update: webpage "Contact" "10.1.1-beta.1" > "10.2.0-beta.1"

This commit is contained in:
inference 2025-06-26 19:17:50 +00:00
parent e979f7ac80
commit 820f45089b
Signed by: inference
SSH Key Fingerprint: SHA256:/O3c09/4f1lh4zrhFs2qvQEDda6dZbTwG9xEcj8OfWo

View File

@ -1,7 +1,7 @@
<!DOCTYPE html> <!DOCTYPE html>
<!-- Inferencium - Website - Contact --> <!-- Inferencium - Website - Contact -->
<!-- Version: 10.1.1-beta.1 --> <!-- Version: 10.2.0-beta.1 -->
<!-- Copyright 2022 Jake Winters --> <!-- Copyright 2022 Jake Winters -->
<!-- SPDX-License-Identifier: BSD-3-Clause --> <!-- SPDX-License-Identifier: BSD-3-Clause -->
@ -34,50 +34,37 @@
<nav id="toc"> <nav id="toc">
<h2><a href="#toc">Table of Contents</a></h2> <h2><a href="#toc">Table of Contents</a></h2>
<ul> <ul>
<li><a href="#e2ee">End-to-end encrypted contact methods</a></li> <li><a href="#e2ee">End-to-end-encrypted Contact Methods</a></li>
<ul>
<li><a href="#e2ee-preferred">Preferred</a></li>
<!--<li><a href="#e2ee-metadatafree">Metadata-free</a></li>-->
</ul>
<!--<li><a href="#non-private" class="body-link">Non-private Contact Methods</a></li>-->
</ul> </ul>
</nav> </nav>
<section id="e2ee"> <section id="e2ee">
<h2><a href="#e2ee">End-to-end Encrypted Contact Methods</a></h2> <h2><a href="#e2ee">End-to-end-encrypted Contact Methods</a></h2>
<section id="e2ee-preferred"> <p>Whenever possible, use the following contact methods; they allow verification to mitigate
<h3><a href="#e2ee-preferred">Preferred</a></h3> man-in-the-middle attacks, have high security, and reasonable privacy.</p>
<p>Whenever possible, use the following contact methods; they allow verification to mitigate <p><strong>Use the
man-in-the-middle attacks, have high security, and reasonable privacy.</p> <a href="key.xhtml">keys</a>
<p><strong>Use the for each contact method to verify my devices.</strong></p>
<a href="key.xhtml">keys</a> <p>Note: Verification does not verify a person, only their devices, and can be defeated via
for each contact method to verify my devices.</strong></p> coercion or other force.</p>
<p>Note: Verification does not verify a person, only their devices, and can be defeated via <p><img src="asset/img/logo/simplex.png" class="logo-small" width="40" height="40" alt="SimpleX logo"/>SimpleX</p>
coercion or other force.</p> <ul>
<p><img src="asset/img/logo/signal.png" class="logo-small" width="40" height="40" alt="Signal logo"/>Signal</p> <li><a href="https://smp9.simplex.im/a#oe5dMuaJu0qUg7aFqkqp-rXzP18oWh0gsMbhNIwUKqE">Inference</a></li>
<ul> </ul>
<li><a href="https://signal.me/#eu/rXOem_06yX9bsIXE2IM4wAqu6MdZKrEeepdhm28bo0M82s2UXo1GHrew2grpTIkJ">inference.01</a></li>
</ul>
<p><img src="asset/img/logo/xmpp.png" class="logo-small" width="40" height="40" alt="XMPP logo"/>XMPP</p>
<ul>
<li><a href="xmpp://inference@inferencium.net">inference@inferencium.net</a> (Main) - (<a href="key.xhtml#xmpp-inferencium">Key</a>)</li>
</ul>
</section>
<!-- <!--
<section id="e2ee-metadatafree"> <p><img src="asset/img/logo/xmpp.png" class="logo-small" width="40" height="40" alt="XMPP logo"/>XMPP</p>
<h3><a href="#e2ee-metadatafree">Metadata-free</a></h3> <ul>
<p>If metadata leakage is an issue for you, you can use the following contact methods.</p> <li><a href="xmpp://inference@inferencium.net">inference@inferencium.net</a> (Main) - (<a href="key.xhtml#xmpp-inferencium">Key</a>)</li>
<p>These services do not have verification functionality and will be treated as less secure; </ul>
<strong>unless you really need to use these services, use a preferred method
instead.</strong></p>
</section>
<section id="nonprivate">
<h2><a href="#nonprivate" class="h2">Non-private Contact Methods</a></h2>
<p>The following contact methods do not utilise end-to-end encryption, or I do not use
such functionality; they are suitable for public contact only, including directly and
groups. Do not use these methods if confidentiality and/or privacy is required.</p>
</section>
--> -->
</section> </section>
<!--
<section id="nonprivate">
<h2><a href="#nonprivate" class="h2">Non-private Contact Methods</a></h2>
<p>The following contact methods do not utilise end-to-end encryption, or I do not use
such functionality; they are suitable for public contact only, including directly and
groups. Do not use these methods if confidentiality and/or privacy is required.</p>
</section>
-->
<div class="sitemap-small"><a href="sitemap.xhtml">Sitemap</a></div> <div class="sitemap-small"><a href="sitemap.xhtml">Sitemap</a></div>
</body> </body>
</html> </html>