======================================================================== Tor Weekly News January 8th, 2013 ======================================================================== Welcome to the first issue for the year 2014 of Tor Weekly News, the weekly newsletter that covers what is happening in the impressive Tor community. The tor-news mailing list has reached a thousand subscribers. Thanks for following us! Tor at the 30th Chaos Communication Congress -------------------------------------------- The Chaos Computer Club held its thirtieth congressÂ[1] in Hamburg, Germany during the days and nights of December 26th-30th. The congress had over 9,000 participants. The topic of pervasive surveillance was more present than ever, and Tor was a common answer to many questions. [1]Âhttps://events.ccc.de/congress/2013/ âWe are living in interesting timesâ was the subtitle of Jacob Appelbaum and Roger Dingledineâs talk for this yearÂ[2]. Their tour of what happened to Tor in the past years and more importantly in the past months was seen by more than 3,000 attendees in Hamburg and a couple more from the live stream and recordings. Later on, Sophie Bayerlein had decorated a wall with her visual summary of the talkÂ[3]. [2]Âhttp://media.ccc.de/browse/congress/2013/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma.html [3]Âhttps://events.ccc.de/congress/2013/wiki/Projects:VisualNotes#The_TOR_Project The talk was quickly followed by a âHow to help Tor?â workshop. Lunar reportedÂ[4] âan overwhelming success as more than 200 people showed up. We were not prepared for helping so many folks waiting to learn how they can help Tor. It still created interesting discussions, I believe, and I hope we will find ways to interact more with the larger community in the upcoming weeks, especially concerning outreach to the general public.â [4]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000420.html Earlier the same day, a meetup of Tor relay operators was held. The small room was packed with at least 60-70 attendees. Several relay operator organizations reported on their progress: DFRIÂ[5], FrÃnn vun der Ãnn, IcetorÂ[6], Noisetor, Nos oignonsÂ[7], Swiss Privacy FoundationÂ[8] and Zwiebelfreunde. Many of these projects did not exist last year, and new organizations are still being created, like The TorroristsÂ[9] who also gave a quick status update. Nikita Borisov gave a quick presentation of the traceroute research experimentÂ[10] and encouraged more operators to run the test script. Several operators of important relays and directory authorities also assisted the session. Letâs hope everyone shared the same feelings as JasonÂfrom Icetor: âIt was really excellent meeting all of you and great for my morale to see all the people understanding and working towards common goals. Perhaps itâs just due to my remoteness, but I rarely get to discuss projects like this at such an intricate level.â [5]Âhttps://www.dfri.se/wiki/20131227-DFRI.pdf [6]Âhttp://icetor.is/slides/icetor-relay-slides.pdf [7]Âhttps://nos-oignons.net/Pr%C3%A9sentations/30C3/2013-12-27-30C3-Tor_relay_ops-Nos-oignons.pdf [8]Âhttp://www.privacyfoundation.ch/assets/files/presentation_association_20131227.pdf [9]Âhttp://www.torrorists.de/ [10]Âhttp://web.engr.illinois.edu/~das17/tor-traceroute_v1.html On the lightning talks front, Kai Engert presented DetecTorÂ[11,12,13], David Fifield covered the basics of Tor pluggable transportsÂ[14], and Michael Zeltner introduced tor2tcpÂ[15,16]. Some OnionCatÂ[17] developers have also been spotted in the corridors. [11]Âhttp://detector.io/ [12]ÂSlides: https://events.ccc.de/congress/2013/wiki/images/1/1b/LT-Day_3-14.45-DetecTor.IO.pdf [13]ÂVideo: http://media.ccc.de/browse/congress/2013/30C3_-_5563_-_en_-_saal_g_-_201312291245_-_lightning_talks_day_3_-_nickfarr.html at 1:56:25 [14]Âhttps://www.bamsoftware.com/talks/30c3-pt/ [15]Âhttps://poum.niij.org/ [16]ÂVideo: http://media.ccc.de/browse/congress/2013/30C3_-_5564_-_en_-_saal_g_-_201312301245_-_lightning_talks_day_4_-_nickfarr.html at 1:41:00 [17]Âhttps://www.onioncat.org/ The Chaos Communication Congress is one of the rare events where an impressive number of members of the Tor community have a chance to interact. Letâs hope it has been a fruitful time for everyone! Tor website needs your help! ---------------------------- One of the outcomes of the âHow to help Tor?â session at the 30C3 was that there were quite some people interested in helping the Tor project with its website. In order to foster anyoneâs participation, a larger call for helpÂ[18] has been sent. It starts by acknowledging that âTor has shifted in the recent years from being a project prominently used by researchers, developers, and security experts to the wider audience of anyone concerned about their privacyâ. As its primary audience shifted, âit is again time for important changesâ to the website structure and design. As one can read in the call or browse through the website related ticketsÂ[19], itâs going to be a challenging task. A new mailing list has been createdÂ[20] to coordinate the efforts. Join if you want to help! [18]Âhttps://blog.torproject.org/blog/tor-website-needs-your-help [19]Âhttps://trac.torproject.org/projects/tor/query?component=Website&order=status [20]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/www-team Monthly status reports for December 2013 ---------------------------------------- The wave of regular monthly reports from Tor project members for the month of December has begun. Philipp Winter released his report firstÂ[21], followed by reports from Pearl CrescentÂ[22], Sherief AlaaÂ[23], Colin C.