Categories
Blog Android Security

2025-08-19: Android System SafetyCore: For Your Safety?

I recently heard in one of my tech groups on the Matrix network about a new app suddenly appearing on many Android devices: Android System SafetyCore. ?
At first, there was a lot of confusion – some suspected malware, others thought it was a buggy update. But it quickly became clear: this isn’t some shady download, but rather an official Google system app silently installed on devices without any visible announcement.

And that’s where the problem begins: when a company like Google rolls out background features that deeply integrate into the system, the question inevitably arises – is this really about safety, or also about control?

What does the app actually do?

SafetyCore is an invisible system service, embedded deeply within Android. It acts as infrastructure for on-device machine learning. According to Google, the app is initially being used in Google Messages – where it automatically detects images that may contain sensitive content such as nudity.

Here’s how it works:

  • If you receive an image with possible “sensitive content,” it’s first blurred.
  • A warning ? appears with information and support resources.
  • You then decide whether to view the image or block it.
  • The same applies when sending images – if nudity is detected, you’ll be warned before sending.

Google stresses that this analysis happens only on your device (on-device), and images are not uploaded to servers. Technically, SafetyCore provides the recognition modules that apps like Messages can call upon.

Planned future functions include:

  • Detecting dangerous links in chats
  • Blocking messages from unknown international senders
  • Classifying content as spam, fraud, or malware
Why I find this problematic ⚠️
  1. Installed without consent
    SafetyCore was rolled out automatically, with no prior request or notification.
  2. Lack of transparency
    Google only mentioned the app in a blog post. Most users discovered it when digging through their system app list.
  3. Potential for abuse
    Even if Google currently claims no data is sent to servers, the technical groundwork is there. This could change in the future.
  4. Undermining end-to-end encryption
    In theory, apps like SafetyCore can weaken the concept of end-to-end encryption. Why? Because content is scanned before it is encrypted and sent. The encryption remains intact, but if messages or images are analyzed on the device prior to encryption, the real protective value is compromised.
  5. Erosion of personal freedom
    My phone belongs to me. I shouldn’t be forced to accept hidden apps that inspect my content – even if they are supposedly “for my protection.”
  6. Privacy law concerns
    Under European GDPR rules, installing apps that process sensitive data without clear consent is questionable at best.
What the community says

The reactions are divided:

  • Some see SafetyCore as a useful tool to fight scams and unwanted content.
  • Others compare it to spyware, since it installs silently and integrates deep into the system.
  • Most interestingly, GrapheneOS – an alternative Android system for Google Pixel devices focused on security and privacy (see this blog post) – does not install SafetyCore at all. Its developers emphasize that SafetyCore is designed for classification tasks (spam, malware, phishing) but not for reporting illegal content. They stress that making such a distinction is crucial to protect privacy and prevent false positives.
What you can do ?️
  • Locate the app: Settings → Apps → Show all apps → Three-dot menu → Show system apps → search “SafetyCore”
  • Disable it: In many cases, you can at least disable the app or remove updates.
  • Stay alert: SafetyCore can reappear with future updates.
Conclusion ✍️

I believe security is important – but not at the cost of freedom and privacy.
SafetyCore might be well-intentioned, but its silent rollout breeds mistrust.

While systems like GrapheneOS deliberately avoid hidden installations and give users full control, Google silently installs an app that inspects your content – no matter how “local” the analysis may be.

Even more worrying is the fact that such a system can effectively weaken end-to-end encryption: if content is analyzed before encryption, the core principle of secure private communication is undermined.

Your smartphone should remain your space of self-determination – not a black box where hidden functions run without your knowledge or consent.

Categories
Blog Android Messenger OpenSource Security Server

2025-08-17: Molly – Your Privacy-Focused Alternative to Signal

As an IT consultant, I see every day how important secure and private messaging is. Signal does a great job and is rightly considered one of the most secure messengers ✅ – but Molly puts even more emphasis on privacy and control.

What’s especially interesting: On GrapheneOS, Molly is available by default, as it is recommended there as a trusted messenger. But you can also use Molly on any other Android system by simply installing the APK manually.

Why Molly?

