Skip to content

Commit 599c312

Browse files
committed
fixing more broken links
1 parent 791f68f commit 599c312

7 files changed

+9
-9
lines changed

blog/2020-08-10-drand-launches-v1.0.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ A set of tools is now used to monitor the various drand nodes and alert operator
4848

4949
### drand’s specification & security model
5050

51-
The drand protocol now has a [full specification](/docs/concepts/03-Specification.md) and a documented [security model](/docs/concepts/02-Security_Model.md).
51+
The drand protocol now has a [full specification](/docs/specification/) and a documented [security model](/docs/security-model/).
5252

5353
### Security audit
5454

blog/2021-10-28-the-value-of-drand-continued.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -62,9 +62,9 @@ For the onboarding process, a more streamlined and perhaps more asynchronous pro
6262

6363
**cLabs**: We hope to see more members join and increase the confidence in the security of the beacon. It will be great to strengthen the resilience of the implementations and have easily accessible tools for consuming and verifying the beacon. We also hope to see it grow to be accepted in important pieces of infrastructure.
6464

65-
**Protocol Labs**: We are very optimistic about the future of drand! We are eager to welcome more members to the LoE to natively increase the security of the network. We are looking forward to more applications using drand for their protocols and applications. We are working hard to find ways to incentivise the members of the LoE and we welcome ideas from the community. We are integrating many new features in the main drand protocol, such as support for multiple beacons, higher-frequency randomness and time-lock encryption, as also discussed in our [previous blogpost](https://drand.love/blog/2021/08/10/drand-celebrates-one-year-as-a-randomness-service/). These new features will bring drand ahead of the competition, as it will be able to solve pressing problems, such as “front-running” attacks on decentralised exchanges. drand is hiring aggressively to increase the capacity of the team and deliver new functionalities faster - come and [join us](https://jobs.lever.co/protocol/ca0b97f4-6117-4004-8d7d-1a4520e2d5be) if you’re passionate about verifiable, unpredictable and bias-resistant randomness!
65+
**Protocol Labs**: We are very optimistic about the future of drand! We are eager to welcome more members to the LoE to natively increase the security of the network. We are looking forward to more applications using drand for their protocols and applications. We are working hard to find ways to incentivise the members of the LoE and we welcome ideas from the community. We are integrating many new features in the main drand protocol, such as support for multiple beacons, higher-frequency randomness and time-lock encryption, as also discussed in our [previous blogpost](./2021-08-10-drand-celebrates-one-year-as-a-randomness-service.md). These new features will bring drand ahead of the competition, as it will be able to solve pressing problems, such as “front-running” attacks on decentralised exchanges. drand is hiring aggressively to increase the capacity of the team and deliver new functionalities faster - come and [join us](https://jobs.lever.co/protocol/ca0b97f4-6117-4004-8d7d-1a4520e2d5be) if you’re passionate about verifiable, unpredictable and bias-resistant randomness!
6666

67-
In short, we are shooting to make drand a foundational protocol for randomness in the Internet, and we are proud of the fact that [drand recently completed 1 year of undisrupted service](https://drand.love/blog/2021/08/10/drand-celebrates-one-year-as-a-randomness-service/), providing more than 1M rounds of randomness!
67+
In short, we are shooting to make drand a foundational protocol for randomness in the Internet, and we are proud of the fact that [drand recently completed 1 year of undisrupted service](./2021-08-10-drand-celebrates-one-year-as-a-randomness-service.md), providing more than 1M rounds of randomness!
6868

6969
---
7070

blog/2023-03-28-timelock-on-fastnet.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ First things first, let’s recall that `drand`, which stands for “**distribut
4141

4242
To accomplish this drand relies on the threshold BLS signature scheme and its security proof that tells us BLS signatures are indistinguishable from random ones (in the group of all possible signatures). At each epoch, the members of a drand network work together to create an aggregated BLS signature on the message **m = H(round)}**. An important point here for what comes next is that the **message is predictable** according to the target round at a time T (in other words, there is a mapping between time and round numbers, since the network operates at a fixed frequency), when we’re using drand in the so-called unchained mode that [we presented in a post last year](/blog/2022-02-21-multi-frequency-support-and-timelock-encryption-capabilities.md#unchained-randomness-timed-encryption).
4343

