Steven Murdoch commited on 2010-03-25 17:12:54
              Zeige 30 geänderte Dateien mit 92 Einfügungen und 92 Löschungen.
            
| ... | ... | 
                      @@ -1103,7 +1103,7 @@ Tor သည္ မ်ိဳးစံုေသာ ကဲြျပားျခာ  | 
                  
| 1103 | 1103 | 
                        <p>  | 
                    
| 1104 | 1104 | 
                        <b>Authentication</b>: Every Tor relay has a public decryption key called  | 
                    
| 1105 | 1105 | 
                        the "onion key". When the Tor client establishes circuits, at each step it  | 
                    
| 1106 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">demands  | 
                    |
| 1106 | 
                        +<a href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demands  | 
                    |
| 1107 | 1107 | 
                        that the Tor relay prove knowledge of its onion key</a>. That way the first  | 
                    
| 1108 | 1108 | 
                        node in the path can't just spoof the rest of the path. Each relay rotates  | 
                    
| 1109 | 1109 | 
                        its onion key once a week.  | 
                    
| ... | ... | 
                      @@ -1212,7 +1212,7 @@ requiring that all Tor relays be able to connect to all Tor relays) and of  | 
                  
| 1212 | 1212 | 
                        the directory (how to stop requiring that all Tor users know about all Tor  | 
                    
| 1213 | 1213 | 
                        relays). Changes like this can have large impact on potential and actual  | 
                    
| 1214 | 1214 | 
                        anonymity. See Section 5 of the <a  | 
                    
| 1215 | 
                        -href="<gitblob>doc/design-paper/challenges.pdf">Challenges</a> paper for  | 
                    |
| 1215 | 
                        +href="<svnprojects>design-paper/challenges.pdf">Challenges</a> paper for  | 
                    |
| 1216 | 1216 | 
                        details. Again, UDP transport would help here.  | 
                    
| 1217 | 1217 | 
                        </p>  | 
                    
| 1218 | 1218 | 
                         | 
                    
| ... | ... | 
                      @@ -86,7 +86,7 @@ Rogers Vortrag <q>blocking-resistance and circumvention</q> vom 23C3 im Dezember  | 
                  
| 86 | 86 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">Video</a>, <a  | 
                    
| 87 | 87 | 
                        href="http://freehaven.net/~arma/slides-23c3.pdf">Folien</a>, <a  | 
                    
| 88 | 88 | 
                        href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">Kurzdarstellung</a>,  | 
                    
| 89 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">Designvorschlag</a>) und  | 
                    |
| 89 | 
                        +<a href="<svnprojects>design-paper/blocking.html">Designvorschlag</a>) und  | 
                    |
| 90 | 90 | 
                        Rogers Vortrag <q>Current events in 2007</q> vom 24C3 aus dem Dezember 2007 (<a  | 
                    
| 91 | 91 | 
                        href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">Video</a>,  | 
                    
| 92 | 92 | 
                        <a href="http://freehaven.net/~arma/slides-24c3.pdf">Folien</a>, <a  | 
                    
| ... | ... | 
                      @@ -153,13 +153,13 @@ ist das die Liste für dich.</li> </ul>  | 
                  
| 153 | 153 | 
                        <ul>  | 
                    
| 154 | 154 | 
                        <li>Das <b>Designdokument</b> (zur Usenix Security 2004 veröffentlicht)  | 
                    
| 155 | 155 | 
                        gibt dir unsere Einstellungen und Sicherheitsanalyse zum Tor-Design:  | 
                    
| 156 | 
                        - <a href="<gitblob>doc/design-paper/tor-design.pdf">PDF-Entwurf (engl.)</a> und  | 
                    |
| 157 | 
                        - <a href="<gitblob>doc/design-paper/tor-design.html">HTML-Entwurf (engl.)</a>  | 
                    |
| 156 | 
                        + <a href="<svnprojects>design-paper/tor-design.pdf">PDF-Entwurf (engl.)</a> und  | 
                    |
| 157 | 
                        + <a href="<svnprojects>design-paper/tor-design.html">HTML-Entwurf (engl.)</a>  | 
                    |
| 158 | 158 | 
                        stehen zur Verfügung.</li>  | 
                    
| 159 | 159 | 
                        <li>Das darauf folgende Papier mit dem Titel <q>challenges in low-latency  | 
                    
| 160 | 160 | 
                        anonymity</q> (noch im Entwurf) hat mehr Details über die letzten  | 
                    
| 161 | 161 | 
                        Erfahrungen und Richtungen: <a  | 
                    
| 162 | 
                        - href="<gitblob>doc/design-paper/challenges.pdf">PDF version  | 
                    |
| 162 | 
                        + href="<svnprojects>design-paper/challenges.pdf">PDF version  | 
                    |
| 163 | 163 | 
                        (engl.)</a>.</li>  | 
                    
| 164 | 164 | 
                        <li>Unsere Veröffentlichung bei der WEIS 2006 — <b>Anonymity Loves  | 
                    
| 165 | 165 | 
                        Company: Usability and the Network Effect</b> — erklärt, warum  | 
                    
| ... | ... | 
                      @@ -169,7 +169,7 @@ ist das die Liste für dich.</li> </ul>  | 
                  
| 169 | 169 | 
                        <li>Unser vorläufiges Design, um Firewalls den Zugriff auf das  | 
                    
| 170 | 170 | 
                        Tornetzwerk zu erschweren, ist in <b>design of a blocking-resistant  | 
                    
| 171 | 171 | 
                        anonymity system</b> (<a  | 
                    
| 172 | 
                        - href="<gitblob>doc/design-paper/blocking.pdf">PDF-Entwurf</a>)  | 
                    |
| 172 | 
                        + href="<svnprojects>design-paper/blocking.pdf">PDF-Entwurf</a>)  | 
                    |
| 173 | 173 | 
                        beschrieben. Du kannst auch einen Blick auf die <a  | 
                    
| 174 | 174 | 
                        href="http://freehaven.net/~arma/slides-23c3.pdf">Vortragsunterlagen</a>  | 
                    
| 175 | 175 | 
                        oder das <a  | 
                    
| ... | ... | 
                      @@ -140,7 +140,7 @@ Client und drei vom versteckten Dienst gewählt.  | 
                  
| 140 | 140 | 
                        <p>Es gibt detailliertere Beschreibungen zu dem Protokoll als diese  | 
                    
| 141 | 141 | 
                        Seite. Schaue dir hierzu die  | 
                    
| 142 | 142 | 
                        <a  | 
                    
| 143 | 
                        -href="<gitblob>doc/design-paper/tor-design.pdf">Designbeschreibung  | 
                    |
| 143 | 
                        +href="<svnprojects>design-paper/tor-design.pdf">Designbeschreibung  | 
                    |
| 144 | 144 | 
                        von Tor</a> und die  | 
                    
| 145 | 145 | 
                        <a  | 
                    
| 146 | 146 | 
                        href="<gitblob>doc/spec/rend-spec.txt">Rendezvous-Spezifikation</a>  | 
                    
| ... | ... | 
                      @@ -226,7 +226,7 @@ Skill Level: <i>High</i>  | 
                  
| 226 | 226 | 
                        Likely Mentors: <i>Nick, Roger, Steven</i>  | 
                    
| 227 | 227 | 
                        <br />  | 
                    
| 228 | 228 | 
                        The Tor 0.2.0.x series makes <a  | 
                    
| 229 | 
                        -href="<gitblob>doc/design-paper/blocking.html">significant  | 
                    |
| 229 | 
                        +href="<svnprojects>design-paper/blocking.html">significant  | 
                    |
| 230 | 230 | 
                        improvements</a> in resisting national and organizational censorship.  | 
                    
| 231 | 231 | 
                        But Tor still needs better mechanisms for some parts of its  | 
                    
| 232 | 232 | 
                        anti-censorship design. For example, current Tors can only listen on a  | 
                    
| ... | ... | 
                      @@ -239,7 +239,7 @@ to make Tor more scanning-resistant. Right now, an adversary can identify  | 
                  
| 239 | 239 | 
                        <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>  | 
                    
| 240 | 240 | 
                        just by trying to connect to them, following the Tor protocol, and  | 
                    
| 241 | 241 | 
                        seeing if they respond. To solve this, bridges could  | 
                    
| 242 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 242 | 
                        +<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 243 | 243 | 
                        webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,  | 
                    
| 244 | 244 | 
                        and not act like bridges until the user provides a bridge-specific key.  | 
                    
