aboutsummaryrefslogtreecommitdiff
path: root/index.html.j2
diff options
context:
space:
mode:
Diffstat (limited to 'index.html.j2')
-rw-r--r--index.html.j291
1 files changed, 73 insertions, 18 deletions
diff --git a/index.html.j2 b/index.html.j2
index ddb7dbdf..6fceaed5 100644
--- a/index.html.j2
+++ b/index.html.j2
@@ -16,15 +16,23 @@
16 {% endtrans %} 16 {% endtrans %}
17 <br><br> 17 <br><br>
18 {% trans %} 18 {% trans %}
19 GNUnet is typically run as an <a href="https://en.wikipedia.org/wiki/Overlay_network">overlay network</a> 19 GNUnet is typically run as an
20 on top of the the existing Internet infrastructure forming the basis of a hybrid 20 <a href="https://en.wikipedia.org/wiki/Overlay_network">overlay network</a>
21 on top of the the existing Internet infrastructure forming the
22 basis of a hybrid
21 <a href="architecture.html">peer-to-peer mesh and relay backbone</a> 23 <a href="architecture.html">peer-to-peer mesh and relay backbone</a>
22 for applications to run on. It could just as well be run independently of the Internet, over 24 for applications to run on. It could just as well be run
25 independently of the Internet, over
23 <a href="https://en.wikipedia.org/wiki/Physical_layer">dedicated radio and cable</a>. 26 <a href="https://en.wikipedia.org/wiki/Physical_layer">dedicated radio and cable</a>.
24 {% endtrans %} 27 {% endtrans %}
25 <br><br> 28 <br><br>
26 {% trans %} 29 {% trans %}
27 GNUnet is made for an open society: It's a self-organizing network and it's <a href="http://www.gnu.org/philosophy/free-sw.html">free software</a> as in freedom. GNUnet puts you in control of your data. You determine which data to share with whom, and you're not pressured to accept compromises. 30 GNUnet is made for an open society: It's a self-organizing
31 network and it is
32 <a href="http://www.gnu.org/philosophy/free-sw.html">free software</a>
33 as in freedom. GNUnet puts you in control of your data. You
34 determine which data to share with whom, and you're not
35 pressured to accept compromises.
28 {% endtrans %} 36 {% endtrans %}
29 </p> 37 </p>
30 <p> 38 <p>
@@ -54,7 +62,14 @@
54 <h3>{{ _("Imagine...") }}</h3> 62 <h3>{{ _("Imagine...") }}</h3>
55 <p> 63 <p>
56 {% trans %} 64 {% trans %}
57 The conventional Internet is currently like a system of roads with deep potholes and highwaymen all over the place. Even if you still can use the roads (e.g. send emails, or browse websites) your vehicle might get hijacked, damaged, or long arms might reach into its back and steal your items (data) to use it against you and sell it to others - while you can't even notice the thievery nor accuse and hold the scroungers accountable. 65 The conventional Internet is currently like a system of roads
66 with deep potholes and highwaymen all over the place. Even if
67 you still can use the roads (e.g. send emails, or browse
68 websites) your vehicle might get hijacked, damaged, or long
69 arms might reach into its back and steal your items (data) to
70 use it against you and sell it to others - while you can't
71 even notice the thievery nor accuse and hold the scroungers
72 accountable.
58 {% endtrans %} 73 {% endtrans %}
59 </p> 74 </p>
60 </div> 75 </div>
@@ -63,12 +78,19 @@
63 78
64 <p> 79 <p>
65 {% trans %} 80 {% trans %}
66 Protocols from Ethernet and IP to BGP and X.509 PKI are insecure by default: protecting against address forgery, routers learning metadata, or choosing trustworthy CAs is nontrivial and sometimes impossible. 81 Protocols from Ethernet and IP to BGP and X.509 PKI are
82 insecure by default: protecting against address forgery,
83 routers learning metadata, or choosing trustworthy CAs is
84 nontrivial and sometimes impossible.
67 {% endtrans %} 85 {% endtrans %}
68 </p> 86 </p>
69 <p> 87 <p>
70 {% trans %} 88 {% trans %}
71 GNUnet provides <a href="https://www.w3.org/2014/strint/papers/65.pdf">privacy by design</a>, improving addressing, routing, naming and content distribution in a technically robust manner - as opposed to ad-hoc designs in place today. 89 GNUnet provides
90 <a href="https://www.w3.org/2014/strint/papers/65.pdf">privacy by design</a>,
91 improving addressing, routing, naming and
92 content distribution in a technically robust manner - as
93 opposed to ad-hoc designs in place today.
