| 
					
				 | 
			
			
				@@ -647,7 +647,7 @@ without delaying streams and thereby harming user experience.\\ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \begin{figure}[h] 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \centering 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-\mbox{\epsfig{figure=interaction,width=8cm}} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+\mbox{\epsfig{figure=interaction,width=8.75cm}} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \caption{Alice builds a two-hop circuit and begins fetching a web page.} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \label{fig:interaction} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \end{figure} 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -896,8 +896,8 @@ receive a bad hash. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \SubSection{Rate limiting and fairness} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \label{subsec:rate-limit} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-Volunteers are generally more willing to run services that can limit 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-their own bandwidth usage. To accommodate them, Tor servers use a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+Volunteers are more willing to run services that can limit 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+their bandwidth usage. To accommodate them, Tor servers use a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 token bucket approach~\cite{tannenbaum96} to 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 enforce a long-term average rate of incoming bytes, while still 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 permitting short-term bursts above the allowed bandwidth. 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1801,7 +1801,7 @@ our overall usability. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  We thank Peter Palfrader, Geoff Goodell, Adam Shostack, Joseph Sokol-Margolis, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    John Bashinski, and Zack Brown 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				    for editing and comments; 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				- Matej Pfajfar, Andrei Serjantov, Marc Rennhard: for design discussions. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ Matej Pfajfar, Andrei Serjantov, Marc Rennhard for design discussions; 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  Bram Cohen for congestion control discussions; 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  Adam Back for suggesting telescoping circuits; and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  Cathy Meadows for formal analysis of the \emph{extend} protocol. 
			 |