
Warning:
Contacting the ugly Internet is not advised.
When using public key encryption, be sure to exchange keys in a secure manner to avoid the dreaded man-in-the-middle.
Consider using Tails, TOR, and other privacy focused tools.
Authenticated communications is preferred over catphishing.
If you insist on contacting by email, do so at your own peril.