[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r22727: {projects} retroactively call blocking.pdf a tech report rather than a (projects/design-paper)



Author: arma
Date: 2010-07-30 14:44:09 +0000 (Fri, 30 Jul 2010)
New Revision: 22727

Modified:
   projects/design-paper/blocking.html
   projects/design-paper/blocking.pdf
   projects/design-paper/blocking.tex
Log:
retroactively call blocking.pdf a tech report rather than a draft


Modified: projects/design-paper/blocking.html
===================================================================
--- projects/design-paper/blocking.html	2010-07-29 22:36:53 UTC (rev 22726)
+++ projects/design-paper/blocking.html	2010-07-30 14:44:09 UTC (rev 22727)
@@ -16,7 +16,7 @@
 
 <title> Design of a blocking-resistant anonymity system\DRAFT</title>
 
-<h1 align="center">Design of a blocking-resistant anonymity system<br />DRAFT </h1>
+<h1 align="center">Design of a blocking-resistant anonymity system<br />Tor Project technical report, Nov 2006</h1>
 
 <div class="p"><!----></div>
 

Modified: projects/design-paper/blocking.pdf
===================================================================
(Binary files differ)

Modified: projects/design-paper/blocking.tex
===================================================================
--- projects/design-paper/blocking.tex	2010-07-29 22:36:53 UTC (rev 22726)
+++ projects/design-paper/blocking.tex	2010-07-30 14:44:09 UTC (rev 22727)
@@ -25,7 +25,7 @@
 %\newcommand{\workingnote}[1]{(**#1)}   % makes the note visible.
 
 \date{}
-\title{Design of a blocking-resistant anonymity system\\DRAFT}
+\title{Design of a blocking-resistant anonymity system\\Tor Project technical report, Nov 2006}
 
 %\author{Roger Dingledine\inst{1} \and Nick Mathewson\inst{1}}
 \author{Roger Dingledine \\ The Tor Project \\ arma@xxxxxxxxxxxxxx \and
@@ -46,8 +46,8 @@
 
 Here we describe a design that builds upon the current Tor network
 to provide an anonymizing network that resists blocking
-by government-level attackers. We have implemented and deployed this
-design, and talk briefly about early use.
+by government-level attackers. % We have implemented and deployed this
+%design, and talk briefly about early use.
 
 \end{abstract}
 
@@ -80,7 +80,7 @@
 and firewall rules. In fact, an informal user study
 %(described in Appendix~\ref{app:geoip})
 showed that a few hundred thousand users people access the Tor network
-each day, with about 20\% of them coming from China~\cite{something}.
+each day, with about 20\% of them coming from China. %~\cite{something}.
 
 The current Tor design is easy to block if the attacker controls Alice's
 connection to the Tor network---by blocking the directory authorities,
@@ -223,7 +223,7 @@
 
 We do not assume that government-level attackers are always uniform
 across the country. For example, users of different ISPs in China
-experience different censorship policies and mechanisms~\cite{china-ccs07}.
+experience different censorship policies and mechanisms. %~\cite{china-ccs07}.
 %there is no single centralized place in China
 %that coordinates its specific censorship decisions and steps.