diff options
Diffstat (limited to 'index.html.j2')
-rw-r--r-- | index.html.j2 | 91 |
1 files changed, 73 insertions, 18 deletions
diff --git a/index.html.j2 b/index.html.j2 index ddb7dbdf..6fceaed5 100644 --- a/index.html.j2 +++ b/index.html.j2 | |||
@@ -16,15 +16,23 @@ | |||
16 | {% endtrans %} | 16 | {% endtrans %} |
17 | <br><br> | 17 | <br><br> |
18 | {% trans %} | 18 | {% trans %} |
19 | GNUnet is typically run as an <a href="https://en.wikipedia.org/wiki/Overlay_network">overlay network</a> | 19 | GNUnet is typically run as an |
20 | on top of the the existing Internet infrastructure forming the basis of a hybrid | 20 | <a href="https://en.wikipedia.org/wiki/Overlay_network">overlay network</a> |
21 | on top of the the existing Internet infrastructure forming the | ||
22 | basis of a hybrid | ||
21 | <a href="architecture.html">peer-to-peer mesh and relay backbone</a> | 23 | <a href="architecture.html">peer-to-peer mesh and relay backbone</a> |
22 | for applications to run on. It could just as well be run independently of the Internet, over | 24 | for applications to run on. It could just as well be run |
25 | independently of the Internet, over | ||
23 | <a href="https://en.wikipedia.org/wiki/Physical_layer">dedicated radio and cable</a>. | 26 | <a href="https://en.wikipedia.org/wiki/Physical_layer">dedicated radio and cable</a>. |
24 | {% endtrans %} | 27 | {% endtrans %} |
25 | <br><br> | 28 | <br><br> |
26 | {% trans %} | 29 | {% trans %} |
27 | GNUnet is made for an open society: It's a self-organizing network and it's <a href="http://www.gnu.org/philosophy/free-sw.html">free software</a> as in freedom. GNUnet puts you in control of your data. You determine which data to share with whom, and you're not pressured to accept compromises. | 30 | GNUnet is made for an open society: It's a self-organizing |
31 | network and it is | ||
32 | <a href="http://www.gnu.org/philosophy/free-sw.html">free software</a> | ||
33 | as in freedom. GNUnet puts you in control of your data. You | ||
34 | determine which data to share with whom, and you're not | ||
35 | pressured to accept compromises. | ||
28 | {% endtrans %} | 36 | {% endtrans %} |
29 | </p> | 37 | </p> |
30 | <p> | 38 | <p> |
@@ -54,7 +62,14 @@ | |||
54 | <h3>{{ _("Imagine...") }}</h3> | 62 | <h3>{{ _("Imagine...") }}</h3> |
55 | <p> | 63 | <p> |
56 | {% trans %} | 64 | {% trans %} |
57 | The conventional Internet is currently like a system of roads with deep potholes and highwaymen all over the place. Even if you still can use the roads (e.g. send emails, or browse websites) your vehicle might get hijacked, damaged, or long arms might reach into its back and steal your items (data) to use it against you and sell it to others - while you can't even notice the thievery nor accuse and hold the scroungers accountable. | 65 | The conventional Internet is currently like a system of roads |
66 | with deep potholes and highwaymen all over the place. Even if | ||
67 | you still can use the roads (e.g. send emails, or browse | ||
68 | websites) your vehicle might get hijacked, damaged, or long | ||
69 | arms might reach into its back and steal your items (data) to | ||
70 | use it against you and sell it to others - while you can't | ||
71 | even notice the thievery nor accuse and hold the scroungers | ||
72 | accountable. | ||
58 | {% endtrans %} | 73 | {% endtrans %} |
59 | </p> | 74 | </p> |
60 | </div> | 75 | </div> |
@@ -63,12 +78,19 @@ | |||
63 | 78 | ||
64 | <p> | 79 | <p> |
65 | {% trans %} | 80 | {% trans %} |
66 | Protocols from Ethernet and IP to BGP and X.509 PKI are insecure by default: protecting against address forgery, routers learning metadata, or choosing trustworthy CAs is nontrivial and sometimes impossible. | 81 | Protocols from Ethernet and IP to BGP and X.509 PKI are |
82 | insecure by default: protecting against address forgery, | ||
83 | routers learning metadata, or choosing trustworthy CAs is | ||
84 | nontrivial and sometimes impossible. | ||
67 | {% endtrans %} | 85 | {% endtrans %} |
68 | </p> | 86 | </p> |
69 | <p> | 87 | <p> |
70 | {% trans %} | 88 | {% trans %} |
71 | GNUnet provides <a href="https://www.w3.org/2014/strint/papers/65.pdf">privacy by design</a>, improving addressing, routing, naming and content distribution in a technically robust manner - as opposed to ad-hoc designs in place today. | 89 | GNUnet provides |
90 | <a href="https://www.w3.org/2014/strint/papers/65.pdf">privacy by design</a>, | ||
91 | improving addressing, routing, naming and | ||
92 | content distribution in a technically robust manner - as | ||
93 | opposed to ad-hoc designs in place today. | ||
72 | {% endtrans %} | 94 | {% endtrans %} |
73 | </p> | 95 | </p> |
74 | </div> | 96 | </div> |
@@ -77,9 +99,18 @@ | |||
77 | 99 | ||
78 | <p> | 100 | <p> |
79 | {% trans %} | 101 | {% trans %} |
80 | It seems as if every other distributed or P2P project develops its own library stack, covering transports, stream muxing, discovery and others. This divides effort and multiplies bug count. | 102 | It seems as if every other distributed or P2P project |
