diff --git a/i2p2www/pages/global/footer.html b/i2p2www/pages/global/footer.html index 9b0537ae..47b3135d 100644 --- a/i2p2www/pages/global/footer.html +++ b/i2p2www/pages/global/footer.html @@ -8,18 +8,18 @@
diff --git a/i2p2www/pages/site/faq.html b/i2p2www/pages/site/faq.html index 35209067..58197f13 100644 --- a/i2p2www/pages/site/faq.html +++ b/i2p2www/pages/site/faq.html @@ -673,14 +673,14 @@ There is an outproxy guide available on our forums, {%- endtrans %}

{% trans %}Is using I2P Safe?{% endtrans %}

-

{% trans %}I2P strives to be safe in it's default configuration for all users. In most, possibly all countries, anonymizing -software and strong encryption are not illegal to possess or use.{% endtrans %}

- -

{% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. Structurally, taking over a single peer, or even a fairly large group of peers, with a subpoena is not an effective way to deanonymizing anybody else's traffic. -{% endtrans %}

Before you use I2P, use Basic Computer Hygiene Always! Apply your OS vendor provided software updates in a prompt manner. Be aware of the state of your firewall and anti-virus status if you use one. Always get your software from authentic sources.

+

{% trans %}I2P strives to be safe in it's default configuration for all users.{% endtrans %}

+ +

{% trans %} It may be dangerous to use I2P in what the project calls "Strict Countries" where the law may not be clear on anonymizing software and where risks are judged to be fairly high. Most I2P peers are not in those strict countries and the ones that are, are placed in "Hidden Mode" where they interact with the rest of the network in more limited ways, so that they are less visible to network observers. +{% endtrans %}

+

{% trans %}I see IP addresses of all other I2P nodes in the router console. Does that mean my IP address is visible by others?{% endtrans %}

diff --git a/i2p2www/pages/site/index.html b/i2p2www/pages/site/index.html index 40f055ae..c3e3fcd2 100644 --- a/i2p2www/pages/site/index.html +++ b/i2p2www/pages/site/index.html @@ -5,7 +5,7 @@ {% block content_outer %}
-

{{ _('What does I2P do for you?') }}

+

{{ _('Welcome to the Invisible Internet') }}

{% trans %}The Invisible Internet is a privacy by design, people-powered network. It is a truly free and anonymizing Internet alternative. Get I2P. {% endtrans %}

{% trans version=ver() %}Get I2P {{ version }}{% endtrans %} @@ -19,44 +19,30 @@ activity, location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building. {%- endtrans %} -

{% trans %}I2P Cares about Privacy{% endtrans %}

+

{% trans %}I2P Cares About Privacy{% endtrans %}

+
+

Peer-to-Peer

+

Everyday, people use the I2P network to connect with other people without the worry of being tracked or their data being collected. In some cases people rely on the network when they cannot safely communicate or while doing sensitive work. The network is P2P - people powered, and always growing. Learn more about the Protocol Stack.

+ +

Privacy and Security By Design

+

I2P has created transport protocols that resist DPI censorship, and continuously improves its end to end encryption. + Read the I2P Transport Overview

+ +

Built For Communication

+

I2P has an application layer with easy to use API’s for creating your own privacy - aware apps.

+
{{ _('I2P Blog ATOM Feed') }}

{% trans %}News & Updates{% endtrans %}

{% include "blog/latest.html" %}
-
-

{% trans %}Conferences Calendar 2020{% endtrans %}

-

I2P Developers will be visiting these conferences this year:

-

Upcoming:

- -

Past:

- -
+ {% endblock %} diff --git a/i2p2www/static/images/pexels-jakub-novacek.jpg b/i2p2www/static/images/pexels-jakub-novacek.jpg index 2a2d265e..7057c716 100644 Binary files a/i2p2www/static/images/pexels-jakub-novacek.jpg and b/i2p2www/static/images/pexels-jakub-novacek.jpg differ diff --git a/i2p2www/static/styles/duck/default.css b/i2p2www/static/styles/duck/default.css index da408c69..d9a6eda9 100644 --- a/i2p2www/static/styles/duck/default.css +++ b/i2p2www/static/styles/duck/default.css @@ -141,7 +141,7 @@ div#content .main p { /* text-transform: uppercase;*/ text-decoration: none; text-align: center; - background: #50CEDA; + background: #60ab60; border-radius: .3em; text-shadow: 1px 1px 1px rgba(0,0,0,.2); /*box-shadow: 2px 2px 4px rgba(0, 0, 0, 0.3), 1em 3em 2em 0.5em rgba(255, 255, 255, 0.3) inset, inset -.2em -.5em 1em -0em rgba(0,0,0,.3);*/