Add Key page.

This commit is contained in:
inference 2023-01-13 06:33:30 +00:00
parent 8a22ca0041
commit 1d3482e1bd
Signed by: inference
SSH Key Fingerprint: SHA256:9Pl0nZ2UJacgm+IeEtLSZ4FOESgP1eKCtRflfPfdX9M

92
key.html Normal file
View File

@ -0,0 +1,92 @@
<!DOCTYPE html>
<!-- Inferencium - Website - Key -->
<!-- Copyright 2022-2023 Inference -->
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
<!-- Version: 0.0.0.0 -->
<html>
<head>
<title>Inferencium - Key</title>
<link rel="stylesheet" href="inf.css">
<meta name="viewport" content="width=device-width, initial-scale=1">
</head>
<!-- Navigation bar. -->
<div class="sidebar">
<img src="asset/img/logo-inferencium-no_text.png"
width="110px" height="110px">
<a class="title">Inferencium</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
<div><a href="key.html">Key</a></div>
</div>
<body>
<h1>Key</h1>
<br>
<h2>End-to-end Encrypted Contact Methods</h2>
<br>
<h3>Preferred</h3>
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
attacks, have high security, and reasonable privacy.<br>
<br>
<p>Use the
<a href="key.html"
>keys</a> for each contact method to verify my devices.<br>
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other
force.</p>
<br>
<p><img class="logo-small" src="asset/img/logo-signal.png"
width="40px" height="40px"/>
<a class="body-link" href="contact/signal.html"
>Signal</a><p>
<p><img class="logo-small" src="asset/img/logo-xmpp.png"
width="40px" height="40px"/>
<a class="body-link" href="contact/xmpp.html"
>XMPP</a><p>
<br>
<br>
<!-- Place metadata-free contact methods here. -->
<!-- Clarify that preferred methods should be used whenever possible. -->
<h3>Metadata-free</h3>
<p>If metadata leakage is an issue for you, you can use the following contact methods.<br>
<br>
Note: These services do not have verification functionality and will be treated as less secure; <strong>unless
you really need to use these services, use a preferred method instead.</strong></p>
<br>
<p><img class="logo-small" src="asset/img/logo-briar.png"
width="40px" height="40px"/>
<a class="body-link" href="contact/briar.html"
>Briar</a></p>
<p><img class="logo-small" src="asset/img/logo-session.png"
width="40px" height="40px"/>
<a class="body-link" href="contact/session.html"
>Session</a></p>
<br>
<br>
<br>
<!-- Place non-private contact methods here. -->
<!-- Clarify that these contact methods are for public contact only. -->
<h2>Non-private Contact Methods</h2>
<p>The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they
are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality
and/or privacy is required.</p>
<br>
<p><img class="logo-small" src="asset/img/logo-pleroma.png"
width="40px" height="40px"/>
<a class="body-link" href="https://plr.inferencium.net/inference/"
>Fediverse</a></p>
<br>
<br>
</body>
</html>