| 
														
															@@ -94,12 +94,14 @@ N     - Additional TLS-camouflage work (spoofing FF cipher suite, etc.) 
														 | 
													
												
											
												
													
														| 
														 | 
														
															         - investigate the feasibility of handing connections off to a 
														 | 
														
														 | 
														
															         - investigate the feasibility of handing connections off to a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															           local apache if they don't look like Tor or if they don't 
														 | 
														
														 | 
														
															           local apache if they don't look like Tor or if they don't 
														 | 
													
												
											
												
													
														| 
														 | 
														
															           portknock or whatever. 
														 | 
														
														 | 
														
															           portknock or whatever. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-W     - Get closer to downloading far fewer descriptors 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-        - Instrument the code to track how many descriptors we download vs how 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-          many times we extend a circuit. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-        - Write a proposal for how to fetch far fewer descriptors; assess 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-          anonymity attacks, like from looking at the size of the 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-          descriptor you fetch. 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      - Get closer to downloading far fewer descriptors 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+W       - Instrument the code to track how many descriptors we download vs how 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+          many times we extend a circuit. Guess a few other things to 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+          instrument, like cache activity, and do those too. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+W       - Start a proposal for how to fetch far fewer descriptors; 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+          identify and start assessing anonymity attacks, like from looking 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+          at the size of the descriptor you fetch. See xxx-grand-plan.txt 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+          for some early thoughts. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 I     - Translation portal 
														 | 
														
														 | 
														
															 I     - Translation portal 
														 | 
													
												
											
												
													
														| 
														 | 
														
															         - Vidalia installer translations 
														 | 
														
														 | 
														
															         - Vidalia installer translations 
														 | 
													
												
											
												
													
														| 
														 | 
														
															           - Find/make a script to convert NSI strings into PO files 
														 | 
														
														 | 
														
															           - Find/make a script to convert NSI strings into PO files 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -118,6 +120,13 @@ KS  - Investigate where the slowdown occurs for making hidden service 
														 | 
													
												
											
												
													
														| 
														 | 
														
															       areas that can be improved, and make some guesses about which we 
														 | 
														
														 | 
														
															       areas that can be improved, and make some guesses about which we 
														 | 
													
												
											
												
													
														| 
														 | 
														
															       should focus on. 
														 | 
														
														 | 
														
															       should focus on. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  - mid July 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+W   - Take the results from instrumenting directory downloads on Tor 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      clients, and analyze/simulate some alternate approaches. Finish 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      proposal for how to improve things, iterate based on feedback, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      convince us that the anonymity tradeoffs and/or scalability 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      tradeoffs are acceptable. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+ 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   - mid August 
														 | 
														
														 | 
														
															   - mid August 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 KS  - Design hidden service improvements, evaluate them and consider 
														 | 
														
														 | 
														
															 KS  - Design hidden service improvements, evaluate them and consider 
														 | 
													
												
											
												
													
														| 
														 | 
														
															       security properties: write some proposals, get feedback, revise 
														 | 
														
														 | 
														
															       security properties: write some proposals, get feedback, revise 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -139,10 +148,14 @@ I     - Figure out a good PKI, document the design, assess security issues: 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   - mid October 
														 | 
														
														 | 
														
															   - mid October 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 KS  - Finish implementation of hidden service improvements: have a set 
														 | 
														
														 | 
														
															 KS  - Finish implementation of hidden service improvements: have a set 
														 | 
													
												
											
												
													
														| 
														 | 
														
															       of patches that you think work. 
														 | 
														
														 | 
														
															       of patches that you think work. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+W   - Finish implementation of directory overhead changes: have a set 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      of patches that you think work. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															   - mid January 
														 | 
														
														 | 
														
															   - mid January 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 KS  - Finish testing, debugging, unit testing, etc the hidden service 
														 | 
														
														 | 
														
															 KS  - Finish testing, debugging, unit testing, etc the hidden service 
														 | 
													
												
											
												
													
														| 
														 | 
														
															       changes. Have it in the development version and in use. 
														 | 
														
														 | 
														
															       changes. Have it in the development version and in use. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+W   - Finish testing, debugging, unit testing, etc the directory overhead 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+      changes. Have it in the development version and in use. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 ======================================================================= 
														 | 
														
														 | 
														
															 ======================================================================= 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 |