index.html 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768
  1. <!DOCTYPE html>
  2. <html>
  3. <head>
  4. <meta charset="utf-8" />
  5. <meta http-equiv="X-UA-Compatible" content="IE=edge">
  6. <title>Internet Krypto Klub</title>
  7. <meta name="viewport" content="width=device-width, initial-scale=1">
  8. <link rel="favicon" type="icon" href="https://img.ikrypto.club/IKK2.svg"></head>
  9. <link rel="stylesheet" type="text/css" media="screen" href="main.css" />
  10. <script src="main.js"></script>
  11. </head>
  12. <body>
  13. <img id="logo" alt="Internet Krypto Klub" src="https://img.ikrypto.club/IKK2.svg" />
  14. <div class="manifesto">
  15. <h1>Manifesto</h1>
  16. <p>The grand project of the Internet, supposed to have been created with the noblest of intentions by some, was created in
  17. military research.</p>
  18. <p>We supposed, perhaps naively, we could wrest the Internet from the hands of our insectoid masters.</p>
  19. <p>Now, the Internet, true to its origins, is becoming increasingly cordoned off by capitalists into gaudy and soul-destroying
  20. voids, filled with ads, misinformation, and hatred. Even more true to its origins in the military, the Internet has become
  21. hyper-militarized by a small cadre of unsavory people, from bands of cyber-criminals, to micro-regimes, to global, despotic
  22. superpowers.
  23. <p>The ceaseless labor of programmers, artists, writers, and other workers has transformed the Internet into what it is
  24. today; but this hardly represents the version ideal to all those workers.</p>
  25. <p>As the Internet Krypto Klub, our mission is to build new tools, protocols, and services (and reclaim the existing ones)
  26. that facilitate the transfer of techno-political authority away from unaccountable government organizations and Internet
  27. mega-capitalists, and back to those ceaseless laborers.</p>
  28. <p>Cryptography can reduce entirely practical cyber-attacks into purely theoretical problems that require immense scales
  29. of time to solve. Through it, we can not only retake some of our privacy, but build entirely transformed
  30. networks based upon mutual aid and trust.</p>
  31. <h1>Services</h1>
  32. <ul>
  33. <li>
  34. <p><a href="https://git.ikrypto.club/">Git collaboration site</a></p>
  35. </li>
  36. <li>
  37. <p><a href="https://up.pg.ikrypto.club/">Encrypted file sharer</a></p>
  38. </li>
  39. <li>
  40. <p><a href="https://img.ikrypto.club/">Unencrypted CDN</a></p>
  41. </li>
  42. <li>
  43. <p><a href="https://bex-cd.pg.ikrypto.club/">Experimental Cryptodog branch</a></p>
  44. </li>
  45. </ul>
  46. <h1>Supporters</h1>
  47. <ul>
  48. <li>D3vzer0</li>
  49. <li>Thanatos the Penetrator</li>
  50. <li>Phantom</li>
  51. </ul>
  52. </div>
  53. </body>
  54. </html>