[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #23839 [Applications/Tor Browser]: Testing Framework for Censorship Circumvention



#23839: Testing Framework for Censorship Circumvention
--------------------------------------+---------------------------
 Reporter:  arthuredelstein           |          Owner:  tbb-team
     Type:  defect                    |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:  Sponsor19
--------------------------------------+---------------------------
Changes (by arma):

 * sponsor:   => Sponsor19


Comment:

 I was going to go make a ticket for this idea ("Make a "censorship
 detection" Tor Browser variant") when I found this ticket already
 existing. It is still a good idea.

 We spoke at various times of a Tor Launcher feature ("make the connect
 option just work") that cycles through bridge types and transport types
 until it gets to one that works. There are tradeoffs with user safety and
 user experience that make us pause.

 But there's a variation of the idea that we could do first, and it would
 be useful now, and the effort would be mostly reusable for that future
 idea:

 '''Let's make a Tor Browser variant, or an option inside Tor Browser, that
 tries all of the various anti-censorship combinations and reports to the
 user on their status.'''

 That way when people are in a crappy network environment they will have a
 simple tool they can fetch and run and it will tell them about their
 ability to use various Tor transports on their network. And if we make it
 clear that this isn't "normal Tor Browser", hopefully we sidestep many of
 the user experience / user confusion questions.

 An advanced step would be to figure out a way to automatically exfiltrate
 the answers, OONI style, via domain fronting or some similar trick. But to
 start, it could just pop up a window / write out a text file with the
 assessment, and the user can copy-paste the analysis, or read it, or
 whatever they want to do.

 Another advanced step would be to have Tor give better feedback to Tor
 Launcher (and thus to our output file) about what went wrong (#28018). But
 I think we can develop this idea in parallel with how exactly Tor will
 report about its success for each permutation attempt.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/23839#comment:4>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs