Contact Information for

Owner: Elmar Stellnberger
Snail-Mail: Ringmauergasse 2
9500 Villach
Email:   (alternative email:
SIP:     43 720 513 688
TEL: 0043 720 513 688 (keep it ringing for some time until all physical telephones are served one after another)
online-GnuPG/PGP-key: estellnb.revoke.asc   (please follow the guidelines below.)
online-GnuPG/PGP-key fingerprint: 41B8007354A9AE206BC1 011EA8FD357202530C63
offline-GnuPG/PGP-key: estellnb-offline.revoke.asc   (please follow the guidelines below.)
offline-GnuPG/PGP-key fingerprint: 4D9849BF06D85D11CF34 6A90E4B931909981E39D
Never use the key with ID F515A0D2 (; this key has not been issued by and does not belong to Elmar Stellnberger!

It is up to you whether you wanna use our secure key for online encryption (3072bit) or our offline-key with 4096bit. You need to comply with the same security precautions as we do when using these keys! To gain the best achievable security you may first encrypt with our offline key and then wrap the result another time with our online key; please add in plain text to the message that it has been double encrypted (both decryption processes will then be held offline). However if encrypted twice or offline you may need to wait longer for our response. While our offline key is stored in RAM it can never be fully protected from theft. That is why we have an online key that is securely stored on a smart card.



Instructions on how to use the GPG key

Please make sure that you

  1. Obtain a genuine copy of our public gpg key.
  2. Do not encrypt or store private keys on a computer which is online but not protected sufficiently (for details please read our article about GnuPG!).
  3. Always keep your private key with you (f.i. on an USB stick) / Never leave it unattended.
  4. Try to avoid using a computer which could have been compromised even if that computer is offline.
  5. Include your own public key for a response.
  6. To stay anonymous you may use a throwaway e-mail via Tor.
  7. Tell us that you have complied with these instructions.
  8. The most sensitive information may require a secure destruction of the private key after the message has been read.

If you should have sent us an encrypted message we will send you another message with the content 'ACK' back timely. It will indicate that we have received the message in deed. However we will likely not have read your message until then yet!

More detailed instructions on what to do can be fetched via software/GnuPG-usage.html.en.