forked from I2P_Developers/i2p.www
Update links on comparison/other-networks.html page
This commit is contained in:
@ -23,8 +23,8 @@ You may contribute an analysis by entering a
|
||||
|
||||
|
||||
<h2>Morphmix / Tarzan</h2>
|
||||
<i><a href="https://home.zhaw.ch/~rer/projects/morphmix/">[Morphmix]</a>
|
||||
<a href="http://pdos.csail.mit.edu/tarzan/">[Tarzan]</a></i>
|
||||
<i><a href="https://www.freehaven.net/anonbib/cache/morphmix:wpes2002.pdf">[Morphmix paper at Freehaven]</a>
|
||||
<a href="https://www.freehaven.net/anonbib/cache/tarzan:ccs02.pdf">[Tarzan paper at Freehaven]</a></i>
|
||||
|
||||
<p>{% trans threatmodel=site_url('docs/how/threat-model') -%}
|
||||
Morphmix and Tarzan are both fully distributed, peer to peer networks of
|
||||
@ -217,7 +217,7 @@ particular issues can be addressed.
|
||||
{%- endtrans %}</p>
|
||||
|
||||
<h2>Haystack</h2>
|
||||
<p>{% trans torpost='http://blog.torproject.org/blog/ten-things-look-circumvention-tool',
|
||||
<p>{% trans torpost='https://www.torproject.org/press/presskit/2010-09-16-circumvention-features.pdf',
|
||||
docs=site_url('docs') -%}
|
||||
This was a closed-source network targeted at Iranian users.
|
||||
Tor did a <a href="{{ torpost }}">good writeup on what to look for in a circumvention tool</a>.
|
||||
|
Reference in New Issue
Block a user