40 lines
1.2 KiB
HTML
40 lines
1.2 KiB
HTML
<!DOCTYPE html>
|
|
<html>
|
|
<head>
|
|
<title>Inferencium Network - Contact</title>
|
|
<link rel="stylesheet" href="../infnet.css">
|
|
</head>
|
|
<body>
|
|
<h1>Contact</h1>
|
|
<br>
|
|
<h2>E2EE contact methods</h2>
|
|
<br>
|
|
<h3>Preferred</h3>
|
|
<p>Whenever possible, use the following contact methods;<br>
|
|
they allow verification to mitigate man-in-the-middle attacks,<br>
|
|
have solid security, and reasonable privacy.<br>
|
|
<br>
|
|
<p>Use the keys for each contact method to verify my devices.<br>
|
|
Note that verification does not verify a person, only their devices,<br>
|
|
and can be defeated via coercion or other force.</p>
|
|
<br>
|
|
<p>- <a href="contact-pgp.html">PGP</a><p>
|
|
<p>- <a href="contact-signal.html">Signal</a><p>
|
|
<p>- <a href="contact-xmpp.html">XMPP</a><p>
|
|
<p>- <a href="contact-wire.html">Wire</a><p>
|
|
<p>- <a href="contact-threema.html">Threema</a></p>
|
|
<br>
|
|
<h3>Metadata-free</h3>
|
|
<p>If metadata leakage is an issue for you, you can use the following<br>
|
|
contact methods. Note that these services do not have verification<br>
|
|
functionality, and will be treated as less secure.</p>
|
|
<br>
|
|
<p>- <a href="contact-briar.html">Briar</a></p>
|
|
<p>- <a href="contact-session.html">Session</a></p>
|
|
<br>
|
|
<br>
|
|
<br>
|
|
<a href="../index.html">Back</a>
|
|
</body>
|
|
</html>
|