# [or-cvs] r23170: {projects} clean up the article and prep for publication. (projects/articles)

Andrew Lewman andrew at torproject.org
Mon Sep 13 17:12:09 UTC 2010

Author: phobos
Date: 2010-09-13 17:12:09 +0000 (Mon, 13 Sep 2010)
New Revision: 23170

Modified:
projects/articles/circumvention-features.tex
Log:
clean up the article and prep for publication.

Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex	2010-09-12 14:47:29 UTC (rev 23169)
+++ projects/articles/circumvention-features.tex	2010-09-13 17:12:09 UTC (rev 23170)
@@ -1,4 +1,4 @@
-\documentclass[11pt,letterpaper]{ltxdoc}
+\documentclass[11pt,letterpaper]{report}
\usepackage[utf8x]{inputenc}
\usepackage{ucs}
\usepackage{amsmath}
@@ -12,17 +12,15 @@
\fancyfoot[C]{\hrulefill \\ The Tor Project, Inc.\\  969 Main Street, Suite 206, Walpole, MA 02081-2972 USA\\ https://www.torproject.org/}
-\title{}
-\date{}
+\author{Roger Dingledine \\ The Tor Project}
+\title{Ten desired properties for Internet circumvention tools \\
+\includegraphics[width=5cm,keepaspectratio=true]{../presentations/images/2009-oval_sticker_new.png}}
+\date{\today}
\begin{document}
-\parbox{5cm}{\sloppy \today \\[1cm]Ten things to look for in tools that circumvent Internet censorship}
-\hspace{5cm}
-\parbox{5cm}{\sloppy
-\begin{flushright}
-\includegraphics[width=5cm,keepaspectratio=true]{../presentations/images/2009-oval_sticker_new.png}
-\end{flushright}
-}
+\maketitle
+\tableofcontents \newpage

+\section*{Introduction}
As more countries crack down on Internet use, people around the world
are turning to anti-censorship software that lets them reach blocked
websites. Many types of software, also known as circumvention tools,
@@ -36,14 +34,6 @@
I've chosen the order of features based on ease of presentation; so you
shouldn't conclude the first feature is the most critical.

-One caveat to start out: I'm an inventor and developer of a tool called
-Tor that is used both for privacy and for circumvention. While my bias
-for more secure tools like Tor shows through here based on which features
-I've picked (meaning I raise issues that highlight Tor's strengths and
-that some other tool developers may not care about), I have also tried
-to include features that other tool developers consider important.
-Introduction
-
Internet-based circumvention software consists of two components: a
relaying component and a discovery component. The relaying component is
what establishes a connection to some server or proxy, handles encryption,
@@ -58,8 +48,15 @@
relaying components, made up of multiple proxies, multiple layers of
encryption, and so on.

-\section{Diverse set of users}
+One caveat to start out: I'm an inventor and developer of a tool called
+Tor that is used both for privacy and for circumvention. While my bias
+for more secure tools like Tor shows through here based on which features
+I've picked (meaning I raise issues that highlight Tor's strengths and
+that some other tool developers may not care about), I have also tried
+to include features that other tool developers consider important.

+\section*{Diverse set of users}
+
One of the simplest questions you can ask when looking at a circumvention
tool is who else uses it. A wide variety of users means that if somebody
finds out you are using the software, they can't conclude much about
@@ -80,7 +77,7 @@
into some languages but not others can also direct (or hamper) which
users it will attract.

The next question to consider is whether the tool operator artificially
restricts which countries can use it. For several years, the commercial
@@ -95,7 +92,7 @@
on the other hand, if you're in Saudi Arabia and need a circumvention
tool, some otherwise useful tools are not an option for you.

-\section{Sustainable network and software development}
+\section*{Sustainable network and software development}

If you're going to invest the time to figure out how to use a given tool,
you want to make sure it's going to be around for a while. There are
@@ -133,7 +130,7 @@
a tool uses can help you predict what problems it might encounter in
the future.

-\section{Open design}
+\section*{Open design}

The first step to transparency and reusability of the tool's software and
design is to distribute the software (not just the client-side software,
@@ -176,7 +173,7 @@
projects and the field of circumvention development as a whole moves
forward too slowly.

-\section{Decentralized architecture}
+\section*{Decentralized architecture}

Another feature to look for in a circumvention tool is whether its network
is centralized or decentralized. A centralized tool puts all of its users'
@@ -216,7 +213,7 @@
over the past few years, large databases of personal information tend
to end up more public than we'd like.

-\section{Keeps you safe from websites too}
+\section*{Keeps you safe from websites too}

Privacy isn't only about whether the tool operator can log your
requests. It's also about whether the websites you visit can recognize
@@ -254,7 +251,7 @@
other tools just let through any active content, meaning it's trivial

-\section{Doesn't promise to magically encrypt the entire Internet}
+\section*{Doesn't promise to magically encrypt the entire Internet}

I should draw a distinction here between encryption and privacy. Most
circumvention tools (all but the really simple ones like open proxies)
@@ -288,7 +285,7 @@
strangers who get to see your entire traffic profile (and link you to
it). Anybody who promises "100\% security" is selling something.

-\section{Fast}
+\section*{Fast}

The next feature you might look for in a circumvention tool is speed. Some
tools tend to be consistently fast, some consistently slow, and some
@@ -316,7 +313,7 @@
downside is that the network is often overwhelmed by users doing bulk
transfer.

-\section{Easy to get the software and updates}
+\section*{Easy to get the software and updates}

Once a circumvention tool becomes well-known, its website is going to get
blocked. If it's impossible to get a copy of the tool itself, who cares
@@ -354,7 +351,7 @@
September of 2009, and tens of thousands of users seamlessly moved from
the public relays to bridges.

-\section{Doesn't promote itself as a circumvention tool}
+\section*{Doesn't promote itself as a circumvention tool}

Many circumvention tools launch with a huge media splash. The media loves
this approach, and they end up with front page articles like "American
@@ -380,7 +377,7 @@
and civil liberties tool rather than a circumvention tool. Alas, this
balancing act is tough to maintain in the face of increasing popularity.

-\section{Conclusion}
+\section*{Conclusion}