Improve back-end code. Revert to relative paths to ease development. Add section Software I Use.

This commit is contained in:
inference 2022-10-29 23:54:59 +01:00
parent 5f9ac5d80d
commit 824ca5af31
24 changed files with 373 additions and 287 deletions

View File

@ -1,37 +1,105 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - About</title>
<link rel="stylesheet" href=/infnet.css>
<title>Inferencium Network - About</title>
<link rel="stylesheet" href=infnet.css>
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
<h1>About</h1>
<br>
<h3>About Me</h3>
<p>I am Inference, a cybersecurity researcher based in United Kingdom.<br>
<br>
<p>I write about my research and experience in cybersecurity and also physical
security. Most of my postings are security-related, but I occasionally post
about other aspects of my life.</p>
<br>
<p>I am an open source advocate for the preservation and modifiability of
source code. I believe source code should be considered human knowledge as
much as past knowledge and teachings were; it is how modern humanity
survives and runs.<br>
Source code being modifiable allows it to be adapted
for use by anyone, whether to add features, harden it for increased security
and/or privacy, or provide accessibility for disabled users.<br>
I am also a modular design advocate for the ability to securely and
robustly make changes to hardware and software without the entire system
being affected.</p>
<h1>About</h1>
<br>
<h3>About Me</h3>
<p>I am Inference, a cybersecurity researcher based in United Kingdom.<br>
<br>
<p>I write about my research and experience in cybersecurity and also physical
security. Most of my postings are security-related, but I occasionally post
about other aspects of my life.</p>
<br>
<p>I am an open source advocate for the preservation and modifiability of
source code. I believe source code should be considered human knowledge as
much as past knowledge and teachings were; it is how modern humanity
survives and runs.<br>
Source code being modifiable allows it to be adapted
for use by anyone, whether to add features, harden it for increased security
and/or privacy, or provide accessibility for disabled users.<br>
I am also a modular design advocate for the ability to securely and
robustly make changes to hardware and software without the entire system
being affected.</p>
<br>
<br>
<h3>Software I Use</h3>
<h4>Desktop</h4>
<table>
<tr>
<td>Type</td>
<td>Software</td>
<td>Description</td>
<td>Source model (License)</td>
</tr>
<tr>
<td>Operating system</td>
<td><img src="img/logo-gentoo_linux.png" width="100px" height="100px"/><br>
<br>
Gentoo Linux</td>
<td>Gentoo Linux is a highly modular, source-based Linux-based operating system
which allows vast customisation to tailor the operating system to suit your specific
needs. There are many advantages to such an operating system, with the most notable
being the ability to optimise the software for security, privacy, performance,
power usage; however, there are effectively unlimited other use cases, or a
combination of multiple use cases.<br>
I have focused on security hardening and privacy hardening, placing performance below
those aspects, although my system is still very performant. Some of the hardening I
apply includes stack protection, signed integer overflow wrapping, and GrapheneOS'
hardened_malloc memory allocator.<br>
You can find my personal Gentoo Linux hardening configuration
<a class="table-link" href="https://git.inferencium.net/inference/cfg/">here</a>.</td>
<td>Open source<br>
<br>
(GPLv2)</td>
</tr>
</tr>
</table>
<h4>Smartphone</h4>
<table>
<tr>
<td>Type</td>
<td>Software</td>
<td>Description</td>
<td>Source model (License)</td>
</tr>
<tr>
<td>Operating system</td>
<td><img src="img/logo-grapheneos.png" width="100px" height="100px"/><br>
<br>
GrapheneOS</td>
<td>GrapheneOS is a security-hardened, privacy-hardened, secure-by-default
Android-based operating system which implements extensive, systemic security
and privacy hardening to the Android Open Source Project used as its base
codebase. Its hardening includes closing gaps for apps to access sensitive
system information, a secure app spawning feature which avoids sharing address
space layout and other secrets AOSP's default Zygote app spawning model would
share, GrapheneOS' own hardened memory allocator (hardened_malloc) to protect
against common memory corruption vulnerabilties, hardened Bionic standard C library,
and local and remote hardware-backed attestation (Auditor) to ensure the OS has
not been corrupted or tampered with. GrapheneOS only supports devices which receive
full support from their manufacturers, including firmware updates and device-specific
updates, long support lifecycles, secure hardware, and overall high security practices.<br>
For an extensive list of features GrapheneOS provides, visit its
<a class="table-link" href="https://grapheneos.org/">official website</a>.</td>
<td>Open source<br>
<br>
(MIT)</td>
</tr>
</table>
<br>
<br>
</body>
</html>

View File

@ -1,32 +1,32 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Blog</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Blog</title>
<link rel="stylesheet" href="infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
<h1>Blog</h1>
<br>
<h3>2022-06-30</h3>
<p>#2 - <a class="body-link" href="blog/untrusted-the-issue-with-decentralisation.html">Untrusted: The Issue with Decentralisation</a></p>
<br>
<br>
<h3>2022-01-29</h3>
<p>#1 - <a class="body-link" href="blog/systemd-insecurity.html">systemd Insecurity</a></p>
<br>
<br>
<h3>2022-01-27</h3>
<p>#0 - <a class="body-link" href="blog/foss-is-working-against-itself.html">FOSS is Working Against Itself</a></p>
<br>
<br>
<h1>Blog</h1>
<br>
<h3>2022-06-30</h3>
<p>#2 - <a class="body-link" href="blog/untrusted-the-issue-with-decentralisation.html">Untrusted: The Issue with Decentralisation</a></p>
<br>
<br>
<h3>2022-01-29</h3>
<p>#1 - <a class="body-link" href="blog/systemd-insecurity.html">systemd Insecurity</a></p>
<br>
<br>
<h3>2022-01-27</h3>
<p>#0 - <a class="body-link" href="blog/foss-is-working-against-itself.html">FOSS is Working Against Itself</a></p>
<br>
<br>
</body>
</html>

View File

@ -2,16 +2,16 @@
<html>
<head>
<title>Inferencium Network - Blog - FOSS is Working Against Itself</title>
<link rel="stylesheet" href="/infnet.css">
<link rel="stylesheet" href="../infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<div><a href="../about.html">About</a></div>
<div><a href="../contact.html">Contact</a></div>
<div><a href="../blog.html">Blog</a></div>
<div><a href="../source.html">Source</a></div>
</div>
<body>
<h1>Blog - #0</h1>

View File

@ -2,16 +2,16 @@
<html>
<head>
<title>Inferencium Network - Blog - systemd Insecurity</title>
<link rel="stylesheet" href="/infnet.css">
<link rel="stylesheet" href="../infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<div><a href="../about.html">About</a></div>
<div><a href="../contact.html">Contact</a></div>
<div><a href="../blog.html">Blog</a></div>
<div><a href="../source.html">Source</a></div>
</div>
<body>
<h1>Blog - #1</h1>

View File

@ -2,16 +2,16 @@
<html>
<head>
<title>Inferencium Network - Blog - Untrusted: The Issue with Decentralisation</title>
<link rel="stylesheet" href="/infnet.css">
<link rel="stylesheet" href="../infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<div><a href="../about.html">About</a></div>
<div><a href="../contact.html">Contact</a></div>
<div><a href="../blog.html">Blog</a></div>
<div><a href="../source.html">Source</a></div>
</div>
<body>
<h1>Blog - #2</h1>

View File

@ -1,56 +1,56 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Contact</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Contact</title>
<link rel="stylesheet" href="infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>E2EE Contact Methods</h2>
<br>
<h3>Preferred</h3>
<p>Whenever possible, use the following contact methods;
they allow verification to mitigate man-in-the-middle attacks,
have solid security, and reasonable privacy.<br>
<br>
<p>Use the keys for each contact method to verify my devices.
Note that verification does not verify a person, only their devices,
and can be defeated via coercion or other force.</p>
<br>
<p><img class="logo" src="contact/signal.png" width="30px" height="30px"/> <a class="body-link" href="contact/signal.html">Signal</a><p>
<p><img class="logo" src="contact/xmpp.png" width="30px" height="30px"/> <a class="body-link" href="contact/xmpp.html">XMPP</a><p>
<p><img class="logo" src="contact/threema.png" width="30px" height="30px"/> <a class="body-link" href="contact/threema.html">Threema</a></p>
<br>
<h3>Metadata-free</h3>
<p>If metadata leakage is an issue for you, you can use the following
contact methods. Note that these services do not have verification
functionality, and will be treated as less secure; unless you really
need to use these services, use a preferred method instead.</p>
<br>
<p><img class="logo" src="contact/briar.png" width="30px" height="30px"/> <a class="body-link" href="contact/briar.html">Briar</a></p>
<p><img class="logo" src="contact/session.png" width="30px" height="30px"/> <a class="body-link" href="contact/session.html">Session</a></p>
<br>
<br>
<br>
<h2>Non-private Methods</h2>
<p>The following contact methods do not utilise end-to-end encryption,
or I do not use such functionality; they are suitable for public contact
only, including directly and groups. Do not use these methods if
confidentiality and/or privacy is required.</p>
<br>
<p><img class="logo" src="contact/pleroma.png" width="30px" height="30px"/> <a class="body-link" href="https://plr.inferencium.net/inference/">Fediverse</a></p>
<p><img class="logo" src="contact/twitter.png" width="30px" height="30px"/> <a class="body-link" href="https://twitter.com/inferenceus/">Twitter</a></p>
<br>
<br>
<h1>Contact</h1>
<br>
<h2>End-to-end Encrypted Contact Methods</h2>
<br>
<h3>Preferred</h3>
<p>Whenever possible, use the following contact methods;
they allow verification to mitigate man-in-the-middle attacks,
have solid security, and reasonable privacy.<br>
<br>
<p>Use the keys for each contact method to verify my devices.
Note that verification does not verify a person, only their devices,
and can be defeated via coercion or other force.</p>
<br>
<p><img class="logo" src="img/logo-signal.png" width="30px" height="30px"/> <a class="body-link" href="contact/signal.html">Signal</a><p>
<p><img class="logo" src="img/logo-xmpp.png" width="30px" height="30px"/> <a class="body-link" href="contact/xmpp.html">XMPP</a><p>
<p><img class="logo" src="img/logo-threema.png" width="30px" height="30px"/> <a class="body-link" href="contact/threema.html">Threema</a></p>
<br>
<h3>Metadata-free</h3>
<p>If metadata leakage is an issue for you, you can use the following
contact methods. Note that these services do not have verification
functionality, and will be treated as less secure; unless you really
need to use these services, use a preferred method instead.</p>
<br>
<p><img class="logo" src="img/logo-briar.png" width="30px" height="30px"/> <a class="body-link" href="contact/briar.html">Briar</a></p>
<p><img class="logo" src="img/logo-session.png" width="30px" height="30px"/> <a class="body-link" href="contact/session.html">Session</a></p>
<br>
<br>
<br>
<h2>Non-private Methods</h2>
<p>The following contact methods do not utilise end-to-end encryption,
or I do not use such functionality; they are suitable for public contact
only, including directly and groups. Do not use these methods if
confidentiality and/or privacy is required.</p>
<br>
<p><img class="logo" src="img/logo-pleroma.png" width="30px" height="30px"/> <a class="body-link" href="https://plr.inferencium.net/inference/">Fediverse</a></p>
<p><img class="logo" src="img/logo-twitter.png" width="30px" height="30px"/> <a class="body-link" href="https://twitter.com/inferenceus/">Twitter</a></p>
<br>
<br>
</body>
</html>

View File

@ -1,31 +1,31 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Contact - Briar</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Contact - Briar</title>
<link rel="stylesheet" href="../infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="../about.html">About</a></div>
<div><a href="../contact.html">Contact</a></div>
<div><a href="../blog.html">Blog</a></div>
<div><a href="../source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>Briar</h2>
<br>
<p>Updated: 2022-08-03 (UTC+00:00)</p>
<br>
<pre>
<code>
Unavailable
</code>
</pre>
<br>
<br>
<h1>Contact</h1>
<br>
<h2>Briar</h2>
<br>
<p>Updated: 2022-08-03 (UTC+00:00)</p>
<br>
<pre>
<code>
Unavailable
</code>
</pre>
<br>
<br>
</body>
</html>

View File

@ -1,31 +1,31 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Contact - Session</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Contact - Session</title>
<link rel="stylesheet" href="../infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>Session</h2>
<br>
<p>Updated: 2022-08-03 (UTC+00:00)</p>
<br>
<pre>
<code>
0538eec32cf00661270afc186a40fefe771d1c39c91d79d02be6b95359eb171a42
</code>
</pre>
<br>
<br>
<h1>Contact</h1>
<br>
<h2>Session</h2>
<br>
<p>Updated: 2022-08-03 (UTC+00:00)</p>
<br>
<pre>
<code>
0538eec32cf00661270afc186a40fefe771d1c39c91d79d02be6b95359eb171a42
</code>
</pre>
<br>
<br>
</body>
</html>

