[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] A few minor rewordings and corrections. Probably OK ...



Update of /home/freehaven/cvsroot/doc/rta04
In directory moria.mit.edu:/tmp/cvs-serv19017/rta04

Modified Files:
	nato-rta04.tex 
Log Message:
A few minor rewordings and corrections. Probably OK to submit.



Index: nato-rta04.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/rta04/nato-rta04.tex,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
--- nato-rta04.tex	8 Jan 2004 07:03:28 -0000	1.6
+++ nato-rta04.tex	8 Jan 2004 20:43:31 -0000	1.7
@@ -264,8 +264,9 @@
 Tor provides a definitive solution to end-to-end attacks, such as
 correlating the timing of connections opening or correlating when
 users are on the system with when certain traffic is observed (also
-known as intersection attacks). Some approaches, such as running an
-onion router, may help; see \cite{tor-design} for more discussion.
+known as intersection attacks). Some approaches may help, for example,
+accessing the network only through your own onion router; see
+\cite{tor-design} for more discussion.
 
 \textbf{No protocol normalization:} Tor does not provide
 \emph{protocol normalization} like Privoxy \cite{privoxy} or the
@@ -286,7 +287,7 @@
 must be provided by an external service.
 
 \textbf{Not steganographic:} Tor does not try to conceal who is connected
-to the network by someone in a position to observe that connection.
+to the network from someone in a position to observe that connection.
 
 \subsection{Threat Model}
 \label{subsec:threat-model}
@@ -437,8 +438,7 @@
 
 Providing Tor as a public service creates many opportunities for
 denial-of-service attacks against the network.  While
-flow control and rate limiting (discussed in
-Section~\ref{subsec:congestion}) prevent users from consuming more
+flow control and rate limiting prevent users from consuming more
 bandwidth than routers are willing to provide, opportunities remain for
 users to
 consume more network resources than their fair share, or to render the
@@ -609,7 +609,8 @@
 scalability, and more users can mean more anonymity. We need to continue
 examining the incentive structures for participating in Tor.
 
-\emph{Cover traffic:} Currently Tor omits cover traffic---its costs
+\emph{Padding Cover traffic:} Currently Tor omits padding
+for cover traffic---its costs
 in performance and bandwidth are clear but its security benefits are
 not well understood. We must pursue more research on link-level cover
 traffic and long-range cover traffic to determine whether some simple padding
@@ -636,7 +637,7 @@
 so we are likely to encounter additional issues that must be resolved,
 both in terms of usability and anonymity.
 
-\emph{Further specification review:} Although have a public
+\emph{Further specification review:} Although we have a public
 byte-level specification for the Tor protocols, it needs
 extensive external review.  We hope that as Tor
 is more widely deployed, more people will examine its
@@ -650,7 +651,9 @@
 
 \emph{Wider-scale deployment:} The original goal of Tor was to
 gain experience in deploying an anonymizing overlay network, and
-learn from having actual users.  We are now at a point in design
+learn from having actual users.  As of writing there is a distributed
+network of roughly a dozen nodes.
+We are now at a point in design
 and development where we can start deploying a wider network.  Once
 we have many actual users, we will doubtlessly be better
 able to evaluate some of our design decisions, including our

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/