more additions to the website
Roger Dingledine

Roger Dingledine commited on 2005-02-26 09:29:56
Zeige 3 geänderte Dateien mit 27 Einfügungen und 3 Löschungen.

... ...
@@ -54,6 +54,8 @@ href="cvs/tor/doc/tor-doc.html#server">running a
54 54
 server</a> to help with development and scalability.</li>
55 55
 <li>Does somebody want to help maintain this website, or help with
56 56
 documentation, or help with managing our TODO and handling bug reports?</li>
57
+<li>It would be nice to translate the documentation and other web pages
58
+into other languages. (E.g. <a href="http://tor.freesuperhost.com/">Persian</a>)</li>
57 59
 <li>Please fix up <a
58 60
 href="http://wiki.noreply.org/wiki/TheOnionRouter/TorFAQ">the FAQ Wiki</a>,
59 61
 and if you know the answer to a question in the "unanswered FAQs" list,
... ...
@@ -109,8 +109,13 @@ more people volunteer to run servers.  Please consider <a
109 109
 href="cvs/tor/doc/tor-doc.html#installing">installing it</a> and then
110 110
 <a href="cvs/tor/doc/tor-doc.html#server">helping out</a>. You can also
111 111
 <a href="documentation.html">learn more about Tor here</a>.
112
-We also welcome research into the security of Tor and related anonymity
113
-systems, and want to hear about any vulnerabilities you find.
112
+</p>
113
+
114
+<p>
115
+Part of the goal of the Tor project is to deploy a public testbed for
116
+experimenting with design trade-offs, to teach us how best to provide
117
+privacy online. We welcome research into the security of Tor and related
118
+anonymity systems, and want to hear about any vulnerabilities you find.
114 119
 </p>
115 120
 
116 121
 <p>
... ...
@@ -47,7 +47,24 @@ href="http://freehaven.net/anonbib/topic.html#Anonymous_20communication">these
47 47
 papers</a> (especially the ones in boxes) to get up to speed on anonymous
48 48
 communication systems.</p>
49 49
 
50
-<p>More here coming soon.</p>
50
+<p>We need people to attack the system, quantify defenses, etc. For example:
51
+</p>
52
+<ul>
53
+<li>Website volume fingerprinting attacks (<a
54
+href="http://freehaven.net/anonbib/#back01">Back et al</a>, <a
55
+href="http://freehaven.net/anonbib/#hintz02">Hintz</a>).
56
+Defenses include a large cell size, <a
57
+href="http://freehaven.net/anonbib/#timing-fc2004">defensive dropping</a>,
58
+etc. How well does each approach work?</li>
59
+<li>The end-to-end traffic confirmation attack. We need to study
60
+long-range dummies more, along with traffic shaping. How much traffic
61
+of what sort of distribution is needed before the adversary is confident
62
+he has won?</li>
63
+<li>It's not that hard to DoS Tor servers or dirservers. Are puzzles
64
+the right answer? What other practical approaches are there?</li>
65
+<li>What sensitive info squeaks by privoxy? Are other html scrubbers
66
+better?</li>
67
+</ul>
51 68
 
52 69
   </div><!-- #main -->
53 70
 </div>
54 71