This Week in TUXEDO OS #19-2026 - TUXEDO Computers

  • Notebooks
    • Notebooks/Laptops with preinstalled and configured Linux and more. TUXEDO Computers are individually built computers and PCs being fully Linux-suitable, custom tailored Linux hardware so to say. We deliver all TUXEDOs ready to go so you only ha...
    • 10-14 inch
    • 15-16 inch
    • 17 inch
    • Immediate shipping
    • Business notebooks
    • Gaming-Notebooks
    • Mobility notebooks
    • Deep Learning AI
    • All Notebooks
  • Computers / PCs
    • Computers / PCs with Linux preinstalled & more TUXEDO Computers are individually built computers and PCs being fully Linux-suitable, custom tailored Linux hardware so to say :) We deliver all TUXEDOs ready to go so you only have to unwrap,...
    • Mini Systems
    • Midi Systems
    • Maxi Systems
    • AMD Systems
    • Intel Systems
    • All Systems
  • Accessories
    • Here you will find accessories, components and peripherals for your TUXEDO system. Nothing suitable found here? Get in touch with us directly!
    • Batteries
    • Displays
    • Dockingstations
    • Books
    • Input Devices & Peripherals
    • Bags & Sleeves
    • Notebook Power Supplies & Cords
    • Components & Complements
      • Cables
      • Drives
      • Hard Disk Drives 2.5"
      • PC Power Supplies
      • SSDs 2.5"
      • SSDs m.2 (SATAIII and NVMe)
      • WiFi, LAN & Mobile Network
      • Licenses
  • B2B
    • In this category you can find equipment for your company, office, school, university or educational institution and servers and solutions. Appliances with CRM, ERP and merchandise management, cloud storage, cloud server for self-hosting, services...
    • Business notebooks
    • Business computers
  • Novelties
  •  
    • Notebooks
      • 10-14 inch
      • 15-16 inch
      • 17 inch
      • Immediate shipping
      • Business notebooks
      • Gaming-Notebooks
      • Mobility notebooks
      • Deep Learning AI
      • All Notebooks
    • Computers / PCs
      • Mini Systems
      • Midi Systems
      • Maxi Systems
      • AMD Systems
      • Intel Systems
      • All Systems
    • Accessories
      • Batteries
      • Displays
      • Dockingstations
      • Books
      • Input Devices & Peripherals
      • Bags & Sleeves
      • Notebook Power Supplies & Cords
      • Components & Complements
        • Cables
        • Drives
        • Hard Disk Drives 2.5"
        • PC Power Supplies
        • SSDs 2.5"
        • SSDs m.2 (SATAIII and NVMe)
        • WiFi, LAN & Mobile Network
        • Licenses
    • B2B
      • Business notebooks
      • Business computers
    • Novelties
  • Settings

  • Deutsch
  • English

  • Customer Account

  • Log in
  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #19-2026

2026-05-08 18:00:00

Hello TUXEDO Fans and Open-Source Enthusiasts!

In Germany, there’s a saying – „Holla, die Waldfee“ – used when something unexpectedly knocks you off your feet. Our developer penguins have probably heard it more often than they would have liked over the past two weeks. With Pack2TheRoot, Copy Fail, and Dirty Frag, three separate security vulnerabilities appeared in Linux components that could be exploited to gain root privileges. Not exactly the kind of surprise anyone enjoys in daily work – though, admittedly, it does fit neatly into the bugfix schedule.

It’s a sobering reminder, but not a reason to sweep things under the rug. In the open-source world in particular, transparency means issues can be fixed quickly. That’s exactly what happened in TUXEDO OS, where we promptly delivered bugfixes. For „Dirty Frag“, there is already an initial mitigation in place, even if the final fix is still in progress. Honestly, we would have preferred working on new features instead of kernel edge cases.

The past weeks once again highlight why regular updates are not a tedious ritual but a core security factor. At the same time, they underline the value of long-term hardware support: a Linux system doesn’t suddenly become unsafe just because a date is reached. There’s no need to rush into new hardware purchases when software support ends – a scenario many still remember from the Windows 10 end-of-support situation. Stability also means planning reliability.

On a lighter note, beyond security alerts and patch marathons, there are more enjoyable topics as well. In this edition, we take a look at KeepSecret and the return of some true KDE classics: the Oxygen and Air themes are making a surprising comeback as part of KDE’s 30th anniversary. Between nostalgia and modern design, it shows that even the Linux desktop can get a bit emotional – no „Holla, die Waldfee“ required.

Enjoy reading,
The TUXEDO OS Team

  • Updates in TUXEDO OS
    • nvidia-driver-580 (2:580.126.09–2tux1)
    • tuxedo-archive-keyring 2024.04.01tux2 (Ubuntu Noble only)
  • Security Updates in TUXEDO OS
    • tuxedo-fix-dirty-frag 1.0.0
    • Thunderbird 140.10.1esr
  • KDE App of the Week: Managing Passwords and Logins with KeepSecret
  • TUXEDO OS Tips & Tricks: Oxygen and Air Ahead of Their Comeback
  • Ubuntu Security Updates

Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.

Updates in TUXEDO OS

nvidia-driver-580 (2:580.126.09–2tux1)

  • Required to ensure a smooth transition from branched to unbranched driver packages.

tuxedo-archive-keyring 2024.04.01tux2 (Ubuntu Noble only)

  • Added tuxedo-fix-copy-fail as a dependency

Security Updates in TUXEDO OS

tuxedo-fix-dirty-frag 1.0.0

  • Disables the kernel modules esp4, esp6 and rxrpc
  • Provides protection against potential exploitation of the Dirty Frag vulnerability
  • The package is not rolled out automatically
  • Installation is strongly recommended, but may affect IPSec VPN and Kerberos functionality

Thunderbird 140.10.1esr

  • Security fixes applied
  • Release Notes: https://www.thunderbird.net/en-US/thunderbird/140.10.1esr/releasenotes/

KDE App of the Week: Managing Passwords and Logins with KeepSecret

With KeepSecret, we take a look at a modern password manager from the KDE ecosystem that deliberately focuses on openness and interoperability. The application lets you view, edit, create, and delete credentials, and is designed for both desktop and mobile use cases. Unlike traditional standalone solutions, KeepSecret integrates flexibly into existing infrastructures built around secure credential management.

KeepSecret’s clean interface displays stored credentials in a central view and allows you to easily manage, edit, and create new entries across different compatible Secret Service backends.
KeepSecret’s clean interface displays stored credentials in a central view and allows you to easily manage, edit, and create new entries across different compatible Secret Service backends.

Installation is straightforward via Flathub, making it independent of your distribution. Through the Discover software center, the application is ready to use within seconds – including all dependencies. This is especially beneficial in heterogeneous Linux environments, as you always get an up-to-date version directly from upstream without worrying about package sources or version conflicts.

From a technical perspective, support for the so-called Secret Service standard org.freedesktop.secrets is particularly interesting. KeepSecret acts as a frontend for various backends such as KeePassXC, GNOME Keyring, or KWallet. This means you manage your credentials centrally while remaining flexible in your choice of the actual storage system, making integration into existing workflows much easier.

This is also where KeepSecret stands out compared to KWallet: while KWallet is tightly integrated into the KDE ecosystem, KeepSecret serves as a universal interface for multiple password services. This makes it especially appealing if you work across platforms or combine different tools. You benefit from a consistent user experience without being locked into a single solution.

Info: Are you interested in Plasma development and want to know what new features are planned and which programs have been recently updated? You can find a detailed overview in the weekly column This week in Plasma by KDE developer Nate Graham.

TUXEDO OS Tips & Tricks: Oxygen and Air Ahead of Their Comeback

With the upcoming release of KDE Plasma 6.7 on June 16, 2026, two classics are making an unexpected return: the Plasma styles „Oxygen“ and „Air“ are currently being extensively reworked by the community. The goal is to make both themes usable again in time for the release and to adapt them to modern technical and visual standards.

