Contact

Table of Contents

Notes

End-to-end Encrypted Contact Methods

Preferred

Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle attacks, have high security, and reasonable privacy.

Use the keys for each contact method to verify my devices.
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other force.

Signal

+447549902964


XMPP

inference@inferencium.net (Main) - (Key)

inference@notyour.chat (Backup) - (Key)

Metadata-free

If metadata leakage is an issue for you, you can use the following contact methods.

Note: These services do not have verification functionality and will be treated as less secure; unless you really need to use these services, use a preferred method instead.

Briar

Unavailable