͏a̅tea has been extended for SNI (Server Name Indication). This is necessary to download from sites like elstel.org where one server hosts different domains each with its own certificate. The scripts in /DANE/ have also been extended to support SNI.
Infelizmente, alguém invadiu nossas contas de e-mail e redefiniu a senha para que não possamos mais acessar nossas próprias contas de e-mail. Agora isso aconteceu pela segunda vez. Em 12-02 2020, percebemos que a senha para elmar@elstel.org já havia sido redefinida no passado, em 16/03 2020 a senha para ambas as contas elmar@elstel.org e estellnb@elstel.org havia sido redefinida. O suporte do nosso hoster, Dotplex, se recusa a investigar o problema. Até agora, todos os emails foram também encaminhados automaticamente para no-reply@elstel.org, onde os serviços secretos podem ler os emails. Supomos que alguém tenha quebrado intencionalmente nossas contas para eliminar um email indesejado. Se você nos enviou um email, mas não obteve resposta até agora, envie-o novamente, mas apenas para elmar@elstel.org, o endereço de email particular do autor. estellnb@elstel.org permanecerá o endereço público dos emails para elstel.org. No entanto, a partir de agora, esse endereço será completamente não blindado, para que não possamos mais detectar e-mails eliminados.
Unfortunately someone has intruded into our email accounts and reset the password there so that we could no more access our own email accounts. Now this has happened for the second time. On 2020-02-12 we realized that the password for elmar@elstel.org had already been reset in the past, on 2020-03-16 the password for both accounts elmar@elstel.org and estellnb@elstel.org had been reset. The support of our hoster, Dotplex refuses to investigate the issue. Up to now all emails had been forwarded to no-reply@elstel.org, where secret services could read the emails. We assume that someone has intentionally broken our accounts to delete an unwanted email. If you have sent us an email but got no response up to now, please send us the email again, but only to elmar@elstel.org, the private email address of the author. estellnb@elstel.org will stay the public address for emails to elstel.org. However this address will from now on be completely unshielded so that we can no more detect deleted emails.
Leider ist jemand in unsere Emailaccounts eingedrungen, indem er das Paßwort zurückgesetzt hat, sodaß wir uns selber nicht mehr einloggen haben können. Das ist bereits das zweite mal, daß das passiert. Vor dem 12.Februar 2020 wurde das Paßwort von elmar@elstel.org zurückgesetzt, am 16.März 2020 das Paßwort von elmar@elstel.org und estellnb@elstel.org. Der Support von Dotplex weigert sich den Vorfall weiter zu untersuchen. Bis jetzt wurden alle Emails an no-reply@elstel.org weitergeleitet, von wo aus sie auch der Geheimdienst lesen kann. Wir nehmen an, daß hier gezielt jemand in unser Konto eingedrungen ist um ein mißliebiges Email zu löschen. Falls Sie uns ein Email gesendet haben, auf das Sie bisher keine Antwort bekommen haben, so senden Sie uns dieses bitte erneut an elmar@elstel.org, die Adresse für private Emails. estellnb@elstel.org ist weiterhin die öffentliche Emailadresse. Diese ist aber ab sofort ungeschützt, sodaß wir das Löschen von Emails hier nicht mehr bemerken würden.