...
This commit is contained in:
parent
1005bfb1f2
commit
fec9f6bfb7
31
src/App.css
31
src/App.css
@ -278,3 +278,34 @@ html {
|
||||
transition: transform 0.3s ease;
|
||||
}
|
||||
|
||||
/* Markdown table and list enhancements */
|
||||
.prose table {
|
||||
width: 100%;
|
||||
border-collapse: collapse;
|
||||
margin-bottom: 1rem;
|
||||
}
|
||||
|
||||
.prose th,
|
||||
.prose td {
|
||||
border: 1px solid oklch(1 0 0 / 20%); /* Use a slightly lighter border for dark theme */
|
||||
padding: 0.75rem;
|
||||
text-align: left;
|
||||
}
|
||||
|
||||
.prose th {
|
||||
background-color: oklch(0.205 0 0); /* Darker background for headers */
|
||||
font-weight: bold;
|
||||
}
|
||||
|
||||
.prose tr:nth-child(even) {
|
||||
background-color: oklch(0.175 0 0); /* Slightly different background for even rows */
|
||||
}
|
||||
|
||||
.prose ul,
|
||||
.prose ol {
|
||||
padding-left: 1.5em; /* Ensure consistent indentation for lists */
|
||||
}
|
||||
|
||||
.prose li {
|
||||
margin-bottom: 0.5em;
|
||||
}
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: "AI Agents on Your Terms"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
date: "2025-7-26"
|
||||
readTime: "7 min read"
|
||||
image: "itworks.jpg"
|
||||
iconname: "Brain"
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: "Your Personal Agent"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
date: "2025-7-26"
|
||||
readTime: "5 min read"
|
||||
image: "balls.jpg"
|
||||
description: "Your HERO acts as your digital assistant, managing messaging, meetings, calendar, documents, tasks, AI interactions, personal identity, credentials, and financial transactions."
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: "A Private Ledger Just for You"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
date: "2025-7-26"
|
||||
readTime: "8 min read"
|
||||
image: "tech.jpg"
|
||||
description: "Every HERO maintains a private blockchain ledger that verifies identity, manages access control, tracks interactions, and can communicate securely with other ledgers."
|
||||
|
@ -1,7 +1,7 @@
|
||||
---
|
||||
title: "Secure, Unbreakable Memory"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
date: "2025-7-26"
|
||||
readTime: "6 min read"
|
||||
image: "white_keyb.jpg"
|
||||
description: "Uses a zero-knowledge, quantum-safe dispersal algorithm. Memory is stored across multiple nodes with no single point of failure. You control the geographic placement of your data."
|
||||
|
101
src/content/tech/aci.md
Normal file
101
src/content/tech/aci.md
Normal file
@ -0,0 +1,101 @@
|
||||
---
|
||||
title: "Augmented Collective Intelligence"
|
||||
author: "HERO Team"
|
||||
date: "2025-7-26"
|
||||
readTime: "7 min read"
|
||||
image: "heartblue.jpg"
|
||||
description: "How HERO combines human expertise with AI to create a new era of knowledge sharing and collaboration."
|
||||
tags: ["technology", "blockchain", "identity", "security"]
|
||||
iconname: "Key"
|
||||
order: 2
|
||||
slug: aci
|
||||
---
|
||||
|
||||
|
||||
## Augmented Collective Intelligence — the next frontier
|
||||
|
||||
At its core, **Augmented Collective Intelligence (ACI)** refers to the emergent intelligence that arises when humans and AI systems collaborate as peers—each contributing complementary strengths. Humans bring creativity, values, and lived experience. AI contributes scale, memory, pattern recognition, and tireless assistance. When these layers interact intentionally, they give rise to a new form of intelligence that is dynamic, decentralized, and greater than the sum of its parts.
|
||||
|
||||
ACI is not just about automation or AI replacing human labor. It’s about enhancing human cognition, enabling new forms of collaboration, and solving complex problems through hybrid teams of people and machines working together. This model depends on communication, trust, shared context, and transparent governance. It offers the potential to reshape learning, decision-making, innovation, and governance across every domain of society.
|
||||
|
||||
Research and experiments in ACI have shown that hybrid groups—human and AI working together—consistently outperform either humans or machines alone. But to make this vision work at scale, we need infrastructure that respects individual agency, secures data, and facilitates seamless cooperation across networks of individuals and machines.
|
||||
|
||||
---
|
||||
|
||||
|
||||
## HERO’s Personal Agent: the foundation for collective intelligence
|
||||
|
||||
At the heart of HERO’s architecture is the **Personal Agent (PA)**: a software agent that works solely on your behalf and under your full control. This agent evolves over time by learning your preferences, absorbing your knowledge, and reflecting your values. It remembers your past decisions, conversations, and content, forming a coherent digital memory that is always at your service.
|
||||
|
||||
Each HERO Personal Agent:
|
||||
|
||||
- Runs locally or in a trusted environment you control
|
||||
- Maintains encrypted memory and interactions
|
||||
- Collaborates only when and how you allow
|
||||
- Represents your interests in digital conversations
|
||||
|
||||
This personal agent becomes a **knowledge node**—a sovereign participant in a network of collective intelligence. When many PAs interact securely, guided by protocols for identity, context, and proof-of-authenticity, they can pool knowledge, resolve disputes, generate proposals, and help humans make better, faster, and more ethical decisions.
|
||||
|
||||
In HERO’s design, AI is not centralized or corporate-owned. Instead, intelligence lives **at the edge**, with each person—cooperating, not competing.
|
||||
|
||||
---
|
||||
|
||||
## Why this matters
|
||||
|
||||
1. **Amplified Knowledge Sharing**
|
||||
Every user’s PA becomes a source of curated, contextualized, and authentic insight. Shared across the network, this creates a powerful knowledge mesh where wisdom can travel faster and with more meaning.
|
||||
|
||||
2. **Trust and Identity**
|
||||
Because PAs are tied to verified human identities, contributions are attributable, credible, and anchored in accountability. This reduces misinformation and strengthens reliability across the network.
|
||||
|
||||
3. **Scalable Learning and Mentorship**
|
||||
PAs enable lifelong learning by offering personalized support, suggesting resources, and connecting users with others who have relevant knowledge or experience—building a dynamic web of mentorship.
|
||||
|
||||
4. **Resilient, Decentralized Intelligence**
|
||||
Unlike centralized AI systems that are vulnerable to misuse, HERO distributes intelligence across personal agents. This decentralized architecture is more robust, adaptive, and aligned with human sovereignty.
|
||||
|
||||
---
|
||||
|
||||
## A scenario in action
|
||||
|
||||
Imagine a global team working on sustainability solutions.
|
||||
|
||||
- Alice’s PA specializes in environmental policy.
|
||||
- Bob’s PA tracks technical innovations in green energy.
|
||||
- Carol’s PA focuses on local community engagement.
|
||||
|
||||
Each PA contributes curated, real-time insights to a shared project. Together, they generate proposals that integrate policy, technology, and human impact—faster than traditional teams could ever manage.
|
||||
|
||||
As the team works, each PA learns from the others—becoming smarter, more nuanced, and better aligned with its human’s goals. The team benefits not just from each member’s skills, but from the synergy of their agents collaborating behind the scenes.
|
||||
|
||||
---
|
||||
|
||||
## The path forward
|
||||
|
||||
Augmented Collective Intelligence is not science fiction—it’s a design principle for the next phase of human development. But to realize it, we must equip every person with tools that uphold their privacy, protect their identity, and enhance their agency.
|
||||
|
||||
HERO does exactly that.
|
||||
|
||||
By giving each individual a powerful Personal Agent that can learn, act, and collaborate securely, HERO lays the foundation for a new kind of society—one where intelligence is not extracted and centralized, but empowered and shared.
