Tor: 1. What was the most significant lesson you learned from the paper? 2. If an attacker can eavesdrop on Alice and Bob, can the attacker determine whether Alice and Bob are talking to each other? Why or why not? Telex: 3. The Telex paper is based on redirected TLS-encrypted connections. Suppose a censor blocks all TLS-encrypted connections. What would be the challenge(s) with applying similar ideas to non-TLS connections? 4. Optional: What topic would you most like to see discussed in class, or question you would most like to have answered, if any?