Turn challenges.tex into minimally valid LaTeX

svn:r3411
This commit is contained in:
Nick Mathewson 2005-01-22 01:35:29 +00:00
parent fbb7f869c5
commit 1309885fcd

View file

@ -1,8 +1,8 @@
\documentclass[twocolumn]{article}
\title{Challenges in bringing low-latency stream anonymity to the masses (DRAFT)}
\begin{document}
Challenges in bringing low-latency stream anonymity to the masses
\section{Introduction} \section{Introduction}
@ -27,7 +27,7 @@ useful network to a practical useful anonymous network.
Tor works like this. Tor works like this.
weasel's graph of # nodes and of bandwidth, ideally from week 0. weasel's graph of \# nodes and of bandwidth, ideally from week 0.
Tor has the following goals. Tor has the following goals.
@ -100,7 +100,7 @@ continued money, and they periodically ask what they will do when it
dries up. dries up.
Logging. Making logs not revealing. A happy coincidence that verbose Logging. Making logs not revealing. A happy coincidence that verbose
logging is our #2 performance bottleneck. Is there a way to detect logging is our \#2 performance bottleneck. Is there a way to detect
modified servers, or to have them volunteer the information that they're modified servers, or to have them volunteer the information that they're
logging verbosely? Would that actually solve any attacks? logging verbosely? Would that actually solve any attacks?
@ -172,3 +172,5 @@ assuming that, how much anonymity can we get. we're not here to model or
to simulate or to produce equations and formulae. but those have their to simulate or to produce equations and formulae. but those have their
roles too. roles too.
\end{document}