From 9cc6edd522f70bd557daf7fe3c36c1c7813177e8 Mon Sep 17 00:00:00 2001
From: inference Whenever possible, use the following contact methods; they allow verification
- to mitigate man-in-the-middle attacks, have high security, and reasonable
- privacy. Whenever possible, use the following contact methods; they allow
+ verification to mitigate man-in-the-middle attacks, have high security,
+ and reasonable privacy. Use the
- keys for each contact method to verify my devices.End-to-end Encrypted Contact Methods
Preferred
-
+
- Note: Verification does not verify a person, only their devices, and can be
- defeated via coercion or other force.
+ Note: Verification does not verify a person, only their devices, and can
+ be defeated via coercion or other force.
Signal
+447549902964
@@ -63,18 +64,21 @@
(Key)