瀏覽代碼

mesh philosophic

Bob Mottram 7 年之前
父節點
當前提交
e050cc3009
共有 1 個檔案被更改,包括 31 行新增31 行删除
  1. 31
    31
      website/EN/mesh_philosophic.html

+ 31
- 31
website/EN/mesh_philosophic.html 查看文件

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2017-10-27 Fri 10:43 -->
6
+<!-- 2017-10-27 Fri 11:48 -->
7 7
 <meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title>&lrm;</title>
@@ -256,90 +256,90 @@ for the JavaScript code in this tag.
256 256
 The Freedombone mesh roughly follows MondoNet's ten social specifications:
257 257
 </p>
258 258
 
259
-<div id="outline-container-org64c7e0b" class="outline-2">
260
-<h2 id="org64c7e0b">Decentralized</h2>
261
-<div class="outline-text-2" id="text-org64c7e0b">
259
+<div id="outline-container-orgd854595" class="outline-2">
260
+<h2 id="orgd854595">Decentralized</h2>
261
+<div class="outline-text-2" id="text-orgd854595">
262 262
 <p>
263 263
 The network should not be operated, maintained, or in any way reliant upon a single or minimally differentiated set of entities or technologies. No individual, entity or group should be central to the network to the extent that their absence would measurably impact its functionality or scope. Network participation should not require access to fixed, physical infrastructure of any sort.
264 264
 </p>
265 265
 </div>
266 266
 </div>
267 267
 
268
-<div id="outline-container-org1aa487e" class="outline-2">
269
-<h2 id="org1aa487e">Universally Accessible</h2>
270
-<div class="outline-text-2" id="text-org1aa487e">
268
+<div id="outline-container-org5c46858" class="outline-2">
269
+<h2 id="org5c46858">Universally Accessible</h2>
270
+<div class="outline-text-2" id="text-org5c46858">
271 271
 <p>
272 272
 The requisite technology and expertise required to participate in the network should be available at minimal cost and effort to every human being on the planet. Furthermore, all users should be able to extend the network’s content and functionality to suit their own needs, or those of others. No aspect of the network’s functioning should be reliant upon proprietary technologies, information or capital.
273 273
 </p>
274 274
 </div>
275 275
 </div>
276 276
 
277
-<div id="outline-container-org2214465" class="outline-2">
278
-<h2 id="org2214465">Censor-proof</h2>
279
-<div class="outline-text-2" id="text-org2214465">
277
+<div id="outline-container-org6776743" class="outline-2">
278
+<h2 id="org6776743">Censor-proof</h2>
279
+<div class="outline-text-2" id="text-org6776743">
280 280
 <p>
281 281
 The network should be resistant to both regulatory and technical attempts to limit the nature of the information shared, restrict usage by given individuals or communities, or render the network, or any portion of it, inoperable or inaccessible.
282 282
 </p>
283 283
 </div>
284 284
 </div>
285 285
 
286
-<div id="outline-container-org80f696c" class="outline-2">
287
-<h2 id="org80f696c">Surveillance-proof</h2>
288
-<div class="outline-text-2" id="text-org80f696c">
286
+<div id="outline-container-org0bcdf27" class="outline-2">
287
+<h2 id="org0bcdf27">Surveillance-proof</h2>
288
+<div class="outline-text-2" id="text-org0bcdf27">
289 289
 <p>
290 290
 The network should enable users to choose exactly what information they share with whom, and to participate anonymously if they so desire. Users should only have access to information if they are the designated recipients, or if it has been published openly.
291 291
 </p>
292 292
 </div>
293 293
 </div>
294 294
 
295
-<div id="outline-container-orga3acdc3" class="outline-2">
296
-<h2 id="orga3acdc3">Secure</h2>
297
-<div class="outline-text-2" id="text-orga3acdc3">
295
+<div id="outline-container-org0ed66ba" class="outline-2">
296
+<h2 id="org0ed66ba">Secure</h2>
297
+<div class="outline-text-2" id="text-org0ed66ba">
298 298
 <p>
299 299
 The network should be organized in a way that minimizes the risk of malicious attacks or engineering failure. Information exchanged on the network should meet or exceed the delivery rate and reliability of information exchanged via the Internet.
300 300
 </p>
301 301
 </div>
302 302
 </div>
303 303
 
304
-<div id="outline-container-org03f9c5e" class="outline-2">
305
-<h2 id="org03f9c5e">Scalable</h2>
306
-<div class="outline-text-2" id="text-org03f9c5e">
304
+<div id="outline-container-org8db594f" class="outline-2">
305
+<h2 id="org8db594f">Scalable</h2>
306
+<div class="outline-text-2" id="text-org8db594f">
307 307
 <p>
308 308
 The network should be organized with the expectation that its scale could reach or even exceed that of today’s Internet. Special care should be taken to address to the challenge of maintaining efficiency without the presence of a centralized backbone.
309 309
 </p>
310 310
 </div>
311 311
 </div>
312 312
 
313
-<div id="outline-container-org7748fa7" class="outline-2">
314
-<h2 id="org7748fa7">Permanent</h2>
315
-<div class="outline-text-2" id="text-org7748fa7">
313
+<div id="outline-container-org0c195ed" class="outline-2">
314
+<h2 id="org0c195ed">Permanent</h2>
315
+<div class="outline-text-2" id="text-org0c195ed">
316 316
 <p>
317 317
 The network’s density and redundancy should be great enough that, despite its ad hoc nature, it will persistently operate on a broad scale, and be available in full to any user within range of another peer.
318 318
 </p>
319 319
 </div>
320 320
 </div>
321 321
 
322
-<div id="outline-container-orgcb90b89" class="outline-2">
323
-<h2 id="orgcb90b89">Fast (enough)</h2>
324
-<div class="outline-text-2" id="text-orgcb90b89">
322
+<div id="outline-container-org92fc811" class="outline-2">
323
+<h2 id="org92fc811">Fast (enough)</h2>
324
+<div class="outline-text-2" id="text-org92fc811">
325 325
 <p>
326 326
 The network should always achieve whatever speed is required for a “bottom line” level of social and cultural participation. At present, we assert that the network’s data transfer rate should, at a minimum, be enough for voice-over-IP (VoIP) communications, and low-bitrate streaming video.
327 327
 </p>
328 328
 </div>
329 329
 </div>
330 330
 
331
-<div id="outline-container-orgb2ce64e" class="outline-2">
332
-<h2 id="orgb2ce64e">Independent</h2>
333
-<div class="outline-text-2" id="text-orgb2ce64e">
331
+<div id="outline-container-orgf2a1737" class="outline-2">
332
+<h2 id="orgf2a1737">Independent</h2>
333
+<div class="outline-text-2" id="text-orgf2a1737">
334 334
 <p>
335 335
 While the network will have the capacity to exchange information with Internet users and nodes, it should be able to operate independently, as well. A large-scale failure or closure of Internet infrastructure and content should have minimal effect on the network’s operations.
336 336
 </p>
337 337
 </div>
338 338
 </div>
339 339
 
340
-<div id="outline-container-org625ea45" class="outline-2">
341
-<h2 id="org625ea45">Evolvable</h2>
342
-<div class="outline-text-2" id="text-org625ea45">
340
+<div id="outline-container-org00e52cf" class="outline-2">
341
+<h2 id="org00e52cf">Evolvable</h2>
342
+<div class="outline-text-2" id="text-org00e52cf">
343 343
 <p>
344 344
 The network should be built with future development in mind. The platform should be flexible enough to support technologies, protocols and modes of usage that have not yet been developed.
345 345
 </p>