[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r22727: {projects} retroactively call blocking.pdf a tech report rather than a (projects/design-paper)
Author: arma
Date: 2010-07-30 14:44:09 +0000 (Fri, 30 Jul 2010)
New Revision: 22727
Modified:
projects/design-paper/blocking.html
projects/design-paper/blocking.pdf
projects/design-paper/blocking.tex
Log:
retroactively call blocking.pdf a tech report rather than a draft
Modified: projects/design-paper/blocking.html
===================================================================
--- projects/design-paper/blocking.html 2010-07-29 22:36:53 UTC (rev 22726)
+++ projects/design-paper/blocking.html 2010-07-30 14:44:09 UTC (rev 22727)
@@ -16,7 +16,7 @@
<title> Design of a blocking-resistant anonymity system\DRAFT</title>
-<h1 align="center">Design of a blocking-resistant anonymity system<br />DRAFT </h1>
+<h1 align="center">Design of a blocking-resistant anonymity system<br />Tor Project technical report, Nov 2006</h1>
<div class="p"><!----></div>
Modified: projects/design-paper/blocking.pdf
===================================================================
(Binary files differ)
Modified: projects/design-paper/blocking.tex
===================================================================
--- projects/design-paper/blocking.tex 2010-07-29 22:36:53 UTC (rev 22726)
+++ projects/design-paper/blocking.tex 2010-07-30 14:44:09 UTC (rev 22727)
@@ -25,7 +25,7 @@
%\newcommand{\workingnote}[1]{(**#1)} % makes the note visible.
\date{}
-\title{Design of a blocking-resistant anonymity system\\DRAFT}
+\title{Design of a blocking-resistant anonymity system\\Tor Project technical report, Nov 2006}
%\author{Roger Dingledine\inst{1} \and Nick Mathewson\inst{1}}
\author{Roger Dingledine \\ The Tor Project \\ arma@xxxxxxxxxxxxxx \and
@@ -46,8 +46,8 @@
Here we describe a design that builds upon the current Tor network
to provide an anonymizing network that resists blocking
-by government-level attackers. We have implemented and deployed this
-design, and talk briefly about early use.
+by government-level attackers. % We have implemented and deployed this
+%design, and talk briefly about early use.
\end{abstract}
@@ -80,7 +80,7 @@
and firewall rules. In fact, an informal user study
%(described in Appendix~\ref{app:geoip})
showed that a few hundred thousand users people access the Tor network
-each day, with about 20\% of them coming from China~\cite{something}.
+each day, with about 20\% of them coming from China. %~\cite{something}.
The current Tor design is easy to block if the attacker controls Alice's
connection to the Tor network---by blocking the directory authorities,
@@ -223,7 +223,7 @@
We do not assume that government-level attackers are always uniform
across the country. For example, users of different ISPs in China
-experience different censorship policies and mechanisms~\cite{china-ccs07}.
+experience different censorship policies and mechanisms. %~\cite{china-ccs07}.
%there is no single centralized place in China
%that coordinates its specific censorship decisions and steps.