Informações de Contato para www.elstel.org


editor: Dipl.-Ing. Elmar Stellnberger
correio normal:
Ringmauergasse 2
9500 Villach
Austria

E-mail: estellnb@elstel.org  
Jabber: estellnb@elstel.info  (estellnb@elstel.org está sendo descontinuado)
SIP/[TEL]:     [00] 43 720 513 688
telefono fixo: 0043 463 266390 (durante a semana)
privado:
Nautilusweg 5/1
9020 Klagenfurt
Österreich / Austria EU

informações de doação

dono da conta: Elmar Stellnberger
IBAN: DE23100110012621227393
BIC: NTSBDEB1XXX
Paypal: paypal.me/estellnb try to use this in case you can not make a bank transfer
www.elstel.org, página de índice

Jabber

(para conversar com um cliente xmpp como Gajim (bom plugin anti-spam, para verificação manual de certificados com a̅tea use gajim v1.2.0), Pidgin ou Empathy)

gpg/pgp

online-GnuPG/PGP-key: estellnb.revoke.asc   (please follow the guidelines below.)
online-GnuPG/PGP-key fingerprint: 41B8007354A9AE206BC1 011EA8FD357202530C63
offline-GnuPG/PGP-key: estellnb-offline.pubkey.asc   (please follow the guidelines below.)
offline-GnuPG/PGP-key fingerprint: A6975E6D3E8EFA7DF8E9   BD4CEEA646266F18B461
Never use the key with ID F515A0D2 (elstel@aon.at); this key has not been issued by elstel.org and does not belong to Elmar Stellnberger! The key 8F026D4725B056DA66BD  BA960B81C3D53245A7F4 has been compromized.

It is up to you whether you wanna use our secure key for online encryption (3072bit) or our offline-key with 4096bit. You need to comply with the same security precautions as we do when using these keys! In the meantime both keys have been secured via gpg-smartcard. You may need to wait somewhat longer when you send us an encrypted message (possibly longer for the offline key).

visit www.elstel.org

Instructions on how to use the GPG key

Please make sure that you

  1. Obtain a genuine copy of our public gpg key.
  2. Do not encrypt or store private keys on a computer which is online but not protected sufficiently (for details please read our article about GnuPG!).
  3. Always keep your private key with you (f.i. on an USB stick) / Never leave it unattended.
  4. Try to avoid using a computer which could have been compromised even if that computer is offline.
  5. Include your own public key for a response.
  6. To stay anonymous you may use a throwaway e-mail via Tor.
  7. Tell us that you have complied with these instructions.
  8. The most sensitive information may require a secure destruction of the private key after the message has been read.

If you should have sent us an encrypted message we will send you another message with the content 'ACK' back timely. It will indicate that we have received the message in deed. However we will likely not have read your message until then yet!

More detailed instructions on what to do can be fetched via software/GnuPG-usage.html.en.

visit www.elstel.org