The TUXEDO OS design presents a modern interpretation of KDE Plasma with clean lines, subtle colors, and a tidy desktop layout optimized for productive everyday use.
The TUXEDO OS design presents a modern interpretation of KDE Plasma with clean lines, subtle colors, and a tidy desktop layout optimized for productive everyday use.
Breeze is the current default theme of KDE Plasma, featuring a minimalist and flat design that prioritizes functionality while deliberately reducing visual distractions.
Breeze is the current default theme of KDE Plasma, featuring a minimalist and flat design that prioritizes functionality while deliberately reducing visual distractions.

Both themes originally date back to the KDE 4 era and significantly shaped the look and feel of the desktop environment at the time. While Oxygen introduced darker tones and a glass-like aesthetic, Air later adopted a brighter design built around transparency. Over the years, however, both fell behind, gradually losing functionality or disappearing altogether.

The current revival is driven by several KDE developers, including Filip Fila and Nuno Pinheiro, who was already involved in the original Oxygen design. Together, the team is working not only to restore these historic themes, but also to bring them up to date with modern Plasma standards.

On the technical side, Oxygen has already seen significant improvements: the panel has been completely reworked and now properly adapts to different orientations. Long-missing elements such as a minimized window indicator and updated switch designs have also been added. In addition, adaptive transparency is now supported, and previous rendering issues in widgets have been resolved.

The updated Oxygen theme brings back darker gradients and a more dimensional look, while feeling noticeably more modern and integrating surprisingly well with current Plasma versions.
The updated Oxygen theme brings back darker gradients and a more dimensional look, while feeling noticeably more modern and integrating surprisingly well with current Plasma versions.
Air once again embraces transparency and lightness, now enhanced with modern blur effects and refined UI elements for a more elegant and contemporary desktop experience.
Air once again embraces transparency and lightness, now enhanced with modern blur effects and refined UI elements for a more elegant and contemporary desktop experience.

Air, in turn, regains its signature transparency and enhances it with modern blur effects in the background. This not only improves readability but also gives the theme a more contemporary feel. In addition, the panel, header, and footer have been reworked, and new graphical elements for switches and controls have been introduced.

If you would like to try out these updated themes yourself, you can install them manually: download the theme files (links are available at the end of the blog post) and open Appearance & Style » Colors & Themes » Plasma Style in the system settings. There, select Install from File…, import the desired themes, and activate them. This way, you can experience for yourself how a look back into the past meets the present.

Ubuntu Security Updates

The Ubuntu security updates listed here are generally incorporated directly into TUXEDO OS. Some updates are only available from Ubuntu for a fee and are therefore not made available to the community until a later date. Unfortunately, we have no control over this:

  • USN-8261–1: Linux kernel (Xilinx) vulnerabilities: Several security issues were fixed in the Linux kernel.
    CVE IDs: CVE-2025–68288, CVE-2025–68756, CVE-2025–71149, plus 606 others.
    Affects: Ubuntu 24.04 LTS.

  • USN-8260–1: Linux kernel (Azure FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
    CVE IDs: CVE-2025–68756, CVE-2025–71149, CVE-2025–71084, plus 174 others.
    Affects: Ubuntu 24.04 LTS.

  • USN-8259–1: OpenEXR vulnerabilities: Several security issues were fixed in OpenEXR.
    CVE IDs: CVE-2026–27622, CVE-2026–34380, CVE-2026–34588.
    Affects: Ubuntu 26.04 LTS, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS.

  • USN-8258–1: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    CVE IDs: CVE-2025–68756, CVE-2025–71149, CVE-2025–71084, plus 173 others.
    Affects: Ubuntu 24.04 LTS.

  • USN-8256–1: opam vulnerability: opam could install files in unintended locations if a specially crafted package was installed.
    CVE IDs: CVE-2026–41082.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS, 20.04 LTS.

  • USN-8246–1: Vim vulnerabilities: Several security issues were fixed in Vim.
    CVE IDs: CVE-2026–41411, CVE-2026–39881, CVE-2026–35177.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8254–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
    CVE IDs: CVE-2026–23231, CVE-2026–23273, CVE-2026–23112.
    Affects: Ubuntu 24.04 LTS, 22.04 LTS.