| 245 | 245 | 
                        <br />  | 
                    
| ... | ... | 
                      @@ -1143,7 +1143,7 @@ throughput experiment</a>. We'll need to measure and tweak, and maybe  | 
                  
| 1143 | 1143 | 
                        overhaul if the results are good.</li>  | 
                    
| 1144 | 1144 | 
                        <li>Our censorship-resistance goals include preventing  | 
                    
| 1145 | 1145 | 
                        an attacker who's looking at Tor traffic on the wire from <a  | 
                    
| 1146 | 
                        -href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">distinguishing  | 
                    |
| 1146 | 
                        +href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguishing  | 
                    |
| 1147 | 1147 | 
                        it from normal SSL traffic</a>. Obviously we can't achieve perfect  | 
                    
| 1148 | 1148 | 
                        steganography and still remain usable, but for a first step we'd like to  | 
                    
| 1149 | 1149 | 
                        block any attacks that can win by observing only a few packets. One of  | 
                    
| ... | ... | 
                      @@ -985,7 +985,7 @@ won't work.  | 
                  
| 985 | 985 | 
                        <b>Authentication</b>:  | 
                    
| 986 | 986 | 
                        Every Tor relay has a public decryption key called the "onion key".  | 
                    
| 987 | 987 | 
                        When the Tor client establishes circuits, at each step it <a  | 
                    
| 988 | 
                        -href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">demands  | 
                    |
| 988 | 
                        +href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demands  | 
                    |
| 989 | 989 | 
                        that the Tor relay prove knowledge of its onion key</a>. That way  | 
                    
| 990 | 990 | 
                        the first node in the path can't just spoof the rest of the path.  | 
                    
| 991 | 991 | 
                        Each relay rotates its onion key once a week.  | 
                    
| ... | ... | 
                      @@ -1084,7 +1084,7 @@ stop requiring that all Tor relays be able to connect to all Tor  | 
                  
| 1084 | 1084 | 
                        relays) and of the directory (how to stop requiring that all Tor  | 
                    
| 1085 | 1085 | 
                        users know about all Tor relays). Changes like this can have large  | 
                    
| 1086 | 1086 | 
                        impact on potential and actual anonymity. See Section 5 of the <a  | 
                    
| 1087 | 
                        -href="<gitblob>doc/design-paper/challenges.pdf">Challenges</a> paper  | 
                    |
| 1087 | 
                        +href="<svnprojects>design-paper/challenges.pdf">Challenges</a> paper  | 
                    |
| 1088 | 1088 | 
                        for details. Again, UDP transport would help here.  | 
                    
| 1089 | 1089 | 
                        </p>  | 
                    
| 1090 | 1090 | 
                         | 
                    
| ... | ... | 
                      @@ -146,7 +146,7 @@ service.  | 
                  
| 146 | 146 | 
                        <p>  | 
                    
| 147 | 147 | 
                        There are more detailed descriptions about the hidden service protocol than  | 
                    
| 148 | 148 | 
                        this one. See the  | 
                    
| 149 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">Tor design paper</a>  | 
                    |
| 149 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>  | 
                    |
| 150 | 150 | 
                        for an in-depth design description and the  | 
                    
| 151 | 151 | 
                        <a href="<gitblob>doc/spec/rend-spec.txt">rendezvous specification</a>  | 
                    
| 152 | 152 | 
                        for the message formats.  | 
                    
| ... | ... | 
                      @@ -202,7 +202,7 @@ Skill Level: <i>High</i>  | 
                  
| 202 | 202 | 
                        Likely Mentors: <i>Nick, Roger, Steven</i>  | 
                    
| 203 | 203 | 
                        <br />  | 
                    
| 204 | 204 | 
                        The Tor 0.2.1.x series makes <a  | 
                    
| 205 | 
                        -href="<gitblob>doc/design-paper/blocking.html">significant  | 
                    |
| 205 | 
                        +href="<svnprojects>design-paper/blocking.html">significant  | 
                    |
| 206 | 206 | 
                        improvements</a> in resisting national and organizational censorship.  | 
                    
| 207 | 207 | 
                        But Tor still needs better mechanisms for some parts of its  | 
                    
| 208 | 208 | 
                        anti-censorship design. For example, current Tors can only listen on a  | 
                    
| ... | ... | 
                      @@ -869,7 +869,7 @@ more scanning-resistant. Right now, an adversary can identify <a  | 
                  
| 869 | 869 | 
                        href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>  | 
                    
| 870 | 870 | 
                        just by trying to connect to them, following the Tor protocol,  | 
                    
| 871 | 871 | 
                        and seeing if they respond. To solve this, bridges could <a  | 
                    
| 872 | 
                        -href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 872 | 
                        +href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 873 | 873 | 
                        webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,  | 
                    
| 874 | 874 | 
                        and not act like bridges until the user provides a bridge-specific key.  | 
                    
| 875 | 875 | 
                        To start, check out Shane Pope's <a  | 
                    
| ... | ... | 
                      @@ -971,7 +971,7 @@ throughput experiment</a>. We'll need to measure and tweak, and maybe  | 
                  
| 971 | 971 | 
                        overhaul if the results are good.</li>  | 
                    
| 972 | 972 | 
                        <li>Our censorship-resistance goals include preventing  | 
                    
| 973 | 973 | 
                        an attacker who's looking at Tor traffic on the wire from <a  | 
                    
| 974 | 
                        -href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">distinguishing  | 
                    |
| 974 | 
                        +href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguishing  | 
                    |
| 975 | 975 | 
                        it from normal SSL traffic</a>. Obviously we can't achieve perfect  | 
                    
| 976 | 976 | 
                        steganography and still remain usable, but for a first step we'd like to  | 
                    
| 977 | 977 | 
                        block any attacks that can win by observing only a few packets. One of  | 
                    
| ... | ... | 
                      @@ -83,12 +83,12 @@ es únicamente para desarrolladores y tiene muy poco tráfico.</li>  | 
                  
| 83 | 83 | 
                        <li>El <b>documento de diseño</b> (publicado en Usenix Security 2004)  | 
                    
| 84 | 84 | 
                        da nuestras justificaciones y análisis de seguridad para el diseño de Tor:  | 
                    
| 85 | 85 | 
                        versiones disponibles  | 
                    
| 86 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> y  | 
                    |
| 87 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>  | 
                    |
| 86 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> y  | 
                    |
| 87 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>  | 
                    |
| 88 | 88 | 
                        .</li>  | 
                    
| 89 | 89 | 
                        <li>Nuestro documento de reafirmación en <b>desafíos en el anonimato de baja latencia</b>  | 
                    
| 90 | 90 | 
                        (todavía en forma de borrador) detalla experiencias y direcciones mas recientes:  | 
                    
| 91 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">versión PDF</a>.</li>  | 
                    |
| 91 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">versión PDF</a>.</li>  | 
                    |
| 92 | 92 | 
                        <li>Nuestro artículo en WEIS 2006 — <b>Anonymity Loves Company:  | 
                    
| 93 | 93 | 
                        Usability and the Network Effect (Al anonimato le encanta la compañía:  | 
                    
| 94 | 94 | 
                        Usabilidad y el efecto en red)</b> — explica porqué la usabilidad  | 
                    
| ... | ... | 
                      @@ -97,8 +97,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>  | 
                  
| 97 | 97 | 
                        <li>Nuestro diseño preliminar para hacer más difícil que cortafuegos grandes  | 
                    
| 98 | 98 | 
                        eviten el acceso a la red Tor se describe en  | 
                    
| 99 | 99 | 
                        <b>el diseño de un sistema de anonimato resistente al bloqueo</b>:  | 
                    
| 100 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">borrador PDF</a> y  | 
                    |
| 101 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">borrador HTML</a>.  | 
                    |
| 100 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">borrador PDF</a> y  | 
                    |
| 101 | 
                        +<a href="<svnprojects>design-paper/blocking.html">borrador HTML</a>.  | 
                    |
| 102 | 102 | 
                        También puede ver <a  | 
                    
| 103 | 103 | 
                        href="http://freehaven.net/~arma/slides-23c3.pdf">transparencias</a> y <a  | 
                    
| 104 | 104 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">vídeo</a>  | 
                    
| ... | ... | 
                      @@ -231,7 +231,7 @@ para Tor y UDP</a> — por favor díganos qué problemas tiene.</li>  | 
                  
| 231 | 231 | 
                        de destino (en los nodos de salida). Si le importa mucho IPv6, ése es  | 
                    
| 232 | 232 | 
                        probablemente el primer sitio para empezar.</li>  | 
                    
