forked from I2P_Developers/i2p.www
More frontpage text changes
This commit is contained in:
@@ -13,16 +13,16 @@
|
||||
<h1>{{ _('What is I2P?') }}</h1>
|
||||
<ul>
|
||||
<li>{% trans -%}
|
||||
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication against dragnet surveillance, and monitoring by third parties such as ISPs.
|
||||
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistle-blowers - as well as the average person.
|
||||
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
I2P runs on Java and is therefore available anywhere Java will run, including desktops, embedded systems (like the Raspberry Pi) and Android phones.
|
||||
No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.
|
||||
{% endtrans %}</li>
|
||||
<li>{% trans -%}
|
||||
Anonymity is not a boolean. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more expensive to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. Help spread the word!
|
||||
I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones. Help spread the word!
|
||||
{% endtrans %}</li>
|
||||
<li>
|
||||
<a href="{{ site_url('about/intro') }}"><em>{% trans %}Read more…{% endtrans %}</em></a>
|
||||
|
Reference in New Issue
Block a user