<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Security-Privacy on Roethof.Net</title><link>https://roethof.net/categories/security-privacy/</link><description>Recent content in Security-Privacy on Roethof.Net</description><generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>ronny@roethof.net (Ronny Roethof)</managingEditor><webMaster>ronny@roethof.net (Ronny Roethof)</webMaster><copyright>© 2026 Ronny Roethof</copyright><lastBuildDate>Tue, 31 Mar 2026 05:47:20 +0200</lastBuildDate><atom:link href="https://roethof.net/categories/security-privacy/index.xml" rel="self" type="application/rss+xml"/><item><title>The Compliance Mirage: 350GB of EU Silence</title><link>https://roethof.net/posts/2026/03/the-compliance-mirage-350gb-eu-silence/</link><pubDate>Tue, 31 Mar 2026 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/the-compliance-mirage-350gb-eu-silence/</guid><description>The European Commission ran its infrastructure on AWS while writing sovereignty frameworks for everyone else. Now 350GB is gone. This was not a surprise.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/the-compliance-mirage-350gb-eu-silence/cover.png"/></item><item><title>The Summer Slump: Security Doesn't Take a Holiday</title><link>https://roethof.net/posts/2026/03/the-summer-slump-security-doesnt-take-a-holiday/</link><pubDate>Fri, 20 Mar 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/the-summer-slump-security-doesnt-take-a-holiday/</guid><description>Een waarschuwing voor organisaties: in de zomer neemt mentale vermoeidheid toe, waardoor security-risico&amp;rsquo;s stijgen, ondanks dat systemen operationeel blijven.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/the-summer-slump-security-doesnt-take-a-holiday/cover.png"/></item><item><title>We Did This To Ourselves</title><link>https://roethof.net/posts/2026/03/we-did-this-to-ourselves-sovereignty-failure/</link><pubDate>Wed, 18 Mar 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/we-did-this-to-ourselves-sovereignty-failure/</guid><description>A decade of Dutch digital sovereignty surrendered through procurement. From the failed Rijkscloud to the CLOUD Act, and now a state secretary who confirms it in writing and presses on anyway.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/we-did-this-to-ourselves-sovereignty-failure/cover.png"/></item><item><title>The Illusion of Control: Your Laptop Choice Isn't the Security Risk</title><link>https://roethof.net/posts/2026/03/the-illusion-of-control-your-laptop-choice-isnt-the-security-risk/</link><pubDate>Tue, 17 Mar 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/the-illusion-of-control-your-laptop-choice-isnt-the-security-risk/</guid><description>Mobile authenticator vulnerabilities expose a fundamental truth. Securing the endpoint OS while leaving the phone untouched is security theater. Here is what actually works.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/the-illusion-of-control-your-laptop-choice-isnt-the-security-risk/cover.png"/></item><item><title>Fortinet’s Quiet War on Linux Workstations</title><link>https://roethof.net/posts/2026/03/fortinet-war-on-linux-workstations/</link><pubDate>Thu, 12 Mar 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/fortinet-war-on-linux-workstations/</guid><description>How Fortinet’s licensing changes force Linux engineers into costly VPN workarounds, creating operational risk.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/fortinet-war-on-linux-workstations/cover.png"/></item><item><title>If You Can Read It in OWA, You Can Archive It: A Playwright Approach</title><link>https://roethof.net/posts/2026/03/extract-owa-email-history-playwright/</link><pubDate>Wed, 11 Mar 2026 12:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/extract-owa-email-history-playwright/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/extract-owa-email-history-playwright/cover.png"/></item><item><title>The ISO 27001 Hallucination: Documenting Your Way to Disaster</title><link>https://roethof.net/posts/2026/03/iso-27001-compliance-illusion-resilience-failure/</link><pubDate>Mon, 09 Mar 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/iso-27001-compliance-illusion-resilience-failure/</guid><description>ISO 27001 documentation can give a false sense of security, leading to compliance illusions and enterprise risk.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/iso-27001-compliance-illusion-resilience-failure/cover.png"/></item><item><title>The Apeldoorn Illusion: A Post-Mortem of Dutch Digital Sovereignty</title><link>https://roethof.net/posts/2026/03/unconscious-incompetence-apeldoorn-illusion-deep-dive/</link><pubDate>Fri, 06 Mar 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/03/unconscious-incompetence-apeldoorn-illusion-deep-dive/</guid><description>A post-mortem of Dutch digital sovereignty failures, exploring enterprise and systemic IT accountability.