Преглед изворни кода

Small changes to abstract and intro

svn:r615
Paul Syverson пре 20 година
родитељ
комит
96f47a3eca
1 измењених фајлова са 4 додато и 3 уклоњено
  1. 4 3
      doc/tor-design.tex

+ 4 - 3
doc/tor-design.tex

@@ -51,7 +51,8 @@
 
 
 \begin{abstract}
 \begin{abstract}
 We present Tor, a connection-based low-latency anonymous communication
 We present Tor, a connection-based low-latency anonymous communication
-system which addresses many limitations in the original onion routing design.
+system. It is intended as an update and replacement for onion routing
+and addresses many limitations in the original onion routing design.
 Tor works in a real-world Internet environment,
 Tor works in a real-world Internet environment,
 requires little synchronization or coordination between nodes, and
 requires little synchronization or coordination between nodes, and
 protects against known anonymity-breaking attacks as well
 protects against known anonymity-breaking attacks as well
@@ -76,7 +77,7 @@ is sent in fixed-size \emph{cells}, which are unwrapped by a symmetric key
 at each node, revealing the downstream node. The original onion routing
 at each node, revealing the downstream node. The original onion routing
 project published several design and analysis papers
 project published several design and analysis papers
 \cite{or-jsac98,or-discex00,or-ih96,or-pet02}. While there was briefly
 \cite{or-jsac98,or-discex00,or-ih96,or-pet02}. While there was briefly
-a network of about a dozen nodes at three widely distributed sites,
+a wide area onion routing network,
 the only long-running and publicly accessible
 the only long-running and publicly accessible
 implementation was a fragile proof-of-concept that ran on a single
 implementation was a fragile proof-of-concept that ran on a single
 machine. Many critical design and deployment issues were never implemented,
 machine. Many critical design and deployment issues were never implemented,
@@ -460,7 +461,7 @@ The main differences are:
   acknowledge its existence.
   acknowledge its existence.
 
 
 
 
-\SubSubSection{Integration with user applications}
+\subsubsection{Integration with user applications}
 
 
 \Section{Maintaining anonymity sets}
 \Section{Maintaining anonymity sets}
 \label{sec:maintaining-anonymity}
 \label{sec:maintaining-anonymity}