[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] r8898: Ordinal numbers are already adverbs; enforce house style. (in tor/trunk: . doc/design-paper)
- To: or-cvs@xxxxxxxxxxxxx
- Subject: [or-cvs] r8898: Ordinal numbers are already adverbs; enforce house style. (in tor/trunk: . doc/design-paper)
- From: nickm@xxxxxxxx
- Date: Fri, 3 Nov 2006 13:08:42 -0500 (EST)
- Delivered-to: archiver@seul.org
- Delivered-to: or-cvs-outgoing@seul.org
- Delivered-to: or-cvs@seul.org
- Delivery-date: Fri, 03 Nov 2006 13:08:50 -0500
- Reply-to: or-talk@xxxxxxxxxxxxx
- Sender: owner-or-cvs@xxxxxxxxxxxxx
Author: nickm
Date: 2006-11-03 13:08:41 -0500 (Fri, 03 Nov 2006)
New Revision: 8898
Modified:
tor/trunk/
tor/trunk/doc/design-paper/blocking.tex
Log:
r9470@Kushana: nickm | 2006-11-02 16:57:32 -0500
Ordinal numbers are already adverbs; enforce house style.
Property changes on: tor/trunk
___________________________________________________________________
svk:merge ticket from /tor/trunk [r9470] on c95137ef-5f19-0410-b913-86e773d04f59
Modified: tor/trunk/doc/design-paper/blocking.tex
===================================================================
--- tor/trunk/doc/design-paper/blocking.tex 2006-11-03 14:34:10 UTC (rev 8897)
+++ tor/trunk/doc/design-paper/blocking.tex 2006-11-03 18:08:41 UTC (rev 8898)
@@ -408,15 +408,15 @@
of HTTP, HTTPS, and SOCKS proxies. Many small companies have sprung up
providing more refined lists to paying customers.
-There are some downsides to using these oen proxies though. Firstly,
+There are some downsides to using these open proxies though. First,
the proxies are of widely varying quality in terms of bandwidth and
-stability, and many of them are entirely unreachable. Secondly, unlike
+stability, and many of them are entirely unreachable. Second, unlike
networks of volunteers like Tor, the legality of routing traffic through
these proxies is questionable: it's widely believed that most of them
don't realize what they're offering, and probably wouldn't allow it if
-they realized. Thirdly, in many cases the connection to the proxy is
+they realized. Third, in many cases the connection to the proxy is
unencrypted, so firewalls that filter based on keywords in IP packets
-will not be hindered. And lastly, many users are suspicious that some
+will not be hindered. And last, many users are suspicious that some
open proxies are a little \emph{too} convenient: are they run by the
adversary, in which case they get to monitor all the user's requests
just as single-hop proxies can?
@@ -452,7 +452,7 @@
\subsection{Tor itself}
-And lastly, we include Tor itself in the list of current solutions
+And last, we include Tor itself in the list of current solutions
to firewalls. Tens of thousands of people use Tor from countries that
routinely filter their Internet. Tor's website has been blocked in most
of them. But why hasn't the Tor network been blocked yet?
@@ -676,7 +676,7 @@
But in a blocking-resistance environment, clients should not present
certificates at all.
-Lastly, what if the adversary starts observing the network traffic even
+Last, what if the adversary starts observing the network traffic even
more closely? Even if our TLS handshake looks innocent, our traffic timing
and volume still look different than a user making a secure web connection
to his bank. The same techniques used in the growing trend to build tools
@@ -869,9 +869,9 @@
proxies, but the users also need to get to a single site that is sure
to be blocked.
-There are two reasons why we're in better shape. Firstly, the users don't
+There are two reasons why we're in better shape. First, the users don't
actually need to reach the watering hole directly: it can respond to
-email, for example. Secondly,
+email, for example. Second,
In fact, the JAP
project~\cite{web-mix,koepsell:wpes2004} suggested an alternative approach
@@ -1089,17 +1089,17 @@
let users verify that they're actually talking to the right servers.
There are four pieces to this trust chain.
-Firstly, when Tor clients are establishing circuits, at each step
+First, when Tor clients are establishing circuits, at each step
they demand that the next Tor server in the path prove knowledge of
its private key~\cite{tor-design}. This step prevents the first node
-in the path from just spoofing the rest of the path. Secondly, the
+in the path from just spoofing the rest of the path. Second, the
Tor directory authorities provide a signed list of servers along with
their public keys---so unless the adversary can control a threshold
of directory authorities, he can't trick the Tor client into using other
-Tor servers. Thirdly, the location and keys of the directory authorities,
+Tor servers. Third, the location and keys of the directory authorities,
in turn, is hard-coded in the Tor source code---so as long as the user
got a genuine version of Tor, he can know that he is using the genuine
-Tor network. And lastly, the source code and other packages are signed
+Tor network. And last, the source code and other packages are signed
with the GPG keys of the Tor developers, so users can confirm that they
did in fact download a genuine version of Tor.
@@ -1204,8 +1204,8 @@
Bridge users without Tor clients
Bridge relays could always open their socks proxy. This is bad though,
-firstly
-because bridges learn the bridge users' destinations, and secondly because
+first
+because bridges learn the bridge users' destinations, and second because
we've learned that open socks proxies tend to attract abusive users who
have no idea they're using Tor.