aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorpsyc://loupsycedyglgamf.onion/~lynX <ircs://psyced.org/youbroketheinternet>1984-04-04 00:44:05 +0000
committerpsyc://loupsycedyglgamf.onion/~lynX <ircs://psyced.org/youbroketheinternet>1984-04-04 00:44:05 +0000
commit65eb0cd62f1f9273039867bc48325ee7f20ccbbd (patch)
tree90efc81b71139dd99156e0ec4a87fa823874499a
parent34bcca33aa176c697cf53decf06040d2cddbd238 (diff)
downloadwww-65eb0cd62f1f9273039867bc48325ee7f20ccbbd.tar.gz
www-65eb0cd62f1f9273039867bc48325ee7f20ccbbd.zip
"only do so much" <- confusing for non-native speakers
-rw-r--r--index.html.j219
-rw-r--r--news.html.j2.inc2
2 files changed, 11 insertions, 10 deletions
diff --git a/index.html.j2 b/index.html.j2
index 5dff6c5b..9925a108 100644
--- a/index.html.j2
+++ b/index.html.j2
@@ -90,12 +90,11 @@
90 <div class="row"> 90 <div class="row">
91 <div class="col-lg-4"> 91 <div class="col-lg-4">
92 <h3>{{ _("Metadata is exposed") }}</h3> 92 <h3>{{ _("Metadata is exposed") }}</h3>
93
94 <p> 93 <p>
95 {% trans %} 94 {% trans %}
96 Even though transport encryption is increasingly being deployed on the Internet, it can only do so much: sender and receiver, times, frequency and the volume of communication are still revealed, which <a href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables reverse engineering pages visited via website fingerprinting</a>. 95 Even though transport encryption is increasingly being deployed on the Internet, it still reveals data that can threaten democracy: the identities of senders and receivers, the times, frequency and the volume of communication are all still revealed. <!-- Looks like a weak argumentation to me: which <a href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables reverse-engineering pages visited via website fingerprinting</a>. -->
97 <br><br> 96 <br><br>
98 GNUnet addresses these concerns with perfect forward secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and others. 97 <a href="https://secushare.org/anonymity">GNUnet addresses these concerns</a> with perfect forward secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and more.
99 {% endtrans %} 98 {% endtrans %}
100 </p> 99 </p>
101 </div> 100 </div>
@@ -167,8 +166,9 @@
167 hierarchy, GNS uses a directed graph. Naming conventions 166 hierarchy, GNS uses a directed graph. Naming conventions
168 are similar to DNS, but queries and replies are private even 167 are similar to DNS, but queries and replies are private even
169 with respect to peers providing the answers. The integrity of 168 with respect to peers providing the answers. The integrity of
170 records is cryptographically secured. GNS integrates 169 records and privacy of look-ups is cryptographically secured.
171 a robust, efficient and instant key revocation mechanism. 170 <!-- Too technical: GNS integrates
171 a robust, efficient and instant key revocation mechanism. -->
172 {% endtrans %} 172 {% endtrans %}
173 </p> 173 </p>
174 174
@@ -182,7 +182,7 @@
182 is creating a decentralized social networking 182 is creating a decentralized social networking
183 application on top of GNUnet. Using overlay 183 application on top of GNUnet. Using overlay
184 multicast and the extensible PSYC protocol, notifications are 184 multicast and the extensible PSYC protocol, notifications are
185 distributed end-to-end encrypted to authorized users only. 185 distributed end-to-end encrypted to authorized recipients only.
186 {% endtrans %} 186 {% endtrans %}
187 </p> 187 </p>
188 </div> 188 </div>
@@ -194,7 +194,8 @@
194 194
195 <p> 195 <p>
196 {% trans %} 196 {% trans %}
197 <a href="https://pep.foundation/">pretty Easy privacy (p&#8801;p)</a> is creating a usable end-to-end encrypted e-mail solution using 197 <a href="https://pep.foundation/">pretty Easy privacy</a> (p&#8801;p)
198 is creating a usable end-to-end encrypted e-mail solution using
198 opportunistic key exchange. 199 opportunistic key exchange.
199 p&#8801;p will use GNUnet to protect metadata and exploit new 200 p&#8801;p will use GNUnet to protect metadata and exploit new
200 cryptographic protocols to verify keys. 201 cryptographic protocols to verify keys.
@@ -206,8 +207,8 @@
206 <p> 207 <p>
207 {% trans %} 208 {% trans %}
208 GNUnet filesharing is an application that provides 209 GNUnet filesharing is an application that provides
209 censorship-resistant, anonymous filesharing. It also supports 210 censorship-resistant, anonymous filesharing. The publisher is
210 non-anonymous filesharing that can provide better performance. 211 empowered to make a gradual choice between performance and anonymity.
211 {% endtrans %} 212 {% endtrans %}
212 </p> 213 </p>
213 214
diff --git a/news.html.j2.inc b/news.html.j2.inc
index f65d6459..47b17df8 100644
--- a/news.html.j2.inc
+++ b/news.html.j2.inc
@@ -4,4 +4,4 @@
4 4
5<p>The GNUnet hackers met for the second time this year. The primary goal was 5<p>The GNUnet hackers met for the second time this year. The primary goal was
6to squash bugs to bring out a new release. Aside from this we worked hard on 6to squash bugs to bring out a new release. Aside from this we worked hard on
7improving the documentation and to launch a new website.</p> 7improving the documentation and to launch this new website.</p>