Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Package registry
Container registry
Model registry
Operate
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Hiro
Tor
Commits
aca8c362
Commit
aca8c362
authored
20 years ago
by
Roger Dingledine
Browse files
Options
Downloads
Patches
Plain Diff
tighten related work
svn:r3597
parent
10b6f18f
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
doc/design-paper/challenges.tex
+13
-20
13 additions, 20 deletions
doc/design-paper/challenges.tex
with
13 additions
and
20 deletions
doc/design-paper/challenges.tex
+
13
−
20
View file @
aca8c362
...
...
@@ -114,9 +114,6 @@ compare Tor to other low-latency anonymity designs.
%details on the design, assumptions, and security arguments, we refer
%the reader to the Tor design paper~\cite{tor-design}.
%\medskip
\noindent
{
\bf
How Tor works.
}
Tor provides
\emph
{
forward privacy
}
, so that users can connect to
Internet sites without revealing their logical or physical locations
to those sites or to observers. It also provides
\emph
{
location-hidden
...
...
@@ -362,10 +359,19 @@ don't have built-in encryption and authentication, such as unencrypted
HTTP or chat, and it requires no modification of those services.
\subsection
{
Related work
}
Tor is not the only anonymity system that aims to be practical and useful.
Commercial single-hop proxies~
\cite
{
anonymizer
}
, as well as unsecured
open proxies around the Internet, can provide good
performance and some security against a weaker attacker. The Java
Tor differs from other deployed systems for traffic analysis resistance
in its security and flexibility. Mix networks such as
Mixmaster~
\cite
{
mixmaster-spec
}
or its successor Mixminion~
\cite
{
minion-design
}
gain the highest degrees of anonymity at the expense of introducing highly
variable delays, making them unsuitable for applications such as web
browsing. Commercial single-hop
proxies~
\cite
{
anonymizer
}
can provide good performance, but
a single compromise can expose all users' traffic, and a single-point
eavesdropper can perform traffic analysis on the entire network.
%Also, their proprietary implementations place any infrastructure that
%depends on these single-hop solutions at the mercy of their providers'
%financial health as well as network security.
The Java
Anon Proxy~
\cite
{
web-mix
}
provides similar functionality to Tor but
handles only web browsing rather than arbitrary TCP
\@
.
%Some peer-to-peer file-sharing overlay networks such as
...
...
@@ -387,19 +393,6 @@ enough to contain a MorphMix experiment.
We direct the interested reader
to~
\cite
{
tor-design
}
for a more in-depth review of related work.
Tor also differs from other deployed systems for traffic analysis resistance
in its security and flexibility. Mix networks such as
Mixmaster~
\cite
{
mixmaster-spec
}
or its successor Mixminion~
\cite
{
minion-design
}
gain the highest degrees of anonymity at the expense of introducing highly
variable delays, thus making them unsuitable for applications such as web
browsing. Commercial single-hop
proxies~
\cite
{
anonymizer
}
present a single point of failure, where
a single compromise can expose all users' traffic, and a single-point
eavesdropper can perform traffic analysis on the entire network.
Also, their proprietary implementations place any infrastructure that
depends on these single-hop solutions at the mercy of their providers'
financial health as well as network security.
%XXXX six-four. crowds. i2p.
%XXXX
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment