diff --git a/contrib/keygen-html/Makefile b/contrib/keygen-html/Makefile
deleted file mode 100644
index a3acec0..0000000
--- a/contrib/keygen-html/Makefile
+++ /dev/null
@@ -1,6 +0,0 @@
-curve25519_generate.js: src/curve25519_generate.c src/glue.js
- emcc -O2 --memory-init-file 0 --closure 1 --post-js src/glue.js -s 'EXTRA_EXPORTED_RUNTIME_METHODS=["Pointer_stringify"]' -o $@ src/curve25519_generate.c
-clean:
- rm -f curve25519_generate.js
-all: curve25519_generate.js
-.PHONY: clean all
diff --git a/contrib/keygen-html/README b/contrib/keygen-html/README
index eaa4244..f1c3412 100644
--- a/contrib/keygen-html/README
+++ b/contrib/keygen-html/README
@@ -17,11 +17,3 @@ introduces interesting side-channel attacks.
Secrets aren't zerored after use. Maybe you can get around this with
some tricks taking advantage of browser allocator behavior and different
processes, but it seems pretty hard.
-
-Building
---------
-
-In order to use the example `keygen.html` file, you must first build
-the C sources using emscripten. Simply run:
-
- $ make
diff --git a/contrib/keygen-html/keygen.html b/contrib/keygen-html/keygen.html
index af2a545..939e637 100644
--- a/contrib/keygen-html/keygen.html
+++ b/contrib/keygen-html/keygen.html
@@ -1,4 +1,4 @@
-
+