diff --git a/i2p2www/pages/site/index.html b/i2p2www/pages/site/index.html index 17d87175fb6bcfb56fe987f2d5228bc04d0a8ebb..1b48365708cf778ce33e92eea4077220619e406c 100644 --- a/i2p2www/pages/site/index.html +++ b/i2p2www/pages/site/index.html @@ -13,16 +13,16 @@ <h1>{{ _('What is I2P?') }}</h1> <ul> <li>{% trans -%} -I2P is an anonymous overlay network - a network within a network. It is intended to protect communication against dragnet surveillance, and monitoring by third parties such as ISPs. +I2P is an anonymous overlay network - a network within a network. It is intended to protect communication from dragnet surveillance and monitoring by third parties such as ISPs. {% endtrans %}</li> <li>{% trans -%} -I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistle-blowers - as well as the average person. +I2P is used by many people who care about their privacy: activists, oppressed people, journalists and whistleblowers, as well as the average person. {% endtrans %}</li> <li>{% trans -%} -I2P runs on Java and is therefore available anywhere Java will run, including desktops, embedded systems (like the Raspberry Pi) and Android phones. +No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more difficult to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. {% endtrans %}</li> <li>{% trans -%} -Anonymity is not a boolean. No network can be "perfectly anonymous". The continued goal of I2P is to make attacks more and more expensive to mount. Its anonymity will get stronger as the size of the network increases and with ongoing academic review. Help spread the word! +I2P is available on desktops, embedded systems (like the Raspberry Pi) and Android phones. Help spread the word! {% endtrans %}</li> <li> <a href="{{ site_url('about/intro') }}"><em>{% trans %}Read more…{% endtrans %}</em></a>