Hello Tor!
As you know, our EOY campaign, Take back the internet with Tor, launched this past Monday. We are seeing great engagement and have raised over $20,000 so far. In addition to almost 500 single gifts, we have had 24 people sign up as new recurring donors.
This is all without the campaign content on about:tor <about:tor> which launches next Monday. Last year we launched all the content on the same day and we received 100 fewer gifts in the first four days than we received this Monday through Thursday.
Help us keep up this momentum by sharing the campaign content with your networks.
Many thanks to the 'money machine’, Steph, Jon, Antonela, Alon, and the Tor Browser and Metrics teams for working on different aspects of the campaign.
Now I have a specific request. The week of US Thanksgiving, we are going to post a series of ‘thank you’ videos on social media. We would love to have a variety of languages represented in these videos. Isa put together two rough examples so you can have a sense of what we are looking for.
https://drive.google.com/file/d/1YshJnLIhxgTS-62XAFhjYKV_M7W3jbJe/view?usp=… <https://drive.google.com/file/d/1YshJnLIhxgTS-62XAFhjYKV_M7W3jbJe/view?usp=…>
https://drive.google.com/file/d/1nq3QXr9uxGyyC7uMCl1Nk1-9j6P1JgQf/view?usp=… <https://drive.google.com/file/d/1nq3QXr9uxGyyC7uMCl1Nk1-9j6P1JgQf/view?usp=…>
If you would like to participate, please let me know.
Have a wonderful weekend!
Sarah
Sarah Stevenson (she/her)
Fundraising Director
The Tor Project
sstevenson(a)torproject.org
Take back the internet with Tor. https://donate.torproject.org/
Public Key: 93B3 AC08 4257 FA3D D4BB 8E95 CC08 5DBA C015 612A
Hi everyone,
Just wanted to share the CFP[1] for the Decentralized Internet & Privacy devroom at FOSDEM 2020.
We look forward to reading your proposals.
Thanks!
Pili
[1] https://lists.fosdem.org/pipermail/fosdem/2019q4/002903.html
—
Project Manager: Tor Browser, UX and Community teams
pili at torproject dot org
gpg 3E7F A89E 2459 B6CC A62F 56B8 C6CB 772E F096 9C45
Hello,
Here is a short summary of the network team meeting from Wednesday:
1) We started out by looking at the 0.4.2 status page on Trac to see how we are
doing there. #31653 and #31002 was moved to 0.4.3.
2) We went over our Kanban board.
3) We went over our review queue.
4) We talked about proposing the use of 'network-team' as highlight on IRC to
other teams. Nick will bring it to the vegas meeting.
5) Alex requested help with getting someone else to take over the PR policy
work since he keeps pushing it down his todo list. We decided to bring this up
again next week and ideally that Nick and Alex might work on this together.
6) We talked about moving all our doc/HACKING documents into being Doxygen
format. People seemed positive about this.
7) Catalyst requested for more feedback on their proposal for C style.
8) We talked about splitting the tor man page into two manpages: one for tor
and one for torrc.
9) Nobody had anything else to discuss.
--- end of summary ---
You can read today's network team meeting log at:
http://meetbot.debian.net/tor-meeting/2019/tor-meeting.2019-11-12-17.59.html
Below are the contents of our meeting pad:
gaba: (updated on october 30th)
Last week (actual):
nc migration
sponsors
grant proposals
This week (planned):
report on sponsor 31
Help with:
teor: (online first week of the month, offline at the usual meeting time)
Week of 4 November (actual):
Take Time for:
- team policies:
- commit bit
- backports
Roadmap:
- Sponsor 31 modularisation:
- Merged Disable major relay and dirauth options, when those modules are disabled #32213
- Merged associated bug fixes #32368 #32370 #32371
- Fixed more bugs #32410
- Add NSS (and lzma and zstd) support to test_parseconf.sh #32397
- Associated bug fixes
- Code reviews and merges
Other:
- Helping with Android issues
- Bug fixes, ticket triage, and quick reviews
- Helped out at a local Aaron Swartz Day CryptoBar - gave away some Tor stickers
Week of 11 November (planned):
Take Time for:
- catching up on emails
- Fix #30901
- we missed some config bugs last week, because stem always fails in CI
Roadmap:
- Sponsor 31 modularisation:
- Fix bugs
- Do more modularisation (#31851 / #29211)
Other:
- Helping with Android issues
- Bug fixes, ticket triage, and quick reviews
- Helped out at a local Aaron Swartz Day CryptoBar - gave away some Tor stickers
Week of 11 November (actual):
Urgent:
- Fix Appveyor CI failure #32449
Take Time for:
-
Roadmap:
- Sponsor 31 modularisation:
- Fix the obsolete option message in 0.4.2 #32295
- Add extra config tests #32451
- Disable "Phase 0" code in the relay module #32163 #32244 #32245
- Start on "Phase 1"
- Code and design reviews
Other:
- Code reviews & ticket triage
Nick:
Week of 4 November (planned):
- S31 meeting
- Doxygen work, tor-guts work. (#29214)
- Write a lot of documentation for #29215
- More #30866 work; try to get it merged
- Start revisions on paper with Ian & Chelsea?
- Plan for upcoming stable releases.
Week of 4 November (actual):
- Doxygen work, and lots of it.
- Documentation on subsystems and initialization (32211)
- Finish 30866: most subsystems can now be configured with new API.
- Suggestions for research on revision of walking onions paper.
Week of 11 November (planned):
- Short week because of holiday.
- Catch up with reviews.
- Catch up with documentation: 32209 (config), 32207 (pubsub), 29214 (continued subsuming of tor-guts).
- Finish 32427 (refactor options_act_reversible).
- Regression analysis on 041-regression,042-regression tickets.
- 0.4.2.4-rc release.
- Time permitting (haha): 32139 (configuration isolation for directory authority options)
- Time permitting (haha): 32408 (refactor new options_act_reversible into new system.)
Mike:
Week of 11/06 (planned):
- Finish cleaning up circpad simulator
- Read asn's research feedback
- Get DNS recommendations for exit operators for fingerprinting blog post
- Update + triage circpad bugs
Week of 11/06 (actual):
- Refactored circpad simulator; fixed some simulator bugs+issues; a few more remain
- See: https://github.com/pylls/circpad-sim (and https://github.com/mikeperry-tor/tor/tree/circpad-sim-v2)
Week of 11/11 (planned):
- Finish cleaning up circpad simulator
- Read asn's research feedback
- Get DNS recommendations for exit operators for fingerprinting blog post
- Update + triage circpad bugs
Need help with/at risk of dropping this month:
- Deep-thought-required research project followup
- (Google masque, BGP, ECN, Rob's bw experiments, Dennis's Mozilla video, etc etc...)
catalyst:
week of 11/04 (2019-W45) (planned):
- reviews
- more sponsor31 architecture doc stuff (#29215)
- maybe finish up #30984
- GSoD stuff as needed
week of 11/04 (2019-W45) (actual):
- reviews
- checked in on GSoD stuff -- proposed some ways forward
- wrote some sponsor31 architecture doc stuff
- got early review of #30984 (thanks, teor!)
week of 11/11 (2019-W46) (planned):
- Monday is a public holiday
- reviews
- sponsor31 architecture doc stuff
- work on splitting out torrc(5) manpage for swati to work on
- other GSoD stuff as needed
- monitor C style thread and respond as needed
help with:
- would like to hear feedback about whether to split torrc options out of the tor(1) manpage (non-torrc command line options would remain in tor(1)). i think teor might have opionions on this?
asn:
Week of 04/11 (planned):
Week of 04/11 (actual):
- Attended OTF meeting. Started a few email threads as the result of that.
- Encoding v3 descriptors in stem is currently at the hands of atagar. I'm
waiting for him to drop a branch soon.
- Started initial work on actual OBv3 using the OBv2 codebase after
discussion with Donncha.
- Catching up with some S27 stuff.
Week of 12/11 (planned):
- Look into S27 typo deliverable (#30022)
- Review atagar's descriptor encoding branch and make it work with OBv3.
- If possible, write test vectors for descriptor encoding/decoding when stem support stabilizes. - Move forward with core OBv3 work.
- Reviews as usual.
ahf:
Week of 4 November (planned):
- Travel with Gus to Freedom Not Fear in Brussels.
- Hack on #28930 and #32320.
- Continue to see if we can get the asciidoc situation solved for Swati.
Week of 4 November (actually):
- Went to Freedom not Fear with Gus in Brussels: we did a Tor meetup with ~20-30 people, a session on onion services, and a session on anti-censorship technology.
- Continued to try to figure out what is going on for #32320.
- Shadow Simulation Developer work.
Week of 11 November (planned):
- Shadow Simulation Developer things
- Get back to #28930.
- Figure out with Swati how things are going there.
- Retrospective.
dgoulet:
Week of 04/11 (actual):
- Worked on #29698 unit tests. Turned out to be not enough. Worked for
couple hours on recreating the bug through unit tests. I failed but at
least found: #32388
- s27: Ticket work several tickets: #32376, #32356, #31371.
- s27: Discussed work on #32030 with asn on the PR.
- Reviews and merges. I still have a review backlog unfortunately.
- Network Health team world needed my attention (bad relays).
Week of 12/11 (planned):
- Continue in the s27 world of -must ticket.
- Hopefully make progress on the intro point retry period (tor-dev@
thread): #31561
- Can't promess any progress on #29698 (cmux/ewma). Unit tests is hella
complicated to pull off.
- Hope to get to a fix for #32388.
All the best,
Alex.
--
Alexander Færøy
Hi everyone,
Here's what the anti-censorship team has been up to in October:
Snowflake
=========
* Continued work on a sequencing and reliability layer for snowflake:
<https://bugs.torproject.org/29206>
* Localised the snowflake.torproject.org website and implemented a
language switcher:
<https://bugs.torproject.org/31384>
* Added an automatic packaging script for the snowflake web extension:
<https://bugs.torproject.org/31253>
* Fixed a bug in the web extension hat was keeping open UDP sockets:
<https://bugs.torproject.org/31285>
* Continued to investigate and monitor snowflake network health.
* Snowflake web extension localisation updates.
* Refactored the web extension code to allow for multiplexing of
multiple clients through a single browser proxy:
<https://bugs.torproject.org/31310>
* Reduced unnecessary error messages in snowflake logs.
BridgeDB
========
* Finished updating BridgeDB's requirements and created a process for
keeping requirements up-to-date in the future:
<https://bugs.torproject.org/29484>
<https://gitweb.torproject.org/bridgedb.git/tree/doc/HACKING.md#n36>
* Finished BridgeDB's language switcher:
<https://bugs.torproject.org/26543>
You can find it in the top right corner over at
<https://bridges.torproject.org>
* Accidentally fixed another UI issue while implementing the language
switcher: <https://bugs.torproject.org/19839>
* Debugged and fixed BridgeDB's email autoresponder. It broke after the
underlying operating system was updated to the latest Debian stable:
<https://bugs.torproject.org/32105>
* Finished specification of BridgeDB's metrics format:
<https://bugs.torproject.org/31780>
* Started ripping out PGP support in BridgeDB's email autoresponder:
<https://bugs.torproject.org/17548>
BridgeDB's PGP keys have expired many years ago and the feature does
not seem popular enough to warrant the (likely non-trivial) effort of
resurrecting it.
* Implemented a parser for BridgeDB metrics and used it to create a
bunch of visualisations:
<https://bugs.torproject.org/32135>
* Fixed a bug that resulted in BridgeDB not logging vanilla bridges in
its metrics:
<https://bugs.torproject.org/32203>
* Took a look at BridgeDB's broken email localisation:
<https://bugs.torproject.org/15404>
This is another broken feature that may not be worth the effort it
takes to fix it.
* Requested and installed new translations. Thanks to all volunteers
who helped translate BridgeDB!
GetTor
======
* Moved to a new VM.
* More work towards bringing the Twitter responder back to life.
Miscellaneous
=============
* Implemented a prototype of bridgestrap, a service that takes as input
a bridge line and tells you if it can bootstrap a tor connection over
the given bridge:
<https://bugs.torproject.org/31874>
* Filed a ticket to discuss the future of website mirrors:
<https://bugs.torproject.org/31990>
* Wrapped up our "set up new obfs4 bridges" campaign:
<https://bugs.torproject.org/30777>
Our volunteers helped set up approximately 100 new bridges!
* Started distributing some of our new high-capacity private obfs4
bridges. Also created a YAML file to coordinate who got what bridges.
Obfs4
=====
* Made good progress on improving our obfs4 bridge Docker image:
<https://bugs.torproject.org/31834>
* Finished a prototype of sharknado, a backwards-compatible obfs4
improvement: <https://bugs.torproject.org/30716#comment:16>
* Created a wiki page that documents the process for supplying an NGO
with private obfs4 bridges:
<https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam/…>
* Conducted a probe test of a subset of our newly created obfs4 bridges
from the bridge campaign in September. Found that all of the new
bridges we tested seem to be blocked already in China:
<https://trac.torproject.org/projects/tor/attachment/ticket/31701/obfs4-reac…>
Tor Browser
===========
* Upgraded goptlib to v1.1.0, fixing an error condition that would arise
when using a pluggable transport with a non-working proxy:
<https://bugs.torproject.org/32076>
<https://bugs.torproject.org/32056>
Hello,
In October 2019, the OONI team completed its 1-year contract with the
OTF (which started on 1st November 2018).
We thank the OTF for its generous support, which has helped the
OONI-verse grow and allowed us to build new and exciting tools for the
internet freedom community!
## Stable release of OONI Probe Desktop App for Windows and macOS
We released the stable version of the OONI Probe desktop app for Windows
and macOS: https://github.com/ooni/probe-desktop/releases/tag/v3.0.0-rc.3
From version 3.0.0-rc.2 onwards, auto-update support is enabled and
working on macOS and Windows. Users of the older beta versions may have
to do a hard reset of OONI Probe from the About screen page.
The new OONI Probe desktop app supports running the Websites, Instant
Messaging, Performance, and Middlebox tests, as well as configuring the
maximum number of tested URLs for the Websites test (which defaults to
the full test list).
We aim to publicly launch the new OONI Probe desktop app over the next
weeks, once we have received more feedback from community members and
have done more extensive testing of the app on more platforms.
## Stable release of OONI Probe Command Line Interface (CLI)
We released the stable version of the OONI Probe Command Line Interface
(CLI): https://github.com/ooni/probe-cli/releases/tag/v3.0.0-rc.3
Prior to this, we also made other releases during October 2019:
https://github.com/ooni/probe-cli/releases/
## Stable release of OONI Probe engine
To enable the integration of tests and to otherwise improve OONI Probe
sustainability, we have been re-writing the OONI Probe measurement
engine (the software that implements OONI Probe nettests) from C++ to
golang.
The new OONI Probe measurement engine is available via the following
repository: https://github.com/ooni/probe-engine
During October 2019, we made several releases:
https://github.com/ooni/probe-engine/releases
The latest release of the OONI Probe engine is stable:
https://github.com/ooni/probe-engine/releases/tag/v0.2.0
## Release of OONI Probe Mobile 2.2.0
We released the 2.2.0 version of the OONI Probe mobile app.
Android: https://github.com/ooni/probe-android/releases/tag/v2.2.0
iOS: https://github.com/ooni/probe-ios/releases/tag/v2.2.0
The latest 2.2.0 version:
* Uses less storage by automatically deleting old measurements and
fetching them from OONI Explorer
* Enables users to copy and share OONI Explorer links based on their
testing results
## Seamless integration between mobile and desktop apps
To have a more seemless integration between the OONI Probe mobile and
desktop apps, we integrated react-native
(https://facebook.github.io/react-native/) into the probe-android and
probe-ios apps.
This allows us to maximize code sharing between the OONI Probe desktop
and the mobile apps, as well as making it possible for us to use our
in-house React expertise for OONI Probe Mobile development as well --
hence reducing the ongoing maintenance effort.
We used the About screen as an example to understand the possible
limitations to this approach and implemented it as a react-native
screen:
https://github.com/ooni/probe-react-native/blob/master/views/About.js
Some research was done into converting all of the ooni-components part
of our design system (https://github.com/ooni/design-system) to
react-native and we have understood that we will have to make some
changes to how we use the styled-components module. Specifically, we
have understood that we will have to refactor our code to use the
react-native specific styled-components wrapped when importing modules
into the react-native views.
We also spent some time researching the performance impact and
application size overhead associated with using react-native. See:
https://github.com/ooni/probe/issues/868#issuecomment-547720048
Based on all of this research, we have decided to postpone shipping the
react-native integration until we have more views implemented and we
have assessed the impact that the increased app size will have on our
user-base.
We do still think this is something we should be doing, as it opens up
opportunities for us to start sharing code between desktop and mobile
apps for specific components, such as charts and tables. This will also
help ensure that the UX and design is more similar and familiar across
platforms.
Relevant code:
https://github.com/ooni/probe-react-nativehttps://github.com/ooni/probe-ios/pull/313https://github.com/ooni/probe-android/pull/266https://github.com/ooni/probe/issues/868
## Made OONI Probe testing more resilient to network outages
To make OONI Probe testing more resilient to network outages, we:
* used jafar to stress test netx and implemented retransmission of DNS
to improve DNS robustness
* made the “nervous resolver” fallback to DoH using Cloudflare, which is
also a way to increase robustness
The automatic fallback to DNS over HTTPS / DNS over TLS has been
designed in such a way that it will be triggered (without touching the
scoreboard) also in the event that the master DNS fails. This will be useful
to improve reliability when the master DNS used by the device is either
down or overloaded. We experienced this kind of transient outage both in
Cuba and in Italy, during a six-hour incident where Vodafone Italy DNS
infrastructure was down.
We also ensured that the new Go code has timeout settings in line with
the Go standard library and browsers like Firefox, thus further
increasing OONI Probe reliability.
A detailed explanation of what this work entailed (including relevant
code repositories) is available here:
https://github.com/ooni/probe-engine/issues/88#issuecomment-548895700
## Implemented new OONI Probe nettests
To improve and expand upon OONI Probe measurement methodologies, we
implemented the following new nettests:
* Update to the latest ndt7: https://github.com/ooni/probe-engine/issues/70
* DASH rewrite that uses HTTPS:
https://github.com/ooni/probe-engine/issues/51
* Telegram re-write using github.com/ooni/netx:
https://github.com/ooni/probe-engine/issues/54
We have also integrated automatic follow-up measurements for:
* DNS over TLS / DNS over HTTPS fallbacks:
https://github.com/ooni/netx/pull/108
* SNI blocking detection: https://github.com/ooni/netx/pull/109
The DNS over TLS / DNS over HTTPS fallback is performed anytime we
resolve a domain name and we get a bogon IP (i.e. an IP that should not
be public, such as, for
example 10.0.0.1 or 127.0.0.1). In such cases, we record into a
scoreboard structure that we were served a bogon IP and fallback to DNS
over TLS or DNS over HTTPS.