Â[24], Damian JohnsonÂ[25], Torâs help deskÂ[26], LunarÂ[4], Karsten LoesingÂ[27], Matt PaganÂ[28], Georg KoppenÂ[29], Ximin LuoÂ[30], Nick MathewsonÂ[31], and Nicolas VigierÂ[32]. [21]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-December/000414.html [22]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-December/000415.html [23]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000416.html [24]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000417.html [25]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000418.html [26]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000419.html [27]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000421.html [28]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000422.html [29]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000423.html [30]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000424.html [31]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000425.html [32]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000426.html Miscellaneous news ------------------ Anthony G. Basile released version 20131230 of Tor-ramdiskÂ[33]Ââ a uClibc-based micro Linux distribution whose only purpose is to host a Tor server â with an updated Linux kernel and Tor 0.2.4.20. [33]Âhttps://lists.torproject.org/pipermail/tor-talk/2014-January/031625.html Gregory Maxwell started discussion on how to improve Hidden Services key managementÂ[34]: âIt would be preferable if it were possible to have a HS master key which was kept _offline_ which could be use to authorize use for some time period and/or revoke usage.â As Nick Mathewson pointed outÂ[35], the timing is right and such issues have a chance to be addressed with the current redesign processÂ[36,37]. [34]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-December/031533.html [35]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-December/031546.html [36]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/220-ecc-id-keys.txt [37]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt The Tails team has announced: âThe MAC address spoofing feature is ready for testing. This feature prevents geographical tracking of your network devices (and by extension, you) by randomizing their MAC addresses.â Testing on a variety of hardware is now needed, give it a tryÂ[38]! [38]Âhttps://tails.boum.org/news/spoof-mac/ The next Tails contributor online meetingÂ[39] will be held January 9th on the IRC channel #tails-dev (OFTC) at 21:00 UTC. [39]Âhttps://mailman.boum.org/pipermail/tails-dev/2014-January/004627.html The âtest/rjb-migrationâ branch has been merged into the Tails development treeÂ[40]. It should now be fairly straightforward to run the automated test suite on a Debian Wheezy system. [40]Âhttps://mailman.boum.org/pipermail/tails-dev/2013-December/004562.html The Tor Projectâs website has gained another new mirror, thanks PWÂ[41]! [41]Âhttps://lists.torproject.org/pipermail/tor-mirrors/2014-January/000427.html Johannes FÃrmann askedÂ[42] the relay operators community to review a short documentationÂ[43] on how to run multiple Tor processes on one host. [42]Âhttps://lists.torproject.org/pipermail/tor-relays/2014-January/003564.html [43]Âhttps://gist.github.com/waaaaargh/8271499 Some users have been tricked into downloading malware from the Torzip.com domain. Action is on-goingÂ[44] to shutdown the domain. In the meantime, watch out! [44]Âhttps://bugs.torproject.org/10529 Tor help desk roundup --------------------- Multiple people have now asked the help desk for support using the Tor Browser on Windows RT. Windows RT is a new edition of Windows 8.1 designed for ARM devices like the Microsoft Surface. There is no supported way of using Tor on Microsoft RT. Many people have been emailing the help desk to ask how to get a new identity or set up a relay now that Vidalia is no longer included in the Tor Browser package. Vidalia is still available as a standalone packageÂ[45]. More information on the transition away from Vidalia can be found on the Tor Browser 3 FAQ wiki pageÂ[46]. [45]Âhttps://people.torproject.org/~erinn/vidalia-standalone-bundles/ [46]Âhttps://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ Upcoming events --------------- Jan 13-15 | Tor @ Real World Crypto 2014 | New York City, USA | https://realworldcrypto.wordpress.com/ | Jan 14 | Roger @ NSF WATCH Seminar Series | Arlington, VA, USA | http://www.nsf.gov/cise/cns/watch/ This issue of Tor Weekly News has been assembled by Lunar, Matt Pagan, dope457, Sandeep, weasel, rey, murb and nicoo. Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project pageÂ[47], write down your name and subscribe to the team mailing listÂ[48] if you want to get involved! [47]Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews [48]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
Attachment:
signature.asc
Description: Digital signature
-- tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk