Further redesign.
33
about.html
@ -4,27 +4,32 @@
|
||||
<title>Inferencium Network - About</title>
|
||||
<link rel="stylesheet" href=infnet.css>
|
||||
</head>
|
||||
<div class="sidebar">
|
||||
<a class="title">Inferencium Network</a><br>
|
||||
<br>
|
||||
<br>
|
||||
<div><a href="about.html">About</a></div>
|
||||
<div><a href="contact.html">Contact</a></div>
|
||||
<div><a href="blog.html">Blog</a></div>
|
||||
<div><a href="source.html">Source</a></div>
|
||||
</div>
|
||||
<body>
|
||||
<h1>About</h1>
|
||||
<br>
|
||||
<p>I am Inference, a cybersecurity researcher based in United Kingdom.<br>
|
||||
<br>
|
||||
<p>I write about my research and experience in cybersecurity and also<br>
|
||||
physical security. Most of my postings are security-related, but I<br>
|
||||
occasionally post about other aspects of my life.</p>
|
||||
<p>I write about my research and experience in cybersecurity and also physical
|
||||
security. Most of my postings are security-related, but I occasionally post
|
||||
about other aspects of my life.</p>
|
||||
<br>
|
||||
<p>I am an open source advocate for the preservation and modifiability of<br>
|
||||
source code. I believe source code should be considered human knowledge as<br>
|
||||
much as past knowledge and teachings were; it is how modern humanity<br>
|
||||
survives and runs. Source code being modifiable allows it to be adapted<br>
|
||||
for use by anyone, whether to add features, harden it, or provide<br>
|
||||
<p>I am an open source advocate for the preservation and modifiability of
|
||||
source code. I believe source code should be considered human knowledge as
|
||||
much as past knowledge and teachings were; it is how modern humanity
|
||||
survives and runs. Source code being modifiable allows it to be adapted
|
||||
for use by anyone, whether to add features, harden it, or provide
|
||||
accessibility for disabled people.<br>
|
||||
I am also a modular design advocate for the ability to securely and<br>
|
||||
robustly make changes to hardware and software without the entire system<br>
|
||||
I am also a modular design advocate for the ability to securely and
|
||||
robustly make changes to hardware and software without the entire system
|
||||
being affected.</p>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<a href="index.html">Back</a>
|
||||
</body>
|
||||
</html>
|
||||
|
47
contact.html
@ -4,34 +4,51 @@
|
||||
<title>Inferencium Network - Contact</title>
|
||||
<link rel="stylesheet" href="infnet.css">
|
||||
</head>
|
||||
<div class="sidebar">
|
||||
<a class="title">Inferencium Network</a><br>
|
||||
<br>
|
||||
<br>
|
||||
<div><a href="about.html">About</a></div>
|
||||
<div><a href="contact.html">Contact</a></div>
|
||||
<div><a href="blog.html">Blog</a></div>
|
||||
<div><a href="source.html">Source</a></div>
|
||||
</div>
|
||||
<body>
|
||||
<h1>Contact</h1>
|
||||
<br>
|
||||
<h2>E2EE contact methods</h2>
|
||||
<h2>E2EE Contact Methods</h2>
|
||||
<br>
|
||||
<h3>Preferred</h3>
|
||||
<p>Whenever possible, use the following contact methods;<br>
|
||||
they allow verification to mitigate man-in-the-middle attacks,<br>
|
||||
<p>Whenever possible, use the following contact methods;
|
||||
they allow verification to mitigate man-in-the-middle attacks,
|
||||
have solid security, and reasonable privacy.<br>
|
||||
<br>
|
||||
<p>Use the keys for each contact method to verify my devices.<br>
|
||||
Note that verification does not verify a person, only their devices,<br>
|
||||
<p>Use the keys for each contact method to verify my devices.
|
||||
Note that verification does not verify a person, only their devices,
|
||||
and can be defeated via coercion or other force.</p>
|
||||
<br>
|
||||
<p>- <a href="contact/signal.html">Signal</a><p>
|
||||
<p>- <a href="contact/xmpp.html">XMPP</a><p>
|
||||
<p>- <a href="contact/threema.html">Threema</a></p>
|
||||
<p><img class="logo" src="contact/signal.png" width="30px" height="30px"/> <a class="body-link" href="contact/signal.html">Signal</a><p>
|
||||
<p><img class="logo" src="contact/xmpp.png" width="30px" height="30px"/> <a class="body-link" href="contact/xmpp.html">XMPP</a><p>
|
||||
<p><img class="logo" src="contact/threema.png" width="30px" height="30px"/> <a class="body-link" href="contact/threema.html">Threema</a></p>
|
||||
<br>
|
||||
<h3>Metadata-free</h3>
|
||||
<p>If metadata leakage is an issue for you, you can use the following<br>
|
||||
contact methods. Note that these services do not have verification<br>
|
||||
functionality, and will be treated as less secure.</p>
|
||||
<p>If metadata leakage is an issue for you, you can use the following
|
||||
contact methods. Note that these services do not have verification
|
||||
functionality, and will be treated as less secure; unless you really
|
||||
need to use these services, use a preferred method instead.</p>
|
||||
<br>
|
||||
<p>- <a href="contact/briar.html">Briar</a></p>
|
||||
<p>- <a href="contact/session.html">Session</a></p>
|
||||
<p><img class="logo" src="contact/briar.png" width="30px" height="30px"/> <a class="body-link" href="contact/briar.html">Briar</a></p>
|
||||
<p><img class="logo" src="contact/session.png" width="30px" height="30px"/> <a class="body-link" href="contact/session.html">Session</a></p>
|
||||
<br>
|
||||
<h2>Non-private Methods</h2>
|
||||
<p>The following contact methods do not utilise end-to-end encryption,
|
||||
or I do not use such functionality; they are suitable for public contact
|
||||
only, including directly and groups. Do not use these methods if
|
||||
confidentiality and/or privacy is required.</p>
|
||||
<br>
|
||||
<p><img class="logo" src="contact/pleroma.png" width="30px" height="30px"/> <a class="body-link" href="https://plr.inferencium.net/inference/">Fediverse</a></p>
|
||||
<p><img class="logo" src="contact/twitter.png" width="30px" height="30px"/> <a class="body-link" href="https://twitter.com/inferenceus/">Twitter</a></p>
|
||||
<br>
|
||||
<br>
|
||||
<br>
|
||||
<a href="index.html">Back</a>
|
||||
</body>
|
||||
</html>
|
||||
|
BIN
contact/briar.png
Normal file
After Width: | Height: | Size: 9.9 KiB |
BIN
contact/pleroma.png
Normal file
After Width: | Height: | Size: 1.6 KiB |
BIN
contact/session.png
Normal file
After Width: | Height: | Size: 18 KiB |
BIN
contact/signal.png
Normal file
After Width: | Height: | Size: 42 KiB |
BIN
contact/threema.png
Normal file
After Width: | Height: | Size: 8.0 KiB |
BIN
contact/twitter.png
Normal file
After Width: | Height: | Size: 3.4 KiB |
BIN
contact/xmpp.png
Normal file
After Width: | Height: | Size: 30 KiB |
@ -12,6 +12,7 @@
|
||||
<div><a href="contact.html">Contact</a></div>
|
||||
<div><a href="blog.html">Blog</a></div>
|
||||
<div><a href="source.html">Source</a></div>
|
||||
</div>
|
||||
<body>
|
||||
</body>
|
||||
</html>
|
||||
|
21
infnet.css
@ -1,11 +1,11 @@
|
||||
.sidebar {
|
||||
height: 100%;
|
||||
width: 250px;
|
||||
position: absolute;
|
||||
position: fixed;
|
||||
left: 0;
|
||||
top: 0;
|
||||
padding-top: 40px;
|
||||
background-color: lightgray;
|
||||
padding-top: 55px;
|
||||
background-color: #909090;
|
||||
text-align: center;
|
||||
}
|
||||
|
||||
@ -22,14 +22,27 @@
|
||||
font-size: 32px;
|
||||
}
|
||||
|
||||
.body-link {
|
||||
font-family: Roboto, sans-serif;
|
||||
font-size: 18px;
|
||||
color: #ffffff;
|
||||
}
|
||||
|
||||
.logo {
|
||||
transform: translate(0px, 8px);
|
||||
}
|
||||
|
||||
body {
|
||||
padding-top: 40px;
|
||||
margin-left: 400px;
|
||||
margin-right: 150px;
|
||||
font-family: Roboto, sans-serif;
|
||||
background-color: #262626;
|
||||
}
|
||||
|
||||
h1 {
|
||||
font-family: Roboto, sans-serif;
|
||||
font-size: 24px;
|
||||
font-size: 26px;
|
||||
color: #ffffff;
|
||||
}
|
||||
|
||||
|