[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] fix some typos
Update of /home/freehaven/cvsroot/doc/pynchon-gate
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/pynchon-gate
Modified Files:
pynchon.tex
Log Message:
fix some typos
Index: pynchon.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -d -r1.18 -r1.19
--- pynchon.tex 15 Sep 2004 19:57:00 -0000 1.18
+++ pynchon.tex 15 Sep 2004 22:27:24 -0000 1.19
@@ -93,7 +93,7 @@
protection~\cite{econymics}. This implies that we should gracefully handle
node failure without loss of mail; that we must not require more bandwidth
than volunteer servers are able to provide or users are willing to use; and
-that we hould not require a complicated interface or special knowledge from
+that we should not require a complicated interface or special knowledge from
our users.
\subsubsection{In this paper}
@@ -107,7 +107,7 @@
subsection~\ref{subsec:client-design}. In section~\label{sec:security} we
analyze security, and in section~\ref{sec:performance} we discuss
optimizations and compare our performance to that of other pseudonymous
-message systems.) We close with an evaluation of our succcess in
+message systems.) We close with an evaluation of our success in
section~\ref{sec:conclusions}.
\section{Background and attacks}
@@ -119,15 +119,15 @@
\subsection{Related Work}
\label{subsec:related-work}
Below we discuss existing designs for pseudonymous message delivery. Many
-assume the existance of a ``forward'' anonymous channel that a sender can use
-to send a message to a known recipient while prenting the recipient, the
+assume the existence of a ``forward'' anonymous channel that a sender can use
+to send a message to a known recipient while preventing the recipient, the
infrastructure, and any attackers from knowing who is communicating with
whom. Currently deployed designs are based on Chaum's mix~\cite{chaum-mix}
architecture, and include the Mixmaster~\cite{mixmaster-spec} and
Mixminion~\cite{mixminion} anonymous remailer networks. It is trivial to use
these systems to {\it send} pseudonymous messages: the sender can make an
anonymous message pseudonymous by signing it with a public
-key associated with her pseudonym. Thus, the designs below focs on the
+key associated with her pseudonym. Thus, the designs below focus on the
problem of {\it receiving} messages sent to a pseudonymous address.
\subsubsection{Reply blocks and return addresses.}
@@ -536,7 +536,7 @@
finishing when the next scan returns to that same point. Thus the latency
is exactly the time of one full scan.
-Back et. al discuss similar performance vs. anonymity trade-off issues for
+Back et al. discuss similar performance vs. anonymity trade-off issues for
low-latency anonymity systems, and also conclude that deployability over
existing network infrastructure with attainable resources must be a design
consideration for serious anonymity solutions~\cite{back01}.
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/