Now that the design paper was moved back to Subversion, fix links (see tor.git changeset f164a76 and svn revision r21665). Found by katoda
Steven Murdoch

Steven Murdoch commited on 2010-03-25 17:12:54
Zeige 30 geänderte Dateien mit 92 Einfügungen und 92 Löschungen.

... ...
@@ -1103,7 +1103,7 @@ Tor သည္ မ်ိဳးစံုေသာ ကဲြျပားျခာ
1103 1103
 <p>
1104 1104
 <b>Authentication</b>: Every Tor relay has a public decryption key called
1105 1105
 the "onion key".  When the Tor client establishes circuits, at each step it
1106
-<a href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">demands
1106
+<a href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demands
1107 1107
 that the Tor relay prove knowledge of its onion key</a>. That way the first
1108 1108
 node in the path can't just spoof the rest of the path.  Each relay rotates
1109 1109
 its onion key once a week.
... ...
@@ -1212,7 +1212,7 @@ requiring that all Tor relays be able to connect to all Tor relays) and of
1212 1212
 the directory (how to stop requiring that all Tor users know about all Tor
1213 1213
 relays). Changes like this can have large impact on potential and actual
1214 1214
 anonymity. See Section 5 of the <a
1215
-href="<gitblob>doc/design-paper/challenges.pdf">Challenges</a> paper for
1215
+href="<svnprojects>design-paper/challenges.pdf">Challenges</a> paper for
1216 1216
 details. Again, UDP transport would help here.
1217 1217
 </p>
1218 1218
 
... ...
@@ -86,7 +86,7 @@ Rogers Vortrag <q>blocking-resistance and circumvention</q> vom 23C3 im Dezember
86 86
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">Video</a>, <a
87 87
 href="http://freehaven.net/~arma/slides-23c3.pdf">Folien</a>, <a
88 88
 href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">Kurzdarstellung</a>,
89
-<a href="<gitblob>doc/design-paper/blocking.html">Designvorschlag</a>) und
89
+<a href="<svnprojects>design-paper/blocking.html">Designvorschlag</a>) und
90 90
 Rogers Vortrag <q>Current events in 2007</q> vom 24C3 aus dem Dezember 2007 (<a
91 91
 href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">Video</a>,
92 92
 <a href="http://freehaven.net/~arma/slides-24c3.pdf">Folien</a>, <a
... ...
@@ -153,13 +153,13 @@ ist das die Liste für dich.</li> </ul>
153 153
   <ul>
154 154
     <li>Das <b>Designdokument</b> (zur Usenix Security 2004 veröffentlicht)
155 155
       gibt dir unsere Einstellungen und Sicherheitsanalyse zum Tor-Design:
156
-      <a href="<gitblob>doc/design-paper/tor-design.pdf">PDF-Entwurf  (engl.)</a> und
157
-      <a href="<gitblob>doc/design-paper/tor-design.html">HTML-Entwurf (engl.)</a>
156
+      <a href="<svnprojects>design-paper/tor-design.pdf">PDF-Entwurf  (engl.)</a> und
157
+      <a href="<svnprojects>design-paper/tor-design.html">HTML-Entwurf (engl.)</a>
158 158
       stehen zur Verfügung.</li>
159 159
     <li>Das darauf folgende Papier mit dem Titel <q>challenges in low-latency
160 160
       anonymity</q> (noch im Entwurf) hat mehr Details über die letzten
161 161
       Erfahrungen und Richtungen: <a
162
-      href="<gitblob>doc/design-paper/challenges.pdf">PDF version
162
+      href="<svnprojects>design-paper/challenges.pdf">PDF version
163 163
       (engl.)</a>.</li>
164 164
       <li>Unsere Veröffentlichung bei der WEIS 2006 &mdash; <b>Anonymity Loves
165 165
       Company: Usability and the Network Effect</b> &mdash; erklärt, warum
... ...
@@ -169,7 +169,7 @@ ist das die Liste für dich.</li> </ul>
169 169
       <li>Unser vorläufiges Design, um Firewalls den Zugriff auf das
170 170
       Tornetzwerk zu erschweren, ist in <b>design of a blocking-resistant
171 171
       anonymity system</b> (<a
172
-      href="<gitblob>doc/design-paper/blocking.pdf">PDF-Entwurf</a>)
172
+      href="<svnprojects>design-paper/blocking.pdf">PDF-Entwurf</a>)
173 173
       beschrieben. Du kannst auch einen Blick auf die <a
174 174
       href="http://freehaven.net/~arma/slides-23c3.pdf">Vortragsunterlagen</a>
175 175
       oder das <a
... ...
@@ -140,7 +140,7 @@ Client und drei vom versteckten Dienst gewählt.
140 140
 <p>Es gibt detailliertere Beschreibungen zu dem Protokoll als diese
141 141
 Seite. Schaue dir hierzu die
142 142
 <a
143
-href="<gitblob>doc/design-paper/tor-design.pdf">Designbeschreibung
143
+href="<svnprojects>design-paper/tor-design.pdf">Designbeschreibung
144 144
 von Tor</a> und die
145 145
 <a
146 146
 href="<gitblob>doc/spec/rend-spec.txt">Rendezvous-Spezifikation</a>
... ...
@@ -226,7 +226,7 @@ Skill Level: <i>High</i>
226 226
 Likely Mentors: <i>Nick, Roger, Steven</i>
227 227
 <br />
228 228
 The Tor 0.2.0.x series makes <a
229
-href="<gitblob>doc/design-paper/blocking.html">significant
229
+href="<svnprojects>design-paper/blocking.html">significant
230 230
 improvements</a> in resisting national and organizational censorship.
231 231
 But Tor still needs better mechanisms for some parts of its
232 232
 anti-censorship design.  For example, current Tors can only listen on a
... ...
@@ -239,7 +239,7 @@ to make Tor more scanning-resistant.  Right now, an adversary can identify
239 239
 <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
240 240
 just by trying to connect to them, following the Tor protocol, and
241 241
 seeing if they respond.  To solve this, bridges could
242
-<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like
242
+<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
243 243
 webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
244 244
 and not act like bridges until the user provides a bridge-specific key.
245 245
 <br />
... ...
@@ -1143,7 +1143,7 @@ throughput experiment</a>. We'll need to measure and tweak, and maybe
1143 1143
 overhaul if the results are good.</li>
1144 1144
 <li>Our censorship-resistance goals include preventing
1145 1145
 an attacker who's looking at Tor traffic on the wire from <a
1146
-href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">distinguishing
1146
+href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguishing
1147 1147
 it from normal SSL traffic</a>. Obviously we can't achieve perfect
1148 1148
 steganography and still remain usable, but for a first step we'd like to
1149 1149
 block any attacks that can win by observing only a few packets. One of
... ...
@@ -985,7 +985,7 @@ won't work.
985 985
 <b>Authentication</b>:
986 986
 Every Tor relay has a public decryption key called the "onion key".
987 987
 When the Tor client establishes circuits, at each step it <a
988
-href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">demands
988
+href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demands
989 989
 that the Tor relay prove knowledge of its onion key</a>. That way
990 990
 the first node in the path can't just spoof the rest of the path.
991 991
 Each relay rotates its onion key once a week.
... ...
@@ -1084,7 +1084,7 @@ stop requiring that all Tor relays be able to connect to all Tor
1084 1084
 relays) and of the directory (how to stop requiring that all Tor
1085 1085
 users know about all Tor relays). Changes like this can have large
1086 1086
 impact on potential and actual anonymity. See Section 5 of the <a
1087
-href="<gitblob>doc/design-paper/challenges.pdf">Challenges</a> paper
1087
+href="<svnprojects>design-paper/challenges.pdf">Challenges</a> paper
1088 1088
 for details. Again, UDP transport would help here.
1089 1089
 </p>
1090 1090
 
