[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Nikita caught a spelling error, an awkward sentence,...
Update of /home2/freehaven/cvsroot/doc/pynchon-gate
In directory moria:/tmp/cvs-serv3069
Modified Files:
pynchon.tex
Log Message:
Nikita caught a spelling error, an awkward sentence, and some mistakes in
the intros for sections 2 and 4.
Index: pynchon.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/pynchon-gate/pynchon.tex,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -d -r1.73 -r1.74
--- pynchon.tex 2 Sep 2005 01:04:28 -0000 1.73
+++ pynchon.tex 2 Sep 2005 02:53:02 -0000 1.74
@@ -161,11 +161,10 @@
message systems. We close with an evaluation of our design in
Section~\ref{sec:conclusions}.
-\section{Background and attacks}
+\section{Background}
\label{sec:background}
-Here we present a brief outline of existing pseudonymity solutions, discuss
-attacks against them, and present novel analysis of the effectiveness of one
-kind of traffic analysis against the most popular currently deployed design.
+Here we present a brief outline of existing pseudonymity solutions and discuss
+their limitations and attacks against them.
\subsection{Related Work}
\label{subsec:related-work}
@@ -186,7 +185,7 @@
preserving recipient anonymity have been independently proposed but not
deployed. Earlier work by Jim McCoy describes a
similar architecture to the Pynchon Gate, but does not use an
-information-theoretic primative for preserving privacy~\cite{mccoy}. Independent work by
+information-theoretic primitive for preserving privacy~\cite{mccoy}. Independent work by
Cooper and Birman~\cite{cooper} describes a PIR-based message service for mobile
computing systems, and Berthold, et al. have presented work~\cite{berthold} which shows that
simple optimizations to the PIR protocol are possible.
@@ -257,7 +256,7 @@
Other network-level anonymity systems, such as
Pipenet~\cite{pipenet}, Onion Routing~\cite{goldschlag96}, the Java Anon
Proxy~\cite{jap}, or Tor~\cite{tor-design}, could be used
-in much the same fashion; unfortunately, they are at risk for the same
+in much the same fashion; unfortunately, they face the same
barriers to widespread deployment~\cite{fiveyearslater}. Attempts to address
the practical barriers to deployment of low-latency anonymity systems have resulted
in systems which are at greater risk to traffic analysis methods such as end-to-end
@@ -553,6 +552,14 @@
\section{Attacks against pseudonymity systems}
\label{sec:security}
+We present the common types of attacks against pseudo\-nymity
+systems, and present novel analysis of the effectiveness of one
+kind of traffic analysis against the most popular currently
+deployed design. We also highlight security concerns specific to
+the Pynchon Gate design.
+
+\subsection{Attack categories}
+
Most known attacks on pseudonymity systems fall into one of the
following categories.
***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxx with
unsubscribe freehaven-cvs in the body. http://freehaven.net/