| 
					
				 | 
			
			
				@@ -60,8 +60,8 @@ Historically, research on anonymizing systems has focused on a passive 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 attacker who monitors the user (call her Alice) and tries to discover her 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 activities, yet lets her reach any piece of the network. In more modern 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 threat models such as Tor's, the adversary is allowed to perform active 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-attacks such as modifying communications in hopes of tricking Alice 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-into revealing her destination, or intercepting some of her connections 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+attacks such as modifying communications to trick Alice 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+into revealing her destination, or intercepting some connections 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 to run a man-in-the-middle attack. But these systems still assume that 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 Alice can eventually reach the anonymizing network. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -108,8 +108,7 @@ whistleblowers in firewalled corporate network; and for people in 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 unanticipated oppressive situations. In fact, by designing with 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 a variety of adversaries in mind, we can take advantage of the fact that 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 adversaries will be in different stages of the arms race at each location, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-and thereby retain partial utility in servers even when they are blocked 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-by some of the adversaries. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+so a server blocked in one locale can still be useful in others. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 We assume there are three main network attacks in use by censors 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 currently~\cite{clayton:pet2006}: 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -124,8 +123,8 @@ destination hostnames. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \end{tightlist} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 We assume the network firewall has limited CPU and memory per 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-connection~\cite{clayton:pet2006}. Against an adversary who spends 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-hours looking through the contents of each packet, we would need 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+connection~\cite{clayton:pet2006}. Against an adversary who carefully 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+examines the contents of every packet, we would need 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 some stronger mechanism such as steganography, which introduces its 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 own problems~\cite{active-wardens,tcpstego,bar}. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -303,7 +302,7 @@ Relay-based blocking-resistance schemes generally have two main 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 components: a relay component and a discovery component. The relay part 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 encompasses the process of establishing a connection, sending traffic 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 back and forth, and so on---everything that's done once the user knows 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-where he's going to connect. Discovery is the step before that: the 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+where she's going to connect. Discovery is the step before that: the 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 process of finding one or more usable relays. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 For example, we can divide the pieces of Tor in the previous section 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -316,7 +315,8 @@ in mind, we now examine several categories of relay-based schemes. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 Existing commercial anonymity solutions (like Anonymizer.com) are based 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 on a set of single-hop proxies. In these systems, each user connects to 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-a single proxy, which then relays the user's traffic. These public proxy 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+a single proxy, which then relays traffic between the user and her 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+destination. These public proxy 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 systems are typically characterized by two features: they control and 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 operate the proxies centrally, and many different users get assigned 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 to each proxy. 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -393,8 +393,9 @@ some cases he may know and trust some people on the outside, but in many 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 cases he's just out of luck. Just as hard, how does a new volunteer in 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 Ohio find a person in China who needs it? 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-%discovery is also hard because the hosts keep vanishing if they're 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-%on dynamic ip. But not so bad, since they can use dyndns addresses. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+% another key feature of a proxy run by your uncle is that you 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+% self-censor, so you're unlikely to bring abuse complaints onto 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+% your uncle. self-censoring clearly has a downside too, though. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 This challenge leads to a hybrid design---centrally-distributed 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 personal proxies---which we will investigate in more detail in 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -467,7 +468,7 @@ this idea when we consider whether and how to publicize a Tor variant 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 that improves blocking-resistance---see Section~\ref{subsec:publicity} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 for more discussion.) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-The broader explanation is that  the maintainance of most government-level 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+The broader explanation is that the maintainance of most government-level 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 filters is aimed at stopping widespread information flow and appearing to be 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 in control, not by the impossible goal of blocking all possible ways to bypass 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 censorship. Censors realize that there will always 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -690,6 +691,9 @@ cat-and-mouse game is made more complex by the fact that Tor transports a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 variety of protocols, and we'll want to automatically handle web browsing 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 differently from, say, instant messaging. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+% Tor cells are 512 bytes each. So TLS records will be roughly 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+% multiples of this size? How bad is this? 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \subsection{Identity keys as part of addressing information} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 We have described a way for the blocked user to bootstrap into the 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -751,7 +755,7 @@ upcoming Psiphon single-hop proxy tool~\cite{psiphon} plans to use this 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 There are some variations on bootstrapping in this design. In the simple 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 case, the operator of the bridge informs each chosen user about his 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-bridge's address information and/or keys. Another approach involves 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+bridge's address information and/or keys. A different approach involves 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 blocked users introducing new blocked users to the bridges they know. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 That is, somebody in the blocked area can pass along a bridge's address to 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 somebody else they trust. This scheme brings in appealing but complex game 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -777,14 +781,13 @@ on the first by encouraging volunteers to run several bridges at once 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 (or coordinate with other bridge volunteers), such that some fraction 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 of the bridges are likely to be available at any given time. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-The blocked user's Tor client could periodically fetch an updated set of 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+The blocked user's Tor client would periodically fetch an updated set of 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 recommended bridges from any of the working bridges. Now the client can 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 learn new additions to the bridge pool, and can expire abandoned bridges 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 or bridges that the adversary has blocked, without the user ever needing 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-to care. To simplify maintenance of the community's bridge pool, rather 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-than mirroring all of the information at each bridge, each community 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-could instead run its own bridge directory authority (accessed via the 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-available bridges), 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+to care. To simplify maintenance of the community's bridge pool, each 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+community could run its own bridge directory authority---accessed via 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+the available bridges, or mirrored at each bridge. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \subsection{Social networks with directory-side support} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1002,6 +1005,11 @@ progress reports. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 The above geoip-based approach to detecting blocked bridges gives us a 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 solution though. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+\subsection{Advantages of deploying all solutions at once} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+For once we're not in the position of the defender: we don't have to 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+defend against every possible filtering scheme, we just have to defend 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+against at least one. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \section{Security considerations} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \label{sec:security} 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1059,6 +1067,11 @@ lot of the decision rests on which attacks the users are most worried 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 about. For most users, we don't think running a bridge relay will be 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 that damaging. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+Need to examine how entry guards fit in. If the blocked user doesn't use 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+the bridge's entry guards, then the bridge doesn't gain as much cover 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+benefit. If he does, first how does that actually work, and second is 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+it turtles all the way down (need to use the guard's guards, ...)? 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \subsection{Trusting local hardware: Internet cafes and LiveCDs} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \label{subsec:cafes-and-livecds} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1201,7 +1214,10 @@ servers.) 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \subsection{What if the clients can't install software?} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				-Bridge users without Tor clients 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+[this section should probably move to the related work section, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+or just disappear entirely.] 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+Bridge users without Tor software 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 Bridge relays could always open their socks proxy. This is bad though, 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 first 
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1217,6 +1233,10 @@ if one of its barriers to deployment is a lack of volunteers willing 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 to exit directly to websites. But it clearly drops some of the nice 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 anonymity and security features Tor provides. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+A hybrid approach where the user gets his anonymity from Tor but his 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+software-less use from a web proxy running on a trusted machine on the 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+free side. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \subsection{Publicity attracts attention} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \label{subsec:publicity} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
	
		
			
				| 
					
				 | 
			
			
				@@ -1258,6 +1278,13 @@ Hidden services as bridges. Hidden services as bridge directory authorities. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \section{Conclusion} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+a technical solution won't solve the whole problem. after all, china's 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+firewall is *socially* very successful, even if technologies exist to 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+get around it. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+but having a strong technical solution is still useful as a piece of the 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+puzzle. 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				+ 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \bibliographystyle{plain} \bibliography{tor-design} 
			 | 
		
	
		
			
				 | 
				 | 
			
			
				  
			 | 
		
	
		
			
				 | 
				 | 
			
			
				 \appendix 
			 |