Browse Source

clean up the china section

svn:r3460
Roger Dingledine 20 years ago
parent
commit
50c8a9bffe
1 changed files with 13 additions and 13 deletions
  1. 13 13
      doc/design-paper/challenges.tex

+ 13 - 13
doc/design-paper/challenges.tex

@@ -782,37 +782,37 @@ designed with ubiquitous access to the network in mind, thousands of
 users across the world are trying to use it for exactly this purpose.
 % Academic and NGO organizations, peacefire, \cite{berkman}, etc
 
-Anti-censorship networks designed to bridge country-level blocks face
-a variety of challenges. One of these is that they need to find a set
-of exit nodes---servers on the `free' side that are willing to relay
-arbitrary traffic from users to their final destination. Anonymizing
+Anti-censorship networks hoping to bridge country-level blocks face
+a variety of challenges. One of these is that they need to find enough
+exit nodes---servers on the `free' side that are willing to relay
+arbitrary traffic from users to their final destinations. Anonymizing
 networks including Tor are well-suited to this task, since we have
 already gathered a set of exit nodes that are willing to tolerate some
 political heat.
 
-The other main challenge is how to distribute a list of reachable relays
+The other main challenge is to distribute a list of reachable relays
 to the users inside the country, and give them software to use them,
 without letting the authorities also enumerate this list and block each
 relay. Anonymizer solves this by buying lots of seemingly-unrelated IP
-addresses (or having them donated), and tells a few users about the new
-addresses, abandoning old ones that have been `used up'. Distributed
+addresses (or having them donated), abandoning old addresses as they are
+`used up', and telling a few users about the new ones. Distributed
 anonymizing networks again have an advantage here, in that we already
 have tens of thousands of separate IP addresses whose users might
-volunteer to provide this service now that they've installed and use
+volunteer to provide this service since they've already installed and use
 the software for their own privacy~\cite{koepsell-wpes2004}. Because
 the Tor protocol separates routing from network discovery (see Section
 \ref{do-we-discuss-this?}), volunteers could configure their Tor clients
 to generate server descriptors and send them to a special directory
 server that gives them out to dissidents who need to get around blocks.
 
-Of course, this passes the buck in terms of preventing the adversary
+Of course, this still doesn't prevent the adversary
 from enumerating all the volunteer relays and blocking them preemptively.
 Perhaps a tiered-trust system could be built where a few individuals are
-given relay IPs, and they recommend other individuals by telling them
+given relays' locations, and they recommend other individuals by telling them
 those addresses, thus providing a built-in incentive to avoid letting the
-adversary learn the addresses. Max-flow trust algorithms~\cite{advogato}
-might help to bound the number of IPs leaked to the adversary. Groups
-like the W3C are looking into using Tor as a component in a system to
+adversary intercept them. Max-flow trust algorithms~\cite{advogato}
+might help to bound the number of IP addresses leaked to the adversary. Groups
+like the W3C are looking into using Tor as a component in an overall system to
 help address censorship; we wish them luck.
 
 %\cite{infranet}