Hello friends,
The OONI team is excited to share that we have released *OONI Probe Android
3.0.0*!
Update now:
https://play.google.com/store/apps/details?id=org.openobservatory.ooniprobe
This exciting release includes several important new features:
1. *Automated regular testing* -> By enabling automated testing in the
settings, OONI Probe Android will test websites automatically every hour!
2. *New Experimental card* -> You can now run our *new STUN reachability
test*.
3. *Backend proxy support* -> You can enable Psiphon or use a custom proxy
through the new OONI backend proxy settings.
Further information is provided below.
*# Automated testing*
Instead of having to remember to manually run OONI Probe, you can now have
OONI Probe test websites automatically every hour!
All you have to do is *enable the "Run tests automatically" option* in the
new "Automated testing" setting of the OONI Probe Android app.
Through these settings, you can choose whether you'd prefer to have OONI
Probe only run tests while you're connected to WiFi and your phone is
charging (to avoid consuming your data and battery).
By enabling "automated testing", the OONI Probe Android app will test
websites (
https://ooni.org/support/faq/#which-websites-will-i-test-for-censorship-wit…)
automatically (in the background) every hour, without requiring you to do
anything. :)
We started off with only automated website testing, but we plan to add
support for automatically running other tests as well in future releases
(similarly to automated testing on OONI Probe Desktop:
https://ooni.org/support/ooni-probe-desktop#automated-ooni-probe-testing).
To avoid over-cluttering the "Test Results" section of your app with too
many test results (from automated runs), they are only made available on
the OONI API (https://api.ooni.io/) and OONI Explorer (
https://explorer.ooni.org/), where they are openly published in near
real-time.
We *strongly recommend enabling automated testing*, as this will help
ensure regular testing (which is crucial for detecting censorship events).
In doing so, you will contribute open data and help the internet freedom
community monitor and respond to censorship events around the world.
*# New Experimental card*
As censorship becomes more sophisticated, we need to ship new censorship
detection tests faster.
To this end, we added a *new Experimental card* in the OONI Probe Android
app, where we plan to release our latest experiments.
This card is meant to provide us agility in adding and removing new
experiments on an ongoing basis (particularly in response to emergent
censorship events).
With OONI Probe Android 3.0.0, you can run our *new STUN reachability test*
:
https://github.com/ooni/spec/blob/master/nettests/ts-025-stun-reachability.…
Many more new tests are upcoming!
*# Backend proxy support*
Are you unable to use OONI Probe (for example, in Iran)?
OONI Probe Android 3.0.0 includes *new backend proxy settings* where you
can:
* Enable Psiphon
* Use a custom proxy
This will help with circumventing any accidental or deliberate OONI Probe
blocking.
We published a blog post where we describe what we did to make OONI Probe
Android more resilient:
https://ooni.org/post/making-ooni-probe-android-more-resilient/
*# Overall*
We consider OONI Probe Android 3.0.0 an important release because:
* You can contribute regular measurements automatically, helping the
internet freedom community research and fight internet censorship worldwide;
* You can run more advanced tests through the new Experimental card, which
is an important milestone for future rapid response efforts;
* Community members in countries like Iran can continue to use OONI Probe
Android and contribute measurements (with the new backend proxy settings).
Please help spread the word:
https://twitter.com/OpenObservatory/status/1397901993600065540
Thank you,
OONI team.
Hi friends,
The OONI team is super excited to share that the OONI Probe Desktop App
now supports automated testing!
Please update to OONI Probe Desktop 3.3.0 on Windows and macOS:
https://ooni.org/install/desktop
Instead of having to remember to manually run tests, you can now enable
"automated testing" in the settings of your OONI Probe desktop app
(version 3.3.0) and OONI Probe will run tests automatically for you!
If you enable "automated testing", OONI Probe will automatically run
tests every hour in the background, and the test results will
automatically get published on OONI Explorer: https://explorer.ooni.org/
That way, you can regularly contribute censorship measurements (without
having to do anything), enabling the internet freedom community to
monitor and detect censorship events in your country.
Please help spread the word:
https://twitter.com/OpenObservatory/status/1374019400194523138
Thanks,
~ OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hi friends,
Are you running the old python version of ooniprobe
(https://github.com/ooni/probe-legacy)?
If so, please switch over to the new OONI Probe Command Line Interface
(CLI): https://ooni.org/install/cli
Similarly to legacy ooniprobe, the new OONI Probe CLI is:
* Supported on Linux and macOS: https://ooni.org/install/cli
* Configured to run all OONI Probe tests automatically every day
As legacy ooniprobe is being discontinued, if you continue running it:
* You will no longer contribute measurements
* You will not receive important updates (such as new OONI Probe tests)
We therefore kindly ask you to please switch over to the new OONI Probe
CLI: https://ooni.org/install/cli
OONI Probe CLI not only supports automated daily testing, but it is also
what we are currently maintaining and improving upon, and will include
all new OONI Probe tests.
If you know others who are running the legacy version of ooniprobe, we'd
appreciate it if you could share the above information with them.
Please help spread the word:
https://twitter.com/OpenObservatory/status/1364171996079271938
Thanks a million!
~ OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hello,
We are excited to share that we have released a new OONI Probe Command
Line Interface (CLI)!
You can install OONI Probe on the command line on:
* Debian/Ubuntu: https://ooni.org/install/cli/ubuntu-debian
* macOS: https://ooni.org/install/cli/macos
Upon installation, OONI Probe will run all tests *automatically* every day!
This is very exciting because you can easily contribute lots of
measurements every day without having to remember to run OONI Probe. :)
Given that all OONI Probe measurements are openly published in near
real-time (https://ooni.org/data/), you will help the internet freedom
community better investigate internet censorship.
IMPORTANT:
Are you running the python legacy version of ooniprobe
(https://github.com/ooni/probe-legacy) on Linux or macOS?
This is the old version of ooniprobe that has been around since ~ 2012.
If you're still running it (and we know that many of you are!):
* First of all: We love you for being such a long-term Oonitarian and
contributing so many measurements over the years! <3
* Second (and importantly): Please SWITCH OVER to the new OONI Probe
CLI: https://ooni.org/install/cli
We are in the process of discontinuing the legacy ooniprobe version.
Similarly to the legacy version, you'll be able to have all tests run
automatically in the background every day with the new OONI Probe CLI,
and it will also receive important future updates (such as new tests,
code improvements, etc.).
If you know others who are running the legacy version of ooniprobe, we'd
appreciate it if you could please share the above information with them!
Happy to address any questions.
Thanks a million!
~ OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hello,
The OONI team will launch a sparkling, brand new OONI Explorer in June 2019!
Thanks to great feedback provided by the community, the OONI team has
been working on revamping OONI Explorer entirely.
To further improve upon OONI Explorer before the stable release (public
launch), we invite you to test the OONI Explorer beta and to report any
bugs/issues.
# Beta of OONI Explorer
Access the beta of the revamped OONI Explorer here:
https://explorer-beta.ooni.io/
# Reporting issues
Once you have played around with the OONI Explorer beta, we encourage
you to report any issues you encounter.
You can file tickets on the following GitHub repository:
https://github.com/ooni/explorer/issues
Please check if the problem you are encountering has already been reported.
If you’re not a GitHub user, you can share your feedback with us by:
* Writing an email to bugs(a)openobservatory.org
or
* Clicking on the icon on the bottom right corner in the OONI Explorer
beta (https://explorer-beta.ooni.io/) and submitting your feedback via
the pop-up form
Your feedback and bug reporting is hugely appreciated, as it will help
us launch a better OONI Explorer for the community!
Thanks a million, and happy testing!
~ The OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.torproject.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hello folks,
OONI's hiring!
Detailed information here:
https://www.torproject.org/about/jobs-backenddeveloper.html.en
We're looking for a Backend Engineer to join the OONI team to work on:
* our data processing pipeline (& other backend components)
* the improvement of our data analysis heuristics
* the improvement of our network measurement methodologies
This is a full-time 12-month contract position, starting ASAP (no later
than mid-May 2019). The contract may be extended, depending on
performance and available funds.
Extensive experience in python or golang is required. Previous
experience working with data processing pipelines & familiarity with the
network measurement field is preferred.
As OONI doesn't have an office, this is a remote position. Most OONI
team members are based out of Europe.
Do you know someone right for this position?
We'd appreciate it if you could please share this job opening with your
networks!
Warm thanks,
~ OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.torproject.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hello,
Thanks to great feedback provided by the community, the OONI team has
been working on revamping and improving upon the OONI Probe mobile apps.
Today, we are excited to announce that we have released the public beta!
To further improve upon the apps before the stable release, we invite
you to become beta testers and to report any bugs/issues.
# Becoming a beta tester
On Android:
* Sign up to the beta:
https://play.google.com/apps/testing/org.openobservatory.ooniprobe
* Update your OONI Probe mobile app (to get the public beta) from Google
Play
On iOS:
* Tap on this link from your device and follow the instructions:
https://testflight.apple.com/join/rh3Ig7fE
# Reporting issues
Once you have installed and played around with the public beta of the
OONI Probe mobile apps, we encourage you to report any issues you encounter.
You can file tickets on the following GitHub repositories:
* OONI Probe (all platforms): https://github.com/ooni/probe/issues
* OONI Probe for Android: https://github.com/ooni/probe-android/issues
* OONI Probe for iOS: https://github.com/ooni/probe-ios/issues
Please check if the problem you are encountering has already been reported.
If you’re not a GitHub user, you can share your feedback with us by
writing an email to contact(a)openobservatory.org.
Your feedback and bug reporting is hugely appreciated, as it will help
us launch better apps!
Thanks a million, and happy testing!
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.torproject.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Hello OONI devs,
I've been working the last few months on an open source project called P2P
VPS:
http://p2pvps.org
P2P VPS is an acronym for peer-to-peer virtual private servers. It provides
a simple web app to coordinate networking to allow any computing device to
serve webpages to the general internet. In it's own right, it's censorship
fighting software by allowing people to rapidly deploy networks of web
servers.
I'm wondering if there is some synergy between OONI and P2P VPS?
-Chris Troutner