Roger Dingledine commited on 2007-03-19 10:46:59
Zeige 1 geänderte Dateien mit 11 Einfügungen und 2 Löschungen.
... | ... |
@@ -263,6 +263,13 @@ Unfortunately, to accurately predict whether a given Alice, entry, |
263 | 263 |
exit, Bob quad will be dangerous, we need to download an entire Internet |
264 | 264 |
routing zone and perform expensive operations on it. Are there practical |
265 | 265 |
approximations, such as avoiding IP addresses in the same /8 network?</li> |
266 |
+<li>Other research questions regarding geographic diversity consider |
|
267 |
+the tradeoff between choosing an efficient circuit and choosing a random |
|
268 |
+circuit. Look at at Stephen Rollyson's <a |
|
269 |
+href="http://swiki.cc.gatech.edu:8080/ugResearch/uploads/7/ImprovingTor.pdf">position |
|
270 |
+paper</a> on how to discard particularly slow choices without hurting |
|
271 |
+anonymity "too" much. This line of reasoning needs more work and more |
|
272 |
+thinking, but it seems very promising.</li> |
|
266 | 273 |
<li>Tor doesn't work very well when servers have asymmetric bandwidth |
267 | 274 |
(e.g. cable or DSL). Because Tor has separate TCP connections between |
268 | 275 |
each hop, if the incoming bytes are arriving just fine and the outgoing |
... | ... |
@@ -285,13 +292,15 @@ overhaul if the results are good.</li> |
285 | 292 |
<li>To let dissidents in remote countries use Tor without being blocked |
286 | 293 |
at their country's firewall, we need a way to get tens of thousands of |
287 | 294 |
relays, not just a few hundred. We can imagine a Tor client GUI that |
288 |
-has a "help China" button at the top that opens a port and relays a |
|
295 |
+has a "Tor for Freedom" button at the top that opens a port and relays a |
|
289 | 296 |
few KB/s of traffic into the Tor network. (A few KB/s shouldn't be too |
290 | 297 |
much hassle, and there are few abuse issues since they're not being exit |
291 | 298 |
nodes.) But how do we distribute a list of these volunteer clients to the |
292 | 299 |
good dissidents in an automated way that doesn't let the country-level |
293 | 300 |
firewalls intercept and enumerate them? Probably needs to work on a |
294 |
-human-trust level. See our <a |
|
301 |
+human-trust level. See our <a href="<page documentation>#DesignDoc">early |
|
302 |
+blocking-resistance design document</a> and our |
|
303 |
+<a |
|
295 | 304 |
href="http://wiki.noreply.org/noreply/TheOnionRouter/TorFAQ#China">FAQ |
296 | 305 |
entry</a> on this, and then read the <a |
297 | 306 |
href="http://freehaven.net/anonbib/topic.html#Communications_20Censorship">censorship |
298 | 307 |