Title logo: PeterJockisch.com

1.1 Imprint

Domain owner and responsible for the content according to § 55 RStV for PeterJockisch.com:

Pe­ter Jockisch
Habs­bur­ger­stra­ße 11
79104 Frei­burg i.Br.

Telephone landline: +49 - 761 - 55 14 68
E-Mail: info@peterjockisch.com

OpenPGP-Schlüs­sel, ID: 3381 2AF5 9CE9 6481 9F57 B6B0 7943 EB86 7D0F C318


According to legal requirements for imprints, a telephone num­ber must be provided; however, please refer to the com­munication notes as well as the questions section .

Die Eu­ro­pä­i­sche Kom­mis­si­on stellt ei­ne Platt­form für die au­ßer­ge­richt­li­che On­line-Streit­bei­le­gung be­reit, un­ter www.ec.europa.eu/consumers/odr. Wir sind we­der ver­pflich­tet noch da­zu be­reit, an dem Streit­schlich­tungs­ver­fah­ren teil­zu­neh­men.

1.2 Prefered Communication Medium: Cryptographically signed E-Mail

Currently, the effective protection that can be achieved with publicly available cryptographic technology is highly ques­tion­able. Advanced computer technology is likely to be kept out of the public domain in order to keep the intelligence services of the rulers at the forefront of com­put­ing power. In addition, software and hardware back­doors probably exist. Officially recommended stand­ard­ized encryption methods may have inherent mathematical weaknesses: Why should the intelligence services of the Western and Eastern hemispheres recommend and give away self-developed secure algorithms whose use would make their central work, interception and industrial es­pio­nage, impossible?

The higher-ranking organisations of those families who stand above the law most probably have an incomparably strong calculating power, which normal users have little to oppose. However, some of the potential attackers under the law can be fended off. The communication security can be increased at least within a certain framework, by con­sist­ent use of cryptographic signing.

Peter Jockisch ’s entire e-mail is without exception always cryptographically signed, with PGP/MIME or a separate sig­na­ture. the author never sends unsigned e-mail, with­out any exception. Signatures must be verified, for ex­am­ple with GnuPG GNU Privacy Guard, www.gnupg.org, MS-Windows version: www.​gpg4win.​org. Pe­ter Jockisch uses only the key listed above, PeterJockisch.com and Pe​t​e​r​J​o​c​k​i​sch.de are the only official sources for his key.

1.3 Fully automated signature verification with OpenPGP and GnuPGP

It is not enough to see a name and a cryptographic sig­na­ture. For authenticity verification, the signature must ac­tu­al­ly be verified. Modern e-mail programs verify fully auto­mati­cal­ly in the background, after initial activation.

For the qualified electronic signature, only class 3 cer­tifi­cates issued by legally recognized CAs on a hardware ba­sis (smart card) are legally recognized. The required hard­ware and software infrastructure (available card read­ers, supported operating system, e-mail program, soft­ware) is, however, entirely proprietary in nature, i.e., not publicly viewable and verifiable, and thus subject to se­curity concerns. If attached to your e-mail, the author may use such public X.509 or OpenPGP certificate parts in his MUA, but he does not sign with such certificates him­self.

1.4 Cryptographic Checksums as an alternative Proof of Authenticity

Message recipients are sometimes not familiar with ap­plied cryptography and signing, or they have no pos­sibil­ity to use it in their country. In such cases, in addition to the signed e-mail, the message may be copied separately to a ".txt" or ".pdf" file and the checksum published in the check­sum list on PeterJockisch.de, combined with the date, time and initials used to identify the document.

Checksums to files can be created with a single right mouse click, for example with Free Software like Cyohash or Jack­sum. More information about the possible ap­pli­ca­tions can be found in the introductory article “Practical ap­pli­ca­tion of cryptographic checksums”.

For verification, the checksum of the attached “.txt” or “.pdf” file must first be formed. Afterwards you can check in the checksum blog area of PeterJockisch.de whether there is an entry with a corresponding checksum for the re­spec­tive e-mail dispatch day. There and only there check­sums of the E-Post are published, nowhere else.

E-mail texts do not contain any information about the check­sum, of course. That would be completely pointless. Any­one could write any file and then copy a checksum from the blog area into the email text. “Practical Ap­pli­ca­tion of Cryptographic Checksums” contains an easy-to-under­stand introduction to the subject.

SSL/TLS certified page sections will follow.

1.5 No Telephony, no Mobile Telephony, no Fax

Peter Jockisch generally does not communicate on a busi­ness level via telephone, which is not very suitable for proof of identity; the telephone number is listed ex­clu­sive­ly due to legal requirements. Regarding the au­then­tic­ity of spoken language, everyone is encouraged to read the WP article “Adobe Voco”.

Information is generally not provided by telephone. The author does not own a cell phone or a fax machine in prin­ci­ple and rejects corresponding contracts or offers.

Since telephony is absolutely unsuitable for proof of iden­ti­ty - anyone can impersonate anyone — he only makes tele­phone calls within the closest circle of friends and fami­ly, and this exclusively in the landline network. As a mat­ter of principle, he does not use mobile telephony, SMS and fax.

There are beneficial free technologies, methods and pro­cesses in many areas (energy generation, com­mu­ni­ca­tion, health, etc.) that are still blocked today, not allowed. How­ever, future generations will be able to use these tech­nol­ogies and methods.

The currently allowed telephone mobile technologies have numerous critical aspects, which are documented in nu­mer­ous films and articles and among oth­ers in the following central lecture: “Dr med Joachim Mutter Mobilfunk und Gesundheit” (53 min., Youtube) - Search: “Mobilfunkschutz”, auf kla.tv.

Further information is also available in the articles of the site diagnose-funk.org. The national and international net pages of the reference list there as well as numerous other net presences, among others also the section “Cell Phone Dangers” of the news portal rense.com, contain de­tailed information on the subject.

Peter Jockisch does not get involved in discussions, nei­ther on the phone nor on site. Anyone who has some­thing to say to him should do so in writing, preferably by elec­tron­ic mail. An answer guarantee can unfortunately not be given.

1.6 No Representatives, no Employees

The author does not have representatives or assistants or oth­er employees who speak for him. He does not work with marketing or advertising space placement agencies. This will not change in the future. No jobs are offered and no work is given.

PeterJockisch.com does not publish or post documents from third parties or from authors other than Peter Jockisch and does not have time to write reviews. Photo applications or ap­pli­ca­tions of any other kind are not wel­come.

1.7 No Promotional E-Mails or Letters, no Newsletters, no Products

Peter Jockisch's websites do not send any advertising e-mails or circular e-mails (or newsletters) as a matter of prin­ci­ple.

The author writes basically no letters to the editor, and sends basically no advertising letters or circulars.

All information is offered exclusively “passively” on his own, official web pages (PeterJockisch.com, Pe​ter​Jocki​sch.de); exclusively in page-own news columns and over RSS news ticker (introduction article).

The author does not use Twitter, Facebook or any other simi​lar third party services, with the exception of the Skype account, the Youtube account and his Archive.org ac­count.

General comments on precautions for e-mail com­mu­ni­ca­tion: Scammers, e-mail spam senders (WP article “Spam”), and discreditors/reputation damagers not in­fre­quent­ly make use of real e-mail addresses from the Inter­net to back up their credibility. The send­er name and sender address of an e-mail can be easily faked. In ad­di­tion, extreme caution is advised when attachments are in­clud­ed, such as .zip files for alleged invoices, loans, dec­la­ra­tions of love, fax transmissions, etc., which are in­tend­ed to tempt people to act rashly and open the at­tach­ment as a result of emotional turmoil. Forwarding a sus­pi­cious e-mail to a third party for analy­sis is also risky, as this could automatically (via e-mail delivery system analy­sis procedures) put you on the list (blacklists) of send­ers of fraudulent and spam e-mails, and could result in dis­cred­iting your own e-mail address. In general, every step should be carefully planned in such cases, as oth­er­wise you run the risk, due to ill-considered reactions, that those affected by the identity theft that has taken place (WP article “Identity theft”) could also take legal action against you, due to damage to your reputation.

1.8 No Collection of Donations, no Appeals for Donations

Peter Jockisch does not collect donations, he does not write any donation e-mails and in principle does not call for such actions. He does not run any donation function for himself or for his websites. He does not send any ad­ver­tis­ing material for third parties, and no donation appeal e-mails or letters are sent for third parties.

This note is made in order to exclude possible free riders.

Habsburgerstraße 11
79104 Freiburg

OpenPGP key


Book Blog



As of: 17 October 2022

Copyright and translation rights 2008 – 2022 by Peter Jockisch.

All brand names, trademarks and work titles listed are the property of their respective owners.