Added censorhip section to Adversary Model authored by Richard Pospesel's avatar Richard Pospesel
...@@ -251,9 +251,9 @@ Let's start with the goals. ...@@ -251,9 +251,9 @@ Let's start with the goals.
The adversary may want to correlate user identities or sessions across multiple remote services. The adversary may want to correlate user identities or sessions across multiple remote services.
For instance, advertising networks may wish to know that a user who visited `site-x.com` is the same user that visited `site-y.com` to serve them targeted ads while law-enforcement may wish to associate anonymous activity on `site-b.com` with a known identity on `size-a.com` to build a criminal case. For instance, advertising networks may wish to know that a user who visited `site-x.com` is the same user that visited `site-y.com` to serve them targeted ads while law-enforcement may wish to associate anonymous activity on `site-b.com` with a known identity on `size-a.com` to build a criminal case.
7. **Censorship** 5. **Censorship**
`TODO: section about censorship goals` The adversary may wish to block access to particular websites or to the entire Tor Network.
### 3.2 Adversary Capabilities - Positioning ### 3.2 Adversary Capabilities - Positioning
... ...
......