import router from '../../router';

export default {
    zh: {
        head: {
            topTitle: "Web3.0 multi-chain privacy network.",
            menu: {
                token: 'EN代币',
                about: '关于我们',
                whitepaper: '白皮书',
                lang: 'Language',
                langType: "cn"
            },
            join: '加入社区'
        },
        footer: {
            token: 'EN代币',
            about: "关于我们",
            whitepaper: "v1.0白皮书",
            join: "加入社区",
            twitter: '关注推特',
            medium: "Medium",
            pdf: 'http://static.exploitnetwork.com/cn.pdf',
        },
        home: {
            pdf: 'http://static.exploitnetwork.com/cn.pdf',
            cardimg: require('@/assets/img/home/card2_cn.png'),
            card1: {
                title: '流动性挖矿已开启',
                sbtitle: '预计5月底映射bsc',
                btnword: 'Start Mining'
            },
            card2: {
                title: "Web3.0愿景",
                doc: "Exploit Network是通过在多个网络部署跨链桥，来实现资产跨链互转的隐私支付网络，在高性能的传输效率基础之上，Exploit Network着重用户隐私保护，并引入了基于zk-ENSNARK的EN-Protocol与EN-Shield匿名支付系统，是可以实现高并发、高扩展、高度隐私的隐私支付网络。"
            },
            card3: {
                title: '产品架构',
                doc1: "Exploit Network以隐私支付为核心，在网络中提供匿名支付、转账、借贷等产品，除此之外用户所熟知的合成资产、杠杆组合也会在此之上。",
                doc2: "用户可以在无任何KYC的情况下，通过各外部区块链的跨链桥，将资产发送至Exploit Network中，并通过一系列合约功能，进行指定到期日的借贷服务，整个过程会是秒速级的体验。同时，任何主流代币或是大宗商品，都可以通过匿名合成资产功能，铸造创建并流通，这些合成资产将由ChainLink、API3预言机进行喂价。"
            },
            card4: {
                title: '机构支持',
                doc: "截至目前，包括BlockCapital、HashFund等7家在内的机构和上市公司，参与了对Exploit Network的投资，随着后续合作伙伴的增多，我们的队伍也会进一步扩大，这需要包括您在内的每一位支持。"
            },
            card5: {
                title: '全新体验',
                list: [{
                        icon: require('@/assets/img/home/icon1.png'),
                        title: '多网络支持',
                        doc: '通过前期在多链部署跨链桥、流通性池，便于用户可以随时将资产与Exploit Network网络进行互转，同时Exploit也兼容外部链兑外部链资产的支持。'
                    },
                    {
                        icon: require('@/assets/img/home/icon2.png'),
                        title: '高并发与匿名性',
                        doc: 'Exploit Network使用了zk-ENSNARK的EN-Protocol协议与EN-Shield机制，链上确认时间整体提升，有效保护了交易者的隐私信息。'
                    },
                    {
                        icon: require('@/assets/img/home/icon3.png'),
                        title: '用户隐私兼容',
                        doc: '当用户请求牵涉监管主体时，Exploit Network会为用户提供基于zk-ENSNARK的开放选项，最大程度帮助用户满足信息申报需求。'
                    },
                    {
                        icon: require('@/assets/img/home/icon4.png'),
                        title: '高性能处理',
                        doc: '分布式带宽流会为Exploit Network提供网络传输支持，通过验证人和供应方节点，进行网络传输的双重验证，最终实现秒速级的链上体验。'
                    },
                    {
                        icon: require('@/assets/img/home/icon5.png'),
                        title: 'NTPC无痕通道',
                        doc: '基于EN-Protocol协议，为网络自动生成临时性的支付通道，交易者在发送请求完成后，该通道的传输记录会自动隐藏，从而达到不可追踪的效果。'
                    },
                    {
                        icon: require('@/assets/img/home/icon6.png'),
                        title: '链上合成资产',
                        doc: '在用户进行跨链桥转移后，会在其网络中自动生成价值对应的EETH、EBNB，之后通过抵押铸造方式，生成额外的EUSD、EDOT等合成资产。'
                    }
                ]
            },
            card6: {
                title: '发展计划',
                list: [{
                        title: "2019年2月",
                        doc: "在新西兰奥克兰，创办组织了匿名极客组织，并以此开展匿名传输、密码学应用、分布式数据的探索，是Exploit Network团队的前身。"
                    },
                    {
                        title: "2020年12月",
                        doc: "团队接到了一家企业客户的需求，并帮助其搭建了一套跨数据库数据匹配系统，之后该系统被测试用于跨链和合成资产，不断迭代后测试成功。"
                    },
                    {
                        title: "2021年2月",
                        doc: "在研究了Dash、Zcash后，进行了Exploit Network的研发搭建，并进行不断的迭代更新，同时扩充了技术人员规模。"
                    },
                    {
                        title: "2021年5月",
                        doc: "在测试网上线前，Exploit Network陆续会在BSC、Solana、Heco、Polygon等公链和layer2进行跨链桥和流动池搭建，并流通EN代币。"
                    },
                    {
                        title: "2021年7月",
                        doc: "预计上线Exploit Network测试网，通过跨链桥进入到测试网的用户，会获得未来主网内EN的空投激励，以保证每条链中都有相应规模的EN流通。"
                    },
                    {
                        title: "2022年12月",
                        doc: "在Exploit Network正式网上线后，会推出匿名借贷、合成稳定币等功能，方便不同的用户，进行匿名支付、转账和存储。"
                    },

                ]
            },
            card7: {
                title: "Exploit Network 经济模型白皮书",
                btn: 'v1.0白皮书'
            },
            card8: {
                title: '问题解答',
                sbtitle: "在这里找到答案",
                list: [{
                        title: "什么是Exploit Network ？",
                        id: 1,
                        list: [{
                                P: 'Exploit Network是通过在多个网络部署跨链桥，来实现资产跨链互转的隐私支付网络。在高性能的传输效率基础之上，Exploit Network着重用户隐私保护，并引入了基于zk-ENSNARK的EN-Protocol与EN-Shield匿名支付系统，是可以实现高并发、高扩展、高度隐私的隐私支付网络。'
                            },
                            {
                                P: '使用Exploit的特定功能，或向其提供流动性，可以为用户赚取$EN。通过将流动性激励和跨链隐私结合，Exploit Network会成为Web3.0世界中的首选匿名支付协议。'
                            },
                        ]
                    },
                    {
                        title: "什么是$EN？",
                        id: 2,
                        list: [{
                                P: '$EN是Exploit Network发行的治理代币，总量为1000万枚。EN持有者不仅限于Exploit Network系统内代币之间的支付流转，还可以与其它链上的代币，进行跨链数据交互、支付和结算，在这个过程中，交易确认速度会被压缩至秒级，整个体验会跟使用传统互联网产品一样，实现即时跨链交易。'
                            },
                            {
                                P: '后续，Exploit Network会设立借贷池，EN的持有者可以通过Exploit Network的借贷池，自主选择放贷方借到想要的一定数量代币，反之亦然。'
                            },
                        ]
                    },
                    {
                        title: "我如何获得EN？",
                        id: 3,
                        list: [{
                                P: '用户可以通过多样性的方式，获得到$EN代币，例如参与社区的活动，成为社区贡献者（EN-DAO），或是参与到网络节点的运算中，并获得运算奖励。'
                            },
                            {
                                P: '与其它市面上项目不同的是，Exploit Network团队不设立$EN的官方场外交易，这主要源于Exploit希望$EN在市场上一直保持100万枚的代币流通。'
                            },
                        ]
                    },
                    {
                        title: "谁可以使用Exploit Network ？",
                        id: 4,
                        list: [{
                            P: '在BSC、Fantom、Heco、Arbitrum、Polygon、Solana等知名公链的用户，会有机会优先体验到Exploit的测试服务，在Exploit Network正式上线前，$EN会在其它公链上进行发行，在2021年7月份，Exploit 预计会上线 Exploit Network 的测试网，而DEX和匿名借贷功能，会在2021年末至2022年初同步推出，这是Exploit目前的推进计划。'
                        }, ]
                    },
                    {
                        title: "Exploit上线后，EN可以做什么？",
                        id: 5,
                        list: [{
                                P: 'Gas消耗：使用Exploit Network进行匿名资产发送、DEX交互/使用，会消耗一定的$EN。'
                            },
                            {
                                P: '流动性池：用于借贷池、跨链桥$EN/其它代币深度。'
                            },
                            {
                                P: '抵押铸造：用户可以使用$EN来作为超额抵押品，从而铸造价值代币。'
                            },
                            {
                                P: "测试网奖励：在Exploit Network的测试网阶段，用户需要质押$EN获得测试网$EN，测试结束后，会根据链上活跃情况，在正式主网中，奖励一定的$EN。"
                            }
                        ]
                    }
                ]
            }

        },
        token: {
            cardimg1: require('@/assets/img/token/card1_cn.png'),
            cardimg2: require('@/assets/img/token/card2_cn.png'),
            card1: {
                title: "发现EN价值",
                sbtitle: "EN是Exploit Network隐私支付网络的基础型通证，是整个生态的交易媒介、流通手段和价值承载。链上参与者可以通过IDO、二级市场获得；记账节点、验证者则可以通过参与网络计算获得EN激励"
            },
            card2: [
                { value: "$10,000,000", label: "总供给量" },
                { value: "$10,000,000", label: "初始市值" },
                { value: "$1,500,000", label: "获机构投资" }
            ],
            card3: {
                title: "分配情况",
                list: [{
                        p: 'EN的发行总量为1000万枚。'
                    },
                    {
                        p: '创始极客组织：12%，锁仓1年，分4年线性释放'
                    },
                    {
                        p: "市场/合作：8%，首年释放1%，其余为线性释放"
                    },
                    {
                        p: '机构投资：5%，锁仓1年，分2年线性释放'
                    },
                    {
                        p: '质押池：12%，持有EN参与者可通过质押，每天领取EN奖励，该释放速度呈曲线递减，直至释放结束'
                    },
                    {
                        p: 'EN-DAO：7%，社区贡献者、全球大使激励'
                    },
                    {
                        p: '运营节点：25%，为收集/验证/钓鱼人做出奖励'
                    },
                    {
                        p: '市场参与：30%，由投资渠道获得，含0.5/1/2年锁仓'
                    },
                    {
                        p: "空投：1%，项目启动之初进行空投"
                    }
                ]
            },
            card4: {
                title: "机构投资",
                list: [{
                        p: "45%用于支持开发团队",
                    },
                    {
                        p: "诸如伙伴关系，知名度和进入市场策略之类的营销活动，将占募集资金总额的20%（生态系统增长）",
                    },
                    {
                        p: "法律和会计将占募集金额的5%",
                    },
                    {
                        p: "30%的资金，将用于跨链桥、流动池和其它交易所的做市资金和储备应急资金"
                    }
                ]
            }
        },
        about: {
            pdf: 'http://static.exploitnetwork.com/cn.pdf',
            card1: {
                title: "Exploit Network前身是位于新西兰奥克兰的匿名极客组织，由一群从事网络架构多年的工程师们所建立，在平行宇宙中，我们对Web3.0激发出了很大的兴趣和关注，并与众多的飞船船长们所航行，最终到达目标星球。"
            },
            card2: {
                title: "成为Web3.0隐私设施",
                doc1: "在Web3.0的世界中，所有计算机能够分析网络中的数据，包括内容、链接、人与计算机之间的往来。语义网络会让这一切成为可能，日常的交易机制、事务以及我们的日常生活都会由机器与机器之间的沟通来处理。人们吹嘘多年的「智能代理」将最终实现。",
                doc2: "Exploit Network作为多链宇宙中的中间件，将不同链上的资产连接到一起，并满足人与计算机、人与人之间的隐私传输性，从而在此过程中，完成隐私转账、借贷、铸造合成资产的需求。"
            },
            card3: {
                title: "解决链上隐私痛点",
                doc1: "随着市场参与者的增加，一些专业者级的工具，出现在了市场上，这些工具通过与中心化平台合作，将所有与交互过的地址，进行关联标记，最终本该自由无许可的区块链网络地址，就如同中心化交易所账户一样，被附上了标签。",
                doc2: "因此，在进入2021年后，市场也期待有一种全新的基础设施解决方案，能在区块链内的透明、自由和传统世界的监管、安全之间，找到完美的平衡点。"
            },
            card4: {
                title: "专注的定位",
                doc: "Exploit Network定位于对多链友好互通的高效隐私支付网络，旨在通过在每条外链上建立跨链桥的方式，来将主流资产映射至Exploit Network上，这可以帮助用户有效的进行资产迁移，并在主网上，使用匿名转账、交易和借贷等功能。"
            },
            card5: {
                title: "认识我们的成员",
                list: [{
                        name: "Cora",
                        tag: "创始人",
                        img: require('@/assets/img/about/people1.png'),
                        doc: "Cora是Exploit Network 的创始人兼公司运营官，他曾在新西兰知名的IT公司DataCom从事网络工程，同时也是奥克兰当地的匿名极客组织核心成员，Cora有6年的架构工程经验，在2016年，他接触到了比特币，从而开始关注区块链技术和Web3.0商业。"
                    },
                    {
                        name: "Corrine",
                        tag: "联合创始人",
                        img: require('@/assets/img/about/people2.png'),
                        doc: "Corrine是Exploit Network的联合创始人，他在电信和ICT行业拥有接近10年的经验，曾经供职在日本最大的电信运营商KDDI，主要负责新西兰和澳大利亚当地客户的技术服务，他目前正在为各种ICT项目提供价值方面的经验，在2019年的奥克兰匿名技术讨论会上，与Cora相识，并决定一起建立一套匿名协议，这是Exploit Network的前身。"
                    },
                    {
                        name: "Crystal",
                        tag: "市场营销负责人",
                        img: require('@/assets/img/about/people3.png'),
                        doc: "Crystal是Exploit Network的市场负责人，他之前在华为负责澳洲的市场营销、客户联络，拥有接近10年的市场营销、客户服务工作经验，在2018年，Crystal离开华为后，就在新西兰帮助当地的科技公司，做全球化的市场营销指导，目前是Exploit Network的市场、营销方面负责人。"
                    }, {
                        name: "Daisy",
                        tag: "产品负责人",
                        img: require('@/assets/img/about/people4.png'),
                        doc: "Daisy是Exploit Network的产品负责人，在隐私通讯方面有较长的工作经验，除此之外她也是Exploit公司，负责企业客户服务的项目组长，目前她负责的小组正在帮助新西兰当地的一家科技公司，完成应用内的隐私通讯接入。"
                    }
                ]
            },
            card6: {
                title: "加入我们",
                list: [{
                        title: "React.js Developer",
                        doc: "Auckland, New Zealand | Full-time",
                        router: '/react'
                    },
                    {
                        title: "Solidity Developer",
                        doc: "Auckland, New Zealand | Full-time",
                        router: '/solidity'
                    }
                ],
                btitle: "你想加入我们的团队吗？",
                bdoc: "我们正在寻找技术人才"
            },
            card7: {
                title: "Exploit Network 经济模型白皮书",
                btn: 'v1.0白皮书'
            },
        }
    },
    en: {
        head: {
            topTitle: "Web3.0 multi-chain privacy network.",
            menu: {
                token: 'EN Token',
                about: 'About',
                whitepaper: 'Whitepaper',
                lang: 'Language',
                langType: 'en'
            },
            join: 'Join the Community'
        },
        footer: {
            token: 'EN Token',
            about: "About",
            whitepaper: "Whitepaper",
            join: "Join the Community",
            twitter: 'Twitter',
            medium: "Medium",
            pdf: 'http://static.exploitnetwork.com/en.pdf',
        },
        home: {
            pdf: 'http://static.exploitnetwork.com/en.pdf',
            cardimg: require('@/assets/img/home/card2.png'),
            card1: {
                title: 'Liquidity mining has been opened',
                sbtitle: 'Expected to map bsc at the end of May',
                btnword: 'Start Mining'
            },
            card2: {
                title: "Web3.0 Vision",
                doc: "Exploit Network is a privacy payment network that realizes the cross-chain transfer of assets by deploying cross-chain bridges in multiple networks. Exploit Network is based on the efficiency of high-performance transmissions and focuses on protecting the user’s privacy. Exploit Network introduces the zk-ENSNARK-based EN-Protocol and EN-Shield anonymous payment systems which are privacy payment networks that can achieve high concurrency, excellent scalability, and secure privacy."