|
||||
|
||||
This is the promise of HERO: **A world where humans and AI grow wiser together.**
|
||||
|
||||
---
|
||||
|
||||
## Compare with Artificial General Intelligence (AGI)
|
||||
|
||||
| Feature | HERO's Augmented Collective Intelligence (ACI) | Centralized AGI Model |
|
||||
|----------------------------------|------------------------------------------------------|-----------------------------------------------|
|
||||
| **Control** | Each person controls their own Personal Agent | Controlled by a central organization or lab |
|
||||
| **Architecture** | Decentralized, peer-to-peer network of agents | Centralized model trained and deployed globally|
|
||||
| **Data Ownership** | Users own and encrypt their own data | User data is often collected, stored, and used centrally |
|
||||
| **Security & Privacy** | Built-in zero-knowledge and encryption mechanisms | Privacy depends on policies and enforcement |
|
||||
| **Identity & Authenticity** | Verified human-linked agents with proof mechanisms | Lacks individual provenance or source tagging |
|
||||
| **Collaboration** | Agents collaborate across humans, guided by consent | AGI may act autonomously without human input |
|
||||
| **Bias & Alignment** | Human-in-the-loop ensures local cultural alignment | Risks misalignment with human values at scale |
|
||||
| **Scalability** | Grows as more humans and agents join the network | Scaling limited by compute and central capacity|
|
||||
| **Adaptability** | Continuously adapts through human feedback loops | Harder to adapt without retraining large models|
|
||||
| **Resilience** | No single point of failure, locally sovereign agents | High risk if centralized AGI is compromised |
|
||||
| **Goal** | Empower humans, augment decision-making | Simulate or surpass human intelligence |
|
||||
| **Ethical Framework** | Cooperative and accountable by design | Undefined or externally imposed ethics |
|
||||
|
@ -1,25 +0,0 @@
|
||||
---
|
||||
title: "Blockchain Identity"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
readTime: "7 min read"
|
||||
image: "heartblue.jpg"
|
||||
description: "Cryptographically verified identity system built on blockchain technology. You control your reputation and trust relationships."
|
||||
tags: ["technology", "blockchain", "identity", "security"]
|
||||
iconname: "Key"
|
||||
order: 4
|
||||
slug: blockchain-identity
|
||||
---
|
||||
|
||||
## Your Sovereign Digital Identity
|
||||
|
||||
HERO leverages blockchain technology to provide you with a cryptographically verified and user-controlled digital identity. This empowers you to manage your reputation and trust relationships without relying on centralized authorities.
|
||||
|
||||
### Key Features:
|
||||
* **Self-Sovereign Identity**: You own and control your digital identity, not a corporation or government.
|
||||
* **Cryptographic Verification**: Your identity is secured and verified using advanced cryptographic techniques on a blockchain.
|
||||
* **Reputation Management**: Build and manage your reputation based on verifiable interactions and attestations.
|
||||
* **Decentralized Trust**: Establish trust directly with other HEROs, fostering a more secure and transparent digital ecosystem.
|
||||
* **Privacy-Preserving**: Share only the necessary information to verify your identity, maintaining your privacy.
|
||||
|
||||
This blockchain-based identity system is a fundamental pillar of your digital sovereignty within the HERO ecosystem.
|
@ -80,7 +80,7 @@ Mycelium doesn't replace your internet connection—**it works with it**. Think
|
||||
|
||||
| Situation | Traditional Internet | With Mycelium |
|
||||
|---------------------------------|----------------------------------|-----------------------------|
|
||||
| **Two neighbors sharing files** | Upload to cloud, then download | Direct 30-second transfer |
|
||||
| **Two neighbors sharing files** | Upload to cloud, then download | Direct faster transfer |
|
||||
| **Power outage at data center** | Everything breaks | Routes around automatically |
|
||||
| **Your private messages** | Stored on server indefinitely | Never stored, just delivered|
|
||||
| **Gaming with friends nearby** | 50ms ping to server | Direct 1ms connection |
|
||||
|
@ -1,24 +1,77 @@
|
||||
---
|
||||
title: "Quantum-Safe Storage"
|
||||
title: "Quantum-Safe Storage: Your Files, Future-Proofed"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
readTime: "8 min read"
|
||||
date: "2025-06-25"
|
||||
readTime: "7 min read"
|
||||
image: "sphere.jpg"
|
||||
description: "Post-quantum cryptography protects your data against future quantum computing threats. Memory is dispersed across multiple nodes with no single point of failure."
|
||||
tags: ["technology", "quantum-safe", "storage", "security"]
|
||||
description: "How ThreeFold keeps photos, documents and business records readable even when today’s passwords and data centers no longer exist."
|
||||
tags: ["storage", "security", "quantum-safe", "data sovereignty"]
|
||||
iconname: "Database"
|
||||
order: 2
|
||||
order: 4
|
||||
slug: quantum-safe-storage
|
||||
---
|
||||
|
||||
## Future-Proofing Your Digital Legacy
|
||||
### 1. The Gap Between “Upload” and “Still There in 20 Years”
|
||||
|
||||
HERO's Quantum-Safe Storage ensures your data is protected not just against current threats, but also against the immense computational power of future quantum computers.
