BentoPDF is a modern, privacy-friendly tool for editing PDF files directly in your browser. Whether you need to merge, split, compress, or convert documents — everything works online without any installation or registration 🖥️✨.
🔧 How BentoPDF Works
All BentoPDF tools run entirely client-side. This means your files are never uploaded to any server — every operation is performed locally in the browser. Simply select a PDF, choose the desired function, and download the result immediately. PDF in, result out 📤➡️📥.
🔒 Security Through True Local Processing
BentoPDF puts a strong focus on privacy and data protection: 👉 No file uploads 👉 All processing happens locally in your own browser 👉 No tracking, no login, no external servers
Even highly sensitive documents remain fully protected at all times 🔐🛡️.
In modern IT security, strong passwords and firewalls are just part of the story. Equally important is how sensitive information is shared. To meet this need, I am introducing a new service: PrivateBin – a fully encrypted, secure platform for sharing files and messages.
🔒 What is PrivateBin?
PrivateBin is a client-side encrypted paste and file-sharing service designed to securely exchange confidential information. Unlike traditional upload or paste platforms, PrivateBin performs encryption directly in your browserbefore any data reaches the server.
This means:
The server cannot read the contents
Encryption keys never leave the client
Only encrypted data blobs are stored
Decryption is only possible with the key embedded in the generated link
In other words, PrivateBin operates as a zero-knowledge service. As the service provider, I technically cannot access or view any uploaded content.
📦 What Benefits Does My PrivateBin Service Offer?
To ensure the highest level of security and usability, the deployed system has been enhanced with several important features:
✔ Secure Transmission
All data is encrypted client-side and transmitted via HTTPS.
✔ Protected Storage
Only encrypted data is stored on the infrastructure — completely unreadable to anyone.
✔ File Uploads up to 50 MB
Ideal for sharing documents, diagnostic logs, confidential information, or larger technical files.
✔ Limited Retention
Files and messages are automatically deleted after 4 weeks — permanently and irreversibly.
✔ Optional Password Protection
Each paste or file can be secured with an additional password for extra peace of mind.
✔ No Registration Required
The service is available instantly — no accounts, no personal data collection, no tracking.
📁 Use Cases for Businesses & Teams
Securely sharing credentials
Exchanging confidential client documents
Sending system logs or diagnostic outputs
GDPR-compliant information transfer
Project communication without email risks
Safe data exchange with external service providers
Temporary sharing of sensitive files
PrivateBin is especially useful whenever traditional email or messaging tools are too risky or not appropriate.
🔧 Why I Provide This Service
As an IT service provider, I frequently encounter situations where clients need to share confidential information with me or within their teams. Sending such content through insecure platforms — or via plain-text email — introduces unnecessary security risks.
By offering PrivateBin, I provide a secure, controlled, and modern method for exchanging sensitive data without requiring any additional software installations.
🚀 Available Now
The service is available immediately and can be used at any time. If needed, I can also deploy PrivateBin as a dedicated in-house solution, customized with your company’s branding, policies, and security requirements.
🌿 LibreOffice is one of the world’s most popular open-source office suites – developed by a dedicated community, continuously improved, and completely free to use. It offers everything you need for office work, school, or study: word processing, spreadsheets, presentations, databases, and more. But LibreOffice is much more than just a free alternative to Microsoft Office – it represents digital freedom and open standards.
🚀 Why LibreOffice?
LibreOffice consists of several powerful applications:
Writer (word processing, similar to Microsoft Word)
Calc (spreadsheets, similar to Excel)
Impress (presentations, similar to PowerPoint)
Base (database management)
Draw (vector graphics & diagrams)
Math (formula editor)
These applications cover all areas of everyday office work – without license fees or subscription requirements. By using open standards and formats such as ODF (Open Document Format), your files remain future-proof and independent of closed systems.
🔓 Open Formats Instead of Vendor Lock-In
While Microsoft Office relies primarily on its own closed file formats (e.g. .docx, .xlsx), LibreOffice is built on free and open standards. This means:
You are not tied to a specific program or company.
Your documents remain compatible and readable in the long term.
You support transparency and interoperability – key principles of digital sustainability.
Especially for schools, public institutions, and businesses, this is a decisive advantage: switching to open formats ensures greater flexibility, independence, and long-term data security.
💡 Advantages Over Microsoft Office
✨ No license costs – LibreOffice is completely free, even for businesses. 🔧 Customizable & expandable – A wide range of extensions, templates, and design options. 🛡️ Privacy-friendly – No forced cloud connections or data collection. 🌍 Cross-platform – Works on Windows, macOS, and Linux. 🤝 Community-driven – Regular updates and open-source development ensure stability and security.
While Microsoft Office increasingly pushes users toward online subscriptions and cloud storage, LibreOffice remains local, transparent, and independent.
📦 Download LibreOffice Directly
You can download LibreOffice easily and securely directly from my server:
Installationfile free for download:
There, you will always find a latest version – safe, fast, and ad-free.
🖋️ Conclusion:
LibreOffice stands for freedom, sustainability, and control over your own data. By choosing open formats, you strengthen digital sovereignty and reduce dependence on large software corporations. Switching to LibreOffice is worth it – not only financially, but also as a conscious step toward a more open digital future.
💡 Fast, secure, and simple: That’s the best way to describe the Phoenix Wallet. This app makes paying with Bitcoin as easy as paying with a regular mobile app — whether it’s for a coffee, lunch, or an online purchase.
In this article, you’ll learn what makes Phoenix special, why it’s perfect for instant Bitcoin payments, and why it’s better suited for everyday use than the well-known Electrum app.
🔥 What Is the Phoenix Wallet?
The Phoenix Wallet is a Bitcoin app for Android, developed by the French company ACINQ, one of the leading contributors to the Lightning Network.
The Lightning Network is an additional layer built on top of Bitcoin that allows instant, low-fee transactions. Instead of waiting minutes for a confirmation, payments are completed in just a few seconds.
What makes Phoenix stand out: You don’t need to deal with technical setup, complicated terms, or your own Bitcoin node. The app handles everything for you — and you still stay in full control of your money.
⚡ Why Phoenix Is Perfect for Fast Payments
Many Bitcoin wallets are complicated or made for experienced users. Phoenix, however, is designed so that anyone can use it right away.
Here’s why Phoenix is so convenient:
✅ Automatic Channel Management Phoenix automatically handles all the technical details in the background, like opening or managing payment channels. You don’t have to worry about any of that.
✅ Instant Lightning Payments Payments are usually confirmed instantly, making it perfect for small, everyday purchases — in stores, restaurants, or online.
✅ Simple and Clean Interface The design is intuitive. You can easily see your Bitcoin balance and recent transactions at a glance.
✅ Transparent Fees Phoenix clearly shows when a small fee applies (for example, when opening a new payment channel). There are no hidden costs.
🔒 Security: How Phoenix Protects Your Bitcoin
Security is a big concern for new Bitcoin users — and rightly so! The good news is that Phoenix is built to keep your funds safe and under your full control.
Here’s how:
🔐 You Control Your Money Phoenix is a non-custodial wallet, which means your Bitcoin is stored only on your device, not on a company server. Only you have access to it.
📱 Strong Encryption All sensitive data is encrypted directly on your phone. Even if someone finds your device, they can’t access your Bitcoin without your secret recovery phrase.
☁️ Easy Recovery When you set up the wallet, you get a 12-word recovery phrase. With it, you can restore your wallet anytime — for example, if you lose or replace your phone.
🧩 Trusted Developer Phoenix is developed by ACINQ, one of the key companies behind the Lightning Network. The app is open to community review and regularly updated for security and reliability (OpenSource).
⚙️ Phoenix Wallet vs. Electrum – Which Is Better for Everyday Use?
