intelligent
piXel | security
George A. Rauscher / intelligent piXel GmbH / Starnberg
Security is either a foundation
or it is theater.
Security is not a feature. It is either a foundation or it is theater.
The difference between companies that survive an incident and companies that do not is rarely technical sophistication. It is almost always the decision, made at some earlier point, to treat security as something to be addressed seriously rather than checked off a list. The list exists. Certifications exist. Compliance frameworks exist. None of them are the same thing as being secure, and the organizations that confuse the two are the ones that appear in the daily breach reports with a statement about how customer data security is their highest priority.
At intelligent piXel, security has been a core discipline for over two decades, not as a service category added to a product portfolio, but as the lens through which every system built here has always been evaluated. George Rauscher spent twenty-five years as a forensic specialist and penetration tester for prosecutors, intelligence services, and investigative agencies across four continents. He knows how attackers think because he thinks the way they think. That background does not make him cautious. It makes him precise.
Email and trust
under pressure
The attack surface for most organizations begins with communication, and the communication infrastructure in most organizations has not been seriously evaluated in years. Email is the primary attack vector for credential theft, phishing, ransomware deployment, and business email compromise. The solutions are not complicated, but they require a decision to implement them rather than a continued tolerance for the risk.
The recommendation is consistent: Apple infrastructure across the organization, from the device in an employee's pocket to the hardware on the desk, paired with a mail architecture built on either a properly maintained private server or Proton. The Apple ecosystem was designed to function as a system. The security profile of that ecosystem, maintained correctly, is categorically stronger than the alternative of mixed hardware sourced for price and assembled with components that have never been evaluated in combination.
VIPMail, operated by intelligent piXel on German servers for over twenty years, provides AI-based real-time protection against phishing, spam, and malware, with full DSGVO compliance by architecture. For organizations evaluating Proton as a destination, migration consulting is available, including clean transitions from environments that have accumulated years of complexity without corresponding security benefit.
Awareness matters as much as infrastructure. An email from an unknown sender requesting credentials or urgent action, an SMS with a link that almost matches a familiar domain, a phone call from someone who knows just enough about the organization to sound credible: these are not exotic attack vectors. They are the daily operational reality for every organization connected to the internet. Social engineering remains the most reliable entry point into otherwise technically defended environments, and the technical defenses mean nothing if the people using the systems are not equipped to recognize what is being attempted.
Security begins
at the router
A secure office or homeoffice environment begins at the router. Not with a policy document. Not with a training module. With hardware that was chosen for what it needs to do, configured by someone who understands the threat model, and maintained with the same attention given to the systems running behind it.
Firewalls, intelligent intrusion detection, network monitoring that surfaces anomalous behavior before it becomes an incident: these are not enterprise-only concerns. They are the baseline for any organization that takes the integrity of its operations seriously.
intelligent piXel designs and implements network environments built on that baseline, scales them to the actual requirements of the organization, and ensures that the infrastructure supporting daily operations is not the weakest point in the security posture.
2FA and MFA implementation across all relevant systems is part of every engagement. Not as an afterthought. As a requirement.
Backup is addressed with the same seriousness as every other component of the security architecture, because a backup that has not been tested is a hypothesis rather than a recovery capability, and a backup that exists only in one location has not actually solved the problem it was built to solve.
Attack it before
someone else does
The only way to know whether a system is defensible is to attack it. George Rauscher has been doing exactly that for the duration of his professional career, first for the agencies and prosecutors who engaged him to evaluate systems that had already been compromised, then as an active penetration tester for organizations that wanted to know what an attacker would find before an attacker found it.
Penetration testing at intelligent piXel covers web applications, APIs, network infrastructure, and Linux server environments. The methodology is not based on automated scanning tools run against a checklist. It is based on the way actual attackers approach a target: identifying the paths of least resistance, testing assumptions about what is protected, and documenting exactly what was found and what it means.
API security audits address a specific and increasingly significant vulnerability surface. Organizations that have integrated third-party APIs, built internal APIs to connect their own systems, or deployed applications that expose endpoints to the public internet have created attack surfaces that standard security reviews frequently miss. An API that was built quickly, documented incompletely, and never subjected to adversarial testing is not a feature. It is an open question about what an attacker can reach through it.
Dark Web Monitoring answers a question that most organizations are not asking frequently enough: whether their credentials, their employees' credentials, or their operational data has already appeared somewhere it should not be. The answer is frequently yes. The monitoring does not prevent the underlying breach, but it identifies the exposure before the attacker has had the opportunity to use it and provides the information needed to respond before the situation escalates.
Linux servers are
not self-defending
The majority of the internet runs on Linux. The majority of the people administering those servers have installed them, configured them to a basic functional state, and moved on. A rented VPS running WordPress with default settings, no active intrusion detection, no centralized logging, and no hardening applied since the initial installation is not a server. It is an invitation.
intelligent piXel hardens Linux servers against the full range of current attack methodologies, installs and configures defense software with an established track record, and maintains server environments in a state that reflects the actual threat landscape rather than the threat landscape that existed at the time of the last update. SSL/TLS configuration, certificate management, and the elimination of deprecated protocols and cipher suites are part of every engagement without exception.
For servers that have been compromised: incident response, forensic analysis of what happened and how far it went, remediation, and the rebuilding of the environment from a known clean state. A hacked server is not a reason to start over from scratch without understanding what occurred. It is a reason to conduct the investigation properly so that the same entry point cannot be used again.
AI-driven defense
from within
SentinelLX is a Linux server security architecture built on a principle that distinguishes it from every conventional approach to server defense: the server is given the capability to detect, analyze, and respond to intrusion from within, using artificial intelligence, without waiting for an external monitoring system to identify the threat and issue an alert that may arrive too late.
Conventional security architectures monitor from outside the perimeter or at the perimeter. SentinelLX operates inside it, continuously evaluating the behavioral state of the system against a learned baseline, identifying deviations that indicate compromise or active exploitation, and taking autonomous protective action before the damage has propagated.
It does not wait for a signature match. It does not require a rule that anticipated the specific attack being executed. It reads the system the way a physician reads a patient and responds to what is actually happening rather than to what was expected to happen.
SentinelLX is currently in successful test operation. A peer-reviewed scientific paper documenting the methodology and results is in preparation and will be published shortly. The system is available for deployment in existing client environments now.
Tools built for
real privacy
Encryptor.app provides military-grade file encryption based on AES-256-GCM with PBKDF2 key derivation at one hundred thousand iterations. Files up to two gigabytes are processed entirely in the browser using the Web Crypto API. The plaintext never leaves the client. There is no server-side processing, no account, no logging, no backdoor, and no theoretical vulnerability introduced by transit.
The source code is published on GitHub under the MIT License. Privacy built on trust rather than transparency is not privacy worth relying on.
IP Beacon V3.5, available at my.0at.de, provides professional network forensics and IP analysis: full IP analysis, device identification, privacy scoring, WebRTC leak detection, port scanning, and network testing, with PDF export. Everything runs client-side. Nothing is stored or transmitted. Free, open source, MIT License.
Both tools were built because the alternatives required either trusting a company with data that should never leave the device, or paying for a subscription to functionality that should simply exist and be available to anyone who needs it.
Legacy code still
shapes live risk
Software ages. The security assumptions embedded in a codebase written five years ago reflect the threat model of five years ago, and five years is a long time in the current environment. Organizations running production applications built on code that has not been reviewed with security as the primary lens are operating with risk that compounds over time without being measured.
intelligent piXel conducts security audits of existing applications and refactors legacy code against current standards. This is not a theoretical exercise. It is the process of finding what is actually exploitable in what is actually running, documenting it clearly, and fixing it with the same precision that went into finding it.
An audit that produces a report without a remediation path is not an audit. It is a liability document.
Web applications, APIs, Linux servers, and inherited systems can be reviewed before the attacker does the review for you.
Incident response, forensic analysis, remediation, and a clean rebuild path are part of the work, not separate problems.