Browse Source

Merge pull request #1 from l-n-s/master

upd
pull/3/head
l-n-s 8 years ago committed by GitHub
parent
commit
44db14d940
  1. 12
      index.html
  2. 10
      locales/en/translation.json
  3. 10
      locales/ru/translation.json

12
index.html

@ -2,7 +2,7 @@
<html> <html>
<head> <head>
<meta charset="utf-8"> <meta charset="utf-8">
<title>Invisible Internet Project: Purple</title> <title>Invisible Internet Protocol Daemon</title>
<link href="css/app.css" rel="stylesheet"> <link href="css/app.css" rel="stylesheet">
<script src="js/app.js"></script> <script src="js/app.js"></script>
<link rel="icon" type="image/png" href="images/favicon.png" /> <link rel="icon" type="image/png" href="images/favicon.png" />
@ -13,7 +13,7 @@
<div class="container"> <div class="container">
<div class="header"> <div class="header">
<img src="images/favicon.png" id="logo"> <img src="images/favicon.png" id="logo">
<h2 data-i18n="header.title">Invisible Internet Project:</h2> <h2 data-i18n="header.title">Invisible Internet Protocol:</h2>
<h1 data-i18n="header.slogan">Network without borders</h1> <h1 data-i18n="header.slogan">Network without borders</h1>
<p data-i18n="header.p1">We are building network which helps people to communicate and share information without restrictions.</p> <p data-i18n="header.p1">We are building network which helps people to communicate and share information without restrictions.</p>
<p data-i18n="header.p2">Free from censorship. Free from privacy violations.</p> <p data-i18n="header.p2">Free from censorship. Free from privacy violations.</p>
@ -30,10 +30,10 @@
</p> </p>
</div> </div>
<div class="content"> <div class="content">
<h2 data-i18n="content.how.title">How Invisible Internet works?</h2> <p style="font-size: 1.2em;" data-i18n="content.how.title">i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client</p>
<p data-i18n="content.how.p1">I2P (Invisible Internet Project) is anonymous network which works on top of public Internet.</p> <p data-i18n="content.how.p1">I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.</p>
<p data-i18n="content.how.p2">Privacy and anonymity are achieved by strong encryption and bouncing your traffic through thousands of I2P nodes all around the world.</p> <p data-i18n="content.how.p2">I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers).</p>
<p data-i18n="content.how.p3">Nobody can track your activities inside Invisible Internet.</p> <p data-i18n="content.how.p3">I2P allows people from all around the world to communicate and share information without restrictions.</p>
<p> <p>
<span data-i18n="content.how.p4">If you are interested in deeper technical details, visit</span> <span data-i18n="content.how.p4">If you are interested in deeper technical details, visit</span>
<a data-i18n="content.how.details" href="https://geti2p.net/en/about/intro" <a data-i18n="content.how.details" href="https://geti2p.net/en/about/intro"

10
locales/en/translation.json

@ -1,6 +1,6 @@
{ {
"header": { "header": {
"title": "Invisible Internet Project:", "title": "Invisible Internet Protocol:",
"slogan": "Network without borders", "slogan": "Network without borders",
"p1": "We are building network which helps people to communicate and share information without restrictions.", "p1": "We are building network which helps people to communicate and share information without restrictions.",
"p2": "Free from censorship. Free from privacy violations.", "p2": "Free from censorship. Free from privacy violations.",
@ -12,10 +12,10 @@
}, },
"content": { "content": {
"how": { "how": {
"title": "How Invisible Internet works?", "title": "i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client",
"p1": "I2P (Invisible Internet Project) is anonymous network which works on top of public Internet.", "p1": "I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.",
"p2": "Privacy and anonymity are achieved by strong encryption and bouncing your traffic through thousands of I2P nodes all around the world.", "p2": "I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers).",
"p3": "Nobody can track your activities inside Invisible Internet.", "p3": "I2P allows people from all around the world to communicate and share information without restrictions.",
"p4": "If you are interested in deeper technical details, visit", "p4": "If you are interested in deeper technical details, visit",
"details": "this page" "details": "this page"
}, },

10
locales/ru/translation.json

@ -1,6 +1,6 @@
{ {
"header": { "header": {
"title": "Проект \"Невидимый Интернет\":", "title": "Невидимый Интернет Протокол:",
"slogan": "Сеть без границ", "slogan": "Сеть без границ",
"p1": "Мы строим сеть, которая позволяет людям общаться и обмениваться информацией без искуственных преград.", "p1": "Мы строим сеть, которая позволяет людям общаться и обмениваться информацией без искуственных преград.",
"p2": "Без цензуры. Без нарушений права на частную жизнь.", "p2": "Без цензуры. Без нарушений права на частную жизнь.",
@ -12,10 +12,10 @@
}, },
"content": { "content": {
"how": { "how": {
"title": "Как работает Невидимый Интернет?", "title": "i2pd (I2P Daemon) это полнофункциональная реализация I2P клиента на языке C++",
"p1": "I2P (Invisible Internet Project) это анонимная сеть поверх обычного Интернета.", "p1": "I2P (Невидимый Интернет Протокол) это универсальный анонимный сетевой уровень. Все соединения через I2P анонимны и используют сквозное (end-to-end) шифрование, участники не раскрывают свои настоящие IP адреса.",
"p2": "Приватность и анонимность достигается применением сильного шифрования и маршрутизацией сетевого трафика через тысячи I2P нод по всему миру.", "p2": "I2P клиент это программа для построения и использования анонимных I2P сетей. Подобные сети обычно используются для анонимных peer-to-peer приложений (файлообмен, криптовалюты) и для анонимных клиент-серверных приложений (вебсайты, мессенджеры, чат-серверы).",
"p3": "Никто не может отследить вашу активность в Невидимом Интернете.", "p3": "I2P позволяет людям со всего мира общаться и делиться информацией без ограничений.",
"p4": "Если заинтересовали более глубокие технические детали, посетите", "p4": "Если заинтересовали более глубокие технические детали, посетите",
"details": "эту страницу" "details": "эту страницу"
}, },

Loading…
Cancel
Save