[or-cvs] r8694: a few more tweaks and a new subsection (tor/trunk/doc/design-paper)

arma at seul.org arma at seul.org
Thu Oct 12 19:40:53 UTC 2006


Author: arma
Date: 2006-10-12 15:40:52 -0400 (Thu, 12 Oct 2006)
New Revision: 8694

Modified:
   tor/trunk/doc/design-paper/blocking.tex
Log:
a few more tweaks and a new subsection


Modified: tor/trunk/doc/design-paper/blocking.tex
===================================================================
--- tor/trunk/doc/design-paper/blocking.tex	2006-10-12 09:40:36 UTC (rev 8693)
+++ tor/trunk/doc/design-paper/blocking.tex	2006-10-12 19:40:52 UTC (rev 8694)
@@ -137,7 +137,7 @@
 We assume that our users have control over their hardware and
 software -- they don't have any spyware installed, there are no
 cameras watching their screen, etc. Unfortunately, in many situations
-these attackers are very real~\cite{zuckerman-threatmodels}; yet
+such attackers are very real~\cite{zuckerman-threatmodels}; yet
 software-based security systems like ours are poorly equipped to handle
 a user who is entirely observed and controlled by the adversary. See
 Section~\ref{subsec:cafes-and-livecds} for more discussion of what little
@@ -158,7 +158,7 @@
 
 Psiphon, circumventor, cgiproxy.
 
-Simpler to deploy; might not require client-side software.
+Simpler to deploy; can work without new client-side software.
 
 \subsection{JAP}
 
@@ -285,8 +285,8 @@
 
 The following section describes ways to bootstrap knowledge of your first
 bridge relay, and ways to maintain connectivity once you know a few
-bridge relays. (See Section~\ref{later} for a discussion of exactly
-what information is sufficient to characterize a bridge relay.)
+bridge relays. (See Section~\ref{subsec:first-bridge} for a discussion
+of exactly what information is sufficient to characterize a bridge relay.)
 
 \section{Discovering and maintaining working bridge relays}
 
@@ -370,6 +370,13 @@
 bucket concept makes some bridges wildly popular and others less so.
 But I guess that's the point.
 
+\subsection{Bootstrapping: finding your first bridge}
+\label{subsec:first-bridge}
+
+Some techniques are sufficient to get us an IP address and a port,
+and others can get us IP:port:key. Lay out some plausible options
+for how users can bootstrap into learning their first bridge.
+
 \section{Security improvements}
 
 \subsection{Hiding Tor's network signatures}



More information about the tor-commits mailing list