From 70ea779e487b365ab25d0299981c82a9e44459b9 Mon Sep 17 00:00:00 2001 From: hankhill19580 Date: Tue, 3 Mar 2020 21:27:08 +0000 Subject: [PATCH] clarify messaging on I2P Browser page --- i2p2www/pages/site/browser/_front.html | 3 ++- i2p2www/pages/site/browser/roadmap.html | 33 +------------------------ 2 files changed, 3 insertions(+), 33 deletions(-) diff --git a/i2p2www/pages/site/browser/_front.html b/i2p2www/pages/site/browser/_front.html index 44d9f3e7..847d9712 100644 --- a/i2p2www/pages/site/browser/_front.html +++ b/i2p2www/pages/site/browser/_front.html @@ -67,7 +67,8 @@

{% trans bname=browser_name(), bsuff=browser_postname() %}Old versions of {{ bname }} {{ bsuff }} are - still available from the link below: + still available from the link below. They should be regarded as unsafe to use, and are only here for + historical and experimental purposes. {% endtrans %}

diff --git a/i2p2www/pages/site/browser/roadmap.html b/i2p2www/pages/site/browser/roadmap.html index 8187f006..15b6cd1d 100644 --- a/i2p2www/pages/site/browser/roadmap.html +++ b/i2p2www/pages/site/browser/roadmap.html @@ -25,38 +25,7 @@
    -
  1. Design for Dynamic Themes/Contextual Identities
  2. -
  3. Smart Landing Page
  4. -
  5. Investigate adding a "new tab" application list
  6. -
  7. HTTP Proxy Readiness indicator
  8. -
  9. Application Dialog Boxes with Description of Applications
  10. -
  11. Update/explain long-term product goals on web site
  12. -
  13. Notify users that update is downloading Add a "Downloading I2P Browser update"
  14. -
  15. Change the default Firefox profile directory to be I2BB-relative.
  16. -
  17. Tests for .i2p whitelisting
  18. -
  19. Tests for .i2p secure cookies
  20. -
  21. Mark .i2p cookies as secure
  22. -
  23. Besides enabling I2P features, there is also the on-going work of backporting and enabling enhancements from TBB, which sometimes require alteration to work with I2P. Highlights for this release: -
      -
    1. Enable media cache in memory
    2. -
    3. Prevent speculative connect that violated FPI.
    4. -
    5. Exclude ClearKey system
    6. -
    7. Added a script to run all I2P Browser specific tests
    8. -
    9. Remove localhost DNS lookup in nsProfileLock.cpp
    10. -
    11. Disable libmdns
    12. -
    13. Downgrades VP9 videos to VP8
    14. -
    15. Reinstate the update.xml hash check
    16. -
    17. Disable WebGL readPixel() for web content
    18. -
    19. Prevent WebSocket DNS leak
    20. -
    21. Disable installation of system addons
    22. -
    23. Don't allow SSL key logging
    24. -
    25. Clear window.name when no referrer sent
    26. -
    27. Disable NTLM and Negotiate HTTP Auth
    28. -
    29. Prevent potential proxy bypass cases.
    30. -
    31. Don't allow enterprise policies in I2P Browser
    32. -
    33. Disable pingsender executable
    34. -
    35. Tests for browser preferences
    36. -
    +
  24. Cancelled