Domain owner and responsible for the content according to § 55 RStV for PeterJockisch.com:
Peter Jockisch
Habsburgerstraße 11
79104 Freiburg i.Br.
Germany
Telephone landline: +49 - 761 - 55 14 68
E-Mail: info@peterjockisch.com
OpenPGP key, ID:
6582 1C57 E0EE 47DA C2CA DF62 4AD7 371A C6E6 BE9F
USt-IdNr.:
According to legal requirements for imprints, a telephone number must be provided; however, please refer to the communication notes as well as the questions section .
Die Europäische Kommission stellt eine Plattform für die außergerichtliche Online-Streitbeilegung bereit, unter www.ec.europa.eu/consumers/odr. Wir sind weder verpflichtet noch dazu bereit, an dem Streitschlichtungsverfahren teilzunehmen.
Currently, the effective protection that can be achieved with publicly available cryptographic technology is highly questionable. Advanced computer technology is likely to be kept out of the public domain in order to keep the intelligence services of the rulers at the forefront of computing power. In addition, software and hardware backdoors probably exist. Officially recommended standardized encryption methods may have inherent mathematical weaknesses: Why should the intelligence services of the Western and Eastern hemispheres recommend and give away self-developed secure algorithms whose use would make their central work, interception and industrial espionage, impossible?
The higher-ranking organisations of those families who stand above the law most probably have an incomparably strong calculating power, which normal users have little to oppose. However, some of the potential attackers under the law can be fended off. The communication security can be increased at least within a certain framework, by consistent use of cryptographic signing.
Peter Jockisch ’s entire e-mail is without exception always cryptographically signed, with PGP/MIME or a separate signature. the author never sends unsigned e-mail, without any exception. Signatures must be verified, for example with GnuPG GNU Privacy Guard, www.gnupg.org, MS-Windows version: www.gpg4win.org. Peter Jockisch uses only the key listed above, PeterJockisch.com and PeterJockisch.de are the only official sources for his key.
It is not enough to see a name and a cryptographic signature. For authenticity verification, the signature must actually be verified. Modern e-mail programs verify fully automatically in the background, after initial activation.
For the qualified electronic signature, only class 3 certificates issued by legally recognized CAs on a hardware basis (smart card) are legally recognized. The required hardware and software infrastructure (available card readers, supported operating system, e-mail program, software) is, however, entirely proprietary in nature, i.e., not publicly viewable and verifiable, and thus subject to security concerns. If attached to your e-mail, the author may use such public X.509 or OpenPGP certificate parts in his MUA, but he does not sign with such certificates himself.
Message recipients are sometimes not familiar with applied cryptography and signing, or they have no possibility to use it in their country. In such cases, in addition to the signed e-mail, the message may be copied separately to a ".txt" or ".pdf" file and the checksum published in the checksum list on PeterJockisch.de, combined with the date, time and initials used to identify the document.
Checksums to files can be created with a single right mouse click, for example with Free Software like Cyohash or Jacksum. More information about the possible applications can be found in the introductory article “Practical application of cryptographic checksums”.
For verification, the checksum of the attached “.txt” or “.pdf” file must first be formed. Afterwards you can check in the checksum list of PeterJockisch.de whether there is an entry with a corresponding checksum for the respective e-mail dispatch day. There and only there checksums of the E-Post are published, nowhere else.
E-mail texts do not contain any information about the checksum, of course. That would be completely pointless. Anyone could write any file and then copy a checksum from the checksum list area into the email text. “Practical Application of Cryptographic Checksums” contains an easy-to-understand introduction to the subject.
SSL/TLS certified page sections will follow.
Peter Jockisch generally does not communicate on a business level via telephone, which is not very suitable for proof of identity; the telephone number is listed exclusively due to legal requirements. Regarding the authenticity of spoken language, everyone is encouraged to read the WP article “Adobe Voco”.
Information is generally not provided by telephone. The author does not own a cell phone or a fax machine in principle and rejects corresponding contracts or offers.
Since telephony is absolutely unsuitable for proof of identity - anyone can impersonate anyone — he only makes telephone calls within the closest circle of friends and family, and this exclusively in the landline network. As a matter of principle, he does not use mobile telephony, SMS and fax.
There are beneficial free technologies, methods and processes in many areas (energy generation, communication, health, etc.) that are still blocked today, not allowed. However, future generations will be able to use these technologies and methods.
The currently allowed telephone mobile technologies have numerous critical aspects, which are documented in numerous films and articles and among others in the following central lecture: “Dr med Joachim Mutter Mobilfunk und Gesundheit” (53 min., Youtube) - Search: “Mobilfunkschutz”, auf kla.tv.
Further information is also available in the articles of the site diagnose-funk.org. The national and international net pages of the reference list there as well as numerous other net presences, among others also the section “Cell Phone Dangers” of the news portal rense.com, contain detailed information on the subject.
Peter Jockisch does not get involved in discussions, neither on the phone nor on site. Anyone who has something to say to him should do so in writing, preferably by electronic mail. An answer guarantee can unfortunately not be given.
The author does not have representatives or assistants or other employees who speak for him. He does not work with marketing or advertising space placement agencies. This will not change in the future. No jobs are offered and no work is given.
PeterJockisch.com does not publish or post documents from third parties or from authors other than Peter Jockisch and does not have time to write reviews. Photo applications or applications of any other kind are not welcome.
Peter Jockisch's websites do not send any advertising e-mails or circular e-mails (or newsletters) as a matter of principle.
The author writes basically no letters to the editor, and sends basically no advertising letters or circulars.
All information is offered exclusively “passively” on his own, official web pages (PeterJockisch.com, PeterJockisch.de); exclusively in page-own news columns and over RSS news ticker (introduction article).
The author does not use Twitter, Facebook or any other similar third party services, with the exception of the Skype account, the Youtube account and his Archive.org account.
General comments on precautions for e-mail communication: Scammers, e-mail spam senders (WP article “Spam”), and discreditors/reputation damagers not infrequently make use of real e-mail addresses from the Internet to back up their credibility. The sender name and sender address of an e-mail can be easily faked. In addition, extreme caution is advised when attachments are included, such as .zip files for alleged invoices, loans, declarations of love, fax transmissions, etc., which are intended to tempt people to act rashly and open the attachment as a result of emotional turmoil. Forwarding a suspicious e-mail to a third party for analysis is also risky, as this could automatically (via e-mail delivery system analysis procedures) put you on the list (blacklists) of senders of fraudulent and spam e-mails, and could result in discrediting your own e-mail address. In general, every step should be carefully planned in such cases, as otherwise you run the risk, due to ill-considered reactions, that those affected by the identity theft that has taken place (WP article “Identity theft”) could also take legal action against you, due to damage to your reputation.
Peter Jockisch does not collect donations, he does not write any donation e-mails and in principle does not call for such actions. He does not run any donation function for himself or for his websites. He does not send any advertising material for third parties, and no donation appeal e-mails or letters are sent for third parties.
This note is made in order to exclude possible free riders.
PeterJockisch.com
Habsburgerstraße 11
79104 Freiburg
Germany
info@peterjockisch.com
OpenPGP key