| 233 | 233 | 
                        <li>¿No le gusta ninguna de éstas? Mire el <a  | 
                    
| 234 | 
                        -href="<gitblob>doc/design-paper/roadmap-2007.pdf">plan de desarrollo Tor</a>  | 
                    |
| 234 | 
                        +href="<svnprojects>design-paper/roadmap-2007.pdf">plan de desarrollo Tor</a>  | 
                    |
| 235 | 235 | 
                        para más ideas.</li>  | 
                    
| 236 | 236 | 
                        <li>¿No ve su idea aquí? ¡Probablemente la necesitemos de todas formas!  | 
                    
| 237 | 237 | 
                        Contáctenos y averígüelo.</li>  | 
                    
| ... | ... | 
                      @@ -119,7 +119,7 @@ how Tor is built.  | 
                  
| 119 | 119 | 
                         | 
                    
| 120 | 120 | 
                        <li>  | 
                    
| 121 | 121 | 
                        There's a skeletal <a  | 
                    
| 122 | 
                        -href="<gitblob>doc/design-paper/roadmap-future.pdf">list of items  | 
                    |
| 122 | 
                        +href="<svnprojects>design-paper/roadmap-future.pdf">list of items  | 
                    |
| 123 | 123 | 
                        we'd like to tackle in the future</a>. Alas, many of those items need  | 
                    
| 124 | 124 | 
                        to be fleshed out more before they'll make sense to people who aren't  | 
                    
| 125 | 125 | 
                        Tor developers, but you can still get a general sense of what issues  | 
                    
| ... | ... | 
                      @@ -136,7 +136,7 @@ and circumvention" talk from 23C3 in December 2006 (<a  | 
                  
| 136 | 136 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>,  | 
                    
| 137 | 137 | 
                        <a href="http://freehaven.net/~arma/slides-23c3.pdf">slides</a>,  | 
                    
| 138 | 138 | 
                        <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,  | 
                    
| 139 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">design paper</a>),  | 
                    |
| 139 | 
                        +<a href="<svnprojects>design-paper/blocking.html">design paper</a>),  | 
                    |
| 140 | 140 | 
                        and Roger's "Current events in 2007" talk from 24C3 in December  | 
                    
| 141 | 141 | 
                        2007 (<a  | 
                    
| 142 | 142 | 
                        href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">video</a>,  | 
                    
| ... | ... | 
                      @@ -175,12 +175,12 @@ is where the less complex discussion happens.  | 
                  
| 175 | 175 | 
                        <ul>  | 
                    
| 176 | 176 | 
                        <li>The <b>design document</b> (published at Usenix Security 2004)  | 
                    
| 177 | 177 | 
                        gives our justifications and security analysis for the Tor design:  | 
                    
| 178 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> and  | 
                    |
| 179 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>  | 
                    |
| 178 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> and  | 
                    |
| 179 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>  | 
                    |
| 180 | 180 | 
                        versions available.</li>  | 
                    
| 181 | 181 | 
                        <li>Our follow-up paper on <b>challenges in low-latency anonymity</b>  | 
                    
| 182 | 182 | 
                        (still in draft form) details more recent experiences and directions:  | 
                    
| 183 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">PDF  | 
                    |
| 183 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">PDF  | 
                    |
| 184 | 184 | 
                        draft</a>.</li>  | 
                    
| 185 | 185 | 
                        <li>Our paper at WEIS 2006 — <b>Anonymity Loves Company:  | 
                    
| 186 | 186 | 
                        Usability and the Network Effect</b> — explains why usability in  | 
                    
| ... | ... | 
                      @@ -189,8 +189,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>  | 
                  
| 189 | 189 | 
                        <li>Our preliminary design to make it harder for large firewalls to  | 
                    
| 190 | 190 | 
                        prevent access to the Tor network is described in  | 
                    
| 191 | 191 | 
                        <b>design of a blocking-resistant anonymity system</b>:  | 
                    
| 192 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">PDF draft</a> and  | 
                    |
| 193 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">HTML draft</a>.  | 
                    |
| 192 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">PDF draft</a> and  | 
                    |
| 193 | 
                        +<a href="<svnprojects>design-paper/blocking.html">HTML draft</a>.  | 
                    |
| 194 | 194 | 
                        Want to <a href="<page volunteer>#Coding">help us build it</a>?</li>  | 
                    
| 195 | 195 | 
                        <li>The <b>specifications</b> aim to give  | 
                    
| 196 | 196 | 
                        developers enough information to build a compatible version of Tor:  | 
                    
| ... | ... | 
                      @@ -351,7 +351,7 @@ Skill Level: <i>High</i>  | 
                  
| 351 | 351 | 
                        Likely Mentors: <i>Nick</i>  | 
                    
| 352 | 352 | 
                        <br />  | 
                    
| 353 | 353 | 
                        The Tor 0.2.0.x series makes <a  | 
                    
| 354 | 
                        -href="<gitblob>doc/design-paper/blocking.html">significant  | 
                    |
| 354 | 
                        +href="<svnprojects>design-paper/blocking.html">significant  | 
                    |
| 355 | 355 | 
                        improvements</a> in resisting national and organizational censorship.  | 
                    
| 356 | 356 | 
                        But Tor still needs better mechanisms for some parts of its  | 
                    
| 357 | 357 | 
                        anti-censorship design. For example, current Tors can only listen on a  | 
                    
| ... | ... | 
                      @@ -364,7 +364,7 @@ to make Tor more scanning-resistant. Right now, an adversary can identify  | 
                  
| 364 | 364 | 
                        <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>  | 
                    
| 365 | 365 | 
                        just by trying to connect to them, following the Tor protocol, and  | 
                    
| 366 | 366 | 
                        seeing if they respond. To solve this, bridges could  | 
                    
| 367 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 367 | 
                        +<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 368 | 368 | 
                        webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,  | 
                    
| 369 | 369 | 
                        and not act like bridges until the user provides a bridge-specific key.  | 
                    
| 370 | 370 | 
                        <br />  | 
                    
| ... | ... | 
                      @@ -959,7 +959,7 @@ the core of the Blossom effort.  | 
                  
| 959 | 959 | 
                        <b>Bring up new ideas!</b>  | 
                    
| 960 | 960 | 
                        <br />  | 
                    
| 961 | 961 | 
                        Don't like any of these? Look at the <a  | 
                    
| 962 | 
                        -href="<gitblob>doc/design-paper/roadmap-future.pdf">Tor development  | 
                    |
| 962 | 
                        +href="<svnprojects>design-paper/roadmap-future.pdf">Tor development  | 
                    |
| 963 | 963 | 
                        roadmap</a> for more ideas.  | 
                    
| 964 | 964 | 
                        </li>  | 
                    
| 965 | 965 | 
                         | 
                    
| ... | ... | 
                      @@ -1065,7 +1065,7 @@ pas fonctionner.  | 
                  
| 1065 | 1065 | 
                        <b>Authentification</b>: Chaque noeud Tor a une clef de déchiffrement  | 
                    
| 1066 | 1066 | 
                        publique appelée "clef oignon". Lorsque le client met en place des  | 
                    
| 1067 | 1067 | 
                        circuits, à chaque étape il <a  | 
                    
| 1068 | 
                        -href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">demande que  | 
                    |
| 1068 | 
                        +href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demande que  | 
                    |
| 1069 | 1069 | 
                        le noeud Tor prouve la connaissance de sa propre clef oignon</a>. Ainsi, le  | 
                    
| 1070 | 1070 | 
                        premier noeud du circuit ne peut usurper le reste du circuit. Chaque noeud  | 
                    
| 1071 | 1071 | 
                        change de clef oignon une fois par semaine.  | 
                    
| ... | ... | 
                      @@ -1169,7 +1169,7 @@ Troisièment, nous avons besoin de travailler sur l'évolutivité du réseau  | 
                  
| 1169 | 1169 | 
                        que tous les utilisateurs Tor connaissent l'intégralité des noeuds Tor). Les  | 
                    
| 1170 | 1170 | 
                        changement à ce niveau peuvent avoir des conséquences sur  | 
                    
| 1171 | 1171 | 
                        l'anonymat. Consultez la section 4 de notre article sur <a  | 
                    
| 1172 | 
                        -href="<gitblob>doc/design-paper/challenges.pdf">nos défis</a> pour plus  | 
                    |
| 1172 | 
                        +href="<svnprojects>design-paper/challenges.pdf">nos défis</a> pour plus  | 
                    |
| 1173 | 1173 | 
                        détails. Encore une fois, le transport par UDP devrait améliorer grandement  | 
                    
| 1174 | 1174 | 
                        la situation.  | 
                    
| 1175 | 1175 | 
                        </p>  | 
                    
| ... | ... | 
                      @@ -163,7 +163,7 @@ service caché.  | 
                  
| 163 | 163 | 
                        <p>  | 
                    
| 164 | 164 | 
                        Il existe d'autres documentations plus complètes sur le protocole de service  | 
                    
| 165 | 165 | 
                        caché que celle-ci. Consultez le <a  | 
                    
| 166 | 
                        -href="<gitblob>doc/design-paper/tor-design.pdf">document de spécification de  | 
                    |
| 166 | 
                        +href="<svnprojects>design-paper/tor-design.pdf">document de spécification de  | 
                    |
| 167 | 167 | 
                        Tor</a> pour une description plus approfondie ainsi que la <a  | 
                    
| 168 | 168 | 
                        href="<gitblob>doc/spec/rend-spec.txt">spécification rendez-vous</a> pour le  | 
                    
| 169 | 169 | 
                        format de messages.  | 
                    
| ... | ... | 
                      @@ -143,7 +143,7 @@ href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">la  | 
                  
| 143 | 143 | 
                        <i>Medium to High</i> <br /> Effort Level: <i>Medium</i> <br /> Skill Level:  | 
                    
| 144 | 144 | 
                        <i>High</i> <br /> Likely Mentors: <i>Nick, Roger, Steven</i> <br /> The Tor  | 
                    
| 145 | 145 | 
                        0.2.1.x series makes <a  | 
                    
| 146 | 
                        -href="<gitblob>doc/design-paper/blocking.html">significant improvements</a>  | 
                    |
| 146 | 
                        +href="<svnprojects>design-paper/blocking.html">significant improvements</a>  | 
                    |
| 147 | 147 | 
                        in resisting national and organizational censorship. But Tor still needs  | 
                    
| 148 | 148 | 
                        better mechanisms for some parts of its anti-censorship design. For  | 
                    
| 149 | 149 | 
                        example, current Tors can only listen on a single address/port combination  | 
                    
| ... | ... | 
                      @@ -721,7 +721,7 @@ scanning-resistant. Right now, an adversary can identify <a  | 
                  
| 721 | 721 | 
                        href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a> just by  | 
                    
| 722 | 722 | 
                        trying to connect to them, following the Tor protocol, and seeing if they  | 
                    
| 723 | 723 | 
                        respond. To solve this, bridges could <a  | 
                    
| 724 | 
                        -href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 724 | 
                        +href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 725 | 725 | 
                        webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools, and  | 
                    
| 726 | 726 | 
                        not act like bridges until the user provides a bridge-specific key. To  | 
                    
| 727 | 727 | 
                        start, check out Shane Pope's <a  | 
                    
| ... | ... | 
                      @@ -830,7 +830,7 @@ expérimentation autour de ssh</a>. Nous avons besoin de mesurer, de corriger  | 
                  
| 830 | 830 | 
                        et peut-être de refondre quelquechose si les résultats s'avèrent bons.</li>  | 
                    
| 831 | 831 | 
                        <li>Nos objectifs de résistance à la censure incluent l'impossibilité pour un  | 
                    
| 832 | 832 | 
                        attaquant qui observe le trafic Tor de <a  | 
                    
| 833 | 
                        -href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">le  | 
                    |
| 833 | 
                        +href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">le  | 
                    |
| 834 | 834 | 
                        distinguer d'un trafic SSL normal</a>. Néanmoins, nous ne pouvons pas  | 
                    
| 835 | 835 | 
                        recréer une stéganographie parfaire tout en restant utilisable mais, dans un  | 
                    
| 836 | 836 | 
                        premier temps, nous aimerions pouvoir bloquer toute attaque qui pourrait  | 
                    
| ... | ... | 
                      @@ -115,7 +115,7 @@ and circumvention" dal 23C3 nel Dicembre 2006 (<a  | 
                  
| 115 | 115 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>,  | 
                    
| 116 | 116 | 
                        <a href="http://freehaven.net/~arma/slides-23c3.pdf">slide</a>,  | 
                    
| 117 | 117 | 
                        <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,  | 
                    
| 118 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">design paper</a>),  | 
                    |
| 118 | 
                        +<a href="<svnprojects>design-paper/blocking.html">design paper</a>),  | 
                    |
| 119 | 119 | 
                        e la presentazione "Current events in 2007" sempre di Roger al 24C3 nel Dicembre  | 
                    
| 120 | 120 | 
                        2007 (<a  | 
                    
| 121 | 121 | 
                        href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">video</a>,  | 
                    
| ... | ... | 
                      @@ -185,12 +185,12 @@ href="http://archives.seul.org/or/cvs/">commit svn e git</a>.</li>  | 
                  
| 185 | 185 | 
                        <li>I <b>documenti di design</b> (pubblicati alla Usenix Security 2004)  | 
                    
| 186 | 186 | 
                        forniscono i fondamenti e le analisi di sicurezza di Tor:  | 
                    
| 187 | 187 | 
                        in versione  | 
                    
| 188 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> e  | 
                    |
| 189 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>.  | 
                    |
| 188 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> e  | 
                    |
| 189 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>.  | 
                    |
| 190 | 190 | 
                        </li>  | 
                    
| 191 | 191 | 
                        <li>Il nostro studio successivo sulle <b>sfide nell'anonimato a bassa latenza</b>  | 
                    
| 192 | 192 | 
                        (ancora in versione di bozza) descrive nel dettaglio esperienze e direzioni di sviluppo recenti:  | 
                    
| 193 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">bozza  | 
                    |
| 193 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">bozza  | 
                    |
| 194 | 194 | 
                        PDF</a>.</li>  | 
                    
| 195 | 195 | 
                        <li>Il nostro paper al WEIS 2006 — <b>Anonymity Loves Company:  | 
                    
| 196 | 196 | 
                        Usability and the Network Effect</b> — spiega perché l'usabilità nei  | 
                    
| ... | ... | 
                      @@ -199,8 +199,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>  | 
                  
| 199 | 199 | 
                        <li>Il nostro progetto preliminare per impedire ai firewall di  | 
                    
| 200 | 200 | 
                        bloccare l'accesso alla rete Tor è descritto in  | 
                    
| 201 | 201 | 
                        <b>design of a blocking-resistant anonymity system</b>:  | 
                    
| 202 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">bozza PDF</a> e  | 
                    |
| 203 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">bozza HTML</a>.  | 
                    |
| 202 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">bozza PDF</a> e  | 
                    |
| 203 | 
                        +<a href="<svnprojects>design-paper/blocking.html">bozza HTML</a>.  | 
                    |
| 204 | 204 | 
                        Vedi anche le <a  | 
                    
| 205 | 205 | 
                        href="http://freehaven.net/~arma/slides-23c3.pdf">diapositive</a> e il<a  | 
                    
| 206 | 206 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>  | 
                    
| ... | ... | 
                      @@ -931,7 +931,7 @@ non serve a nulla.  | 
                  
| 931 | 931 | 
                        <b>Autenticazione</b>:  | 
                    
| 932 | 932 | 
                        Ogni relay Tor ha una chiave pubblica di decifratura detta "onion key".  | 
                    
| 933 | 933 | 
                        Quanto il client Tor stabilisce dei circuiti, ad ogni passaggio <a  | 
                    
| 934 | 
                        -href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">richiede  | 
                    |
| 934 | 
                        +href="<svnprojects>design-paper/tor-design.html#subsec:circuits">richiede  | 
                    |
| 935 | 935 | 
                        che il relay Tor dimostri di conoscere la sua onion key</a>. In questo modo  | 
                    
| 936 | 936 | 
                        il primo nodo del percorso non può semplicemente falsificare il resto del percorso.  | 
                    
| 937 | 937 | 
                        Ogni relay ruota la sua onion key ogni settimana.  | 
                    
| ... | ... | 
                      @@ -1030,7 +1030,7 @@ vitare che tutti i relay debbano potersi connettere a tutti i relay  | 
                  
| 1030 | 1030 | 
                        Tor) sia della directory (smettere di obbligare tutti gli utenti Tor  | 
                    
| 1031 | 1031 | 
                        a sapere quali sono tutti i relay Tor). Simili cabiamenti potrebbero avere  | 
                    
| 1032 | 1032 | 
                        un impatto enorme sull'anonimato potenziale e reale. Vedi la sezione 5 del paper <a  | 
                    
| 1033 | 
                        -href="<gitblob>doc/design-paper/challenges.pdf">Challenges</a>  | 
                    |
| 1033 | 
                        +href="<svnprojects>design-paper/challenges.pdf">Challenges</a>  | 
                    |
| 1034 | 1034 | 
                        per maggiori informazioni. Ancora, il trasporto UDP potrebbe essere molto utile qui.  | 
                    
| 1035 | 1035 | 
                        </p>  | 
                    
| 1036 | 1036 | 
                         | 
                    
| ... | ... | 
                      @@ -145,7 +145,7 @@ service.  | 
                  
| 145 | 145 | 
                        <p>  | 
                    
| 146 | 146 | 
                        Ci sono descrizioni del protocollo hidden service più approfondite  | 
                    
| 147 | 147 | 
                        di questa. Vedi il  | 
                    
| 148 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">Tor design paper</a>  | 
                    |
| 148 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>  | 
                    |
| 149 | 149 | 
                        per una descrizione dettagliata e la  | 
                    
| 150 | 150 | 
                        <a href="<gitblob>doc/spec/rend-spec.txt">rendezvous specification</a>  | 
                    
| 151 | 151 | 
                        per il formato dei messaggi.  | 
                    
| ... | ... | 
                      @@ -211,7 +211,7 @@ Skill Level: <i>High</i>  | 
                  
| 211 | 211 | 
                        Likely Mentors: <i>Nick, Roger, Steven</i>  | 
                    
| 212 | 212 | 
                        <br />  | 
                    
| 213 | 213 | 
                        The Tor 0.2.0.x series makes <a  | 
                    
| 214 | 
                        -href="<gitblob>doc/design-paper/blocking.html">significant  | 
                    |
| 214 | 
                        +href="<svnprojects>design-paper/blocking.html">significant  | 
                    |
| 215 | 215 | 
                        improvements</a> in resisting national and organizational censorship.  | 
                    
| 216 | 216 | 
                        But Tor still needs better mechanisms for some parts of its  | 
                    
| 217 | 217 | 
                        anti-censorship design. For example, current Tors can only listen on a  | 
                    
| ... | ... | 
                      @@ -224,7 +224,7 @@ to make Tor more scanning-resistant. Right now, an adversary can identify  | 
                  
| 224 | 224 | 
                        <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>  | 
                    
| 225 | 225 | 
                        just by trying to connect to them, following the Tor protocol, and  | 
                    
| 226 | 226 | 
                        seeing if they respond. To solve this, bridges could  | 
                    
| 227 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 227 | 
                        +<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like  | 
                    |
| 228 | 228 | 
                        webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,  | 
                    
| 229 | 229 | 
                        and not act like bridges until the user provides a bridge-specific key.  | 
                    
| 230 | 230 | 
                        <br />  | 
                    
| ... | ... | 
                      @@ -1133,7 +1133,7 @@ di throughput ssh</a>. Dovremmo misurare e provare, e forse applicare il metodo  | 
                  
| 1133 | 1133 | 
                        se i risultati fossero soddisfacenti.</li>  | 
                    
| 1134 | 1134 | 
                        <li>Uno degli obiettivi per resistere alla censura è impedire  | 
                    
| 1135 | 1135 | 
                        ad un attaccante che osservi il traffico Tor su una connessione di <a  | 
                    
| 1136 | 
                        -href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">distinguerlo  | 
                    |
| 1136 | 
                        +href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguerlo  | 
                    |
| 1137 | 1137 | 
                        dal normale traffico SSL</a>. Non possiamo ovviamente ottenere perfetta  | 
                    
| 1138 | 1138 | 
                        steganografia e al contempo essere ancora utilizzabili, ma come primo passo ci  | 
                    
| 1139 | 1139 | 
                        bloccare tutti quegli attacchi che funzionano solo osservando pochi pacchetti. Uno degli  | 
                    
| ... | ... | 
                      @@ -117,7 +117,7 @@ href="http://freehaven.net/~nickm/slides/Defcon07/TorChanges.pdf">スライド</  | 
                  
| 117 | 117 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">ビデオ</a>、  | 
                    
| 118 | 118 | 
                        <a href="http://freehaven.net/~arma/slides-23c3.pdf">スライド</a>、  | 
                    
| 119 | 119 | 
                        <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">要約</a>、  | 
                    
| 120 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">設計文書</a>)、  | 
                    |
| 120 | 
                        +<a href="<svnprojects>design-paper/blocking.html">設計文書</a>)、  | 
                    |
| 121 | 121 | 
                        そして2007年12月の24C3からRogerの"Current events in 2007"トーク  | 
                    
| 122 | 122 | 
                        (<a  | 
                    
| 123 | 123 | 
                        href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">ビデオ</a>,  | 
                    
| ... | ... | 
                      @@ -192,12 +192,12 @@ orアナウンスリストの  | 
                  
| 192 | 192 | 
                        <ul>  | 
                    
| 193 | 193 | 
                        <li><b>設計ドキュメント</b> (Usenix Security 2004で公開)  | 
                    
| 194 | 194 | 
                        Torの設計の存在意義とセキュリティ分析について示唆を与えてくれます:  | 
                    
| 195 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a>または  | 
                    |
| 196 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>  | 
                    |
| 195 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a>または  | 
                    |
| 196 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>  | 
                    |
| 197 | 197 | 
                        で閲覧可能です。</li>  | 
                    
| 198 | 198 | 
                        <li>追加文書の<b>低レイテンシ匿名化の課題</b>  | 
                    
| 199 | 199 | 
                        (まだドラフト形式)は最新の経験と傾向について掘り下げています:  | 
                    
| 200 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">PDF  | 
                    |
| 200 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">PDF  | 
                    |
| 201 | 201 | 
                        ドラフト</a>.</li>  | 
                    
| 202 | 202 | 
                         | 
                    
| 203 | 203 | 
                        <li>  | 
                    
| ... | ... | 
                      @@ -208,8 +208,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>。</li>  | 
                  
| 208 | 208 | 
                        <li>大きなファイアーウォールがTorネットワークへのアクセスを  | 
                    
| 209 | 209 | 
                        邪魔しにくくするため、私達が採用した暫定的なデザインについては  | 
                    
| 210 | 210 | 
                        <b>抗ブロッキング匿名化システムのデザイン</b>で述べられています:  | 
                    
| 211 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">PDF ドラフト</a> および  | 
                    |
| 212 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">HTML ドラフト</a>。  | 
                    |
| 211 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">PDF ドラフト</a> および  | 
                    |
| 212 | 
                        +<a href="<svnprojects>design-paper/blocking.html">HTML ドラフト</a>。  | 
                    |
| 213 | 213 | 
                        <a href="<page volunteer>#Coding">ビルドを手伝  | 
                    
| 214 | 214 | 
                        </a>ってくれませんか?</li>  | 
                    
| 215 | 215 | 
                        <li><b>仕様</b>は、開発者が互換性のあるTorのバージョンを制作するのに十分な  | 
                    
| ... | ... | 
                      @@ -225,7 +225,7 @@ Skill Level: <i>High</i>  | 
                  
| 225 | 225 | 
                        Likely Mentors: <i>Nick, Roger, Steven</i>  | 
                    
| 226 | 226 | 
                        <br />  | 
                    
| 227 | 227 | 
                        Tor 0.2.0.xシリーズは国家や組織による検閲に対して抵抗力に関して  | 
                    
| 228 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">著しい進歩</a>  | 
                    |
| 228 | 
                        +<a href="<svnprojects>design-paper/blocking.html">著しい進歩</a>  | 
                    |
| 229 | 229 | 
                        を遂げています。しかし、Torは依然としてその反検閲の設計のいくつかの  | 
                    
| 230 | 230 | 
                        部分についてよりよいメカニズムを必要としています。例えば、  | 
                    
| 231 | 231 | 
                        現在のTorは同時に単一のアドレス/ポートをリッスンすることしか  | 
                    
| ... | ... | 
                      @@ -239,7 +239,7 @@ Tor 0.2.0.xシリーズは国家や組織による検閲に対して抵抗力に  | 
                  
| 239 | 239 | 
                        <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Torブリッジ</a>  | 
                    
| 240 | 240 | 
                        を識別することができます。この問題を解決するには、ブリッジはポートスキャニング  | 
                    
| 241 | 241 | 
                        ツールでコンタクトされたときには  | 
                    
| 242 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">ウェブサーバの  | 
                    |
| 242 | 
                        +<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">ウェブサーバの  | 
                    |
| 243 | 243 | 
                        ように振る舞い</a>(HTTPまたはHTTPSで)、ユーザがブリッジ固有の鍵を与えない限り  | 
                    
| 244 | 244 | 
                        ブリッジとして振る舞うことがないようにすることが考えられます。  | 
                    
| 245 | 245 | 
                        <br />  | 
                    
| ... | ... | 
                      @@ -1157,7 +1157,7 @@ href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">SSH  | 
                  
| 1157 | 1157 | 
                        より徹底した調査をすることになるでしょう。</li>  | 
                    
| 1158 | 1158 | 
                        <li>私たちの抗検閲の目標の一つとして、回線上のTorの通信を観察している  | 
                    
| 1159 | 1159 | 
                        攻撃者が<a  | 
                    
| 1160 | 
                        -href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">  | 
                    |
| 1160 | 
                        +href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">  | 
                    |
| 1161 | 1161 | 
                        Torの通信を通常のSSLの通信と区別する</a>  | 
                    
| 1162 | 1162 | 
                        ことを妨げることが挙げられます。明らかに私たちは完全で依然利用可能な  | 
                    
| 1163 | 1163 | 
                        ステガノグラフィをを得ることは出来ませんが、始めの一歩として数個の  | 
                    
| ... | ... | 
                      @@ -84,12 +84,12 @@ zou interessant kunnen zijn voor ontwikkelaars.</li>  | 
                  
| 84 | 84 | 
                        <ul>  | 
                    
| 85 | 85 | 
                        <li>Het <b>ontwerpdocument</b> gepubliceerd op het Usenix Security 2004  | 
                    
| 86 | 86 | 
                        symposium geeft de onderbouwing en veiligheidsanalyse voor het Tor concept:  | 
                    
| 87 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> en  | 
                    |
| 88 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>  | 
                    |
| 87 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> en  | 
                    |
| 88 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>  | 
                    |
| 89 | 89 | 
                        versies beschikbaar.</li>  | 
                    
| 90 | 90 | 
                        <li>Ons opvolgende werkdocument over <b>uitdagingen in laag-latente anonimiteit</b>  | 
                    
| 91 | 91 | 
                        zet onze recente ervaringen en richtingen uiteen:  | 
                    
| 92 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">PDF  | 
                    |
| 92 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">PDF  | 
                    |
| 93 | 93 | 
                        werkdocument</a>.</li>  | 
                    
| 94 | 94 | 
                        <li>Ons artikel op de WEIS 2006 getiteld <b>Anonymity Loves Company:  | 
                    
| 95 | 95 | 
                        Usability and the Network Effect</b> legt uit hoe de bruikbaarheid van  | 
                    
| ... | ... | 
                      @@ -98,8 +98,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>  | 
                  
| 98 | 98 | 
                        <li>Ons voorlopig ontwerp, om het grote firewalls moeilijker te maken  | 
                    
| 99 | 99 | 
                        de toegang tot het Tor network te blokkeren, wordt beschreven in  | 
                    
| 100 | 100 | 
                        <b>Design of a Blocking-Resistant Anonymity System</b>:  | 
                    
| 101 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">PDF werkdocument</a> en  | 
                    |
| 102 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">HTML werkdocument</a>.  | 
                    |
| 101 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">PDF werkdocument</a> en  | 
                    |
| 102 | 
                        +<a href="<svnprojects>design-paper/blocking.html">HTML werkdocument</a>.  | 
                    |
| 103 | 103 | 
                        U kunt ook de <a  | 
                    
| 104 | 104 | 
                        href="http://freehaven.net/~arma/slides-23c3.pdf">dia's</a> en <a  | 
                    
| 105 | 105 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">videoclip</a>  | 
                    
| ... | ... | 
                      @@ -271,7 +271,7 @@ verkeerd aan is.</li>  | 
                  
| 271 | 271 | 
                        eerste plaats om te beginnen.</li>  | 
                    
| 272 | 272 | 
                         | 
                    
| 273 | 273 | 
                        <li>Geen van alle naar uw zin? Kijk naar de <a  | 
                    
| 274 | 
                        -href="<gitblob>doc/design-paper/roadmap-2007.pdf">plan voor verdere  | 
                    |
| 274 | 
                        +href="<svnprojects>design-paper/roadmap-2007.pdf">plan voor verdere  | 
                    |
| 275 | 275 | 
                        ontwikkeling van Tor</a> voor meer idee�n.</li>  | 
                    
| 276 | 276 | 
                        <li>Uw idee hier niet gevonden? Tien tegen ��n dat we het toch nodig hebben! Neem  | 
                    
| 277 | 277 | 
                        contact met ons op.</li>  | 
                    
| ... | ... | 
                      @@ -116,7 +116,7 @@ Rogera z 23C3 w grudniu 2006 (<a  | 
                  
| 116 | 116 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">wideo</a>,  | 
                    
| 117 | 117 | 
                        <a href="http://freehaven.net/~arma/slides-23c3.pdf">slajdy</a>,  | 
                    
| 118 | 118 | 
                        <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstrakt</a>,  | 
                    
| 119 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">dokument projektowy</a>),  | 
                    |
| 119 | 
                        +<a href="<svnprojects>design-paper/blocking.html">dokument projektowy</a>),  | 
                    |
| 120 | 120 | 
                        lub przemówienie "Bieżące wydarzenia w roku 2007" Rogera z 24C3 w grudniu  | 
                    
| 121 | 121 | 
                        2007 (<a  | 
                    
| 122 | 122 | 
                        href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">wideo</a>,  | 
                    
| ... | ... | 
                      @@ -189,11 +189,11 @@ a kanał IRC #tor to miejsce na mniej złożone dyskusje.  | 
                  
| 189 | 189 | 
                        <ul>  | 
                    
| 190 | 190 | 
                        <li><b>Dokumenty Projektu</b> (opublikowane na Usenix Security 2004)  | 
                    
| 191 | 191 | 
                        podaje nasze uzasadnienia i analizy bezpieczeństwa projektu Tora: są wersje  | 
                    
| 192 | 
                        - <a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> i  | 
                    |
| 193 | 
                        - <a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>.</li>  | 
                    |
| 192 | 
                        + <a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> i  | 
                    |
| 193 | 
                        + <a href="<svnprojects>design-paper/tor-design.html">HTML</a>.</li>  | 
                    |
| 194 | 194 | 
                        <li>Nasz dodatkowy dokument na temat <b>wyzwań w krótkoczasowej anonimowości</b>  | 
                    
| 195 | 195 | 
                        (ciągle w postaci szkicu) podaje szczegóły nowszych doświadczeń i kierunki:  | 
                    
| 196 | 
                        - <a href="<gitblob>doc/design-paper/challenges.pdf">szkic  | 
                    |
| 196 | 
                        + <a href="<svnprojects>design-paper/challenges.pdf">szkic  | 
                    |
| 197 | 197 | 
                        PDF</a>.</li>  | 
                    
| 198 | 198 | 
                        <li>Nasz dokument z WEIS 2006 — <b>Anonimowość uwielbia towarzystwo:  | 
                    
| 199 | 199 | 
                        użyteczność i efekt sieci</b> — tłumaczy, dlaczego użyteczność w  | 
                    
| ... | ... | 
                      @@ -202,8 +202,8 @@ a kanał IRC #tor to miejsce na mniej złożone dyskusje.  | 
                  
| 202 | 202 | 
                        <li>Nasz wstępny projekt jak utrudnić wielkim zaporom ogniowym (firewallom)  | 
                    
| 203 | 203 | 
                        zapobieganie dostępowi do sieci Tor jest opisany w  | 
                    
| 204 | 204 | 
                        <b>projekcie systemu anonimowości odpornego na blokowanie</b>:  | 
                    
| 205 | 
                        - <a href="<gitblob>doc/design-paper/blocking.pdf">szkic PDF</a> i  | 
                    |
| 206 | 
                        - <a href="<gitblob>doc/design-paper/blocking.html">szkic HTML</a>.  | 
                    |
| 205 | 
                        + <a href="<svnprojects>design-paper/blocking.pdf">szkic PDF</a> i  | 
                    |
| 206 | 
                        + <a href="<svnprojects>design-paper/blocking.html">szkic HTML</a>.  | 
                    |
| 207 | 207 | 
                        Chcesz <a href="<page volunteer>#Coding">pomóc nam to stworzyć</a>?</li>  | 
                    
