Browse Source

tighten related work

svn:r3597
Roger Dingledine 20 years ago
parent
commit
aca8c362bf
1 changed files with 13 additions and 20 deletions
  1. 13 20
      doc/design-paper/challenges.tex

+ 13 - 20
doc/design-paper/challenges.tex

@@ -114,9 +114,6 @@ compare Tor to other low-latency anonymity designs.
 %details on the design, assumptions, and security arguments, we refer
 %details on the design, assumptions, and security arguments, we refer
 %the reader to the Tor design paper~\cite{tor-design}.
 %the reader to the Tor design paper~\cite{tor-design}.
 
 
-%\medskip
-\noindent
-{\bf How Tor works.}
 Tor provides \emph{forward privacy}, so that users can connect to
 Tor provides \emph{forward privacy}, so that users can connect to
 Internet sites without revealing their logical or physical locations
 Internet sites without revealing their logical or physical locations
 to those sites or to observers.  It also provides \emph{location-hidden
 to those sites or to observers.  It also provides \emph{location-hidden
@@ -362,10 +359,19 @@ don't have built-in encryption and authentication, such as unencrypted
 HTTP or chat, and it requires no modification of those services.
 HTTP or chat, and it requires no modification of those services.
 
 
 \subsection{Related work}
 \subsection{Related work}
-Tor is not the only anonymity system that aims to be practical and useful.
-Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured
-open proxies around the Internet, can provide good
-performance and some security against a weaker attacker. The Java
+Tor differs from other deployed systems for traffic analysis resistance
+in its security and flexibility.  Mix networks such as
+Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design}
+gain the highest degrees of anonymity at the expense of introducing highly
+variable delays, making them unsuitable for applications such as web
+browsing.  Commercial single-hop
+proxies~\cite{anonymizer} can provide good performance, but
+a single compromise can expose all users' traffic, and a single-point
+eavesdropper can perform traffic analysis on the entire network.
+%Also, their proprietary implementations place any infrastructure that
+%depends on these single-hop solutions at the mercy of their providers'
+%financial health as well as network security.
+The Java
 Anon Proxy~\cite{web-mix} provides similar functionality to Tor but
 Anon Proxy~\cite{web-mix} provides similar functionality to Tor but
 handles only web browsing rather than arbitrary TCP\@.
 handles only web browsing rather than arbitrary TCP\@.
 %Some peer-to-peer file-sharing overlay networks such as
 %Some peer-to-peer file-sharing overlay networks such as
@@ -387,19 +393,6 @@ enough to contain a MorphMix experiment.
 We direct the interested reader
 We direct the interested reader
 to~\cite{tor-design} for a more in-depth review of related work.
 to~\cite{tor-design} for a more in-depth review of related work.
 
 
-Tor also differs from other deployed systems for traffic analysis resistance
-in its security and flexibility.  Mix networks such as
-Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design}
-gain the highest degrees of anonymity at the expense of introducing highly
-variable delays, thus making them unsuitable for applications such as web
-browsing.  Commercial single-hop
-proxies~\cite{anonymizer} present a single point of failure, where
-a single compromise can expose all users' traffic, and a single-point
-eavesdropper can perform traffic analysis on the entire network.
-Also, their proprietary implementations place any infrastructure that
-depends on these single-hop solutions at the mercy of their providers'
-financial health as well as network security.
-
 %XXXX six-four. crowds. i2p.
 %XXXX six-four. crowds. i2p.
 
 
 %XXXX
 %XXXX