Roger Dingledine commited on 2005-02-26 09:29:56
Zeige 3 geänderte Dateien mit 27 Einfügungen und 3 Löschungen.
... | ... |
@@ -54,6 +54,8 @@ href="cvs/tor/doc/tor-doc.html#server">running a |
54 | 54 |
server</a> to help with development and scalability.</li> |
55 | 55 |
<li>Does somebody want to help maintain this website, or help with |
56 | 56 |
documentation, or help with managing our TODO and handling bug reports?</li> |
57 |
+<li>It would be nice to translate the documentation and other web pages |
|
58 |
+into other languages. (E.g. <a href="http://tor.freesuperhost.com/">Persian</a>)</li> |
|
57 | 59 |
<li>Please fix up <a |
58 | 60 |
href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>, |
59 | 61 |
and if you know the answer to a question in the "unanswered FAQs" list, |
... | ... |
@@ -109,8 +109,13 @@ more people volunteer to run servers. Please consider <a |
109 | 109 |
href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then |
110 | 110 |
<a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also |
111 | 111 |
<a href="documentation.html">learn more about Tor here</a>. |
112 |
-We also welcome research into the security of Tor and related anonymity |
|
113 |
-systems, and want to hear about any vulnerabilities you find. |
|
112 |
+</p> |
|
113 |
+ |
|
114 |
+<p> |
|
115 |
+Part of the goal of the Tor project is to deploy a public testbed for |
|
116 |
+experimenting with design trade-offs, to teach us how best to provide |
|
117 |
+privacy online. We welcome research into the security of Tor and related |
|
118 |
+anonymity systems, and want to hear about any vulnerabilities you find. |
|
114 | 119 |
</p> |
115 | 120 |
|
116 | 121 |
<p> |
... | ... |
@@ -47,7 +47,24 @@ href="http://freehaven.net/anonbib/topic.html#Anonymous_20communication">these |
47 | 47 |
papers</a> (especially the ones in boxes) to get up to speed on anonymous |
48 | 48 |
communication systems.</p> |
49 | 49 |
|
50 |
-<p>More here coming soon.</p> |
|
50 |
+<p>We need people to attack the system, quantify defenses, etc. For example: |
|
51 |
+</p> |
|
52 |
+<ul> |
|
53 |
+<li>Website volume fingerprinting attacks (<a |
|
54 |
+href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a |
|
55 |
+href="http://freehaven.net/anonbib/#hintz02">Hintz</a>). |
|
56 |
+Defenses include a large cell size, <a |
|
57 |
+href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>, |
|
58 |
+etc. How well does each approach work?</li> |
|
59 |
+<li>The end-to-end traffic confirmation attack. We need to study |
|
60 |
+long-range dummies more, along with traffic shaping. How much traffic |
|
61 |
+of what sort of distribution is needed before the adversary is confident |
|
62 |
+he has won?</li> |
|
63 |
+<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles |
|
64 |
+the right answer? What other practical approaches are there?</li> |
|
65 |
+<li>What sensitive info squeaks by privoxy? Are other html scrubbers |
|
66 |
+better?</li> |
|
67 |
+</ul> |
|
51 | 68 |
|
52 | 69 |
</div><!-- #main --> |
53 | 70 |
</div> |
54 | 71 |