| 208 | 208 | 
                        <li><b>Specyfikacje</b> mają za zadanie dać  | 
                    
| 209 | 209 | 
                        deweloperom dość informacji, by stworzyć kompatybilną wersję Tora:  | 
                    
| ... | ... | 
                      @@ -1013,7 +1013,7 @@ w celu odkrycia klucza nie podziała.  | 
                  
| 1013 | 1013 | 
                        <b>Uwierzytelnianie</b>: Każdy przekaźnik sieci Tora ma publiczny klucz  | 
                    
| 1014 | 1014 | 
                        deszyfrujący zwany "kluczem cebulowym". Gdy klient Tora uruchamia obwody, na  | 
                    
| 1015 | 1015 | 
                        każdym kroku <a  | 
                    
| 1016 | 
                        -href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">żąda, by  | 
                    |
| 1016 | 
                        +href="<svnprojects>design-paper/tor-design.html#subsec:circuits">żąda, by  | 
                    |
| 1017 | 1017 | 
                        przekaźnik sieci udowodnił znajomość swojego klucza cebulowego</a>. Tym  | 
                    
| 1018 | 1018 | 
                        sposobem, pierwszy węzeł w ścieżce nie może podszyć się pod resztę  | 
                    
| 1019 | 1019 | 
                        ścieżki. Każdy przekaźnik zmienia swój klucz raz w tygodniu.  | 
                    
| ... | ... | 
                      @@ -1114,7 +1114,7 @@ wymagać, by każdy przekaźnik mógł się połączyć z każdym) i katalogów  | 
                  
| 1114 | 1114 | 
                        przestać wymagać, by wszyscy użytkownicy Tora wiedzieli o wszystkich  | 
                    
| 1115 | 1115 | 
                        przekaźnikach). Takie zmiany mogą mieć wielki wpływ na potencjalną i  | 
                    
| 1116 | 1116 | 
                        rzeczywistą anonimowość. Przeczytaj sekcję 5 dokumentu <a  | 
                    
| 1117 | 
                        -href="<gitblob>doc/design-paper/challenges.pdf">Wyzwania</a>, by poznać  | 
                    |
| 1117 | 
                        +href="<svnprojects>design-paper/challenges.pdf">Wyzwania</a>, by poznać  | 
                    |
| 1118 | 1118 | 
                        szczegóły. Ponownie, transport UDP by tu pomógł.  | 
                    
| 1119 | 1119 | 
                        </p>  | 
                    
| 1120 | 1120 | 
                         | 
                    
| ... | ... | 
                      @@ -135,7 +135,7 @@ punktem spotkania, a pozostałe 3 zostały wybrane przez usługę ukrytą.  | 
                  
| 135 | 135 | 
                         | 
                    
| 136 | 136 | 
                        <p>  | 
                    
| 137 | 137 | 
                        Istnieją bardziej szczegółowe opisy protokołu usług ukrytych niż ta strona.  | 
                    
| 138 | 
                        -Przeczytaj <a href="<gitblob>doc/design-paper/tor-design.pdf">dokument projektowy Tora</a>  | 
                    |
| 138 | 
                        +Przeczytaj <a href="<svnprojects>design-paper/tor-design.pdf">dokument projektowy Tora</a>  | 
                    |
| 139 | 139 | 
                        zawierający dogłębny opis projektu, oraz  | 
                    
| 140 | 140 | 
                        <a href="<gitblob>doc/spec/rend-spec.txt">specyfikację spotkań (rendezvous)</a>,  | 
                    
| 141 | 141 | 
                        zawierającą formaty wiadomości.  | 
                    
| ... | ... | 
                      @@ -187,7 +187,7 @@ Poziom umiejętności: <i>Wysoki</i>  | 
                  
| 187 | 187 | 
                        Prawdopodobni opiekunowie: <i>Nick, Roger, Steven</i>  | 
                    
| 188 | 188 | 
                        <br />  | 
                    
| 189 | 189 | 
                        Wersje 0.2.1.x Tora robią <a  | 
                    
| 190 | 
                        -href="<gitblob>doc/design-paper/blocking.html">znaczne postępy</a> w opieraniu  | 
                    |
| 190 | 
                        +href="<svnprojects>design-paper/blocking.html">znaczne postępy</a> w opieraniu  | 
                    |
| 191 | 191 | 
                        się narodowej i firmowej cenzurze. Ale Tor ciągle potrzebuje lepszych mechanizmów w  | 
                    
| 192 | 192 | 
                        niektórych częściach projektu anty-cenzurowania. Na przykład, bieżące wersje mogą  | 
                    
| 193 | 193 | 
                        nasłuchiwać połączeń tylko na jednym zestawie adres/port na raz. Istnieje  | 
                    
| ... | ... | 
                      @@ -199,7 +199,7 @@ W chwili obecnej ktokolwiek może zidentyfikować  | 
                  
| 199 | 199 | 
                        <a href="<gitblob>doc/spec/proposals/125-bridges.txt">mostki Tora</a>  | 
                    
| 200 | 200 | 
                        po prostu łącząc się z nimi, zgodnie z protokołem Tora, i sprawdzając,  | 
                    
| 201 | 201 | 
                        czy odpowiadają. By rozwiązać ten problem, mostki mogłyby  | 
                    
| 202 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">udawać serwery  | 
                    |
| 202 | 
                        +<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">udawać serwery  | 
                    |
| 203 | 203 | 
                        internetowe</a> (HTTP lub HTTPS), gdy łączą się z nimi programy do skanowania portów,  | 
                    
| 204 | 204 | 
                        a nie zachowywać się jak mostki do chwili, gdy użytkownik poda klucz specyficzny  | 
                    
| 205 | 205 | 
                        dla mostka.  | 
                    
| ... | ... | 
                      @@ -837,7 +837,7 @@ dwa rzędy wielkości niż wtedy, gdy napisano ten dokument.) Przeczytaj też  | 
                  
| 837 | 837 | 
                         | 
                    
| 838 | 838 | 
                        <li>Nasze cele w opieraniu się cenzurze to m.in. zapobieganie temu, by napastnik  | 
                    
| 839 | 839 | 
                        podglądający ruch Tora mógł <a  | 
                    
| 840 | 
                        -href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint"  | 
                    |
| 840 | 
                        +href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint"  | 
                    |
| 841 | 841 | 
                        >odróżnić go od normalnego ruchu SSL</a>. Oczywiście, nie możemy osiągnąć idealnej  | 
                    
| 842 | 842 | 
                        steganografii i dalej mieć użyteczną i działającą sieć, ale w pierwszym kroku  | 
                    
| 843 | 843 | 
                        chcielibyśmy blokować jakiekolwiek ataki, które mogą się udać po obserwacji tylko  | 
                    
| ... | ... | 
                      @@ -113,7 +113,7 @@ and circumvention" de Roger, no 23C3 em dezembro de 2006 (<a  | 
                  
| 113 | 113 | 
                        href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">vídeo</a>,  | 
                    
| 114 | 114 | 
                        <a href="http://freehaven.net/~arma/slides-23c3.pdf">slides</a>,  | 
                    
| 115 | 115 | 
                        <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,  | 
                    
| 116 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">design paper</a>),  | 
                    |
| 116 | 
                        +<a href="<svnprojects>design-paper/blocking.html">design paper</a>),  | 
                    |
| 117 | 117 | 
                        e a palestra "Current events in 2007" de Roger, no 24C3 em dezembro  | 
                    
| 118 | 118 | 
                        de 2007 (<a  | 
                    
| 119 | 119 | 
                        href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">vídeo</a>,  | 
                    
| ... | ... | 
                      @@ -182,12 +182,12 @@ pode ser interessante para desenvolvedores.</li>  | 
                  
| 182 | 182 | 
                        <li>O <b>documento de design</b> (publicado na Usenix Security 2004)  | 
                    
| 183 | 183 | 
                        tem as nossas justificativas e análise de segurança para o design do Tor:  | 
                    
| 184 | 184 | 
                        estão disponíveis versões em  | 
                    
| 185 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> e  | 
                    |
| 186 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>.</li>  | 
                    |
| 185 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> e  | 
                    |
| 186 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>.</li>  | 
                    |
| 187 | 187 | 
                        <li>Nosso paper seguinte sobre <b>challenges in low-latency anonymity</b>  | 
                    
| 188 | 188 | 
                         ("desafios em anonimato de baixa latência" - ainda em rascunho) detalha as
                       | 
                    
| 189 | 189 | 
                        experiências e diretrizes mais recentes:  | 
                    
