diff options
author | Roger Dingledine <arma@torproject.org> | 2005-02-09 08:47:16 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2005-02-09 08:47:16 +0000 |
commit | aca8c362bf365072f08f91c5d8d1400cc6bd3529 (patch) | |
tree | 982227596084618171e6a80e5e0d75619bc2fc0c /doc/design-paper | |
parent | 10b6f18f302d3a655a6b607d86223eba9fb5a763 (diff) | |
download | tor-aca8c362bf365072f08f91c5d8d1400cc6bd3529.tar tor-aca8c362bf365072f08f91c5d8d1400cc6bd3529.tar.gz |
tighten related work
svn:r3597
Diffstat (limited to 'doc/design-paper')
-rw-r--r-- | doc/design-paper/challenges.tex | 33 |
1 files changed, 13 insertions, 20 deletions
diff --git a/doc/design-paper/challenges.tex b/doc/design-paper/challenges.tex index f2b47837a..704928559 100644 --- a/doc/design-paper/challenges.tex +++ b/doc/design-paper/challenges.tex @@ -114,9 +114,6 @@ compare Tor to other low-latency anonymity designs. %details on the design, assumptions, and security arguments, we refer %the reader to the Tor design paper~\cite{tor-design}. -%\medskip -\noindent -{\bf How Tor works.} Tor provides \emph{forward privacy}, so that users can connect to Internet sites without revealing their logical or physical locations to those sites or to observers. It also provides \emph{location-hidden @@ -362,10 +359,19 @@ don't have built-in encryption and authentication, such as unencrypted HTTP or chat, and it requires no modification of those services. \subsection{Related work} -Tor is not the only anonymity system that aims to be practical and useful. -Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured -open proxies around the Internet, can provide good -performance and some security against a weaker attacker. The Java +Tor differs from other deployed systems for traffic analysis resistance +in its security and flexibility. Mix networks such as +Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design} +gain the highest degrees of anonymity at the expense of introducing highly +variable delays, making them unsuitable for applications such as web +browsing. Commercial single-hop +proxies~\cite{anonymizer} can provide good performance, but +a single compromise can expose all users' traffic, and a single-point +eavesdropper can perform traffic analysis on the entire network. +%Also, their proprietary implementations place any infrastructure that +%depends on these single-hop solutions at the mercy of their providers' +%financial health as well as network security. +The Java Anon Proxy~\cite{web-mix} provides similar functionality to Tor but handles only web browsing rather than arbitrary TCP\@. %Some peer-to-peer file-sharing overlay networks such as @@ -387,19 +393,6 @@ enough to contain a MorphMix experiment. We direct the interested reader to~\cite{tor-design} for a more in-depth review of related work. -Tor also differs from other deployed systems for traffic analysis resistance -in its security and flexibility. Mix networks such as -Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design} -gain the highest degrees of anonymity at the expense of introducing highly -variable delays, thus making them unsuitable for applications such as web -browsing. Commercial single-hop -proxies~\cite{anonymizer} present a single point of failure, where -a single compromise can expose all users' traffic, and a single-point -eavesdropper can perform traffic analysis on the entire network. -Also, their proprietary implementations place any infrastructure that -depends on these single-hop solutions at the mercy of their providers' -financial health as well as network security. - %XXXX six-four. crowds. i2p. %XXXX |