[or-cvs] some more organization

Roger Dingledine arma at seul.org
Wed Jan 26 00:39:06 UTC 2005


Update of /home2/or/cvsroot/tor/doc/design-paper
In directory moria.mit.edu:/home2/arma/work/onion/cvs/tor/doc/design-paper

Modified Files:
	challenges.tex 
Log Message:
some more organization


Index: challenges.tex
===================================================================
RCS file: /home2/or/cvsroot/tor/doc/design-paper/challenges.tex,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
--- challenges.tex	25 Jan 2005 10:38:09 -0000	1.6
+++ challenges.tex	26 Jan 2005 00:39:03 -0000	1.7
@@ -169,10 +169,17 @@
 \section{Crossroads: Policy issues}
 \label{sec:crossroads-policy}
 
+\subsection{Tor and blacklists}
+
+Takedowns and efnet abuse and wikipedia complaints and irc
+networks.
+
+\subsection{Tor and file-sharing}
+
 Bittorrent and dmca. Should we add an IDS to autodetect protocols and
-snipe them? Takedowns and efnet abuse and wikipedia complaints and irc
-networks. Should we allow revocation of anonymity if a threshold of
-servers want to?
+snipe them?
+
+\subsection{Image and sustainability}
 
 Image: substantial non-infringing uses. Image is a security parameter,
 since it impacts user base and perceived sustainability.
@@ -185,8 +192,13 @@
 continued money, and they periodically ask what they will do when it
 dries up.
 
-How much should Tor aim to do? Applications that leak data. We can say
-they're not our problem, but they're somebody's problem.
+\subsection{Other}
+
+Tor's scope: How much should Tor aim to do? Applications that leak
+data. We can say they're not our problem, but they're somebody's problem.
+
+Should we allow revocation of anonymity if a threshold of
+servers want to?
 
 Logging. Making logs not revealing. A happy coincidence that verbose
 logging is our \#2 performance bottleneck. Is there a way to detect
@@ -279,9 +291,13 @@
 %\label{sec:crossroads-scaling}
 %P2P + anonymity issues:
 
-Incentives. Copy the page I wrote for the NSF proposal, and maybe extend
+\subsection{Incentives}
+
+Copy the page I wrote for the NSF proposal, and maybe extend
 it if we're feeling smart.
 
+\subsection{Usability}
+
 Usability: fc03 paper was great, except the lower latency you are the
 less useful it seems it is.
 A Tor gui, how jap's gui is nice but does not reflect the security
@@ -308,10 +324,14 @@
 style doesn't work because we don't want just *one* path. Point to
 Geoff's stuff.
 
+\subsection{ISP-class adversaries}
+
 Routing-zones. It seems that our threat model comes down to diversity and
 dispersal. But hard for Alice to know how to act. Many questions remain.
 
-The China problem. We have lots of users in Iran and similar (we stopped
+\subsection{The China problem}
+
+We have lots of users in Iran and similar (we stopped
 logging, so it's hard to know now, but many Persian sites on how to use
 Tor), and they seem to be doing ok. But the China problem is bigger. Cite
 Stefan's paper, and talk about how we need to route through clients,



More information about the tor-commits mailing list