summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2004-01-27 17:26:29 +0000
committerRoger Dingledine <arma@torproject.org>2004-01-27 17:26:29 +0000
commit2c6fac7f7d1ce94869eea8cc425db7206794429c (patch)
treede5ae59a28629d1dd1033f3b193e3d93f4de8d21
parentdeda0d93dd2b4935b4feca9b25b492c34b58b5fb (diff)
downloadtor-2c6fac7f7d1ce94869eea8cc425db7206794429c.tar.gz
tor-2c6fac7f7d1ce94869eea8cc425db7206794429c.zip
a few more notes
svn:r1013
-rw-r--r--doc/tor-design.tex8
1 files changed, 5 insertions, 3 deletions
diff --git a/doc/tor-design.tex b/doc/tor-design.tex
index e5a35b6cee..879b5be9fd 100644
--- a/doc/tor-design.tex
+++ b/doc/tor-design.tex
@@ -1,3 +1,5 @@
+% XXX Cite SS03
+
\documentclass[times,10pt,twocolumn]{article}
\usepackage{latex8}
\usepackage{times}
@@ -5,7 +7,7 @@
\usepackage{graphics}
\usepackage{amsmath}
-%\pagestyle{empty}
+\pagestyle{plain}
\renewcommand\url{\begingroup \def\UrlLeft{<}\def\UrlRight{>}\urlstyle{tt}\Url}
\newcommand\emailaddr{\begingroup \def\UrlLeft{<}\def\UrlRight{>}\urlstyle{tt}\Url}
@@ -1341,7 +1343,7 @@ the key and starts the rendezvous as described above.
\subsection{Previous rendezvous work}
Rendezvous points in low-latency anonymity systems were first
-described for use in ISDN telephony \cite{isdn-mixes,jerichow-jsac98}.
+described for use in ISDN telephony \cite{jerichow-jsac98,isdn-mixes}.
Later low-latency designs used rendezvous points for hiding location
of mobile phones and low-power location trackers
\cite{federrath-ih96,reed-protocols97}. Rendezvous for low-latency
@@ -1357,7 +1359,7 @@ via Diffie-Hellman, so plaintext is not exposed even at the rendezvous point. Th
our design tries to minimize the exposure associated with running the
service, to encourage volunteers to offer introduction and rendezvous
point services. Tor's introduction points do not output any bytes to the
-clients, and the rendezvous points don't know the client or the server,
+clients; the rendezvous points don't know the client or the server,
and can't read the data being transmitted. The indirection scheme is
also designed to include authentication/authorization---if Alice doesn't
include the right cookie with her request for service, Bob need not even