Small changes to abstract and intro

svn:r615
This commit is contained in:
Paul Syverson 2003-10-17 20:56:59 +00:00
parent f36e2cbd67
commit 96f47a3eca

View File

@ -51,7 +51,8 @@
\begin{abstract} \begin{abstract}
We present Tor, a connection-based low-latency anonymous communication We present Tor, a connection-based low-latency anonymous communication
system which addresses many limitations in the original onion routing design. system. It is intended as an update and replacement for onion routing
and addresses many limitations in the original onion routing design.
Tor works in a real-world Internet environment, Tor works in a real-world Internet environment,
requires little synchronization or coordination between nodes, and requires little synchronization or coordination between nodes, and
protects against known anonymity-breaking attacks as well protects against known anonymity-breaking attacks as well
@ -76,7 +77,7 @@ is sent in fixed-size \emph{cells}, which are unwrapped by a symmetric key
at each node, revealing the downstream node. The original onion routing at each node, revealing the downstream node. The original onion routing
project published several design and analysis papers project published several design and analysis papers
\cite{or-jsac98,or-discex00,or-ih96,or-pet02}. While there was briefly \cite{or-jsac98,or-discex00,or-ih96,or-pet02}. While there was briefly
a network of about a dozen nodes at three widely distributed sites, a wide area onion routing network,
the only long-running and publicly accessible the only long-running and publicly accessible
implementation was a fragile proof-of-concept that ran on a single implementation was a fragile proof-of-concept that ran on a single
machine. Many critical design and deployment issues were never implemented, machine. Many critical design and deployment issues were never implemented,
@ -460,7 +461,7 @@ The main differences are:
acknowledge its existence. acknowledge its existence.
\SubSubSection{Integration with user applications} \subsubsection{Integration with user applications}
\Section{Maintaining anonymity sets} \Section{Maintaining anonymity sets}
\label{sec:maintaining-anonymity} \label{sec:maintaining-anonymity}