All listed contact methods are end-to-end encrypted.