diff --git a/i2p2www/pages/site/docs/how/peer-selection.html b/i2p2www/pages/site/docs/how/peer-selection.html index c8e6db16..42dc1b97 100644 --- a/i2p2www/pages/site/docs/how/peer-selection.html +++ b/i2p2www/pages/site/docs/how/peer-selection.html @@ -1,8 +1,16 @@ {% extends "global/layout.html" %} {% block title %}{% trans %}Peer Profiling and Selection{% endtrans %}{% endblock %} -{% block lastupdated %}{% trans %}July 2010{% endtrans %}{% endblock %} -{% block accuratefor %}0.8{% endblock %} +{% block lastupdated %}2024-02{% endblock %} +{% block accuratefor %}0.9.62{% endblock %} {% block content %} +

NOTE

+This page describes the Java I2P implementation of peer profiling and selection as of 2010. +While still broadly accurate, some details may no longer be correct. +We continue to evolve banning, blocking, and selection strategies to address newer threats, attacks, and network conditions. +The current network has multiple router implementations with various versions. +Other I2P implementations may have completely different profiling and selection strategies, +or may not use profiling at all. +

{% trans %}Overview{% endtrans %}

{% trans %}Peer Profiling{% endtrans %}