44-
You can learn more about drand and how it works under the hood in our documentation: [https://docs.drand.love/docs/cryptography/](/docs/concepts/01-Cryptography.md)
44+
You can learn more about drand and how it works under the hood in our documentation: [https://docs.drand.love/docs/cryptography/](/docs/cryptography/)
4545

4646
### The League of Entropy
4747

blog/2023-10-16-quicknet-is-live.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ A big shoutout to the League of Entropy for their invaluable contributions, runn
9494

9595
## Get Started 🚀
9696

97-
For developers and users eager to dive into the new `quicknet` drand network, our [official documentation](/docs/dev-guide/00-Getting-started-devs.md) provides detailed resources about using drand relays and beacons.
97+
For developers and users eager to dive into the new `quicknet` drand network, our [official documentation](/developer/) provides detailed resources about using drand relays and beacons.
9898

9999
We also have a blog post about "[drand for beginners](/blog/2023-06-02-drand-explainer.md) that's packed with useful information and another one about [using drand on-chain](/blog/2023-03-15-draffle.md) with a demo lottery use-case running on the Filecoin Virtual Machine.
100100

docs/concepts/00-Intro-to-drand.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ slug: /docs/overview/
66
---
77
# Intro to drand
88

9-
This section introduces the key concepts behind drand. For information about consuming randomness from a drand network, see the [**Developer's Guide**](../dev-guide/Getting-started-devs). For help running a drand network, see the entries under the “For Operators” section. To run node(s) or relay(s) for the [League of Entropy](https://leagueofentropy.org), please [apply to the League](https://docs.google.com/forms/d/e/1FAIpQLSfGwiSz2_gq6NHo3MGyJyH4_GKv_TcY1YmbwkctKlCh5aVToA/viewform?usp=sf_link) to be considered for membership.
9+
This section introduces the key concepts behind drand. For information about consuming randomness from a drand network, see the [**Developer's Guide**](/docs/dev-guide/00-Getting-started-devs.md). For help running a drand network, see the entries under the “For Operators” section. To run node(s) or relay(s) for the [League of Entropy](https://leagueofentropy.org), please [apply to the League](https://docs.google.com/forms/d/e/1FAIpQLSfGwiSz2_gq6NHo3MGyJyH4_GKv_TcY1YmbwkctKlCh5aVToA/viewform?usp=sf_link) to be considered for membership.
1010

11-
- Read the [**What is \"drand\"?**](../about/00-drand-explained) section to learn more about drand’s main goals. It gives an overview of the challenges drand aims to address.
11+
- Read the [**What is \"drand\"?**](/docs/about/00-drand-explained.md) section to learn more about drand’s main goals. It gives an overview of the challenges drand aims to address.
1212
- [**Cryptography**](./01-Cryptography.md) provides an overview of the cryptographic building blocks that drand uses to generate publicly-verifiable, unbiased, and unpredictable randomness in a distributed manner.
1313
- [**Security Model**](./02-Security_Model.md) describes the security considerations taken into account when designing and building drand.
1414
- [**Specification**](./03-Specification.md) is a formal description of the drand protocols.

docusaurus.config.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ const config: Config = {
169169
items: [
170170
{
171171
label: 'Blog',
172-
href: 'https://drand.love/blog',
172+
href: 'https://docs.drand.love/blog/',
173173
},
174174
{
175175
label: 'GitHub',

src/pages/index.tsx

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ function HomepageHeader() {
2020
<div className={styles.buttons}>
2121
<Link
2222
className="button button--secondary button--lg"
23-
to="/docs/concepts/intro-to-drand">
23+
to="/docs/overview/">
2424
Get Started using drand!
2525
</Link>
2626
</div>

0 commit comments

Comments
 (0)