Files
i2p.www/www.i2p2/pages/index.html

30 lines
1.4 KiB
HTML
Raw Normal View History

2008-01-31 20:38:37 +00:00
{% extends "_layout.html" %}
{% block title %}Home{% endblock %}
{% block content %}
<p><b>Latest version:</b><br />
2007-10-08 03:53:56 +00:00
2007-10-07 - I2P 0.6.1.30 -
<a href="release-0.6.1.30.html">Announcement</a>
2007-01-05 02:55:06 +00:00
- <a href="download">Download</a><br />
2007-09-29 05:06:36 +00:00
2007-09-28 - Syndie 1.101a -
<!-- <a href="http://dev.i2p.net/pipermail/i2p/2007-September/001355.html">Announcement</a>
- <a href="http://syndie.i2p.net/download.html">Download</a> -->
</p>
<p><b>Latest News:</b><br />
2008-02-01 <a href="statnotes0108">status notes 01 2008</a></p>
<p>I2P is an anonymizing network, offering a simple layer that identity-sensitive
applications can use to securely communicate. All data is wrapped with several
layers of encryption, and the network is both distributed and dynamic, with no trusted parties.</p>
<p>Anonymity is not a boolean - we are not trying to make something
"perfectly anonymous", but instead are working at making attacks more and more
expensive to mount. I2P alone is what could be called a "low latency mix network",
and there are limits to the anonymity offered by such a system, but the applications
on top of I2P, such as <a href="http://syndie.i2p.net/">Syndie</a>, I2P mail,
and I2PSnark extend it to offer both additional functionality and protection.</p>
<p>I2P is still a work in progress, and should only be used for testing or
development purposes prior to the 1.0 release. Further releases beyond that
will add support for more hostile adversaries.</p>
2008-01-31 20:38:37 +00:00
{% endblock %}