[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â January 8th, 2013



========================================================================
Tor Weekly News                                        January 8th, 2013
========================================================================

Welcome to the first issue for the year 2014 of Tor Weekly News, the
weekly newsletter that covers what is happening in the impressive Tor
community. The tor-news mailing list has reached a thousand subscribers.
Thanks for following us!

Tor at the 30th Chaos Communication Congress
--------------------------------------------

The Chaos Computer Club held its thirtieth congressÂ[1] in Hamburg,
Germany during the days and nights of December 26th-30th. The congress
had over 9,000 participants. The topic of pervasive surveillance was
more present than ever, and Tor was a common answer to many questions.

   [1]Âhttps://events.ccc.de/congress/2013/

âWe are living in interesting timesâ was the subtitle of Jacob Appelbaum
and Roger Dingledineâs talk for this yearÂ[2]. Their tour of what
happened to Tor in the past years and more importantly in the past
months was seen by more than 3,000 attendees in Hamburg and a couple
more from the live stream and recordings. Later on, Sophie Bayerlein had
decorated a wall with her visual summary of the talkÂ[3].

   [2]Âhttp://media.ccc.de/browse/congress/2013/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma.html
   [3]Âhttps://events.ccc.de/congress/2013/wiki/Projects:VisualNotes#The_TOR_Project

The talk was quickly followed by a âHow to help Tor?â workshop. Lunar
reportedÂ[4] âan overwhelming success as more than 200 people showed up.
We were not prepared for helping so many folks waiting to learn how they
can help Tor. It still created interesting discussions, I believe, and I
hope we will find ways to interact more with the larger community in the
upcoming weeks, especially concerning outreach to the general public.â

   [4]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000420.html

Earlier the same day, a meetup of Tor relay operators was held. The
small room was packed with at least 60-70 attendees. Several relay
operator organizations reported on their progress: DFRIÂ[5], FrÃnn vun
der Ãnn, IcetorÂ[6], Noisetor, Nos oignonsÂ[7], Swiss Privacy
FoundationÂ[8] and Zwiebelfreunde. Many of these projects did not exist
last year, and new organizations are still being created, like The
TorroristsÂ[9] who also gave a quick status update. Nikita Borisov gave
a quick presentation of the traceroute research experimentÂ[10] and
encouraged more operators to run the test script. Several operators of
important relays and directory authorities also assisted the session.
Letâs hope everyone shared the same feelings as JasonÂfrom Icetor: âIt
was really excellent meeting all of you and great for my morale to see
all the people understanding and working towards common goals. Perhaps
itâs just due to my remoteness, but I rarely get to discuss projects
like this at such an intricate level.â

   [5]Âhttps://www.dfri.se/wiki/20131227-DFRI.pdf
   [6]Âhttp://icetor.is/slides/icetor-relay-slides.pdf
   [7]Âhttps://nos-oignons.net/Pr%C3%A9sentations/30C3/2013-12-27-30C3-Tor_relay_ops-Nos-oignons.pdf
   [8]Âhttp://www.privacyfoundation.ch/assets/files/presentation_association_20131227.pdf
   [9]Âhttp://www.torrorists.de/
  [10]Âhttp://web.engr.illinois.edu/~das17/tor-traceroute_v1.html

On the lightning talks front, Kai Engert presented DetecTorÂ[11,12,13],
David Fifield covered the basics of Tor pluggable transportsÂ[14], and
Michael Zeltner introduced tor2tcpÂ[15,16]. Some OnionCatÂ[17]
developers have also been spotted in the corridors.

  [11]Âhttp://detector.io/
  [12]ÂSlides:
       https://events.ccc.de/congress/2013/wiki/images/1/1b/LT-Day_3-14.45-DetecTor.IO.pdf
  [13]ÂVideo:
       http://media.ccc.de/browse/congress/2013/30C3_-_5563_-_en_-_saal_g_-_201312291245_-_lightning_talks_day_3_-_nickfarr.html
       at 1:56:25
  [14]Âhttps://www.bamsoftware.com/talks/30c3-pt/
  [15]Âhttps://poum.niij.org/
  [16]ÂVideo:
       http://media.ccc.de/browse/congress/2013/30C3_-_5564_-_en_-_saal_g_-_201312301245_-_lightning_talks_day_4_-_nickfarr.html
       at 1:41:00
  [17]Âhttps://www.onioncat.org/

The Chaos Communication Congress is one of the rare events where an
impressive number of members of the Tor community have a chance to
interact. Letâs hope it has been a fruitful time for everyone!

Tor website needs your help!
----------------------------

One of the outcomes of the âHow to help Tor?â session at the 30C3 was
that there were quite some people interested in helping the Tor project
with its website. In order to foster anyoneâs participation, a larger
call for helpÂ[18] has been sent.

It starts by acknowledging that âTor has shifted in the recent years
from being a project prominently used by researchers, developers, and
security experts to the wider audience of anyone concerned about their
privacyâ. As its primary audience shifted, âit is again time for
important changesâ to the website structure and design.

As one can read in the call or browse through the website related
ticketsÂ[19], itâs going to be a challenging task. A new mailing list
has been createdÂ[20] to coordinate the efforts. Join if you want to
help!