Molly is based on the Signal protocol but adds additional security features such as encryption at rest (encrypting locally stored data).

Other advantages include:

  • Open-Source – transparent and verifiable.
  • More control – option to use your own push infrastructure.
  • Optimized for privacy – especially in combination with GrapheneOS.

For a deeper look at GrapheneOS, check this out:
GrapheneOS – More Security, Less Google: How to Make Your Smartphone Truly Private

Download the Latest Version
Please note:
Manual installation file available for free download (for advanced users)
Setup with My Molly-Socket Server

To make Molly even more privacy-friendly, you can connect it to my own Molly-Socket server:

https://molly.it-service-commander.de

Here’s how:

  1. Open the app.
  2. Go to Settings → Notifications → Push Notifications.
  3. Select “Unified Push” ? as the push service.
  4. Scan the QR code from my website.
    (https://molly.it-service-commander.de/)

This way, your push notifications don’t run through third-party servers but through your own infrastructure ?️ – a clear advantage for privacy.

Conclusion

Signal is already excellent ✅ – but Molly is the even more privacy-focused choice. On GrapheneOS, Molly comes preinstalled, and on any other Android system it can easily be installed manually.

I personally use Molly every day – not just as a messenger, but as part of a holistic privacy strategy.

Categories
Blog DNS E-Mail Server Webhosting

2025-08-12: My Own Mail Server – and Why Telekom Initially Didn’t Like It

As an IT service provider, I wanted to see for myself: running my own mail server – fully under my control, without depending on external providers.
For this, I use Mailcow, an open-source mail server suite running on a dedicated VPS at Hetzner. Everything is secured, regularly patched, and equipped with anti-spam mechanisms.
So far, so good – or so I thought.

What Actually Happens When an Email Is Sent?

When you send an email, several technical steps happen in the background:

  1. Connection Between Servers
    Your mail server accepts the message and connects to the target mail server – for example, Microsoft, Yahoo, GMX, Web.de, or Telekom.
  2. Identity and Security Checks
    Before the email is accepted, the receiving server checks:
    • Reverse DNS – Does the IP address match the hostname?
    • SPF, DKIM, DMARC – Do the authentication records match?
    • Reputation – Is the sending server known as trustworthy or as a spam source?
  3. Acceptance or Rejection
    If the server fails these checks, the result is ❌ “554 – Bad reputation” or a similar error message.
My Problem with Telekom

While Google, GMX, Web.de, and Yahoo accepted my emails without complaint, Telekom blocked everything coming from my server.
The reason: my IP address had been “inactive for a long time” and therefore had no reputation. For security reasons, Telekom does not accept such senders until they are reviewed – a protection mechanism for their customers.

In practice, this meant that even perfectly configured emails with all standards in place were rejected until I contacted Telekom directly.

✅ The Path to Getting Whitelisted

After a friendly but very technical exchange with Telekom’s Email Engineering team, the following requirements became clear:

  • The hostname of my server had to clearly identify me as the operator.
  • A publicly accessible contact option (phone number, legal notice) had to be linked directly to the sending domain.
  • The server could not be a shared host – only I am allowed to send emails from this IP.
  • Abuse protection (rate limits, account blocking for spam) had to be active.

I adjusted the configuration, redirected my domain cmdsrv.de directly to my legal notice page, and confirmed all required points.
Shortly afterward, I received confirmation from Telekom that my IP reputation would be reset:

“We will arrange for the reputation of this IP number to be reset in our systems. (Please note that depending on system load, it may take up to 24 hours for the change to take effect, but experience shows that this is usually done within one to two hours.)”

DMARC Reports – A Must for Admins

In addition to SPF, DKIM, and a clean reputation, as a mail server operator you should regularly evaluate DMARC reports.
These reports are automatically sent by many providers if you create a Postmaster address and set the appropriate DMARC entry in your DNS records.

Example of a valid DMARC DNS record:

Important:

  • postmaster@DOMAINNAME.de must be a functional email address that you check regularly.
  • These reports show you from which IP addresses emails were sent in the name of your domain and whether they passed SPF/DKIM checks.
  • This way, you can detect abuse and configuration errors early.
Useful Links for Testing Mail Server Reputation & Configuration

Tip: Run these tests before going live – this will help you avoid surprises with strict providers like Telekom.

☎️ Telekom Postmaster Contact

If your emails are blocked by Telekom, you can reach the Email Engineering team here:

Deutsche Telekom AG
E-Mail Engineering
Deutsche-Telekom-Allee 9
64295 Darmstadt
E-Mail: tobr@rx.t-online.de
Postmaster FAQ: https://postmaster.t-online.de

✅ Mail Server Operator Checklist

Security & Authentication

  • SPF record correctly set
  • DKIM signature active and valid
  • DMARC policy set (and reports reviewed)
  • Functional postmaster@ address created

DNS & Accessibility

  • Reverse DNS (PTR) points to the correct hostname
  • A and MX records are correct and point to the server
  • Website legal notice/contact page linked with sending domain

Reputation & Testing

  • IP address not on blacklists
  • Passed tests with Google, Microsoft, Telekom, GMX/Web.de
  • Mail test score at least 9/10

Operation & Monitoring

  • Spam and virus protection active
  • Rate limits for outgoing mail
  • Log monitoring & alerts for unusual activity
  • Regular backups of mail server configuration and mailboxes

Networking with Other IT Administrators
If you need support or want to exchange ideas with other admins facing similar problems, you’re welcome to join my Matrix Support Groups.
Here I’m happy to help with questions about mail servers, networking, and IT security:
https://it-service-commander.de/en/support-3/groups/

Categories
Blog Security

2025-08-03: IT Security in the Rhein-Erft District – How I Protect Your Business from Cyberattacks

IT security in the Rhein-Erft district has never been more important: cyberattacks, data loss or downtime can severely damage small and medium-sized businesses. As an IT service provider in this region, I make sure your IT systems are reliably protected – so you can focus on your business.

Why IT security is crucial for companies in the Rhein-Erft district ⚠️

The threat from hackers is constantly increasing. Phishing, ransomware and social engineering are no longer limited to large corporations. Small and medium-sized enterprises in the Rhein-Erft district are increasingly becoming targets for cybercriminals.

Many companies believe they are too small to be interesting for attackers. The reality is: attackers specifically look for systems that are poorly protected.

A recent example shows how devastating the consequences can be:
The Einhaus Group from Hamm, once Germany’s leading electronics insurance provider, was attacked in March 2023 by the ransomware group “Royal.” All systems were encrypted, and a ransom of around €200,000 was paid – but the data was never released. The results: months of downtime, damages in the mid-seven-digit range, and ultimately, insolvency. This case shows that even established medium-sized companies can be existentially threatened by a single cyberattack.

How I, as an IT service provider, ensure secure systems

As an IT service provider in the Rhein-Erft district, I specialize in securing small and medium-sized companies. My approach includes:

  1. Analysis of your current systems
    I review your IT landscape, identify vulnerabilities, and assess risks.
  2. Security concept and measures
    Together we develop a tailored security concept with firewalls, antivirus solutions, encrypted connections, and backup strategies.
  3. Training for your employees
    Technology alone is not enough. I train you and your team to recognize phishing emails, manage passwords securely, and handle data responsibly.
  4. Ongoing support and monitoring
    IT security is a process. I continuously monitor your systems, apply updates, and react immediately to suspicious incidents.
Cyber Security Day Rhein-Erft

The importance of these topics is also highlighted by the annual Cyber Security Day organized by the Rhein-Erft Business Development Agency (more information here). At this event, current threats are presented and strategies for companies in the region are discussed. This year, I will also be attending in person and will have the opportunity to talk to companies about cybersecurity.

My goal: Making your company safe

I want you to be able to focus entirely on your core business – with the peace of mind that your IT systems are reliable and secure.

If you are based in the Rhein-Erft district and want to improve your IT security, feel free to contact me. Together, we will make your company more resilient to the dangers of the digital world.

Categories
Blog Android Anonymity Blackout Messenger Security

2025-08-02: BitChat – Emergency Communication in a Blackout

In a crisis, every message counts. When mobile networks, the internet, or centralized services go down, you still need a way to stay in touch with people nearby. BitChat, created by Jack Dorsey, was designed exactly for that: an app that works without the internet and sends messages directly from one device to another.

What is BitChat?

BitChat is a messenger that does not require any account, phone number, or Wi-Fi. The app connects via Bluetooth to other devices in the area and passes messages along – like a relay baton being handed from one person to the next. This way, you can communicate even when traditional networks fail.

Why this app is so useful in emergencies
  • Works without infrastructure: Even if the mobile network goes down, you can send encrypted messages to people within range. This can be a lifesaver during natural disasters, power outages, or in restricted areas.
  • Quick to start: No registration, no passwords. Open the app, choose a display name, and start messaging – ideal when every second matters. ⏱️✅
  • Private & secure: Messages are encrypted, there’s no central data storage, and you don’t need to share personal information. You stay anonymous and protected.
  • Emergency wipe: With a quick action, you can instantly remove all local chat data – useful if you need to erase traces quickly.
  • Extended reach through relaying: Even if two people are not directly connected, messages “hop” through other users. This increases the effective range without the internet.
Things to keep in mind ⚠️
  • Dependent on other users: For messages to be forwarded, there need to be other people nearby with the BitChat app running. In very remote areas, this can be less reliable.
  • Limited single-hop range: Bluetooth has a physical range limit; multiple hops make up for that, but movement and low user density can affect connectivity.
  • Beta / Availability: The app is still new – especially on Apple devices – and some versions may still be in an early stage.
Where to get BitChat
  • For iOS / Apple devices: Download BitChat Mesh directly from the App Store. It works with iPhone (iOS 16+), iPad, Mac (M1+), and even Apple Vision Pro.
  • For Android: The Android version is available on GitHub. You can find the latest installation file (APK) here:
    https://github.com/permissionlesstech/bitchat-android/releases
Manual installation file available for free download (for advanced users)
Conclusion

BitChat is not a replacement for your regular communication channels, but it is a valuable and robust backup tool for emergency situations. Its offline capabilities, ease of use, privacy features, and quick data-wipe option make it a tool you can rely on when normal networks fail.

Recommended steps for your emergency setup:

  • Install and test BitChat ✔️
  • Keep Bluetooth enabled ✔️
  • Set a display name ✔️
  • Try out the emergency data wipe ✔️
  • Brief your colleagues or team ✔️

More information here:
https://bitchat.free/

Categories
Blog Android Anonymity OpenSource Security Smartphone

2025-07-23: GrapheneOS: More Security, Less Google – How to Take Back Control of Your Smartphone

In a world where smartphones have become constant companions — and often know more about us than we’d like — a fair question arises:
How can I use my phone without constantly sharing data with Google and others?

One convincing answer: GrapheneOS.
An alternative Android operating system focused entirely on security, privacy, and user control. In this post, I’ll walk you through what GrapheneOS offers, its pros and cons, and how it can help you reclaim your digital freedom — without giving up too much functionality.

Learn more on the official website: https://grapheneos.org

What Is GrapheneOS?

GrapheneOS is an independent, open-source operating system based on the Android Open Source Project (AOSP), designed with one clear goal: to make smartphones more secure and privacy-respecting.

Unlike standard Android builds, it comes without any pre-installed Google services, and instead adds a wide range of security improvements at the system level — all while remaining fully compatible with Android apps.

GrapheneOS is ideal for users who are tech-savvy or deeply privacy-conscious — journalists, business owners, developers, or just private individuals who want more control.

How Does GrapheneOS Help You De-Google Your Life?

✔️ No Built-in Google Services

GrapheneOS includes no Google Play Services, no Google account requirement, and no background communication with Google servers. You’re in full control of what your device does.

✔️ Optional, Sandboxed Google Play

If you need specific apps that depend on Google services, you can install them manually in an isolated sandbox. They behave like regular third-party apps and don’t have privileged access to the system.

✔️ Fine-Grained Permission Management

GrapheneOS gives you detailed control over permissions. You can restrict access to network, sensors, camera, or microphone — even based on whether the screen is locked.

✅ Advantages of GrapheneOS

  • Top-Tier Security Architecture
    Hardened kernel, exploit mitigations, secure boot, and memory safety features like MTE.
  • Strong App Sandboxing
    Apps run in isolated environments to reduce risk and prevent cross-app interference.
  • Fast and Frequent Updates
    Security patches are rolled out promptly — often faster than official Android builds.
  • Fully Open Source and Transparent
    Every line of code is auditable. No hidden processes, no surprises.
  • ⚙️ User-Centric Design
    You decide what runs on your phone. No bloatware or forced services.
  • Minimalist, Privacy-Friendly Apps
    Includes a secure browser (Vanadium), open-source PDF reader, camera app, and verification tools.

⚠️ Possible Drawbacks

  • Limited Device Support
    Currently, GrapheneOS is officially supported only on Google Pixel devices (6 and newer). Devices from other manufacturers are not compatible.
  • Requires Some Technical Knowledge
    Installing GrapheneOS means unlocking the bootloader and flashing the system using a computer. It’s well documented, but not beginner-level.
  • App Compatibility Can Vary
    Some apps — especially in banking or streaming — depend on Google Play Services and might not work as expected (or at all) without sandboxed support.
  • Learning Curve for New Users
    If you’re used to heavily customized Android skins (like Samsung One UI) or iOS, it may take time to adjust to GrapheneOS’s minimalist and security-focused environment.
  • No Pre-Installed Extras
    GrapheneOS keeps things lean. Common apps like calendar, gallery, or email clients need to be installed manually from trusted sources.

✔️ Supported Devices (as of July 2025)

GrapheneOS officially supports the following devices:

  • Google Pixel 9 / 9 Pro / 9 Pro XL / 9 Pro Fold / 9a
  • Google Pixel 8 / 8 Pro / 8a
  • Google Pixel 7 / 7 Pro / 7a
  • Google Pixel 6 / 6a
  • Google Pixel Fold
  • Google Pixel Tablet

If you already own one of these or plan to get one — you’re ready to go.

Conclusion

GrapheneOS is a powerful operating system for anyone who takes privacy and security seriously. It combines advanced protections with compatibility for most Android apps — and it does so without tying you to Google or other third parties.

Yes, it takes a bit more effort to install and get used to. But if digital independence is important to you, the benefits clearly outweigh the challenges.

Need Help Getting Started? I’ve Got You Covered.

As an IT service provider, I offer the following:

  • Support with installing and configuring GrapheneOS on your Pixel device
  • Consultation on app compatibility and secure usage
  • Pre-configured devices with GrapheneOS – fully set up and ready to use

If you’re considering switching to a more secure and private smartphone experience, feel free to get in touch. I’d be happy to assist — whether you already own a Pixel or want to purchase one that’s ready to use.

Real digital privacy starts with taking control of your own device.
Let’s make that happen — together.

Categories
Webhosting Blog Server Uptime

2025-07-10: New: Web Hosting for Your Online Presence – Directly Managed by Your IT Service Provider

As your trusted IT service provider, I am now pleased to offer not only traditional IT services but also professional web hosting for your online presence.

What can you expect?

With my web hosting service, you will receive:

WordPress websites – customized to your individual needs.
Your own domain & email address – e.g. max.mustermann@your-domain.com.
Worry-free package – I handle the setup, maintenance, and security for you.

For more details, please visit my website under:
➡️ Private Clients => Homepage/Website or
➡️ Businesses => Website.

Technically up to date

Your WordPress site runs in a modern Docker container and is hosted on a virtual private server (VPS). This ensures high flexibility and performance.

Security and backups:

  • Nightly automatic backups of your entire website (including Docker container) are performed.
  • Your emails are managed on a separate VPS using the reliable Mailcow software, enabling you to send and receive emails with your own domain and personalized addresses.

Professional management included

As your IT service provider, I take care of the complete administration and monitoring of your web hosting:

Regular security updates, including for WordPress and installed plugins.
Monitoring to ensure your website is always online.
Prompt assistance, should any issues arise.

Interested?

If you would like to host a new website affordably through me or move an existing WordPress installation, feel free to get in touch. ✉️
I will be happy to advise you individually and find the perfect solution for your project.

Categories
Blog Anonymity Future OpenSource Security

2025-07-06: Freedom first – and security follows naturally: Why IT must embrace openness

If there’s one thing I’ve learned in my many years working in IT, it’s this: freedom is the foundation of everything we consider secure and trustworthy. Especially in technology, I constantly see how freedom is often sacrificed for the illusion of greater security. But in reality, it’s quite the opposite: freedom is what truly enables real security in the first place.

You might be wondering what exactly I mean by that. Allow me to explain.

Freedom means control — and that means security

When I speak of freedom in the context of IT, I primarily mean the freedom to decide for yourself what happens with your data. The freedom to use software as you see fit, fully aware of what it does behind the scenes.
The opposite of this is closed systems where you simply have to trust that a vendor is doing things right — without ever being able to verify it.

Open Source software gives you this freedom back. Anyone can look at the source code and audit it. There are no hidden functions, no secret backdoors.
Encryption ensures that your data remains yours alone, accessible only to those you explicitly authorize — and to no one else.

So it becomes clear: freedom isn’t a risk here; it’s your strongest safeguard. As a user or business, you retain control. And from that, true security follows automatically.

Edward Snowden, Julian Assange — and what that means for your IT

Edward Snowden revealed to the world just how deeply governments can invade our privacy when no one is watching. He warned us that surveillance and secrecy come at the expense of our freedom — and ultimately undermine our security as well.

Julian Assange, through WikiLeaks, exposed abuses of power that would have remained hidden otherwise. He made sure misconduct came to light. Both, in their own way, demonstrated that without transparency, there can be no freedom. And without freedom, there is no genuine security.

This is not merely a political debate. It directly affects your IT systems every single day. Because the more you rely on closed platforms, the less you know about what’s happening behind the scenes. And the more you depend on mere promises, instead of verifiable facts.

How I, as an IT service provider, turn freedom into a security strategy

This is why I’ve made it a point in my work as an IT service provider to rely consistently on freedom software. That means:

  • I recommend open-source solutions, developed and reviewed by diverse communities.
  • I implement strong encryption so your data truly belongs to you.
  • ✅ I rely on open standards that won’t lock you into a single vendor’s ecosystem.

This not only protects your privacy but also makes your systems more robust overall. Because flaws are detected and fixed more quickly. Because if needed, you can always switch providers or adapt the software without having to overhaul your entire business infrastructure.

In this way, freedom becomes the very foundation of your security — not its opponent.

✉️ My invitation to you

I invite you to take this thought with you:
Freedom first — and security will follow naturally.

Let’s work together to ensure your IT is set up so that you can act confidently and securely, not just today, but well into the future. For you as an individual, for your company, and for a digital world where we all get to keep our freedom.

If you’d like, I’d be glad to show you exactly what this could look like for your specific situation. Please feel free to reach out to me.

Categories
Finance Anonymity Bitcoin Blog Future Security

2025-06-24: Digital Euro: Progress at the Expense of Freedom & Privacy?

The European Central Bank is actively working on the introduction of the digital euro – a state-issued digital currency designed to complement the existing payment system. While this move is presented as modern and innovative, it’s important to pause and ask a fundamental question: What impact will the digital euro have on our freedom, our privacy – and our ability to choose how we pay?

Cash – Tangible Freedom in Your Pocket

Cash is more than just a payment method. It represents personal freedom, built-in privacy, and one of the last ways to make purchases without leaving a digital trail. With cash, you decide when, where, and how you spend your money – without oversight or restrictions.

And yet, cash is increasingly being marginalized. Discussions about limits on cash payments, withdrawal restrictions, or even calls for its gradual phase-out are becoming more common. This is concerning, because cash serves as a safeguard against surveillance and financial overreach.

What Is the Digital Euro – and What’s the Issue?

The digital euro would be a legal tender in digital form – issued directly by the central bank. Unlike cash, it would not be anonymous, but instead technically traceable by design. Transactions could be tracked, monitored in real time, and even influenced or restricted.

Centralized digital currencies make it technically possible to:

  • ❌ limit spending (by amount, category, or time),
  • ✔️ block or pre-approve transactions,
  • ⏳ apply expiration dates or negative interest rates.

