Properly indent code.

This commit is contained in:
inference 2023-04-11 17:22:49 +01:00
parent d5a41a9e2d
commit 302e5178f7
Signed by: inference
SSH Key Fingerprint: SHA256:9Pl0nZ2UJacgm+IeEtLSZ4FOESgP1eKCtRflfPfdX9M

View File

@ -5,19 +5,19 @@
<!-- Copyright 2022 Jake Winters --> <!-- Copyright 2022 Jake Winters -->
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear --> <!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
<!-- Version: 3.0.1.20 --> <!-- Version: 3.0.2.21 -->
<html> <html>
<head> <head>
<title>Inferencium - Contact</title> <title>Inferencium - Contact</title>
<link rel="stylesheet" href="inf.css"> <link rel="stylesheet" href="inf.css">
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
</head> </head>
<!-- Navigation bar. --> <!-- Navigation bar. -->
<div class="sidebar"> <div class="sidebar">
<img src="asset/img/logo-inferencium-no_text.png" <img src="asset/img/logo-inferencium-no_text.png"
width="110px" height="110px"> width="110px" height="110px">
<a class="title">Inferencium</a><br> <a class="title">Inferencium</a><br>
@ -28,9 +28,9 @@
<div><a href="blog.html">Blog</a></div> <div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div> <div><a href="source.html">Source</a></div>
<div><a href="key.html">Key</a></div> <div><a href="key.html">Key</a></div>
</div> </div>
<body> <body>
<h1>Contact</h1> <h1>Contact</h1>
<br> <br>
<br> <br>
@ -61,19 +61,21 @@
<br> <br>
<br> <br>
<br> <br>
<h2 id="e2ee"><a href="#e2ee" class="h2" <h2 id="e2ee"><a href="#e2ee" class="h2"
>End-to-end Encrypted Contact Methods</a></h2> >End-to-end Encrypted Contact Methods</a></h2>
<br> <br>
<h3 id="e2ee-pref"><a href="#e2ee-pref" class="h3" <h3 id="e2ee-pref"><a href="#e2ee-pref" class="h3"
>Preferred</a></h3> >Preferred</a></h3>
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle <p>Whenever possible, use the following contact methods; they allow verification
attacks, have high security, and reasonable privacy.<br> to mitigate man-in-the-middle attacks, have high security, and reasonable
privacy.<br>
<br> <br>
<p><strong>Use the <p><strong>Use the
<a class="body-link" href="key.html" <a class="body-link" href="key.html"
>keys</a> for each contact method to verify my devices.</strong><br> >keys</a> for each contact method to verify my devices.</strong><br>
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other Note: Verification does not verify a person, only their devices, and can be
force.</p> defeated via coercion or other force.</p>
<br> <br>
<p><img class="logo-small" src="asset/img/logo-signal.png" <p><img class="logo-small" src="asset/img/logo-signal.png"
width="40px" height="40px"/> Signal<br> width="40px" height="40px"/> Signal<br>
@ -114,6 +116,6 @@
and/or privacy is required.</p> and/or privacy is required.</p>
<br> <br>
<br>--> <br>-->
</body> </body>
</html> </html>