The Electrum Wallet is one of the oldest and most respected Bitcoin wallets. It’s very powerful — but also quite technical. For beginners, it can feel overwhelming.
Phoenix, on the other hand, is made for simplicity and daily Bitcoin payments.
Feature
Phoenix Wallet
Electrum
Lightning Payments
Fully integrated and automatic
Optional, requires setup
Ease of Use
✅ Very beginner-friendly
❌ Designed for advanced users
Speed
Instant (Lightning)
Slower (On-chain)
Security
Non-custodial and encrypted
Non-custodial but complex
Best Use Case
Everyday mobile payments
Long-term storage, desktop use
👉 In short:
Electrum is great for long-term Bitcoin storage or advanced users.
Phoenix is ideal if you want to use Bitcoin for everyday payments — quick, easy, and safe.
💬 Conclusion: Phoenix Makes Bitcoin Easy
The Phoenix Wallet is the perfect choice for anyone who wants to actually use Bitcoin — not just hold it.
You don’t need to be a tech expert or understand the details of the Lightning Network. Phoenix makes Bitcoin as easy as paying with your phone, while keeping your funds secure and decentralized.
⚡ If you’re looking for a fast, trustworthy, and beginner-friendly Bitcoin app, Phoenix is the one to try.
Download:
Manual installation file available for free download (for advanced users)
As an IT consultant, I see every day how important secure and private messaging is. Signal does a great job and is rightly considered one of the most secure messengers ✅ – but Molly puts even more emphasis on privacy and control.
What’s especially interesting: On GrapheneOS, Molly is available by default, as it is recommended there as a trusted messenger. But you can also use Molly on any other Android system by simply installing the APK manually.
Why Molly?
Molly is based on the Signal protocol but adds additional security features such as encryption at rest (encrypting locally stored data).
Other advantages include:
Open-Source – transparent and verifiable.
More control – option to use your own push infrastructure.
Optimized for privacy – especially in combination with GrapheneOS.
This way, your push notifications don’t run through third-party servers but through your own infrastructure ?️ – a clear advantage for privacy.
Conclusion
Signal is already excellent ✅ – but Molly is the even more privacy-focused choice. On GrapheneOS, Molly comes preinstalled, and on any other Android system it can easily be installed manually.
I personally use Molly every day – not just as a messenger, but as part of a holistic privacy strategy.
In a world where smartphones have become constant companions — and often know more about us than we’d like — a fair question arises: How can I use my phone without constantly sharing data with Google and others?
One convincing answer: GrapheneOS. An alternative Android operating system focused entirely on security, privacy, and user control. In this post, I’ll walk you through what GrapheneOS offers, its pros and cons, and how it can help you reclaim your digital freedom — without giving up too much functionality.
GrapheneOS is an independent, open-source operating system based on the Android Open Source Project (AOSP), designed with one clear goal: to make smartphones more secure and privacy-respecting.
Unlike standard Android builds, it comes without any pre-installed Google services, and instead adds a wide range of security improvements at the system level — all while remaining fully compatible with Android apps.
GrapheneOS is ideal for users who are tech-savvy or deeply privacy-conscious — journalists, business owners, developers, or just private individuals who want more control.
How Does GrapheneOS Help You De-Google Your Life?
✔️ No Built-in Google Services
GrapheneOS includes no Google Play Services, no Google account requirement, and no background communication with Google servers. You’re in full control of what your device does.
✔️ Optional, Sandboxed Google Play
If you need specific apps that depend on Google services, you can install them manually in an isolated sandbox. They behave like regular third-party apps and don’t have privileged access to the system.
✔️ Fine-Grained Permission Management
GrapheneOS gives you detailed control over permissions. You can restrict access to network, sensors, camera, or microphone — even based on whether the screen is locked.
✅ Advantages of GrapheneOS
Top-Tier Security Architecture Hardened kernel, exploit mitigations, secure boot, and memory safety features like MTE.
Strong App Sandboxing Apps run in isolated environments to reduce risk and prevent cross-app interference.
