Further redesign.

This commit is contained in:
inference 2022-10-29 01:30:35 +01:00
parent c3dbbb6b57
commit ae0600a5df
11 changed files with 69 additions and 33 deletions

View File

@ -4,27 +4,32 @@
<title>Inferencium Network - About</title> <title>Inferencium Network - About</title>
<link rel="stylesheet" href=infnet.css> <link rel="stylesheet" href=infnet.css>
</head> </head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body> <body>
<h1>About</h1> <h1>About</h1>
<br> <br>
<p>I am Inference, a cybersecurity researcher based in United Kingdom.<br> <p>I am Inference, a cybersecurity researcher based in United Kingdom.<br>
<br> <br>
<p>I write about my research and experience in cybersecurity and also<br> <p>I write about my research and experience in cybersecurity and also physical
physical security. Most of my postings are security-related, but I<br> security. Most of my postings are security-related, but I occasionally post
occasionally post about other aspects of my life.</p> about other aspects of my life.</p>
<br> <br>
<p>I am an open source advocate for the preservation and modifiability of<br> <p>I am an open source advocate for the preservation and modifiability of
source code. I believe source code should be considered human knowledge as<br> source code. I believe source code should be considered human knowledge as
much as past knowledge and teachings were; it is how modern humanity<br> much as past knowledge and teachings were; it is how modern humanity
survives and runs. Source code being modifiable allows it to be adapted<br> survives and runs. Source code being modifiable allows it to be adapted
for use by anyone, whether to add features, harden it, or provide<br> for use by anyone, whether to add features, harden it, or provide
accessibility for disabled people.<br> accessibility for disabled people.<br>
I am also a modular design advocate for the ability to securely and<br> I am also a modular design advocate for the ability to securely and
robustly make changes to hardware and software without the entire system<br> robustly make changes to hardware and software without the entire system
being affected.</p> being affected.</p>
<br>
<br>
<br>
<a href="index.html">Back</a>
</body> </body>
</html> </html>

View File

@ -4,34 +4,51 @@
<title>Inferencium Network - Contact</title> <title>Inferencium Network - Contact</title>
<link rel="stylesheet" href="infnet.css"> <link rel="stylesheet" href="infnet.css">
</head> </head>
<div class="sidebar">
<a class="title">Inferencium Network</a><br>
<br>
<br>
<div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div>
</div>
<body> <body>
<h1>Contact</h1> <h1>Contact</h1>
<br> <br>
<h2>E2EE contact methods</h2> <h2>E2EE Contact Methods</h2>
<br> <br>
<h3>Preferred</h3> <h3>Preferred</h3>
<p>Whenever possible, use the following contact methods;<br> <p>Whenever possible, use the following contact methods;
they allow verification to mitigate man-in-the-middle attacks,<br> they allow verification to mitigate man-in-the-middle attacks,
have solid security, and reasonable privacy.<br> have solid security, and reasonable privacy.<br>
<br> <br>
<p>Use the keys for each contact method to verify my devices.<br> <p>Use the keys for each contact method to verify my devices.
Note that verification does not verify a person, only their devices,<br> Note that verification does not verify a person, only their devices,
and can be defeated via coercion or other force.</p> and can be defeated via coercion or other force.</p>
<br> <br>
<p>- <a href="contact/signal.html">Signal</a><p> <p><img class="logo" src="contact/signal.png" width="30px" height="30px"/> <a class="body-link" href="contact/signal.html">Signal</a><p>
<p>- <a href="contact/xmpp.html">XMPP</a><p> <p><img class="logo" src="contact/xmpp.png" width="30px" height="30px"/> <a class="body-link" href="contact/xmpp.html">XMPP</a><p>
<p>- <a href="contact/threema.html">Threema</a></p> <p><img class="logo" src="contact/threema.png" width="30px" height="30px"/> <a class="body-link" href="contact/threema.html">Threema</a></p>
<br> <br>
<h3>Metadata-free</h3> <h3>Metadata-free</h3>
<p>If metadata leakage is an issue for you, you can use the following<br> <p>If metadata leakage is an issue for you, you can use the following
contact methods. Note that these services do not have verification<br> contact methods. Note that these services do not have verification
functionality, and will be treated as less secure.</p> functionality, and will be treated as less secure; unless you really
need to use these services, use a preferred method instead.</p>
<br> <br>
<p>- <a href="contact/briar.html">Briar</a></p> <p><img class="logo" src="contact/briar.png" width="30px" height="30px"/> <a class="body-link" href="contact/briar.html">Briar</a></p>
<p>- <a href="contact/session.html">Session</a></p> <p><img class="logo" src="contact/session.png" width="30px" height="30px"/> <a class="body-link" href="contact/session.html">Session</a></p>
<br>
<h2>Non-private Methods</h2>
<p>The following contact methods do not utilise end-to-end encryption,
or I do not use such functionality; they are suitable for public contact
only, including directly and groups. Do not use these methods if
confidentiality and/or privacy is required.</p>
<br>
<p><img class="logo" src="contact/pleroma.png" width="30px" height="30px"/> <a class="body-link" href="https://plr.inferencium.net/inference/">Fediverse</a></p>
<p><img class="logo" src="contact/twitter.png" width="30px" height="30px"/> <a class="body-link" href="https://twitter.com/inferenceus/">Twitter</a></p>
<br> <br>
<br> <br>
<br>
<a href="index.html">Back</a>
</body> </body>
</html> </html>

BIN
contact/briar.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 9.9 KiB

BIN
contact/pleroma.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

BIN
contact/session.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 18 KiB

BIN
contact/signal.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 42 KiB

BIN
contact/threema.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 8.0 KiB

BIN
contact/twitter.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.4 KiB

BIN
contact/xmpp.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

View File

@ -12,6 +12,7 @@
<div><a href="contact.html">Contact</a></div> <div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div> <div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div> <div><a href="source.html">Source</a></div>
</div>
<body> <body>
</body> </body>
</html> </html>

View File

@ -1,11 +1,11 @@
.sidebar { .sidebar {
height: 100%; height: 100%;
width: 250px; width: 250px;
position: absolute; position: fixed;
left: 0; left: 0;
top: 0; top: 0;
padding-top: 40px; padding-top: 55px;
background-color: lightgray; background-color: #909090;
text-align: center; text-align: center;
} }
@ -22,14 +22,27 @@
font-size: 32px; font-size: 32px;
} }
.body-link {
font-family: Roboto, sans-serif;
font-size: 18px;
color: #ffffff;
}
.logo {
transform: translate(0px, 8px);
}
body { body {
padding-top: 40px;
margin-left: 400px;
margin-right: 150px;
font-family: Roboto, sans-serif; font-family: Roboto, sans-serif;
background-color: #262626; background-color: #262626;
} }
h1 { h1 {
font-family: Roboto, sans-serif; font-family: Roboto, sans-serif;
font-size: 24px; font-size: 26px;
color: #ffffff; color: #ffffff;
} }