            },
            card3: {
                title: 'Product Architecture',
                doc1: "Exploit Network accepts private payments as the core and provides anonymous payment, transfer, lending, and other services and products on the network. This is in addition to the usual synthetic assets and leverage combinations that users are familiar with.",
                doc2: "Users can send assets to Exploit Network through the cross-chain bridges of external blockchains without any KYC and use a series of contract functions to perform lending services that have a specified expiration date. The entire process is completed in seconds. Level of experience. Simultaneously, any mainstream tokens or commodities can be created and circulated through the anonymous synthetic asset function. The real-time quotes of these comprehensive assets will be provided by ChainLink and API3 oracle."
            },
            card4: {
                title: 'Institutional Support',
                doc: "Until recently, seven institutions and listed companies including BlockCapital and HashFund, have invested in Exploit Network. An increase in the number of additional partners will further expand the size of our team. This requires everyone, including you. One support."
            },
            card5: {
                title: 'New Experience',
                list: [{
                        icon: require('@/assets/img/home/icon1.png'),
                        title: 'Multi-Network Support',
                        doc: 'The convenient transfer of assets to and from Exploit Network is facilitated by the early deployment of cross-chain bridges and liquidity pools in multiple chains. Exploit Network also supports external chains for external chain assets.'
                    },
                    {
                        icon: require('@/assets/img/home/icon2.png'),
                        title: 'High Concurrency and Anonymity',
                        doc: 'Exploit Network uses the EN-Protocol and EN-Shield of zk-ENSNARK. This improves the overall confirmation time on the chain, which effectively protects traders’ private information.'
                    },
                    {
                        icon: require('@/assets/img/home/icon3.png'),
                        title: 'User privacy compatibility',
                        doc: 'Exploit Network provides users with open options based on zk-ENSNARK, which ensures that they can meet their requirements of reporting required information to the appropriate regulatory bodies..'
                    },
                    {
                        icon: require('@/assets/img/home/icon4.png'),
                        title: 'High-Performance Processing',
                        doc: 'The distributed bandwidth stream will provide network transmission support for Exploit Network. A double verification of the network transmission is undertaken by the validator and supplier nodes,  and a speed on-chain experience will be realized.'
                    },
                    {
                        icon: require('@/assets/img/home/icon5.png'),
                        title: 'NTPC Traceless Channel',
                        doc: 'Based on the EN-Protocol, a temporary payment channel is automatically generated for the network. After completion of the transaction, the transmission record of the channel will be automatically hidden, which ensures that the transaction is untraceable. '
                    },
                    {
                        icon: require('@/assets/img/home/icon6.png'),
                        title: 'Synthetic Assets on The Chain',
                        doc: 'After the user performs the cross-chain bridge transfer, the corresponding EETH and EBNB will be automatically generated in the network. Subsequently, additional synthetic assets such as EUSD and EDOT, will be generated through mortgage casting.'
