diff options
author | psyc://loupsycedyglgamf.onion/~lynX <ircs://psyced.org/youbroketheinternet> | 1984-04-04 00:44:05 +0000 |
---|---|---|
committer | psyc://loupsycedyglgamf.onion/~lynX <ircs://psyced.org/youbroketheinternet> | 1984-04-04 00:44:05 +0000 |
commit | 65eb0cd62f1f9273039867bc48325ee7f20ccbbd (patch) | |
tree | 90efc81b71139dd99156e0ec4a87fa823874499a | |
parent | 34bcca33aa176c697cf53decf06040d2cddbd238 (diff) | |
download | www-65eb0cd62f1f9273039867bc48325ee7f20ccbbd.tar.gz www-65eb0cd62f1f9273039867bc48325ee7f20ccbbd.zip |
"only do so much" <- confusing for non-native speakers
-rw-r--r-- | index.html.j2 | 19 | ||||
-rw-r--r-- | news.html.j2.inc | 2 |
2 files changed, 11 insertions, 10 deletions
diff --git a/index.html.j2 b/index.html.j2 index 5dff6c5b..9925a108 100644 --- a/index.html.j2 +++ b/index.html.j2 | |||
@@ -90,12 +90,11 @@ | |||
90 | <div class="row"> | 90 | <div class="row"> |
91 | <div class="col-lg-4"> | 91 | <div class="col-lg-4"> |
92 | <h3>{{ _("Metadata is exposed") }}</h3> | 92 | <h3>{{ _("Metadata is exposed") }}</h3> |
93 | |||
94 | <p> | 93 | <p> |
95 | {% trans %} | 94 | {% trans %} |
96 | Even though transport encryption is increasingly being deployed on the Internet, it can only do so much: sender and receiver, times, frequency and the volume of communication are still revealed, which <a href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables reverse engineering pages visited via website fingerprinting</a>. | 95 | Even though transport encryption is increasingly being deployed on the Internet, it still reveals data that can threaten democracy: the identities of senders and receivers, the times, frequency and the volume of communication are all still revealed. <!-- Looks like a weak argumentation to me: which <a href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables reverse-engineering pages visited via website fingerprinting</a>. --> |
97 | <br><br> | 96 | <br><br> |
98 | GNUnet addresses these concerns with perfect forward secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and others. | 97 | <a href="https://secushare.org/anonymity">GNUnet addresses these concerns</a> with perfect forward secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and more. |
99 | {% endtrans %} | 98 | {% endtrans %} |
100 | </p> | 99 | </p> |
101 | </div> | 100 | </div> |
@@ -167,8 +166,9 @@ | |||
167 | hierarchy, GNS uses a directed graph. Naming conventions | 166 | hierarchy, GNS uses a directed graph. Naming conventions |
168 | are similar to DNS, but queries and replies are private even | 167 | are similar to DNS, but queries and replies are private even |
169 | with respect to peers providing the answers. The integrity of | 168 | with respect to peers providing the answers. The integrity of |
170 | records is cryptographically secured. GNS integrates | 169 | records and privacy of look-ups is cryptographically secured. |
171 | a robust, efficient and instant key revocation mechanism. | 170 | <!-- Too technical: GNS integrates |
171 | a robust, efficient and instant key revocation mechanism. --> | ||
172 | {% endtrans %} | 172 | {% endtrans %} |
173 | </p> | 173 | </p> |
174 | 174 | ||
@@ -182,7 +182,7 @@ | |||
182 | is creating a decentralized social networking | 182 | is creating a decentralized social networking |
183 | application on top of GNUnet. Using overlay | 183 | application on top of GNUnet. Using overlay |
184 | multicast and the extensible PSYC protocol, notifications are | 184 | multicast and the extensible PSYC protocol, notifications are |
185 | distributed end-to-end encrypted to authorized users only. | 185 | distributed end-to-end encrypted to authorized recipients only. |
186 | {% endtrans %} | 186 | {% endtrans %} |
187 | </p> | 187 | </p> |
188 | </div> | 188 | </div> |
@@ -194,7 +194,8 @@ | |||
194 | 194 | ||
195 | <p> | 195 | <p> |
196 | {% trans %} | 196 | {% trans %} |
197 | <a href="https://pep.foundation/">pretty Easy privacy (p≡p)</a> is creating a usable end-to-end encrypted e-mail solution using | 197 | <a href="https://pep.foundation/">pretty Easy privacy</a> (p≡p) |
198 | is creating a usable end-to-end encrypted e-mail solution using | ||
198 | opportunistic key exchange. | 199 | opportunistic key exchange. |
199 | p≡p will use GNUnet to protect metadata and exploit new | 200 | p≡p will use GNUnet to protect metadata and exploit new |
200 | cryptographic protocols to verify keys. | 201 | cryptographic protocols to verify keys. |
@@ -206,8 +207,8 @@ | |||
206 | <p> | 207 | <p> |
207 | {% trans %} | 208 | {% trans %} |
208 | GNUnet filesharing is an application that provides | 209 | GNUnet filesharing is an application that provides |
209 | censorship-resistant, anonymous filesharing. It also supports | 210 | censorship-resistant, anonymous filesharing. The publisher is |
210 | non-anonymous filesharing that can provide better performance. | 211 | empowered to make a gradual choice between performance and anonymity. |
211 | {% endtrans %} | 212 | {% endtrans %} |
212 | </p> | 213 | </p> |
213 | 214 | ||
diff --git a/news.html.j2.inc b/news.html.j2.inc index f65d6459..47b17df8 100644 --- a/news.html.j2.inc +++ b/news.html.j2.inc | |||
@@ -4,4 +4,4 @@ | |||
4 | 4 | ||
5 | <p>The GNUnet hackers met for the second time this year. The primary goal was | 5 | <p>The GNUnet hackers met for the second time this year. The primary goal was |
6 | to squash bugs to bring out a new release. Aside from this we worked hard on | 6 | to squash bugs to bring out a new release. Aside from this we worked hard on |
7 | improving the documentation and to launch a new website.</p> | 7 | improving the documentation and to launch this new website.</p> |