Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
T
Tor
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Wiki
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Package registry
Container Registry
Model registry
Operate
Environments
Terraform modules
Monitor
Incidents
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Benjamin J. Thompson
Tor
Commits
54ec1925
Commit
54ec1925
authored
18 years ago
by
Nick Mathewson
Browse files
Options
Downloads
Patches
Plain Diff
r9292@totoro: nickm | 2006-11-12 16:33:36 -0500
A couple of small tweaks; add infranet reference. svn:r8938
parent
450016f4
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
doc/design-paper/blocking.tex
+10
-6
10 additions, 6 deletions
doc/design-paper/blocking.tex
doc/design-paper/tor-design.bib
+9
-0
9 additions, 0 deletions
doc/design-paper/tor-design.bib
with
19 additions
and
6 deletions
doc/design-paper/blocking.tex
+
10
−
6
View file @
54ec1925
...
...
@@ -82,13 +82,16 @@ by blocking all the server IP addresses in the directory, or by filtering
based on the signature of the Tor TLS handshake. Here we describe an
extended design that builds upon the current Tor network to provide an
anonymizing
network that
also
resists
this blocking. Specifically,
S
ection~
\ref
{
sec:adversary
}
discuss
es
our threat model---that is,
network that resists
censorship as well as anonymity-breaking attacks.
In s
ection~
\ref
{
sec:adversary
}
we
discuss our threat model---that is,
the assumptions we make about our adversary. Section~
\ref
{
sec:current-tor
}
describes the components of the current Tor design and how they can be
leveraged for a new blocking-resistant design. Section~
\ref
{
sec:related
}
explains the features and drawbacks of the currently deployed solutions;
and ...
explains the features and drawbacks of the currently deployed solutions.
In sections~
\ref
{
sec:bridges
}
through~
\ref
{
sec:discovery
}
, we explore the
components of our designs in detail. Section~
\ref
{
sec:security
}
considers
security implications; .....
%write the rest.
% The other motivation is for places where we're concerned they will
% try to enumerate a list of Tor users. So even if they're not blocking
...
...
@@ -152,7 +155,8 @@ We assume that the attackers' goals are somewhat complex.
blocked information is also not a goal, given the broadness of most
censorship regimes. This seems borne out by fact.
\footnote
{
So far in places
like China, the authorities mainly go after people who publish materials
and coordinate organized movements~
\cite
{
mackinnon
}
. If they find that a
and coordinate organized movements~
\cite
{
mackinnon-personal
}
.
If they find that a
user happens to be reading a site that should be blocked, the typical
response is simply to block the site. Of course, even with an encrypted
connection, the adversary may be able to distinguish readers from
...
...
@@ -230,7 +234,7 @@ Section~\ref{subsec:trust-chain} for discussion on helping the user
confirm that he has a genuine version and that he can connect to the
real Tor network.
\section
{
Components of
the current Tor design
}
\section
{
Adapting
the current Tor design
to anticensorship
}
\label
{
sec:current-tor
}
Tor is popular and sees a lot of use. It's the largest anonymity
...
...
This diff is collapsed.
Click to expand it.
doc/design-paper/tor-design.bib
+
9
−
0
View file @
54ec1925
...
...
@@ -1365,6 +1365,15 @@ Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
note
=
{\url{http://prisms.cs.umass.edu/brian/pubs/bissias.liberatore.pet.2005.pdf}}
,
}
@InProceedings
{
infranet
,
author
=
{Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}
,
title
=
{Infranet: Circumventing Web Censorship and Surveillance}
,
booktitle
=
{Proceedings of the 11th USENIX Security Symposium}
,
year
=
{2002}
,
month
=
{August}
,
note
=
{\url{http://nms.lcs.mit.edu/~feamster/papers/usenixsec2002.pdf}}
,
}
%%% Local Variables:
%%% mode: latex
%%% TeX-master: "tor-design"
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment