[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] Nikita caught a spelling error, an awkward sentence,...



Update of /home2/freehaven/cvsroot/doc/pynchon-gate
In directory moria:/tmp/cvs-serv3069

Modified Files:
	pynchon.tex 
Log Message:
Nikita caught a spelling error, an awkward sentence, and some mistakes in 
the intros for sections 2 and 4.


Index: pynchon.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -d -r1.73 -r1.74
--- pynchon.tex	2 Sep 2005 01:04:28 -0000	1.73
+++ pynchon.tex	2 Sep 2005 02:53:02 -0000	1.74
@@ -161,11 +161,10 @@
 message systems. We close with an evaluation of our design in
 Section~\ref{sec:conclusions}.
 
-\section{Background and attacks}
+\section{Background}
 \label{sec:background}
-Here we present a brief outline of existing pseudonymity solutions, discuss
-attacks against them, and present novel analysis of the effectiveness of one
-kind of traffic analysis against the most popular currently deployed design.
+Here we present a brief outline of existing pseudonymity solutions and discuss
+their limitations and attacks against them.
 
 \subsection{Related Work}
 \label{subsec:related-work}
@@ -186,7 +185,7 @@
 preserving recipient anonymity have been independently proposed but not
 deployed. Earlier work by Jim McCoy describes a
 similar architecture to the Pynchon Gate, but does not use an
-information-theoretic primative for preserving privacy~\cite{mccoy}. Independent work by
+information-theoretic primitive for preserving privacy~\cite{mccoy}. Independent work by
 Cooper and Birman~\cite{cooper} describes a PIR-based message service for mobile
 computing systems, and Berthold, et al. have presented work~\cite{berthold} which shows that
 simple optimizations to the PIR protocol are possible.
@@ -257,7 +256,7 @@
 Other network-level anonymity systems, such as
 Pipenet~\cite{pipenet}, Onion Routing~\cite{goldschlag96}, the Java Anon
 Proxy~\cite{jap}, or Tor~\cite{tor-design}, could be used
-in much the same fashion; unfortunately, they are at risk for the same
+in much the same fashion; unfortunately, they face the same
 barriers to widespread deployment~\cite{fiveyearslater}. Attempts to address
 the practical barriers to deployment of low-latency anonymity systems have resulted
 in systems which are at greater risk to traffic analysis methods such as end-to-end
@@ -553,6 +552,14 @@
 
 \section{Attacks against pseudonymity systems}
 \label{sec:security}
+We present the common types of attacks against pseudo\-nymity 
+systems, and present novel analysis of the effectiveness of one 
+kind of traffic analysis against the most popular currently 
+deployed design. We also highlight security concerns specific to
+the Pynchon Gate design.
+
+\subsection{Attack categories}
+
 Most known attacks on pseudonymity systems fall into one of the
 following categories.
 

***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxx with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/