|
||||
| What happens with mainstream cloud | What owners usually discover too late |
|
||||
| --- | --- |
|
||||
| A single provider keeps three copies in one jurisdiction. | One new law, outage or ransom-attack and access can vanish overnight. |
|
||||
| Data is protected by RSA/AES keys. | New quantum computers can break those keys in hours. |
|
||||
| Replication is fixed at 3× size. | 200 % extra space you pay for even if you don’t need it. |
|
||||
|
||||
### Key Aspects:
|
||||
* **Post-Quantum Cryptography**: Implements cryptographic algorithms that are resistant to attacks from quantum computers, safeguarding your data for decades to come.
|
||||
* **Dispersed Memory**: Your data is fragmented and distributed across multiple nodes, eliminating any single point of failure and enhancing resilience.
|
||||
* **Immutable Storage**: Once stored, your data cannot be tampered with or altered, providing an unchangeable record.
|
||||
* **Decentralized Control**: You retain full control over your data, even as it's securely stored across a distributed network.
|
||||
---
|
||||
|
||||
This technology provides an unparalleled level of security and longevity for your most valuable digital assets.
|
||||
### 2. How Quantum-Safe Storage Works in Plain Language
|
||||
|
||||
Think of your file as a jigsaw puzzle that is never kept in one box.
|
||||
|
||||
1. **Encryption** – The file is locked with AES-256.
|
||||
2. **Fragmentation & Equations** – Instead of storing the file, the system creates 20 unique math equations whose *solution* is the file.
|
||||
3. **Spread** – These equations are written to 20 separate devices you can pin to **Sweden only**, “no US soil”, “EU only”, etc.
|
||||
4. **Resilience** – Only 16 of 20 equations are required to re-solve the puzzle, so four complete sites can disappear and the file still opens.
|
||||
5. **Heal** – Devices silently check each equation every few weeks; any error is auto-repaired from surviving pieces.
|
||||
|
||||
You keep using normal drag-and-drop, S3 apps or phone backups—none of this math is visible in daily life.
|
||||
|
||||
---
|
||||
|
||||
### 3. Side-by-Side Comparison
|
||||
|
||||
| Everyday risk | Dropbox / OneDrive / S3 block storage | Quantum-Safe Storage |
|
||||
| --- | --- | --- |
|
||||
| Hard-drive dies in one data-center | You wait for human repair or restore from backup | Storage layer notices, recreates missing piece in < 1 s. |
|
||||
| National firewall or court order | Whole account frozen in that country | 16 surviving fragments in other countries still serve the file. |
|
||||
| Tomorrow’s quantum computer leaks universal password | All data decipherable | Attacker must retrieve and break 16 separate keys stored on different hardware, in different legal systems. |
|
||||
| Storage cost overhead | Always 2–3× raw size | 20 % overhead for 5-site failure tolerance. |
|
||||
|
||||
---
|
||||
|
||||
### 4. Nothing Changes on Your Network
|
||||
|
||||
The technology rides the same internet you already have:
|
||||
|
||||
- Up- and downloads still go over IPv4, IPv6, fiber, 5G or your home Wi-Fi.
|
||||
- Apps that understand the S3 API (most backup software, Nextcloud, mobile photo apps) talk to the system without extra plugins.
|
||||
- Browser links keep working because a small gateway translates HTTPS requests into the low-level fragment fetches.
|
||||
|
||||
Only *where* the bytes sleep is different—scattered across independent “ThreeFold nodes” instead of a single cloud warehouse.
|
||||
|
||||
---
|
||||
|
||||
### 5. Why Geographic Sovereignty Matters
|
||||
|
||||
When a photographer hands wedding photos to a Swiss client or a clinic stores EU medical records, the question appears:
|
||||
**“Which country can legally force access to this data?”**
|
||||
|
||||
With Quantum-Safe Storage the answer is explicit:
|
||||
- “The file is mathematically split. The re-combination map never leaves my machine, eight fragments sit in Swiss homes, twelve in German households—none in the US cloud.”
|
||||
That turns compliance from a promise into a verifiable fact and keeps the file reachable even if trans-Atlantic cables fail.
|
||||
|
||||
---
|
||||
|
||||
### 6. For Tech-Minded Readers
|
||||
|
||||
- **Encoding**: Forward looking code over AES-256-GCM gives 20 % redundancy, detect-and-repair bit-rot, and 50 MB/s sustained throughput.
|
||||
- **Metadata**: filename-to-fragment mapping stored in its own ZDB (append-only, history kept).
