[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] minor tweaks
Update of /home/freehaven/cvsroot/doc/fc04
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/fc04
Modified Files:
minion-systems.tex
Log Message:
minor tweaks
Index: minion-systems.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc04/minion-systems.tex,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -d -r1.13 -r1.14
--- minion-systems.tex 10 Sep 2003 16:43:41 -0000 1.13
+++ minion-systems.tex 10 Sep 2003 17:34:18 -0000 1.14
@@ -25,7 +25,7 @@
performing traffic analysis to reveal the {\it presence} of such
communication.
-Mixminion is an open-source, deployed system under active development.
+Mixminion is an open source, deployed system under active development.
It resists known forms of traffic analysis, allowing parties to
communicate without revealing their identities.
\end{abstract}
@@ -42,7 +42,7 @@
community, and we present Mixminion, an anonymous communication system
currently in active development.
-As early as the first business-related telegrams were received by an
+As early as when the first business-related telegrams were received by an
untrusted telegraph operator, businesses have recognized the
importance of encrypting messages on communications networks. Less
well-recognized, however, is the importance of protecting business
@@ -83,11 +83,11 @@
corporate website administrators routinely survey logs to learn which
competitors and customers have viewed which parts of their websites,
and how often. The more sophisticated attacks are almost certainly
-within capabilities of a nation able and inclined to use signals
+within the capabilities of a nation able and inclined to use signals
intelligence resources for economic goals, as the US has (probably)
-done the NSA-backed ECHELON system. Finally, in between the threat of
+done with the NSA-backed ECHELON system. Finally, in between the threat of
unsophisticated analysis and the threat of mid-sized foreign
-governments, lies the potentially more compelling risk of espionage
+governments, is the potentially more compelling threat of espionage
from competing companies. The risk of a competitor bribing an
employee at a nearby telecom, or sneaking eavesdropping equipment into
a colocation facility, is not well explored in the public literature.
@@ -98,7 +98,7 @@
schemes provide very little of the privacy that they promise.
In this short paper, we discuss several existing systems and designs
-to defeat traffic analysis. We focus on Mixminion, an open-source
+to defeat traffic analysis. We focus on Mixminion, an open source
application with a deployed research network under active development.
\subsection{Background}
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/