Files
I2P_Website/www.i2p2/pages/index.html
2008-01-31 20:38:37 +00:00

31 lines
1.5 KiB
HTML

{% extends "_layout.html" %}
{% block title %}Home{% endblock %}
{% block content %}
<p><b>Latest version:</b><br />
2007-10-07 - I2P 0.6.1.30 -
<a href="http://dev.i2p.net/pipermail/i2p/2007-October/001356.html">Announcement</a>
- <a href="download">Download</a><br />
2007-09-28 - Syndie 1.101a -
<a href="http://dev.i2p.net/pipermail/i2p/2007-September/001355.html">Announcement</a>
- <a href="http://syndie.i2p.net/download.html">Download</a>
</p>
<p><b>Weekly updates:</b><br />
2007-04-10 <a href="meeting206">meeting logs</a> and <a
href="http://dev.i2p.net/pipermail/i2p/2007-April/001343.html">status notes</a></p>
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
<p>Anonymity is not a boolean - we are not trying to make something
"perfectly anonymous", but instead are working at making attacks more and more
expensive to mount. I2P alone is what could be called a "low latency mix network",
and there are limits to the anonymity offered by such a system, but the applications
on top of I2P, such as <a href="http://syndie.i2p.net/">Syndie</a>, I2P mail,
and I2PSnark extend it to offer both additional functionality and protection.</p>
<p>I2P is still a work in progress, and should only be used for testing or
development purposes prior to the 1.0 release. Further releases beyond that
will add support for more hostile adversaries.</p>
{% endblock %}