[or-cvs] some minor cleanups before i move a bnuch of sections

Roger Dingledine arma at seul.org
Tue Feb 8 07:37:33 UTC 2005


Update of /home2/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc/design-paper

Modified Files:
	challenges.tex 
Log Message:
some minor cleanups before i move a bnuch of sections


Index: challenges.tex
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -d -r1.51 -r1.52
--- challenges.tex	8 Feb 2005 06:54:47 -0000	1.51
+++ challenges.tex	8 Feb 2005 07:37:30 -0000	1.52
@@ -423,8 +423,7 @@
 % this para should probably move to the scalability / directory system. -RD
 % Nope. Cut for space, except for small comment added above -PFS
 
-\section{Crossroads: Policy issues}
-\label{sec:crossroads-policy}
+\section{Policy issues}
 
 Many of the issues the Tor project needs to address extend beyond
 system design and technology development. In particular, the
@@ -802,8 +801,7 @@
 
 %[XXX Mention correct DNS-RBL implementation. -NM]
 
-\section{Crossroads: Design choices}
-\label{sec:crossroads-design}
+\section{Design choices}
 
 In addition to social issues, Tor also faces some design challenges that must
 be addressed as the network develops.
@@ -969,15 +967,15 @@
 \label{subsec:helper-nodes}
 
 It has been thought for some time that the best anonymity protection
-comes from running your own node~\cite{or-pet00,tor-design}.
-(In fact, in Onion Routing's first design, this was the only option
-possible~\cite{or-ih96}.)  While the first implementation
+comes from running your own node~\cite{tor-design,or-pet00}.
+(In fact, this was the only option in the earliest Onion Routing
+design~\cite{or-ih96}.)  While the first implementation
 had a fixed path length of five nodes, first generation
-Onion Routing design included random length routes chosen 
+Onion Routing design included random length routes chosen
 to simultaneously maximize efficiency and unpredictability in routes.
 If one followed Tor's three node default
 path length, an enclave-to-enclave communication (in which the entry and
-exit nodes were run by enclaves themselves) 
+exit nodes were run by enclaves themselves)
 would be completely compromised by the
 middle node. Thus for enclave-to-enclave communication, four is the fewest
 number of nodes that preserves the $\frac{c^2}{n^2}$ degree of protection
@@ -1188,8 +1186,7 @@
 %RIAA; less so if threat is to application data or individuals or...
 
 \section{Scaling}
-%\label{sec:crossroads-scaling}
-%P2P + anonymity issues:
+\label{sec:scaling}
 
 Tor is running today with hundreds of nodes and tens of thousands of
 users, but it will certainly not scale to millions.
@@ -1486,16 +1483,16 @@
 an unexpected boon from the fact that we're a general-purpose overlay
 network: as Tor grows more popular, other groups who need an overlay
 network on the Internet are starting to adapt Tor to their needs.
-
+%
 Second, Tor is only one of many components that preserve privacy online.
 To keep identifying information out of application traffic, we must build
 more and better protocol-aware proxies that are usable by ordinary people.
-
+%
 Third, we need to gain a reputation for social good, and learn how to
 coexist with the variety of Internet services and their established
 authentication mechanisms. We can't just keep escalating the blacklist
 standoff forever.
-
+%
 Fourth, as described in Section~\ref{sec:scaling}, the current Tor
 architecture does not scale even to handle current user demand. We must
 find designs and incentives to let clients relay traffic too, without



More information about the tor-commits mailing list