aboutsummaryrefslogtreecommitdiff
path: root/index.html.j2
diff options
context:
space:
mode:
Diffstat (limited to 'index.html.j2')
-rw-r--r--index.html.j259
1 files changed, 52 insertions, 7 deletions
diff --git a/index.html.j2 b/index.html.j2
index dd9d60f7..0480232d 100644
--- a/index.html.j2
+++ b/index.html.j2
@@ -11,19 +11,64 @@
11 11
12 <p> 12 <p>
13 {% trans %} 13 {% trans %}
14 GNUnet is an alternative network stack for 14 An alternative P2P network stack to build secure, decentralized and privacy-preserving distributed applications; built to replace the old insecure Internet protocols.
15 building secure, decentralized and privacy-preserving
16 distributed applications. Our goal is to replace the old
17 insecure Internet protocol stack. Starting from an application
18 for secure publication of files, GNUnet has grown to include all
19 kinds of basic protocol components and applications towards the
20 creation of a GNU internet.
21 {% endtrans %} 15 {% endtrans %}
22 </p> 16 </p>
23 17
24 </div> 18 </div>
25</div> 19</div>
26 20
21<div class="container">
22 <div class="row">
23 <div class="col-lg-6">
24 <h3>{{ _("The Internet is broken") }}</h3>
25
26 <p>
27 {% trans %}
28 Protocols from Ethernet and IP to BGP and X.509 PKI fail by being unsecure-by-default: protecting against address forgery, routers learning metadata, or choosing really trusted CAs is nontrivial and sometimes nigh impossible.
29 <br><br>
30 GNUnet is an Internet <a href="https://www.w3.org/2014/strint/papers/65.pdf">secure-by-design</a>, addressing addressing, routing, naming and content distribution in a technically robust manner - as opposed to ad-hoc designs in place today.
31 {% endtrans %}
32 </p>
33 </div>
34 <div class="col-lg-6">
35 <h3>{{ _("Developing decentralized applications is hard") }}</h3>
36
37 <p>
38 {% trans %}
39 It seems like every other P2P project develops its own library stack, covering transports, stream muxing, discovery and others. This divides effort and multiplies bug count.
40 <br><br>
41 GNUnet is a metadata-preserving foundation for your application covering areas from addressing to reliable bidirectional Axolotl-encrypted channels, with advanced routing and based on years of research.
42 {% endtrans %}
43 </p>
44 </div>
45 </div>
46 <div class="row">
47 <div class="col-lg-6">
48 <h3>{{ _("Metadata leaks en masse") }}</h3>
49
50 <p>
51 {% trans %}
52 Even though transport encryption is increasingly being deployed in the Internet, it can only do so much: sender and receiver, times, frequency and the volume of communication are all revealed, which enables reverse engineering pages visited and website fingerprinting, as demonstrated with Tor.
53 <br><br>
54 GNUnet addresses these concerns with Perfect Forward Secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and others.
55 {% endtrans %}
56 </p>
57 </div>
58 <div class="col-lg-6">
59 <h3>{{ _("Users’ freedoms are not respected") }}</h3>
60
61 <p>
62 {% trans %}
63 Today, monitoring infrastructure, proprietary implementations, traffic shapers and firewalls restrict all of the <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a> to some degree.
64 <br><br>
65 GNUnet gives users freedoms to securely access information (“run” the network), to study all aspects of the network’s operation (“access the code”), to distribute information (“copy”), as well as the freedom to deploy new applications (“modify”).
66 {% endtrans %}
67 </p>
68 </div>
69 </div>
70</div>
71
27<div class="container adorn_h3_bracket"> 72<div class="container adorn_h3_bracket">
28 <div class="row"> 73 <div class="row">
29 <div class="col-lg-4"> 74 <div class="col-lg-4">