  • USN-8253–1: Postfix vulnerability: Postfix could crash when receiving specially crafted network traffic.
    CVE IDs: CVE-2026–43964.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8252–1: OpenJPEG vulnerability: OpenJPEG could crash or execute programs when encoding image files.
    CVE IDs: CVE-2026–6192.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8251–1: libpng vulnerabilities: Several security issues were fixed in libpng.
    CVE IDs: CVE-2026–33416, CVE-2026–33636, CVE-2026–34757.
    Affects: Ubuntu 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8249–1: dpkg vulnerability: dpkg could become unresponsive when opening a specially crafted file.
    CVE IDs: CVE-2026–2219.
    Affects: Ubuntu 25.10, 24.04 LTS.

  • USN-8248–1: NASM vulnerabilities: Several security issues were fixed in NASM.
    CVE IDs: CVE-2021–33450, CVE-2021–33452, CVE-2023–31722.
    Affects: Ubuntu 24.04 LTS, 22.04 LTS.

  • USN-8245–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
    CVE IDs: CVE-2025–71149, CVE-2025–71084, CVE-2025–71131, plus 137 others.
    Affects: Ubuntu 25.10, 24.04 LTS.

  • USN-8244–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
    CVE IDs: CVE-2026–23231, CVE-2026–23112, CVE-2026–23273.
    Affects: Ubuntu 25.10, 24.04 LTS.

  • USN-8242–2: PostfixAdmin vulnerability: PostfixAdmin could execute malicious JavaScript in a user’s browser via crafted input.
    CVE IDs: CVE-2023–28447.
    Affects: Ubuntu 24.04 LTS.

  • USN-8240–1: Swish-e vulnerabilities: Several security issues were fixed in Swish-e.
    CVE IDs: CVE-2022–25236, CVE-2022–25235.
    Affects: Ubuntu 26.04 LTS, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS.

  • USN-8239–1: Apache HTTP Server vulnerabilities: Several security issues were fixed in Apache HTTP Server.
    CVE IDs: CVE-2026–28780, CVE-2026–33523, CVE-2026–33857, plus 8 others.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8238–1: EditorConfig vulnerability: EditorConfig could crash when opening a specially crafted file.
    CVE IDs: CVE-2026–40489.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS.

  • USN-8237–1: WebKitGTK vulnerabilities: Several security issues were fixed in WebKitGTK.
    CVE IDs: CVE-2026–20644, CVE-2026–20665, CVE-2026–20652, plus 16 others.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS.

  • USN-8231–1: Dynaconf vulnerability: Dynaconf could be used to execute arbitrary code.
    CVE IDs: CVE-2026–33154.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8236–1: Slurm vulnerabilities: Several security issues were fixed in Slurm.
    CVE IDs: CVE-2023–49933, CVE-2023–49938, CVE-2023–49937, plus 2 others.
    Affects: Ubuntu 24.04 LTS, 22.04 LTS.

  • USN-8230–1: Docker vulnerabilities: Several security issues were fixed in Docker.
    CVE IDs: CVE-2026–33748, CVE-2026–33747.
    Affects: Ubuntu 26.04 LTS, 24.04 LTS, 22.04 LTS, 20.04 LTS.

  • USN-8234–1: Mako vulnerability: Mako could expose sensitive information over the network.
    CVE IDs: CVE-2026–41205.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS.

  • USN-8233–1: nghttp2 vulnerability: nghttp2 could crash when processing specially crafted network traffic.
    CVE IDs: CVE-2026–27135.
    Affects: Ubuntu 25.10, 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS, 16.04 LTS.

  • USN-8232–1: Django vulnerabilities: Several security issues were fixed in Django.
    CVE IDs: CVE-2026–6907, CVE-2026–5766, CVE-2026–35192.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8229–1: sed vulnerability: sed could overwrite files.
    CVE IDs: CVE-2026–5958.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8228–1: Exim vulnerabilities: Several security issues were fixed in Exim.
    CVE IDs: CVE-2026–40685, CVE-2026–40687, CVE-2026–40686.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8227–1: curl vulnerabilities: curl could expose sensitive information over the network.
    CVE IDs: CVE-2026–4873, CVE-2026–5773, CVE-2026–5545, plus 4 others.
    Affects: Ubuntu 26.04 LTS, 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8226–1: kmod update: kmod was updated to block loading of the algif_aead kernel module.
    CVE IDs: CVE-2026–31431.
    Affects: Ubuntu 25.10, 24.04 LTS, 22.04 LTS.

