diff --git a/i2p2www/pages/site/research/vrp.html b/i2p2www/pages/site/research/vrp.html index d892665e..b40cebab 100644 --- a/i2p2www/pages/site/research/vrp.html +++ b/i2p2www/pages/site/research/vrp.html @@ -7,8 +7,8 @@ This process is subject to change. Please refer to this page for the current VRP. {%- endtrans %}
-{% trans %}This page was last updated in January 2020.{%- endtrans %}
-{% trans %}This process is subject to change. Please refer to this page for the current VRP.{%- endtrans %}
+{% trans %}This page was last updated in June 2020.{%- endtrans %}
+{% trans %}Researchers: while you research/hack, we kindly ask that you refrain from the following: - Performing active exploits or Denial of Service attacks on the i2p network - Performing social engineering on i2p development team members - Performing any physical or electronic attempts against i2p property and/or data centers{%- endtrans %}
@@ -29,10 +29,10 @@ Echelon is the trusted security point-of-contact. He forwards e-mails to team me