  [18]Âhttps://blog.torproject.org/blog/tor-website-needs-your-help
  [19]Âhttps://trac.torproject.org/projects/tor/query?component=Website&order=status
  [20]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/www-team

Monthly status reports for December 2013
----------------------------------------

The wave of regular monthly reports from Tor project members for the
month of December has begun. Philipp Winter released his report
firstÂ[21], followed by reports from Pearl CrescentÂ[22], Sherief
AlaaÂ[23], Colin C.Â[24], Damian JohnsonÂ[25], Torâs help deskÂ[26],
LunarÂ[4], Karsten LoesingÂ[27], Matt PaganÂ[28], Georg KoppenÂ[29],
Ximin LuoÂ[30], Nick MathewsonÂ[31], and Nicolas VigierÂ[32].

  [21]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-December/000414.html
  [22]Âhttps://lists.torproject.org/pipermail/tor-reports/2013-December/000415.html
  [23]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000416.html
  [24]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000417.html
  [25]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000418.html
  [26]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000419.html
  [27]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000421.html
  [28]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000422.html
  [29]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000423.html
  [30]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000424.html
  [31]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000425.html
  [32]Âhttps://lists.torproject.org/pipermail/tor-reports/2014-January/000426.html

Miscellaneous news
------------------

Anthony G. Basile released version 20131230 of Tor-ramdiskÂ[33]Ââ a
uClibc-based micro Linux distribution whose only purpose is to host a
Tor server â with an updated Linux kernel and Tor 0.2.4.20.

  [33]Âhttps://lists.torproject.org/pipermail/tor-talk/2014-January/031625.html

Gregory Maxwell started discussion on how to improve Hidden Services key
managementÂ[34]: âIt would be preferable if it were possible to have a
HS master key which was kept _offline_ which could be use to authorize
use for some time period and/or revoke usage.â As Nick Mathewson pointed
outÂ[35], the timing is right and such issues have a chance to be
addressed with the current redesign processÂ[36,37].

  [34]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-December/031533.html
  [35]Âhttps://lists.torproject.org/pipermail/tor-talk/2013-December/031546.html
  [36]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/220-ecc-id-keys.txt
  [37]Âhttps://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt

The Tails team has announced: âThe MAC address spoofing feature is ready
for testing. This feature prevents geographical tracking of your network
devices (and by extension, you) by randomizing their MAC addresses.â
Testing on a variety of hardware is now needed, give it a tryÂ[38]!

  [38]Âhttps://tails.boum.org/news/spoof-mac/

The next Tails contributor online meetingÂ[39] will be held January 9th
on the IRC channel #tails-dev (OFTC) at 21:00 UTC.

  [39]Âhttps://mailman.boum.org/pipermail/tails-dev/2014-January/004627.html

The âtest/rjb-migrationâ branch has been merged into the Tails
development treeÂ[40]. It should now be fairly straightforward to run
the automated test suite on a Debian Wheezy system.

  [40]Âhttps://mailman.boum.org/pipermail/tails-dev/2013-December/004562.html

The Tor Projectâs website has gained another new mirror, thanks PWÂ[41]!

  [41]Âhttps://lists.torproject.org/pipermail/tor-mirrors/2014-January/000427.html

Johannes FÃrmann askedÂ[42] the relay operators community to review a
short documentationÂ[43] on how to run multiple Tor processes on one
host.

  [42]Âhttps://lists.torproject.org/pipermail/tor-relays/2014-January/003564.html
  [43]Âhttps://gist.github.com/waaaaargh/8271499

Some users have been tricked into downloading malware from the
Torzip.com domain. Action is on-goingÂ[44] to shutdown the domain. In
the meantime, watch out!

  [44]Âhttps://bugs.torproject.org/10529

Tor help desk roundup
---------------------

Multiple people have now asked the help desk for support using the Tor
Browser on Windows RT. Windows RT is a new edition of Windows 8.1
designed for ARM devices like the Microsoft Surface. There is no
supported way of using Tor on Microsoft RT.

Many people have been emailing the help desk to ask how to get a new
identity or set up a relay now that Vidalia is no longer included in the
Tor Browser package. Vidalia is still available as a standalone
packageÂ[45]. More information on the transition away from Vidalia can
be found on the Tor Browser 3 FAQ wiki pageÂ[46].

  [45]Âhttps://people.torproject.org/~erinn/vidalia-standalone-bundles/
  [46]Âhttps://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ

Upcoming events
---------------

Jan 13-15 | Tor @ Real World Crypto 2014
          | New York City, USA
          | https://realworldcrypto.wordpress.com/
          |
Jan 14    | Roger @ NSF WATCH Seminar Series
          | Arlington, VA, USA
          | http://www.nsf.gov/cise/cns/watch/


This issue of Tor Weekly News has been assembled by Lunar, Matt Pagan,
dope457, Sandeep, weasel, rey, murb and nicoo.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project pageÂ[47], write down your
name and subscribe to the team mailing listÂ[48] if you want to
get involved!

  [47]Âhttps://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [48]Âhttps://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

Attachment: signature.asc
Description: Digital signature

-- 
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk