diff --git a/content/home/cost_efficiency.png b/content/home/cost_efficiency.png
index 43c84e377..90223a58f 100644
Binary files a/content/home/cost_efficiency.png and b/content/home/cost_efficiency.png differ
diff --git a/content/home/data_sovereignty.png b/content/home/data_sovereignty.png
new file mode 100644
index 000000000..9b24ef75b
Binary files /dev/null and b/content/home/data_sovereignty.png differ
diff --git a/content/home/icon_performance.png b/content/home/icon_performance.png
new file mode 100644
index 000000000..b9d78cc74
Binary files /dev/null and b/content/home/icon_performance.png differ
diff --git a/content/home/index.md b/content/home/index.md
index 38caf6774..aa49ac98c 100644
--- a/content/home/index.md
+++ b/content/home/index.md
@@ -26,7 +26,7 @@ Together we are creating a cloud for everyone, owned by everyone.
-
+
|||
@@ -54,7 +54,7 @@ Together we are creating a cloud for everyone, owned by everyone.
{% grid_stats() %}
-#### Become a cloud & Internet service provider on
+
Our goal was to create a network that can identify and utilize the fastest and most direct paths between participants, remain operational even in challenging conditions (such as fiber cuts), and secure all traffic.
- ith Mycelium, data travels the most efficient routes, leveraging any available internet connection, including peer-to-peer networks like mesh wireless. All traffic is end-to-end encrypted, effectively preventing man-in-the-middle attacks.
+ With Mycelium, data travels the most efficient routes, leveraging any available internet connection, including peer-to-peer networks like mesh wireless. All traffic is end-to-end encrypted, effectively preventing man-in-the-middle attacks.End-to-end encrypted