From 1c58b9707e49f4a2002fc9ef3f634bef9d2489f6 Mon Sep 17 00:00:00 2001
From: inference Whenever possible, use the following contact methods; they
allow verification to mitigate man-in-the-middle attacks, have
high security, and reasonable privacy.Contact
End-to-end Encrypted Contact Methods
+ End-to-end Encrypted Contact Methods
Preferred
+ Preferred
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other force.
-Signal
+
Signal
XMPP
+
XMPP