| 190 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">rascunho em PDF</a>.</li>  | 
                    |
| 190 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">rascunho em PDF</a>.</li>  | 
                    |
| 191 | 191 | 
                        <li>Nosso paper da WEIS 2006 — <b>Anonymity Loves Company:  | 
                    
| 192 | 192 | 
                        Usability and the Network Effect</b> (Anonimato Adora Companhia: Usabilidade e o  | 
                    
| 193 | 193 | 
                        Efeito Rede) — explica porque a usabilidade em sistemas de anonimato  | 
                    
| ... | ... | 
                      @@ -196,8 +196,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>  | 
                  
| 196 | 196 | 
                        <li>Nosso design preliminar para dificultar o bloqueio de acesso à rede Tor por  | 
                    
| 197 | 197 | 
                        grandes firewalls está descrito em  | 
                    
| 198 | 198 | 
                        <b>design of a blocking-resistant anonymity system</b>:  | 
                    
| 199 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">rascunho em PDF</a> e  | 
                    |
| 200 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html">rascunho em HTML</a>.  | 
                    |
| 199 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">rascunho em PDF</a> e  | 
                    |
| 200 | 
                        +<a href="<svnprojects>design-paper/blocking.html">rascunho em HTML</a>.  | 
                    |
| 201 | 201 | 
                        Quer nos <a href="<page volunteer>#Coding">ajudar a construí-lo</a>?</li>  | 
                    
| 202 | 202 | 
                        <li>As <b>especificações</b> têm como objetivo dar aos desenvolvedores informação  | 
                    
| 203 | 203 | 
                        suficiente para construir uma versão compatível do Tor:  | 
                    
| ... | ... | 
                      @@ -155,7 +155,7 @@ href="http://freehaven.net/anonbib/#hs-attack06">Расположение Скр  | 
                  
| 155 | 155 | 
                         | 
                    
| 156 | 156 | 
                        <p>  | 
                    
| 157 | 157 | 
                        Существуют более подробные описания протокола скрытых сервисов. Обратите  | 
                    
| 158 | 
                        -внимание на <a href="<gitblob>doc/design-paper/tor-design.pdf">Документ об  | 
                    |
| 158 | 
                        +внимание на <a href="<svnprojects>design-paper/tor-design.pdf">Документ об  | 
                    |
| 159 | 159 | 
                        архитектуре сети Tor</a> для получения более углубленной информации об  | 
                    
| 160 | 160 | 
                        архитектуре и <a href="<gitblob>doc/spec/rend-spec.txt">спецификациях точек  | 
                    
| 161 | 161 | 
                        синхронизации</a> для форматов сообщений.  | 
                    
| ... | ... | 
                      @@ -79,18 +79,18 @@ href="http://archives.seul.org/or/cvs/">cvs commits</a> som skulle kunna intress  | 
                  
| 79 | 79 | 
                        <ul>  | 
                    
| 80 | 80 | 
                        <li><b>Design dokument</b> (publiserat på Usenix Security 2004)  | 
                    
| 81 | 81 | 
                        anger våra skäl och säkerhetsanalys av Tors design:  | 
                    
| 82 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> och  | 
                    |
| 83 | 
                        -<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>  | 
                    |
| 82 | 
                        +<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> och  | 
                    |
| 83 | 
                        +<a href="<svnprojects>design-paper/tor-design.html">HTML</a>  | 
                    |
| 84 | 84 | 
                        version finns.</li>  | 
                    
| 85 | 85 | 
                        <li>Vår uppföljande artikel angående <b>utmaningar i lågfördröjningsanonymitet</b>  | 
                    
| 86 | 86 | 
                        (fortfarande i utkast-format) anger i detalj de senaste erfarenheterna och inriktingar:  | 
                    
| 87 | 
                        -<a href="<gitblob>doc/design-paper/challenges.pdf">PDF  | 
                    |
| 87 | 
                        +<a href="<svnprojects>design-paper/challenges.pdf">PDF  | 
                    |
| 88 | 88 | 
                        version</a>.</li>  | 
                    
| 89 | 89 | 
                         | 
                    
| 90 | 90 | 
                        <li>En prelimin�r desing f�r att g�re det sv�rare f�r stora brandv�ggar att  | 
                    
| 91 | 91 | 
                        hindra tillg�ng till Tor-n�tverket finns beskrivet i  | 
                    
| 92 | 92 | 
                        <b>design of a blocking-resistant anonymity system</b>:  | 
                    
| 93 | 
                        -<a href="<gitblob>doc/design-paper/blocking.pdf">PDF draft</a>.  | 
                    |
| 93 | 
                        +<a href="<svnprojects>design-paper/blocking.pdf">PDF draft</a>.  | 
                    |
| 94 | 94 | 
                        Se ocks� <a href="http://freehaven.net/~arma/slides-23c3.pdf">bilder</a> och  | 
                    
| 95 | 95 | 
                        <a href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>  | 
                    
| 96 | 96 | 
                        fr�n Rogers <a href="http://events.ccc.de/congress/2006/Home">23C3 f�redrag</a>.  | 
                    
| ... | ... | 
                      @@ -222,7 +222,7 @@ Effort Level: <i>Medium</i>  | 
                  
| 222 | 222 | 
                        Skill Level: <i>High</i>  | 
                    
| 223 | 223 | 
                        <br />  | 
                    
| 224 | 224 | 
                        Likely Mentors: <i>Nick, Roger, Steven</i>  | 
                    
| 225 | 
                        -Tor 0.2.0.x系列的<a href="<gitblob>doc/design-paper/blocking.html">一个重要改进</a  | 
                    |
| 225 | 
                        +Tor 0.2.0.x系列的<a href="<svnprojects>design-paper/blocking.html">一个重要改进</a  | 
                    |
| 226 | 226 | 
                        >是提高了抵抗政府机关或者组织探测的能力。但是 Tor 的反审查设计在某些方面仍然需要  | 
                    
| 227 | 227 | 
                        更好的机制来改进。比如,现在 Tor 只能在一个 地址/端口 对上进行监听,  | 
                    
| 228 | 228 | 
                        有<a href="<gitblob>doc/spec/proposals/118-multiple-orports.txt">建议放开这个限制</a>,  | 
                    
| ... | ... | 
                      @@ -231,7 +231,7 @@ Tor 0.2.0.x系列的<a href="<gitblob>doc/design-paper/blocking.html">一个重  | 
                  
| 231 | 231 | 
                        的扫描者可以通过尝试连接一个假定的 Tor 主机,向其发送 Tor 协议包,并检查它的响应来确定  | 
                    
| 232 | 232 | 
                        它是否在运行<a href="<gitblob>doc/spec/proposals/125-bridges.txt"> Tor 网桥</a>。  | 
                    
| 233 | 233 | 
                        要解决这个问题,当受到端口扫描工具扫描的时候,网桥应该  | 
                    
| 234 | 
                        -<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">伪装成一个 web 服务器</a>  | 
                    |
| 234 | 
                        +<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">伪装成一个 web 服务器</a>  | 
                    |
| 235 | 235 | 
                        (HTTP或者HTTPS),如果对方没有提供正确的网桥 key,那么它不会作出正确的网桥连接响应。  | 
                    
| 236 | 236 | 
                        <br />  | 
                    
| 237 | 237 | 
                        这部分的工作需要大量的研究和设计。一个巨大的挑战是,即使一个攻击者知道我们的算法和机制,  | 
                    
| ... | ... | 
                      @@ -1065,7 +1065,7 @@ href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">ssh 吞吐量  | 
                  
| 1065 | 1065 | 
                        </li>  | 
                    
| 1066 | 1066 | 
                         | 
                    
| 1067 | 1067 | 
                        <!-- NEED HELP -->  | 
                    
| 1068 | 
                        -<li>我们反审查机制的目标包括防止攻击者<a href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">  | 
                    |
| 1068 | 
                        +<li>我们反审查机制的目标包括防止攻击者<a href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">  | 
                    |
| 1069 | 1069 | 
                        从普通 SSL 传输中区分 Tor 数据包</a>。很明显,我们不可能既做到完美的隐藏又保持可用性,但是,  | 
                    
| 1070 | 1070 | 
                        首先,我们希望能够阻止攻击者仅仅观察几个数据包就可以取得成功。在这些攻击中,有一个我们没有进行太多测试的  | 
                    
| 1071 | 1071 | 
                        问题是,Tor 的数据包是以512字节为单位的,因此,传输的数据包可以是512字节的倍数。在物理线路上,  | 
                    
| 1072 | 1072 |