72 {% endtrans %} 94 {% endtrans %}
73 </p> 95 </p>
74 </div> 96 </div>
@@ -77,9 +99,18 @@
77 99
78 <p> 100 <p>
79 {% trans %} 101 {% trans %}
80 It seems as if every other distributed or P2P project develops its own library stack, covering transports, stream muxing, discovery and others. This divides effort and multiplies bug count. 102 It seems as if every other distributed or P2P project
81 <br><br> 103 develops its own library stack, covering transports, stream
82 GNUnet is a metadata-preserving foundation for your application, covering areas from addressing to reliable bidirectional Axolotl-encrypted channels, with advanced routing. Our work is based on continuous research spanning almost two decades. 104 muxing, discovery and others. This divides effort and
105 multiplies bug count.
106 {% endtrans %}
107 <p>
108 {% trans %}
109 GNUnet is a metadata-preserving foundation for your
110 application, covering areas from addressing to reliable
111 bidirectional Axolotl-encrypted channels, with advanced
112 routing. Our work is based on continuous research spanning
113 almost two decades.
83 {% endtrans %} 114 {% endtrans %}
84 </p> 115 </p>
85 </div> 116 </div>
@@ -89,23 +120,46 @@
89 <h3>{{ _("Metadata is exposed") }}</h3> 120 <h3>{{ _("Metadata is exposed") }}</h3>
90 <p> 121 <p>
91 {% trans %} 122 {% trans %}
92 Even though transport encryption is increasingly being deployed on the Internet, it still reveals data that can threaten democracy: the identities of senders and receivers, the times, frequency and the volume of communication are all still revealed. <!-- Looks like a weak argumentation to me: which <a href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables reverse-engineering pages visited via website fingerprinting</a>. --> 123 Even though transport encryption is increasingly being
93 <br><br> 124 deployed on the Internet, it still reveals data that can
94 <a href="https://secushare.org/anonymity">GNUnet addresses these concerns</a> with perfect forward secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and more. 125 threaten democracy: the identities of senders and receivers,
126 the times, frequency and the volume of communication are all
127 still revealed.
128 <!-- Looks like a weak argumentation to me:
129 which <a
130 href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables
131 reverse-engineering pages visited via website
132 fingerprinting</a>. -->
133 {% endtrans %}
134 <p>
135 {% trans %}
136 GNUnet
137 <a href="https://secushare.org/anonymity">addresses</a>
138 these concerns with perfect forward secrecy via ephemeral
139 public key addressing, fixed packet size to hinder traffic
140 analysis, layered encryption, Sybil-resistant routing, and
141 more.
95 {% endtrans %} 142 {% endtrans %}
96 </p> 143 </p>
97 </div> 144 </div>
98 <div class="col-lg-4"> 145 <div class="col-lg-4">
99 <h3>{{ _("Freedoms are not respected") }}</h3> 146 <h3>{{ _("Freedoms are not respected") }}</h3>
100
101 <p> 147 <p>
102 {% trans %} 148 {% trans %}
103 Today, monitoring increasingly centralized infrastructure, proprietary implementations, traffic shapers and firewalls restrict all of the <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a> to various degrees. 149 Today, monitoring increasingly centralized infrastructure,
150 proprietary implementations, traffic shapers and firewalls
151 restrict all of the
152 <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a>
153 to various degrees.
104 {% endtrans %} 154 {% endtrans %}
105 </p> 155 </p>
106 <p> 156 <p>
107 {% trans %} 157 {% trans %}
108 GNUnet gives users freedoms to securely access information (“run” the network), to study all aspects of the network’s operation (“access the code”), to distribute information (“copy”), as well as the freedom to deploy new applications (“modify”). 158 GNUnet gives users freedoms to securely access information
159 ("run" the network), to study all aspects of the network’s
160 operation ("access the code"), to distribute information
161 ("copy"), as well as the freedom to deploy new applications
162 ("modify").
109 {% endtrans %} 163 {% endtrans %}
110 </p> 164 </p>
111 </div> 165 </div>
@@ -214,8 +268,9 @@
214 <h3>{{ _("Conversation") }}</h3> 268 <h3>{{ _("Conversation") }}</h3>
215 <p> 269 <p>
216 {% trans %} 270 {% trans %}
217 GNUnet conversation is an application that provides secure voice communication 271 GNUnet conversation is an application that provides secure
218 in a fully decentralized way by employing GNUnet for routing and transport. 272 voice communication in a fully decentralized way by employing
273 GNUnet for routing and transport.
219 {% endtrans %} 274 {% endtrans %}
220 </p> 275 </p>
221 276