... ...
@@ -146,7 +146,7 @@ service.
146 146
 <p>
147 147
 There are more detailed descriptions about the hidden service protocol than
148 148
 this one. See the
149
-<a href="<gitblob>doc/design-paper/tor-design.pdf">Tor design paper</a>
149
+<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
150 150
 for an in-depth design description and the
151 151
 <a href="<gitblob>doc/spec/rend-spec.txt">rendezvous specification</a>
152 152
 for the message formats.
... ...
@@ -202,7 +202,7 @@ Skill Level: <i>High</i>
202 202
 Likely Mentors: <i>Nick, Roger, Steven</i>
203 203
 <br />
204 204
 The Tor 0.2.1.x series makes <a
205
-href="<gitblob>doc/design-paper/blocking.html">significant
205
+href="<svnprojects>design-paper/blocking.html">significant
206 206
 improvements</a> in resisting national and organizational censorship.
207 207
 But Tor still needs better mechanisms for some parts of its
208 208
 anti-censorship design.  For example, current Tors can only listen on a
... ...
@@ -869,7 +869,7 @@ more scanning-resistant.  Right now, an adversary can identify <a
869 869
 href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
870 870
 just by trying to connect to them, following the Tor protocol,
871 871
 and seeing if they respond.  To solve this, bridges could <a
872
-href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like
872
+href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
873 873
 webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
874 874
 and not act like bridges until the user provides a bridge-specific key.
875 875
 To start, check out Shane Pope's <a
... ...
@@ -971,7 +971,7 @@ throughput experiment</a>. We'll need to measure and tweak, and maybe
971 971
 overhaul if the results are good.</li>
972 972
 <li>Our censorship-resistance goals include preventing
973 973
 an attacker who's looking at Tor traffic on the wire from <a
974
-href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">distinguishing
974
+href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguishing
975 975
 it from normal SSL traffic</a>. Obviously we can't achieve perfect
976 976
 steganography and still remain usable, but for a first step we'd like to
977 977
 block any attacks that can win by observing only a few packets. One of
... ...
@@ -83,12 +83,12 @@ es únicamente para desarrolladores y tiene muy poco tráfico.</li>
83 83
 <li>El <b>documento de dise&ntilde;o</b> (publicado en Usenix Security 2004)
84 84
 da nuestras justificaciones y análisis de seguridad para el dise&ntilde;o de Tor:
85 85
 versiones disponibles
86
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> y
87
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>
86
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> y
87
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>
88 88
 .</li>
89 89
 <li>Nuestro documento de reafirmación en <b>desafíos en el anonimato de baja latencia</b>
90 90
 (todavía en forma de borrador) detalla experiencias y direcciones mas recientes:
91
-<a href="<gitblob>doc/design-paper/challenges.pdf">versión PDF</a>.</li>
91
+<a href="<svnprojects>design-paper/challenges.pdf">versión PDF</a>.</li>
92 92
 <li>Nuestro artículo en WEIS 2006 &mdash; <b>Anonymity Loves Company:
93 93
 Usability and the Network Effect (Al anonimato le encanta la compañía:
94 94
 Usabilidad y el efecto en red)</b> &mdash; explica porqué la usabilidad
... ...
@@ -97,8 +97,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>
97 97
 <li>Nuestro diseño preliminar para hacer más difícil que cortafuegos grandes
98 98
 eviten el acceso a la red Tor se describe en 
99 99
 <b>el diseño de un sistema de anonimato resistente al bloqueo</b>:
100
-<a href="<gitblob>doc/design-paper/blocking.pdf">borrador PDF</a> y
101
-<a href="<gitblob>doc/design-paper/blocking.html">borrador HTML</a>.
100
+<a href="<svnprojects>design-paper/blocking.pdf">borrador PDF</a> y
101
+<a href="<svnprojects>design-paper/blocking.html">borrador HTML</a>.
102 102
 También puede ver <a
103 103
 href="http://freehaven.net/~arma/slides-23c3.pdf">transparencias</a> y <a
104 104
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">vídeo</a>
... ...
@@ -231,7 +231,7 @@ para Tor y UDP</a> &mdash; por favor díganos qué problemas tiene.</li>
231 231
 de destino (en los nodos de salida). Si le importa mucho IPv6, ése es
232 232
 probablemente el primer sitio para empezar.</li>
233 233
 <li>¿No le gusta ninguna de éstas? Mire el <a
234
-href="<gitblob>doc/design-paper/roadmap-2007.pdf">plan de desarrollo Tor</a> 
234
+href="<svnprojects>design-paper/roadmap-2007.pdf">plan de desarrollo Tor</a> 
235 235
 para más ideas.</li>
236 236
 <li>¿No ve su idea aquí? ¡Probablemente la necesitemos de todas formas! 
237 237
 Contáctenos y averígüelo.</li>
... ...
@@ -119,7 +119,7 @@ how Tor is built.
119 119
 
