mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-28 06:13:31 +01:00
Spell checkers are smarter than we are
svn:r762
This commit is contained in:
parent
bfa8831c18
commit
b449d65ca6
@ -1479,8 +1479,8 @@ an attacker who learns a node's identity key can replace that node
|
|||||||
indefinitely by sending new forged descriptors to the directory servers.
|
indefinitely by sending new forged descriptors to the directory servers.
|
||||||
|
|
||||||
\emph{Iterated compromise.} A roving adversary who can
|
\emph{Iterated compromise.} A roving adversary who can
|
||||||
compromise ORs (by system intrusion, legal coersion, or extralegal
|
compromise ORs (by system intrusion, legal coercion, or extralegal
|
||||||
coersion) could march down the circuit compromising the
|
coercion) could march down the circuit compromising the
|
||||||
nodes until he reaches the end. Unless the adversary can complete
|
nodes until he reaches the end. Unless the adversary can complete
|
||||||
this attack within the lifetime of the circuit, however, the ORs
|
this attack within the lifetime of the circuit, however, the ORs
|
||||||
will have discarded the necessary information before the attack can
|
will have discarded the necessary information before the attack can
|
||||||
@ -1528,7 +1528,7 @@ anonymity of the endpoints of a circuit by its observations, a
|
|||||||
hostile node must be immediately adjacent to that endpoint.
|
hostile node must be immediately adjacent to that endpoint.
|
||||||
If an adversary is able to
|
If an adversary is able to
|
||||||
run multiple ORs, and is able to persuade the directory servers
|
run multiple ORs, and is able to persuade the directory servers
|
||||||
that those ORs are trustworthy and independant, then occasionally
|
that those ORs are trustworthy and independent, then occasionally
|
||||||
some user will choose one of those ORs for the start and another
|
some user will choose one of those ORs for the start and another
|
||||||
as the end of a circuit. When this happens, the user's
|
as the end of a circuit. When this happens, the user's
|
||||||
anonymity is compromised for those streams. If an adversary can
|
anonymity is compromised for those streams. If an adversary can
|
||||||
@ -1572,7 +1572,7 @@ will result in a different negotiated session key, and so the rest
|
|||||||
of the recorded session can't be used.
|
of the recorded session can't be used.
|
||||||
|
|
||||||
\emph{Smear attacks.} An attacker could use the Tor network to
|
\emph{Smear attacks.} An attacker could use the Tor network to
|
||||||
engage in socially dissapproved acts, so as to try to bring the
|
engage in socially disapproved acts, so as to try to bring the
|
||||||
entire network into disrepute and get its operators to shut it down.
|
entire network into disrepute and get its operators to shut it down.
|
||||||
Exit policies can help reduce the possibilities for abuse, but
|
Exit policies can help reduce the possibilities for abuse, but
|
||||||
ultimately, the network will require volunteers who can tolerate
|
ultimately, the network will require volunteers who can tolerate
|
||||||
|
Loading…
Reference in New Issue
Block a user