81 | <br><br> | 103 | develops its own library stack, covering transports, stream |
82 | GNUnet is a metadata-preserving foundation for your application, covering areas from addressing to reliable bidirectional Axolotl-encrypted channels, with advanced routing. Our work is based on continuous research spanning almost two decades. | 104 | muxing, discovery and others. This divides effort and |
105 | multiplies bug count. | ||
106 | {% endtrans %} | ||
107 | <p> | ||
108 | {% trans %} | ||
109 | GNUnet is a metadata-preserving foundation for your | ||
110 | application, covering areas from addressing to reliable | ||
111 | bidirectional Axolotl-encrypted channels, with advanced | ||
112 | routing. Our work is based on continuous research spanning | ||
113 | almost two decades. | ||
83 | {% endtrans %} | 114 | {% endtrans %} |
84 | </p> | 115 | </p> |
85 | </div> | 116 | </div> |
@@ -89,23 +120,46 @@ | |||
89 | <h3>{{ _("Metadata is exposed") }}</h3> | 120 | <h3>{{ _("Metadata is exposed") }}</h3> |
90 | <p> | 121 | <p> |
91 | {% trans %} | 122 | {% trans %} |
92 | Even though transport encryption is increasingly being deployed on the Internet, it still reveals data that can threaten democracy: the identities of senders and receivers, the times, frequency and the volume of communication are all still revealed. <!-- Looks like a weak argumentation to me: which <a href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables reverse-engineering pages visited via website fingerprinting</a>. --> | 123 | Even though transport encryption is increasingly being |
93 | <br><br> | 124 | deployed on the Internet, it still reveals data that can |
94 | <a href="https://secushare.org/anonymity">GNUnet addresses these concerns</a> with perfect forward secrecy via ephemeral public key addressing, fixed packet size to hinder traffic analysis, layered encryption, Sybil-resistant routing, and more. | 125 | threaten democracy: the identities of senders and receivers, |
126 | the times, frequency and the volume of communication are all | ||
127 | still revealed. | ||
128 | <!-- Looks like a weak argumentation to me: | ||
129 | which <a | ||
130 | href="https://www.freehaven.net/anonbib/cache/websitefingerprinting-pets2016.pdf">enables | ||
131 | reverse-engineering pages visited via website | ||
132 | fingerprinting</a>. --> | ||
133 | {% endtrans %} | ||
134 | <p> | ||
135 | {% trans %} | ||
136 | GNUnet | ||
137 | <a href="https://secushare.org/anonymity">addresses</a> | ||
138 | these concerns with perfect forward secrecy via ephemeral | ||
139 | public key addressing, fixed packet size to hinder traffic | ||
140 | analysis, layered encryption, Sybil-resistant routing, and | ||
141 | more. | ||
95 | {% endtrans %} | 142 | {% endtrans %} |
96 | </p> | 143 | </p> |
97 | </div> | 144 | </div> |
98 | <div class="col-lg-4"> | 145 | <div class="col-lg-4"> |
99 | <h3>{{ _("Freedoms are not respected") }}</h3> | 146 | <h3>{{ _("Freedoms are not respected") }}</h3> |
100 | |||
101 | <p> | 147 | <p> |
102 | {% trans %} | 148 | {% trans %} |
103 | Today, monitoring increasingly centralized infrastructure, proprietary implementations, traffic shapers and firewalls restrict all of the <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a> to various degrees. | 149 | Today, monitoring increasingly centralized infrastructure, |
150 | proprietary implementations, traffic shapers and firewalls | ||
151 | restrict all of the | ||
152 | <a href="https://www.gnu.org/philosophy/free-sw.html">essential freedoms</a> | ||
153 | to various degrees. | ||
104 | {% endtrans %} | 154 | {% endtrans %} |
105 | </p> | 155 | </p> |
106 | <p> | 156 | <p> |
107 | {% trans %} | 157 | {% trans %} |
108 | GNUnet gives users freedoms to securely access information (“run” the network), to study all aspects of the network’s operation (“access the code”), to distribute information (“copy”), as well as the freedom to deploy new applications (“modify”). | 158 | GNUnet gives users freedoms to securely access information |
159 | ("run" the network), to study all aspects of the network’s | ||
160 | operation ("access the code"), to distribute information | ||
161 | ("copy"), as well as the freedom to deploy new applications | ||
162 | ("modify"). | ||
109 | {% endtrans %} | 163 | {% endtrans %} |
110 | </p> | 164 | </p> |
111 | </div> | 165 | </div> |
@@ -214,8 +268,9 @@ | |||
214 | <h3>{{ _("Conversation") }}</h3> | 268 | <h3>{{ _("Conversation") }}</h3> |
215 | <p> | 269 | <p> |
216 | {% trans %} | 270 | {% trans %} |
217 | GNUnet conversation is an application that provides secure voice communication | 271 | GNUnet conversation is an application that provides secure |
218 | in a fully decentralized way by employing GNUnet for routing and transport. | 272 | voice communication in a fully decentralized way by employing |
273 | GNUnet for routing and transport. | ||
219 | {% endtrans %} | 274 | {% endtrans %} |
220 | </p> | 275 | </p> |
221 | 276 | ||