SNI blocking detection is performed after a URL measurement; whenever we
see a TLS handshake failure that leads us to think that there may be SNI
injection, we run an additional follow-up test with a test helper
(example.com:443 in the current experimental code) with the SNI we
suspect being blocked and we also record the result into the scoreboard.
This design for follow-up experiments is also based on conversations
with Vinicius Fortuna (Jigsaw) regarding how to improve the OONI testing
methodology.
This work intersects with the "Improve basic on device data analysis"
work. We chose a design where these new nettests are follow-ups, because
this enables us to collect richer measurements without the need to
prompt users to manually run follow-ups.
The above work was tracked through this master ticket:
https://github.com/ooni/probe-engine/issues/86
We implemented these new nettests in probe-engine and we plan to ship
them as part of the OONI Probe apps over the next months.
## Ingested new metadata produced by new set of tests
Previously, the OONI data processing pipeline only ingested metadata
from OONI's Web Connectivity test.
We have now added support for ingesting and analyzing the metadata
produced by most OONI Probe tests:
* Facebook Messenger test
* Telegram test
* WhatsApp test
* HTTP header field manipulation test (for middlebox detection)
* Vanilla Tor connectivity test
* TCP connect test
* DASH test
* Meek test
We have also implemented basic handling (without scoring) of the
following OONI Probe tests:
* Psiphon test
* NDT test
This work was implemented as part of the fast-path pipeline in the
following pull request: https://github.com/ooni/pipeline/pull/242
## Improved basic on-device data analysis
To improve basic on-device data analysis (as mentioned above in
"Implementing new OONI probe nettests") we added support for the following:
* OONI Probe can detect bogus DNS replies and fallback to DNS over HTTPS
/ DNS over TLS
* OONI Probe flags the event where the TLS handshake failed with
connection reset and runs follow-up tests to determine whether it's a
case of SNI-based filtering
This work was tracked through the following ticket:
https://github.com/ooni/probe-engine/issues/87
We also built Jafar (https://github.com/ooni/jafar ) -- a tool that
simulates a censored environment -- to ensure that our methods work as
expected.
## Reduced the latency of publication of uploaded measurements to less
than daily
To analyze and publish OONI measurements from around the world faster,
we built a fast-path pipeline: https://github.com/ooni/pipeline/pull/213
To reduce the latency of publication of uploaded measurements to less
than daily, we implemented fast-path support in the OONI API. This work
is available through the following pull request:
https://github.com/ooni/api/pull/115
The database tables for the fast-path (which publish measurements daily)
are already getting populated and published.
The OONI API related changes (which will expose the most recent
measurements in OONI Explorer) are going to be shipped in production
sometime next week, as we are trying to avoid deploying too many
services at once.
## Added data processing pipeline heuristics for flagging relevant
blocking events for the RSS feed
To flag relevant blocking events and expose them via the RSS feed, we
added data processing pipeline heuristics to the fast-path pipeline and
ingested the metadata of most OONI Probe tests.
Our work on adding an event detector and RSS feed generation to the
fast-path pipeline is available via the following pull request:
https://github.com/ooni/pipeline/pull/228
Based on this, we have an internal web app that generates charts based
on blocking events. The event detector is currently running.
## Exposed blocking events in RSS feed hosted on OONI Explorer
Based on the event detector that we added to the fast-path pipeline
(https://github.com/ooni/pipeline/pull/228), we created an RSS feed for
exposing blocking events on OONI Explorer.
OONI Explorer now provides links to RSS feeds on events detected by the
fast-path pipeline event detector. The following feeds are to be made
available on OONI Explorer:
* Global feed (added to all pages)
* Country-specific feed (added to relevant country pages)
So far, we have deployed the global RSS feed which shows events on a
global scale and is available here: https://explorer.ooni.org/rss/global.xml
Soon thereafter, we are going to be adding the country-specific feed on
the OONI Explorer country pages.
This work was implemented through the following pull request:
https://github.com/ooni/explorer/pull/342
For the time being, we are not going to be promoting the RSS feed
feature of OONI Explorer extensively as we need to use it more ourselves
and get feedback from trusted community members to avoid
mis-interpretation of the data.
## Ensured all our infrastructure is re-deployable
We worked on ensuring that all our infrastructure is re-deployable,
making it possible for us to recover from a disaster (a machine being
terminated) with minimal amount of downtime and be able to migrate to
up-to-date versions of Operating Systems to keep our infrastructure secure.
All of our work on ensuring that our infrastructure is re-deployable was
completed in October 2019 and tracked via this ticket:
https://github.com/ooni/sysadmin/issues/356
As part of this work, we also coordinated with Greenhost to ensure the
redeployed hosts are using the eclips.is platform in the most
resource-conscious way possible. For example, several unnecessary hosts
have been terminated and some that did not require to be located in Hong
Kong or Amsterdam have been migrated to the Miami location which has
more availability of resources.
## Improved the availability of our infrastructure
We improved the availability of our infrastructure via the "oonification
of probe services".
The oonified bouncer, collector and orchestra backend are deployed and
serving clients. The pipeline is using the new collector and we
rolled-over all the collectors to the new probe-services oonified host.
Our work on oonifying the probe services is available via this pull
request: https://github.com/ooni/sysadmin/pull/361
All of our work on improving the availability of our infrastructure was
tracked through the following ticket:
https://github.com/ooni/sysadmin/issues/359
## Published report on the blocking of abortion rights websites
In collaboration with Coding Rights (Brazilian partner) and Women on
Waves / Women on Web, we published a report that examines the blocking
of abortion rights websites womenonwaves.org and womenonweb.org around
the world.
The report is available on the following sites:
* OONI:
https://ooni.org/post/2019-blocking-abortion-rights-websites-women-on-waves…
* Coding Rights:
https://medium.com/codingrights/on-the-blocking-of-pro-choice-websites-wome…
VPNCompare wrote an article about our report:
https://www.vpncompare.co.uk/block-abortion-websites/
In this report, we share OONI data confirming the blocking of
womenonwaves.org in Brazil, as well as in Iran and Turkey.
We also share OONI data on the blocking of womeononweb.org in South
Korea, Turkey, and Saudi Arabia.
We corroborated OONI findings by looking at Censored Planet data
(https://censoredplanet.org/) as well, shared in the report.
## Created community resources
To strengthen existing partnerships and better support OONI community
engagement efforts, we created several new resources, listed below.
### Created OONI Frequently Asked Questions (FAQ) section
To better support the OONI community, we created a Frequently Asked
Questions (FAQ) section: https://github.com/TheTorProject/ooni-web/pull/301
The OONI FAQ can also be viewed here:
https://deploy-preview-301--ooni.netlify.com/about/faq/
The new OONI FAQ includes answers to 67 questions that fall under the
following themes:
* About OONI
* OONI Probe
* Testing websites
* OONI data
* OONI Explorer
We included the questions that we have most frequently been asked over
the last years, as well as questions that have been raised by community
members during meetings, hackathons, workshops, usability studies, and
during other community interactions.
The new FAQ (along with all other content on the OONI website) is
published on github, and we welcome feedback and community
contributions. We aim to publish the FAQ on the OONI website and promote
it over the next few weeks.
As OONI tools and methodologies evolve, we will continue to update the
FAQ on an ongoing basis.
### Created OONI Glossary
To empower broader community participation in censorship measurement
research, we created a glossary which explains the terms used in the
OONI apps, methodologies, and research reports.
