[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r9874: point to Stephen Rollyson's paper on trading off anonymity f (website/trunk/en)
- To: or-cvs@xxxxxxxxxxxxx
- Subject: [or-cvs] r9874: point to Stephen Rollyson's paper on trading off anonymity f (website/trunk/en)
- From: arma@xxxxxxxx
- Date: Mon, 19 Mar 2007 05:47:00 -0400 (EDT)
- Delivered-to: archiver@seul.org
- Delivered-to: or-cvs-outgoing@seul.org
- Delivered-to: or-cvs@seul.org
- Delivery-date: Mon, 19 Mar 2007 05:47:28 -0400
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-cvs@xxxxxxxxxxxxx
Author: arma
Date: 2007-03-19 05:46:59 -0400 (Mon, 19 Mar 2007)
New Revision: 9874
Modified:
website/trunk/en/volunteer.wml
Log:
point to Stephen Rollyson's paper on trading off anonymity for
speed in path choice. this is good stuff that needs more work.
Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml 2007-03-19 09:13:01 UTC (rev 9873)
+++ website/trunk/en/volunteer.wml 2007-03-19 09:46:59 UTC (rev 9874)
@@ -263,6 +263,13 @@
exit, Bob quad will be dangerous, we need to download an entire Internet
routing zone and perform expensive operations on it. Are there practical
approximations, such as avoiding IP addresses in the same /8 network?</li>
+<li>Other research questions regarding geographic diversity consider
+the tradeoff between choosing an efficient circuit and choosing a random
+circuit. Look at at Stephen Rollyson's <a
+href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">position
+paper</a> on how to discard particularly slow choices without hurting
+anonymity "too" much. This line of reasoning needs more work and more
+thinking, but it seems very promising.</li>
<li>Tor doesn't work very well when servers have asymmetric bandwidth
(e.g. cable or DSL). Because Tor has separate TCP connections between
each hop, if the incoming bytes are arriving just fine and the outgoing
@@ -285,13 +292,15 @@
<li>To let dissidents in remote countries use Tor without being blocked
at their country's firewall, we need a way to get tens of thousands of
relays, not just a few hundred. We can imagine a Tor client GUI that
-has a "help China" button at the top that opens a port and relays a
+has a "Tor for Freedom" button at the top that opens a port and relays a
few KB/s of traffic into the Tor network. (A few KB/s shouldn't be too
much hassle, and there are few abuse issues since they're not being exit
nodes.) But how do we distribute a list of these volunteer clients to the
good dissidents in an automated way that doesn't let the country-level
firewalls intercept and enumerate them? Probably needs to work on a
-human-trust level. See our <a
+human-trust level. See our <a href="<page documentation>#DesignDoc">early
+blocking-resistance design document</a> and our
+<a
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#China">FAQ
entry</a> on this, and then read the <a
href="http://freehaven.net/anonbib/topic.html#Communications_20Censorship">censorship