Imprint



Domain owner and responsible for content according to § 55 RStV
for Study-​of-​Languages-​with-​Computer-​and-​Internet.com:

Peter Jockisch
Habsburgerstraße 11
[alternative spelling: Habsburgerstrasse 11]
D-79104 Freiburg i.Br.
Germany

Telephone landline: Germany + (7 61) 55 14 68

E-Mail: info@Study-of-Languages-with-Computer-and-Internet.com

VAT ID:


According to legal requirements for imprints, a phone number must be stated; however,
please, read the notes on communication.

The OpenPGP-key is available in the imprint column of my personal site, peterjockisch.de.
There are also biographical notes available.

The European Commission provides a platform for out-of-court online dispute resolution at www.ec.europa.eu/consumers/odr. We are neither obliged nor willing to participate in the dispute resolution procedure.





Dear Site Visitors,

Thank you for your interest! I appreciate any feedback and constructive criticism.

If you would like to establish contact with me, it is advisable to first read the information in the question column, please. Unfortunately, a guaranteed answer cannot be given.


    Peter Jockisch                                                         Frei­burg i.Br., October 29, 2019





Prefered communication medium: Cryptographically signed E-Mail

Currently, the effective protection that can be achieved with publicly available cryptographic technology is highly questionable. Advanced computer technology is likely to be kept out of the public domain in order to keep the intelligence services of the rulers at the forefront of computing power. In addition, software and hardware backdoors probably exist. Officially recommended standardized encryption methods may have inherent mathematical weaknesses: Why should the intelligence services of the Western and Eastern hemispheres recommend and give away self-developed secure algorithms whose use would make their central work, interception and industrial espionage, impossible?

The higher-ranking organisations of those families who stand above the law most probably have an incomparably strong calculating power, which normal users have little to oppose. However, some of the potential attackers under the law can be fended off. The communication security can be increased at least within a certain framework, by consistent use of cryptographic signing.

All my e-mails are always signed cryptographically, with PGP/MIME or a separate signature. I never send unsigned e-mails without any exception. Signatures need to be verified, for example with GnuPG GNU Privacy Guard, www.gnupg.org, MS Windows version: www.gpg4win.org. I only use the key listed in the imprint. PeterJockisch.de is the only official source for my key.


Signature verification with OpenPGP and GnuPG

To view a name and a cryptographical checksum, is not sufficient. For the authen­ti­ca­tion, the signature must be verified. After the initial activation, modern e-mail agents fully and au­to­mat­ically verify in the background.

For the qualified electronic signature, most often, only hardware-based (chipcard) class-3-certificates, certified by legally recognized CAs are accepted by law. However, the re­quired hardware and software infrastructure (available card readers, supported operating sys­tem, e-mail agent, software) is throughout of proprietary nature. This means not check­a­ble and visible and thus, risky under security aspects. If attached to your email, I maybe will use such public X.509- or OpenPGP certificates with my MUA – However, I myself do not sign with such certificates


Cryptographical checksums as alternative proof of authenticity

Some recipients are not familiar with practical encryption and signing, or they have no pos­si­bil­i­ty to use it in their country. In these cases, in addition to the signed e-mail, I write the mes­sage seperately in a “.txt” or “.pdf” file and publicize its checksum in the checksum blog section on PeterJockisch.de, combined with the date of dispatch, sending time and initials indicating the document.



Checksums for files can be created with a single right mouse click, for example with Free Software like Cyohash or Jacksum. More information about the application possibilities can be found in the introductory article “Practical application of cryptographic checksums”.

For verification, the checksum of the attached ".txt" or ".pdf" file must first be formed. You can then check the checksum blog area of PeterJockisch.de to see whether there is an entry with the corresponding checksum for the e-mail date in question. Checksums of my e-mails are published there and only there, nowhere else:

http://www.peterjockisch.de/blog_en/checksums-blog.html.

My e-mail texts do not contain any data on the checksum. That would be completely sense­lessly. Everyone could write an arbitrary file and subsequently copy a checksum of the blog sec­tion into the e-mail text.

SSL/TLS certified site sections will follow.



No telephony, no mobile telephony, no fax

Principally, on a business level, I do not communicate by telephone which is unsuitable for proof of identity. With regard to the authenticity of spoken language, it is suggested to every­one, to inform about “Adobe Voco”, for example by a Google search for “Adobe Voco”.

Telephone information is principally not given. I do not own a mo­bile phone and no fax machine and I deny respective contracts or offers.

