|
@@ -51,7 +51,8 @@
|
|
|
|
|
|
\begin{abstract}
|
|
|
We present Tor, a connection-based low-latency anonymous communication
|
|
|
-system which addresses many limitations in the original onion routing design.
|
|
|
+system. It is intended as an update and replacement for onion routing
|
|
|
+and addresses many limitations in the original onion routing design.
|
|
|
Tor works in a real-world Internet environment,
|
|
|
requires little synchronization or coordination between nodes, and
|
|
|
protects against known anonymity-breaking attacks as well
|
|
@@ -76,7 +77,7 @@ is sent in fixed-size \emph{cells}, which are unwrapped by a symmetric key
|
|
|
at each node, revealing the downstream node. The original onion routing
|
|
|
project published several design and analysis papers
|
|
|
\cite{or-jsac98,or-discex00,or-ih96,or-pet02}. While there was briefly
|
|
|
-a network of about a dozen nodes at three widely distributed sites,
|
|
|
+a wide area onion routing network,
|
|
|
the only long-running and publicly accessible
|
|
|
implementation was a fragile proof-of-concept that ran on a single
|
|
|
machine. Many critical design and deployment issues were never implemented,
|
|
@@ -460,7 +461,7 @@ The main differences are:
|
|
|
acknowledge its existence.
|
|
|
|
|
|
|
|
|
-\SubSubSection{Integration with user applications}
|
|
|
+\subsubsection{Integration with user applications}
|
|
|
|
|
|
\Section{Maintaining anonymity sets}
|
|
|
\label{sec:maintaining-anonymity}
|