[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] ispell
Update of /home2/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc/design-paper
Modified Files:
challenges.tex
Log Message:
ispell
Index: challenges.tex
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -d -r1.58 -r1.59
--- challenges.tex 8 Feb 2005 22:10:04 -0000 1.58
+++ challenges.tex 8 Feb 2005 22:26:24 -0000 1.59
@@ -60,10 +60,10 @@
integrity, configurable exit policies, and location-hidden services using
rendezvous points. Tor works on the real-world Internet, requires no special
privileges or kernel modifications, requires little synchronization or
-coordination between nodes, and provides a reasonable tradeoff between
+coordination between nodes, and provides a reasonable trade-off between
anonymity, usability, and efficiency.
-We first deployed a public Tor network in October 2003; since then it has
+We deployed the public Tor network in October 2003; since then it has
grown to over a hundred volunteer-operated nodes
and as much as 80 megabits of
average traffic per second. Tor's research strategy has focused on deploying
@@ -159,7 +159,7 @@
%connections via SOCKS
(but see Section~\ref{subsec:tcp-vs-ip}).
-Most node operators do not want to allow arbitary TCP traffic.% to leave
+Most node operators do not want to allow arbitrary TCP traffic. % to leave
%their server.
To address this, Tor provides \emph{exit policies} so
each exit node can block the IP addresses and ports it is unwilling to allow.
@@ -176,7 +176,7 @@
Tor research and development has been funded by ONR and DARPA
for use in securing government
-communications, and by the Electronic Frontier Foundation, for use
+communications, and by the Electronic Frontier Foundation for use
in maintaining civil liberties for ordinary citizens online. The Tor
protocol is one of the leading choices
for anonymizing layer in the European Union's PRIME directive to
@@ -201,7 +201,7 @@
direction in anonymity research: designs exist that provide more anonymity
than Tor at the expense of significantly increased resource requirements, or
decreased flexibility in application support (typically because of increased
-latency). Such research does not typically abandon aspirations towards
+latency). Such research does not typically abandon aspirations toward
deployability or utility, but instead tries to maximize deployability and
utility subject to a certain degree of structural anonymity (structural because
usability and practicality affect usage which affects the actual anonymity
@@ -260,7 +260,7 @@
% foolish. -NM
More powerful attacks may exist. In \cite{hintz-pet02} it was
shown that an attacker who can catalog data volumes of popular
-responder destinations (say, websites with consistant data volumes) may not
+responder destinations (say, websites with consistent data volumes) may not
need to
observe both ends of a stream to learn source-destination links for those
responders.
@@ -279,7 +279,7 @@
% Hintz stuff and the Back et al. stuff from Info Hiding 01. I've
% separated the two and added the references. -PFS
It has not yet been shown whether these attacks will succeed or fail
-in the presence of the varaibility and volume quantization introduced by the
+in the presence of the variability and volume quantization introduced by the
Tor network, but it seems likely that these factors will at best delay
rather than halt the attacks in the cases where they succeed.
%likely to entail high variability and massive storage since
@@ -397,9 +397,9 @@
MorphMix~\cite{morphmix:fc04} have been proposed in the literature, but
have not yet been fielded. These systems differ somewhat
in threat model and presumably practical resistance to threats.
-Morphmix is close to Tor in circuit setup, and, by separating
+MorphMix is close to Tor in circuit setup, and, by separating
node discovery from route selection from circuit setup, Tor is
-flexible enough to potentially contain a Morphmix experiment within
+flexible enough to potentially contain a MorphMix experiment within
it. We direct the interested reader
to~\cite{tor-design} for a more in-depth review of related work.
@@ -412,7 +412,7 @@
proxies~\cite{anonymizer} present a single point of failure, where
a single compromise can expose all users' traffic, and a single-point
eavesdropper can perform traffic analysis on the entire network.
-Also, their proprietary implementations place any infrastucture that
+Also, their proprietary implementations place any infrastructure that
depends on these single-hop solutions at the mercy of their providers'
financial health as well as network security.
@@ -526,12 +526,12 @@
activists. The more malicious hackers, the worse for the normal users. Thus,
reputability is an anonymity issue for two reasons. First, it impacts
the sustainability of the network: a network that's always about to be
-shut down has difficulty attracting and keeping adquate nodes.
+shut down has difficulty attracting and keeping adequate nodes.
Second, a disreputable network is more vulnerable to legal and
political attacks, since it will attract fewer supporters.
While people therefore have an incentive for the network to be used for
-``more reputable'' activities than their own, there are still tradeoffs
+``more reputable'' activities than their own, there are still trade-offs
involved when it comes to anonymity. To follow the above example, a
network used entirely by cancer survivors might welcome file sharers
onto the network, though of course they'd prefer a wider
@@ -805,7 +805,7 @@
\section{Design choices}
-In addition to social issues, Tor also faces some design tradeoffs that must
+In addition to social issues, Tor also faces some design trade-offs that must
be investigated as the network develops.
\subsection{Transporting the stream vs transporting the packets}
@@ -931,7 +931,7 @@
own node~\cite{tor-design,or-ih96,or-pet00}. This is called using Tor in an
\emph{enclave} configuration. By running Tor clients only on Tor nodes
at the enclave perimeter, enclave configuration can also permit anonymity
-protection even when policy or other requiremnts prevent individual machines
+protection even when policy or other requirements prevent individual machines
within the enclave from running Tor clients~\cite{or-jsac98,or-discex00}.
Of course, Tor's default path length of