Fast and Frequent Updates Security patches are rolled out promptly — often faster than official Android builds.
Fully Open Source and Transparent Every line of code is auditable. No hidden processes, no surprises.
⚙️ User-Centric Design You decide what runs on your phone. No bloatware or forced services.
Minimalist, Privacy-Friendly Apps Includes a secure browser (Vanadium), open-source PDF reader, camera app, and verification tools.
⚠️ Possible Drawbacks
Limited Device Support Currently, GrapheneOS is officially supported only on Google Pixel devices (6 and newer). Devices from other manufacturers are not compatible.
Requires Some Technical Knowledge Installing GrapheneOS means unlocking the bootloader and flashing the system using a computer. It’s well documented, but not beginner-level.
App Compatibility Can Vary Some apps — especially in banking or streaming — depend on Google Play Services and might not work as expected (or at all) without sandboxed support.
Learning Curve for New Users If you’re used to heavily customized Android skins (like Samsung One UI) or iOS, it may take time to adjust to GrapheneOS’s minimalist and security-focused environment.
No Pre-Installed Extras GrapheneOS keeps things lean. Common apps like calendar, gallery, or email clients need to be installed manually from trusted sources.
✔️ Supported Devices (as of July 2025)
GrapheneOS officially supports the following devices:
Google Pixel 9 / 9 Pro / 9 Pro XL / 9 Pro Fold / 9a
Google Pixel 8 / 8 Pro / 8a
Google Pixel 7 / 7 Pro / 7a
Google Pixel 6 / 6a
Google Pixel Fold
Google Pixel Tablet
If you already own one of these or plan to get one — you’re ready to go.
Conclusion
GrapheneOS is a powerful operating system for anyone who takes privacy and security seriously. It combines advanced protections with compatibility for most Android apps — and it does so without tying you to Google or other third parties.
Yes, it takes a bit more effort to install and get used to. But if digital independence is important to you, the benefits clearly outweigh the challenges.
Need Help Getting Started? I’ve Got You Covered.
As an IT service provider, I offer the following:
✅ Support with installing and configuring GrapheneOS on your Pixel device
✅ Consultation on app compatibility and secure usage
✅ Pre-configured devices with GrapheneOS – fully set up and ready to use
If you’re considering switching to a more secure and private smartphone experience, feel free to get in touch. I’d be happy to assist — whether you already own a Pixel or want to purchase one that’s ready to use.
Real digital privacy starts with taking control of your own device. Let’s make that happen — together.
If there’s one thing I’ve learned in my many years working in IT, it’s this: freedom is the foundation of everything we consider secure and trustworthy. Especially in technology, I constantly see how freedom is often sacrificed for the illusion of greater security. But in reality, it’s quite the opposite: freedom is what truly enables real security in the first place.
You might be wondering what exactly I mean by that. Allow me to explain.
Freedom means control — and that means security
When I speak of freedom in the context of IT, I primarily mean the freedom to decide for yourself what happens with your data. The freedom to use software as you see fit, fully aware of what it does behind the scenes. The opposite of this is closed systems where you simply have to trust that a vendor is doing things right — without ever being able to verify it.
✅ Open Source software gives you this freedom back. Anyone can look at the source code and audit it. There are no hidden functions, no secret backdoors. Encryption ensures that your data remains yours alone, accessible only to those you explicitly authorize — and to no one else.
So it becomes clear: freedom isn’t a risk here; it’s your strongest safeguard. As a user or business, you retain control. And from that, true security follows automatically.
Edward Snowden, Julian Assange — and what that means for your IT
Edward Snowden revealed to the world just how deeply governments can invade our privacy when no one is watching. He warned us that surveillance and secrecy come at the expense of our freedom — and ultimately undermine our security as well.
Julian Assange, through WikiLeaks, exposed abuses of power that would have remained hidden otherwise. He made sure misconduct came to light. Both, in their own way, demonstrated that without transparency, there can be no freedom. And without freedom, there is no genuine security.
This is not merely a political debate. It directly affects your IT systems every single day. Because the more you rely on closed platforms, the less you know about what’s happening behind the scenes. And the more you depend on mere promises, instead of verifiable facts.
How I, as an IT service provider, turn freedom into a security strategy
This is why I’ve made it a point in my work as an IT service provider to rely consistently on freedom software. That means:
I recommend open-source solutions, developed and reviewed by diverse communities.
I implement strong encryption so your data truly belongs to you.
✅ I rely on open standards that won’t lock you into a single vendor’s ecosystem.
This not only protects your privacy but also makes your systems more robust overall. Because flaws are detected and fixed more quickly. Because if needed, you can always switch providers or adapt the software without having to overhaul your entire business infrastructure.
In this way, freedom becomes the very foundation of your security — not its opponent.
✉️ My invitation to you
I invite you to take this thought with you: Freedom first — and security will follow naturally.
Let’s work together to ensure your IT is set up so that you can act confidently and securely, not just today, but well into the future. For you as an individual, for your company, and for a digital world where we all get to keep our freedom.
If you’d like, I’d be glad to show you exactly what this could look like for your specific situation. Please feel free to reach out to me.
In a time when data protection, digital sovereignty, and cost control are more important than ever, many companies are looking for a real alternative to Microsoft Teams. As an IT service provider, I offer exactly that: a powerful, modern communication solution – based on the Matrix protocol and the open-source Element interface.
? What is Element – and what is Matrix?
Element X / Element Web is the front-end interface for messaging, file sharing, and video conferencing – available on laptops, smartphones, and tablets.
Matrix Synapse is the backend – it runs on your own server and handles secure, decentralized communication.
?️ Full control over your data – no dependency on Microsoft
With my solution, every company runs its own communication server in a German data center. This ensures that every message, file, and call stays in-house – without being routed through U.S.-based platforms or global cloud infrastructures.
? No data transfer to the USA ? No Microsoft accounts or licenses required ?? Server location: Germany – fully GDPR compliant ✅ 100% independence from U.S. corporations
Everything modern teams need
? One-on-one and group messaging
? Secure file sharing
? Voice and video calls
? Cross-platform usage (laptop, phone, tablet)
?️ Structured rooms for teams and projects
? Trusted by military and governments
Matrix and Element are already in use by various military and public-sector organizations: The U.S. Navy uses Matrix on multiple ships for secure internal communication. The German Bundeswehr operates its own Matrix-based messenger (BwMessenger). Governments in France, Luxembourg, Sweden, and the German healthcare sector also rely on Matrix for secure, sovereign communication.
This is all provided on a secure, open-source foundation – flexible, transparent, and future-ready.
? Clear savings – year after year
Compared to Microsoft Teams, a company with 20 employees can save up to $1000 per year – while keeping full control over all internal communication and data.
?️ My offer to you
Setup and operation of your own Matrix instance
Deployment of Element Web / Element X as the user interface
Ongoing maintenance, security updates, and technical support
GDPR-compliant configuration
Optional: onboarding and training for your team
✅ Conclusion
With Matrix and Element, you gain a professional, secure, and cost-effective communication platform – without Microsoft, without data leakage, and without vendor lock-in.
? I’m happy to provide a custom quote tailored to your company size and needs. Independent. Secure. Future-proof. – Your new communication solution.
In today’s highly digital business environment, the availability of your IT systems is a critical success factor. Whether it’s an online store, customer portal, or internal tool – system outages can lead not only to lost revenue, but also to damaged customer trust.
Reliable monitoring of your servers and services is therefore essential. Two tools that have proven particularly effective are Uptime Kuma and NTFY. Combined, they provide a simple and powerful solution to detect disruptions early – and respond immediately. ⚡
❗ Why Is This So Important for Businesses?
