move over another of the research tasks
Roger Dingledine

Roger Dingledine commited on 2010-09-21 05:04:24
Zeige 2 geänderte Dateien mit 14 Einfügungen und 16 Löschungen.

... ...
@@ -134,6 +134,20 @@ etc. Here are some example projects:</p>
134 134
 
135 135
 <ul>
136 136
 
137
+<li>Right now Tor clients are willing to reuse a given circuit for ten
138
+minutes after it's first used. The goal is to avoid loading down the
139
+network with too many circuit creations, yet to also avoid having
140
+clients use the same circuit for so long that the exit node can build a
141
+useful pseudonymous profile of them. Alas, ten minutes is probably way
142
+too long, especially if connections from multiple protocols (e.g. IM and
143
+web browsing) are put on the same circuit. If we keep fixed the overall
144
+number of circuit extends that the network needs to do, are there more
145
+efficient and/or safer ways for clients to allocate streams to circuits,
146
+or for clients to build preemptive circuits? Perhaps this research item
147
+needs to start with gathering some traces of what requests typical
148
+clients try to launch, so you have something realistic to try to optimize.
149
+</li>
150
+
137 151
 <li>The "website fingerprinting attack": make a list of a few
138 152
 hundred popular websites, download their pages, and make a set of
139 153
 "signatures" for each site. Then observe a Tor client's traffic. As
... ...
@@ -159,9 +173,6 @@ Path selection algorithms, directory fetching schedules for Tor-on-mobile
159 173
 that are compatible anonymity-wise with our current approaches.
160 174
 </li>
161 175
 
162
-<li>
163
-Figure out how bad 10 minutes is for maxcircuitdirtiness.
164
-</li>
165 176
 -->
166 177
 
167 178
 <li>More coming soon. See also the "Research" section of the
... ...
@@ -882,19 +882,6 @@ hurt, or not matter? Consider: cookies and recognizing Torbutton users
882 882
 by their rotating UserAgents; malicious websites who only attack certain
883 883
 browsers; and whether the answers to question one impact this answer.
884 884
 </li>
885
-<li>Right now Tor clients are willing to reuse a given circuit for ten
886
-minutes after it's first used. The goal is to avoid loading down the
887
-network with too many circuit extend operations, yet to also avoid having
888
-clients use the same circuit for so long that the exit node can build a
889
-useful pseudonymous profile of them. Alas, ten minutes is probably way
890
-too long, especially if connections from multiple protocols (e.g. IM and
891
-web browsing) are put on the same circuit. If we keep fixed the overall
892
-number of circuit extends that the network needs to do, are there more
893
-efficient and/or safer ways for clients to allocate streams to circuits,
894
-or for clients to build preemptive circuits? Perhaps this research item
895
-needs to start with gathering some traces of what connections typical
896
-clients try to launch, so you have something realistic to try to optimize.
897
-</li>
898 885
 <li>How many bridge relays do you need to know to maintain
899 886
 reachability? We should measure the churn in our bridges. If there is
900 887
 lots of churn, are there ways to keep bridge users more likely to stay
901 888