From c3a5efb772026f9a519a16488d6739a175965321 Mon Sep 17 00:00:00 2001
From: inference Whenever possible, use the following contact methods; they
- allow verification to mitigate man-in-the-middle attacks, have
- high security, and reasonable privacy. Use the
- keys
- for each contact method to verify my devices. Note: Verification does not verify a person, only their devices,
- and can be defeated via coercion or other force.Contact
-
- End-to-end Encrypted Contact Methods
- Preferred
- Signal
-
-
-
XMPP
-
Whenever possible, use the following contact methods; they allow verification to mitigate + man-in-the-middle attacks, have high security, and reasonable privacy.
+Use the + keys + for each contact method to verify my devices.
+Note: Verification does not verify a person, only their devices, and can be defeated via + coercion or other force.
+Signal
XMPP