[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] clean up section 2, add back reputability subsec.
Update of /home2/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc/design-paper
Modified Files:
challenges.tex
Log Message:
clean up section 2, add back reputability subsec.
Index: challenges.tex
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -d -r1.26 -r1.27
--- challenges.tex 31 Jan 2005 06:43:38 -0000 1.26
+++ challenges.tex 31 Jan 2005 08:34:38 -0000 1.27
@@ -107,14 +107,13 @@
both policy and technical respectively, that stand in the way of moving
from a practical useful network to a practical useful anonymous network.
-\section{What Is Tor}
+%\section{What Is Tor}
+\section{Distributed trust: safety in numbers}
\label{sec:what-is-tor}
Here we give a basic overview of the Tor design and its properties. For
details on the design, assumptions, and security arguments, we refer
-the reader to~\cite{tor-design}.
-
-\subsection{Distributed trust: safety in numbers}
+the reader to the Tor design paper~\cite{tor-design}.
Tor provides \emph{forward privacy}, so that users can connect to
Internet sites without revealing their logical or physical locations
@@ -150,10 +149,6 @@
messaging server. Using Tor ``rendezvous points'', other Tor users can
connect to these hidden services, each without knowing the other's network
identity.
-%This hidden service functionality could allow Tor users to
-%set up a website where people publish material without worrying about
-%censorship. Nobody would be able to determine who was offering the site,
-%and nobody who offered the site would know who was posting to it.
Tor attempts to anonymize the transport layer, not the application layer, so
application protocols that include personally identifying information need
@@ -185,7 +180,7 @@
collaboratively blend the traffic from many organizations and private
citizens, so that an eavesdropper can't tell which users are which,
and who is looking for what information. By bringing more users onto
-the network, all users become more secure \cite{econymics}.
+the network, all users become more secure~\cite{econymics}.
Naturally, organizations will not want to depend on others for their
security. If most participating providers are reliable, Tor tolerates
@@ -196,12 +191,16 @@
don't have built-in encryption and authentication, such as unencrypted
HTTP or chat, and it requires no modification of those services to do so.
-weasel's graph of \# nodes and of bandwidth, ideally from week 0.
-
-Tor doesn't try to provide steg (but see Sec \ref{china}), or
-the other non-goals listed in tor-design.
+As of January 2005, the Tor network has grown to around a hundred servers
+on four continents, with a total capacity exceeding 1Gbit/s. Appendix A
+shows a graph of the number of working servers over time, as well as a
+graph of the number of bytes being handled by the network over time. At
+this point the network is sufficiently diverse for further development
+and testing; but of course we always encourage and welcome new servers
+to join the network.
-[arma will do this part]
+%Tor doesn't try to provide steg (but see Section~\ref{subsec:china}), or
+%the other non-goals listed in tor-design.
Tor is not the only anonymity system that aims to be practical and useful.
Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured
@@ -277,6 +276,7 @@
%Isn't it more accurate to say ``If the adversary _always_ controls the final
% dest, we would be just as well off with such as system.'' ? If not, why
% not? -nm
+% Sure. In fact, better off, since they seem to scale more easily. -rd
in practice tor's threat model is based entirely on the goal of dispersal
and diversity. george and steven describe an attack \cite{draft} that
@@ -312,22 +312,22 @@
such use---even legal use that improves national security---and managed
to dissuade them.
-With this image issue in mind, here we discuss the Tor user base and
+With this image issue in mind, this section discusses the Tor user base and
Tor's interaction with other services on the Internet.
-\subsection{Image and reputability}
+
+\subsection{Image and security}
Image: substantial non-infringing uses. Image is a security parameter,
since it impacts user base and perceived sustainability.
-grab reputability paragraphs from usability.tex [arma will do this]
+good uses are kept private, bad uses are publicized. not good.
-A Tor gui, how jap's gui is nice but does not reflect the security
-they provide.
Public perception, and thus advertising, is a security parameter.
-good uses are kept private, bad uses are publicized. not good.
-
users do not correlate to anonymity. arma will do this.
+Communicating security levels to the user
+A Tor gui, how jap's gui is nice but does not reflect the security
+they provide.
\subsection{Usability and bandwidth and sustainability and incentives}
@@ -346,6 +346,35 @@
[nick will write this section]
+\subsection{Reputability}
+
+Yet another factor in the safety of a given network is its reputability:
+the perception of its social value based on its current users. If I'm
+the only user of a system, it might be socially accepted, but I'm not
+getting any anonymity. Add a thousand Communists, and I'm anonymous,
+but everyone thinks I'm a Commie. Add a thousand random citizens (cancer
+survivors, privacy enthusiasts, and so on) and now I'm hard to profile.
+
+The more cancer survivors on Tor, the better for the human rights
+activists. The more script kiddies, the worse for the normal users. Thus,
+reputability is an anonymity issue for two reasons. First, it impacts
+the sustainability of the network: a network that's always about to be
+shut down has difficulty attracting and keeping users, so its anonymity
+set suffers. Second, a disreputable network attracts the attention of
+powerful attackers who may not mind revealing the identities of all the
+users to uncover a few bad ones.
+
+While people therefore have an incentive for the network to be used for
+``more reputable'' activities than their own, there are still tradeoffs
+involved when it comes to anonymity. To follow the above example, a
+network used entirely by cancer survivors might welcome some Communists
+onto the network, though of course they'd prefer a wider variety of users.
+
+The impact of public perception on security is especially important
+during the bootstrapping phase of the network, where the first few
+widely publicized uses of the network can dictate the types of users it
+attracts next.
+
\subsection{Tor and file-sharing}
[nick will write this section]
@@ -951,6 +980,7 @@
approaches we can make better design decisions in the future.
\subsection{The China problem}
+\label{subsec:china}
Citizens in a variety of countries, such as most recently China and
Iran, are periodically blocked from accessing various sites outside