diff --git a/contact.html b/contact.html index d4c97a9..358eb17 100644 --- a/contact.html +++ b/contact.html @@ -5,7 +5,7 @@ - + @@ -31,25 +31,19 @@

Contact

-

Table of Contents

+

Table of Contents

-

Notes

+

Notes

-

End-to-end Encrypted Contact Methods

+

End-to-end Encrypted Contact Methods

-

Preferred

+

Preferred

Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle attacks, have high security, and reasonable privacy.

Use the - keys for each contact method to verify my devices.
+ keys for each contact method to verify my devices.
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other force.

-

Signal
+

Signal

+447549902964


-

XMPP
+

XMPP

inference@inferencium.net - (Key)

+ (Key)
+
+ inference@notyour.chat + (Key)

-

Metadata-free

+

Metadata-free

If metadata leakage is an issue for you, you can use the following contact methods.

Note: These services do not have verification functionality and will be treated as less secure; unless you really need to use these services, use a preferred method instead.

-

Briar
+

Briar

Unavailable