[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-talk] Tor Weekly News -- February 15th, 2016
Tor Weekly News February 15th, 2016
After a few-months-long hiatus, we're back with Tor Weekly News, the
weekly newsletter that covers what's happening in the Tor community.
1. Tails 2.0 released
2. Tor Browser 5.5.1, 6.0a1, and 6.0a1-hardened released
3. Monthly status reports for January 2016
4. Miscellaneous news
5. Upcoming events
Tails 2.0 released
This is a major version bump (from 1.8.2) covered previously on the Tor
Blog  and on the Tails site . Here's a quick recap of the new
features: it's now based on Debian 8 (from Debian 7), it uses GNOME 3 in
"Classic Mode" (previously GNOME 2) , it's got the just-released
Tor Browser 5.5, they've replaced Claws Mail with Icedove, and there's a
fancy new set of installation instructions .
Several security issues  were found and fixed, so it's important
for existing users to upgrade  as soon as possible.
(As of Feb. 15th, the latest patch version is 2.0.1.)
Tor Browser 5.5.1, 6.0a1, and 6.0a1-hardened released
Most users should be following the stable series of Tor Browser, which
recently changed from 5.0.x to 5.5.x. 5.5 replaced 5.0.7 on January
27th , and the latest patch version as of Feb 15th is 5.5.2 .
The biggest new feature is a set of bundled fonts that prevent an
adversary from fingerprinting you based on your system fonts.
Developers and bug-tolerant users might want to try one of the alpha
versions: 6.0a1  or 6.0a1-hardened . (In case you missed it,
the Tor Browser Team started releasing the hardened series in November
. Firefox is compiled with AddressSanitizer (ASan) , and Tor
is compiled with both ASan and Undefined Behaviour Sanitizer (UBSan)
. These insert a lot of run-time safety checks to make memory
corruption bugs harder to exploit, at the cost of increased memory
usage, larger binary distributions, and slower performance.)
All of these new releases are based on Firefox 38.6.0esr, which includes
a few important security fixes  to the previous version, so users
should update as soon as possible.
Monthly status reports for December 2015
Tor Project members submitted their monthly reports for December.
Karsten  worked on metrics-lib; Leiah  worked on the fundraising
campaign graphics; the Tor Browser team  worked on six releases;
Isabela  worked on organizing the Network team, on contracts, and on
the fundraising campaign; Georg  worked on Tor Browser and wrote a
blog post on the reproducible builds workshop in Athens, which he
attended; Damian  worked on Nyx; Isis  gave a cryptography
lecture in the Netherlands and worked on BridgeDB; George's SponsorR
report  and his own report  included work on hidden services and
a 32c3 talk about them; David  also did hidden services work and
gave the same 32c3 talk; Arturo  reports that the OONI team worked
on the Lantern tests and the new API/web-frontend for the collected
reports; and Isabela's SponsorU report  includes work on ed25519
keys, DoS resilience, and developer documentation.
Mike Perry added  a new proposal to the torspec repository .
"In order to properly load balance in the presence of padding and
non-negligible amounts of directory and hidden service traffic, the load
balancing equations in Section 3.8.3 of dir-spec.txt are in need of some
George asked  for code review on proposal 250's shared randomness
 implementation , which will be used in the next-generation
There was a mailing list discussion  about the hidden service
changes in proposal 246.
Nick started a discussion  about the proposal review system. There
followed a few meetings about proposals 241, 247, 250, 251 and 259, and
George and Mike posted their notes to the mailing list
Yawning released  obfs4proxy-0.0.6. "There aren't many significant
changes, and the internal changes primarily affect the client side
initialization, so those of you that are perfectly content with
obfs4proxy-0.0.5 can continue to use the existing version without
Serence, Arlo, and David released  Snowflake , a webrtc
pluggable transport inspired by flashproxy.
Nathan announced  v15.1.0-RC-4 of Orbot and posted a roadmap 
ProPublica set up a hidden service version  of their website, and
Mike Tigas has an article  on their motivation and technical
George announced  the tor-onions@xxxxxxxxxxxxxxxxxxxx mailing list
, for technical discussion about running Tor onion (hidden)
Feb 17 13:30 UTC | Network Team Meeting
| #tor-dev, irc.oftc.net
Feb 18 14:00 UTC | Metrics Team Meeting
| #tor-dev, irc.oftc.net
Feb 26 - Mar 01 | Tor winter dev meeting 2016
| Valencia, Spain
Mar 01 - Mar 07 | Internet Freedom Festival
| Valencia, Spain
This issue of Tor Weekly News has been assembled by jl and teor.
Want to continue reading TWN? Please help us create this newsletter. We
still need more volunteers to watch the Tor community and report
important news. Please see the project page , write down your name
and subscribe to the team mailing list  if you want to get
To unsubscribe or change other options, please visit:
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to