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/03/unconscious-incompetence-apeldoorn-illusion-deep-dive/cover.png"/></item><item><title>The DJI and AP Collapse: A Masterclass in Institutional Hypocrisy</title><link>https://roethof.net/posts/2026/02/dji-ap-collapse-institutional-hypocrisy/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/02/dji-ap-collapse-institutional-hypocrisy/</guid><description>A case study of institutional failures in cybersecurity and governance, highlighting systemic risks in enterprise IT.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/02/dji-ap-collapse-institutional-hypocrisy/cover.png"/></item><item><title>The Badge, The Burnout, and the Backdoor: Why Scammers Love Your CISO</title><link>https://roethof.net/posts/2026/02/the-tired-admin-scam-gamification/</link><pubDate>Sun, 01 Feb 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/02/the-tired-admin-scam-gamification/</guid><description>How burnout and gamification create easy targets for social engineering attacks on enterprise admins.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/02/the-tired-admin-scam-gamification/cover.png"/></item><item><title>The State of SSH: Neglect Disguised as Stability</title><link>https://roethof.net/posts/2026/01/state-of-ssh-neglect-disguised-as-stability/</link><pubDate>Thu, 22 Jan 2026 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2026/01/state-of-ssh-neglect-disguised-as-stability/</guid><description>SSH infrastructure is often treated as stable, but neglect can create hidden vulnerabilities in enterprise environments.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2026/01/state-of-ssh-neglect-disguised-as-stability/cover.png"/></item><item><title>The Panopticon Economy: How the EU is Building China-Lite</title><link>https://roethof.net/posts/2025/11/the-panopticon-economy-eu-china-lite/</link><pubDate>Thu, 20 Nov 2025 09:48:04 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/11/the-panopticon-economy-eu-china-lite/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/11/the-panopticon-economy-eu-china-lite/cover.png"/></item><item><title>The Exit That Never Was: ISO27001, the Dutch Government, and the Solvinity Panic</title><link>https://roethof.net/posts/2025/11/the-exit-that-never-was-iso27001-dutch-government-solvinity-panic/</link><pubDate>Wed, 12 Nov 2025 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/11/the-exit-that-never-was-iso27001-dutch-government-solvinity-panic/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/11/the-exit-that-never-was-iso27001-dutch-government-solvinity-panic/cover.png"/></item><item><title>The Dutch Kill Switch: Kyndryl, Solvinity, and the Sovereignty Mirage</title><link>https://roethof.net/posts/2025/11/kyndryl-solvinity-sovereignty-kill-switch/</link><pubDate>Mon, 10 Nov 2025 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/11/kyndryl-solvinity-sovereignty-kill-switch/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/11/kyndryl-solvinity-sovereignty-kill-switch/cover.png"/></item><item><title>Target Acquired: When WSUS Becomes the Weapon (CVE-2025-59287)</title><link>https://roethof.net/posts/2025/11/wsus-weaponized-cve-2025-59287/</link><pubDate>Fri, 07 Nov 2025 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/11/wsus-weaponized-cve-2025-59287/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/11/wsus-weaponized-cve-2025-59287/cover.png"/></item><item><title>Inception-Level Evasion: When Your EDR Can’t See the Linux VM Hiding in Windows</title><link>https://roethof.net/posts/2025/11/inception-level-evasion-edr-linux-vm/</link><pubDate>Thu, 06 Nov 2025 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/11/inception-level-evasion-edr-linux-vm/</guid><description>Pro-Russian hackers exploit Linux VMs inside Windows to bypass EDR, creating a critical security blind spot.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/11/inception-level-evasion-edr-linux-vm/cover.png"/></item><item><title>You Blocked ChatGPT? That’s Cute. Your Data Still Leaks.</title><link>https://roethof.net/posts/2025/06/blocking-chatgpt-is-cute/</link><pubDate>Thu, 19 Jun 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/06/blocking-chatgpt-is-cute/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/06/blocking-chatgpt-is-cute/cover.png"/></item><item><title>That Cybersecurity Alarm Bell? It's Ringing for All of Us in the Netherlands.</title><link>https://roethof.net/posts/2025/06/digital-security-nl-political-urgency/</link><pubDate>Tue, 17 Jun 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/06/digital-security-nl-political-urgency/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/06/digital-security-nl-political-urgency/cover.png"/></item><item><title>NCSC's Late-Stage Panic: BYOD Is Risky? No Shit.</title><link>https://roethof.net/posts/2025/05/ncsc-byod-late-panic-rant/</link><pubDate>Wed, 28 May 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/05/ncsc-byod-late-panic-rant/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/05/ncsc-byod-late-panic-rant/cover.png"/></item><item><title>Consult the European Vulnerability Database: Another Damn Database, or a Real Step Forward?</title><link>https://roethof.net/posts/2025/05/consult-european-vulnerability-database/</link><pubDate>Sun, 11 May 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/05/consult-european-vulnerability-database/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/05/consult-european-vulnerability-database/cover.png"/></item><item><title>Vendor Lock-In: Why Every Company Needs a Microsoft Exit Strategy (But Almost None Have One)</title><link>https://roethof.net/posts/2025/05/ms-exit-strategy/</link><pubDate>Tue, 06 May 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/05/ms-exit-strategy/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/05/ms-exit-strategy/cover.png"/></item><item><title>Beyond the Hype: Navigating AI's Power and the Critical Privacy Line</title><link>https://roethof.net/posts/2025/05/navigating-ai-privacy-security/</link><pubDate>Mon, 05 May 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/05/navigating-ai-privacy-security/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/05/navigating-ai-privacy-security/cover.png"/></item><item><title>EU Sells Out 450 Million Citizens: Israel Gets OUR Data While Fining TikTok for the SAME THING? What the Actual Fuck?</title><link>https://roethof.net/posts/2025/05/eu-gives-citizen-data-to-israel-fuck-our-privacy/</link><pubDate>Sun, 04 May 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/05/eu-gives-citizen-data-to-israel-fuck-our-privacy/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/05/eu-gives-citizen-data-to-israel-fuck-our-privacy/cover.png"/></item><item><title>The Human in Cybersecurity: Liability or Asset? My Take.</title><link>https://roethof.net/posts/2025/04/human-factor-liability-or-asset/</link><pubDate>Sun, 20 Apr 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/human-factor-liability-or-asset/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/human-factor-liability-or-asset/cover.jpg"/></item><item><title>Taming the Log Tsunami: My Quest for an Open Source Syslog Solution</title><link>https://roethof.net/posts/2025/04/oss-syslog-journey/</link><pubDate>Tue, 15 Apr 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/oss-syslog-journey/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/oss-syslog-journey/cover.jpg"/></item><item><title>Community-Driven Anti-Spam Arsenal: From SpamCop to Modern Defense Networks</title><link>https://roethof.net/posts/2025/04/community-anti-spam-tools/</link><pubDate>Mon, 14 Apr 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/community-anti-spam-tools/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/community-anti-spam-tools/cover.jpg"/></item><item><title>Building an Open Source Security Fortress: A Blueprint for Sovereignty (and Sanity)</title><link>https://roethof.net/posts/2025/04/oss-security-platform-blueprint/</link><pubDate>Fri, 11 Apr 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/oss-security-platform-blueprint/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/oss-security-platform-blueprint/cover.jpg"/></item><item><title>The Update Obsession: Are We Really Opening the Front Door to Cybercriminals?</title><link>https://roethof.net/posts/2025/04/rant-update-obsession/</link><pubDate>Wed, 09 Apr 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/rant-update-obsession/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/rant-update-obsession/cover.jpg"/></item><item><title>The Digital Driver's License: Convenience or Control?</title><link>https://roethof.net/posts/2025/04/digital-drivers-license-netherlands/</link><pubDate>Mon, 07 Apr 2025 16:03:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/digital-drivers-license-netherlands/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/digital-drivers-license-netherlands/cover.png"/></item><item><title>Let's Build an Ansible Role for Basic Linux Hardening</title><link>https://roethof.net/posts/2025/04/ansible-role-linux-hardening/</link><pubDate>Wed, 02 Apr 2025 00:00:00 +0200</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/04/ansible-role-linux-hardening/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/04/ansible-role-linux-hardening/cover.jpeg"/></item><item><title>My Personal Take: Company Laptops - Security Ain't Everything (But It's Still My Job, Damn IT)</title><link>https://roethof.net/posts/2025/03/company-laptops-personal-use-security-balance/</link><pubDate>Tue, 25 Mar 2025 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/03/company-laptops-personal-use-security-balance/</guid><description>A personal reflection on company laptop security, balancing policy, autonomy and practical IT responsibilities.</description><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/03/company-laptops-personal-use-security-balance/cover.jpg"/></item><item><title>The Paradox of Excessive Security Measures: When Does 'Safer' Become 'Overkill'?</title><link>https://roethof.net/posts/2025/03/the_paradox_of_excessive_security_measures_when_does_safers_become_overkill/</link><pubDate>Sat, 22 Mar 2025 00:00:00 +0100</pubDate><author>ronny@roethof.net (Ronny Roethof)</author><guid>https://roethof.net/posts/2025/03/the_paradox_of_excessive_security_measures_when_does_safers_become_overkill/</guid><description/><media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://roethof.net/posts/2025/03/the_paradox_of_excessive_security_measures_when_does_safers_become_overkill/cover.png"/></item></channel></rss>