                    }
                ]
            },
            card6: {
                title: 'Development Plan',
                list: [{
                        title: "February 2019",
                        doc: "In Auckland, New Zealand, Cora established and managed the Anonymous Geek Organization. He used it to explore anonymous transmissions, cryptography applications, and the distribution of data. It became the predecessor of the Exploit Network team."
                    },
                    {
                        title: "December 2020",
                        doc: "The team received a request from an enterprise customer and assisted this customer to build a cross-database data matching system. The system was subsequently tested for cross-chain and synthetic assets and found to be successful after testing using continuous iteration."
                    },
                    {
                        title: "February 2021",
                        doc: "Exploit Network was constructed after Dash and Zcash was studied and the R&D was completed. Exploit Network has been subjected to continuous iterative updates, and the scale of the technical staff is continuously being increased."
                    },
                    {
                        title: "May 2021",
                        doc: "Before the testnet goes live, Exploit Network will successively build cross-chain bridges and liquidity pools on public chains such as BSC, Solana, Heco, Polygon, etc., and layer2, and circulate EN tokens."
                    },
                    {
                        title: "July 2021",
                        doc: "It is expected that the Exploit Network test network will be launched. Users who enter the test network through the cross-chain bridge will receive the airdrop incentive of EN in the main network in the future. This is to ensure that the corresponding scale of EN is circulating in each chain."
                    },
                    {
                        title: "December 2022",
                        doc: "After the official online launch of Exploit Network, functions such as anonymous lending and synthetic stablecoins will be launched. Different users will then be able to make anonymous payments, transfers, and storage."
                    },

                ]
            },
            card7: {
                title: "Exploit Network White Paper v1",
                btn: 'V1.0 White Paper'
            },
            card8: {
                title: 'Answer',
                sbtitle: "You can find the answer here",
                list: [{
                        title: "What is Exploit Network?",
                        id: 1,
                        list: [{
                                P: 'Exploit Network is a privacy payment network that realizes the cross-chain transfer of assets by deploying cross-chain bridges in multiple networks. Based on the efficiency of high-performance transmissions, Exploit Network focuses on protecting the privacy of users, and introduces the EN-Protocol and EN-Shield anonymous payment system based on zk-ENSNARK. This achieves high concurrency, excellent scalability, and secured private payments on the internet.'
                            },
                            {
                                P: 'Users can earn $EN by using specific features of Exploit Network or providing liquidity to it. Exploit Network will become the preferred anonymous payment protocol in the Web3.0 world by combining liquidity incentives with cross-chain privacy. '
                            },
                        ]
                    },
                    {
                        title: "What is $EN?",
                        id: 2,
                        list: [{
                                P: '$EN is the governance token issued by Exploit Network, limited at a total amount of 10 million. EN holders are not only limited to the payment flow between tokens in the Exploit Network system, but can also interact, pay, and settle cross chain data with other tokens on the chain. In this process, the transaction confirmation speed will be compressed to seconds, which realizes a real-time cross chain transaction. The entire experience will be the same as using traditional Internet products.,.'
                            },
                            {
                                P: 'Subsequently, Exploit Network will set up a lending pool. The holders of EN can independently choose the lender from whom to borrow the number of tokens they require, and vice versa.'
                            },
                        ]
                    },
                    {
                        title: "How do I get EN?",
                        id: 3,
                        list: [{
                                P: 'Users can earn $EN tokens in various ways, such as participating in community activities, becoming a contributor to a community (EN-DAO), or participating in the operation of network nodes, and receiving operational rewards.'
                            },
                            {
                                P: "Unlike other projects on the market, the Exploit Network team does not set up official OTC trading of $EN. This is mainly due to Exploit Network's intention that $EN will keep 1 million tokens circulating in the market."
