[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] some more organization
Update of /home2/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc/design-paper
Modified Files:
challenges.tex
Log Message:
some more organization
Index: challenges.tex
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
--- challenges.tex 25 Jan 2005 10:38:09 -0000 1.6
+++ challenges.tex 26 Jan 2005 00:39:03 -0000 1.7
@@ -169,10 +169,17 @@
\section{Crossroads: Policy issues}
\label{sec:crossroads-policy}
+\subsection{Tor and blacklists}
+
+Takedowns and efnet abuse and wikipedia complaints and irc
+networks.
+
+\subsection{Tor and file-sharing}
+
Bittorrent and dmca. Should we add an IDS to autodetect protocols and
-snipe them? Takedowns and efnet abuse and wikipedia complaints and irc
-networks. Should we allow revocation of anonymity if a threshold of
-servers want to?
+snipe them?
+
+\subsection{Image and sustainability}
Image: substantial non-infringing uses. Image is a security parameter,
since it impacts user base and perceived sustainability.
@@ -185,8 +192,13 @@
continued money, and they periodically ask what they will do when it
dries up.
-How much should Tor aim to do? Applications that leak data. We can say
-they're not our problem, but they're somebody's problem.
+\subsection{Other}
+
+Tor's scope: How much should Tor aim to do? Applications that leak
+data. We can say they're not our problem, but they're somebody's problem.
+
+Should we allow revocation of anonymity if a threshold of
+servers want to?
Logging. Making logs not revealing. A happy coincidence that verbose
logging is our \#2 performance bottleneck. Is there a way to detect
@@ -279,9 +291,13 @@
%\label{sec:crossroads-scaling}
%P2P + anonymity issues:
-Incentives. Copy the page I wrote for the NSF proposal, and maybe extend
+\subsection{Incentives}
+
+Copy the page I wrote for the NSF proposal, and maybe extend
it if we're feeling smart.
+\subsection{Usability}
+
Usability: fc03 paper was great, except the lower latency you are the
less useful it seems it is.
A Tor gui, how jap's gui is nice but does not reflect the security
@@ -308,10 +324,14 @@
style doesn't work because we don't want just *one* path. Point to
Geoff's stuff.
+\subsection{ISP-class adversaries}
+
Routing-zones. It seems that our threat model comes down to diversity and
dispersal. But hard for Alice to know how to act. Many questions remain.
-The China problem. We have lots of users in Iran and similar (we stopped
+\subsection{The China problem}
+
+We have lots of users in Iran and similar (we stopped
logging, so it's hard to know now, but many Persian sites on how to use
Tor), and they seem to be doing ok. But the China problem is bigger. Cite
Stefan's paper, and talk about how we need to route through clients,