[or-cvs] add html version of tor-design, including 150% png"s export...

Roger Dingledine arma at seul.org
Tue May 18 16:02:41 UTC 2004

Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
Added Files:
	cell-struct.png interaction.png tor-design.html 
Log Message:
add html version of tor-design, including 150% png's exported from
xfig with "more scaling" magic on

plus new pdf for nick's typo fix

--- NEW FILE: cell-struct.png ---
(This appears to be a binary file; contents omitted.)

--- NEW FILE: interaction.png ---
(This appears to be a binary file; contents omitted.)

--- NEW FILE: tor-design.html ---
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
<html xmlns="http://www.w3.org/1999/xhtml">
<meta name="GENERATOR" content="TtH 3.59" />
 <style type="text/css"> div.p { margin-top: 7pt;}</style>
 <style type="text/css"><!--
 td div.comp { margin-top: -0.6ex; margin-bottom: -1ex;}
 td div.comb { margin-top: -0.6ex; margin-bottom: -.6ex;}
 td div.hrcomp { line-height: 0.9; margin-top: -0.8ex; margin-bottom: -1ex;}
 td div.norm {line-height:normal;}
 span.roman {font-family: serif; font-style: normal; font-weight: normal;} 
 span.overacc2 {position: relative;  left: .8em; top: -1.2ex;}
 span.overacc1 {position: relative;  left: .6em; top: -1.2ex;} --></style>

<title> Tor: The Second-Generation Onion Router </title>
[...2447 lines suppressed...]
        With 48 bits of digest per cell, the probability of an accidental
collision is far lower than the chance of hardware failure.
<div class="p"><!----></div>
<a name="tthFtNtAAD"></a><a href="#tthFrefAAD"><sup>3</sup></a>
Rather than rely on an external infrastructure, the Onion Routing network
can run the lookup service itself.  Our current implementation provides a
simple lookup system on the
directory servers.
<div class="p"><!----></div>
<a name="tthFtNtAAE"></a><a href="#tthFrefAAE"><sup>4</sup></a>Note that this fingerprinting
attack should not be confused with the much more complicated latency
attacks of&nbsp;[<a href="#back01" name="CITEback01">5</a>], which require a fingerprint of the latencies
of all circuits through the network, combined with those from the
network edges to the target user and the responder website.
<br /><br /><hr /><small>File translated from
T<sub><font size="-1">E</font></sub>X
by <a href="http://hutchinson.belmont.ma.us/tth/">
T<sub><font size="-1">T</font></sub>H</a>,
version 3.59.<br />On 18 May 2004, 10:45.</small>

Index: tor-design.pdf
RCS file: /home/or/cvsroot/doc/tor-design.pdf,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
Binary files /tmp/cvsIMwbnd and /tmp/cvs8o1Rbi differ

More information about the tor-commits mailing list