Alex Diller
  • Services
  • Skills
    View skill list
  • Projects
    View all projects
    DolphBit (Small business)
    Work ExperienceWeb DevelopmentApplication DevelopmentTool DevelopmentGame Development
    UGX-ModsServer Admin (DevOps)
  • Qualifications
  • Uniqueness
  • Contact
  • About Me
    About my dog "Caya" 🐕About my Audi RS3 🚗My Spotify Playlists 🎶3D Print 🖨️ & DIY 🛠️
  1. Welcome
  2. Security & Compliance

Security & Compliance

Last change: Jul 1, 2025
Content of this page
  • Infrastructure and Network Security
    • Physical Access
    • Digital Access
  • Backups
  • Audits & Penetration Testing
  • Prevention & Intrusion Detection
  • Data Security and Privacy
  • Documentation
  • Vulnerability Disclosure

I take reasonable steps to protect your and my data from loss, misuse, and unauthorized access, disclosure, alteration, or destruction.

Infrastructure and Network Security

My products & services are usually hosted on on-premise servers hosted by Hetzner. Some smaller sites and some E-Mail infrastructure is handled by All-Inkl.com and stored on shared vhosts.

Physical Access

These data centers have several safeguards to prevent unauthorized access

Digital Access

Only authorized staff is allowed to access the operating systems, platforms and services and are protected with strong passwords, key access and hardware two-factor authentication. Some parts are behind a private network.

Backups

Daily, Weekly, Monthly, Quarterly, Yearly backups are in place where it makes sense. Time frame depends on how critical the data is and what purpose it serves. All backups are encrypted and stored on multiple secure backup servers.

Audits & Penetration Testing

Unfortunately due to the small size of my business I'm not able to afford these kind of security enhancements.

Prevention & Intrusion Detection

The systems are covered with security mechanisms to identify suspicious behavior and does reduce the attack surface. Alerts are sent out as soon as some unusual activity has been identified.

Data Security and Privacy

Data is sent exclusively over HTTPS transport layer security (TLS) encrypted connections from the applications & services to the end user.

Documentation

There is documentation in place on how to proceed if there is a data breach, how everything works together and who to notify, including a list of emergency contacts. Up-2-data information and workflows for new staff is available and is updated from year to year based on best practice, new methods and software and experience.

Vulnerability Disclosure

I'm always eager to improve and if you found something, let me know!

I'm thankful for any information about a possible vulnerability in my systems, products or services.

If you believe you found something, don't hesitate and contact me at [email protected] and get in touch with me asap!

I would be grateful to receive information such as a proof of concept, tools used, and any other information that might be useful for this report to be able to verify it.

Once verified and depending on the scale I will notify users and keep updates about the issue as they arrive.

Unfortunately I can't give a bounty reward in cash, but publicity (if you want) which might be rewarding to you as well.

Cookie PolicyPrivacy PolicyContact Me
Follow me on social & gaming networks!
Alex Diller@igDeltadolphbit.alexAlex Diller
TheDeltaDeltaDelta | Alexugx_delta
Alexander Diller

Legal Notice

Privacy Policy

Cookie Policy

Do Not Sell My Personal Information

Security

Products

UGX Launcher

Further links

DolphBit

UGX-Mods

Contact

Eisenbahnstraße 24
88048 Friedrichshafen
Germany (Baden-Württemberg) [🇩🇪]

[email protected]

© 2025 Copyright alexander-diller.de
Made with Angular ❤️ (?)