Key




Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other force.


End-to-end Encrypted Contact Methods


XMPP



File and Git Signing


SSH