[tor-reports] SponsorR July 2015 report

George Kadianakis desnacked at riseup.net
Thu Aug 13 10:03:00 UTC 2015


Hello,

here is the July 2015 report for SponsorR:

- In the beginning of July, we gathered in Washington, DC for a
  hackfest focused on hidden services. We did lots of work and wrote a
  blog post about it:
   https://blog.torproject.org/blog/hidden-service-hackfest-arlington-accords

- As part of the hackfest we worked on the various codebase changes
  that we need to implement proposal 224. We also analyzed and
  documented how the data structures should be refactored for the next
  generation hidden services project.
   https://people.torproject.org/~asn/hs_hackfest_2015/224modules.txt
   https://people.torproject.org/~dgoulet/hs224-refactor.txt

- We also published a report on the introduction point stability
  statistics we collected during the past months. You can find it
  here: https://lists.torproject.org/pipermail/tor-dev/2015-July/009109.html

- As part of improving and understanding reliability of introduction
  points, we implemented ticket #4862. As part of that ticket, we
  disabled the dynamic introduction point formulat that leaked the
  popularity of busy hidden services.  We also implemented #8239 which
  allows hidden services to reconnect to old introduction points,
  which should improve the reliability and stability of hidden
  service.

- We further discussed hidden service statistics and how the original
  hidden service statistics we implemented 6 months ago have been very
  very useful:
  https://blog.torproject.org/blog/some-statistics-about-onions

  To improve the reliability of the statistics (since currently only
  about 3% of the network reports them), we decided to enable them by
  default in the future (#15254). We also discussed systems for
  collecting additional statistics in a privacy-preserving manner,
  using Secure Multiparty Computation or other similar techniques.

- We also took our old design for "Direct Onion Services" and revised
  it into a faster and far more elegant protocol. These types of
  services trade service-side location privacy for improved
  performance, reliability, and scalability. They will allow sites
  like reddit to offer their services faster on hidden services while
  respecting their clients anonymity. During the last days of the
  hackfest, we wrote a draft proposal for this new design:
   https://gitweb.torproject.org/user/special/torspec.git/log/?h=xxx-direct-onion


- Further work was done on onionbalance, the hidden service load
  balancer. An alpha version of the software was released:
   https://lists.torproject.org/pipermail/tor-talk/2015-July/038312.html
  and volunteers have already been testing it in their services:
   https://lists.torproject.org/pipermail/tor-talk/2015-July/038314.html

- We did more development on OnioNS, the Onion Name System, which
  allows a hidden service operator to register a human memorable name
  (e.g. example.tor) that can be used instead of the regular onion
  address. In the last days of the hackfest we prepared a
  proof-of-concept demo wherein a domain name was registered and then
  the Tor Browser successfully loaded a hidden service under that
  name. That was a significant step for the project:
   https://lists.torproject.org/pipermail/tor-dev/2015-July/009103.html

- Further hidden service control commands were added. Ticket #14846
  implements a control port command that allows hidden service
  operators to easily fetch the descriptor of their service.1



More information about the tor-reports mailing list