermines the principle of equal treatment, but also weakens accountability where the state should serve as an example.

The compliance paradox: More harm than benefit?

This reveals a dangerous parallel to other standards such as ISO 9001 or ISO 27001: What is intended as a security measure turns into the opposite, if it is implemented only superficially and for pure compliance reasons.

The danger is real: Companies could be tempted to meet the minimum legal requirements without understanding or living the underlying safety philosophy. The result would be half-hearted measures that are legally compliant but do not bring real security gains – or worse: It is a deceptive security.

The way forward: A holistic safety culture instead of a top-down approach

IT security does not work as a decree from above. It must be anchored throughout the organisation, from CEO to trainee. This requires:

Concrete instructions for action instead of vague formulations: SMEs are unsettled by ‘proportionate measures’. Best practices and transparent reference standards are essential.

Realistic transition periods: Technology and processes cannot be changed overnight. Companies need time for meaningful implementations.

Equal treatment of all sectors: What applies to the private sector must also apply to the public sector, including the personal responsibility of managers.

Support instead of punishment: Instead of only threatening sanctions, companies should be supported in building their security architecture.

conclusion

The NIS2 Directive is important and necessary. The delayed implementation and corresponding EU rebuke Necessary, as well As in CE in Germany as KRITS is introduced; or DORA for fintechs.
Cyber threats are on the rise and Europe needs to strengthen its digital sovereignty. But the method of implementation determines success or failure.

Regulation that exists only on paper or is followed too mechanistically does not create real security. On the contrary: It binds resources without providing the desired protection.

True cybersecurity only emerges where all stakeholders understand why security measures are necessary and where they have the competence and motivation to implement them in a meaningful way. This requires education, training and a culture that sees security as a shared responsibility.

Politicians are required not only to create laws, but also the conditions for their successful implementation. This is the only way to turn NIS2 and CER into more than another compliance annoyance; A real contribution to Europe's digital security.


Article 8

CFTC Bill will be waved through the House of Representatives with 308-122

U.S. wants to become the Crypto Capital of the World under Trump, now you're one step further.

The U.S. House of Representatives has on Thursday enacted a law backed by the crypto industry to create a regulatory framework for cryptocurrencies and expand the regulatory powers of the Commodity Futures Trading Commission (CFTC) over the industry.

This is a huge success for the digital wealth industry, which has fought for years for nationwide legislation and invested heavily in pro-crypto candidates in last year's elections. For the first time, the law would establish a comprehensive regulatory framework for cryptocurrencies at the federal level in the U.S. and give the CFTC more powers to monitor the crypto market.

Special ‘Gschmäckle’
Trade ban for politicians with the exception of the presidential family:

The new stablecoin law includes a provision prohibiting members of Congress and their families from benefiting from stablecoins. However, this prohibition does not extend to the President and his family. Could this be related to Trump building a crypto empire from the White House?

Trump's Crypto Transactions:

  • Trump hosted a private dinner with top investors of a Trump meme coin in May
  • His family holds significant shares in World Liberty Financial, a crypto project that launched its own stablecoin USD1
  • Trump reported revenue of $57.35 million from token sales at World Liberty Financial in 2024
  • A meme coin linked to it generated an estimated $320 million in fees

Democrats strongly criticize this double standard. Maxine Waters described this as a validation of ‘Trump family corruption and efforts to sell the White House to the highest bidder’.

Let's take a closer look at the 3 templates:

Law 1: Stablecoin regulation - Already on Trump's desk

Voting result: 308-122 votes Status: Already passed by the Senate, goes directly to President Trump

The first and already successful law regulates stablecoins – cryptocurrencies linked to stable assets such as the US dollar to reduce price fluctuations.

Key points:

  • First Guardrails and Consumer Protection for Stablecoins
  • Obligation for publishers to hold reserves
  • Compliance with anti-money laundering and sanctions laws
  • Treasury Secretary Scott Bessent predicts growth to $3.7 trillion by 2030

Political explosives: The law prohibits members of Congress and their families from benefiting from stablecoins, but not the president and his family. Trump already made $57.35 million in 2024 with his crypto project ‘World Liberty Financial’.

Law 2: New Market Structure - Uncertain Future in the Senate

Voting result: 294-134 votes (cross-party support) Status: We still have to pass the Senate.

This heart of crypto regulation would finally provide clarity on how digital assets are regulated:

Revolutionary division of responsibilities:

  • Commodity Futures Trading Commission (CFTC): Regulates ‘mature’ blockchains such as Bitcoin as commodities
  • Securities and Exchange Commission (SEC): Monitors cryptocurrencies other than securities

Meaning: After years of regulatory chaos, it would be clear for the first time which authority is responsible for which cryptocurrency. For years, the industry has suffered from unclear laws and criticized the Biden administration for regulating mainly through enforcement rather than transparent rule-making.

Challenge: It is unclear whether the Senate will adopt the House of Representatives Act or draft its own.

Law 3: Ban on central bank digital currency - Scarce majority

Voting result: 219-210 votes (scarce majority) Status: We still have to pass the Senate.

The most controversial law prohibits the US from introducing a Central Bank Digital Currency (CBDC), a state-issued digital currency.

Background: While countries like China are already testing central bank digital currencies, this law completely blocks such plans in the US. Critics fear that a state-run digital currency could threaten privacy and supplant traditional cryptocurrencies.

Political dimension: Crypto industry as a new power factor

The cryptocurrency industry has become a major political player in Washington through massive campaign donations and lobbying. The passage of these laws demonstrates their growing power.

