Contact.

Channel.

In order to contact us, prioritize end-to-end encryption and select the channel most suited to you below.

Process.
  • After the first initial contact, we usually schedule a video meeting, using a secured application such as Jitsi.
  • During the first video meeting, we’ll answer your questions with only the information already publicly available on our website.
  • If the project goes ahead, we’ll send you a NDA (Non Disclosure Agreement) to ensure all parties from your side understand that any information shared shall be considered strictly confidential.

Available channels:

  1. Session.
  2. Wickr Me.
  3. Email.
  4. Jitsi.

1. Session.

Session is a blockchain based secure and anonymous communication application.

Your messages will be received by all our Nodes, this is a shared account. Please use English.

Pros:
  • Always-on encryption.
  • Expiration timer.
  • Decentralized hence censorship resistant.
  • Anonymous.
  • Open source code.
Cons:
  • Being decentralized it is slow and doesn’t allow for built-in video feature (yet).
Our contact:
  • ID: 058ac7093d8a0c2a80960c03866565dc1b2e1fef9b8c24e5c04f1828240cb6dc53
  • QR Code for your contacting us using a mobile device:

2. Wickr Me.

Wickr Me is a military grade secured communication application offering forensic resistant deletion of messages.

Pros:
  • Always-on end-to-end encryption even on video and audio.
  • 1:1 encrypted video feature.
  • Expiration timer.
  • Forensic resistant deletion of messages with overwriting.
Cons:
  • US based company with servers in the US. Subject to Cloud Act, Prism and Echelon, undisclosed subpoena etc.
  • Central server will log your IP and meta data. But your messages stay encrypted on their servers.
  • Not open source code.
  • Is asking for your phone number during registration, though you can skip this page it shows an attempt to collect personal data.

3. Email.

Email is the most unsecured communication channel in use. It has been invented in the 70s and has never been designed to be secure in the first place. Unless you can give us your PGP key, please stop using emails and instead use encrypted apps.

3.1 Encryption.

The only way to protect an email is to encrypt it using PGP, but the header (to, from, object) is not encrypted, only the content is.

Preferably use email in that order:
  1. Use Tutanota as we’re using it too so your email will be automatically encrypted in transit.
  2. Use an unsecured email (gmail etc) but encrypt the content using our PGP key below.
  3. Use an unsecured and unencrypted email, but then reduce the amount of information until we establish a secured channel.

3.2 Tutanota.

Create a Tutanota account to send us an email so that it will be end-to-end encrypted.

Our contact:
  • You can send us an email: team.2022 [at] ubinodes [dot] com

3.3- Public PGP Key:

—–BEGIN PGP PUBLIC KEY BLOCK—–
Comment: User-ID: Admin team.2021@ubinodes.com
Comment: Created: 05/03/2021 17:23
Comment: Expires: 05/03/2023 12:00
Comment: Type: 3,072-bit RSA (secret key available)
Comment: Usage: Signing, Encryption, Certifying User-IDs
Comment: Fingerprint: 0A78729EC03F54C650DC86B0A40E6BF8D47F4984
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=glUb
—–END PGP PUBLIC KEY BLOCK—–

4. Jitsi.

If you’re leading the meeting, here is the best practice :

1- If possible use a VPN so as to mask your IP to Jitsi’s servers. Use a fast VPN so as to retain a good video quality. For example ExpressVPN (no affiliation here).

2- A few minutes before the set time, on Jitsi’s website, launch a new session: https://meet.jit.si/

3- From this session, use the feature « invite » to copy the link.

4- Share this link with other participants using a secured communication channel (Wickr, Wire, Threema etc).

  • 4.1- Otherwise by email, in this case encrypt using PGP.
  • 4.2- If not possible, make it so each participant is using either Tutanota or Protonmail, so that each email is end-to-end encrypted with PGP before leaving the computer. Tutanota and Protonmail are not cross-compatible, participants must use the same provider.
  • 4.3- If not possible, use unsecured email, destroy it after use, give as little information as possible in the subject and body.