<h2data-i18n="header.title">Invisible Internet Project:</h2>
<h2data-i18n="header.title">Invisible Internet Protocol:</h2>
<h1data-i18n="header.slogan">Network without borders</h1>
<pdata-i18n="header.p1">We are building network which helps people to communicate and share information without restrictions.</p>
<pdata-i18n="header.p2">Free from censorship. Free from privacy violations.</p>
@ -30,10 +30,10 @@
@@ -30,10 +30,10 @@
</p>
</div>
<divclass="content">
<h2data-i18n="content.how.title">How Invisible Internet works?</h2>
<pdata-i18n="content.how.p1">I2P (Invisible Internet Project) is anonymous network which works on top of public Internet.</p>
<pdata-i18n="content.how.p2">Privacy and anonymity are achieved by strong encryption and bouncing your traffic through thousands of I2P nodes all around the world.</p>
<pdata-i18n="content.how.p3">Nobody can track your activities inside Invisible Internet.</p>
<pstyle="font-size: 1.2em;"data-i18n="content.how.title">i2pd (I2P Daemon) is a full-featured C++ implementation of I2P client.</p>
<pdata-i18n="content.how.p1">I2P (Invisible Internet Protocol) is a universal anonymous network layer. All communications over I2P are anonymous and end-to-end encrypted, participants don't reveal their real IP addresses.</p>
<pdata-i18n="content.how.p2">I2P client is a software used for building and using anonymous I2P networks. Such networks are commonly used for anonymous peer-to-peer applications (filesharing, cryptocurrencies) and anonymous client-server applications (websites, instant messengers, chat-servers).</p>
<pdata-i18n="content.how.p3">I2P allows people from all around the world to communicate and share information without restrictions.</p>
<p>
<spandata-i18n="content.how.p4">If you are interested in deeper technical details, visit</span>