Contact Us

Warning:
Contacting the ugly Internet is not advised.

When using public key encryption, be sure to exchange keys in a secure manner to avoid the dreaded man-in-the-middle.

Consider using Tails, TOR, and other privacy focused tools.

Authenticated communications is preferred over catphishing.

If you insist on contacting by email, do so at your own peril.