Especially note that:
* We only accept vulnerability reports through this form for certain systems, which are listed in our Vulnerability Disclosure Policy.* We also accept emails at email@example.com, and can engage in back-and-forth conversation there.* We do not currently support GPG-encrypted emails for vulnerability reports. For particularly sensitive information, please use this (TLS-encrypted) form.