summaryrefslogtreecommitdiff
path: root/doc/design-paper/blocking.tex
diff options
context:
space:
mode:
authorRoger Dingledine <arma@torproject.org>2007-05-13 09:25:06 +0000
committerRoger Dingledine <arma@torproject.org>2007-05-13 09:25:06 +0000
commit440b7f0c70d22f45031d6b21c1bf9a4539af1455 (patch)
tree3b4bf8252674cf9d59090a68286addf0962f83e6 /doc/design-paper/blocking.tex
parent028f4783f4365c8c0364589f03640ab1b7df6058 (diff)
downloadtor-440b7f0c70d22f45031d6b21c1bf9a4539af1455.tar.gz
tor-440b7f0c70d22f45031d6b21c1bf9a4539af1455.zip
polish r9726-r9903
svn:r10182
Diffstat (limited to 'doc/design-paper/blocking.tex')
-rw-r--r--doc/design-paper/blocking.tex10
1 files changed, 5 insertions, 5 deletions
diff --git a/doc/design-paper/blocking.tex b/doc/design-paper/blocking.tex
index eb8cfc653a..835d090522 100644
--- a/doc/design-paper/blocking.tex
+++ b/doc/design-paper/blocking.tex
@@ -131,7 +131,7 @@ whistleblowers in firewalled corporate networks; and for people in
unanticipated oppressive situations. In fact, by designing with
a variety of adversaries in mind, we can take advantage of the fact that
adversaries will be in different stages of the arms race at each location,
-so a server blocked in one locale can still be useful in others.
+so an address blocked in one locale can still be useful in others.
We assume that the attackers' goals are somewhat complex.
\begin{tightlist}
@@ -149,9 +149,9 @@ We assume that the attackers' goals are somewhat complex.
\item Complete blocking (where nobody at all can ever download censored
content) is not a
goal. Attackers typically recognize that perfect censorship is not only
- impossible, but unnecessary: if ``undesirable'' information is known only
+ impossible, it is unnecessary: if ``undesirable'' information is known only
to a small few, further censoring efforts can be focused elsewhere.
-\item Similarly, the censors are not attempting to shut down or block {\it
+\item Similarly, the censors do not attempt to shut down or block {\it
every} anti-censorship tool---merely the tools that are popular and
effective (because these tools impede the censors' information restriction
goals) and those tools that are highly visible (thus making the censors
@@ -1667,8 +1667,8 @@ Many people working on this field want to publicize the existence
and extent of censorship concurrently with the deployment of their
circumvention software. The easy reason for this two-pronged push is
to attract volunteers for running proxies in their systems; but in many
-cases their main goal is not to focus on actually allowing individuals
-to circumvent the firewall, but rather to educate the world about the
+cases their main goal is not to focus on getting more users signed up,
+but rather to educate the rest of the world about the
censorship. The media also tries to do its part by broadcasting the
existence of each new circumvention system.