diff options
author | xrs <xrs@mail36.net> | 2018-06-27 23:46:48 +0200 |
---|---|---|
committer | xrs <xrs@mail36.net> | 2018-06-28 00:08:11 +0200 |
commit | de3489c3b367e774f03f8a33a123a765a2c4dbad (patch) | |
tree | 058cdbdfd94a56d69e1cc95cee33af2370d4f910 | |
parent | 79678d804949efe4b079107b7525d39c282a7847 (diff) | |
download | www-de3489c3b367e774f03f8a33a123a765a2c4dbad.tar.gz www-de3489c3b367e774f03f8a33a123a765a2c4dbad.zip |
update index
-rw-r--r-- | index.html.j2 | 135 |
1 files changed, 72 insertions, 63 deletions
diff --git a/index.html.j2 b/index.html.j2 index 9c1829c8..29c5f7a0 100644 --- a/index.html.j2 +++ b/index.html.j2 | |||
@@ -35,83 +35,90 @@ | |||
35 | </div> | 35 | </div> |
36 | </div> | 36 | </div> |
37 | 37 | ||
38 | <div class="container text-center"> | 38 | <div class="container-fluid bg-primary"> |
39 | <div class="container"> | 39 | <div class="container text-center"> |
40 | <div class="row"> | 40 | <div class="row"> |
41 | <h3> | ||
41 | {% trans %} | 42 | {% trans %} |
42 | The conventional Internet is currently like a system of roads with deep potholes and highwaymen all over the place. Even if you still can use the roads (e.g. send emails, or browse websites) your vehicle might get hijacked, damaged, or long ugly arms might reach into its back and steal your items (data) to use it against you and sell it to others - while you can't even notice the thievery nor accuse and hold the scroungers accountable. | 43 | The conventional Internet is currently like a system of roads with deep potholes and highwaymen all over the place. Even if you still can use the roads (e.g. send emails, or browse websites) your vehicle might get hijacked, damaged, or long ugly arms might reach into its back and steal your items (data) to use it against you and sell it to others - while you can't even notice the thievery nor accuse and hold the scroungers accountable. |
43 | {% endtrans %} | 44 | {% endtrans %} |
44 | <br><br> | 45 | </h3> |
46 | </div> | ||
47 | <div class="row"> | ||
48 | <div class="container text-center bg-primary"> | ||
45 | <h3> | 49 | <h3> |
46 | {% trans %} | 50 | {% trans %} |
47 | The Internet of tomorrow needs GNUnet today. | 51 | The Internet of tomorrow needs GNUnet today. |
48 | {% endtrans %} | 52 | {% endtrans %} |
49 | </h3> | 53 | </h3> |
54 | </div> | ||
50 | </div> | 55 | </div> |
51 | </div> | 56 | </div> |
52 | </div> | ||
53 | |||
54 | <div class="container-fluid bg-primary"> | ||
55 | <div class="container"> | 57 | <div class="container"> |
56 | <div class="row"> | 58 | <div class="row"> |
57 | <div class="col-lg-6"> | 59 | <div class="col-lg-6"> |
58 | <h3>{{ _("The Internet is broken") }}</h3> | 60 | <h3>{{ _("The Internet is broken") }}</h3> |
59 | 61 | ||
60 | <p> | 62 | <p> |
61 | {% trans %} | 63 | {% trans %} |
62 | Protocols from Ethernet and IP to BGP and X.509 PKI fail by being unsecure-by-default: protecting against address forgery, routers learning metadata, or choosing really trusted CAs is nontrivial and sometimes nigh impossible. | 64 | Protocols from Ethernet and IP to BGP and X.509 PKI fail by being unsecure-by-default: protecting against address forgery, routers learning metadata, or choosing really trusted CAs is nontrivial and sometimes nigh impossible. |
63 | <!-- | 65 | {% endtrans %} |
64 | Please name abbreviations + short explanations for abbreviations. | 66 | </p> |
65 | --> | 67 | <p> |
66 | <br><br> | 68 | {% trans %} |
67 | GNUnet is an Internet <a href="https://www.w3.org/2014/strint/papers/65.pdf">secure-by-design</a>, improving addressing, routing, naming and content distribution in a technically robust manner - as opposed to ad-hoc designs in place today. | 69 | GNUnet is an Internet <a href="https://www.w3.org/2014/strint/papers/65.pdf">secure-by-design</a>, improving addressing, routing, naming and content distribution in a technically robust manner - as opposed to ad-hoc designs in place today. |
68 | {% endtrans %} | 70 | {% endtrans %} |
69 | </p> | 71 | </p> |
70 | </div> | 72 | </div> |
71 | <div class="col-lg-6"> | 73 | <div class="col-lg-6"> |
72 | <h3>{{ _("Developing decentralized applications is hard") }}</h3> | 74 | <h3>{{ _("Developing decentralized applications is hard") }}</h3> |
73 | 75 | ||
74 | <p> | 76 | <p> |
75 | {% trans %} | 77 | {% trans %} |
76 | It seems like every other distributed or P2P project develops its own library stack, covering transports, stream muxing, discovery and others. This divides effort and multiplies bug count. | 78 | It seems like every other distributed or P2P project develops its own library stack, covering transports, stream muxing, discovery and others. This divides effort and multiplies bug count. |
77 | <br><br> | 79 | <br><br> |
78 | GNUnet is a metadata-preserving foundation for your application, covering areas from addressing to reliable bidirectional Axolotl-encrypted channels, with advanced routing. Our work is based on continuous research spanning almost two decades. | 80 | GNUnet is a metadata-preserving foundation for your application, covering areas from addressing to reliable bidirectional Axolotl-encrypted channels, with advanced routing. Our work is based on continuous research spanning almost two decades. |
79 | {% endtrans %} | 81 | {% endtrans %} |
80 | </p> | 82 | </p> |
81 | </div> | 83 | </div> |
82 | </div> | ||
83 | <div class="row"> | ||
84 | <div class="col-lg-6"> | ||
85 | <h3>{{ _("Metadata leaks en masse") }}</h3> | ||
86 | |||
87 | <p> | ||
88 | {% trans %} | ||
89 | Even though transport encryption is increasingly being deployed in the Internet, it can only do so much: sender and receiver, times, frequency and the volume of communication are all revealed, which enables reverse engineering pages visited and website fingerprinting, as demonstrated with Tor. | ||
90 | <br><br> | ||
91 | GNUnet addresses these concerns with Perfect Forward Secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and others. | ||
92 | {% endtrans %} | ||
93 | </p> | ||
94 | </div> | 84 | </div> |
95 | <div class="col-lg-6"> | 85 | <div class="row"> |
96 | <h3>{{ _("Users’ freedoms are not respected") }}</h3> | 86 | <div class="col-lg-6"> |
97 | 87 | <h3>{{ _("Metadata leaks en masse") }}</h3> | |
98 | <p> | 88 | |
99 | {% trans %} | 89 | <p> |
100 | Today, monitoring infrastructure, proprietary implementations, traffic shapers and firewalls restrict all of the <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a> to some degree. | 90 | {% trans %} |
101 | <br><br> | 91 | Even though transport encryption is increasingly being deployed in the Internet, it can only do so much: sender and receiver, times, frequency and the volume of communication are all revealed, which enables reverse engineering pages visited and website fingerprinting, as demonstrated with Tor. |
102 | GNUnet gives users freedoms to securely access information (“run” the network), to study all aspects of the network’s operation (“access the code”), to distribute information (“copy”), as well as the freedom to deploy new applications (“modify”). | 92 | <br><br> |
103 | {% endtrans %} | 93 | GNUnet addresses these concerns with Perfect Forward Secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and others. |
104 | </p> | 94 | {% endtrans %} |
95 | </p> | ||
96 | </div> | ||
97 | <div class="col-lg-6"> | ||
98 | <h3>{{ _("Users’ freedoms are not respected") }}</h3> | ||
99 | |||
100 | <p> | ||
101 | {% trans %} | ||
102 | Today, monitoring infrastructure, proprietary implementations, traffic shapers and firewalls restrict all of the <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a> to some degree. | ||
103 | {% endtrans %} | ||
104 | </p> | ||
105 | <p> | ||
106 | {% trans %} | ||
107 | GNUnet gives users freedoms to securely access information (“run” the network), to study all aspects of the network’s operation (“access the code”), to distribute information (“copy”), as well as the freedom to deploy new applications (“modify”). | ||
108 | {% endtrans %} | ||
109 | </p> | ||
110 | </div> | ||
105 | </div> | 111 | </div> |
106 | </div> | 112 | </div> |
107 | </div> | 113 | <div class="container"> |
108 | <div class="row"> | 114 | <div class="row"> |
109 | <div class="container-fluid text-center bg-primary"> | 115 | <div class="container text-center bg-primary"> |
110 | <h3> | 116 | <h3> |
111 | {% trans %} | 117 | {% trans %} |
112 | GNUnet aims to enable a secure and ethical Internet. | 118 | GNUnet aims to enable a secure and ethical Internet. |
113 | {% endtrans %} | 119 | {% endtrans %} |
114 | </h3> | 120 | </h3> |
121 | </div> | ||
115 | </div> | 122 | </div> |
116 | </div> | 123 | </div> |
117 | </div> | 124 | </div> |
@@ -122,7 +129,9 @@ | |||
122 | <div class="row"> | 129 | <div class="row"> |
123 | <div class="container"> | 130 | <div class="container"> |
124 | <h2> | 131 | <h2> |
125 | Featured Applications | 132 | {% trans %} |
133 | Featured Applications | ||
134 | {% endtrans %} | ||
126 | </h2> | 135 | </h2> |
127 | </div> | 136 | </div> |
128 | </div> | 137 | </div> |