Skip to content
Snippets Groups Projects
Commit aca8c362 authored by Roger Dingledine's avatar Roger Dingledine
Browse files

tighten related work

svn:r3597
parent 10b6f18f
No related branches found
No related tags found
No related merge requests found
......@@ -114,9 +114,6 @@ compare Tor to other low-latency anonymity designs.
%details on the design, assumptions, and security arguments, we refer
%the reader to the Tor design paper~\cite{tor-design}.
%\medskip
\noindent
{\bf How Tor works.}
Tor provides \emph{forward privacy}, so that users can connect to
Internet sites without revealing their logical or physical locations
to those sites or to observers. It also provides \emph{location-hidden
......@@ -362,10 +359,19 @@ don't have built-in encryption and authentication, such as unencrypted
HTTP or chat, and it requires no modification of those services.
\subsection{Related work}
Tor is not the only anonymity system that aims to be practical and useful.
Commercial single-hop proxies~\cite{anonymizer}, as well as unsecured
open proxies around the Internet, can provide good
performance and some security against a weaker attacker. The Java
Tor differs from other deployed systems for traffic analysis resistance
in its security and flexibility. Mix networks such as
Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design}
gain the highest degrees of anonymity at the expense of introducing highly
variable delays, making them unsuitable for applications such as web
browsing. Commercial single-hop
proxies~\cite{anonymizer} can provide good performance, but
a single compromise can expose all users' traffic, and a single-point
eavesdropper can perform traffic analysis on the entire network.
%Also, their proprietary implementations place any infrastructure that
%depends on these single-hop solutions at the mercy of their providers'
%financial health as well as network security.
The Java
Anon Proxy~\cite{web-mix} provides similar functionality to Tor but
handles only web browsing rather than arbitrary TCP\@.
%Some peer-to-peer file-sharing overlay networks such as
......@@ -387,19 +393,6 @@ enough to contain a MorphMix experiment.
We direct the interested reader
to~\cite{tor-design} for a more in-depth review of related work.
Tor also differs from other deployed systems for traffic analysis resistance
in its security and flexibility. Mix networks such as
Mixmaster~\cite{mixmaster-spec} or its successor Mixminion~\cite{minion-design}
gain the highest degrees of anonymity at the expense of introducing highly
variable delays, thus making them unsuitable for applications such as web
browsing. Commercial single-hop
proxies~\cite{anonymizer} present a single point of failure, where
a single compromise can expose all users' traffic, and a single-point
eavesdropper can perform traffic analysis on the entire network.
Also, their proprietary implementations place any infrastructure that
depends on these single-hop solutions at the mercy of their providers'
financial health as well as network security.
%XXXX six-four. crowds. i2p.
%XXXX
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment