Hi all :)
This is my monthly status report for February 2024 with the main relevant
activities I have done during the period.
## 0. Research
* No research activities in this month.
## 1. Development
* Onionspray:
* Discovered and fixed a security issue:
https://tpo.pages.torproject.net/onion-services/onionspray/security/advisor…
* Did the 1.6.0 release:
https://tpo.pages.torproject.net/onion-services/onionspray/changelog/
* Onion Services Ecosystem Portal:
* Unified many Onion Services documentations in a single place (temporary address):
https://tpo.pages.torproject.net/onion-services/portal/
* It's probably going to be hosted inside the Tor Community Portal, as being
planned at https://gitlab.torproject.org/tpo/onion-services/portal/-/issues/1
## 2. Support
* Ongoing sponsored work with deployment, maintenance and monitoring of Onion
Services.
* Did some support related to setting up Onion Services.
## 3. Organization
Time spent (from the total available for Tor-related work):
| Category | Percentage
|---------------|------------
| Research | 0
| Development | 30
| Support | 30
| Organization | 40
|---------------|------------
| Total | 100
--
Silvio Rhatto
pronouns he/him
I sent this message during my active hours, which might be different from
yours. I'm fine if you take your time to answer, and usually takes some time
for me to answer.
Hi! Below is my February’24 report!
In February, I resolved 514 tickets:
On Telegram (@TorProjectSupportBot) - 374
On RT (frontdesk@tpo) - 120
On WhatsApp (+447421000612) - 16
and on Signal (+17787431312) - 4.
During February I have been doing regular user support activity:
1. Helped Russian-speaking users to bypass censorship: shared bridges
and assisted with using them and troubleshooting;
2. Collected users feedback;
3. Helped to solve issues like:
* Orbot does not work.
* antivirus software blocks tor.
* wrong system time on the user's PC.
4. Continued following the issue with bridge requests from unusual
locations, where Tor connections aren't blocked.
I also helped with localisation activity on WebLate, checking, fixing
and approving the Russian translation. Also this month I conducted a
training on how to use Tor Browser.
In February, I reviewed and updated existing user support templates in
Russian[2]. With the help of our users I reported thisissue with
@gettor_bot on Telegram[1].
[1]
https://gitlab.torproject.org/tpo/anti-censorship/gettor-project/OnionSprou…
[2]
https://forum.torproject.org/t/tor-blocked-in-russia-how-to-circumvent-cens…
Hi everyone!
Here is my status report for February 2024.
As anticipated in my previous report, I have been working on
implementing the possibility of setting Mullvad Browser as the default
browser on Windows for most of this month.
It involved several steps.
The first one was to start customizing MOZ_APP_DISPLAYNAME in our
browsers to allow installing one build from each channel (stable, alpha,
nightly) without conflicts [0].
As a wanted side effect, alpha and nightly app bundles for macOS now
contain the channel in their name. The original issue about this [1] was
opened in 2018 😄️.
The second step was to adapt Firefox's default browser agent. It's a
companion exe that helps in various tasks. We disabled it because it
isn't compatible with MinGW. Luckily, the compatibility problems affect
only some features we are not interested in, so we could disable them
and create a reduced agent that is enough for our needs.
The final step was to extend the installer to register all the various
file associations. I hoped to deal with this step later because it was
very involved (lots of Windows registry), but it turned out to be necessary.
We're implementing these changes in Mullvad Browser. Only the macOS
changes apply also to Tor Browser.
This month, I also took some time to start a different approach to the
big rebases we do for our browsers.
Traditionally, we stay on Mozilla ESR's channel, and once per year, we
skip all the Firefox versions between the two ESRs.
I wondered if we could instead spread this work during the year and make
more rebases that are smaller and, therefore, potentially easier to review.
I've started from Firefox 115 and arrived at Firefox 120. So far, it
seems to me that the differences are indeed easier to recognize and explain.
Other tasks I did include the usual monthly rebase and fixing more
fingerprinting issues. I also turned off the OS spoofing in HTTP
User-Agent in Mullvad Browser [2] and helped a volunteer who's trying to
reproduce our builds in F-Droid [3].
Finally, I opened an issue about what we'll need from Arti for Tor
Browser [4].
Best,
Pier
[0]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42398
[1]
https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/4…
[2]
https://gitlab.torproject.org/tpo/applications/mullvad-browser/-/issues/234
[3]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/27539
[4] https://gitlab.torproject.org/tpo/core/arti/-/issues/1303