                            },
                        ]
                    },
                    {
                        title: "Who can use the Exploit Network?",
                        id: 4,
                        list: [{
                            P: 'Users of well-known public chains such as BSC, Fantom, Heco, Arbitrum, Polygon, and Solana will have priority access to experience Exploit Network’s test service.  Before the formal launch of Exploit Network, $EN will be released on other public chains. The current plan is that Exploit Network is expected to launch its test network in July 2021.  Simultaneously, DEX and anonymous lending will be launched from late 2021 to early in 2022.'
                        }, ]
                    },
                    {
                        title: "What can Exploit Network  do after it goes online?",
                        id: 5,
                        list: [{
                                P: 'Gas consumption: Using Exploit Network to send anonymous assets and interact. The use of DEX will consume a certain amount of $EN.'
                            },
                            {
                                P: 'Liquidity pool: Used for loan pool and cross chain bridge of $EN, and other token depth.'
                            },
                            {
                                P: 'Mortgage casting: Users can use $EN as additional collateral to cast value tokens.'
                            },
                            {
                                P: "Test network reward: In the test network stage of Exploit Network, users need to pledge $EN to obtain $EN from the test network. After the test, they will be rewarded with a certain amount of $EN in the formal main network according to the activity of the chain."
                            }
                        ]
                    }
                ]
            }

        },
        token: {
            cardimg1: require('@/assets/img/token/card1_en.png'),
            cardimg2: require('@/assets/img/token/card2_en.png'),
            card1: {
                title: "Discover the Value of Exploit Network",
                sbtitle: "$EN is the basic token of the Exploit Network privacy payment network, and is the transaction medium, circulation means and value carrier of the entire system. Participants on the chain can be accessed through IDO and the secondary market. Accounting nodes and verifiers can obtain EN incentives by participating in network calculations."
            },
            card2: [
                { value: "$10,000,000", label: "Total supply" },
                { value: "$10,000,000", label: "Initial market value" },
                { value: "$1,500,000", label: "Institutional investment received" }
            ],
            card3: {
                title: "Distribution",
                list: [{
                        p: 'The total issuance of EN is 10 million'
                    },
                    {
                        p: 'Founding geek organization: 12%, locked for 1 year, released linearly over 4 years.'
                    },
                    {
                        p: 'Market/cooperation: 8%, 1% released in the first year, the rest will be linearly released.'
                    },
                    {
                        p: 'Institutional investment: 5%, locked for 1 year, released linearly over 2 years'
                    },
                    {
                        p: 'Stake pool: 12%. Participants who hold EN can pledge to receive EN rewards every day. The release speed decreases gradually until the end of the release.'
                    },
                    {
                        p: 'EN-DAO: 7%, incentives for community contributors and global ambassadors.'
                    },
                    {
                        p: 'Operating node: 25%, reward for collecting; verifying; and phishers.'
                    },
                    {
                        p: 'Market participation: 30%, obtained from investment channels, including 0.5; 1; and 2 year lock-ups.'
                    },
                    {
                        p: "Airdrop: 1% airdrop at the beginning of the project"
                    }
                ]
            },
            card4: {
                title: "Institutional investment",
                list: [{
                        p: "45% to support the development team",
                    },
                    {
                        p: "Marketing activities such as partnerships, visibility, and market entry strategies will account for 20% of the total funds raised (ecosystem growth).",
                    },
                    {
                        p: "Legal services and accounting will constitute 5% of the amount raised.",
                    },
                    {
                        p: "Thirty percent of the funds will be used for marketing and reserve emergency funds for cross-chain bridges, liquidity pools, and other exchanges."
                    }
                ]
            }
        },
        about: {
            pdf: 'http://static.exploitnetwork.com/en.pdf',
            card1: {
                title: "Exploit Network was formerly an anonymous geek organization located in Auckland, New Zealand. It was established by a group of engineers with many years of experience in network architecture. In the parallel universe, we have aroused great interest and attention on Web3.0 and have cooperated with many spacecraft. The captains sailed and finally reached the target planet."
