aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPaul Syverson <syverson@itd.nrl.navy.mil>2005-02-08 20:47:12 +0000
committerPaul Syverson <syverson@itd.nrl.navy.mil>2005-02-08 20:47:12 +0000
commit097f12dc7ae89d4a39d510875ea4c5b9ff6a5d1c (patch)
tree739c21fd739481f89f8d044c0bdf0580e7152a41
parent1d569eb4928acf0c6fd1870b195f11d1efe4df8c (diff)
downloadtor-097f12dc7ae89d4a39d510875ea4c5b9ff6a5d1c.tar
tor-097f12dc7ae89d4a39d510875ea4c5b9ff6a5d1c.tar.gz
A few more minor tweaks
svn:r3587
-rw-r--r--doc/design-paper/challenges.tex10
1 files changed, 7 insertions, 3 deletions
diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex
index 9e2be6601..a27a1be7d 100644
--- a/doc/design-paper/challenges.tex
+++ b/doc/design-paper/challenges.tex
@@ -150,7 +150,10 @@ messaging server. Using ``rendezvous points'', other Tor users can
connect to these hidden services, each without knowing the other's network
identity.
-Tor attempts to anonymize the transport layer, not the application layer, so
+Tor attempts to anonymize the transport layer, not the application layer.
+This is useful for applications such as ssh
+where authenticated communication is desired. However, when anonymity from
+those with whom we communicate is desired,
application protocols that include personally identifying information need
additional application-level scrubbing proxies, such as
Privoxy~\cite{privoxy} for HTTP\@. Furthermore, Tor does not permit arbitrary
@@ -761,7 +764,7 @@ tolerably well for them in practice.
But of course, we would prefer that legitimate anonymous users be able to
access abuse-prone services. One conceivable approach would be to require
would-be IRC users, for instance, to register accounts if they wanted to
-access the IRC network from Tor. In practise this would not
+access the IRC network from Tor. In practice this would not
significantly impede abuse if creating new accounts were easily automatable;
this is why services use IP blocking. In order to deter abuse, pseudonymous
identities need to require a significant switching cost in resources or human
@@ -1454,7 +1457,8 @@ network: as Tor grows more popular, other groups who need an overlay
network on the Internet are starting to adapt Tor to their needs.
%
Second, Tor is only one of many components that preserve privacy online.
-To keep identifying information out of application traffic, someone must build
+For applications where it is desirable to
+keep identifying information out of application traffic, someone must build
more and better protocol-aware proxies that are usable by ordinary people.
%
Third, we need to gain a reputation for social good, and learn how to