Site owner Admin-C and responsible
for the content of

Peter Jockisch
Habsburgerstraße 11
[alternative spelling:
Habsburgerstrasse 11]
D-79104 Freiburg i.Br.


OpenPGP key

Dear Site Visitors,

Thank you for your interest! I appreciate any feedback and constructive criticism.

If you would like to establish contact with me, it is advisable to first read the in­for­ma­tion in the question col­umn, please. Unfortunately, a guaranteed answer cannot be giv­en.

    Peter Jockisch                                             Frei­burg i.Br., December 27, 2018

Prefered communication medium: Cryptographically signed E-Mail

Currently, the effective protection made possible by accessible cryptography tech­nol­o­gy is highly ques­tion­a­ble. Real progressive computer technology is most probably held locked for the public, to always ensure the intelligence services of the ruling class a lead in computational power. Furthermore, there are probably software and hardware back­doors. Officially rec­om­mended standardized encryption algorithms probably have in­her­ent mathematical weak­nesses: Why should the intelligence agencies of the West­ern and Eastern hemisphere recommend self-developed secure algorithms and give them away, algorithms, whose use would make their work of eavesdropping and in­dus­tri­al espionage impossible?

The higher-ranking organizations of those families who are above the law have most like­ly an incomparable computational power at their disposal, which the average user has only less to set against. However, a part of those possible attackers which are un­der the law, can be re­pelled. At least, the communication security can be increased to a certain extent, through con­sist­ent use of cryptographic signing.

All of my e-mails are cryptographically signed with PGP/MIME or a separate signature. With­out exception, I never send any unsigned e-mail. Signatures must be verified, with GnuPG (GNU Privacy Guard,, MS-Windows version:, for example. I only use the key with the listed data. is the only official source for obtaining my key.

Signature verification with OpenPGP and GnuPG

To view a name and a cryptographical checksum, is not sufficient. For the authen­ti­ca­tion, the signature must be verified. After the initial activation, modern e-mail agents fully and au­to­mat­ically verify in the background.

For the qualified electronic signature, most often, only hardware-based (chipcard) class-3-certificates, certified by legally recognized CAs are accepted by law. However, the re­quired hardware and software infrastructure (available card readers, supported operating sys­tem, e-mail agent, software) is throughout of proprietary nature. This means not check­a­ble and visible and thus, risky under security aspects. If attached to your email, I maybe will use such public X.509- or OpenPGP certificates with my MUA – However, I myself do not sign with such certificates

Cryptographical checksums as alternative proof of authenticity

Some recipients are not familiar with practical encryption and signing, or they have no pos­si­bil­i­ty to use it in their country. In these cases, in addition to the signed e-mail, I write the mes­sage seperately in a “.txt” or “.pdf” file and publicize its checksum (SHA-1 or GOST) in the site blog section on, combined with the date of dispatch, sending time and initials indicating the document.

For the verification, the checksum of the attached “txt”- respective “pdf”-file has to be cre­ated first. Then you can look in the checksums blog section of, if there is an entry with a corresponding checksum for the concerned e-mail sending day. There and only there are checksums of my e-mails publicized, nowhere else:

Use, for instance, temporarily one of the official Firefox extensions, e.g. ShowIP, for let­ting you show the IP address.

My e-mail texts do not contain any data on the checksum. That would be completely sense­lessly. Everyone could write an arbitrary file and subsequently copy a checksum of the blog sec­tion into the e-mail text.

SSL/TLS certified site sections will follow.

No telephony, no mobile telephony, no fax

Principally, on a business level, I do not communicate by telephone which is unsuitable for proof of identity. With regard to the authenticity of spoken language, it is suggested to every­one, to inform about “Adobe Voco”, for example by a Google search for “Adobe Voco”.

Telephone information is principally not given. I do not own a mo­bile phone and no fax machine and I deny respective contracts or offers.

Due to telephony being unsuitable for proof of identity and the high risk of im­per­so­na­tion, I only conduct phone calls with immediate family, using landline network only. I prin­ci­pal­ly do not use mobile telephony, SMS or fax.

In many fields (energy production, communication, health etc.), there are beneficial free technologies, methods and procedures, which are not permitted, which are to the present day held blocked. However, future generations will be able to use these technologies and methods.

The currently allowed telephone mobile communication technologies have inherently numerous criti­cal aspects, which are documented in numerous films and articles, amongst oth­ers in the following lecture (held in German) as well as in a documentary:

Further information are also available on and, among others in the “Mo­bil­funk­bro­schü­re” of the comprising information site Do­ku­men­te → Do­ku­men­ten­ar­chiv (PDF‘s+Doc‘s).

The national and international websites of the link lists there, “Links” and “Links zu”, as well as numerous other websites, also including the column “Cell Phone Dangers” of the news portal, contain detailed information on the subject.

Critical illustrations on the cell phone technology which is permitted by the rulers are avail­a­ble at

I do not engage in discussions, neither on the telephone nor on site. Who has a say may do that in written form, preferably via e-mail. Unfortunately, an answer guarantee can­not be given.

No representatives, no employees

I neither have representatives, nor assistants nor employees who speak for me. This will not change in the future. I do not offer any job.

No advertising, no advertsising e-mails or letters, no newsletters, no product advertising

Non of my websites sends advertising e-mails or newsletters. I principally do not use newsletters, instead I use consistently RSS news tickers which have numerous ad­van­tages over e-mail newsletters. Introductory article: „Keep up with the News with RSS Feed Readers.“.

I principally do not write readers' letters, and do not send any advertising e-mails, ad­ver­tis­ing letters, or news letters.

All information are offered exclusively “passively” on my own websites. Current news and notifications can be read in news sections and can be obtained via RSS news tickers publicized on my official websites

I neither use Facebook nor Twitter nor MySpace, no eBay, no PayPal, or any other similar services.

General notes on precautions for the e-mail communication: Fraudsters, senders of spam e-mails (WP article “Spamming”) as well as discreditors/reputation damagers not sel­dom use real e-mail addresses they found in the Internet, for enhancing their cred­i­bil­i­ty. The sender's name and e-mail address can be easily falsified. There must be highest caution, if attachments are enclosed, such as, for example, .zip-files on alleged bills, cred­its, declarations of love, faxes etc., which shall misguide to hasty/imprudent action and to the opening of the attachment, as a result of emotional turmoil. The forwarding of a suspicious e-mail to third parties, for the purpose of an analyse, is also risky as you could fully automatically (by analysis methods of e-mail delivering systems) be put on the list (blacklists) of senders of fraud and spam e-mails, and a discrediting of your own e-mail address could be the result. In general, each step should be planned carefully in such cases as you could otherwise risk, due to inconsiderately reactions, that those be­ing affected by the done identity theft (WP article “identity theft”) also could take legal ac­tions against you, concerning reputational damage.

All websites recommended by me are exclusively listed on Pe­,,,,, as well as on Pe­ I do not practise banner exchange. “Business propposals” of any kind are unwanted.

No collection of donations, no appeals for donations

I do not collect in any form donations: I do not write any kind of donation e-mail and I principally do not appeal for such actions. I do not offer any donation possibility for me or for my web­sites. I do not send any promotional e-mail for third parties or their web­sites, nor do I send any kind of donation e-mail or mail for third parties.

This notice is given in order to exclude possible free riders.

Official Internet presences and publication platforms, technical aspects

A move on an own server will follow.

I solely publicize contents in the Internet via the Hetzner Online GmbH (English version), I do not use any other webhoster. An exception to this are only my user ac­count at, “”, under which exclusively copyright-​free his­tori­cal documents are pub­li­cized, and my Youtube channel “Peter Jockisch”, on which no portrait photos are publicized.

Here are the only authorized websites of Peter Jockisch, on which photos, videos and audio files are publicized:

Official and solely used websites

Domain, URL Theme Language

Personal Site

DE / EN Planned as accompanying site on commercial e-books DE / EN Articles on school math,
opening in 2017
EN Portrait drawing and -photography (under construction) DE Portrait drawing and -photography (under construction) EN Original documents, free of copyright (under construction) DE / EN

Copyright 2008–2018 by Peter Jockisch,
All listed brand names, trademarks and work titles are the property of their respective owners
Legal Notifications •  Imprint •  Privacy Statement •  Biographical Notes