RESEARCHERLIAN SECURITY RESEARCH OFFICIAL CONTACT INFORMATION Organization: Researcherlian Security Research Website: https://researcherlian.pages.dev Established: 2026 PRIMARY CONTACTS General Inquiries & Research Collaboration: securityresearcher01@gmail.com - General questions about our research - Collaboration opportunities - Speaking engagements and conferences - Media inquiries - Partnership proposals Vulnerability Disclosure & Security Testing: resercherlian@gmail.com - Responsible disclosure of vulnerabilities - Request security testing for your applications - Bug bounty submissions - Security consultation inquiries - Penetration testing requests ENCRYPTION & SECURE COMMUNICATION All sensitive communications should be encrypted. We support: ProtonMail: Send encrypted emails to our ProtonMail addresses (available on request) Signal Messenger: Contact us via email first to arrange Signal communication Website Contact Form: https://researcherlian.pages.dev/#contact Secure form with HTTPS encryption VERIFICATION METHODS To verify you're contacting the legitimate Researcherlian team: Website: https://researcherlian.pages.dev Contains matching contact information Social Media: WhatsApp: +234 702 624 2926 (verify via website) TikTok: @researcherlian (linked from website) WHAT WE DO WITH YOUR INFORMATION Confidentiality: All vulnerability reports are treated as confidential We do not share reporter identities without explicit permission Data Handling: Contact information stored only for communication Vulnerability details secured with encryption No data sold to third parties See Privacy Policy: /legal/privacy-policy.html Response Times: Initial acknowledgment: Within 24-48 hours Vulnerability assessment: 2-5 business days Testing request evaluation: 2-3 business days Research collaboration: 3-5 business days LEGAL & DISCLOSURE INFORMATION Responsible Disclosure: We follow coordinated disclosure practices We do not disclose without consent Reasonable time given for fixes before public disclosure Researchers credited with permission Full policy: /legal/responsible-disclosure.html Terms of Engagement: Ownership verification required before testing Signed testing agreement required Defined scope of work Full terms: /legal/terms-of-engagement.html FREQUENTLY ASKED QUESTIONS Do you have a bug bounty program? We currently do not operate a paid bug bounty program, but we greatly appreciate coordinated disclosures and will acknowledge researchers. How do I verify system ownership before testing? We accept domain email verification, DNS TXT records, or meta tag verification on your website. Contact us for details. What types of systems do you test? Web applications, APIs, mobile apps (Android/iOS), and cloud infrastructure. Contact us with your specific needs. Do you sign NDAs? Yes, we're happy to sign mutual NDAs before discussing sensitive details about your systems. How are reports delivered? We provide comprehensive PDF reports with executive summaries, technical findings, and remediation guidance. What is your retesting policy? We include one round of retesting within 30 days of initial report to verify fixes. TECHNICAL SPECIFICATIONS Website Security: HTTPS enforced with TLS 1.3 HSTS enabled Security headers configured Regular security scanning Email Security: SPF, DKIM, and DMARC configured TLS required for email transmission CHANGELOG v1.0 (March 7, 2026): Initial contact information file created Added both official contact emails Added encryption guidelines Added verification methods Added FAQ and organizational information CONTACT US We look forward to hearing from you. Whether you're reporting a critical vulnerability, seeking to secure your applications, or interested in collaborating on security research, we're here to help. Email: General/Research: securityresearcher01@gmail.com Disclosure/Testing: resercherlian@gmail.com Website: https://researcherlian.pages.dev WhatsApp: +234 702 624 2926 TikTok: @researcherlian Office Hours: Monday-Friday, 9am-6pm WAT (UTC+1) Emergency disclosures: 24/7 response for critical vulnerabilities For PGP encrypted communication, please request our current PGP key via email. We will provide our public key upon request for secure communication.