  • USN-8218–1: zuluCrypt vulnerability: zuluCrypt could execute programs with administrator privileges.
    CVE IDs: CVE-2025–53391.
    Affects: Ubuntu 24.04 LTS, 22.04 LTS, 20.04 LTS, 18.04 LTS.

Service & Support

Welcome to TUXEDO Support - how can we help you?

Linux at TUXEDO

Are you wondering if Linux is right for you? Our team will be happy to answer your questions and explain details about the free operating system at TUXEDO.
Let the advantages and services convince you!

Hardware

Notebook, PC, both - and which model? Our technical service team also provides advice on selection, equipment and puts together suitable offers for your technical requirements.

Questions and Answers

Frequently asked questions and the corresponding answers can be found here. If you cannot find a solution to your problem here, it is also worth taking a look at the instructions section.


Find out more

Instructions and Tips

Most situations can be solved quickly and easily by yourself. This saves you time and you can use your device directly again. We provide you with instructions, first steps and short tips for all TUXEDO models.


Find out more

System Recovery

Even in the case of a case, you don't have to rely on us: Your device can be reset to the factory settings - completely automatically! Everything is included with your order and you can get started right away.


Find out more

Technical Service

Our competent technicians are also happy to help with service requests. You have different possibilities to contact us. We are personally there for you Monday to Friday from 9 am to 1 pm and from 2 pm to 5 pm. But also outside these times, you can contact our team with your request by e-mail.
An extra function is available in your customer account for repair requests (RMA).

 

Contact

We are personally there for you Monday to Friday from 9 am to 1 pm and from 2 pm to 5 pm (German time). But also outside these times, you can contact our team with your request by e-mail. You will receive confirmation of receipt within approximately 15 minutes. If not, please feel free to contact us by phone. Please include your order number, the model name of your laptop or PC and as detailed a description of your request as possible. The more details you give us, the faster we can process your request!

We might not be able to answer questions about third party hardware or software. For questions about popular open source software (Thunderbird, Filezilla...) please contact a forum e.g. ubuntuforums.org. The research effort for application specific setup is immense and not manageable at the current time. Basic compatibility questions e.g. are of course still welcome!

An extra function is available in your customer account for repair requests (RMA).

 

Image of Tux

Linux compatible
image of 5 years warranty badge

Up to 5 Years Warranty
stylized image of a Rocket

Immediately ready for use
image of germany with a wrench in the center

Assembled in Germany
image of germany with a section sign in the center

German Data Privacy
stylized image of a tech support worker

German Tech Support

Guidance

  • Service & Support
  • B2B


Mo - Fr: 9-13 & 14-17h
+49 (0) 821 / 8998 2992

About TUXEDO

  • Why TUXEDO
  • TUXEDO Control Center
  • TUXEDO Tomte
  • TUXEDO WebFAI
  • TUXEDO OS
  • TUXEDO Aquaris
  • Individual logos and keyboards

Help & Support

  • Downloads & Drivers
  • System Diagnostics
  • Frequent questions (FAQ)
  • Help with my device
  • Instructions
  • Revocation right
  • Shipping costs & delivery times
  • Payment methods

News & more

  • News & Blog
  • Press
  • Newsletter
  • Event Calendar
  • Jobs & Career
  • Sponsoring

Community


Your Linux specialist since 2004

  • Accessibility
  • Privacy policy
  • Imprint
  • Battery disposal
  • Conditions of Use

Shipping costs & delivery times

We ship your order to almost all countries, in Europe mostly even free of charge! The respective shipping costs and the cost threshold above which we will cover the costs for you can be found here or for international shipping in the table below.

 


Free shipping within Germany

There are no shipping costs within Germany for goods worth €100 or more.

 

7.99 € shipping cost at max!

No matter how many small articles you order, such as USB stick card reader, LAN adapters or fan articles, with us, you pay a maximum of 7.99 € shipping costs.

