diff --git a/key.html b/key.html index 13e0e7b..7c2113c 100644 --- a/key.html +++ b/key.html @@ -5,7 +5,7 @@ - + @@ -33,58 +33,21 @@
Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
- attacks, have high security, and reasonable privacy.
-
-
Use the
- keys for each contact method to verify my devices.
- Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other
+
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other force.
- Signal
+
-
-
-
If metadata leakage is an issue for you, you can use the following contact methods.
+
- Briar
- Session
The following contact methods do not utilise end-to-end encryption, or I do not use such functionality; they - are suitable for public contact only, including directly and groups. Do not use these methods if confidentiality - and/or privacy is required.
-