Outages happen. Whether due to maintenance, technical failure, or network issues – reaction time is key. If you’re notified the moment a service goes offline, you can step in quickly and minimize downtime. ⏱️
Small and medium-sized businesses in particular benefit from not having to wait for customer complaints. Instead, you stay proactive and in control. This improves service quality, saves valuable time, and protects your reputation. ✅
? What Do Uptime Kuma and NTFY Actually Do?
? Uptime Kuma continuously monitors your web servers, databases, and other services. It instantly detects if something is no longer working.
? NTFY sends push notifications to your smartphone or desktop the moment an issue is detected – without the complexity of email servers or SMS gateways.
This keeps your team informed – even outside of working hours. ?
? Key Benefits at a Glance
? Early Detection of Outages No more surprises: you’ll know the moment something goes wrong.
⚙️ Quick Response Time Push notifications help you act fast – when every minute counts.
? Simple Integration Both tools can be installed on a virtual server with minimal setup.
? Cost-Effective Both are open-source – no license fees or subscriptions required.
❗There are no disadvantages
✅ Conclusion
Together, Uptime Kuma and NTFY offer a lightweight and highly effective way to monitor your IT infrastructure. They boost your ability to respond quickly to issues, enhance your customer service, and give you peace of mind – knowing your systems are being watched. ?️
Especially for businesses without large IT departments, this solution is ideal: flexible, low-maintenance, and easy to expand.
? If you’d like help setting it up or want a custom monitoring solution tailored to your needs, I’m happy to assist.
Remote access software is an essential tool in modern IT—whether for technical support, remote work, or quick computer assistance. While commercial solutions like TeamViewer and AnyDesk are well-known, today I would like to introduce you to a more privacy-conscious and cost-free alternative: RustDesk.
?️ What Is RustDesk?
RustDesk is an open-source remote desktop software that offers high performance, ease of use, and full control over data traffic. It is cross-platform—available for Windows, macOS, Linux, Android, and iOS—and especially well-suited for data-sensitive environments.
? Your Data – Your Choice: Advantages Over TeamViewer & AnyDesk
? 1. Host Your Own Server for Full Data Sovereignty
Unlike commercial providers, RustDesk allows you to host your own infrastructure. This means all connection traffic stays under your control—without being routed through external servers.
? 2. No Hidden Licensing Costs
RustDesk is completely free to use—even for commercial purposes. There are no limitations on the number of devices, connections, or support hours. You reduce IT costs without sacrificing features.
? 3. Fast Setup and Modern Technology
The software is written in the programming language Rust, known for its performance and safety. Installation is simple, resource usage is minimal, and connection speeds are excellent.
? 4. Open Source Creates Trust
Unlike proprietary systems like TeamViewer or AnyDesk, RustDesk offers full transparency with open-source code. Security risks or privacy concerns can be audited publicly—a decisive advantage for businesses, government organizations, and privacy-conscious individuals.
?? My Service: Secure IT Support with RustDesk
As an IT service provider, I support individuals and businesses with a tailored, privacy-compliant remote support solution based on RustDesk. By using a dedicated server infrastructure, I can provide you with secure connections that meet the highest privacy and compliance standards—without any data being routed through third parties.
? Want to Host It Yourself? No Problem – Here’s My Tutorial
If you want to set up your own RustDesk server, I’ve created a detailed, step-by-step tutorial to walk you through the process: ? Set Up RustDesk on a Linux Server Using Docker-Compose In this guide, I explain how to run your own self-hosted remote desktop solution quickly and reliably.
? Why Open Source Matters More Than Ever
In an age where digital sovereignty and data protection are constantly under threat, free and open-source software like RustDesk provides a real alternative. You decide how and where your data is processed—without dependence on external vendors or restrictive licensing models.
✅ Conclusion: RustDesk Offers You Security, Freedom, and Control
RustDesk combines security, flexibility, and cost-efficiency in a modern remote access solution. As free software, it gives you back control—over your infrastructure, your data, and your IT operations.
? Do you have questions or need expert support? I’m happy to help you implement a secure and customized solution—without compromise.