Browse Source

a few more tweaks and a new subsection

svn:r8694
Roger Dingledine 19 years ago
parent
commit
fac9e767e3
1 changed files with 11 additions and 4 deletions
  1. 11 4
      doc/design-paper/blocking.tex

+ 11 - 4
doc/design-paper/blocking.tex

@@ -137,7 +137,7 @@ as high of a risk.)
 We assume that our users have control over their hardware and
 We assume that our users have control over their hardware and
 software -- they don't have any spyware installed, there are no
 software -- they don't have any spyware installed, there are no
 cameras watching their screen, etc. Unfortunately, in many situations
 cameras watching their screen, etc. Unfortunately, in many situations
-these attackers are very real~\cite{zuckerman-threatmodels}; yet
+such attackers are very real~\cite{zuckerman-threatmodels}; yet
 software-based security systems like ours are poorly equipped to handle
 software-based security systems like ours are poorly equipped to handle
 a user who is entirely observed and controlled by the adversary. See
 a user who is entirely observed and controlled by the adversary. See
 Section~\ref{subsec:cafes-and-livecds} for more discussion of what little
 Section~\ref{subsec:cafes-and-livecds} for more discussion of what little
@@ -158,7 +158,7 @@ Anonymizer and friends
 
 
 Psiphon, circumventor, cgiproxy.
 Psiphon, circumventor, cgiproxy.
 
 
-Simpler to deploy; might not require client-side software.
+Simpler to deploy; can work without new client-side software.
 
 
 \subsection{JAP}
 \subsection{JAP}
 
 
@@ -285,8 +285,8 @@ bridge relay.
 
 
 The following section describes ways to bootstrap knowledge of your first
 The following section describes ways to bootstrap knowledge of your first
 bridge relay, and ways to maintain connectivity once you know a few
 bridge relay, and ways to maintain connectivity once you know a few
-bridge relays. (See Section~\ref{later} for a discussion of exactly
-what information is sufficient to characterize a bridge relay.)
+bridge relays. (See Section~\ref{subsec:first-bridge} for a discussion
+of exactly what information is sufficient to characterize a bridge relay.)
 
 
 \section{Discovering and maintaining working bridge relays}
 \section{Discovering and maintaining working bridge relays}
 
 
@@ -370,6 +370,13 @@ Is it useful to load balance which bridges are handed out? The above
 bucket concept makes some bridges wildly popular and others less so.
 bucket concept makes some bridges wildly popular and others less so.
 But I guess that's the point.
 But I guess that's the point.
 
 
+\subsection{Bootstrapping: finding your first bridge}
+\label{subsec:first-bridge}
+
+Some techniques are sufficient to get us an IP address and a port,
+and others can get us IP:port:key. Lay out some plausible options
+for how users can bootstrap into learning their first bridge.
+
 \section{Security improvements}
 \section{Security improvements}
 
 
 \subsection{Hiding Tor's network signatures}
 \subsection{Hiding Tor's network signatures}