Browse Source

r9292@totoro: nickm | 2006-11-12 16:33:36 -0500
A couple of small tweaks; add infranet reference.


svn:r8938

Nick Mathewson 17 years ago
parent
commit
54ec19252f
2 changed files with 19 additions and 6 deletions
  1. 10 6
      doc/design-paper/blocking.tex
  2. 9 0
      doc/design-paper/tor-design.bib

+ 10 - 6
doc/design-paper/blocking.tex

@@ -82,13 +82,16 @@ by blocking all the server IP addresses in the directory, or by filtering
 based on the signature of the Tor TLS handshake. Here we describe an
 extended design that builds upon the current Tor network to provide an
 anonymizing
-network that also resists this blocking. Specifically,
-Section~\ref{sec:adversary} discusses our threat model---that is,
+network that resists censorship as well as anonymity-breaking attacks.
+In section~\ref{sec:adversary} we discuss our threat model---that is,
 the assumptions we make about our adversary. Section~\ref{sec:current-tor}
 describes the components of the current Tor design and how they can be
 leveraged for a new blocking-resistant design. Section~\ref{sec:related}
-explains the features and drawbacks of the currently deployed solutions;
-and ...
+explains the features and drawbacks of the currently deployed solutions.
+In sections~\ref{sec:bridges} through~\ref{sec:discovery}, we explore the
+components of our designs in detail.  Section~\ref{sec:security} considers
+security implications; ..... %write the rest.
+
 
 % The other motivation is for places where we're concerned they will
 % try to enumerate a list of Tor users. So even if they're not blocking
@@ -152,7 +155,8 @@ We assume that the attackers' goals are somewhat complex.
   blocked information is also not a goal, given the broadness of most
   censorship regimes. This seems borne out by fact.\footnote{So far in places
   like China, the authorities mainly go after people who publish materials
-  and coordinate organized movements~\cite{mackinnon}.  If they find that a
+  and coordinate organized movements~\cite{mackinnon-personal}.
+  If they find that a
   user happens to be reading a site that should be blocked, the typical
   response is simply to block the site. Of course, even with an encrypted
   connection, the adversary may be able to distinguish readers from
@@ -230,7 +234,7 @@ Section~\ref{subsec:trust-chain} for discussion on helping the user
 confirm that he has a genuine version and that he can connect to the
 real Tor network.
 
-\section{Components of the current Tor design}
+\section{Adapting the current Tor design to anticensorship}
 \label{sec:current-tor}
 
 Tor is popular and sees a lot of use. It's the largest anonymity

+ 9 - 0
doc/design-paper/tor-design.bib

@@ -1365,6 +1365,15 @@ Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
   note = {\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}},
 }
 
+@InProceedings{infranet,
+   author =      {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
+   title =       {Infranet: Circumventing Web Censorship and Surveillance},
+   booktitle =   {Proceedings of the 11th USENIX Security Symposium},
+   year =        {2002},
+   month =       {August},
+   note = {\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}},
+}
+
 %%% Local Variables:
 %%% mode: latex
 %%% TeX-master: "tor-design"