diff --git a/blog.html b/blog.html index ff2aa07..9238b3d 100644 --- a/blog.html +++ b/blog.html @@ -2,24 +2,24 @@ Inferencium Network - Blog - +

Blog


2022-06-30

-

#2 - Untrusted: The Issue with Decentralisation

+

#2 - Untrusted: The Issue with Decentralisation



2022-01-29

-

#1 - systemd Insecurity

+

#1 - systemd Insecurity



2022-01-27

-

#0 - FOSS is Working Against Itself

+

#0 - FOSS is Working Against Itself




-Back +Back diff --git a/contact.html b/contact.html index dbb540b..cce898a 100644 --- a/contact.html +++ b/contact.html @@ -2,7 +2,7 @@ Inferencium Network - Contact - +

Contact

@@ -18,22 +18,22 @@ have solid security, and reasonable privacy.
Note that verification does not verify a person, only their devices,
and can be defeated via coercion or other force.


-

- PGP

-

- Signal

-

- XMPP

-

- Wire

-

- Threema

+

- PGP

+

- Signal

+

- XMPP

+

- Wire

+

- Threema


Metadata-free

If metadata leakage is an issue for you, you can use the following
contact methods. Note that these services do not have verification
functionality, and will be treated as less secure.


-

- Briar

-

- Session

+

- Briar

+

- Session




-Back +Back diff --git a/source.html b/source.html index c260ae3..5e2ddc6 100644 --- a/source.html +++ b/source.html @@ -2,7 +2,7 @@ Inferencium Network - Source - +

Source

@@ -24,6 +24,6 @@


-Back

+Back