From 3d6343043c1a86a554b596d09d94a74922a99523 Mon Sep 17 00:00:00 2001
From: inference Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
- attacks, have high security, and reasonable privacy. Use the
- keys for each contact method to verify my devices. Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other
force.
+
If metadata leakage is an issue for you, you can use the following contact methods.Key
- End-to-end Encrypted Contact Methods
-
- Preferred
-
-
-
- Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other
+
-
- Signal
End-to-end Encrypted Contact Methods
+
-
-
- Metadata-free
-
+ File and Git Signing
- Note: These services do not have verification functionality and will be treated as less secure; unless
- you really need to use these services, use a preferred method instead.
- Briar
- Session
The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they - are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality - and/or privacy is required.
-