[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] rz: give us a new title and half an abstract



Update of /home/freehaven/cvsroot/doc/routing-zones
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/routing-zones

Modified Files:
	routing-zones.tex 
Log Message:
rz: give us a new title and half an abstract


Index: routing-zones.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.tex,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -d -r1.8 -r1.9
--- routing-zones.tex	26 Jan 2004 06:55:41 -0000	1.8
+++ routing-zones.tex	26 Jan 2004 09:12:18 -0000	1.9
@@ -17,7 +17,8 @@
 %\title{Automated Jurisdictional Arbitrage}
 %\title{Blocking Observers with }
 %\title{Improving anonymity by considering routing zones}
-\title{Blocking eavesdroppers by exploiting routing zones}
+%\title{Blocking eavesdroppers by exploiting routing zones}
+\title{Jurisdictional Diversity in Anonymity Networks}
 \author{Nick Feamster\inst{1} \and Roger Dingledine\inst{2}}
 \institute{MIT Laboratory for Computer Science \email{(feamster@lcs.mit.edu)} \and
 The Free Haven Project \email{(arma@mit.edu)}}
@@ -26,6 +27,12 @@
 
 \begin{abstract}
 
+Anonymity networks have long relied on the diversity of nodes in the
+infrastructure for protection against attacks---typically an adversary
+who can control or observe a larger fraction of the network can launch a
+more effective attack. We investigate the diversity of deployed anonymity
+networks with respect to an adversary who observes the network edges.
+We find that. We recommend that.
 
 \end{abstract}
 
@@ -56,9 +63,10 @@
 from learning which message in the batch originated from a given sender
 \cite{chaum81,trickle02}.
 % (Of course, this only works if the system can tolerate some latency.)
-\item {\bf{Padding:}} Senders also provide decoy traffic, to
+\item {\bf{Padding:}} Senders provide decoy traffic as well as normal
+traffic, to
 complicate the adversary's attempts to correlate sender and receiver
-\cite{pipenet,defensive-dropping,langos02}.
+\cite{langos02,pipenet,defensive-dropping}.
 %Pipenet \cite{pipenet} conceals traffic patterns by
 %constant padding on every link, at the cost of robustness. Levine et al
 %show in \cite{defensive-dropping} that a small amount of dummy padding

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/