[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Jul 15 20:20:04 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/28 ===
===========================================================================
version 29
Author: karsten
Date: 2014-07-15T19:38:00+00:00
Make some minor tweaks.
--- version 28
+++ version 29
@@ -17,7 +17,7 @@
Roundup of research on incentives for running Tor relays
---------------------------------------------------------
-As an hors-d’œuvre to the now on-going the Privacy Enhancing Technoloy
+As an hors-d’œuvre to the now on-going the Privacy Enhancing Technology
Symposium [1], Rob Jansen wrote a long blog post covering the
last five years of research on incentives for running Tor relays [2].
@@ -25,11 +25,11 @@
model” and mentions that “has succeeded so far: Tor now consists of over
5000 relays transferring between 4 and 5 GiB/s in aggregate”. Rob lists
several possible reasons why volunteers run relays right now. They are
-all intrisic motivations: current operators run relays because they
+all intrinsic motivations: current operators run relays because they
really want to.
Is only relying on volunteers going to limit the growth of the Tor
-network in the future? They are already not-for-profit
+network in the future? There are already not-for-profit
organizations [3] operating relays based on donations, but growing
them too much would also be problematic. Another area being explored
are extrinsic motivations: making Tor clients faster when someone runs a
@@ -39,7 +39,7 @@
interact with the current set of volunteers.
The problem keeps interesting researchers, and Rob details no less
-than six schemes: the oldest are PAR [5] and Gold Star [6] and which
+than six schemes: the oldest are PAR [5] and Gold Star [6] which
introduced anonymity problems, BRAIDS [7] where double spending of
rewards is prevented without leaking timing information, LIRA [8]
which focused on scalability, TEARS [9] where a publicly auditable
@@ -82,18 +82,18 @@
“keeping our middle nodes more static”. The idea is to slow down the
attacks based on repeated circuit destruction by reusing the
same “middle nodes for 3-4 days instead of choosing new ones for every
-circuit”. Introducing this new behaviour will slow down the attack,
+circuit”. Introducing this new behavior will slow down the attack,
but George asks “are there any serious negative implications?”
The idea is not new, as Paul Syverson pointed out [14]: “Lasse and I
suggested and explored the idea of layered guards when we introduced
guards”. He adds “there are lots of possibilities here”.
-George worries than middle nodes would then “always see your traffic
+George worries that middle nodes would then “always see your traffic
coming through your guard (assuming a single guard per client)”. Ian
Goldberg added [15] “the exit will now know that circuits coming from
the same middle are more likely to be the same client”. Restricting the
-change to only hidden services and not every clients mean that it will
+change to only hidden services and not every client means that it will
be “easy for an entry guard to learn whether a client has static middle
nodes or not”.
@@ -125,8 +125,8 @@
------------------
The various roadmaps that came out of the 2014 summer dev. meeting [21]
-has been transcribed [22] in a joint effort by George Kadianakis,
-Yawning Angel, Karsten Loesing and an anonymous person. Most items
+have been transcribed [22] in a joint effort by George Kadianakis,
+Yawning Angel, Karsten Loesing, and an anonymous person. Most items
will probably be matched with a ticket soon.
[21]: https://trac.torproject.org/projects/tor/wiki/org/meetings/2014SummerDevMeeting
@@ -201,7 +201,7 @@
Users often ask about for assistance setting up Tor Cloud instances.
Sina Rabbani is taking over the maintenance of Tor Cloud and is working
on updating the packages and documentation. Until new documentation
-on using the up-to-date images and Amazon Web Services interface lands,
+on using the up-to-date images and Amazon Web Services interface lands,
users not already familiar with AWS may want to use a different virtual
server provider to host their bridges.
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list