[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] A few more minor tweaks



Update of /home/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/tmp/cvs-serv22665/tor/doc/design-paper

Modified Files:
	challenges.tex 
Log Message:
A few more minor tweaks


Index: challenges.tex
===================================================================
RCS file: /home/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -d -r1.56 -r1.57
--- challenges.tex	8 Feb 2005 20:34:57 -0000	1.56
+++ challenges.tex	8 Feb 2005 20:47:12 -0000	1.57
@@ -150,7 +150,10 @@
 connect to these hidden services, each without knowing the other's network
 identity.
 
-Tor attempts to anonymize the transport layer, not the application layer, so
+Tor attempts to anonymize the transport layer, not the application layer.
+This is useful for applications such as ssh
+where authenticated communication is desired. However, when anonymity from
+those with whom we communicate is desired,
 application protocols that include personally identifying information need
 additional application-level scrubbing proxies, such as
 Privoxy~\cite{privoxy} for HTTP\@.  Furthermore, Tor does not permit arbitrary
@@ -761,7 +764,7 @@
 But of course, we would prefer that legitimate anonymous users be able to
 access abuse-prone services.  One conceivable approach would be to require
 would-be IRC users, for instance, to register accounts if they wanted to
-access the IRC network from Tor.  In practise this would not
+access the IRC network from Tor.  In practice this would not
 significantly impede abuse if creating new accounts were easily automatable;
 this is why services use IP blocking.  In order to deter abuse, pseudonymous
 identities need to require a significant switching cost in resources or human
@@ -1454,7 +1457,8 @@
 network on the Internet are starting to adapt Tor to their needs.
 %
 Second, Tor is only one of many components that preserve privacy online.
-To keep identifying information out of application traffic, someone must build
+For applications where it is desirable to
+keep identifying information out of application traffic, someone must build
 more and better protocol-aware proxies that are usable by ordinary people.
 %
 Third, we need to gain a reputation for social good, and learn how to