[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r8898: Ordinal numbers are already adverbs; enforce house style. (in tor/trunk: . doc/design-paper)



Author: nickm
Date: 2006-11-03 13:08:41 -0500 (Fri, 03 Nov 2006)
New Revision: 8898

Modified:
   tor/trunk/
   tor/trunk/doc/design-paper/blocking.tex
Log:
 r9470@Kushana:  nickm | 2006-11-02 16:57:32 -0500
 Ordinal numbers are already adverbs; enforce house style.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r9470] on c95137ef-5f19-0410-b913-86e773d04f59

Modified: tor/trunk/doc/design-paper/blocking.tex
===================================================================
--- tor/trunk/doc/design-paper/blocking.tex	2006-11-03 14:34:10 UTC (rev 8897)
+++ tor/trunk/doc/design-paper/blocking.tex	2006-11-03 18:08:41 UTC (rev 8898)
@@ -408,15 +408,15 @@
 of HTTP, HTTPS, and SOCKS proxies. Many small companies have sprung up
 providing more refined lists to paying customers.
 
-There are some downsides to using these oen proxies though. Firstly,
+There are some downsides to using these open proxies though. First,
 the proxies are of widely varying quality in terms of bandwidth and
-stability, and many of them are entirely unreachable. Secondly, unlike
+stability, and many of them are entirely unreachable. Second, unlike
 networks of volunteers like Tor, the legality of routing traffic through
 these proxies is questionable: it's widely believed that most of them
 don't realize what they're offering, and probably wouldn't allow it if
-they realized. Thirdly, in many cases the connection to the proxy is
+they realized. Third, in many cases the connection to the proxy is
 unencrypted, so firewalls that filter based on keywords in IP packets
-will not be hindered. And lastly, many users are suspicious that some
+will not be hindered. And last, many users are suspicious that some
 open proxies are a little \emph{too} convenient: are they run by the
 adversary, in which case they get to monitor all the user's requests
 just as single-hop proxies can?
@@ -452,7 +452,7 @@
 
 \subsection{Tor itself}
 
-And lastly, we include Tor itself in the list of current solutions
+And last, we include Tor itself in the list of current solutions
 to firewalls. Tens of thousands of people use Tor from countries that
 routinely filter their Internet. Tor's website has been blocked in most
 of them. But why hasn't the Tor network been blocked yet?
@@ -676,7 +676,7 @@
 But in a blocking-resistance environment, clients should not present
 certificates at all.
 
-Lastly, what if the adversary starts observing the network traffic even
+Last, what if the adversary starts observing the network traffic even
 more closely? Even if our TLS handshake looks innocent, our traffic timing
 and volume still look different than a user making a secure web connection
 to his bank. The same techniques used in the growing trend to build tools
@@ -869,9 +869,9 @@
 proxies, but the users also need to get to a single site that is sure
 to be blocked.
 
-There are two reasons why we're in better shape. Firstly, the users don't
+There are two reasons why we're in better shape. First, the users don't
 actually need to reach the watering hole directly: it can respond to
-email, for example. Secondly, 
+email, for example. Second, 
 
 In fact, the JAP
 project~\cite{web-mix,koepsell:wpes2004} suggested an alternative approach
@@ -1089,17 +1089,17 @@
 let users verify that they're actually talking to the right servers.
 There are four pieces to this trust chain.
 
-Firstly, when Tor clients are establishing circuits, at each step
+First, when Tor clients are establishing circuits, at each step
 they demand that the next Tor server in the path prove knowledge of
 its private key~\cite{tor-design}. This step prevents the first node
-in the path from just spoofing the rest of the path. Secondly, the
+in the path from just spoofing the rest of the path. Second, the
 Tor directory authorities provide a signed list of servers along with
 their public keys---so unless the adversary can control a threshold
 of directory authorities, he can't trick the Tor client into using other
-Tor servers. Thirdly, the location and keys of the directory authorities,
+Tor servers. Third, the location and keys of the directory authorities,
 in turn, is hard-coded in the Tor source code---so as long as the user
 got a genuine version of Tor, he can know that he is using the genuine
-Tor network. And lastly, the source code and other packages are signed
+Tor network. And last, the source code and other packages are signed
 with the GPG keys of the Tor developers, so users can confirm that they
 did in fact download a genuine version of Tor.
 
@@ -1204,8 +1204,8 @@
 Bridge users without Tor clients
 
 Bridge relays could always open their socks proxy. This is bad though,
-firstly
-because bridges learn the bridge users' destinations, and secondly because
+first
+because bridges learn the bridge users' destinations, and second because
 we've learned that open socks proxies tend to attract abusive users who
 have no idea they're using Tor.