[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] s/web server/webserver/
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/tmp/cvs-serv18333
Modified Files:
tor-design.tex
Log Message:
s/web server/webserver/
Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -d -r1.114 -r1.115
--- tor-design.tex 5 Nov 2003 04:23:02 -0000 1.114
+++ tor-design.tex 5 Nov 2003 04:30:35 -0000 1.115
@@ -1012,7 +1012,7 @@
presents would-be vandals and abusers with an opportunity to hide
the origins of their activities. Attackers can harm the Tor network by
implicating exit servers for their abuse. Also, applications that commonly
-use IP-based authentication (such as institutional mail or web servers)
+use IP-based authentication (such as institutional mail or webservers)
can be fooled by the fact that anonymous connections appear to originate
at the exit OR.
@@ -1482,7 +1482,7 @@
the German government successfully ordered them to add a backdoor to
all of their nodes \cite{jap-backdoor}.
-\emph{Run a recipient.} By running a Web server, an adversary
+\emph{Run a recipient.} By running a webserver, an adversary
trivially learns the timing patterns of users connecting to it, and
can introduce arbitrary patterns in its responses. This can greatly
facilitate end-to-end attacks: If the adversary can induce