Cross-party support despite criticism: While the laws found broad support, Democrats like Elizabeth Warren criticize that regulation is too weak and could allow major corporations like Tesla (Elon Musk) and Meta (Mark Zuckerberg) to issue their own currencies.

Outlook: Turning point for mainstream adoption?

Proponents see the laws as a historic moment for cryptocurrencies. Patrick McHenry, former chairman of the Finance Committee, compares the significance to the securities laws of the 1930s that made Wall Street the financial center of the world.

The crucial question: Will the Senate support the ambitious plans or go its own way? The future of US crypto regulation will depend on the coming months.

Brave New World


Article 9

Cyberpunk 2077 draws attention to itself several times this week 5 years after its release:

On the one hand, there is the new patch to v2.3 for PC, PS and Xbox; on the other hand, there is now also a client for the Mac

Almost five years after the controversial release, CD Projekt Red continues the evolution of Cyberpunk 2077. Update 2.3 brings Among other things: AutoDrive, Mac support and new DLC rumors. With the new Update 2.3 Not only did the dystopian role-playing game reach Apple computers for the first time, but it also brings significant new features and could point to upcoming content. But one by one:

Mac version finally available

The long-awaited Mac version of Cyberpunk 2077 has been available since this week, marking an important milestone for the game. However, Mac users need to keep in mind some important requirements:

System requirements:

  • Only Apple Silicon Macs (from M1 upwards) - your old Intel Macs are not supported
  • macOS Sequoia 15.5 or later is required
  • At least 16 GB of RAM and 159 GB of free space
  • Recommended: M3 Pro with 18 GB RAM for optimal performance with ray tracing

So far it has completely passed you? Don't worry, just take a look at where you buy it, because for the App Store version it's getting clappy.

Purchasing options and prices: Pricing varies significantly depending on the platform. While Apple’s App Store charges a proud €82.90 for the Ultimate Edition, other providers offer significantly cheaper alternatives:

  • GOG (CD Projekt’s own store): EUR 37.59 (until 24 July 2025)
  • Epic Games Store: EUR 43.99 (until the end of July 2025)
  • Steam: 82,78 Euro (minimum reduction)

By the way, the basic version for ~nen Zwanni is also available for just a sniff. With GOG, however, it should be noted that there is currently no offline installer available and the installation must be done via GOG Galaxy with admin rights. More information on this from Heise.

Update 2.3: AutoDrive and new features

The simultaneously released update 2.3 brings a number of impressive new features that significantly expand the gaming experience:

AutoDrive function

The highlight of the update is undoubtedly the new AutoDrive feature. Players can now drive their vehicles independently to mission destinations or marked locations. Activation is done by holding H (PC) or the left stick (consoles). In addition, a film camera is available that enables cinematic journeys through Night City.

In addition, players can now call self-driving Delamain taxis, a feature that will be unlocked upon completion of the Don’t Lose Your Mind mission.

Vehicles and Customization

Four new vehicles expand the already extensive collection:

  • Yaiba ARV-Q340 Semimaru (available via side mission)
  • Rayfield Caliburn ‘Mordred’ (Reward for complex mission series)
  • Yaiba ASM-R250 Muramasa (via side mission or AUTOFIXER)
  • Chevillon Legatus 450 Aquila (can be purchased directly via AUTOFIXER)

CrystalCoatTM technology has been extended and is now available for partner company vehicles and even cheaper models thanks to a ‘hacker’ called Cosmetic_Troll.

Photo mode revolution

The photo mode received massive improvements:

  • 27 new NPCs can be spawned
  • Alternative outfits for NPCs and V’s stored clothing
  • New tabs for time and weather control
  • Improved lighting options
  • Color balance tab for own filters
  • New stickers and frames for postcard-like screenshots

Well, you can be divided about this feature, but at least it should lead to the presence of one or the other pretty picture on the topic on the popular social media platforms. More visibility is always a good thing, isn't it?

Technical improvements

PC users benefit from advanced graphics options:

  • AMD FSR 4 and FSR Frame Generation 3.1 support
  • Intel XeSS 2.0 with Frame Generation
  • HDR10+ Gaming for Intel Graphics Cards
  • Improved DLSS settings

Console players get VRR support for PlayStation 5 and Xbox Series X ⁇ S.

Casino DLC in sight? New speculations

The update may contain more than just the obvious features. Attentive fans discovered new billboards in Night City that could indicate a casino. This development raises hopes for the return of the North Oak Casino & Country Club, one of the most prominent deleted content from the original development.

However, the new ads appear to be related to Pacifica Casino, suggesting that they may just be atmospheric improvements. Still, fans are speculating about a possible casino DLC that could add gambling and new activities to the gaming experience.

Conclusion:

Cyberpunk 2077 is still alive! With Update 2.3 and the Mac launch, CD Projekt Red once again proves its commitment to the further development of Cyberpunk 2077. The AutoDrive feature and advanced photo modes show that the studio continues to implement features almost five years after release.

The Mac version opens the game to a new audience, even if the high hardware requirements limit compatibility. The significant price differences between the platforms should motivate buyers to choose carefully.

Whether the casino speculations lead to concrete content remains to be seen. However, with Cyberpunk 2’s development underway, it is questionable whether CD Projekt Red is planning even larger extensions for its predecessor or is focusing on smaller updates such as this one.


As usual, I say goodbye to the words of my favorite IT YouTuber, Sun-Tsu:

Choose your fights wisely

Not every warning or problem requires an immediate, elaborate response. Prioritize threats and focus on the ones that could do the most damage.