diff --git a/i2p2www/pages/site/docs/how/tech-intro.html b/i2p2www/pages/site/docs/how/tech-intro.html
index 338e1c49217b4ac0318bb031f777ce41b2fafc65..8d97615f5c6f44a2df5247204c5e06f482f2c14e 100644
--- a/i2p2www/pages/site/docs/how/tech-intro.html
+++ b/i2p2www/pages/site/docs/how/tech-intro.html
@@ -781,6 +781,8 @@ two in particular are pulled out here - Tor and Freenet.
 
   <p>{% trans comparisons=site_url('comparison') -%}
 See also the <a href="{{ comparisons }}">Network Comparisons Page</a>. 
+Note that these descriptions were written by jrandom in 2003 and
+may not currently be accurate.
 {%- endtrans %}</p>
 
   <h2 id="similar.tor">Tor</h2>
@@ -831,11 +833,6 @@ in a tunnel is important, as an adversary would otherwise be able to mount
 a series of powerful predecessor, intersection, and traffic confirmation attacks. 
 {%- endtrans %}</p>
 
-  <p>{% trans -%}
-Tor's support for a second tier of "onion proxies" does offer a non-trivial 
-degree of anonymity while requiring a low cost of entry, while I2P will not 
-offer this topology until <a href="#future.restricted">2.0</a>.
-{%- endtrans %}</p>
 
   <p>{% trans -%}
 On the whole, Tor and I2P complement each other in their focus - Tor works 
@@ -881,20 +878,6 @@ Freenet team will pursue efforts in that direction, if not simply reusing
 (or helping to improve, as necessary) existing mixnets like I2P or Tor.
 {%- endtrans %}</p>
 
-  <p>{% trans -%}
-It is worth mentioning that there has recently been discussion and work 
-by the Freenet developers on a "globally scalable darknet" using restricted 
-routes between peers of various trust. While insufficient information has 
-been made publicly available regarding how such a system would operate for 
-a full review, from what has been said the anonymity and scalability claims 
-seem highly dubious. In particular, the appropriateness for use in hostile 
-regimes against state level adversaries has been tremendously overstated, 
-and any analysis on the implications of resource scarcity upon the scalability 
-of the network has seemingly been avoided. Further questions regarding susceptibility 
-to traffic analysis, trust and other topics do exist, but a more in-depth 
-review of this "globally scalable darknet" will have to wait until the Freenet 
-team makes more information available.
-{%- endtrans %}</p>
 
   <h1 id="app">Appendix A: Application layer</h1>
   <p>{% trans -%}
@@ -1076,9 +1059,7 @@ to delivery through the mail.i2p outproxies, which are separate from the mail.i2
 SMTP and POP3 servers - both the outproxies and inproxies communicate with 
 the mail.i2p SMTP and POP3 servers through I2P itself, so compromising those 
 non-anonymous locations does not give access to the mail accounts or activity 
-patterns of the user. At the moment the developers work on a decentralized 
-mailsystem, called "v2mail". More information can be found on the I2P Site 
-<a href="http://{{ postman }}/">{{ postman }}</a>.
+patterns of the user.
 {%- endtrans %}</p>