Add table of contents.
This commit is contained in:
parent
930ebb8fc3
commit
583f83f0b3
28
contact.html
28
contact.html
@ -5,7 +5,7 @@
|
|||||||
<!-- Copyright 2022-2023 Jake Winters -->
|
<!-- Copyright 2022-2023 Jake Winters -->
|
||||||
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
|
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
|
||||||
|
|
||||||
<!-- Version: 3.0.0.18 -->
|
<!-- Version: 3.0.0.19 -->
|
||||||
|
|
||||||
|
|
||||||
<html>
|
<html>
|
||||||
@ -36,6 +36,23 @@
|
|||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
|
|
||||||
|
<!-- Table of contents. -->
|
||||||
|
<h2 id="toc"><a href="#toc" class="h2"
|
||||||
|
>Table of Contents<a/></h2>
|
||||||
|
<ul>
|
||||||
|
<li><a class="body-link" href="#e2ee"
|
||||||
|
>End-to-end encrypted contact methods</a></li>
|
||||||
|
<ul>
|
||||||
|
<li><a class="body-link" href="#e2ee-pref"
|
||||||
|
>Preferred</a></li>
|
||||||
|
<li><a class="body-link" href="#e2ee-metadata"
|
||||||
|
>Metadata-free</a></li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
<!-- Place end-to-end encrypted contact methods here. -->
|
<!-- Place end-to-end encrypted contact methods here. -->
|
||||||
<!-- Contacts should be encouraged to use these contact methods. -->
|
<!-- Contacts should be encouraged to use these contact methods. -->
|
||||||
<strong>Notes:</strong>
|
<strong>Notes:</strong>
|
||||||
@ -44,9 +61,11 @@
|
|||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<h2>End-to-end Encrypted Contact Methods</h2>
|
<h2 id="e2ee"><a href="#e2ee" class="h2"
|
||||||
|
>End-to-end Encrypted Contact Methods</a></h2>
|
||||||
<br>
|
<br>
|
||||||
<h3>Preferred</h3>
|
<h3 id="e2ee-pref"><a href="#e2ee-pref" class="h3"
|
||||||
|
>Preferred</a></h3>
|
||||||
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
|
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
|
||||||
attacks, have high security, and reasonable privacy.<br>
|
attacks, have high security, and reasonable privacy.<br>
|
||||||
<br>
|
<br>
|
||||||
@ -70,7 +89,8 @@
|
|||||||
<br>
|
<br>
|
||||||
<!-- Place metadata-free contact methods here. -->
|
<!-- Place metadata-free contact methods here. -->
|
||||||
<!-- Clarify that preferred methods should be used whenever possible. -->
|
<!-- Clarify that preferred methods should be used whenever possible. -->
|
||||||
<h3>Metadata-free</h3>
|
<h3 id="e2ee-metadata"><a href="#e2ee-metadata" class="h3"
|
||||||
|
>Metadata-free</h3>
|
||||||
<p>If metadata leakage is an issue for you, you can use the following contact methods.<br>
|
<p>If metadata leakage is an issue for you, you can use the following contact methods.<br>
|
||||||
<br>
|
<br>
|
||||||
Note: These services do not have verification functionality and will be treated as less secure; <strong>unless
|
Note: These services do not have verification functionality and will be treated as less secure; <strong>unless
|
||||||
|
Loading…
x
Reference in New Issue
Block a user