Added censorhip section to Adversary Model authored by Richard Pospesel's avatar Richard Pospesel
......@@ -251,9 +251,9 @@ Let's start with the goals.
The adversary may want to correlate user identities or sessions across multiple remote services.
For instance, advertising networks may wish to know that a user who visited `site-x.com` is the same user that visited `site-y.com` to serve them targeted ads while law-enforcement may wish to associate anonymous activity on `site-b.com` with a known identity on `size-a.com` to build a criminal case.
7. **Censorship**
5. **Censorship**
`TODO: section about censorship goals`
The adversary may wish to block access to particular websites or to the entire Tor Network.
### 3.2 Adversary Capabilities - Positioning
......
......