120 120
 <li>
121 121
 There's a skeletal <a
122
-href="<gitblob>doc/design-paper/roadmap-future.pdf">list of items
122
+href="<svnprojects>design-paper/roadmap-future.pdf">list of items
123 123
 we'd like to tackle in the future</a>. Alas, many of those items need
124 124
 to be fleshed out more before they'll make sense to people who aren't
125 125
 Tor developers, but you can still get a general sense of what issues
... ...
@@ -136,7 +136,7 @@ and circumvention" talk from 23C3 in December 2006 (<a
136 136
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>,
137 137
 <a href="http://freehaven.net/~arma/slides-23c3.pdf">slides</a>,
138 138
 <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,
139
-<a href="<gitblob>doc/design-paper/blocking.html">design paper</a>),
139
+<a href="<svnprojects>design-paper/blocking.html">design paper</a>),
140 140
 and Roger's "Current events in 2007" talk from 24C3 in December
141 141
 2007 (<a
142 142
 href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">video</a>,
... ...
@@ -175,12 +175,12 @@ is where the less complex discussion happens.
175 175
 <ul>
176 176
 <li>The <b>design document</b> (published at Usenix Security 2004)
177 177
 gives our justifications and security analysis for the Tor design:
178
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> and
179
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>
178
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> and
179
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>
180 180
 versions available.</li>
181 181
 <li>Our follow-up paper on <b>challenges in low-latency anonymity</b>
182 182
 (still in draft form) details more recent experiences and directions:
183
-<a href="<gitblob>doc/design-paper/challenges.pdf">PDF
183
+<a href="<svnprojects>design-paper/challenges.pdf">PDF
184 184
 draft</a>.</li>
185 185
 <li>Our paper at WEIS 2006 &mdash; <b>Anonymity Loves Company:
186 186
 Usability and the Network Effect</b> &mdash; explains why usability in
... ...
@@ -189,8 +189,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>
189 189
 <li>Our preliminary design to make it harder for large firewalls to
190 190
 prevent access to the Tor network is described in
191 191
 <b>design of a blocking-resistant anonymity system</b>:
192
-<a href="<gitblob>doc/design-paper/blocking.pdf">PDF draft</a> and
193
-<a href="<gitblob>doc/design-paper/blocking.html">HTML draft</a>.
192
+<a href="<svnprojects>design-paper/blocking.pdf">PDF draft</a> and
193
+<a href="<svnprojects>design-paper/blocking.html">HTML draft</a>.
194 194
 Want to <a href="<page volunteer>#Coding">help us build it</a>?</li>
195 195
 <li>The <b>specifications</b> aim to give
196 196
 developers enough information to build a compatible version of Tor:
... ...
@@ -351,7 +351,7 @@ Skill Level: <i>High</i>
351 351
 Likely Mentors: <i>Nick</i>
352 352
 <br />
353 353
 The Tor 0.2.0.x series makes <a
354
-href="<gitblob>doc/design-paper/blocking.html">significant
354
+href="<svnprojects>design-paper/blocking.html">significant
355 355
 improvements</a> in resisting national and organizational censorship.
356 356
 But Tor still needs better mechanisms for some parts of its
357 357
 anti-censorship design.  For example, current Tors can only listen on a
... ...
@@ -364,7 +364,7 @@ to make Tor more scanning-resistant.  Right now, an adversary can identify
364 364
 <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
365 365
 just by trying to connect to them, following the Tor protocol, and
366 366
 seeing if they respond.  To solve this, bridges could
367
-<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like
367
+<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
368 368
 webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
369 369
 and not act like bridges until the user provides a bridge-specific key.
370 370
 <br />
... ...
@@ -959,7 +959,7 @@ the core of the Blossom effort.
959 959
 <b>Bring up new ideas!</b>
960 960
 <br />
961 961
 Don't like any of these? Look at the <a
962
-href="<gitblob>doc/design-paper/roadmap-future.pdf">Tor development
962
+href="<svnprojects>design-paper/roadmap-future.pdf">Tor development
963 963
 roadmap</a> for more ideas.
964 964
 </li>
965 965
 
