[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r21781: {projects} some touchups based on initial feedback. more overhauling ne (projects/articles)
Author: arma
Date: 2010-03-02 05:47:59 +0000 (Tue, 02 Mar 2010)
New Revision: 21781
Modified:
projects/articles/circumvention-features.html
projects/articles/circumvention-features.tex
projects/articles/circumvention-features.txt
Log:
some touchups based on initial feedback. more overhauling needed?
Modified: projects/articles/circumvention-features.html
===================================================================
--- projects/articles/circumvention-features.html 2010-03-02 01:06:53 UTC (rev 21780)
+++ projects/articles/circumvention-features.html 2010-03-02 05:47:59 UTC (rev 21781)
@@ -14,6 +14,8 @@
This article lays out ten features you should consider when evaluating
a circumvention tool. The goal isn't to advocate for any specific tool,
but to point out what kind of tools are useful for different situations.
+I've chosen the order of features based on ease of presentation; so you
+shouldn't conclude the first feature is the most critical.
</p>
<p>
@@ -51,7 +53,7 @@
<h3>1. Diverse set of users</h3>
<p>
-One of the first questions you should ask when looking at a circumvention
+One of the simplest questions you can ask when looking at a circumvention
tool is who else uses it. A wide variety of users means that if somebody
finds out you are using the software, they can't conclude much about
why you're using it. A privacy tool like Tor has many different classes
@@ -181,7 +183,7 @@
to anybody. Historically, any crypto design that has a lot of secret
parts has turned out to be less safe than its designers thought.
Similarly, in the case of secret designs for circumvention tools,
-the only groups examining the tool are its original developers and the
+the only groups examining the tool are its original developers and its
attackers; other developers and users who could help to make it better
and more sustainable are left out.
</p>
@@ -357,7 +359,7 @@
<p>
The flip side of the performance question is flexibility. Many systems
ensure good speed by limiting what their users can do. While Psiphon
-prevents you from reaching sites that they haven't manually vetted yet,
+prevents you from reaching sites that they haven't manually vetted,
Ultrareach and Freegate actually actively censor which destination
websites you're allowed to reach so they can keep their bandwidth costs
down. Tor, by contrast, lets you access any protocol and destination,
@@ -384,7 +386,7 @@
<p>
Then you need to consider the tradeoffs that come with each approach.
-First, which operating systems are supported? Psiphon wins here too
+First, which operating systems are supported? Psiphon does well here too
by not requiring any extra client software. Ultrareach and Freegate
are so specialized that they only work on Windows, whereas Tor and its
accompanying software can run pretty much everywhere. Next,
Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex 2010-03-02 01:06:53 UTC (rev 21780)
+++ projects/articles/circumvention-features.tex 2010-03-02 05:47:59 UTC (rev 21781)
@@ -33,6 +33,8 @@
This article lays out ten features you should consider when evaluating
a circumvention tool. The goal isn't to advocate for any specific tool,
but to point out what kind of tools are useful for different situations.
+I've chosen the order of features based on ease of presentation; so you
+shouldn't conclude the first feature is the most critical.
One caveat to start out: I'm an inventor and developer of a tool called
Tor that is used both for privacy and for circumvention. While my bias
@@ -58,7 +60,7 @@
\section{Diverse set of users}
-One of the first questions you should ask when looking at a circumvention
+One of the simplest questions you can ask when looking at a circumvention
tool is who else uses it. A wide variety of users means that if somebody
finds out you are using the software, they can't conclude much about
why you're using it. A privacy tool like Tor has many different classes
@@ -163,7 +165,7 @@
anybody. Historically, any crypto design that has a lot of secret parts
has turned out to be less safe than its designers thought. Similarly,
in the case of secret designs for circumvention tools, the only groups
-examining the tool are its original developers and the attackers;
+examining the tool are its original developers and its attackers;
other developers and users who could help to make it better and more
sustainable are left out.
@@ -306,7 +308,7 @@
The flip side of the performance question is flexibility. Many systems
ensure good speed by limiting what their users can do. While Psiphon
-prevents you from reaching sites that they haven't manually vetted yet,
+prevents you from reaching sites that they haven't manually vetted,
Ultrareach and Freegate actually actively censor which destination
websites you're allowed to reach so they can keep their bandwidth costs
down. Tor, by contrast, lets you access any protocol and destination,
@@ -329,7 +331,7 @@
or using our email autoresponder that lets you download Tor via Gmail.
Then you need to consider the tradeoffs that come with each
-approach. First, which operating systems are supported? Psiphon wins here
+approach. First, which operating systems are supported? Psiphon does well here
too by not requiring any extra client software. Ultrareach and Freegate
are so specialized that they only work on Windows, whereas Tor and its
accompanying software can run pretty much everywhere. Next, consider
Modified: projects/articles/circumvention-features.txt
===================================================================
--- projects/articles/circumvention-features.txt 2010-03-02 01:06:53 UTC (rev 21780)
+++ projects/articles/circumvention-features.txt 2010-03-02 05:47:59 UTC (rev 21781)
@@ -11,6 +11,8 @@
This article lays out ten features you should consider when evaluating
a circumvention tool. The goal isn't to advocate for any specific tool,
but to point out what kind of tools are useful for different situations.
+I've chosen the order of features based on ease of presentation; so you
+shouldn't conclude the first feature is the most critical.
One caveat to start out: I'm an inventor and developer of a tool
called Tor (torproject.org) that is used both for privacy and for
@@ -39,7 +41,7 @@
1. Diverse set of users
-One of the first questions you should ask when looking at a circumvention
+One of the simplest questions you can ask when looking at a circumvention
tool is who else uses it. A wide variety of users means that if somebody
finds out you are using the software, they can't conclude much about
why you're using it. A privacy tool like Tor has many different classes
@@ -147,7 +149,7 @@
to anybody. Historically, any crypto design that has a lot of secret
parts has turned out to be less safe than its designers thought.
Similarly, in the case of secret designs for circumvention tools,
-the only groups examining the tool are its original developers and the
+the only groups examining the tool are its original developers and its
attackers; other developers and users who could help to make it better
and more sustainable are left out.
@@ -292,7 +294,7 @@
The flip side of the performance question is flexibility. Many systems
ensure good speed by limiting what their users can do. While Psiphon
-prevents you from reaching sites that they haven't manually vetted yet,
+prevents you from reaching sites that they haven't manually vetted,
Ultrareach and Freegate actually actively censor which destination
websites you're allowed to reach so they can keep their bandwidth costs
down. Tor, by contrast, lets you access any protocol and destination,
@@ -315,7 +317,7 @@
or using our email autoresponder that lets you download Tor via Gmail.
Then you need to consider the tradeoffs that come with each approach.
-First, which operating systems are supported? Psiphon wins here too
+First, which operating systems are supported? Psiphon does well here too
by not requiring any extra client software. Ultrareach and Freegate
are so specialized that they only work on Windows, whereas Tor and its
accompanying software can run pretty much everywhere. Next,