Update Contact page to version 3.0.0.19.
This commit is contained in:
parent
c2400b7bb8
commit
c9a715e9d8
52
contact.html
52
contact.html
@ -2,10 +2,10 @@
|
|||||||
|
|
||||||
<!-- Inferencium - Website - Contact -->
|
<!-- Inferencium - Website - Contact -->
|
||||||
|
|
||||||
<!-- Copyright 2022-2023 Inference -->
|
<!-- Copyright 2022-2023 Jake Winters -->
|
||||||
<!-- SPDX-License-Identifier: GPL-3.0-or-later -->
|
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
|
||||||
|
|
||||||
<!-- Version: 1.0.0.16 -->
|
<!-- Version: 3.0.0.19 -->
|
||||||
|
|
||||||
|
|
||||||
<html>
|
<html>
|
||||||
@ -33,16 +33,39 @@
|
|||||||
<body>
|
<body>
|
||||||
<h1>Contact</h1>
|
<h1>Contact</h1>
|
||||||
<br>
|
<br>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
|
<!-- Table of contents. -->
|
||||||
|
<h2 id="toc"><a href="#toc" class="h2"
|
||||||
|
>Table of Contents<a/></h2>
|
||||||
|
<ul>
|
||||||
|
<li><a class="body-link" href="#e2ee"
|
||||||
|
>End-to-end encrypted contact methods</a></li>
|
||||||
|
<ul>
|
||||||
|
<li><a class="body-link" href="#e2ee-pref"
|
||||||
|
>Preferred</a></li>
|
||||||
|
<li><a class="body-link" href="#e2ee-metadata"
|
||||||
|
>Metadata-free</a></li>
|
||||||
|
</ul>
|
||||||
|
</ul>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
<br>
|
||||||
|
|
||||||
<!-- Place end-to-end encrypted contact methods here. -->
|
<!-- Place end-to-end encrypted contact methods here. -->
|
||||||
<!-- Contacts should be encouraged to use these contact methods. -->
|
<!-- Contacts should be encouraged to use these contact methods. -->
|
||||||
<p>Notes:<br>
|
<strong>Notes:</strong>
|
||||||
|
<p>- I have phased out usage of obsolete, insecure PGP for all contact methods.</p>
|
||||||
|
<p>- I have phased out usage of email, including TLS-encrypted email.</p>
|
||||||
<br>
|
<br>
|
||||||
- I have phased out usage of obsolete, insecure PGP for all contact methods.<br>
|
|
||||||
- I have phased out usage of email, including TLS-encrypted email.</p><br>
|
|
||||||
<br>
|
<br>
|
||||||
<h2>End-to-end Encrypted Contact Methods</h2>
|
|
||||||
<br>
|
<br>
|
||||||
<h3>Preferred</h3>
|
<h2 id="e2ee"><a href="#e2ee" class="h2"
|
||||||
|
>End-to-end Encrypted Contact Methods</a></h2>
|
||||||
|
<br>
|
||||||
|
<h3 id="e2ee-pref"><a href="#e2ee-pref" class="h3"
|
||||||
|
>Preferred</a></h3>
|
||||||
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
|
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
|
||||||
attacks, have high security, and reasonable privacy.<br>
|
attacks, have high security, and reasonable privacy.<br>
|
||||||
<br>
|
<br>
|
||||||
@ -66,7 +89,8 @@
|
|||||||
<br>
|
<br>
|
||||||
<!-- Place metadata-free contact methods here. -->
|
<!-- Place metadata-free contact methods here. -->
|
||||||
<!-- Clarify that preferred methods should be used whenever possible. -->
|
<!-- Clarify that preferred methods should be used whenever possible. -->
|
||||||
<h3>Metadata-free</h3>
|
<h3 id="e2ee-metadata"><a href="#e2ee-metadata" class="h3"
|
||||||
|
>Metadata-free</h3>
|
||||||
<p>If metadata leakage is an issue for you, you can use the following contact methods.<br>
|
<p>If metadata leakage is an issue for you, you can use the following contact methods.<br>
|
||||||
<br>
|
<br>
|
||||||
Note: These services do not have verification functionality and will be treated as less secure; <strong>unless
|
Note: These services do not have verification functionality and will be treated as less secure; <strong>unless
|
||||||
@ -82,20 +106,14 @@
|
|||||||
Unavailable</p>
|
Unavailable</p>
|
||||||
<br>
|
<br>
|
||||||
<br>
|
<br>
|
||||||
<br>
|
|
||||||
<!-- Place non-private contact methods here. -->
|
<!-- Place non-private contact methods here. -->
|
||||||
<!-- Clarify that these contact methods are for public contact only. -->
|
<!-- Clarify that these contact methods are for public contact only. -->
|
||||||
<h2>Non-private Contact Methods</h2>
|
<!--<h2>Non-private Contact Methods</h2>
|
||||||
<p>The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they
|
<p>The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they
|
||||||
are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality
|
are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality
|
||||||
and/or privacy is required.</p>
|
and/or privacy is required.</p>
|
||||||
<br>
|
<br>
|
||||||
<p><img class="logo-small" src="asset/img/logo-pleroma.png"
|
<br>-->
|
||||||
width="40px" height="40px"/> Fediverse<br>
|
|
||||||
<br>
|
|
||||||
https://plr.inferencium.net/inference/</p>
|
|
||||||
<br>
|
|
||||||
<br>
|
|
||||||
</body>
|
</body>
|
||||||
|
|
||||||
</html>
|
</html>
|
||||||
|
Loading…
x
Reference in New Issue
Block a user