Kaynağa Gözat

r9470@Kushana: nickm | 2006-11-02 16:57:32 -0500
Ordinal numbers are already adverbs; enforce house style.


svn:r8898

Nick Mathewson 17 yıl önce
ebeveyn
işleme
2cdb9ed03d
1 değiştirilmiş dosya ile 14 ekleme ve 14 silme
  1. 14 14
      doc/design-paper/blocking.tex

+ 14 - 14
doc/design-paper/blocking.tex

@@ -408,15 +408,15 @@ for ``open proxy list'' yields a wide variety of freely available lists
 of HTTP, HTTPS, and SOCKS proxies. Many small companies have sprung up
 providing more refined lists to paying customers.
 
-There are some downsides to using these oen proxies though. Firstly,
+There are some downsides to using these open proxies though. First,
 the proxies are of widely varying quality in terms of bandwidth and
-stability, and many of them are entirely unreachable. Secondly, unlike
+stability, and many of them are entirely unreachable. Second, unlike
 networks of volunteers like Tor, the legality of routing traffic through
 these proxies is questionable: it's widely believed that most of them
 don't realize what they're offering, and probably wouldn't allow it if
-they realized. Thirdly, in many cases the connection to the proxy is
+they realized. Third, in many cases the connection to the proxy is
 unencrypted, so firewalls that filter based on keywords in IP packets
-will not be hindered. And lastly, many users are suspicious that some
+will not be hindered. And last, many users are suspicious that some
 open proxies are a little \emph{too} convenient: are they run by the
 adversary, in which case they get to monitor all the user's requests
 just as single-hop proxies can?
@@ -452,7 +452,7 @@ keystroke loggers (even graphical ones).
 
 \subsection{Tor itself}
 
-And lastly, we include Tor itself in the list of current solutions
+And last, we include Tor itself in the list of current solutions
 to firewalls. Tens of thousands of people use Tor from countries that
 routinely filter their Internet. Tor's website has been blocked in most
 of them. But why hasn't the Tor network been blocked yet?
@@ -676,7 +676,7 @@ present certificates, so that clients are harder to distinguish from servers.
 But in a blocking-resistance environment, clients should not present
 certificates at all.
 
-Lastly, what if the adversary starts observing the network traffic even
+Last, what if the adversary starts observing the network traffic even
 more closely? Even if our TLS handshake looks innocent, our traffic timing
 and volume still look different than a user making a secure web connection
 to his bank. The same techniques used in the growing trend to build tools
@@ -869,9 +869,9 @@ each of the above designs: not only do we have to attract many volunteer
 proxies, but the users also need to get to a single site that is sure
 to be blocked.
 
-There are two reasons why we're in better shape. Firstly, the users don't
+There are two reasons why we're in better shape. First, the users don't
 actually need to reach the watering hole directly: it can respond to
-email, for example. Secondly, 
+email, for example. Second, 
 
 In fact, the JAP
 project~\cite{web-mix,koepsell:wpes2004} suggested an alternative approach
@@ -1089,17 +1089,17 @@ Tor's ``public key infrastructure'' provides a chain of trust to
 let users verify that they're actually talking to the right servers.
 There are four pieces to this trust chain.
 
-Firstly, when Tor clients are establishing circuits, at each step
+First, when Tor clients are establishing circuits, at each step
 they demand that the next Tor server in the path prove knowledge of
 its private key~\cite{tor-design}. This step prevents the first node
-in the path from just spoofing the rest of the path. Secondly, the
+in the path from just spoofing the rest of the path. Second, the
 Tor directory authorities provide a signed list of servers along with
 their public keys---so unless the adversary can control a threshold
 of directory authorities, he can't trick the Tor client into using other
-Tor servers. Thirdly, the location and keys of the directory authorities,
+Tor servers. Third, the location and keys of the directory authorities,
 in turn, is hard-coded in the Tor source code---so as long as the user
 got a genuine version of Tor, he can know that he is using the genuine
-Tor network. And lastly, the source code and other packages are signed
+Tor network. And last, the source code and other packages are signed
 with the GPG keys of the Tor developers, so users can confirm that they
 did in fact download a genuine version of Tor.
 
@@ -1204,8 +1204,8 @@ servers.)
 Bridge users without Tor clients
 
 Bridge relays could always open their socks proxy. This is bad though,
-firstly
-because bridges learn the bridge users' destinations, and secondly because
+first
+because bridges learn the bridge users' destinations, and second because
 we've learned that open socks proxies tend to attract abusive users who
 have no idea they're using Tor.