| 
														
															@@ -82,13 +82,16 @@ by blocking all the server IP addresses in the directory, or by filtering 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 based on the signature of the Tor TLS handshake. Here we describe an 
														 | 
														
														 | 
														
															 based on the signature of the Tor TLS handshake. Here we describe an 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 extended design that builds upon the current Tor network to provide an 
														 | 
														
														 | 
														
															 extended design that builds upon the current Tor network to provide an 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 anonymizing 
														 | 
														
														 | 
														
															 anonymizing 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-network that also resists this blocking. Specifically, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-Section~\ref{sec:adversary} discusses our threat model---that is, 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+network that resists censorship as well as anonymity-breaking attacks. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+In section~\ref{sec:adversary} we discuss our threat model---that is, 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 the assumptions we make about our adversary. Section~\ref{sec:current-tor} 
														 | 
														
														 | 
														
															 the assumptions we make about our adversary. Section~\ref{sec:current-tor} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 describes the components of the current Tor design and how they can be 
														 | 
														
														 | 
														
															 describes the components of the current Tor design and how they can be 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 leveraged for a new blocking-resistant design. Section~\ref{sec:related} 
														 | 
														
														 | 
														
															 leveraged for a new blocking-resistant design. Section~\ref{sec:related} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-explains the features and drawbacks of the currently deployed solutions; 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-and ... 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+explains the features and drawbacks of the currently deployed solutions. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+In sections~\ref{sec:bridges} through~\ref{sec:discovery}, we explore the 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+components of our designs in detail.  Section~\ref{sec:security} considers 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+security implications; ..... %write the rest. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+ 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 % The other motivation is for places where we're concerned they will 
														 | 
														
														 | 
														
															 % The other motivation is for places where we're concerned they will 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 % try to enumerate a list of Tor users. So even if they're not blocking 
														 | 
														
														 | 
														
															 % try to enumerate a list of Tor users. So even if they're not blocking 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -152,7 +155,8 @@ We assume that the attackers' goals are somewhat complex. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   blocked information is also not a goal, given the broadness of most 
														 | 
														
														 | 
														
															   blocked information is also not a goal, given the broadness of most 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   censorship regimes. This seems borne out by fact.\footnote{So far in places 
														 | 
														
														 | 
														
															   censorship regimes. This seems borne out by fact.\footnote{So far in places 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   like China, the authorities mainly go after people who publish materials 
														 | 
														
														 | 
														
															   like China, the authorities mainly go after people who publish materials 
														 | 
													
												
											
												
													
														| 
														 | 
														
															-  and coordinate organized movements~\cite{mackinnon}.  If they find that a 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  and coordinate organized movements~\cite{mackinnon-personal}. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+  If they find that a 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   user happens to be reading a site that should be blocked, the typical 
														 | 
														
														 | 
														
															   user happens to be reading a site that should be blocked, the typical 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   response is simply to block the site. Of course, even with an encrypted 
														 | 
														
														 | 
														
															   response is simply to block the site. Of course, even with an encrypted 
														 | 
													
												
											
												
													
														| 
														 | 
														
															   connection, the adversary may be able to distinguish readers from 
														 | 
														
														 | 
														
															   connection, the adversary may be able to distinguish readers from 
														 | 
													
												
											
										
											
												
													
														 | 
														
															@@ -230,7 +234,7 @@ Section~\ref{subsec:trust-chain} for discussion on helping the user 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 confirm that he has a genuine version and that he can connect to the 
														 | 
														
														 | 
														
															 confirm that he has a genuine version and that he can connect to the 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 real Tor network. 
														 | 
														
														 | 
														
															 real Tor network. 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															-\section{Components of the current Tor design} 
														 | 
														
														 | 
														
															 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 
														 | 
														
														 | 
														
															+\section{Adapting the current Tor design to anticensorship} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															 \label{sec:current-tor} 
														 | 
														
														 | 
														
															 \label{sec:current-tor} 
														 | 
													
												
											
												
													
														| 
														 | 
														
															  
														 | 
														
														 | 
														
															  
														 | 
													
												
											
												
													
														| 
														 | 
														
															 Tor is popular and sees a lot of use. It's the largest anonymity 
														 | 
														
														 | 
														
															 Tor is popular and sees a lot of use. It's the largest anonymity 
														 |