[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[freehaven-cvs] One more small change I forgot.



Update of /home/freehaven/cvsroot/doc/fc03
In directory moria.mit.edu:/tmp/cvs-serv17208

Modified Files:
	econymics.ps econymics.tex 
Log Message:
One more small change I forgot.


Index: econymics.ps
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc03/econymics.ps,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
--- econymics.ps	16 Dec 2002 21:24:14 -0000	1.6
+++ econymics.ps	16 Dec 2002 21:30:35 -0000	1.7
@@ -8,7 +8,7 @@
 %%EndComments
 %DVIPSCommandLine: dvips econymics.dvi -o econymics.ps
 %DVIPSParameters: dpi=600, comments removed
-%DVIPSSource:  TeX output 2002.12.16:1619
+%DVIPSSource:  TeX output 2002.12.16:1629
 %%BeginProcSet: tex.pro
 /TeXDict 250 dict def TeXDict begin /N{def}def /B{bind def}N /S{exch}N
 /X{S N}B /TR{translate}N /isls false N /vsize 11 72 mul N /hsize 8.5 72
@@ -5202,27 +5202,29 @@
 h(consider)f(the)h(costs)f(of)h(reac)n(hing)e(and)i(main)n(taining)f(a)
 523 3828 y(p)r(osition)33 b(from)g(whic)n(h)h(those)f(attac)n(ks)f(are)
 g(e\013ectiv)n(e)i(|)f(whic)n(h)h(will)f(probably)g(in)n(v)n(olv)n(e)
-523 3928 y(gaining)f(reputation)g(and)h(acting)g(as)f(a)g(no)r(de)h
-(for)g(an)f(extended)i(p)r(erio)r(d)f(of)f(time.)i(Suc)n(h)523
-4028 y(adv)n(ersaries)25 b(will)j(b)r(e)g(in)g(an)g(arms)f(race)f(with)
-j(proto)r(col)d(dev)n(elop)r(ers)h(to)g(sta)n(y)g(undetected)523
-4127 y(despite)21 b(their)f(attac)n(ks)f([10].)g(The)i(b)r(ene\014ts)g
-(from)f(successful)f(attac)n(ks)h(migh)n(t)g(b)r(e)g(\014nancial,)523
-4227 y(as)32 b(in)h(the)g(case)e(of)i(disco)n(v)n(ering)d(and)j(using)f
-(sensitiv)n(e)g(information)g(or)f(a)i(comp)r(etitor's)523
-4327 y(service)24 b(b)r(eing)i(disrupted;)f(or)g(they)g(could)g(b)r(e)h
-(purely)f(related)f(to)i(p)r(ersonal)e(satisfaction.)523
-4426 y(The)c(costs)g(of)g(b)r(eing)h(disco)n(v)n(ered)d(as)i(a)g
-(dishonest)g(no)r(de)g(include)h(rebuilding)f(a)g(new)g(no)r(de's)523
-4526 y(w)n(orth)28 b(of)h(reputation;)f(but)h(b)r(eing)g(noticed)g(and)
-f(exp)r(osed)g(as)g(the)h(adv)n(ersary)d(ma)n(y)i(ha)n(v)n(e)523
-4625 y(v)n(ery)33 b(serious)h(negativ)n(e)f(consequences)g(for)i(the)f
-(attac)n(k)n(er)f(itself.)i(\(Imagine)g(the)g(public)523
-4725 y(resp)r(onse)27 b(if)h(an)f(In)n(ternet)g(pro)n(vider)f(w)n(ere)h
-(found)h(running)f(dishonest)h(no)r(des.\))648 4825 y(Th)n(us,)38
-b(all)g(things)g(considered,)f(it)i(migh)n(t)f(b)r(e)h(that)f(the)h(la)
-n(ws)e(of)h(economics)f(w)n(ork)523 4924 y(against)26
-b(the)i(attac)n(k)n(er)e(as)h(w)n(ell.)p eop
+523 3928 y(gaining)c(reputation)g(and)h(acting)f(as)g(a)g(no)r(de)h
+(for)f(an)h(extended)g(p)r(erio)r(d)f(of)h(time,)g(a)f(cost)523
+4028 y(if)i(the)h(goal)d(is)i(to)g(generally)e(break)h(reliabilit)n(y)
