[or-cvs] r23170: {projects} clean up the article and prep for publication. (projects/articles)

Andrew Lewman andrew at torproject.org
Mon Sep 13 17:12:09 UTC 2010


Author: phobos
Date: 2010-09-13 17:12:09 +0000 (Mon, 13 Sep 2010)
New Revision: 23170

Modified:
   projects/articles/circumvention-features.tex
Log:
clean up the article and prep for publication.


Modified: projects/articles/circumvention-features.tex
===================================================================
--- projects/articles/circumvention-features.tex	2010-09-12 14:47:29 UTC (rev 23169)
+++ projects/articles/circumvention-features.tex	2010-09-13 17:12:09 UTC (rev 23170)
@@ -1,4 +1,4 @@
-\documentclass[11pt,letterpaper]{ltxdoc}
+\documentclass[11pt,letterpaper]{report}
 \usepackage[utf8x]{inputenc}
 \usepackage{ucs}
 \usepackage{amsmath}
@@ -12,17 +12,15 @@
 \renewcommand{\headrulewidth}{0pt}
 \fancyhead{}
 \fancyfoot[C]{\hrulefill \\ The Tor Project, Inc.\\  969 Main Street, Suite 206, Walpole, MA 02081-2972 USA\\ https://www.torproject.org/}
-\title{}
-\date{}
+\author{Roger Dingledine \\ The Tor Project}
+\title{Ten desired properties for Internet circumvention tools \\ 
+\includegraphics[width=5cm,keepaspectratio=true]{../presentations/images/2009-oval_sticker_new.png}}
+\date{\today}
 \begin{document}
-\parbox{5cm}{\sloppy \today \\[1cm]Ten things to look for in tools that circumvent Internet censorship}
-\hspace{5cm}
-\parbox{5cm}{\sloppy 
-\begin{flushright}
-\includegraphics[width=5cm,keepaspectratio=true]{../presentations/images/2009-oval_sticker_new.png}
-\end{flushright}
-}
+\maketitle
+\tableofcontents \newpage
 
+\section*{Introduction}
 As more countries crack down on Internet use, people around the world
 are turning to anti-censorship software that lets them reach blocked
 websites. Many types of software, also known as circumvention tools,
@@ -36,14 +34,6 @@
 I've chosen the order of features based on ease of presentation; so you
 shouldn't conclude the first feature is the most critical.
 
-One caveat to start out: I'm an inventor and developer of a tool called
-Tor that is used both for privacy and for circumvention. While my bias
-for more secure tools like Tor shows through here based on which features
-I've picked (meaning I raise issues that highlight Tor's strengths and
-that some other tool developers may not care about), I have also tried
-to include features that other tool developers consider important.
-Introduction
-
 Internet-based circumvention software consists of two components: a
 relaying component and a discovery component. The relaying component is
 what establishes a connection to some server or proxy, handles encryption,
@@ -58,8 +48,15 @@
 relaying components, made up of multiple proxies, multiple layers of
 encryption, and so on.
 
-\section{Diverse set of users}
+One caveat to start out: I'm an inventor and developer of a tool called
+Tor that is used both for privacy and for circumvention. While my bias
+for more secure tools like Tor shows through here based on which features
+I've picked (meaning I raise issues that highlight Tor's strengths and
+that some other tool developers may not care about), I have also tried
+to include features that other tool developers consider important.
 
+\section*{Diverse set of users}
+
 One of the simplest questions you can ask when looking at a circumvention
 tool is who else uses it. A wide variety of users means that if somebody
 finds out you are using the software, they can't conclude much about
@@ -80,7 +77,7 @@
 into some languages but not others can also direct (or hamper) which
 users it will attract.
 
-\section{Works in your country}
+\section*{Works in your country}
 
 The next question to consider is whether the tool operator artificially
 restricts which countries can use it. For several years, the commercial
@@ -95,7 +92,7 @@
 on the other hand, if you're in Saudi Arabia and need a circumvention
 tool, some otherwise useful tools are not an option for you.
 
-\section{Sustainable network and software development}
+\section*{Sustainable network and software development}
 
 If you're going to invest the time to figure out how to use a given tool,
 you want to make sure it's going to be around for a while. There are
@@ -133,7 +130,7 @@
 a tool uses can help you predict what problems it might encounter in
 the future.
 
-\section{Open design}
+\section*{Open design}
 
 The first step to transparency and reusability of the tool's software and
 design is to distribute the software (not just the client-side software,
@@ -176,7 +173,7 @@
 projects and the field of circumvention development as a whole moves
 forward too slowly.
 
-\section{Decentralized architecture}
+\section*{Decentralized architecture}
 
 Another feature to look for in a circumvention tool is whether its network
 is centralized or decentralized. A centralized tool puts all of its users'
@@ -216,7 +213,7 @@
 over the past few years, large databases of personal information tend
 to end up more public than we'd like.
 
-\section{Keeps you safe from websites too}
+\section*{Keeps you safe from websites too}
 
 Privacy isn't only about whether the tool operator can log your
 requests. It's also about whether the websites you visit can recognize
@@ -254,7 +251,7 @@
 other tools just let through any active content, meaning it's trivial
 to unmask their users.
 
-\section{Doesn't promise to magically encrypt the entire Internet}
+\section*{Doesn't promise to magically encrypt the entire Internet}
 
 I should draw a distinction here between encryption and privacy. Most
 circumvention tools (all but the really simple ones like open proxies)
@@ -288,7 +285,7 @@
 strangers who get to see your entire traffic profile (and link you to
 it). Anybody who promises "100\% security" is selling something.
 
-\section{Fast}
+\section*{Fast}
 
 The next feature you might look for in a circumvention tool is speed. Some
 tools tend to be consistently fast, some consistently slow, and some
@@ -316,7 +313,7 @@
 downside is that the network is often overwhelmed by users doing bulk
 transfer.
 
-\section{Easy to get the software and updates}
+\section*{Easy to get the software and updates}
 
 Once a circumvention tool becomes well-known, its website is going to get
 blocked. If it's impossible to get a copy of the tool itself, who cares
@@ -354,7 +351,7 @@
 September of 2009, and tens of thousands of users seamlessly moved from
 the public relays to bridges.
 
-\section{Doesn't promote itself as a circumvention tool}
+\section*{Doesn't promote itself as a circumvention tool}
 
 Many circumvention tools launch with a huge media splash. The media loves
 this approach, and they end up with front page articles like "American
@@ -380,7 +377,7 @@
 and civil liberties tool rather than a circumvention tool. Alas, this
 balancing act is tough to maintain in the face of increasing popularity.
 
-\section{Conclusion}
+\section*{Conclusion}
 
 This article explains some of the issues you should consider when
 evaluating the strengths and weaknesses of circumvention tools. I've



More information about the tor-commits mailing list