mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-11-20 10:12:15 +01:00
Explain why tor is well-suited for the relay component of a
blocking-resistant anonymity system. Talk through how other proxy designs work and what we can reuse from their ideas. Still much work remaining. svn:r8792
This commit is contained in:
parent
7bda254bda
commit
63a1811cda
File diff suppressed because it is too large
Load Diff
@ -1212,6 +1212,19 @@
|
|||||||
publisher = {O'Reilly Media},
|
publisher = {O'Reilly Media},
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@inproceedings{usability:weis2006,
|
||||||
|
title = {Anonymity Loves Company: Usability and the Network Effect},
|
||||||
|
author = {Roger Dingledine and Nick Mathewson},
|
||||||
|
booktitle = {Proceedings of the Fifth Workshop on the Economics of Information Security
|
||||||
|
(WEIS 2006)},
|
||||||
|
year = {2006},
|
||||||
|
month = {June},
|
||||||
|
address = {Cambridge, UK},
|
||||||
|
www_section = {Economics},
|
||||||
|
bookurl = {http://weis2006.econinfosec.org/},
|
||||||
|
www_pdf_url = {http://freehaven.net/doc/wupss04/usability.pdf},
|
||||||
|
}
|
||||||
|
|
||||||
@Misc{six-four,
|
@Misc{six-four,
|
||||||
key = {six-four},
|
key = {six-four},
|
||||||
title = {{The Six/Four System}},
|
title = {{The Six/Four System}},
|
||||||
@ -1237,6 +1250,45 @@
|
|||||||
note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
|
note = {\url{http://www.ethanzuckerman.com/blog/?p=1019}}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Misc{cgiproxy,
|
||||||
|
key = {cgiproxy},
|
||||||
|
title = {{CGIProxy: HTTP/FTP Proxy in a CGI Script}},
|
||||||
|
author = {James Marshall},
|
||||||
|
note = {\url{http://www.jmarshall.com/tools/cgiproxy/}}
|
||||||
|
}
|
||||||
|
|
||||||
|
@Misc{circumventor,
|
||||||
|
key = {circumventor},
|
||||||
|
title = {{How to install the Circumventor program}},
|
||||||
|
author = {Bennett Haselton},
|
||||||
|
note = {\url{http://www.peacefire.org/circumventor/simple-circumventor-instructions.html}}
|
||||||
|
}
|
||||||
|
|
||||||
|
@InProceedings{tcpstego, author = {Steven J. Murdoch and Stephen Lewis},
|
||||||
|
title = {Embedding Covert Channels into {TCP/IP}},
|
||||||
|
booktitle = {Information Hiding: 7th International Workshop},
|
||||||
|
pages = {247--261},
|
||||||
|
year = {2005},
|
||||||
|
editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and
|
||||||
|
Stefan Katzenbeisser and Fernando P\'{e}rez-Gonz\'{a}lez},
|
||||||
|
volume = {3727},
|
||||||
|
series = {LNCS},
|
||||||
|
address = {Barcelona, Catalonia (Spain)},
|
||||||
|
month = {June},
|
||||||
|
publisher = {Springer-Verlag},
|
||||||
|
url = {http://www.cl.cam.ac.uk/~sjm217/papers/ih05coverttcp.pdf}
|
||||||
|
}
|
||||||
|
|
||||||
|
@phdthesis{blossom-thesis,
|
||||||
|
title = {Perspective Access Networks},
|
||||||
|
author = {Geoffrey Goodell},
|
||||||
|
school = {Harvard University},
|
||||||
|
year = {2006},
|
||||||
|
month = {July},
|
||||||
|
www_pdf_url = {http://afs.eecs.harvard.edu/~goodell/thesis.pdf},
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
%%% Local Variables:
|
%%% Local Variables:
|
||||||
%%% mode: latex
|
%%% mode: latex
|
||||||
%%% TeX-master: "tor-design"
|
%%% TeX-master: "tor-design"
|
||||||
|
Loading…
Reference in New Issue
Block a user