Over the past few weeks, I’ve been diving into ElementCall and ElementX – two exciting projects in the Matrix ecosystem that push decentralized communication even further.
🔹 ElementCall enables secure, peer-to-peer video calls using the Matrix protocol – built on top of LiveKit.
🔹 ElementX is a next-generation Matrix client – fast, lightweight, and built with modern architecture.
📚 New Tutorial Available!
I’ve written a step-by-step tutorial on how to integrate ElementCall (with LiveKit and JWT authentication) as an addon to an existing Matrix Synapse installation running in Docker.
💡 This makes it easy to upgrade your Matrix setup with full-featured video calling – fully self-hosted and privacy-respecting.
👉 Check out the tutorial here:
🔗 https://it-service-commander.de/en/tutorials-2/docker/elementcall-as-add-on-for-matrix-synapse-docker/
Feel free to reach out if you’re experimenting with Matrix or looking to add video calling to your infrastructure!
#Matrix #ElementCall #ElementX #SelfHosting #VideoCalling #Synapse #LiveKit

Why you should not only use the network, but also support it:
The internet should be a place of freedom — a space where you can inform yourself, communicate, and express your opinion without being constantly watched or controlled. Unfortunately, the reality looks quite different: surveillance, data collection, censorship. That’s where TOR comes in — the “The Onion Router” network. And no, it’s not just for hackers or whistleblowers. TOR is for anyone who wants to protect their privacy online.
🔐 TOR Is Not a Hiding Place for Criminals — It’s a Shield for Citizens
TOR often has a bad reputation because it’s associated with the so-called “dark web.” But that image is misleading. TOR was not created for illegal purposes — it was developed as a tool for ordinary citizens who want to keep their online activity private.
Whether you want to browse anonymously, avoid being tracked by advertisers, or bypass censorship in authoritarian regimes — TOR gives you the ability to move through the internet securely and without being watched.
🕵️♂️ Snowden, Assange, and the Reality of Mass Surveillance
You may remember Edward Snowden, who revealed in 2013 how extensively the NSA and other intelligence agencies are monitoring people around the world. Or Julian Assange, who, through WikiLeaks, published confidential documents exposing war crimes and corruption.
Both men used secure, anonymous communication methods — including TOR — to protect their sources and themselves. Without such tools, many of these truths would have remained hidden. TOR is not just a piece of software — it’s a symbol of transparency, accountability, and freedom of information.
⚙️ How You Can Support TOR — By Running a Relay
TOR relies on its users to stay strong. Especially important are Middle Relays — the servers that forward encrypted traffic through the network. The more of these relays exist, the faster, more stable, and more secure the entire system becomes.
The good news: Running a relay is technically simple, inexpensive, and has a big impact — for you and for millions of users around the globe.
I have provided a corresponding tutorial for your own Linux server here for free:
🧭 Digital Freedom Is Not a Given
Data retention laws, chat control, constant tracking — these are not just buzzwords. They represent real threats to civil liberties. Both governments and corporations are collecting data at a scale that would have seemed impossible just a few years ago.
Privacy is not a luxury — it is a fundamental digital right. And now, more than ever, it needs to be defended.
✅ Conclusion
TOR is not a criminal hiding place, but a protective tool for free speech, journalism, and digital self-determination.
If you use TOR, you protect your own data.
If you actively support TOR, for example by running a relay, you help make the internet a freer and safer place — for everyone.
Real freedom begins with digital responsibility — and that’s in your hands.
More Information: https://www.torproject.org/
🌐 In an increasingly interconnected world, many people want secure access to their home network from anywhere. However, significant security risks exist, especially if you simply open ports on your router. A better alternative is using VPN technologies like WireGuard or OpenVPN.
VPN stands for “Virtual Private Network” and refers to a secure connection that encrypts your internet traffic and routes it through a protected tunnel between your device and the network. This keeps your data safe from prying eyes and ensures that only authorized users gain access.
⚠️ Risks of Port Forwarding
Port forwarding on a router may initially seem like a simple solution for accessing NAS devices, smart home systems, or surveillance cameras remotely. However, each open port creates a potential entry point for cybercriminals:
- 🔓 Open Attack Surface: Every forwarded port can be discovered and attacked from the outside. Hackers and automated scripts actively look for open ports and vulnerabilities.
- 🔍 Lack of Encryption: Without additional security measures, data traffic usually remains unencrypted, making sensitive information easily readable.
- 🔑 Weak Authentication: Many devices offer insufficient protection or default passwords that can easily be compromised.
✅ Benefits of WireGuard and OpenVPN
Instead of directly forwarding ports, you should use VPN solutions like WireGuard or OpenVPN, which offer numerous advantages:
- 🔐 Enhanced Security Through Encryption: All data traffic is securely encrypted, making it unreadable to unauthorized parties.
- 🛡️ Strong Authentication: Only authorized users can access your network, significantly reducing the risk of unauthorized access.
- 🕵️ Hidden Infrastructure: No directly visible ports from outside, effectively making your devices invisible to automated attacks.
🔗 Why Choose WireGuard or OpenVPN?
Both technologies have proven their reliability:
- 🚀 WireGuard is lightweight, fast, easy to set up, and offers state-of-the-art cryptography. Ideal for home users looking for straightforward and quick access.
- ⚙️ OpenVPN has been established for years, is highly flexible, and widely supported. Perfect for complex requirements and professional environments.
📌 Conclusion
If you take your privacy and security seriously, avoid simple port forwarding and instead use proven VPN solutions such as WireGuard or OpenVPN. This ensures your data remains protected and your home network stays safe from attackers.

The electronic patient record (ePA) is a digital collection of medical data such as doctor’s reports, X-rays, vaccinations, or medication plans. Insured individuals in Germany can decide for themselves which information is stored and which doctors are allowed to access it. The goal is better, more connected healthcare and greater transparency.
🧑💻 As an IT specialist, I have personally opted out of having a digital patient record (ePA) created for myself.
This article reflects my subjective opinion and is based on my experience in the IT field. While the ePA offers potential benefits, such as improved networking in healthcare, I consider the associated risks and challenges to be too great.
🔐 1. Data Protection and Security:
The ePA stores highly sensitive health data. Although recently discovered security vulnerabilities highlighted by the Chaos Computer Club (CCC) have been addressed, it still cannot be ruled out that hackers could gain access again through future security gaps.
Furthermore, the health data is not stored on the insurance card itself but on centralized servers located in Germany. Even though the data is encrypted, it is potentially accessible 24/7, since it is stored permanently online.
This central storage significantly increases the risk of hacker attacks and data leaks.
🖥️ 2. Integration, Compatibility, and User Acceptance:
Each medical practice must keep its IT systems — including operating systems — consistently up to date to ensure that they do not become the weakest link in the encryption chain and vulnerable to cyberattacks.
Moreover, the widespread implementation of the ePA requires extensive training for doctors, healthcare staff, and patients. Especially older individuals or those unfamiliar with digital systems often struggle to adapt, leading to frustration and resistance.
📂 3. Limitation of Patient Rights:
The ePA stores patient data centrally. Although this is intended to make access easier, it also means patients lose control over where and how their data is stored and used.
They can no longer decide who has access or keep track of how the data is being utilized. This increases the risk of unauthorized access and reduces transparency for the patient.
👁️ 4. Risk of Digital Surveillance:
There is a concern that health data might be used not only for medical purposes but for other interests as well.
In the future, this information could potentially be used by insurers, employers, or other institutions to monitor patient behavior. This kind of digital surveillance could endanger privacy and erode trust in the healthcare system.
📌 Conclusion:
Digitization in healthcare can offer many benefits, but all technical, legal, and security-related questions must be thoroughly resolved. Only then can the trust of both patients and professionals be ensured. Digitization must be implemented in a secure, privacy-compliant, and transparent way in order to protect patients and strengthen confidence in the system.
Everyone should be free to decide for themselves whether they want a digital patient record.
As for me, I have chosen to opt out — because the risks regarding data protection, security, and potential digital surveillance outweigh the possible benefits in my view.
Sample objections can be found here:
https://widerspruch-epa.de/
https://widerspruch-epa.de/wp-content/uploads/2025/01/widerspruch_EPA.pdf
Running your own Bitcoin node is a crucial step toward true financial sovereignty. You verify transactions yourself, protect your privacy, and become an active part of the decentralized network—without relying on third parties. Whether for security, independence, or learning purposes, your own node brings you closer to the heart of Bitcoin.
🔐 Full Control
You verify transactions yourself—no reliance on third parties.
No censorship: send and receive Bitcoin directly through your own node.
🛡️ More Privacy
Your wallet communicates only with your node—no data leaks.
No need for external block explorers.
⚡ Lightning Integration
Run your own Lightning channels and wallets directly via Umbrel.
Fast, low-cost payments without middlemen.
📚 Learn & Understand
Gain a deeper understanding of Bitcoin and the network.
Perfect for the curious, tech enthusiasts, and developers.
🧩 Apps & Extensions
Umbrel offers a variety of useful apps: Electrum Server, Mempool, Nextcloud, and more.
All easily installable via a simple web interface.
🏠 Easy Start
Intuitive user interface, ideal for Raspberry Pi & more.
Quick setup with regular updates. Alternatively, can be virtualized with Proxmox.
🧰 Hardware Checklist for Your Umbrel Node
🔹 Raspberry Pi 5
🔹 1 TB SSD
🔹 SSD enclosure or adapter (USB 3.0 to SATA)
🔹 microSD card (at least 32 GB, e.g., SanDisk Ultra)
🔹 USB-C power supply (original power adapter recommended)
🔹 Case for the Pi (with cooling)
🔹 Ethernet cable (for a stable connection)
Optional:
🔌 UPS (Uninterruptible Power Supply) – protects against power outages
🌐 Router port forwarding – for a publicly reachable Lightning node or alternatively: via the Tor network
As an IT service provider, I’m happy to offer guidance and support.
https://github.com/getumbrel/umbrel
A Windows system on Proxmox VE offers companies a practical solution to provide multiple employees with flexible access to a centralized Windows environment. Virtualization with Windows 11 Enterprise or Windows Server 2022 creates a manageable and scalable IT infrastructure.
System Setup
The system is based on a Windows virtual machine in Proxmox. Thanks to Remote Desktop Services (RDS), multiple users can work simultaneously. User management is handled either through Active Directory or local accounts. Security measures such as VPN and firewall policies protect access.
Access Options
Employees can connect to the system from anywhere via Remote Desktop Protocol (RDP), regardless of the device used. Linux computers can also establish a stable connection using tools like Remmina or FreeRDP. This allows even simple, low-performance devices to be used as Windows workstations.
Backup & Security
Automatic backups using the Proxmox Backup Server (PBS) or snapshots ensure reliable data protection. Storage can also be outsourced to a NAS or the cloud. Regular updates keep the system stable and secure.
Installation Service for Businesses
As an IT service provider, I handle the complete setup and configuration of the system – from Proxmox VE and the Windows VM to licensing and the setup of Remote Desktop Services (RDS). I also ensure a secure network configuration and a reliable backup strategy. In addition, I offer support and maintenance to ensure the system runs stably over the long term.
This solution provides businesses with a powerful, secure, and easy-to-maintain IT environment that enables employees to access Windows applications from any location.

Secure corporate communication with open source technology
Matrix Synapse is a powerful open source server for the Matrix protocol that enables secure, decentralized and scalable real-time communication. Companies that value data protection, data sovereignty and interoperability can use it to create a powerful alternative to proprietary solutions such as Microsoft Teams, Slack or WhatsApp.
A major advantage of Matrix Synapse is that it can be used completely free of charge. As it is open source software, there are no license fees. Companies can operate the server on their own infrastructure or host it in the cloud without being tied to a specific provider.
In combination with Element X, a modern, fast and user-friendly matrix client, companies receive a secure messaging platform that can be used for both internal communication and for exchanges with external partners. Thanks to end-to-end encryption, all messages and calls are optimally protected. In addition, rooms and group chats can be managed flexibly so that different teams can work together efficiently.
My services as an IT service provider
As an IT service provider, I support companies in the planning, implementation and maintenance of their Matrix and Element-X infrastructure. My services include
- Consulting and design: Analysis of requirements and creation of a customized solution
- Installation and configuration: Setting up Matrix Synapse on dedicated servers or in the cloud
- Support: Introduction to the use of Element X and ongoing technical support
- Security and maintenance: Regular updates, monitoring and protection against security risks
With my support, companies can make a smooth transition to a data protection-friendly communication platform that gives them maximum control over their own data.

https://github.com/element-hq/synapse
AdGuard Home is a powerful open source software for filtering DNS requests. It enables companies to block unwanted or dangerous websites by filtering advertising networks, tracking services and potentially harmful domains at DNS level.
In companies, the use of AdGuard Home offers numerous advantages: It improves network security by blocking phishing and malware domains, reduces distraction from advertising and ensures more efficient bandwidth usage. It also contributes to data protection by preventing tracking requests and thus better protecting sensitive company data. Centralized management and customizability make AdGuard Home an ideal solution for a secure and productive IT environment.
AdGuard Home is open source software and is published under the GPL 3.0 license. This means:
A company can use AdGuard Home free of charge (privately and commercially)
There is no commercial license requirement for using the software.
The source code is open, so companies can adapt it as long as they comply with the license terms (e.g. disclose changes if they are redistributed).
I would be happy to help you operate an AdGuard service in your company network – be it as your ownenständige Maschine oder als Proxmox LXC Container.

Proxmox is free software that can be used to create and manage virtual machines and containers on a server. It is based on the Debian Linux operating system and combines two technologies: KVM for high-performance virtual machines and LXC for lightweight containers.
With Proxmox, you can run multiple virtual systems on a single physical server, use resources efficiently and control everything conveniently via a web-based interface. It also offers practical functions such as live migration (moving running systems to another server), automatic backups and the option of connecting several servers to a cluster to safeguard against failures.

As an IT service provider, I can help you set up your own server with Proxmox and use it efficiently.
This not only saves you the cost of additional hardware, but also makes optimum use of your existing resources. You also benefit from a flexible and easy-to-manage environment in which you can easily create, manage and secure servers. I will assist you with setup, configuration and maintenance to ensure that your system remains reliable and efficient.
Whether for private individuals or companies – I will find an individual solution for you!
The popular Umbrel OS, which is also THE software for many Bitcoin nodes, has been updated to version 1.4. The update can be installed immediately.
Attention: The IPv6 network address changes with the update, so that any port releases via the FritzBox must be adapted to the new address. Only then will Umbrel be accessible from outside again.
UmbrelOS 1.4 brings some new features for the personal “home server”:

- Create, upload and organize files and documents.
- Share folders over your local network and easily add them as network drives on macOS, Windows, iOS or Android.
- Set up a shared folder as a Time Machine backup location on macOS.
- Preview all your photos, videos, PDFs and audio files.
- Access to app data folders.
- Support for external (USB) storage for Umbrel Home users.