|
@@ -159,7 +159,7 @@ Most node operators do not want to allow arbitrary TCP traffic.
|
|
|
To address this, Tor provides \emph{exit policies} so
|
|
|
each exit node can block the IP addresses and ports it is unwilling to allow.
|
|
|
Tor nodes advertise their exit policies to the directory servers, so that
|
|
|
-client can tell which nodes will support their connections.
|
|
|
+clients can tell which nodes will support their connections.
|
|
|
|
|
|
As of January 2005, the Tor network has grown to around a hundred nodes
|
|
|
on four continents, with a total capacity exceeding 1Gbit/s. Appendix A
|
|
@@ -1102,7 +1102,7 @@ new nodes with those ASes in mind?
|
|
|
Citizens in a variety of countries, such as most recently China and
|
|
|
Iran, are blocked from accessing various sites outside
|
|
|
their country. These users try to find any tools available to allow
|
|
|
-them to get-around these firewalls. Some anonymity networks, such as
|
|
|
+them to get around these firewalls. Some anonymity networks, such as
|
|
|
Six-Four~\cite{six-four}, are designed specifically with this goal in
|
|
|
mind; others like the Anonymizer~\cite{anonymizer} are paid by sponsors
|
|
|
such as Voice of America to encourage Internet
|
|
@@ -1284,7 +1284,7 @@ choice of threat model and requirements. If we did not need to increase
|
|
|
network capacity to support more users, we could simply
|
|
|
adopt even stricter validation requirements, and reduce the number of
|
|
|
nodes in the network to a trusted minimum.
|
|
|
-But, we can only do that if can simultaneously make node capacity
|
|
|
+But, we can only do that if we can simultaneously make node capacity
|
|
|
scale much more than we anticipate to be feasible soon, and if we can find
|
|
|
entities willing to run such nodes, an equally daunting prospect.
|
|
|
|