Due to telephony being unsuitable for proof of identity and the high risk of im­per­so­na­tion, I only conduct phone calls with immediate family, using landline network only. I prin­ci­pal­ly do not use mobile telephony, SMS or fax.

In many fields (energy production, communication, health etc.), there are beneficial free technologies, methods and procedures, which are not permitted, which are to the present day held blocked. However, future generations will be able to use these technologies and methods.

The currently allowed telephone mobile communication technologies have inherently numerous criti­cal aspects, which are documented in numerous films and articles, amongst oth­ers in the following lecture (held in German) as well as in a documentary:

Further information are also available on diagnose-funk.org and www.chemtrail.de, among others in the “Mo­bil­funk­bro­schü­re” of the comprising information site Chemtrail.de: Do­ku­men­te → Do­ku­men­ten­ar­chiv (PDF‘s+Doc‘s).

The national and international websites of the link lists there, “Links” and “Links zu”, as well as numerous other websites, also including the column “Cell Phone Dangers” of the news portal rense.com, contain detailed information on the subject.

Critical illustrations on the cell phone technology which is permitted by the rulers are avail­a­ble at http://www.deesillustration.com.

I do not engage in discussions, neither on the telephone nor on site. Who has a say may do that in written form, preferably via e-mail. Unfortunately, an answer guarantee can­not be given.


No representatives, no employees

I neither have representatives, nor assistants nor employees who speak for me. I do not work with marketing or advertising space agencies. This will not change in the future. I do not offer any job.

I don't have any representatives and don't work with marketing or advertising space agencies.


No Advertsising E-mails or Letters, no Newsletters, no Product Advertising

Non of my websites sends advertising e-mails or newsletters. I principally do not use newsletters, instead I use consistently RSS news tickers which have numerous ad­van­tages over e-mail newsletters. Introductory article: „Keep up with the News with RSS Feed Readers.“

I principally do not write readers' letters, and do not send any advertising e-mails, ad­ver­tis­ing letters, or news letters.

All information are offered exclusively “passively” on my own official websites. Current news and notifications can be read in news sections and can be obtained via RSS news tickers publicized on my official websites

All websites recommended by me are exclusively listed on my own websites. I do not practise banner exchange.

I neither use Facebook nor Twitter nor MySpace, no eBay, no PayPal, or any other similar services.

General remarks on precautionary measures in e-mail communication: Fraudsters, e-mail spam senders (WP article “Spamming”) and discrediters/eputation-damaging persons often use real e-mail addresses from the Internet to underpin their credibility. The sender name and sender address of an e-mail can easily be forged. In addition, the utmost caution is required when attachments such as .zip files are attached to alleged invoices, credits, declarations of love, faxes, etc., which are intended to lead to ill-considered action and opening of the attachment as a result of emotional turmoil. Forwarding a suspicious email to a third party for analysis is also risky, as it could put you on the list (blacklists) of senders of fraudulent and spam emails fully automatically (via email delivery system analysis procedures) and discredit your own email address. In general, every step should be carefully planned in such cases, as otherwise you run the risk due to ill-considered reactions that those affected by the identity theft (WP article “identity theft”) could also take legal action against you because of damage to their reputation.

All websites recommended by me are exclusively listed on Pe­terJockisch.de, frauenbildnisse.de, frauenbildnisse.com, mathebildnis.com, dokumente-des-deutschen-reichs.de, as well as on Pe­terJockisch.com. I do not practise banner exchange. “Business propposals” of any kind are unwanted.



No Collection of Donations, no Appeals for Donations

I don't collect donations: I don't write any donation emails and I don't call for such actions. I do not have a donation function for myself or for my internet pages. I do not send any advertising material for third parties, nor do I send any donation-call e-mails or letters for third parties.

This information is given in order to exclude possible free riders.








October 29, 2019

Copyright 2008–2019 by Peter Jockisch, webmaster@peterjockisch.de

All listed brand names, trademarks and work titles are the property of their respective owners
For this translated article version DeepL (DeepL.com) was used extensively.

The graphics used partly come from external sources. Their authors are known by name and have expressly agreed to their use, per unambiguous license. The images in question contain a corresponding image source reference in the “Alt” or “Title” element that appears when the mouse pointer is moved over them.

A large part of the icons comes from the “Oxy­gen” and “Crystal Project” and is available at “Wikimedia Commons”. Overviews:
“Ca­te­go­ry:Cry­stal Pro­ject” • “Ca­te­go­ry:KDE icons” • “Tan­go icons” • “Category: GNOME Desktop icons” • “Ca­te­go­ry:Icons”

Legal Notices •  Imprint •  Privacy Statement