Browse Source

an abstract, that needs more work

svn:r3519
Roger Dingledine 20 years ago
parent
commit
a94fef2e67
1 changed files with 13 additions and 2 deletions
  1. 13 2
      doc/design-paper/challenges.tex

+ 13 - 2
doc/design-paper/challenges.tex

@@ -24,7 +24,18 @@
 \pagestyle{empty}
 
 \begin{abstract}
-foo
+
+We describe our experiences with deploying Tor, a low-latency anonymous
+communication system that has been funded both by the U.S.~government
+and also by the Electronic Frontier Foundation.
+
+Because of its simplified threat model, Tor does not aim to defend
+against many of the attacks in the literature.
+
+We describe both policy issues that have come up from operating the
+network and technical challenges in building a more sustainable and
+scalable network.
+
 \end{abstract}
 
 \section{Introduction}
@@ -42,7 +53,7 @@ Subject to this restriction, we try to
 provide as much anonymity as we can. In particular, because we
 support interactive communications without impractically expensive padding,
 we fall prey to a variety
-of intra-network~\cite{attack-tor-oak05,flow-correlation04,bar} and
+of intra-network~\cite{back01,attack-tor-oak05,flow-correlation04} and
 end-to-end~\cite{danezis-pet2004,SS03} anonymity-breaking attacks.
 
 Tor is secure so long as adversaries are unable to