I2P Address: [http://git.idk.i2p]

Skip to content
Snippets Groups Projects
Commit fdf5cf62 authored by str4d's avatar str4d
Browse files

More frontpage text changes

parent f5034fa3
No related branches found
No related tags found
No related merge requests found
......@@ -13,16 +13,16 @@
<h1>{{ _('What is I2P?') }}</h1>
<ul>
<li>{% trans -%}
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication against dragnet surveillance, and monitoring by third parties such as ISPs.
I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs.
{% endtrans %}</li>
<li>{% trans -%}
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistle-blowers - as well as the average person.
I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person.
{% endtrans %}</li>
<li>{% trans -%}
I2P runs on Java and is therefore available anywhere Java will run, including desktops, embedded systems (like the Raspberry Pi) and Android phones.
No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review.
{% endtrans %}</li>
<li>{% trans -%}
Anonymity is not a boolean. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more expensive to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. Help spread the word!
I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones. Help spread the word!
{% endtrans %}</li>
<li>
<a href="{{ site_url('about/intro') }}"><em>{% trans %}Read more&hellip;{% endtrans %}</em></a>
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment