[or-cvs] r23187: {projects} put my italics back in also lose the OPC fannery (projects/articles)
Roger Dingledine
arma at torproject.org
Tue Sep 14 18:05:40 UTC 2010
Author: arma
Date: 2010-09-14 18:05:39 +0000 (Tue, 14 Sep 2010)
New Revision: 23187
Modified:
projects/articles/circumvention-features.pdf
projects/articles/circumvention-features.tex
Log:
put my italics back in
also lose the OPC fannery
Modified: projects/articles/circumvention-features.pdf
===================================================================
(Binary files differ)
Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex 2010-09-14 17:57:33 UTC (rev 23186)
+++ projects/articles/circumvention-features.tex 2010-09-14 18:05:39 UTC (rev 23187)
@@ -41,7 +41,8 @@
shouldn't conclude the first feature is the most critical.
Internet-based circumvention software consists of two components: a
-relaying component and a discovery component. The relaying component is
+\emph{relaying} component and a \emph{discovery} component. The relaying
+component is
what establishes a connection to some server or proxy, handles encryption,
and sends traffic back and forth. The discovery component is the step
before that -- the process of finding one or more reachable addresses.
@@ -157,7 +158,7 @@
privacy? What kind and against what attackers? In what way does it
use encryption? Do they intend for it to stand up to attacks from
censors? What kind of attacks do they expect to resist and why will
-their tool resist them? Without seeing the source code and knowing what
+their tool resist them? Without seeing the source code \emph{and} knowing what
the developers meant for it to do, it's harder to decide whether there
are security problems in the tool, or to evaluate whether it will reach
its goals.
@@ -189,12 +190,12 @@
different locations, so there is no single location or entity that gets
to watch what websites each user is accessing.
-Another way to look at this division is based on whether the trust is
+Another way to look at this division is based on whether the \emph{trust} is
centralized or decentralized. If you have to put all your trust in one
entity, then the best you can hope for is ``privacy by policy'' -- meaning
they have all your data and they promise not to look at it, lose it, or
-sell it. The alternative is what the Ontario Privacy Commissioner calls
-``privacy by design'' -- meaning the design of the system itself ensures
+sell it. The alternative is ``privacy by design'' or ``privacy by
+architecture'' -- meaning the design of the system itself ensures
that users get their privacy. The openness of the design in turn lets
everybody evaluate the level of privacy provided.
@@ -207,7 +208,7 @@
I've left out the names of the tools here because the point is not that
some tool providers may have shared user data; the point is that any
-tool with a centralized trust architecture could share user data, and its
+tool with a centralized trust architecture \emph{could} share user data, and its
users have no way to tell whether it's happening. Worse, even if the tool
provider means well, the fact that all the data flows through one location
creates an attractive target for other attackers to come snooping.
@@ -371,7 +372,7 @@
and 2) the ones that make a lot of noise. In many cases censorship is
less about blocking all sensitive content and more about creating an
atmosphere of repression so people end up self-censoring. Articles in
-the press threaten the censors' appearance of control, so they are forced
+the press threaten the censors' \emph{appearance} of control, so they are forced
to respond.
The lesson here is that we can control the pace of the arms
@@ -396,7 +397,7 @@
tackle every strategy at once.
Last, we should keep in mind that technology won't solve the whole
-problem. After all, firewalls are socially very successful in these
+problem. After all, firewalls are \emph{socially} very successful in these
countries. As long as many people in censored countries are saying ``I'm so
glad my government keeps me safe on the Internet,'' the social challenges
are at least as important. But at the same time, there are people in
More information about the tor-commits
mailing list