diff options
author | Paul Syverson <syverson@itd.nrl.navy.mil> | 2005-02-08 20:47:12 +0000 |
---|---|---|
committer | Paul Syverson <syverson@itd.nrl.navy.mil> | 2005-02-08 20:47:12 +0000 |
commit | 097f12dc7ae89d4a39d510875ea4c5b9ff6a5d1c (patch) | |
tree | 739c21fd739481f89f8d044c0bdf0580e7152a41 /doc/design-paper | |
parent | 1d569eb4928acf0c6fd1870b195f11d1efe4df8c (diff) | |
download | tor-097f12dc7ae89d4a39d510875ea4c5b9ff6a5d1c.tar tor-097f12dc7ae89d4a39d510875ea4c5b9ff6a5d1c.tar.gz |
A few more minor tweaks
svn:r3587
Diffstat (limited to 'doc/design-paper')
-rw-r--r-- | doc/design-paper/challenges.tex | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex index 9e2be6601..a27a1be7d 100644 --- a/doc/design-paper/challenges.tex +++ b/doc/design-paper/challenges.tex @@ -150,7 +150,10 @@ messaging server. Using ``rendezvous points'', other Tor users can connect to these hidden services, each without knowing the other's network identity. -Tor attempts to anonymize the transport layer, not the application layer, so +Tor attempts to anonymize the transport layer, not the application layer. +This is useful for applications such as ssh +where authenticated communication is desired. However, when anonymity from +those with whom we communicate is desired, application protocols that include personally identifying information need additional application-level scrubbing proxies, such as Privoxy~\cite{privoxy} for HTTP\@. Furthermore, Tor does not permit arbitrary @@ -761,7 +764,7 @@ tolerably well for them in practice. But of course, we would prefer that legitimate anonymous users be able to access abuse-prone services. One conceivable approach would be to require would-be IRC users, for instance, to register accounts if they wanted to -access the IRC network from Tor. In practise this would not +access the IRC network from Tor. In practice this would not significantly impede abuse if creating new accounts were easily automatable; this is why services use IP blocking. In order to deter abuse, pseudonymous identities need to require a significant switching cost in resources or human @@ -1454,7 +1457,8 @@ network: as Tor grows more popular, other groups who need an overlay network on the Internet are starting to adapt Tor to their needs. % Second, Tor is only one of many components that preserve privacy online. -To keep identifying information out of application traffic, someone must build +For applications where it is desirable to +keep identifying information out of application traffic, someone must build more and better protocol-aware proxies that are usable by ordinary people. % Third, we need to gain a reputation for social good, and learn how to |