[tor-commits] r24676: {projects} Fix more minor issues (projects/articles/browser-privacy)
Robert Ransom
rransom.8774 at gmail.com
Tue Apr 26 15:05:12 UTC 2011
Author: rransom
Date: 2011-04-26 15:05:12 +0000 (Tue, 26 Apr 2011)
New Revision: 24676
Modified:
projects/articles/browser-privacy/W3CIdentity.tex
Log:
Fix more minor issues
Modified: projects/articles/browser-privacy/W3CIdentity.tex
===================================================================
--- projects/articles/browser-privacy/W3CIdentity.tex 2011-04-26 15:04:37 UTC (rev 24675)
+++ projects/articles/browser-privacy/W3CIdentity.tex 2011-04-26 15:05:12 UTC (rev 24676)
@@ -343,17 +343,20 @@
what is going on with respect to the user's relationship to the web.
However, all current private browsing modes fall short of protecting against a
-network adversary and fail to deal with linkability against a network
+network-level adversary and fail to deal with linkability against such an
adversary\cite{private-browsing}, claiming that it is outside their threat
model\footnotemark. If the user is given a new identity that is still linkable
to the previous one due to shortcomings of the browser, this approach has
failed as a privacy measure.
+% XXXX Define network-level adversary.
-\footnotetext{The primary reason given to abstain from addressing the network
-adversary is IP address linkability. However, we believe this to be a red
+\footnotetext{The primary reason given to abstain from addressing a
+network-level
+adversary is IP-address linkability. However, we believe this to be a red
herring. Users are quite capable of using alternate Internet connections, and
it is common practice for ISPs in many parts of the world to rotate user IP
-addresses daily, to discourage servers and to impede the spread of malware.
+addresses daily, to discourage users from operating servers and to impede the
+spread of malware.
This is especially true of cellular IP networks.}
Linkability solutions within the identity framework would be similar to the
More information about the tor-commits
mailing list