... ...
@@ -1065,7 +1065,7 @@ pas fonctionner.
1065 1065
 <b>Authentification</b>: Chaque noeud Tor a une clef de déchiffrement
1066 1066
 publique appelée "clef oignon".  Lorsque le client met en place des
1067 1067
 circuits, à chaque étape il <a
1068
-href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">demande que
1068
+href="<svnprojects>design-paper/tor-design.html#subsec:circuits">demande que
1069 1069
 le noeud Tor prouve la connaissance de sa propre clef oignon</a>. Ainsi, le
1070 1070
 premier noeud du circuit ne peut usurper le reste du circuit.  Chaque noeud
1071 1071
 change de clef oignon une fois par semaine.
... ...
@@ -1169,7 +1169,7 @@ Troisièment, nous avons besoin de travailler sur l'évolutivité du réseau
1169 1169
 que tous les utilisateurs Tor connaissent l'intégralité des noeuds Tor). Les
1170 1170
 changement à ce niveau peuvent avoir des conséquences sur
1171 1171
 l'anonymat. Consultez la section 4 de notre article sur <a
1172
-href="<gitblob>doc/design-paper/challenges.pdf">nos défis</a> pour plus
1172
+href="<svnprojects>design-paper/challenges.pdf">nos défis</a> pour plus
1173 1173
 détails. Encore une fois, le transport par UDP devrait améliorer grandement
1174 1174
 la situation.
1175 1175
 </p>
... ...
@@ -163,7 +163,7 @@ service caché.
163 163
 <p>
164 164
 Il existe d'autres documentations plus complètes sur le protocole de service
165 165
 caché que celle-ci. Consultez le <a
166
-href="<gitblob>doc/design-paper/tor-design.pdf">document de spécification de
166
+href="<svnprojects>design-paper/tor-design.pdf">document de spécification de
167 167
 Tor</a> pour une description plus approfondie ainsi que la <a
168 168
 href="<gitblob>doc/spec/rend-spec.txt">spécification rendez-vous</a> pour le
169 169
 format de messages. 
... ...
@@ -143,7 +143,7 @@ href="http://archives.seul.org/or/talk/Jan-2008/msg00300.html">la
143 143
 <i>Medium to High</i> <br /> Effort Level: <i>Medium</i> <br /> Skill Level:
144 144
 <i>High</i> <br /> Likely Mentors: <i>Nick, Roger, Steven</i> <br /> The Tor
145 145
 0.2.1.x series makes <a
146
-href="<gitblob>doc/design-paper/blocking.html">significant improvements</a>
146
+href="<svnprojects>design-paper/blocking.html">significant improvements</a>
147 147
 in resisting national and organizational censorship.  But Tor still needs
148 148
 better mechanisms for some parts of its anti-censorship design.  For
149 149
 example, current Tors can only listen on a single address/port combination
... ...
@@ -721,7 +721,7 @@ scanning-resistant.  Right now, an adversary can identify <a
721 721
 href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a> just by
722 722
 trying to connect to them, following the Tor protocol, and seeing if they
723 723
 respond.  To solve this, bridges could <a
724
-href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like
724
+href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
725 725
 webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools, and
726 726
 not act like bridges until the user provides a bridge-specific key.  To
727 727
 start, check out Shane Pope's <a
... ...
@@ -830,7 +830,7 @@ expérimentation autour de ssh</a>. Nous avons besoin de mesurer, de corriger
830 830
 et peut-être de refondre quelquechose si les résultats s'avèrent bons.</li>
831 831
 <li>Nos objectifs de résistance à la censure incluent l'impossibilité pour un
832 832
 attaquant qui observe le trafic Tor de <a
833
-href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">le
833
+href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">le
834 834
 distinguer d'un trafic SSL normal</a>. Néanmoins, nous ne pouvons pas
835 835
 recréer une stéganographie parfaire tout en restant utilisable mais, dans un
836 836
 premier temps, nous aimerions pouvoir bloquer toute attaque qui pourrait
... ...
@@ -115,7 +115,7 @@ and circumvention" dal 23C3 nel Dicembre 2006 (<a
115 115
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>,
116 116
 <a href="http://freehaven.net/~arma/slides-23c3.pdf">slide</a>,
117 117
 <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,
118
-<a href="<gitblob>doc/design-paper/blocking.html">design paper</a>),
118
+<a href="<svnprojects>design-paper/blocking.html">design paper</a>),
119 119
 e la presentazione "Current events in 2007" sempre di Roger al 24C3 nel Dicembre
120 120
 2007 (<a
121 121
 href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">video</a>,
... ...
@@ -185,12 +185,12 @@ href="http://archives.seul.org/or/cvs/">commit svn e git</a>.</li>
185 185
 <li>I <b>documenti di design</b> (pubblicati alla Usenix Security 2004)
186 186
 forniscono i fondamenti e le analisi di sicurezza di Tor:
187 187
 in versione
188
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> e
189
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>.
188
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> e
189
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>.
190 190
 </li>
191 191
 <li>Il nostro studio successivo sulle <b>sfide nell'anonimato a bassa latenza</b>
192 192
 (ancora in versione di bozza) descrive nel dettaglio esperienze e direzioni di sviluppo recenti:
193
-<a href="<gitblob>doc/design-paper/challenges.pdf">bozza
193
+<a href="<svnprojects>design-paper/challenges.pdf">bozza
194 194
 PDF</a>.</li>
195 195
 <li>Il nostro paper al WEIS 2006 &mdash; <b>Anonymity Loves Company:
196 196
 Usability and the Network Effect</b> &mdash; spiega perch&eacute; l'usabilit&agrave; nei
... ...
@@ -199,8 +199,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>
199 199
 <li>Il nostro progetto preliminare per impedire ai firewall di
200 200
 bloccare l'accesso alla rete Tor &egrave; descritto in
201 201
 <b>design of a blocking-resistant anonymity system</b>:
202
-<a href="<gitblob>doc/design-paper/blocking.pdf">bozza PDF</a> e
203
-<a href="<gitblob>doc/design-paper/blocking.html">bozza HTML</a>.
202
+<a href="<svnprojects>design-paper/blocking.pdf">bozza PDF</a> e
203
+<a href="<svnprojects>design-paper/blocking.html">bozza HTML</a>.
204 204
 Vedi anche le <a
205 205
 href="http://freehaven.net/~arma/slides-23c3.pdf">diapositive</a> e il<a
206 206
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>
... ...
@@ -931,7 +931,7 @@ non serve a nulla.
931 931
 <b>Autenticazione</b>:
932 932
 Ogni relay Tor ha una chiave pubblica di decifratura detta "onion key".
933 933
 Quanto il client Tor stabilisce dei circuiti, ad ogni passaggio <a
934
-href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">richiede
934
+href="<svnprojects>design-paper/tor-design.html#subsec:circuits">richiede
935 935
 che il relay Tor dimostri di conoscere la sua onion key</a>. In questo modo
936 936
 il primo nodo del percorso non pu&ograve; semplicemente falsificare il resto del percorso.
937 937
 Ogni relay ruota la sua onion key ogni settimana.
... ...
@@ -1030,7 +1030,7 @@ vitare che tutti i relay debbano potersi connettere a tutti i relay
1030 1030
 Tor) sia della directory (smettere di obbligare tutti gli utenti Tor
1031 1031
 a sapere quali sono tutti i relay Tor). Simili cabiamenti potrebbero avere
1032 1032
 un impatto enorme sull'anonimato potenziale e reale. Vedi la sezione 5 del paper <a
1033
-href="<gitblob>doc/design-paper/challenges.pdf">Challenges</a>
1033
+href="<svnprojects>design-paper/challenges.pdf">Challenges</a>
1034 1034
 per maggiori informazioni. Ancora, il trasporto UDP potrebbe essere molto utile qui.
1035 1035
 </p>
1036 1036
 
... ...
@@ -145,7 +145,7 @@ service.
145 145
 <p>
146 146
 Ci sono descrizioni del protocollo hidden service pi&ugrave; approfondite 
147 147
 di questa. Vedi il
148
-<a href="<gitblob>doc/design-paper/tor-design.pdf">Tor design paper</a>
148
+<a href="<svnprojects>design-paper/tor-design.pdf">Tor design paper</a>
149 149
 per una descrizione dettagliata e la
150 150
 <a href="<gitblob>doc/spec/rend-spec.txt">rendezvous specification</a>
151 151
 per il formato dei messaggi.
... ...
@@ -211,7 +211,7 @@ Skill Level: <i>High</i>
211 211
 Likely Mentors: <i>Nick, Roger, Steven</i>
212 212
 <br />
213 213
 The Tor 0.2.0.x series makes <a
214
-href="<gitblob>doc/design-paper/blocking.html">significant
214
+href="<svnprojects>design-paper/blocking.html">significant
215 215
 improvements</a> in resisting national and organizational censorship.
216 216
 But Tor still needs better mechanisms for some parts of its
217 217
 anti-censorship design.  For example, current Tors can only listen on a
... ...
@@ -224,7 +224,7 @@ to make Tor more scanning-resistant.  Right now, an adversary can identify
224 224
 <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Tor bridges</a>
225 225
 just by trying to connect to them, following the Tor protocol, and
226 226
 seeing if they respond.  To solve this, bridges could
227
-<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">act like
227
+<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">act like
228 228
 webservers</a> (HTTP or HTTPS) when contacted by port-scanning tools,
229 229
 and not act like bridges until the user provides a bridge-specific key.
230 230
 <br />
... ...
@@ -1133,7 +1133,7 @@ di throughput ssh</a>. Dovremmo misurare e provare, e forse applicare il metodo
1133 1133
 se i risultati fossero soddisfacenti.</li>
1134 1134
 <li>Uno degli obiettivi per resistere alla censura &egrave; impedire
1135 1135
 ad un attaccante che osservi il traffico Tor su una connessione di <a
1136
-href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">distinguerlo
1136
+href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">distinguerlo
1137 1137
 dal normale traffico SSL</a>. Non possiamo ovviamente ottenere perfetta
1138 1138
 steganografia e al contempo essere ancora utilizzabili, ma come primo passo ci
1139 1139
 bloccare tutti quegli attacchi che funzionano solo osservando pochi pacchetti. Uno degli
... ...
@@ -117,7 +117,7 @@ href="http://freehaven.net/~nickm/slides/Defcon07/TorChanges.pdf">スライド</
117 117
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">ビデオ</a>、
118 118
 <a href="http://freehaven.net/~arma/slides-23c3.pdf">スライド</a>、
119 119
 <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">要約</a>、
120
-<a href="<gitblob>doc/design-paper/blocking.html">設計文書</a>)、
120
+<a href="<svnprojects>design-paper/blocking.html">設計文書</a>)、
121 121
 そして2007年12月の24C3からRogerの"Current events in 2007"トーク
122 122
 (<a
123 123
 href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">ビデオ</a>,
... ...
@@ -192,12 +192,12 @@ orアナウンスリストの
192 192
 <ul>
193 193
 <li><b>設計ドキュメント</b> (Usenix Security 2004で公開)
194 194
 Torの設計の存在意義とセキュリティ分析について示唆を与えてくれます:
195
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a>または
196
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>
195
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a>または
196
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>
197 197
 で閲覧可能です。</li>
198 198
 <li>追加文書の<b>低レイテンシ匿名化の課題</b>
199 199
 (まだドラフト形式)は最新の経験と傾向について掘り下げています:
200
-<a href="<gitblob>doc/design-paper/challenges.pdf">PDF
200
+<a href="<svnprojects>design-paper/challenges.pdf">PDF
201 201
 ドラフト</a>.</li>
202 202
 
203 203
 <li>
... ...
@@ -208,8 +208,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>。</li>
208 208
 <li>大きなファイアーウォールがTorネットワークへのアクセスを
209 209
 邪魔しにくくするため、私達が採用した暫定的なデザインについては
210 210
 <b>抗ブロッキング匿名化システムのデザイン</b>で述べられています:
211
-<a href="<gitblob>doc/design-paper/blocking.pdf">PDF ドラフト</a> および
212
-<a href="<gitblob>doc/design-paper/blocking.html">HTML ドラフト</a>。
211
+<a href="<svnprojects>design-paper/blocking.pdf">PDF ドラフト</a> および
212
+<a href="<svnprojects>design-paper/blocking.html">HTML ドラフト</a>。
213 213
 <a href="<page volunteer>#Coding">ビルドを手伝
214 214
 </a>ってくれませんか?</li>
215 215
 <li><b>仕様</b>は、開発者が互換性のあるTorのバージョンを制作するのに十分な
... ...
@@ -225,7 +225,7 @@ Skill Level: <i>High</i>
225 225
 Likely Mentors: <i>Nick, Roger, Steven</i>
226 226
 <br />
227 227
 Tor 0.2.0.xシリーズは国家や組織による検閲に対して抵抗力に関して
228
-<a href="<gitblob>doc/design-paper/blocking.html">著しい進歩</a>
228
+<a href="<svnprojects>design-paper/blocking.html">著しい進歩</a>
229 229
 を遂げています。しかし、Torは依然としてその反検閲の設計のいくつかの
230 230
 部分についてよりよいメカニズムを必要としています。例えば、
231 231
 現在のTorは同時に単一のアドレス/ポートをリッスンすることしか
... ...
@@ -239,7 +239,7 @@ Tor 0.2.0.xシリーズは国家や組織による検閲に対して抵抗力に
239 239
 <a href="<gitblob>doc/spec/proposals/125-bridges.txt">Torブリッジ</a>
240 240
 を識別することができます。この問題を解決するには、ブリッジはポートスキャニング
241 241
 ツールでコンタクトされたときには
242
-<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">ウェブサーバの
242
+<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">ウェブサーバの
243 243
 ように振る舞い</a>(HTTPまたはHTTPSで)、ユーザがブリッジ固有の鍵を与えない限り
244 244
 ブリッジとして振る舞うことがないようにすることが考えられます。
245 245
 <br />
... ...
@@ -1157,7 +1157,7 @@ href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">SSH
1157 1157
 より徹底した調査をすることになるでしょう。</li>
1158 1158
 <li>私たちの抗検閲の目標の一つとして、回線上のTorの通信を観察している
1159 1159
 攻撃者が<a
1160
-href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">
1160
+href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">
1161 1161
 Torの通信を通常のSSLの通信と区別する</a>
1162 1162
 ことを妨げることが挙げられます。明らかに私たちは完全で依然利用可能な
1163 1163
 ステガノグラフィをを得ることは出来ませんが、始めの一歩として数個の
... ...
@@ -84,12 +84,12 @@ zou interessant kunnen zijn voor ontwikkelaars.</li>
84 84
 <ul>
85 85
 <li>Het <b>ontwerpdocument</b> gepubliceerd op het Usenix Security 2004
86 86
 symposium geeft de onderbouwing en veiligheidsanalyse voor het Tor concept: 
87
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> en
88
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>
87
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> en
88
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>
89 89
 versies beschikbaar.</li>
90 90
 <li>Ons opvolgende werkdocument over <b>uitdagingen in laag-latente anonimiteit</b>
91 91
 zet onze recente ervaringen en richtingen uiteen:
92
-<a href="<gitblob>doc/design-paper/challenges.pdf">PDF
92
+<a href="<svnprojects>design-paper/challenges.pdf">PDF
93 93
 werkdocument</a>.</li>
94 94
 <li>Ons artikel op de WEIS 2006 getiteld <b>Anonymity Loves Company:
95 95
 Usability and the Network Effect</b> legt uit hoe de bruikbaarheid van
... ...
@@ -98,8 +98,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>
98 98
 <li>Ons voorlopig ontwerp, om het grote firewalls moeilijker te maken 
99 99
 de toegang tot het Tor network te blokkeren, wordt beschreven in
100 100
 <b>Design of a Blocking-Resistant Anonymity System</b>:
101
-<a href="<gitblob>doc/design-paper/blocking.pdf">PDF werkdocument</a> en
102
-<a href="<gitblob>doc/design-paper/blocking.html">HTML werkdocument</a>.
101
+<a href="<svnprojects>design-paper/blocking.pdf">PDF werkdocument</a> en
102
+<a href="<svnprojects>design-paper/blocking.html">HTML werkdocument</a>.
103 103
 U kunt ook de <a
104 104
 href="http://freehaven.net/~arma/slides-23c3.pdf">dia's</a> en <a
105 105
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">videoclip</a>
... ...
@@ -271,7 +271,7 @@ verkeerd aan is.</li>
271 271
 eerste plaats om te beginnen.</li>
272 272
 
