diff --git a/contact.html b/contact.html index 66bfc23..fe4e3cb 100644 --- a/contact.html +++ b/contact.html @@ -5,7 +5,7 @@ - + @@ -36,48 +36,53 @@
Whenever possible, use the following contact methods;
- they allow verification to mitigate man-in-the-middle attacks,
- have high security, and reasonable privacy.
+
Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
+ attacks, have high security, and reasonable privacy.
Use the keys for each contact method to verify my devices.
- Note: Verification does not verify a person, only their devices,
- and can be defeated via coercion or other force.
- Signal
-
- XMPP
+
+ Signal
+
+ XMPP
If metadata leakage is an issue for you, you can use the following
- contact methods.
+
If metadata leakage is an issue for you, you can use the following contact methods.
- Note: These services do not have verification
- functionality and will be treated as less secure;
- unless you really
- need to use these services, use a preferred method instead.
- Briar
- Session
+ Briar
+ Session
The following contact methods do not utilise end-to-end encryption, - or I do not use such functionality; they are suitable for public contact - only, including directly and groups. Do not use these methods if - confidentiality and/or privacy is required.
+The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they + are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality + and/or privacy is required.