View File

@ -1,31 +1,31 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Contact - Signal</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Contact - Signal</title>
<link rel="stylesheet" href="../infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="../about.html">About</a></div>
<div><a href="../contact.html">Contact</a></div>
<div><a href="../blog.html">Blog</a></div>
<div><a href="../source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>Signal</h2>
<br>
<p>Updated: 2022-06-23 (UTC+00:00)</p>
<br>
<pre>
<code>
+447549902964
</code>
</pre>
<br>
<br>
<h1>Contact</h1>
<br>
<h2>Signal</h2>
<br>
<p>Updated: 2022-06-23 (UTC+00:00)</p>
<br>
<pre>
<code>
+447549902964
</code>
</pre>
<br>
<br>
</body>
</html>

View File

@ -1,29 +1,29 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Contact - Threema</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Contact - Threema</title>
<link rel="stylesheet" href="/infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>Threema</h2>
<br>
<p>Updated: 2022-01-28 (UTC+00:00)</p>
<br>
<h3>MD649ERN</h3>
<h4>Key</h4>
<img src="key-threema.png">
<br>
<br>
<h1>Contact</h1>
<br>
<h2>Threema</h2>
<br>
<p>Updated: 2022-01-28 (UTC+00:00)</p>
<br>
<h3>MD649ERN</h3>
<h4>Key</h4>
<img src="../img/key-threema.png">
<br>
<br>
</body>
</html>

View File

@ -1,58 +1,58 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Contact - XMPP</title>
<link rel="stylesheet" href="/infnet.css">
<title>Inferencium Network - Contact - XMPP</title>
<link rel="stylesheet" href="/infnet.css">
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
</div>
<body>
<h1>Contact</h1>
<br>
<h2>XMPP</h2>
<br>
<p>Updated: 2022-10-13 (UTC+00:00)</p>
<br>
<p>Whenever possible, open the links to pin the fingerprint directly from this
webpage. If that is not possible, manually verify the fingerprints.</p>
<br>
<h3>inference@inferencium.net</h3>
<h4>Key</h4>
<h5>Smartphone</h5>
<pre>
<code>
1bd03c6a 5e011655 2fafd697 da4fce70 63de5a83 a264a34a fcce78fe 6b06820c
</code>
</pre>
<a class="body-link" href="xmpp:inference@inferencium.net?omemo-sid-1586888206=1bd03c6a5e0116552fafd697da4fce7063de5a83a264a34afcce78fe6b06820c">xmpp:inference@inferencium.net?omemo-sid-1586888206=1bd03c6a5e0116552fafd697da4fce7063de5a83a264a34afcce78fe6b06820c</a>
<br>
<br>
<h5>Desktop</h5>
<pre>
<code>
87ffbf5a 40f271c7 4615d84c 5816ef07 b7e7a90a 5406edb1 b2b8378f 0439551d
</code>
</pre>
<br>
<br>
<h3>inference@plus.st</h3>
<h4>Key</h4>
<h5>Smartphone</h5>
<pre>
<code>
9f9b50e4 3bb5ae5d 886213ad 43015719 7c40aa99 e436445d e0e360a9 24076015
</code>
</pre>
<a class="body-link" href="xmpp:inference@plus.st?omemo-sid-1890454018=9f9b50e43bb5ae5d886213ad430157197c40aa99e436445de0e360a924076015">xmpp:inference@plus.st?omemo-sid-1890454018=9f9b50e43bb5ae5d886213ad430157197c40aa99e436445de0e360a924076015</a>
<br>
<br>
<br>
<h1>Contact</h1>
<br>
<h2>XMPP</h2>
<br>
<p>Updated: 2022-10-13 (UTC+00:00)</p>
<br>
<p>Whenever possible, open the links to pin the fingerprint directly from this
webpage. If that is not possible, manually verify the fingerprints.</p>
<br>
<h3>inference@inferencium.net</h3>
<h4>Key</h4>
<h5>Smartphone</h5>
<pre>
<code>
1bd03c6a 5e011655 2fafd697 da4fce70 63de5a83 a264a34a fcce78fe 6b06820c
</code>
</pre>
<a class="body-link" href="xmpp:inference@inferencium.net?omemo-sid-1586888206=1bd03c6a5e0116552fafd697da4fce7063de5a83a264a34afcce78fe6b06820c">xmpp:inference@inferencium.net?omemo-sid-1586888206=1bd03c6a5e0116552fafd697da4fce7063de5a83a264a34afcce78fe6b06820c</a>
<br>
<br>
<h5>Desktop</h5>
<pre>
<code>
87ffbf5a 40f271c7 4615d84c 5816ef07 b7e7a90a 5406edb1 b2b8378f 0439551d
</code>
</pre>
<br>
<br>
<h3>inference@plus.st</h3>
<h4>Key</h4>
<h5>Smartphone</h5>
<pre>
<code>
9f9b50e4 3bb5ae5d 886213ad 43015719 7c40aa99 e436445d e0e360a9 24076015
</code>
</pre>
<a class="body-link" href="xmpp:inference@plus.st?omemo-sid-1890454018=9f9b50e43bb5ae5d886213ad430157197c40aa99e436445de0e360a924076015">xmpp:inference@plus.st?omemo-sid-1890454018=9f9b50e43bb5ae5d886213ad430157197c40aa99e436445de0e360a924076015</a>
<br>
<br>
<br>
</body>
</html>

