[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â December 3rd, 2014

Tor Weekly News                                       December 3rd, 2014

Welcome to the forty-eighth issue in 2014 of Tor Weekly News, the weekly
newsletter that covers whatâs happening in the Tor community.

GetTor is back

Some Tor users need to access the Internet from networks so heavily
censored that they cannot reach the Tor Project website, or any of its
mirrors, to download Tor in the first place; with these users in mind,
GetTor [1], an alternative software distribution system for Tor Browser,
was created.

After a period of neglect, GetTor has been revamped and redeployed:
users can now email the name of their operating system to
gettor@xxxxxxxxxxxxxx, and in return they will receive Dropbox download
links for the latest Tor Browser and the package signature, as well as a
checksum and the fingerprint of the key used to make the signature.

The lead developer on this project is Israel Leiva, who did most of the
work on it during this yearâs Google Summer of Code. Israel took to the
Tor blog [2] to explain the background and outcome of the redevelopment
work; please see that post for more information, or put GetTor to the
test yourself and send your comments to the community!

  [1]: https://www.torproject.org/projects/gettor
  [2]: https://blog.torproject.org/blog/say-hi-new-gettor

Monthly status reports for November 2014

The wave of regular monthly reports from Tor project members for the
month of November has begun. Damian Johnson released his report
first [3], followed by reports from Juha Nurmi [4], George
Kadianakis [5], David Goulet [6], Philipp Winter [7], Sherief Alaa [8],
Tom Ritter [9], Nick Mathewson [10], Georg Koppen [11], Griffin
Boyce [12], Karsten Loesing [13], Andrew Lewman (for both October [14]
and November [15]), Noel Torres [16], and Harmony [17].

George Kadianakis also sent out the SponsorR report [18], while Colin C.
reported on behalf of the help desk [19], and Mike Perry for the Tor
Browser team [20].

  [3]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000698.html
  [4]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000699.html
  [5]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000701.html
  [6]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000702.html
  [7]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000703.html
  [8]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000704.html
  [9]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000705.html
 [10]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000706.html
 [11]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000708.html
 [12]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000709.html
 [13]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000710.html
 [14]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000712.html
 [15]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000713.html
 [16]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000714.html
 [17]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000717.html
 [18]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000700.html
 [19]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000711.html
 [20]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000716.html

Miscellaneous news

Nathan Freitas announced [21] version 14.1.4 of Orbot, the Tor client
for Android, which brings with it further improvements to background
service operation, as well as theme and layout tweaks.

 [21]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-November/004080.html

After much back-and-forth, work by Andrea Shepard to make Torâs cell
scheduling mechanism more efficient was finally merged [22]. Although
performance is not yet affected, these changes could form the basis of
other improvements to managing congestion caused by âmismanaged socket
outputâ in the Tor network, as discussed by Jansen et al. in âNever Been
KISTâ [23].

 [22]: https://bugs.torproject.org/9262
 [23]: http://www.robgjansen.com/publications/kist-sec2014.pdf

Following a discussion with David Goulet, Nick Mathewson posted a draft
proposal [24] of possible improvements to integration testing for Tor.

 [24]: https://lists.torproject.org/pipermail/tor-dev/2014-December/007898.html

Sebastian Hahn informed [25] users of the Tor Projectâs git repositories
that cloning via the unauthenticated git:// protocol is no longer
supported â secure https:// access has been and still is the preferred
method for retrieving code.

 [25]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007892.html

Gareth Owen started a discussion [26] of suspicious relay behaviors that
automated Tor network tests could scan for, in addition to those that
are already monitored.

 [26]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007870.html

Tor help desk roundup

The help desk has been asked how to set up a relay on a Windows laptop.
We donât recommend running a relay on a laptop: the relays that are most
useful to the network have faster bandwidth than most home internet
connections can offer. Relays also need to have as much uptime as
possible, and a laptop that gets put to sleep and woken up once a week
or more is not a good computing environment for a relay that should
serve the network in a consistent way.

We are not able to provide much help to users who report errors when
using any of the Vidalia bundles, as Vidalia is no longer maintained.

Upcoming events

  Dec 03 13:30 UTC | little-t tor development meeting
                   | #tor-dev, irc.oftc.net
  Dec 03 16:00 UTC | Pluggable transports meeting
                   | #tor-dev, irc.oftc.net
  Dec 03 20:00 UTC | Tails contributors meeting
                   | #tails-dev, irc.oftc.net
                   | https://mailman.boum.org/pipermail/tails-dev/2014-November/007418.html
  Dec 08 18:00 UTC | Tor Browser online meeting
                   | #tor-dev, irc.oftc.net
  Dec 08 18:00 UTC | OONI development meeting
                   | #ooni, irc.oftc.net
  Dec 09 17:00 UTC | little-t tor patch workshop
                   | #tor-dev, irc.oftc.net

This issue of Tor Weekly News has been assembled by Matt Pagan, Nick
Mathewson, Roger Dingledine, and Harmony.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [27], write down your
name and subscribe to the team mailing list [28] if you want to
get involved!

 [27]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
 [28]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to