Roger Dingledine commited on 2007-03-19 10:46:59
Zeige 1 geänderte Dateien mit 11 Einfügungen und 2 Löschungen.
| ... | ... |
@@ -263,6 +263,13 @@ Unfortunately, to accurately predict whether a given Alice, entry, |
| 263 | 263 |
exit, Bob quad will be dangerous, we need to download an entire Internet |
| 264 | 264 |
routing zone and perform expensive operations on it. Are there practical |
| 265 | 265 |
approximations, such as avoiding IP addresses in the same /8 network?</li> |
| 266 |
+<li>Other research questions regarding geographic diversity consider |
|
| 267 |
+the tradeoff between choosing an efficient circuit and choosing a random |
|
| 268 |
+circuit. Look at at Stephen Rollyson's <a |
|
| 269 |
+href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">position |
|
| 270 |
+paper</a> on how to discard particularly slow choices without hurting |
|
| 271 |
+anonymity "too" much. This line of reasoning needs more work and more |
|
| 272 |
+thinking, but it seems very promising.</li> |
|
| 266 | 273 |
<li>Tor doesn't work very well when servers have asymmetric bandwidth |
| 267 | 274 |
(e.g. cable or DSL). Because Tor has separate TCP connections between |
| 268 | 275 |
each hop, if the incoming bytes are arriving just fine and the outgoing |
| ... | ... |
@@ -285,13 +292,15 @@ overhaul if the results are good.</li> |
| 285 | 292 |
<li>To let dissidents in remote countries use Tor without being blocked |
| 286 | 293 |
at their country's firewall, we need a way to get tens of thousands of |
| 287 | 294 |
relays, not just a few hundred. We can imagine a Tor client GUI that |
| 288 |
-has a "help China" button at the top that opens a port and relays a |
|
| 295 |
+has a "Tor for Freedom" button at the top that opens a port and relays a |
|
| 289 | 296 |
few KB/s of traffic into the Tor network. (A few KB/s shouldn't be too |
| 290 | 297 |
much hassle, and there are few abuse issues since they're not being exit |
| 291 | 298 |
nodes.) But how do we distribute a list of these volunteer clients to the |
| 292 | 299 |
good dissidents in an automated way that doesn't let the country-level |
| 293 | 300 |
firewalls intercept and enumerate them? Probably needs to work on a |
| 294 |
-human-trust level. See our <a |
|
| 301 |
+human-trust level. See our <a href="<page documentation>#DesignDoc">early |
|
| 302 |
+blocking-resistance design document</a> and our |
|
| 303 |
+<a |
|
| 295 | 304 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#China">FAQ |
| 296 | 305 |
entry</a> on this, and then read the <a |
| 297 | 306 |
href="http://freehaven.net/anonbib/topic.html#Communications_20Censorship">censorship |
| 298 | 307 |