write an actual research page for us
Roger Dingledine

Roger Dingledine commited on 2010-04-26 04:52:41
Zeige 1 geänderte Dateien mit 105 Einfügungen und 4 Löschungen.

... ...
@@ -9,10 +9,111 @@
9 9
 <h2>Tor: Research</h2>
10 10
 <hr />
11 11
 
12
-<p>Read <a
13
-href="http://freehaven.net/anonbib/topic.html#Anonymous_20communication">these
14
-papers</a> (especially the ones in boxes) to get up to speed on anonymous
15
-communication systems.</p>
12
+<p>
13
+Many people around the world are doing research on how to improve the Tor
14
+design, what's going on in the Tor network, and more generally on attacks
15
+and defenses for anonymous communication systems. This page summarizes
16
+the resources we provide to help make your Tor research more effective.
17
+The best way to reach us about research is through the <a href="<page
18
+contact>">tor-assistants</a> list.
19
+</p>
20
+
21
+<ul>
22
+
23
+<li>
24
+<b>Data.</b>
25
+We've been <a href="http://metrics.torproject.org/data.html">collecting
26
+data to learn more about the Tor network</a>: how many relays and
27
+clients there are in the network, what capabilities they have, how
28
+fast the network is, how many clients are connecting via bridges,
29
+what traffic exits the network, etc. We are also developing
30
+tools to process these huge data archives and come up with
31
+<a href="http://metrics.torproject.org/graphs.html">useful
32
+statistics</a>.  For example, we provide a <a
33
+href="https://gitweb.torproject.org//ernie.git?a=blob_plain;f=doc/manual.pdf">tool
34
+called Ernie</a> that can import relay descriptors into a local database
35
+to perform analyses. Let us know what other information you'd like to
36
+see, and we can work with you to help make sure it gets collected safely
37
+and robustly.
38
+</li>
39
+
40
+<li>
41
+<b>Analysis.</b>
42
+If you're investigating Tor, or solving a Tor-related problem,
43
+<i>_please_</i> talk to us somewhere along the way &mdash; the earlier
44
+the better. These days we review too many conference paper submissions
45
+that make bad assumptions and end up solving the wrong problem. Since
46
+the Tor protocol and the Tor network are both moving targets, measuring
47
+things without understanding what's going on behind the scenes is going
48
+to result in bad conclusions. In particular, different groups often
49
+unwittingly run a variety of experiments in parallel, and at the same
50
+time we're constantly modifying the design to try new approaches. If
51
+you let us know what you're doing and what you're trying to learn,
52
+we can help you understand what other variables to expect and how to
53
+interpret your results.
54
+</li>
55
+
56
+<li>
57
+<b>Measurement and attack tools.</b>
58
+We're building a <a
59
+href="http://metrics.torproject.org/tools.html">repository</a> of tools
60
+that can be used to measure, analyze, or perform attacks on Tor. Many
61
+research groups end up needing to do similar measurements (for example,
62
+change the Tor design in some way and then see if latency improves),
63
+and we hope to help everybody standardize on a few tools and then make
64
+them really good. Also, while there are some really neat Tor attacks
65
+that people have published about, it's hard to track down a copy of
66
+the code they used. Let us know if you have new tools we should list,
67
+or improvements to the existing ones. The more the better, at this stage.
68
+</li>
69
+
70
+<li>
71
+<b>In-person help.</b>
72
+If you're doing interesting and important Tor research and need help
73
+understanding how the Tor network or design works, interpreting your
74
+data, crafting your experiments, etc, we can send a Tor researcher to
75
+your doorstep. As you might expect, we don't have a lot of free time;
76
+but making sure that research is done in a way that's useful to us is
77
+really important. So let us know, and we'll work something out.
78
+</li>
79
+
80
+</ul>
81
+
82
+<a id="Groups"></a>
83
+<h2><a class="anchor" href="#Ideas">Research Groups</a></h2>
84
+
85
+<p>Interested to find other anonymity researchers? Here are some
86
+research groups you should take a look at.</p>
87
+
88
+<ul>
89
+<li>Ian Goldberg's <a href="http://crysp.uwaterloo.ca/">CrySP</a> group
90
+at Waterloo.
91
+</li>
92
+<li><a href="http://www-users.cs.umn.edu/~hopper/">Nick Hopper</a>'s
93
+group at UMN.
94
+</li>
95
+<li><a href="http://www.hatswitch.org/~nikita/">Nikita Borisov</a>'s
96
+group at Illinois.
97
+</li>
98
+<li>Matt Wright's <a href="http://isec.uta.edu/">iSec</a> group at
99
+UTA.
100
+</li
101
+</ul>
102
+
103
+<a id="Ideas"></a>
104
+<h2><a class="anchor" href="#Ideas">Research Ideas</a></h2>
105
+
106
+<p>
107
+If you're interested in anonymity research, you must make it to the
108
+<a href="http://petsymposium.org/">Privacy Enhancing Technologies
109
+Symposium</a>. Everybody who's anybody in the anonymity research world
110
+will be there. The 2010 conference is in Berlin in July. Stipends are
111
+available for people whose presence will benefit the community.
112
+</p>
113
+
114
+<p>To get up to speed on anonymity research, read <a
115
+href="http://freehaven.net/anonbib/">these papers</a> (especially the
116
+ones in boxes).</p>
16 117
 
17 118
 <p>We need people to attack the system, quantify defenses,
18 119
 etc. See the "Research" section of the
19 120