|
||||
- **Proof-of-Storage**: Nodes prove fragment integrity via zero-knowledge checksums every heartbeat.
|
||||
- **Post-Quantum Upgrade Path**: Retro-fits Kyber or similar post-quantum ciphers once industrialized, without user action.
|
||||
|
75
src/content/tech/trust-all-architecture.md
Normal file
75
src/content/tech/trust-all-architecture.md
Normal file
@ -0,0 +1,75 @@
|
||||
---
|
||||
title: "Trust-All Architecture"
|
||||
author: "HERO Team"
|
||||
date: "2025-6-26"
|
||||
readTime: "7 min read"
|
||||
image: "person.jpg"
|
||||
description: "At the heart of the original internet was a bold assumption: we trust each other. It wasn’t about surveillance, profiling, or control—it was about openness, sharing, and freedom. Today, as we build a new digital foundation for knowledge and collaboration, it’s time to return to that core philosophy—but with stronger protections.
|
||||
"
|
||||
tags: ["technology", "zero-knowledge", "security"]
|
||||
iconname: "Shield"
|
||||
order: 1
|
||||
slug: trust-all-architecture
|
||||
---
|
||||
|
||||
|
||||
# Privacy by Design: The Trust All Foundation
|
||||
|
||||
At the heart of the original internet was a bold assumption: **we trust each other**.
|
||||
|
||||
It wasn’t about surveillance, profiling, or control—it was about openness, sharing, and freedom. Today, as we build a new digital foundation for knowledge and collaboration, it’s time to **return to that core philosophy—but with stronger protections**.
|
||||
|
||||
## A New Trust Architecture
|
||||
|
||||
We call this the **Trust All Foundation**. It’s a radical yet rational decision: we choose to trust people *by default*, while protecting everyone through strong technology, cryptographic verification, and AI-supported authenticity.
|
||||
|
||||
In a world clouded by misinformation, manipulation, and centralized power, we don’t solve the problem with more gatekeepers. Instead, we flip the model:
|
||||
|
||||
> **Don’t trust because of stars or likes. Trust because of proof.**
|
||||
|
||||
### Authenticity Over Ratings
|
||||
|
||||
AI plays a critical role—not by scoring content or judging users, but by helping humans **identify what is real**:
|
||||
|
||||
* **Proof of Human**: You’re not interacting with a bot army—you’re engaging with verified people.
|
||||
* **Proof of Authenticity**: AI helps validate the source and integrity of content.
|
||||
* **Proof of Knowledge**: Claims can be traced to verifiable expertise, not empty reputation metrics.
|
||||
|
||||
We’re building a **knowledge economy** where trust is earned and verified, not sold or gamed.
|
||||
|
||||
## HERO's Zero-Knowledge Architecture
|
||||
|
||||
A cornerstone of this privacy-first internet is **HERO’s Zero-Knowledge Architecture**. Inspired by cutting-edge cryptography, this system ensures your data is private and sovereign—*even from us*.
|
||||
|
||||
### How It Works:
|
||||
|
||||
* **Client-Side Encryption**: Your data is encrypted *before* it leaves your device.
|
||||
* **Zero-Knowledge Proofs**: Others can verify that something is true (e.g. you're over 18, you're the owner of a document) *without seeing your actual data*.
|
||||
* **No Central Honey Pot**: We don’t store sensitive user data. That means there’s nothing central to breach or abuse.
|
||||
* **Trustless Verification**: You can prove your identity, ownership, or credentials—without ever revealing more than necessary.
|
||||
|
||||
This isn’t just privacy—it’s **digital sovereignty**.
|
||||
|
||||
## Rebuilding Trust, Together
|
||||
|
||||
Trust isn’t something we outsource anymore. It’s something we build—with **transparent systems**, **verifiable claims**, and **respect for individual privacy**.
|
||||
|
||||
The Trust All Foundation doesn’t mean being naive. It means choosing to believe in people again—**while protecting everyone with smart architecture and honest AI**.
|
||||
|
||||
Together, we can create an internet where knowledge flows freely, identity remains sovereign, and **trust is both a human and technological act**.