  • 7.99 € shipping fee for all orders below 100 € of goods
  • Free shipping from 100 € total value of goods

You can check all occurring shipping costs or if we even deliver for free right before sending your order!

 


International delivery

Here are the shipping costs as well as the amount threshold for your order. The threshold is referring to the total amount of your order, which enables free shipping.
 

Taxes and customs outside the EU:

For orders outside the EU there might be additional duties, taxes or charges needed to be paid by the customer. These don't have to be paid to the supplier, but to local authorities. Please check for any details with your local customs or tax authorities before ordering! But as a benefit you don't have to pay German taxes, this means you save up to 19%!
Due to the Brexit and the associated changes, there may be delays of several days in customs clearance on site for deliveries to the UK. This is not within our sphere of influence.

The processing of orders outside the EU may currently be subject to significant delays due to the respective customs authorities. Unfortunately, we have no influence over this and therefore ask you to check your shipment tracking daily. If the status of your shipment does not change for more than a week, please contact our customer service.

Thank you for your understanding!

 

 
⚠️   Countries to which we unfortunately cannot ship, and information on how you can still order from us, can be found here!
Country Shipping Fee Free Shipping From
Albania 99,00 EUR -
Andorra 59,00 EUR -
Belarus
(Temporarily no delivery possible)
59,00 EUR -
Belgium 8,49 EUR 100 EUR
Bulgaria 15,99 EUR 160 EUR
Denmark 8,49 EUR 100 EUR
Estonia 15,99 EUR 160 EUR
Faroe Islands 129,00 EUR -
Finland 14,99 EUR 150 EUR
France
(Overseas France excluded)
9,99 EUR 120 EUR
Greece 22,90 EUR -
United Kingdom
(Overseas Territories excluded)
9,99 EUR 120 EUR
Hong Kong 199,00 EUR -
India 199,00 EUR -
Ireland 14,99 EUR 150 EUR
Island 129,00 EUR -
Italy 9,99 EUR 120 EUR
Japan 99,00 EUR -
Canada 99,00 EUR -
Croatia 34,90 EUR 500 EUR
Latvia 15,99 EUR 160 EUR
Lithuania 15,99 EUR 160 EUR
Luxembourg 8,49 EUR 100 EUR
Macau 199,00 EUR -
Malta 34,90 EUR 500 EUR
Macedonia 59,00 EUR -
Moldova 199,00 EUR -
Monaco 19,00 EUR -
Montenegro 99,00 EUR -
Netherlands
(Dutch Carribean excluded)
8,49 EUR 100 EUR
Norway 14,99 EUR 150 EUR
Austria 8,49 EUR 100 EUR
Poland 15,99 EUR 160 EUR
Portugal 14,99 EUR 150 EUR
Romania 15,99 EUR 160 EUR
San Marino 9,99 EUR 120 EUR
Sweden 14,99 EUR 150 EUR
Switzerland 13,99 EUR 150 EUR
Serbia 34,90 EUR 500 EUR
Singapore 199,00 EUR -
Slovakia 15,99 EUR 160 EUR
Slovenia 15,99 EUR 160 EUR
Spain
(Canary Islands excluded)
14,99 EUR 150 EUR
Czech Republic 15,99 EUR 160 EUR
Ukraine
(Temporarily no delivery possible)
129,00 EUR -
Hungary 15,99 EUR 160 EUR
USA
(including Hawaii)
99,00 EUR -
United Arabic Emirates 199,00 EUR -
Cyprus 34,90 EUR 500 EUR
Qatar 199,00 EUR -
⚠️ Countries to which we unfortunately cannot ship, and information on how you can still order from us, can be found here!

 


Time of delivery

If not stated differently in the article's description, we deliver goods in:

  • 7-10 working days within Germany
  • 10-12 working days outside Germany

For orders paid in advance, the delivery time starts with receipt of the payment. Please keep in mind that there is no delivery on Sundays or on holidays.
For goods delivered as download, there will be no shipping fees due.
Access data for downloads are sent out via e-mail 1-3 working days after contract formation. For orders with advanced payment, we will deliver after receiving the payment. You can download the item by using the link sent to you via e-mail.

Self-pick-up of orders is not possible, unfortunately.