View File

Before

Width:  |  Height:  |  Size: 35 KiB

After

Width:  |  Height:  |  Size: 35 KiB

View File

Before

Width:  |  Height:  |  Size: 9.9 KiB

After

Width:  |  Height:  |  Size: 9.9 KiB

BIN
img/logo-gentoo_linux.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 313 KiB

BIN
img/logo-grapheneos.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.1 KiB

View File

Before

Width:  |  Height:  |  Size: 1.6 KiB

After

Width:  |  Height:  |  Size: 1.6 KiB

View File

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 18 KiB

View File

Before

Width:  |  Height:  |  Size: 42 KiB

After

Width:  |  Height:  |  Size: 42 KiB

View File

Before

Width:  |  Height:  |  Size: 8.0 KiB

After

Width:  |  Height:  |  Size: 8.0 KiB

View File

Before

Width:  |  Height:  |  Size: 3.4 KiB

After

Width:  |  Height:  |  Size: 3.4 KiB

View File

Before

Width:  |  Height:  |  Size: 30 KiB

After

Width:  |  Height:  |  Size: 30 KiB

View File

@ -1,17 +1,17 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network</title>
<link rel="stylesheet" href=/infnet.css>
<title>Inferencium Network</title>
<link rel="stylesheet" href=infnet.css>
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
</body>

View File

@ -28,7 +28,14 @@
color: #ffffff;
}
.logo {
.table-link {
font-family: Roboto, sans-serif;
font-size: 16px;
color: #ffffff;
text-decoration: underline;
}
.logo-small {
transform: translate(0px, 8px);
}
@ -86,3 +93,13 @@ a {
color: #000000;
text-decoration: none;
}
table, th, td {
border: 2px solid;
border-collapse: collapse;
border-color: #ffffff;
padding: 15px;
font-family: Roboto, sans-serif;
font-size: 16px;
color: #ffffff;
}

View File

@ -1,38 +1,39 @@
<!DOCTYPE html>
<html>
<head>
<title>Inferencium Network - Source</title>
<link rel="stylesheet" href=/infnet.css>
<title>Inferencium Network - Source</title>
<link rel="stylesheet" href=infnet.css>
</head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="/about.html">About</a></div>
<div><a href="/contact.html">Contact</a></div>
<div><a href="/blog.html">Blog</a></div>
<div><a href="/source.html">Source</a></div>
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body>
<h1>Source</h1>
<br>
<h3>My Personal Source Code Repositories</h3>
<p>These repositories contain source code which is used on my personal
systems.<br>
No guarantees are made that they will work correctly on your systems, and they
are not targeted towards a public release.<br>
Usage of these repositories is at your own risk.</p>
<br>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/cfg/">Configuration files</a></p>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/scr/">Script files</a></p>
<br>
<h3>Inferencium Network Source Code Repositories</h3>
<p>These repositories contain source code targeted towards a public release and
are suitable for a wide range of systems.</p>
<br>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/inf-www/">Website</a></p>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/mmd/">Gentoo - Multimedia</a></p>
<br>
<br>
<h1>Source</h1>
<br>
<h3>My Personal Source Code Repositories</h3>
<p>These repositories contain source code which is used on my personal
systems.<br>
No guarantees are made that they will work correctly on your systems, and they
are not targeted towards a public release.<br>
Usage of these repositories is at your own risk.</p>
<br>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/cfg/">Configuration files</a></p>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/scr/">Script files</a></p>
<br>
<h3>Inferencium Network Source Code Repositories</h3>
<p>These repositories contain source code targeted towards a public release and
are suitable for a wide range of systems.</p>
<br>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/inf-www/">Website</a></p>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/mmd/">Gentoo - Multimedia</a></p>
<p>- <a class="body-link" href="https://git.inferencium.net/inference/graphenechan/">Graphene-chan</a></p>
<br>
<br>
</body>
</html>