+-7 b(.)31 b(Suc)n(h)g(adv)n(ersaries)d(will)j(b)r(e)g(in)g(an)g(arms)
+523 4127 y(race)26 b(with)i(proto)r(col)e(dev)n(elop)r(ers)g(to)h(sta)n
+(y)g(undetected)h(despite)f(their)g(attac)n(ks)f([10].)h(The)523
+4227 y(b)r(ene\014ts)h(from)f(successful)g(attac)n(ks)f(migh)n(t)i(b)r
+(e)f(\014nancial,)g(as)g(in)h(the)f(case)g(of)g(disco)n(v)n(ering)523
+4327 y(and)21 b(using)f(sensitiv)n(e)g(information)g(or)g(a)g(comp)r
+(etitor's)g(service)g(b)r(eing)g(disrupted;)h(or)f(they)523
+4426 y(could)33 b(b)r(e)g(purely)f(related)h(to)f(p)r(ersonal)g
+(satisfaction.)g(The)h(costs)f(of)h(b)r(eing)g(disco)n(v)n(ered)523
+4526 y(as)h(a)g(dishonest)h(no)r(de)f(include)h(rebuilding)f(a)h(new)f
+(no)r(de's)h(w)n(orth)f(of)g(reputation;)g(but)523 4625
+y(b)r(eing)41 b(noticed)f(and)h(exp)r(osed)f(as)g(the)h(adv)n(ersary)d
+(ma)n(y)i(ha)n(v)n(e)f(v)n(ery)h(serious)f(negativ)n(e)523
+4725 y(consequences)27 b(for)h(the)g(attac)n(k)n(er)f(itself.)i
+(\(Imagine)f(the)g(public)h(resp)r(onse)e(if)i(an)f(In)n(ternet)523
+4825 y(pro)n(vider)34 b(w)n(ere)h(found)h(running)g(dishonest)g(no)r
+(des.\))g(Th)n(us,)f(all)h(things)g(considered,)f(it)523
+4924 y(migh)n(t)28 b(b)r(e)g(that)f(the)h(la)n(ws)f(of)h(economics)e(w)
+n(ork)g(against)h(the)h(attac)n(k)n(er)e(as)g(w)n(ell.)p
+eop
 %%Page: 15 15
 15 14 bop 648 448 a Fs(A)27 b(\\lazy")e(no)r(de,)i(on)g(the)g(other)f
 (hand,)h(w)n(an)n(ts)f(to)h(protect)g(her)f(o)n(wn)g(anon)n(ymit)n(y)-7

Index: econymics.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc03/econymics.tex,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -d -r1.47 -r1.48
--- econymics.tex	16 Dec 2002 21:24:15 -0000	1.47
+++ econymics.tex	16 Dec 2002 21:30:35 -0000	1.48
@@ -969,7 +969,8 @@
 however, a dishonest agent will have to consider the costs of reaching and
 maintaining a position from which those attacks are effective --- which will
 probably involve gaining reputation and acting as a node for an extended
-period of time. Such adversaries will be in an arms race with protocol
+period of time, a cost if the goal is to generally break reliability.
+Such adversaries will be in an arms race with protocol
 developers to stay undetected despite their attacks \cite{casc-rep}. The
 benefits from successful attacks might be financial, as in the case of
 discovering and using sensitive information or a competitor's service being
@@ -979,7 +980,6 @@
 adversary may have very serious negative consequences for the attacker
 itself. (Imagine the public response if an Internet provider were found
 running dishonest nodes.)
-
 Thus, all things considered, it might be that the laws of economics work
 against the attacker as well.
 

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/