Properly indent code.

This commit is contained in:
inference 2023-04-11 17:22:49 +01:00
parent 67a311e3e7
commit cad337b218
Signed by: inference
SSH Key Fingerprint: SHA256:9Pl0nZ2UJacgm+IeEtLSZ4FOESgP1eKCtRflfPfdX9M

View File

@ -5,115 +5,117 @@
<!-- Copyright 2022 Jake Winters --> <!-- Copyright 2022 Jake Winters -->
<!-- SPDX-License-Identifier: BSD-3-Clause-Clear --> <!-- SPDX-License-Identifier: BSD-3-Clause-Clear -->
<!-- Version: 3.0.1.20 --> <!-- Version: 3.0.2.21 -->
<html> <html>
<head> <head>
<title>Inferencium - Contact</title> <title>Inferencium - Contact</title>
<link rel="stylesheet" href="inf.css"> <link rel="stylesheet" href="inf.css">
<meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="viewport" content="width=device-width, initial-scale=1">
</head> </head>
<!-- Navigation bar. --> <!-- Navigation bar. -->
<div class="sidebar"> <div class="sidebar">
<img src="asset/img/logo-inferencium-no_text.png" <img src="asset/img/logo-inferencium-no_text.png"
width="110px" height="110px"> width="110px" height="110px">
<a class="title">Inferencium</a><br> <a class="title">Inferencium</a><br>
<br> <br>
<br> <br>
<div><a href="about.html">About</a></div> <div><a href="about.html">About</a></div>
<div><a href="contact.html">Contact</a></div> <div><a href="contact.html">Contact</a></div>
<div><a href="blog.html">Blog</a></div> <div><a href="blog.html">Blog</a></div>
<div><a href="source.html">Source</a></div> <div><a href="source.html">Source</a></div>
<div><a href="key.html">Key</a></div> <div><a href="key.html">Key</a></div>
</div> </div>
<body> <body>
<h1>Contact</h1> <h1>Contact</h1>
<br> <br>
<br> <br>
<br> <br>
<!-- Table of contents. --> <!-- Table of contents. -->
<h2 id="toc"><a href="#toc" class="h2" <h2 id="toc"><a href="#toc" class="h2"
>Table of Contents<a/></h2> >Table of Contents<a/></h2>
<ul> <ul>
<li><a class="body-link" href="#e2ee" <li><a class="body-link" href="#e2ee"
>End-to-end encrypted contact methods</a></li> >End-to-end encrypted contact methods</a></li>
<ul> <ul>
<li><a class="body-link" href="#e2ee-pref" <li><a class="body-link" href="#e2ee-pref"
>Preferred</a></li> >Preferred</a></li>
<li><a class="body-link" href="#e2ee-metadata" <li><a class="body-link" href="#e2ee-metadata"
>Metadata-free</a></li> >Metadata-free</a></li>
</ul> </ul>
</ul> </ul>
<br> <br>
<br> <br>
<br> <br>
<!-- Place end-to-end encrypted contact methods here. --> <!-- Place end-to-end encrypted contact methods here. -->
<!-- Contacts should be encouraged to use these contact methods. --> <!-- Contacts should be encouraged to use these contact methods. -->
<strong>Notes:</strong> <strong>Notes:</strong>
<p>- I have phased out usage of obsolete, insecure PGP for all contact methods.</p> <p>- I have phased out usage of obsolete, insecure PGP for all contact methods.</p>
<p>- I have phased out usage of email, including TLS-encrypted email.</p> <p>- I have phased out usage of email, including TLS-encrypted email.</p>
<br> <br>
<br> <br>
<br> <br>
<h2 id="e2ee"><a href="#e2ee" class="h2"
>End-to-end Encrypted Contact Methods</a></h2> <h2 id="e2ee"><a href="#e2ee" class="h2"
<br> >End-to-end Encrypted Contact Methods</a></h2>
<h3 id="e2ee-pref"><a href="#e2ee-pref" class="h3" <br>
>Preferred</a></h3> <h3 id="e2ee-pref"><a href="#e2ee-pref" class="h3"
<p>Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle >Preferred</a></h3>
attacks, have high security, and reasonable privacy.<br> <p>Whenever possible, use the following contact methods; they allow verification
<br> to mitigate man-in-the-middle attacks, have high security, and reasonable
<p><strong>Use the privacy.<br>
<a class="body-link" href="key.html" <br>
>keys</a> for each contact method to verify my devices.</strong><br> <p><strong>Use the
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other <a class="body-link" href="key.html"
force.</p> >keys</a> for each contact method to verify my devices.</strong><br>
<br> Note: Verification does not verify a person, only their devices, and can be
<p><img class="logo-small" src="asset/img/logo-signal.png" defeated via coercion or other force.</p>
width="40px" height="40px"/> Signal<br> <br>
<br> <p><img class="logo-small" src="asset/img/logo-signal.png"
+447549902964<p><br> width="40px" height="40px"/> Signal<br>
<p><img class="logo-small" src="asset/img/logo-xmpp.png" <br>
width="40px" height="40px"/> XMPP<br> +447549902964<p><br>
<br> <p><img class="logo-small" src="asset/img/logo-xmpp.png"
inference@inferencium.net width="40px" height="40px"/> XMPP<br>
(<a class="body-link" href="key/xmpp.html" <br>
>Key</a>)<p> inference@inferencium.net
<br> (<a class="body-link" href="key/xmpp.html"
<br> >Key</a>)<p>
<!-- Place metadata-free contact methods here. --> <br>
<!-- Clarify that preferred methods should be used whenever possible. --> <br>
<h3 id="e2ee-metadata"><a href="#e2ee-metadata" class="h3" <!-- Place metadata-free contact methods here. -->
>Metadata-free</h3> <!-- Clarify that preferred methods should be used whenever possible. -->
<p>If metadata leakage is an issue for you, you can use the following contact methods.<br> <h3 id="e2ee-metadata"><a href="#e2ee-metadata" class="h3"
<br> >Metadata-free</h3>
Note: These services do not have verification functionality and will be treated as less secure; <strong>unless <p>If metadata leakage is an issue for you, you can use the following contact methods.<br>
you really need to use these services, use a preferred method instead.</strong></p> <br>
<br> Note: These services do not have verification functionality and will be treated as less secure; <strong>unless
<p><img class="logo-small" src="asset/img/logo-briar.png" you really need to use these services, use a preferred method instead.</strong></p>
width="40px" height="40px"/> Briar<br> <br>
<br> <p><img class="logo-small" src="asset/img/logo-briar.png"
Unavailable</p><br> width="40px" height="40px"/> Briar<br>
<p><img class="logo-small" src="asset/img/logo-session.png" <br>
width="40px" height="40px"/> Session<br> Unavailable</p><br>
<br> <p><img class="logo-small" src="asset/img/logo-session.png"
Unavailable</p> width="40px" height="40px"/> Session<br>
<br> <br>
<br> Unavailable</p>
<!-- Place non-private contact methods here. --> <br>
<!-- Clarify that these contact methods are for public contact only. --> <br>
<!--<h2>Non-private Contact Methods</h2> <!-- Place non-private contact methods here. -->
<p>The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they <!-- Clarify that these contact methods are for public contact only. -->
are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality <!--<h2>Non-private Contact Methods</h2>
and/or privacy is required.</p> <p>The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they
<br> are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality
<br>--> and/or privacy is required.</p>
</body> <br>
<br>-->
</body>
</html> </html>