forked from I2P_Developers/i2p.www
Reworked front page text
This commit is contained in:
@@ -13,13 +13,19 @@
|
||||
<h1>{{ _('What is I2P?') }}</h1>
|
||||
<ul>
|
||||
<li>{% trans -%}
|
||||
I2P is a full darknet implementation - a network within a network, and is intended to protect against monitoring by third parties, such as hostile governments or ISPs.
|
||||
I2P is an alternate internet - a network within a network, and is intended to protect communication against monitoring by third parties, such as hostile governments or ISPs.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
I2P is used by many people who care about their privacy, as well as those in high-risk situations. It is designed to protect activists, oppressed people, journalists and whistle-blowers - as well as the average person.
|
||||
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistle-blowers - as well as the average person.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
Anonymity is not a boolean. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more expensive to mount.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
I2P runs on Java and is therefore available anywhere Java will run, including desktops, embedded systems (like the Raspberry Pi) and Android phones.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
I2P is a work in progress. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. Help spread the word!
|
||||
{% endtrans %}</li>
|
||||
<li>
|
||||
<a href="{{ site_url('about/intro') }}"><em>{% trans %}Read more…{% endtrans %}</em></a>
|
||||
|
Reference in New Issue
Block a user