[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] mess with the formatting in sec9



Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
	tor-design.tex 
Log Message:
mess with the formatting in sec9


Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -d -r1.47 -r1.48
--- tor-design.tex	1 Nov 2003 06:47:19 -0000	1.47
+++ tor-design.tex	1 Nov 2003 07:52:51 -0000	1.48
@@ -1704,9 +1704,8 @@
 Below we summarize a variety of attacks and how well our design withstands
 them.
 
-\begin{enumerate}
-\item \textbf{Passive attacks}
-\begin{itemize}
+\subsubsection*{Passive attacks}
+\begin{tightlist}
 \item \emph{Observing user behavior.}
 \item \emph{End-to-end Timing correlation.}
 \item \emph{End-to-end Size correlation.}
@@ -1733,10 +1732,10 @@
   anonymization of data stream.
 
 
-\end{itemize}
+\end{tightlist}
 
-\item \textbf{Active attacks}
-\begin{itemize}
+\subsubsection*{Active attacks}
+\begin{tightlist}
 \item \emph{Key compromise.} Talk about all three keys. 3 bullets
 \item \emph{Iterated subpoena.} Legal roving adversary. Works bad against
 this because of ephemeral keys. Criticize pets paper in section 2 for
@@ -1756,7 +1755,6 @@
 the exit node can change the content you're getting to try to
 trick you. similarly, when it rejects you due to exit policy,
 it could give you a bad IP that sends you somewhere else.
-\end{itemize}
 \item \emph{replaying traffic} Can't in Tor. NonSSL anonymizer.
 
 \item Do bad things with the Tor network, so we are hated and
@@ -1771,23 +1769,23 @@
 we rely on DNS being globally consistent. if people in africa resolve
 IPs differently, then asking to extend a circuit to a certain IP can
 give away your origin.
+\end{tightlist}
 
-\item \textbf{Directory attacks}
-\begin{itemize}
+\subsubsection*{Directory attacks}
+\begin{tightlist}
 \item knock out a dirserver
 \item knock out half the dirservers
 \item trick user into using different software (with different dirserver
 keys)
 \item OR connects to the dirservers but nowhere else
 \item foo
-\end{itemize}
+\end{tightlist}
 
-\item \textbf{Attacks against rendezvous points}
-\begin{itemize}
+\subsubsection*{Attacks against rendezvous points}
+\begin{tightlist}
 \item foo
-\end{itemize}
+\end{tightlist}
 
-\end{enumerate}
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%