- I have phased out usage of obsolete, insecure PGP for all contact methods.
- I have phased out usage of email, including TLS-encrypted email.
Whenever possible, use the following contact methods; they allow verification to mitigate man-in-the-middle
attacks, have high security, and reasonable privacy.
Use the
keys for each contact method to verify my devices.
Note: Verification does not verify a person, only their devices, and can be defeated via coercion or other
force.
Signal
+447549902964
XMPP
inference@inferencium.net
(Key)
If metadata leakage is an issue for you, you can use the following contact methods.
Note: These services do not have verification functionality and will be treated as less secure; unless
you really need to use these services, use a preferred method instead.
Briar
Unavailable
Session
Unavailable