浏览代码

Turn challenges.tex into minimally valid LaTeX

svn:r3411
Nick Mathewson 21 年之前
父节点
当前提交
1309885fcd
共有 1 个文件被更改,包括 7 次插入5 次删除
  1. 7 5
      doc/design-paper/challenges.tex

+ 7 - 5
doc/design-paper/challenges.tex

@@ -1,8 +1,8 @@
+\documentclass[twocolumn]{article}
 
 
+\title{Challenges in bringing low-latency stream anonymity to the masses (DRAFT)}
 
 
-
-Challenges in bringing low-latency stream anonymity to the masses
-
+\begin{document}
 
 
 \section{Introduction}
 \section{Introduction}
 
 
@@ -27,7 +27,7 @@ useful network to a practical useful anonymous network.
 
 
 Tor works like this.
 Tor works like this.
 
 
-weasel's graph of # nodes and of bandwidth, ideally from week 0.
+weasel's graph of \# nodes and of bandwidth, ideally from week 0.
 
 
 Tor has the following goals.
 Tor has the following goals.
 
 
@@ -100,7 +100,7 @@ continued money, and they periodically ask what they will do when it
 dries up.
 dries up.
 
 
 Logging. Making logs not revealing. A happy coincidence that verbose
 Logging. Making logs not revealing. A happy coincidence that verbose
-logging is our #2 performance bottleneck. Is there a way to detect
+logging is our \#2 performance bottleneck. Is there a way to detect
 modified servers, or to have them volunteer the information that they're
 modified servers, or to have them volunteer the information that they're
 logging verbosely? Would that actually solve any attacks?
 logging verbosely? Would that actually solve any attacks?
 
 
@@ -172,3 +172,5 @@ assuming that, how much anonymity can we get. we're not here to model or
 to simulate or to produce equations and formulae. but those have their
 to simulate or to produce equations and formulae. but those have their
 roles too.
 roles too.
 
 
+\end{document}
+