You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: www/pages/about.md
+23-23Lines changed: 23 additions & 23 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,44 +7,44 @@ permalink: /about/
7
7
8
8
## What is IPCrypt?
9
9
10
-
IPCrypt is a specification that defines well-defined methods for encrypting and obfuscating IP addresses. It provides both deterministic format-preserving and non-deterministic constructions that apply uniformly to both IPv4 and IPv6 addresses.
10
+
IPCrypt is a simple, open specification that suggests methods for encrypting and obfuscating IP addresses. Created by volunteers, it offers both deterministic format-preserving and non-deterministic approaches that work with both IPv4 and IPv6 addresses.
11
11
12
-
The specification was developed to address privacy concerns raised in [RFC6973](https://datatracker.ietf.org/doc/html/rfc6973) and [RFC7258](https://datatracker.ietf.org/doc/html/rfc7258)regarding pervasive monitoring and data collection, while maintaining the operational utility of IP addresses in network operations and analytics.
12
+
This community-driven effort was inspired by privacy concerns highlighted in [RFC6973](https://datatracker.ietf.org/doc/html/rfc6973) and [RFC7258](https://datatracker.ietf.org/doc/html/rfc7258)about pervasive monitoring and data collection. We aimed to help maintain the practical utility of IP addresses in network operations while addressing these privacy considerations.
13
13
14
-
## The Problem IPCrypt Solves
14
+
## The Challenge We're Trying to Help With
15
15
16
-
IP addresses are essential for network operations but also raise significant privacy concerns:
16
+
IP addresses are fundamental to network operations but present some privacy challenges:
17
17
18
-
1.**Privacy Exposure**: IP addresses can reveal user location, identity, and browsing habits
19
-
2.**Regulatory Compliance**: Many jurisdictions classify IP addresses as personal data (e.g., GDPR)
20
-
3.**Data Sharing Limitations**: Inability to share network data for research or analysis
21
-
4.**Third-Party Service Risks**: Exposing raw IP addresses to external services creates privacy risks
22
-
5.**Inconsistent Ad-hoc Solutions**: Organizations implement varied, often insecure methods to protect IP addresses
18
+
1.**Privacy Considerations**: IP addresses can potentially reveal information about users
19
+
2.**Regulatory Context**: Some jurisdictions consider IP addresses as personal data (e.g., GDPR)
20
+
3.**Research Limitations**: Difficulty sharing network data for research or analysis
21
+
4.**Service Provider Concerns**: Sharing raw IP addresses with external services raises privacy questions
22
+
5.**Varied Approaches**: Different organizations use different methods to protect IP addresses
23
23
24
-
IPCrypt addresses these challenges by providing a cryptographically sound, consistent approach to IP address encryption and obfuscation.
24
+
IPCrypt tries to offer a simple, consistent approach to IP address encryption that anyone can implement.
25
25
26
-
## Key Benefits
26
+
## Potential Benefits
27
27
28
28
### For Network Operators
29
29
30
-
-**Maintain Operational Functionality**: Continue using IP addresses for routing, logging, and analytics while protecting user privacy
31
-
-**Regulatory Compliance**: Help meet data protection requirements by encrypting personal identifiers
32
-
-**Simplified Data Sharing**: Share network data with researchers or partners without exposing sensitive information
33
-
-**Consistent Implementation**: Replace ad-hoc mechanisms with a well-defined specification
30
+
-**Practical Functionality**: Use IP addresses for routing, logging, and analytics while considering privacy
31
+
-**Regulatory Considerations**: May help with data protection requirements by encrypting identifiers
32
+
-**Research Possibilities**: Share network data with researchers without exposing raw addresses
33
+
-**Common Approach**: Use a shared specification instead of creating custom solutions
34
34
35
35
### For Privacy Advocates
36
36
37
-
-**Enhanced User Privacy**: Protect user identity and location information in logs and analytics
38
-
-**Reduced Correlation Risk**: Non-deterministic modes prevent tracking across different datasets
39
-
-**Transparent Protection**: Clearly defined cryptographic methods with known security properties
40
-
-**Broad Applicability**: Works with both IPv4 and IPv6 addresses across various systems
37
+
-**User Privacy**: Help protect user information in logs and analytics
38
+
-**Reduced Tracking**: Non-deterministic modes can prevent correlation across datasets
39
+
-**Open Methods**: Clearly defined cryptographic approaches with known properties
40
+
-**Versatile Application**: Works with both IPv4 and IPv6 addresses
41
41
42
42
### For Developers
43
43
44
-
-**Multiple Implementations**: Choose from implementations in various programming languages
45
-
-**Flexible Modes**: Select the appropriate mode based on specific privacy and operational requirements
46
-
-**Simple Integration**: Easy to integrate into existing systems with minimal changes
47
-
-**Well-Documented Standard**: Clear specification with test vectors and examples
44
+
-**Community Implementations**: Free implementations available in various programming languages
45
+
-**Different Options**: Choose the mode that fits your specific needs
46
+
-**Straightforward Integration**: Designed to be simple to add to existing systems
47
+
-**Open Documentation**: Clear specification with examples to help implementation
<h1 class="text-4xl md:text-5xl font-bold mb-6">Protect IP Addresses with Consistent Encryption</h1>
10
+
<h1 class="text-4xl md:text-5xl font-bold mb-6">A Community Approach to IP Address Encryption</h1>
11
11
<p class="text-xl max-w-3xl mx-auto mb-8">
12
-
IPCrypt provides well-defined methods for encrypting and obfuscating IP addresses, addressing privacy concerns while maintaining functionality for network operations and analytics.
12
+
IPCrypt is a free, open specification created by volunteers to help encrypt and obfuscate IP addresses, balancing privacy considerations with practical network operations.
<h2 class="text-3xl font-bold mb-6 text-center">What is IPCrypt?</h2>
25
25
<p class="text-lg mb-6">
26
-
IPCrypt is a specification that defines methods for encrypting and obfuscating IP addresses for both operational use and privacy preservation. It enables network operators, researchers, and privacy advocates to share or analyze data while protecting sensitive address information.
26
+
IPCrypt is a community-created specification that suggests methods for encrypting and obfuscating IP addresses. It aims to help network operators, researchers, and privacy advocates share or analyze data while considering address privacy.
27
27
</p>
28
28
<p class="text-lg mb-6">
29
-
The specification provides both deterministic format-preserving and non-deterministic constructions that apply uniformly to both IPv4 and IPv6 addresses.
29
+
The specification offers both deterministic format-preserving and non-deterministic approaches that work with both IPv4 and IPv6 addresses.
30
30
</p>
31
31
<p class="text-lg mb-6">
32
-
<strong>Elegant simplicity</strong> is at the core of IPCrypt's design philosophy. Rather than pursuing technical innovation for its own sake, IPCrypt relies exclusively on established cryptographic standards to ensure robust implementation across platforms.
32
+
<strong>Simplicity</strong> is a core value in IPCrypt's design. Rather than trying to create new cryptographic methods, we've used established standards that are well-understood and widely available, making it easier for anyone to implement.
<h2 class="text-3xl font-bold mb-6 text-center">A Community Approach</h2>
91
91
<div class="max-w-3xl mx-auto">
92
92
<p class="text-lg mb-6">
93
-
IPCrypt serves as a <strong>proposed solution</strong> that prioritizes reliability and ease of adoption over unnecessary complexity. By providing clear guidance and interoperability, IPCrypt enables organizations to implement secure IP address encryption with confidence.
93
+
IPCrypt is a <strong>volunteer-created specification</strong> that tries to be practical and easy to implement. We've focused on clarity and simplicity so that anyone can understand and use it, regardless of their resources or expertise.
94
94
</p>
95
95
<p class="text-lg mb-6">
96
-
Rather than reinventing the wheel, IPCrypt leverages well-established cryptographic primitives and provides a consistent framework that can be implemented across diverse environments and programming languages.
96
+
We've built on existing, well-tested cryptographic methods rather than creating new ones. Our goal is to provide a helpful resource that can be freely implemented in any programming language or environment.
97
97
</p>
98
98
</div>
99
99
</div>
@@ -142,17 +142,17 @@ permalink: /
142
142
143
143
<sectionclass="py-12 bg-gray-50">
144
144
<div class="container mx-auto px-4">
145
-
<h2 class="text-3xl font-bold mb-6 text-center">Multiple Language Implementations</h2>
<h3 class="text-xl font-bold mb-3">Available in 8+ Programming Languages</h3>
150
+
<h3 class="text-xl font-bold mb-3">Freely Available in Several Programming Languages</h3>
151
151
<p class="mb-4">
152
-
IPCrypt has been implemented in Python, C, Rust, JavaScript, Go, Zig, PHP, D, and more to ensure broad accessibility across different platforms and environments.
152
+
Thanks to community contributors, IPCrypt has been implemented in Python, C, Rust, JavaScript, Go, Zig, PHP, D, and more, making it accessible to developers across different platforms.
153
153
</p>
154
154
<p class="mb-6">
155
-
Each implementation follows the specification and provides the same cryptographic guarantees while leveraging language-specific features.
155
+
Each implementation is open source and follows the same specification, allowing developers to choose the language that best fits their project.
156
156
</p>
157
157
<a href="{{ site.baseurl }}/implementations/" class="btn btn-primary">Browse All Implementations</a>
158
158
</div>
@@ -205,9 +205,9 @@ permalink: /
205
205
206
206
<sectionclass="py-12 bg-gray-50">
207
207
<div class="container mx-auto px-4 text-center">
208
-
<h2 class="text-3xl font-bold mb-6">Get Started with IPCrypt</h2>
208
+
<h2 class="text-3xl font-bold mb-6">Join the Community</h2>
209
209
<p class="text-lg max-w-3xl mx-auto mb-8">
210
-
Ready to implement IPCrypt in your project? Check out our developer resources, try the interactive playground, and choose from multiple language implementations.
210
+
Interested in using or contributing to IPCrypt? Explore our resources, try the interactive playground, or check out the open source implementations. All are freely available for anyone to use.
211
211
</p>
212
212
<div class="flex flex-wrap justify-center gap-4">
213
213
<a href="https://jedisct1.github.io/draft-denis-ipcrypt/draft-denis-ipcrypt.html" class="btn btn-secondary" target="_blank" rel="noopener">Read the Specification</a>
0 commit comments