Further redesign.

This commit is contained in:
inference 2022-10-29 01:30:35 +01:00
parent c3dbbb6b57
commit ae0600a5df
11 changed files with 69 additions and 33 deletions

View File

@ -4,27 +4,32 @@
<title>Inferencium Network - About</title>
<link rel="stylesheet" href=infnet.css>
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
<h1>About</h1>
<br>
<p>I am Inference, a cybersecurity researcher based in United Kingdom.<br>
<br>
<p>I write about my research and experience in cybersecurity and also<br>
physical security. Most of my postings are security-related, but I<br>
occasionally post about other aspects of my life.</p>
<p>I write about my research and experience in cybersecurity and also physical
security. Most of my postings are security-related, but I occasionally post
about other aspects of my life.</p>
<br>
<p>I am an open source advocate for the preservation and modifiability of<br>
source code. I believe source code should be considered human knowledge as<br>
much as past knowledge and teachings were; it is how modern humanity<br>
survives and runs. Source code being modifiable allows it to be adapted<br>
for use by anyone, whether to add features, harden it, or provide<br>
<p>I am an open source advocate for the preservation and modifiability of
source code. I believe source code should be considered human knowledge as
much as past knowledge and teachings were; it is how modern humanity
survives and runs. Source code being modifiable allows it to be adapted
for use by anyone, whether to add features, harden it, or provide
accessibility for disabled people.<br>
I am also a modular design advocate for the ability to securely and<br>
robustly make changes to hardware and software without the entire system<br>
I am also a modular design advocate for the ability to securely and
robustly make changes to hardware and software without the entire system
being affected.</p>
<br>
<br>
<br>
<a href="index.html">Back</a>
</body>
</html>

View File

@ -4,34 +4,51 @@
<title>Inferencium Network - Contact</title>
<link rel="stylesheet" href="infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>E2EE contact methods</h2>
<h2>E2EE Contact Methods</h2>
<br>
<h3>Preferred</h3>
<p>Whenever possible, use the following contact methods;<br>
they allow verification to mitigate man-in-the-middle attacks,<br>
<p>Whenever possible, use the following contact methods;
they allow verification to mitigate man-in-the-middle attacks,
have solid security, and reasonable privacy.<br>
<br>
<p>Use the keys for each contact method to verify my devices.<br>
Note that verification does not verify a person, only their devices,<br>
<p>Use the keys for each contact method to verify my devices.
Note that verification does not verify a person, only their devices,
and can be defeated via coercion or other force.</p>
<br>
<p>- <a href="contact/signal.html">Signal</a><p>
<p>- <a href="contact/xmpp.html">XMPP</a><p>
<p>- <a href="contact/threema.html">Threema</a></p>
<p><img class="logo" src="contact/signal.png" width="30px" height="30px"/> <a class="body-link" href="contact/signal.html">Signal</a><p>
<p><img class="logo" src="contact/xmpp.png" width="30px" height="30px"/> <a class="body-link" href="contact/xmpp.html">XMPP</a><p>
<p><img class="logo" src="contact/threema.png" width="30px" height="30px"/> <a class="body-link" href="contact/threema.html">Threema</a></p>
<br>
<h3>Metadata-free</h3>
<p>If metadata leakage is an issue for you, you can use the following<br>
contact methods. Note that these services do not have verification<br>
functionality, and will be treated as less secure.</p>
<p>If metadata leakage is an issue for you, you can use the following
contact methods. Note that these services do not have verification
functionality, and will be treated as less secure; unless you really
need to use these services, use a preferred method instead.</p>
<br>
<p>- <a href="contact/briar.html">Briar</a></p>
<p>- <a href="contact/session.html">Session</a></p>
<p><img class="logo" src="contact/briar.png" width="30px" height="30px"/> <a class="body-link" href="contact/briar.html">Briar</a></p>
<p><img class="logo" src="contact/session.png" width="30px" height="30px"/> <a class="body-link" href="contact/session.html">Session</a></p>
<br>
<h2>Non-private Methods</h2>
<p>The following contact methods do not utilise end-to-end encryption,
or I do not use such functionality; they are suitable for public contact
only, including directly and groups. Do not use these methods if
confidentiality and/or privacy is required.</p>
<br>
<p><img class="logo" src="contact/pleroma.png" width="30px" height="30px"/> <a class="body-link" href="https://plr.inferencium.net/inference/">Fediverse</a></p>
<p><img class="logo" src="contact/twitter.png" width="30px" height="30px"/> <a class="body-link" href="https://twitter.com/inferenceus/">Twitter</a></p>
<br>
<br>
<br>
<a href="index.html">Back</a>
</body>
</html>

BIN
contact/briar.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.9 KiB

BIN
contact/pleroma.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

BIN
contact/session.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 18 KiB

BIN
contact/signal.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 42 KiB

BIN
contact/threema.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 8.0 KiB

BIN
contact/twitter.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.4 KiB

BIN
contact/xmpp.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

View File

@ -12,6 +12,7 @@
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
</body>
</html>

View File

@ -1,11 +1,11 @@
.sidebar {
height: 100%;
width: 250px;
position: absolute;
position: fixed;
left: 0;
top: 0;
padding-top: 40px;
background-color: lightgray;
padding-top: 55px;
background-color: #909090;
text-align: center;
}
@ -22,14 +22,27 @@
font-size: 32px;
}
.body-link {
font-family: Roboto, sans-serif;
font-size: 18px;
color: #ffffff;
}
.logo {
transform: translate(0px, 8px);
}
body {
padding-top: 40px;
margin-left: 400px;
margin-right: 150px;
font-family: Roboto, sans-serif;
background-color: #262626;
}
h1 {
font-family: Roboto, sans-serif;
font-size: 24px;
font-size: 26px;
color: #ffffff;
}