[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-talk] Tor Weekly News â November 12th, 2014

Tor Weekly News                                      November 12th, 2014

Welcome to the forty-fifth issue in 2014 of Tor Weekly News, the weekly
newsletter that covers whatâs happening in the Tor community.

Mozilla announces Polaris Privacy Initiative

Mozilla, makers of the Firefox browser upon which Tor Browser is based,
announced [1] a series of projects to âaccelerate pragmatic and
user-focused advances in privacy technology for the Web, giving users
more control, awareness and protection in their Web experiencesâ. The
Tor Project is one of Mozillaâs two partners in this Polaris Privacy
Initiative, and the collaboration will involve looking at the Firefox
codebase to see if its relationship to Tor Browser and the Tor
development process can be made more efficient, giving Tor engineers
more time to focus on other important issues. Mozilla also stated their
intention to run several high-capacity Tor middle relays, contributing
to a faster and more stable Tor network.

As Andrew Lewman wrote on the Tor blog, âthe Tor Browser is one of the
best ways to protect privacy on the web and this partnership is a huge
step in advancing peopleâs right to freedom of expression onlineâ. Watch
for more announcements as work on these two fronts continues.

  [1]: https://blog.mozilla.org/privacy/2014/11/10/introducing-polaris-privacy-initiative-to-accelerate-user-focused-privacy-online
  [2]: https://blog.torproject.org/blog/partnering-mozilla

Tor and Operation Onymous

An international coalition of law enforcement authorities announced [2]
the seizure of over 400 Tor hidden services allegedly engaging in
illegal activity. Once the desired headlines had been written, something
approaching the facts began to emerge, with the claimed number of seized
services dropping sharply to 27 [3]; more troublingly, several
high-capacity Tor relays with no apparent connection to the hidden
services were also seized [4, 5].  However, in contrast to the last
major takedown of hidden services [6], which involved one shared hidden
service hosting platform, there was no obvious single feature linking
all of the seized sites, leading to concern in the Tor community that an
exploit against the Tor network may have been responsible for their

It could be that these services were deanonymized individually over a
period of months using a variety of means, then all seized at once for
maximum effect: as Andrew Lewman and others wrote in a response posted
to the Tor blog [7], these methods could include operational security
mistakes by service operators, exploitation of flaws in poorly-written
website code, or attacks on the Bitcoin cryptocurrency that is widely
used on hidden service marketplaces. On the other hand, if an attack on
the Tor network itself is at play, it may be a variant of the class of
attack known as âtraffic confirmationâ, like the one observed earlier
this year [8]. âUnfortunately,â as the blog post notes, âthe authorities
did not specify how they managed to locate the hidden servicesâ; even if
they had, recent disclosures concerning âparallel constructionâ in law
enforcement [9] mean that the public would not necessarily be able to
trust their explanation.

âHidden services need some loveâ has become a familiar refrain in recent
months, and even though the story behind these seizures may remain
unknown, they have reinvigorated some long-running threads on
improvements to the security of this important technology. George
Kadianakis coded [10] a patch that allows hidden service operators to
âspecify a set of nodes that will be pinned as middle nodes in hidden
service rendezvous circuitsâ, while the theory behind this continues to
be discussed [11], as does the hidden service authorization feature [12]
and how widely it is used in practice [13].

âThe attention hidden services have received is minimal compared to
their social value and compared to the size and determination of their
adversaries.â If you are a hidden service operator concerned by these
seizures, or you want to help ensure the possibility of free and
uncensorable publishing online, see the group blog post for more
details, and feel free to join in with the discussions on the tor-dev
mailing list.

  [3]: https://www.europol.europa.eu/content/global-action-against-dark-markets-tor-network
  [4]: http://www.dailydot.com/politics/oops-we-counted-wrong-silk-road-dark-net-tor/
  [5]: https://blog.torservers.net/20141109/three-servers-offline-likely-seized.html
  [6]: https://raided4tor.wordpress.com/
  [7]: https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous
  [8]: https://lists.torproject.org/pipermail/tor-news/2014-August/000057.html
  [9]: https://en.wikipedia.org/wiki/Parallel_construction
 [10]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007730.html
 [11]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007726.html
 [12]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007735.html
 [13]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007744.html

More monthly status reports for October 2014

The wave of regular monthly reports from Tor project members for the
month of October continued, with reports from Isis Lovecruft [14],
Nicolas Vigier [15], Damian Johnson [16], and Karsten Loesing [17].

Roger Dingledine sent out the report for SponsorF [18].

 [14]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000693.html
 [15]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000694.html
 [16]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000695.html
 [17]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000696.html
 [18]: https://lists.torproject.org/pipermail/tor-reports/2014-November/000697.html

Miscellaneous news

Arturo Filastà reported [19] on OONIâs ongoing study of Tor bridge
reachability in different countries, and the recent hackfest on the same

 [19]: https://blog.torproject.org/blog/ooni-bridge-reachability-study-and-hackfest

Karsten Loesing offered an update [20] on developments in the world of
Onionoo, including new mirrors and search improvements.

 [20]: https://lists.torproject.org/pipermail/onionoo-announce/2014/000002.html

Help desk round up

The help desk has been asked how to run Tor Browser on a Chromebook.
ChromeOS does not allow any programs to be executed except Google
Chrome, including other browsers like Tor Browser. The workaround for
this is to install a Debian or Ubuntu environment within ChromeOS using
crouton [21]. Once crouton is ready, Tor Browser for Linux can be
downloaded and installed in the Debian or Ubuntu environment. Crouton
users should seek support from the crouton team and not from the Tor
help desk.

 [21]: https://github.com/dnschneid/crouton

Upcoming events

  Nov 12 13:30 UTC | little-t tor development meeting
                   | #tor-dev, irc.oftc.net
  Nov 13 13:30 UTC | little-t tor bug triage party
                   | #tor-dev, irc.oftc.net
                   | https://lists.torproject.org/pipermail/tor-dev/2014-November/007724.html
  Nov 14 17:00 CET | OONI development meeting
                   | #ooni, irc.oftc.net
  Nov 17 18:00 UTC | Tor Browser online meeting
                   | #tor-dev, irc.oftc.net
  Nov 18 17:00 UTC | little-t tor patch workshop
                   | #tor-dev, irc.oftc.net

This issue of Tor Weekly News has been assembled by Harmony, Matt Pagan,
Karsten Loesing, and Lunar.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [22], write down your
name and subscribe to the team mailing list [23] if you want to
get involved!

 [22]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
 [23]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
tor-talk mailing list - tor-talk@xxxxxxxxxxxxxxxxxxxx
To unsubscribe or change other settings go to