Browse Source

Turn challenges.tex into minimally valid LaTeX

svn:r3411
Nick Mathewson 20 years ago
parent
commit
1309885fcd
1 changed files with 7 additions and 5 deletions
  1. 7 5
      doc/design-paper/challenges.tex

+ 7 - 5
doc/design-paper/challenges.tex

@@ -1,8 +1,8 @@
+\documentclass[twocolumn]{article}
 
 
+\title{Challenges in bringing low-latency stream anonymity to the masses (DRAFT)}
 
 
-
-Challenges in bringing low-latency stream anonymity to the masses
-
+\begin{document}
 
 
 \section{Introduction}
 \section{Introduction}
 
 
@@ -27,7 +27,7 @@ useful network to a practical useful anonymous network.
 
 
 Tor works like this.
 Tor works like this.
 
 
-weasel's graph of # nodes and of bandwidth, ideally from week 0.
+weasel's graph of \# nodes and of bandwidth, ideally from week 0.
 
 
 Tor has the following goals.
 Tor has the following goals.
 
 
@@ -100,7 +100,7 @@ continued money, and they periodically ask what they will do when it
 dries up.
 dries up.
 
 
 Logging. Making logs not revealing. A happy coincidence that verbose
 Logging. Making logs not revealing. A happy coincidence that verbose
-logging is our #2 performance bottleneck. Is there a way to detect
+logging is our \#2 performance bottleneck. Is there a way to detect
 modified servers, or to have them volunteer the information that they're
 modified servers, or to have them volunteer the information that they're
 logging verbosely? Would that actually solve any attacks?
 logging verbosely? Would that actually solve any attacks?
 
 
@@ -172,3 +172,5 @@ assuming that, how much anonymity can we get. we're not here to model or
 to simulate or to produce equations and formulae. but those have their
 to simulate or to produce equations and formulae. but those have their
 roles too.
 roles too.
 
 
+\end{document}
+