Tentative breakdown. Feel free to take on something here that isn't done yet! LEGEND: - Not done o Done . Partially done ? Do we really need to do this? X Abandoned: we don't need to do this. ITEMS: o Integrate the content from the first blog post [nick] ** o Node discovery and the directory protocol o Security improvements to hidden services o DHT o Improved authorization model for hidden services o Faster first-hop circuit establishment with CREATE_FAST o Cell queueing and scheduling. o Integrate content from the second blog post [steven] o guard nodes o Bridges, censorship resistance, and pluggable transports o Changes and complexities in our path selection algorithms o Bandwidth authorities o Path selection rules o stream isolation o Integrate content from the third blog post [steven] o link protocol tls X rise and fall of .exit o controller protocol o torbutton o tor browser bundle o Revise the abstract and introduction [nick] o Abstract o Introduction o Revise tor-design up to "opening and closing streams" [nick] o Revise tor-design "opening and closing streams" onward [steven] o Revise hidden services section [nick] o Revise "other design decisions" [nick] CAN DO AFTER SPONSOR DEADLINE: . Revise design goals and assumptions [steven] - Revise related work [steven] - Revise "attacks and defenses" [steven] - Replace "early experiences: Tor in the wild" [???? Nick? Can Roger?] - Revise "open questions in low-latency anonymity" and "future directions" [steven]