point to Stephen Rollyson's paper on trading off anonymity for speed in path choice. this is good stuff that needs more work.
Roger Dingledine

Roger Dingledine commited on 2007-03-19 10:46:59
Zeige 1 geänderte Dateien mit 11 Einfügungen und 2 Löschungen.

... ...
@@ -263,6 +263,13 @@ Unfortunately, to accurately predict whether a given Alice, entry,
263 263
 exit, Bob quad will be dangerous, we need to download an entire Internet
264 264
 routing zone and perform expensive operations on it. Are there practical
265 265
 approximations, such as avoiding IP addresses in the same /8 network?</li>
266
+<li>Other research questions regarding geographic diversity consider
267
+the tradeoff between choosing an efficient circuit and choosing a random
268
+circuit. Look at at Stephen Rollyson's <a
269
+href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">position
270
+paper</a> on how to discard particularly slow choices without hurting
271
+anonymity "too" much. This line of reasoning needs more work and more
272
+thinking, but it seems very promising.</li>
266 273
 <li>Tor doesn't work very well when servers have asymmetric bandwidth
267 274
 (e.g. cable or DSL). Because Tor has separate TCP connections between
268 275
 each hop, if the incoming bytes are arriving just fine and the outgoing
... ...
@@ -285,13 +292,15 @@ overhaul if the results are good.</li>
285 292
 <li>To let dissidents in remote countries use Tor without being blocked
286 293
 at their country's firewall, we need a way to get tens of thousands of
287 294
 relays, not just a few hundred. We can imagine a Tor client GUI that
288
-has a "help China" button at the top that opens a port and relays a
295
+has a "Tor for Freedom" button at the top that opens a port and relays a
289 296
 few KB/s of traffic into the Tor network. (A few KB/s shouldn't be too
290 297
 much hassle, and there are few abuse issues since they're not being exit
291 298
 nodes.) But how do we distribute a list of these volunteer clients to the
292 299
 good dissidents in an automated way that doesn't let the country-level
293 300
 firewalls intercept and enumerate them? Probably needs to work on a
294
-human-trust level. See our <a
301
+human-trust level. See our <a href="<page documentation>#DesignDoc">early
302
+blocking-resistance design document</a> and our
303
+<a
295 304
 href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#China">FAQ
296 305
 entry</a> on this, and then read the <a
297 306
 href="http://freehaven.net/anonbib/topic.html#Communications_20Censorship">censorship
298 307