aboutsummaryrefslogtreecommitdiff
path: root/doc/design-paper/blocking.tex
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2006-10-12 19:40:52 +0000
committerRoger Dingledine <arma@torproject.org>2006-10-12 19:40:52 +0000
commitfac9e767e34d5c0e75e48ce37a2c5e717d327b2e (patch)
tree646c02e60acd091ce569c137b764d0054ec6110f /doc/design-paper/blocking.tex
parentc2a158f52c0509a0c42a49ab83b108b0f8eda635 (diff)
downloadtor-fac9e767e34d5c0e75e48ce37a2c5e717d327b2e.tar.gz
tor-fac9e767e34d5c0e75e48ce37a2c5e717d327b2e.zip
a few more tweaks and a new subsection
svn:r8694
Diffstat (limited to 'doc/design-paper/blocking.tex')
-rw-r--r--doc/design-paper/blocking.tex15
1 files changed, 11 insertions, 4 deletions
diff --git a/doc/design-paper/blocking.tex b/doc/design-paper/blocking.tex
index 5dab9888a5..1c2540f141 100644
--- a/doc/design-paper/blocking.tex
+++ b/doc/design-paper/blocking.tex
@@ -137,7 +137,7 @@ as high of a risk.)
We assume that our users have control over their hardware and
software -- they don't have any spyware installed, there are no
cameras watching their screen, etc. Unfortunately, in many situations
-these attackers are very real~\cite{zuckerman-threatmodels}; yet
+such attackers are very real~\cite{zuckerman-threatmodels}; yet
software-based security systems like ours are poorly equipped to handle
a user who is entirely observed and controlled by the adversary. See
Section~\ref{subsec:cafes-and-livecds} for more discussion of what little
@@ -158,7 +158,7 @@ Anonymizer and friends
Psiphon, circumventor, cgiproxy.
-Simpler to deploy; might not require client-side software.
+Simpler to deploy; can work without new client-side software.
\subsection{JAP}
@@ -285,8 +285,8 @@ bridge relay.
The following section describes ways to bootstrap knowledge of your first
bridge relay, and ways to maintain connectivity once you know a few
-bridge relays. (See Section~\ref{later} for a discussion of exactly
-what information is sufficient to characterize a bridge relay.)
+bridge relays. (See Section~\ref{subsec:first-bridge} for a discussion
+of exactly what information is sufficient to characterize a bridge relay.)
\section{Discovering and maintaining working bridge relays}
@@ -370,6 +370,13 @@ Is it useful to load balance which bridges are handed out? The above
bucket concept makes some bridges wildly popular and others less so.
But I guess that's the point.
+\subsection{Bootstrapping: finding your first bridge}
+\label{subsec:first-bridge}
+
+Some techniques are sufficient to get us an IP address and a port,
+and others can get us IP:port:key. Lay out some plausible options
+for how users can bootstrap into learning their first bridge.
+
\section{Security improvements}
\subsection{Hiding Tor's network signatures}