|
@@ -33,7 +33,7 @@ Tor is a low-latency anonymous communication overlay network designed
|
|
|
to be practical and usable for protecting TCP streams over the
|
|
|
Internet~\cite{tor-design}. We have been operating a publicly deployed
|
|
|
Tor network since October 2003 that has grown to over a hundred volunteer
|
|
|
-nodes and carries on average over 70 megabits of traffic per second.
|
|
|
+nodes and sometimes as much as 80 megabits of average traffic per second.
|
|
|
|
|
|
Tor has a weaker threat model than many anonymity designs in the
|
|
|
literature, because our foremost goal is to deploy a
|
|
@@ -652,34 +652,10 @@ and incentive schemes \cite{price-privacy}. Similarly we can expect a
|
|
|
continued use of identification by IP number as long as there is no
|
|
|
workable alternative.
|
|
|
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
-\subsection{Other}
|
|
|
-
|
|
|
-[Once you build a generic overlay network, everybody wants to use it.]
|
|
|
-
|
|
|
-Tor's scope: How much should Tor aim to do? Applications that leak
|
|
|
-data: we can say they're not our problem, but they're somebody's problem.
|
|
|
-Also, the more widely deployed Tor becomes, the more people who need a
|
|
|
-deployed overlay network tell us they'd like to use us if only we added
|
|
|
-the following more features. For example, Blossom \cite{blossom} and
|
|
|
-random community wireless projects both want source-routable overlay
|
|
|
-networks for their own purposes. Fortunately, our modular design separates
|
|
|
-routing from node discovery; so we could implement Morphmix in Tor just
|
|
|
-by implementing the Morphmix-specific node discovery and path selection
|
|
|
-pieces. On the other hand, we could easily get distracted building a
|
|
|
-general-purpose overlay library, and we're only a few developers.
|
|
|
-
|
|
|
-[arma will work on this]
|
|
|
-
|
|
|
-%Should we allow revocation of anonymity if a threshold of
|
|
|
-%servers want to?
|
|
|
-
|
|
|
-Logging. Making logs not revealing. A happy coincidence that verbose
|
|
|
-logging is our \#2 performance bottleneck. Is there a way to detect
|
|
|
-modified servers, or to have them volunteer the information that they're
|
|
|
-logging verbosely? Would that actually solve any attacks?
|
|
|
+%Fortunately, our modular design separates
|
|
|
+%routing from node discovery; so we could implement Morphmix in Tor just
|
|
|
+%by implementing the Morphmix-specific node discovery and path selection
|
|
|
+%pieces.
|
|
|
|
|
|
\section{Crossroads: Scaling and Design choices}
|
|
|
\label{sec:crossroads-design}
|
|
@@ -1377,6 +1353,12 @@ conclusion.
|
|
|
|
|
|
will our sustainability approach work? we'll see.
|
|
|
|
|
|
+Applications that leak data: we can say they're not our problem, but
|
|
|
+they're somebody's problem.
|
|
|
+The more widely deployed Tor becomes, the more people who need a
|
|
|
+deployed overlay network tell us they'd like to use us if only we added
|
|
|
+the following more features.
|
|
|
+
|
|
|
"These are difficult and open questions, yet choosing not to solve them
|
|
|
means leaving most users to a less secure network or no anonymizing
|
|
|
network at all."
|