|  | @@ -408,15 +408,15 @@ for ``open proxy list'' yields a wide variety of freely available lists
 | 
	
		
			
				|  |  |  of HTTP, HTTPS, and SOCKS proxies. Many small companies have sprung up
 | 
	
		
			
				|  |  |  providing more refined lists to paying customers.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -There are some downsides to using these oen proxies though. Firstly,
 | 
	
		
			
				|  |  | +There are some downsides to using these open proxies though. First,
 | 
	
		
			
				|  |  |  the proxies are of widely varying quality in terms of bandwidth and
 | 
	
		
			
				|  |  | -stability, and many of them are entirely unreachable. Secondly, unlike
 | 
	
		
			
				|  |  | +stability, and many of them are entirely unreachable. Second, unlike
 | 
	
		
			
				|  |  |  networks of volunteers like Tor, the legality of routing traffic through
 | 
	
		
			
				|  |  |  these proxies is questionable: it's widely believed that most of them
 | 
	
		
			
				|  |  |  don't realize what they're offering, and probably wouldn't allow it if
 | 
	
		
			
				|  |  | -they realized. Thirdly, in many cases the connection to the proxy is
 | 
	
		
			
				|  |  | +they realized. Third, in many cases the connection to the proxy is
 | 
	
		
			
				|  |  |  unencrypted, so firewalls that filter based on keywords in IP packets
 | 
	
		
			
				|  |  | -will not be hindered. And lastly, many users are suspicious that some
 | 
	
		
			
				|  |  | +will not be hindered. And last, many users are suspicious that some
 | 
	
		
			
				|  |  |  open proxies are a little \emph{too} convenient: are they run by the
 | 
	
		
			
				|  |  |  adversary, in which case they get to monitor all the user's requests
 | 
	
		
			
				|  |  |  just as single-hop proxies can?
 | 
	
	
		
			
				|  | @@ -452,7 +452,7 @@ keystroke loggers (even graphical ones).
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  \subsection{Tor itself}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -And lastly, we include Tor itself in the list of current solutions
 | 
	
		
			
				|  |  | +And last, we include Tor itself in the list of current solutions
 | 
	
		
			
				|  |  |  to firewalls. Tens of thousands of people use Tor from countries that
 | 
	
		
			
				|  |  |  routinely filter their Internet. Tor's website has been blocked in most
 | 
	
		
			
				|  |  |  of them. But why hasn't the Tor network been blocked yet?
 | 
	
	
		
			
				|  | @@ -676,7 +676,7 @@ present certificates, so that clients are harder to distinguish from servers.
 | 
	
		
			
				|  |  |  But in a blocking-resistance environment, clients should not present
 | 
	
		
			
				|  |  |  certificates at all.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -Lastly, what if the adversary starts observing the network traffic even
 | 
	
		
			
				|  |  | +Last, what if the adversary starts observing the network traffic even
 | 
	
		
			
				|  |  |  more closely? Even if our TLS handshake looks innocent, our traffic timing
 | 
	
		
			
				|  |  |  and volume still look different than a user making a secure web connection
 | 
	
		
			
				|  |  |  to his bank. The same techniques used in the growing trend to build tools
 | 
	
	
		
			
				|  | @@ -869,9 +869,9 @@ each of the above designs: not only do we have to attract many volunteer
 | 
	
		
			
				|  |  |  proxies, but the users also need to get to a single site that is sure
 | 
	
		
			
				|  |  |  to be blocked.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -There are two reasons why we're in better shape. Firstly, the users don't
 | 
	
		
			
				|  |  | +There are two reasons why we're in better shape. First, the users don't
 | 
	
		
			
				|  |  |  actually need to reach the watering hole directly: it can respond to
 | 
	
		
			
				|  |  | -email, for example. Secondly, 
 | 
	
		
			
				|  |  | +email, for example. Second, 
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  In fact, the JAP
 | 
	
		
			
				|  |  |  project~\cite{web-mix,koepsell:wpes2004} suggested an alternative approach
 | 
	
	
		
			
				|  | @@ -1089,17 +1089,17 @@ Tor's ``public key infrastructure'' provides a chain of trust to
 | 
	
		
			
				|  |  |  let users verify that they're actually talking to the right servers.
 | 
	
		
			
				|  |  |  There are four pieces to this trust chain.
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -Firstly, when Tor clients are establishing circuits, at each step
 | 
	
		
			
				|  |  | +First, when Tor clients are establishing circuits, at each step
 | 
	
		
			
				|  |  |  they demand that the next Tor server in the path prove knowledge of
 | 
	
		
			
				|  |  |  its private key~\cite{tor-design}. This step prevents the first node
 | 
	
		
			
				|  |  | -in the path from just spoofing the rest of the path. Secondly, the
 | 
	
		
			
				|  |  | +in the path from just spoofing the rest of the path. Second, the
 | 
	
		
			
				|  |  |  Tor directory authorities provide a signed list of servers along with
 | 
	
		
			
				|  |  |  their public keys---so unless the adversary can control a threshold
 | 
	
		
			
				|  |  |  of directory authorities, he can't trick the Tor client into using other
 | 
	
		
			
				|  |  | -Tor servers. Thirdly, the location and keys of the directory authorities,
 | 
	
		
			
				|  |  | +Tor servers. Third, the location and keys of the directory authorities,
 | 
	
		
			
				|  |  |  in turn, is hard-coded in the Tor source code---so as long as the user
 | 
	
		
			
				|  |  |  got a genuine version of Tor, he can know that he is using the genuine
 | 
	
		
			
				|  |  | -Tor network. And lastly, the source code and other packages are signed
 | 
	
		
			
				|  |  | +Tor network. And last, the source code and other packages are signed
 | 
	
		
			
				|  |  |  with the GPG keys of the Tor developers, so users can confirm that they
 | 
	
		
			
				|  |  |  did in fact download a genuine version of Tor.
 | 
	
		
			
				|  |  |  
 | 
	
	
		
			
				|  | @@ -1204,8 +1204,8 @@ servers.)
 | 
	
		
			
				|  |  |  Bridge users without Tor clients
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  Bridge relays could always open their socks proxy. This is bad though,
 | 
	
		
			
				|  |  | -firstly
 | 
	
		
			
				|  |  | -because bridges learn the bridge users' destinations, and secondly because
 | 
	
		
			
				|  |  | +first
 | 
	
		
			
				|  |  | +because bridges learn the bridge users' destinations, and second because
 | 
	
		
			
				|  |  |  we've learned that open socks proxies tend to attract abusive users who
 | 
	
		
			
				|  |  |  have no idea they're using Tor.
 | 
	
		
			
				|  |  |  
 |