273 273
 <li>Geen van alle naar uw zin? Kijk naar de <a
274
-href="<gitblob>doc/design-paper/roadmap-2007.pdf">plan voor verdere
274
+href="<svnprojects>design-paper/roadmap-2007.pdf">plan voor verdere
275 275
 ontwikkeling van Tor</a> voor meer idee�n.</li>
276 276
 <li>Uw idee hier niet gevonden? Tien tegen ��n dat we het toch nodig hebben! Neem
277 277
 contact met ons op.</li>
... ...
@@ -116,7 +116,7 @@ Rogera z 23C3 w grudniu 2006 (<a
116 116
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">wideo</a>,
117 117
 <a href="http://freehaven.net/~arma/slides-23c3.pdf">slajdy</a>,
118 118
 <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstrakt</a>,
119
-<a href="<gitblob>doc/design-paper/blocking.html">dokument projektowy</a>),
119
+<a href="<svnprojects>design-paper/blocking.html">dokument projektowy</a>),
120 120
 lub przemówienie "Bieżące wydarzenia w roku 2007" Rogera z 24C3 w grudniu
121 121
 2007 (<a
122 122
 href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">wideo</a>,
... ...
@@ -189,11 +189,11 @@ a kanał IRC #tor to miejsce na mniej złożone dyskusje.
189 189
 <ul>
190 190
 <li><b>Dokumenty Projektu</b> (opublikowane na Usenix Security 2004)
191 191
  podaje nasze uzasadnienia i analizy bezpieczeństwa projektu Tora: są wersje
192
- <a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> i
193
- <a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>.</li>
192
+ <a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> i
193
+ <a href="<svnprojects>design-paper/tor-design.html">HTML</a>.</li>
194 194
 <li>Nasz dodatkowy dokument na temat <b>wyzwań w krótkoczasowej anonimowości</b>
195 195
  (ciągle w postaci szkicu) podaje szczegóły nowszych doświadczeń i kierunki:
196
- <a href="<gitblob>doc/design-paper/challenges.pdf">szkic
196
+ <a href="<svnprojects>design-paper/challenges.pdf">szkic
197 197
  PDF</a>.</li>
198 198
 <li>Nasz dokument z WEIS 2006 &mdash; <b>Anonimowość uwielbia towarzystwo:
199 199
   użyteczność i efekt sieci</b> &mdash; tłumaczy, dlaczego użyteczność w
... ...
@@ -202,8 +202,8 @@ a kanał IRC #tor to miejsce na mniej złożone dyskusje.
202 202
 <li>Nasz wstępny projekt jak utrudnić wielkim zaporom ogniowym (firewallom)
203 203
  zapobieganie dostępowi do sieci Tor jest opisany w
204 204
   <b>projekcie systemu anonimowości odpornego na blokowanie</b>:
205
-  <a href="<gitblob>doc/design-paper/blocking.pdf">szkic PDF</a> i
206
-  <a href="<gitblob>doc/design-paper/blocking.html">szkic HTML</a>.
205
+  <a href="<svnprojects>design-paper/blocking.pdf">szkic PDF</a> i
206
+  <a href="<svnprojects>design-paper/blocking.html">szkic HTML</a>.
207 207
   Chcesz <a href="<page volunteer>#Coding">pomóc nam to stworzyć</a>?</li>
208 208
 <li><b>Specyfikacje</b> mają za zadanie dać
209 209
  deweloperom dość informacji, by stworzyć kompatybilną wersję Tora:
... ...
@@ -1013,7 +1013,7 @@ w celu odkrycia klucza nie podziała.
1013 1013
 <b>Uwierzytelnianie</b>: Każdy przekaźnik sieci Tora ma publiczny klucz
1014 1014
 deszyfrujący zwany "kluczem cebulowym". Gdy klient Tora uruchamia obwody, na
1015 1015
 każdym kroku <a
1016
-href="<gitblob>doc/design-paper/tor-design.html#subsec:circuits">żąda, by
1016
+href="<svnprojects>design-paper/tor-design.html#subsec:circuits">żąda, by
1017 1017
 przekaźnik sieci udowodnił znajomość swojego klucza cebulowego</a>. Tym
1018 1018
 sposobem, pierwszy węzeł w ścieżce nie może podszyć się pod resztę
1019 1019
 ścieżki. Każdy przekaźnik zmienia swój klucz raz w tygodniu.
... ...
@@ -1114,7 +1114,7 @@ wymagać, by każdy przekaźnik mógł się połączyć z każdym) i katalogów
1114 1114
 przestać wymagać, by wszyscy użytkownicy Tora wiedzieli o wszystkich
1115 1115
 przekaźnikach). Takie zmiany mogą mieć wielki wpływ na potencjalną i
1116 1116
 rzeczywistą anonimowość. Przeczytaj sekcję 5 dokumentu <a
1117
-href="<gitblob>doc/design-paper/challenges.pdf">Wyzwania</a>, by poznać
1117
+href="<svnprojects>design-paper/challenges.pdf">Wyzwania</a>, by poznać
1118 1118
 szczegóły. Ponownie, transport UDP by tu pomógł.
1119 1119
 </p>
1120 1120
 
