[{"documents":[{"i":1,"t":"About Nomos","u":"/about/","b":["About Nomos"]},{"i":9,"t":"Development roadmap","u":"/about/roadmap","b":["About Nomos"]},{"i":11,"t":"Core contributors","u":"/about/team","b":["About Nomos"]},{"i":13,"t":"Description and architecture","u":"/about/architect","b":["About Nomos"]},{"i":19,"t":"Current job openings","u":"/join-us","b":["Join Us"]},{"i":21,"t":"Join the community","u":"/community","b":["Community"]},{"i":23,"t":"Security","u":"/security","b":[]},{"i":25,"t":"Privacy Policy","u":"/privacy-policy","b":[]},{"i":45,"t":"Terms of Use","u":"/terms","b":[]}],"index":{"version":"2.3.9","fields":["t"],"fieldVectors":[["t/1",[0,2.349]],["t/9",[1,1.853,2,1.853]],["t/11",[3,1.853,4,1.853]],["t/13",[5,1.853,6,1.853]],["t/19",[7,1.529,8,1.529,9,1.529]],["t/21",[10,1.853,11,1.853]],["t/23",[12,2.349]],["t/25",[13,1.853,14,1.853]],["t/45",[15,1.853,16,1.853]]],"invertedIndex":[["architectur",{"_index":6,"t":{"13":{"position":[[16,12]]}}}],["commun",{"_index":11,"t":{"21":{"position":[[9,9]]}}}],["contributor",{"_index":4,"t":{"11":{"position":[[5,12]]}}}],["core",{"_index":3,"t":{"11":{"position":[[0,4]]}}}],["current",{"_index":7,"t":{"19":{"position":[[0,7]]}}}],["descript",{"_index":5,"t":{"13":{"position":[[0,11]]}}}],["develop",{"_index":1,"t":{"9":{"position":[[0,11]]}}}],["job",{"_index":8,"t":{"19":{"position":[[8,3]]}}}],["join",{"_index":10,"t":{"21":{"position":[[0,4]]}}}],["nomo",{"_index":0,"t":{"1":{"position":[[6,5]]}}}],["open",{"_index":9,"t":{"19":{"position":[[12,8]]}}}],["polici",{"_index":14,"t":{"25":{"position":[[8,6]]}}}],["privaci",{"_index":13,"t":{"25":{"position":[[0,7]]}}}],["roadmap",{"_index":2,"t":{"9":{"position":[[12,7]]}}}],["secur",{"_index":12,"t":{"23":{"position":[[0,8]]}}}],["term",{"_index":15,"t":{"45":{"position":[[0,5]]}}}],["us",{"_index":16,"t":{"45":{"position":[[9,3]]}}}]],"pipeline":["stemmer"]}},{"documents":[{"i":3,"t":"Network-level resiliency, network-level sovereignty","u":"/about/","h":"#network-level-resiliency-network-level-sovereignty","p":1},{"i":5,"t":"Consent of the governed","u":"/about/","h":"#consent-of-the-governed","p":1},{"i":7,"t":"History","u":"/about/","h":"#history","p":1},{"i":15,"t":"Design space","u":"/about/architect","h":"#design-space","p":13},{"i":17,"t":"Network architecture","u":"/about/architect","h":"#network-architecture","p":13},{"i":27,"t":"1) Who we are","u":"/privacy-policy","h":"#1-who-we-are","p":25},{"i":29,"t":"2) We limit the collection and processing of personal data from your use of the Website","u":"/privacy-policy","h":"#2-we-limit-the-collection-and-processing-of-personal-data-from-your-use-of-the-website","p":25},{"i":31,"t":"3) Third party processing of personal data","u":"/privacy-policy","h":"#3-third-party-processing-of-personal-data","p":25},{"i":33,"t":"4) Security measures we take in respect of the Website","u":"/privacy-policy","h":"#4-security-measures-we-take-in-respect-of-the-website","p":25},{"i":35,"t":"5) Exporting data outside the European Union and Switzerland","u":"/privacy-policy","h":"#5-exporting-data-outside-the-european-union-and-switzerland","p":25},{"i":37,"t":"6) Your choices and rights","u":"/privacy-policy","h":"#6-your-choices-and-rights","p":25},{"i":39,"t":"7) Third party links","u":"/privacy-policy","h":"#7-third-party-links","p":25},{"i":41,"t":"8) This Privacy Policy might change","u":"/privacy-policy","h":"#8-this-privacy-policy-might-change","p":25},{"i":43,"t":"9) Contact information","u":"/privacy-policy","h":"#9-contact-information","p":25},{"i":47,"t":"1) Who we are","u":"/terms","h":"#1-who-we-are","p":45},{"i":49,"t":"2) Disclaimers","u":"/terms","h":"#2-disclaimers","p":45},{"i":51,"t":"3) Forward looking statements","u":"/terms","h":"#3-forward-looking-statements","p":45},{"i":53,"t":"4) Intellectual property rights","u":"/terms","h":"#4-intellectual-property-rights","p":45},{"i":55,"t":"5) Third-party website links","u":"/terms","h":"#5-third-party-website-links","p":45},{"i":57,"t":"6) Limitation of liability","u":"/terms","h":"#6-limitation-of-liability"