While such features might seem practical in certain scenarios, they also open the door to significant interference in individual financial autonomy. This isn’t about criticizing institutions, but rather about preserving a healthy balance between innovation and civil liberties.

₿ Bitcoin – Digital Sovereignty Without Central Control

In contrast, Bitcoin operates on a fundamentally different principle. It is a decentralized digital monetary system, not controlled by any government or corporation. Transactions are verified by a global network, not a central authority.

Privacy by structure: With Bitcoin, you don’t need a bank account, approval, or to share personal data to send or receive payments. When used correctly, Bitcoin offers a high degree of financial privacy, much like cash – but in a digital, global form.

✅ Why Bitcoin Makes Sense
  • Decentralized by design: No central authority, no censorship.
  • Globally accessible: Anyone with an internet connection can use it.
  • Private in practice: No personal information required.
  • Inflation-proof: Bitcoin’s supply is capped at 21 million.
  • Independent: No third party can freeze or limit your assets.

Bitcoin isn’t just a digital currency – it’s a tool for freedom and financial independence in the digital age.

Conclusion: Payment Freedom – Offline and Online

Whether paying with coins at a store or sending a transaction from your phone – you should always be free to choose the payment method that suits you. The digital euro may offer certain conveniences, but it must never replace or restrict access to cash or alternatives like Bitcoin.

Cash must remain a free, anonymous means of payment. And Bitcoin offers its digital counterpart – independent, global, and privacy-respecting.

Want to learn more about Bitcoin – as an individual or for your business?

As an IT service provider and expert, I support private clients and businesses in understanding, using, and integrating Bitcoin safely and effectively.

✔️ Feel free to contact me – for a future of digital freedom and self-determination.

Categories
Blog Anonymity Messenger Security Server

2025-06-15: Use WhatsApp securely with a Proxy

In an age where data privacy is increasingly important, it’s essential to be aware of your digital footprint. Messaging apps like WhatsApp, operated by Meta (formerly Facebook), collect a wide range of metadata — even though message content is end-to-end encrypted.

Fortunately, there’s a solution for anyone who wants to continue using WhatsApp without exposing their connection details: my free WhatsApp Proxy Service!

What Does My WhatsApp Proxy Do?

My WhatsApp proxy service acts as an intermediary between your device and WhatsApp’s servers. Instead of connecting directly to Meta’s servers, your data traffic is routed through my proxy. This means:

  • ✉️ Hidden IP Address: WhatsApp (i.e., Meta) no longer sees your real IP address, preventing them from determining your location or internet provider.
  • ✔️ No Geo-Tracking: The detour via proxy makes it nearly impossible to track your location.
  • ✔️ Encrypted Communication: All data is transmitted using SSL encryption.
  • ⛔️ Minimal Metadata: Information about your device, region, or connection time is significantly reduced.
  • ✔️ Free and Anonymous: The service is completely free and requires no registration.
How to Set Up the WhatsApp Proxy
  1. Open WhatsApp and tap the three dots in the top right corner (⋮).
  2. Navigate to Settings > Storage and Data > Proxy.
  3. Enable Use Proxy.
  4. Tap on Set up Proxy and enter the following details:
    • Proxy Host: whatsapp.it-service-commander.de
    • Chat Port: 7001
    • Media Port: 7007
  5. Confirm by tapping the check mark ✅.
  6. It should now display “Connected”.

And that’s it — you’re securely connected via my proxy! ?

Why Using a WhatsApp Proxy Makes Sense ❓

Meta makes its money through ads and analytics — not just by what you write, but by tracking when, where, how, and with whom you communicate. Even without accessing your message content, Meta knows when you’re online, who you’re chatting with, and from where.

Conclusion ✅

My WhatsApp Proxy Service offers a simple, effective tool to enhance your digital privacy. No registration, no fees — just real benefits:

More privacy, less surveillance.

Try it out yourself and feel free to share this information with others who value digital self-determination.

I am an IT specialist focused on networks and server services. I am happy to assist with technical questions or custom requirements. Feel free to get in touch — inquiries are always welcome.