... ...
@@ -135,7 +135,7 @@ punktem spotkania, a pozostałe 3 zostały wybrane przez usługę ukrytą.
135 135
 
136 136
 <p>
137 137
 Istnieją bardziej szczegółowe opisy protokołu usług ukrytych niż ta strona.
138
-Przeczytaj <a href="<gitblob>doc/design-paper/tor-design.pdf">dokument projektowy Tora</a>
138
+Przeczytaj <a href="<svnprojects>design-paper/tor-design.pdf">dokument projektowy Tora</a>
139 139
 zawierający dogłębny opis projektu, oraz
140 140
 <a href="<gitblob>doc/spec/rend-spec.txt">specyfikację spotkań (rendezvous)</a>,
141 141
 zawierającą formaty wiadomości.
... ...
@@ -187,7 +187,7 @@ Poziom umiejętności: <i>Wysoki</i>
187 187
 Prawdopodobni opiekunowie: <i>Nick, Roger, Steven</i>
188 188
 <br />
189 189
 Wersje 0.2.1.x Tora robią <a
190
-href="<gitblob>doc/design-paper/blocking.html">znaczne postępy</a> w opieraniu
190
+href="<svnprojects>design-paper/blocking.html">znaczne postępy</a> w opieraniu
191 191
 się narodowej i firmowej cenzurze. Ale Tor ciągle potrzebuje lepszych mechanizmów w
192 192
 niektórych częściach projektu anty-cenzurowania. Na przykład, bieżące wersje mogą
193 193
 nasłuchiwać połączeń tylko na jednym zestawie adres/port na raz. Istnieje
... ...
@@ -199,7 +199,7 @@ W chwili obecnej ktokolwiek może zidentyfikować
199 199
 <a href="<gitblob>doc/spec/proposals/125-bridges.txt">mostki Tora</a>
200 200
 po prostu łącząc się z nimi, zgodnie z protokołem Tora, i sprawdzając,
201 201
 czy odpowiadają. By rozwiązać ten problem, mostki mogłyby
202
-<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">udawać serwery
202
+<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">udawać serwery
203 203
 internetowe</a> (HTTP lub HTTPS), gdy łączą się z nimi programy do skanowania portów,
204 204
 a nie zachowywać się jak mostki do chwili, gdy użytkownik poda klucz specyficzny
205 205
 dla mostka.
... ...
@@ -837,7 +837,7 @@ dwa rzędy wielkości niż wtedy, gdy napisano ten dokument.) Przeczytaj też
837 837
 
838 838
 <li>Nasze cele w opieraniu się cenzurze to m.in. zapobieganie temu, by napastnik
839 839
 podglądający ruch Tora mógł <a
840
-href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint"
840
+href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint"
841 841
 >odróżnić go od normalnego ruchu SSL</a>. Oczywiście, nie możemy osiągnąć idealnej
842 842
 steganografii i dalej mieć użyteczną i działającą sieć, ale w pierwszym kroku
843 843
 chcielibyśmy blokować jakiekolwiek ataki, które mogą się udać po obserwacji tylko
... ...
@@ -113,7 +113,7 @@ and circumvention" de Roger, no 23C3 em dezembro de 2006 (<a
113 113
 href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">vídeo</a>,
114 114
 <a href="http://freehaven.net/~arma/slides-23c3.pdf">slides</a>,
115 115
 <a href="http://events.ccc.de/congress/2006/Fahrplan/events/1444.en.html">abstract</a>,
116
-<a href="<gitblob>doc/design-paper/blocking.html">design paper</a>),
116
+<a href="<svnprojects>design-paper/blocking.html">design paper</a>),
117 117
 e a palestra "Current events in 2007" de Roger, no 24C3 em dezembro
118 118
 de 2007 (<a
119 119
 href="http://freehaven.net/~arma/24c3-2325-en-current_events_in_tor_development.mp4">vídeo</a>,
... ...
@@ -182,12 +182,12 @@ pode ser interessante para desenvolvedores.</li>
182 182
 <li>O <b>documento de design</b> (publicado na Usenix Security 2004)
183 183
 tem as nossas justificativas e análise de segurança para o design do Tor:
184 184
 estão disponíveis versões em 
185
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> e
186
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>.</li>
185
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> e
186
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>.</li>
187 187
 <li>Nosso paper seguinte sobre <b>challenges in low-latency anonymity</b>
188 188
 ("desafios em anonimato de baixa latência" - ainda em rascunho) detalha as
189 189
 experiências e diretrizes mais recentes:
190
-<a href="<gitblob>doc/design-paper/challenges.pdf">rascunho em PDF</a>.</li>
190
+<a href="<svnprojects>design-paper/challenges.pdf">rascunho em PDF</a>.</li>
191 191
 <li>Nosso paper da WEIS 2006 &mdash; <b>Anonymity Loves Company:
192 192
 Usability and the Network Effect</b> (Anonimato Adora Companhia: Usabilidade e o
193 193
 Efeito Rede) &mdash; explica porque a usabilidade em sistemas de anonimato 
... ...
@@ -196,8 +196,8 @@ href="http://freehaven.net/anonbib/cache/usability:weis2006.pdf">PDF</a>.</li>
196 196
 <li>Nosso design preliminar para dificultar o bloqueio de acesso à rede Tor por 
197 197
 grandes firewalls está descrito em 
198 198
 <b>design of a blocking-resistant anonymity system</b>:
199
-<a href="<gitblob>doc/design-paper/blocking.pdf">rascunho em PDF</a> e
200
-<a href="<gitblob>doc/design-paper/blocking.html">rascunho em HTML</a>.
199
+<a href="<svnprojects>design-paper/blocking.pdf">rascunho em PDF</a> e
200
+<a href="<svnprojects>design-paper/blocking.html">rascunho em HTML</a>.
201 201
 Quer nos <a href="<page volunteer>#Coding">ajudar a construí-lo</a>?</li>
202 202
 <li>As <b>especificações</b> têm como objetivo dar aos desenvolvedores informação
203 203
 suficiente para construir uma versão compatível do Tor:
... ...
@@ -155,7 +155,7 @@ href="http://freehaven.net/anonbib/#hs-attack06">Расположение Скр
155 155
 
156 156
 <p>
157 157
 Существуют более подробные описания протокола скрытых сервисов. Обратите
158
-внимание на <a href="<gitblob>doc/design-paper/tor-design.pdf">Документ об
158
+внимание на <a href="<svnprojects>design-paper/tor-design.pdf">Документ об
159 159
 архитектуре сети Tor</a> для получения более углубленной информации об
160 160
 архитектуре и <a href="<gitblob>doc/spec/rend-spec.txt">спецификациях точек
161 161
 синхронизации</a> для форматов сообщений.
... ...
@@ -79,18 +79,18 @@ href="http://archives.seul.org/or/cvs/">cvs commits</a> som skulle kunna intress
79 79
 <ul>
80 80
 <li><b>Design dokument</b> (publiserat p&aring; Usenix Security 2004)
81 81
 anger v&aring;ra sk&auml;l och s&auml;kerhetsanalys av Tors design:
82
-<a href="<gitblob>doc/design-paper/tor-design.pdf">PDF</a> och
83
-<a href="<gitblob>doc/design-paper/tor-design.html">HTML</a>
82
+<a href="<svnprojects>design-paper/tor-design.pdf">PDF</a> och
83
+<a href="<svnprojects>design-paper/tor-design.html">HTML</a>
84 84
 version finns.</li>
85 85
 <li>V&aring;r uppf&ouml;ljande artikel ang&aring;ende <b>utmaningar i l&aring;gf&ouml;rdr&ouml;jningsanonymitet</b>
86 86
 (fortfarande i utkast-format) anger i detalj de senaste erfarenheterna och inriktingar:
87
-<a href="<gitblob>doc/design-paper/challenges.pdf">PDF
87
+<a href="<svnprojects>design-paper/challenges.pdf">PDF
88 88
 version</a>.</li>
89 89
 
90 90
 <li>En prelimin�r desing f�r att g�re det sv�rare f�r stora brandv�ggar att
91 91
 hindra tillg�ng till Tor-n�tverket finns beskrivet i
92 92
 <b>design of a blocking-resistant anonymity system</b>:
93
-<a href="<gitblob>doc/design-paper/blocking.pdf">PDF draft</a>.
93
+<a href="<svnprojects>design-paper/blocking.pdf">PDF draft</a>.
94 94
 Se ocks� <a href="http://freehaven.net/~arma/slides-23c3.pdf">bilder</a> och
95 95
 <a href="http://freehaven.net/~arma/23C3-1444-en-tor_and_china.m4v">video</a>
96 96
 fr�n Rogers <a href="http://events.ccc.de/congress/2006/Home">23C3 f�redrag</a>.
... ...
@@ -222,7 +222,7 @@ Effort Level: <i>Medium</i>
222 222
 Skill Level: <i>High</i>
223 223
 <br />
224 224
 Likely Mentors: <i>Nick, Roger, Steven</i>
225
-Tor 0.2.0.x系列的<a href="<gitblob>doc/design-paper/blocking.html">一个重要改进</a
225
+Tor 0.2.0.x系列的<a href="<svnprojects>design-paper/blocking.html">一个重要改进</a
226 226
 >是提高了抵抗政府机关或者组织探测的能力。但是 Tor 的反审查设计在某些方面仍然需要
227 227
 更好的机制来改进。比如,现在 Tor 只能在一个 地址/端口  对上进行监听,
228 228
 有<a href="<gitblob>doc/spec/proposals/118-multiple-orports.txt">建议放开这个限制</a>,
... ...
@@ -231,7 +231,7 @@ Tor 0.2.0.x系列的<a href="<gitblob>doc/design-paper/blocking.html">一个重
231 231
 的扫描者可以通过尝试连接一个假定的 Tor 主机,向其发送 Tor 协议包,并检查它的响应来确定
232 232
 它是否在运行<a href="<gitblob>doc/spec/proposals/125-bridges.txt"> Tor 网桥</a>。
233 233
 要解决这个问题,当受到端口扫描工具扫描的时候,网桥应该
234
-<a href="<gitblob>doc/design-paper/blocking.html#tth_sEc9.3">伪装成一个 web 服务器</a>
234
+<a href="<svnprojects>design-paper/blocking.html#tth_sEc9.3">伪装成一个 web 服务器</a>
235 235
 (HTTP或者HTTPS),如果对方没有提供正确的网桥 key,那么它不会作出正确的网桥连接响应。
236 236
 <br />
237 237
 这部分的工作需要大量的研究和设计。一个巨大的挑战是,即使一个攻击者知道我们的算法和机制,
... ...
@@ -1065,7 +1065,7 @@ href="http://www.psc.edu/networking/projects/hpn-ssh/theory.php">ssh 吞吐量
1065 1065
 </li>
1066 1066
 
1067 1067
 <!-- NEED HELP -->
1068
-<li>我们反审查机制的目标包括防止攻击者<a href="<gitblob>doc/design-paper/blocking.html#sec:network-fingerprint">
1068
+<li>我们反审查机制的目标包括防止攻击者<a href="<svnprojects>design-paper/blocking.html#sec:network-fingerprint">
1069 1069
 从普通 SSL 传输中区分 Tor 数据包</a>。很明显,我们不可能既做到完美的隐藏又保持可用性,但是,
1070 1070
 首先,我们希望能够阻止攻击者仅仅观察几个数据包就可以取得成功。在这些攻击中,有一个我们没有进行太多测试的
1071 1071
 问题是,Tor 的数据包是以512字节为单位的,因此,传输的数据包可以是512字节的倍数。在物理线路上,
1072 1072