            },
            card2: {
                title: "Become a Web3.0 privacy facility",
                doc1: "In the world of Web3.0, all computers can analyse the data in the network, including content, links, and communications between people and computers. The semantic network will make all this possible. Daily transaction mechanisms, transactions, and our daily lives will be handled by the communication between machines. The ”smart agent'” people boasted about for years will finally be realised.",
                doc2: "Exploit Network, as the middleware in the multi-chain universe, connects assets on different chains and satisfies the privacy of transfers between people, and between people and computers.  This completes the private transfers, lending, and the demand for casting synthetic assets."
            },
            card3: {
                title: "Solve privacy pain points on the chain",
                doc1: "Some professional-level tools have appeared on the market due to an increase in the number of participants in the market., These tools cooperate with centralized platforms to associate all the addresses that have interacted with them. Ultimately, they should be free and unlicensed. The blockchain network address is tagged, like a centralized exchange account.",
                doc2: "Therefore, after entering 2021, the market is also looking forward to a new infrastructure solution that can find a perfect balance between transparency and freedom in the blockchain, and the supervision and security of the traditional world."
            },
            card4: {
                title: "Focused positioning",
                doc: "Exploit Network is positioned as an efficient private payment network that is friendly and interoperable with multiple chains. It aims to map mainstream assets to Exploit Network by establishing a cross-chain bridge to each external chain. This can assist users to effectively migrate assets, and use functions such as anonymous transfers, transactions, and lending on the main network."
            },
            card5: {
                title: "Member Introduction",
                list: [{
                        name: "Cora",
                        tag: "Founder",
                        img: require('@/assets/img/about/people1.png'),
                        doc: "Cora is the founder and operating officer of Exploit Network. He previously worked as a network engineer at Datacom, a well-known IT company in New Zealand. In addition, He was a core member of the anonymous geek organization in Auckland. This organisation has six years of experience in architecture engineering. In 2016, He joined Bitcoin and started working on blockchain and Web3.0 commerce."
                    },
                    {
                        name: "Corrine",
                        tag: "Co-founder",
                        img: require('@/assets/img/about/people2.png'),
                        doc: "Corrine is the co-founder of Exploit Network. He has nearly 10 years of experience in telecommunications and the ICT industry. He used to work in KDDI, the largest telecoms operator in Japan, and was responsible for technical services in New Zealand and Australia. He is currently providing recommendations on values to various ICT projects. At the Auckland Anonymous Technology Symposium in 2019, He met Charlie and the two decided to collaborate on building a set of anonymous protocols. This was the predecessor of Exploit Network."
                    },
                    {
                        name: "Crystal",
                        tag: "Head of Marketing",
                        img: require('@/assets/img/about/people3.png'),
                        doc: "Crystal is the manager of marketing at Exploit Network. He previously worked in Huawei and was responsible for marketing and customer contact in Australia. He has nearly 10 years of experience in marketing and customer service. In 2018, Crystal left Huawei and worked for local technology companies in New Zealand, as the leader of   their global marketing. "
                    }, {
                        name: "Daisy",
                        tag: "Head of Production",
                        img: require('@/assets/img/about/people4.png'),
                        doc: "Daisy is the manager of production at Exploit Network. She has much work experience in privacy communication. She is also the project manager of Exploit Network. She is responsible for customer service to enterprises. At present, her team is helping a local technology company in New Zealand to build in-App privacy communication access."
                    }
                ]
            },
            card6: {
                title: "Join Us",
                list: [{
                        title: "React.js Developer",
                        doc: "Auckland, New Zealand | Full-time",
                        router: '/react'
                    },
                    {
                        title: "Solidity Developer",
                        doc: "Auckland, New Zealand | Full-time",
                        router: '/solidity'
                    }
                ],
                btitle: "Do you want to join our team?",
                bdoc: "We are looking for technical talent."
            },
            card7: {
                title: "Exploit Network White Paper v1",
                btn: 'V1.0 White Paper'
            },
        }
    }
}