|
||||
|
||||
|
||||
## 🔍 Comparison: Today’s Web vs Trust All Foundation
|
||||
|
||||
| Aspect | Centralized Platforms (Today) | Trust All Foundation (HERO) |
|
||||
|---------------------------|-------------------------------------------------------------|-----------------------------------------------------------|
|
||||
| **Trust Model** | Trust companies, ratings, and algorithms | Trust people by default, verify with cryptography |
|
||||
| **Identity** | Managed by platforms, tied to accounts | Self-owned identity, verified with zero-knowledge proofs |
|
||||
| **Content Authenticity** | Stars, likes, follows | Cryptographic proof of origin, authorship, & integrity |
|
||||
| **Privacy** | Data collected, profiled, sold | Data encrypted at source, never leaves your control |
|
||||
| **Verification** | Central authority decides truth | Peer-to-peer & AI-assisted authenticity checks |
|
||||
| **AI Role** | Curate, rank, manipulate feeds | Assist human understanding, verify sources |
|
||||
| **Data Storage** | Central servers (high-risk honeypots) | Distributed & encrypted, zero central storage of secrets |
|
||||
| **Surveillance Risk** | High — behavior tracked and analyzed | Minimal — nothing shared unless proven & permitted |
|
||||
| **User Control** | Limited, often opt-out | Full, transparent, consent-based |
|
||||
| **Economic Model** | Monetize attention and data | Empower knowledge creation and cooperation |
|
@ -1,24 +0,0 @@
|
||||
---
|
||||
title: "Zero-Knowledge Architecture"
|
||||
author: "HERO Team"
|
||||
date: "2023-10-26"
|
||||
readTime: "7 min read"
|
||||
image: "person.jpg"
|
||||
description: "Advanced cryptographic techniques ensure that even HERO cannot access your data. Your information is encrypted before it leaves your device."
|
||||
tags: ["technology", "zero-knowledge", "security"]
|
||||
iconname: "Shield"
|
||||
order: 1
|
||||
slug: zero-knowledge-architecture
|
||||
---
|
||||
|
||||
## Privacy by Design: The Zero-Knowledge Foundation
|
||||
|
||||
HERO's Zero-Knowledge Architecture is a cornerstone of its privacy-first approach. This advanced cryptographic technique ensures that your data remains private and secure, even from HERO itself.
|
||||
|
||||
### How it Works:
|
||||
* **Data Encryption**: Your information is encrypted on your device before it ever leaves your control.
|
||||
* **Proof, Not Data**: Instead of sharing your actual data, zero-knowledge proofs allow you to verify information without revealing the underlying data.
|
||||
* **Enhanced Security**: This architecture minimizes the attack surface, as there's no central repository of unencrypted user data to target.
|
||||
* **Trustless Verification**: You can prove ownership, identity, or other attributes without needing to trust a third party with your sensitive information.
|
||||
|
||||
This fundamental technology ensures that your digital interactions are private, secure, and truly sovereign.
|
@ -56,7 +56,7 @@ const GetStarted = () => {
|
||||
title="Get Started with HERO"
|
||||
description="Join the revolution and take back control of your digital life. Your Personal Agent is waiting to serve you with complete privacy and security."
|
||||
backgroundImage={startImage}
|
||||
ctaText="Start Free Trial"
|
||||
ctaText="Get Started Now"
|
||||
ctaLink="#pricing"
|
||||
showVideo={false}
|
||||
/>
|
||||
@ -126,7 +126,7 @@ const GetStarted = () => {
|
||||
size="lg"
|
||||
className="bg-gradient-to-r from-green-600 to-blue-600 hover:from-green-700 hover:to-blue-700 text-white px-12 py-4 text-lg font-semibold rounded-lg transition-all duration-300 transform hover:scale-105 w-full md:w-auto"
|
||||
>
|
||||
Start Your 7-Day Free Trial
|
||||
Become a member of our Cooperative
|
||||
</Button>
|
||||
<p className="text-gray-400 text-sm mt-4">No credit card required • Cancel anytime</p>
|
||||
</div>
|
||||
@ -271,7 +271,7 @@ const GetStarted = () => {
|
||||
size="lg"
|
||||
className="bg-gradient-to-r from-green-600 to-blue-600 hover:from-green-700 hover:to-blue-700 text-white px-12 py-4 text-lg font-semibold rounded-lg transition-all duration-300 transform hover:scale-105 pulse-glow"
|
||||
>
|
||||
Start Your Free Trial Now
|
||||
Become a member of our Cooperative
|
||||
</Button>
|
||||
<p className="text-gray-400">7-day free trial • $20/month after • Cancel anytime</p>
|
||||
</motion.div>
|
||||
|
Loading…
Reference in New Issue
Block a user