%h1#how-it-works How it works
%p The Bitmask application is designed to have a friendly interface with automatic configuration. You simply start the application, register with the compatible service provider of your choice, and away you go.
%p.b Encrypted Internet (VPN)
%ul
%li All your traffic is encrypted, routed through your provider, decrypted, and then sent on to the open internet (we use OpenVPN).
%li By doing this, encrypted internet is very effective at bypassing most censorship and network surveillance by your ISP or country.
%li Encrypted internet also hides your IP address, thus keeping your physical location safe from nefarious websites.
%li We take extra security measures to prevent problems common to other VPN applications, such as DNS leakage and IPv6 leakage.
%p.b Encrypted Email
%ul
%li Bitmask encrypted email is easy to use while still being backward compatible with the existing OpenPGP protocol for secure email.
%li All incoming email is automatically encrypted so only you can read it (including meta-data).
%li If possible, outgoing email is automatically encrypted so that only the recipient can read it (if a valid OpenPGP public key can be automatically discovered and validated for the recipient).
%p.b Security Features
%ul
%li All data storage is encrypted, including local data and cloud backups. This encryption always #{link_to 'takes place on your device', 'https://leap.se/en/soledad'}, so the service provider cannot read your stored data.
%li Your data is always available and #{link_to 'synchronized to the devices', 'https://leap.se/en/soledad'} you choose.
%li Although you specify a username and password to login, your #{link_to 'password is never communicated to the provider', 'https://en.wikipedia.org/wiki/Secure_Remote_Password_protocol'}.
%li The Bitmask application is always kept up to date with the latest security patches (coming soon).
%li If you download the Bitmask application from #{link_to 'downloads.leap.se', 'https://downloads.leap.se'}, your service provider cannot add a backdoor to compromise your security.
%li As with any security system, Bitmask has #{link_to 'known limitations', 'https://leap.se/en/limitations'}.
%p For technical details, see our #{link_to 'design documentation', 'https://leap.se/en/design'}.
%h1#providers Supported providers
%p The following service providers are compatible with the Bitmask application:
%ul
%li= link_to 'bitmask.net', 'https://bitmask.net'
%li
= link_to 'calyx.net', 'https://calyx.net'
(coming soon)
%li
= link_to 'oblivia.vc', 'https://oblivia.vc'
(coming soon)
%li
= link_to 'riseup.net', 'https://riseup.net'
(coming soon)
%p Start your own compatible service provider with the free software #{link_to 'LEAP platform', 'https://leap.se/en/platform'}.
%h1#about-us About us
%img{src:'/img/leap-small.png', align:'right'}
%p The Bitmask application is lovingly hand-crafted by a team of paid and volunteer programmers from seven different countries. Development is principally sponsored by the #{link_to 'LEAP Encryption Access Project', 'https://leap.se'}, an non-profit organization dedicated to defending democracy by protecting the right to whisper.
%p The service provider bitmask.net is operated by LEAP in order to demonstrate usage of the Bitmask application. However, we actively encourage other organizations to start their own compatible service providers by using our free software #{link_to 'platform for server automation', 'https://leap.se/en/platform'}.
%h1#code Fork our code
%p Hey, you! We could use a hand here. You want communication free of surveillance, based on open protocols, and that gives users control over their own data? Well, grab a keyboard and #{link_to 'pitch in', 'https://leap.se/en/get-involved'}—the code is not going to write itself.
%p In particular, if you have finely honed skill in Python, Android Java, Ruby, C, CouchDB, Windows, Mac, Puppet, Qt, or you really love crypto, we could sure use your help.
%ol
%li #{link_to 'Fork our code', 'https://leap.se/en/source'}.
%li Create a new branch from develop called feature/x or bugfix/x.
%li Hack away.
%li Issue a pull request on github from your feature or bugfix branch to the upstream develop branch.
%li Discuss and wait for request to be merged.
%li Repeat.
%p Currently, we release a new version of the Bitmask application every two weeks, and other components as necessary.
%p
%p