[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] A few more minor tweaks
Update of /home/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/tmp/cvs-serv22665/tor/doc/design-paper
Modified Files:
challenges.tex
Log Message:
A few more minor tweaks
Index: challenges.tex
===================================================================
RCS file: /home/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -d -r1.56 -r1.57
--- challenges.tex 8 Feb 2005 20:34:57 -0000 1.56
+++ challenges.tex 8 Feb 2005 20:47:12 -0000 1.57
@@ -150,7 +150,10 @@
connect to these hidden services, each without knowing the other's network
identity.
-Tor attempts to anonymize the transport layer, not the application layer, so
+Tor attempts to anonymize the transport layer, not the application layer.
+This is useful for applications such as ssh
+where authenticated communication is desired. However, when anonymity from
+those with whom we communicate is desired,
application protocols that include personally identifying information need
additional application-level scrubbing proxies, such as
Privoxy~\cite{privoxy} for HTTP\@. Furthermore, Tor does not permit arbitrary
@@ -761,7 +764,7 @@
But of course, we would prefer that legitimate anonymous users be able to
access abuse-prone services. One conceivable approach would be to require
would-be IRC users, for instance, to register accounts if they wanted to
-access the IRC network from Tor. In practise this would not
+access the IRC network from Tor. In practice this would not
significantly impede abuse if creating new accounts were easily automatable;
this is why services use IP blocking. In order to deter abuse, pseudonymous
identities need to require a significant switching cost in resources or human
@@ -1454,7 +1457,8 @@
network on the Internet are starting to adapt Tor to their needs.
%
Second, Tor is only one of many components that preserve privacy online.
-To keep identifying information out of application traffic, someone must build
+For applications where it is desirable to
+keep identifying information out of application traffic, someone must build
more and better protocol-aware proxies that are usable by ordinary people.
%
Third, we need to gain a reputation for social good, and learn how to