The new OONI Glossary is available on github (and we encourage review,
feedback, and community contributions):
https://github.com/TheTorProject/ooni-web/pull/298
The glossary can also be viewed here:
https://deploy-preview-298--ooni.netlify.com/about/glossary/
We aim to publish the glossary on the OONI website over the next few
weeks and we will promote it through our partner networks.
### Published OONI workshop slides
To enable our partners and the broader community to teach OONI Probe and
engage their local communities with censorship measurement research and
advocacy, we created and published OONI workshop slides:
https://docs.google.com/presentation/d/1UAxGeF1NhCXc8pT7cfWTp0NPdkWB5LInBkG…
These workshop slides cover the basics with regards to:
* OONI Probe test methodologies
* Running OONI Probe
* Potential risks associated with running OONI Probe
* How to reduce potential risk associated with running OONI Probe
* Contributing to test lists
* Customized website testing
* OONI Run: Coordinating custom OONI Probe testing
* Using OONI Explorer
* OONI API
* Interpreting OONI data
* Using OONI data
* How to get involved with the OONI community
We have published these OONI workshop slides on Google Slides so that
community members can:
* download the slides in the format of their choice
* edit and customize the slides (so that they're more relevant to their
local context and to the needs of the communities they teach)
Our edits to the OONI website to accommodate the publication of the OONI
workshop slides are available here:
https://github.com/TheTorProject/ooni-web/pull/302
The OONI workshop slides can be found through the Get Involved section
of the OONI website: https://ooni.org/get-involved/
### Published document for OONI Probe community engagement
Our partners have expressed the need for a document that they can share
to introduce new people to the use of OONI Probe.
To this end, we created a PDF document that summarizes key information
for getting started with running OONI Probe and engaging your community
with censorship measurement research:
https://ooni.org/documents/Getting%20started%20with%20OONI%20Probe.pdf
Specifically, this document covers:
* About OONI Probe
* Running OONI Probe
* Testing websites
* Testing specific websites of your choice
* Testing a custom list of websites
The above information is shared through instructions, synthesized
information, and links for further reading.
Our edits to the OONI website to accommodate the publication of this
document are available here:
https://github.com/TheTorProject/ooni-web/pull/302/commits/6f61b9e9b672443e…
This document can be found through the Get Involved section of the OONI
website: https://ooni.org/get-involved/
### Updated OONI Run button page
Often when censorship events emerge (leading up to or during political
events, such as protests or elections), social media, news media, and
VPN sites are commonly blocked.
To enable the testing of specific types of websites and to support rapid
response to emergent censorship events, we set up a page which includes
OONI testing buttons: https://ooni.org/get-involved/run/
These buttons enable the OONI Probe testing of:
* Social media websites
* News media websites
* VPN sites
* Wikipedia sites
* Human rights sites
* Environmental sites
* LGBTQI sites
Rather than having to identify which social media websites (for example)
to test during an urgent censorship event, the OONI community can refer
to the buttons on this page for targeted testing. Apart from supporting
efforts related to rapid response, these OONI Run buttons can also
support research and advocacy efforts related to the customized testing
of the above categories of sites over time.
## Community use of OONI data
### Investigating the blocking of sci-hub and libgen in France
Community members hosted an OONI workshop in France to engage locals
with the use of OONI Probe in order to test the blocking of sci-hub and
libgen across different networks.
They shared their OONI Probe methodologies and findings through a series
of tweets: https://twitter.com/tenacioustek/status/1183715300283502592
They also shared the script they wrote to query results directly from
the OONI API:
https://github.com/Te-k/analyst-scripts/blob/master/ooni/get_ooni_website_s…
## Community activities
### HacktoberFest 2019
OONI participated in HacktoberFest
(https://hacktoberfest.digitalocean.com/):
https://twitter.com/OpenObservatory/status/1179033711557263361
The OONI github issues that were part of HacktoberFest are available
here: https://github.com/search?q=org%3Aooni+label%3Ahacktoberfest
We received valuable contributions from HacktoberFest participants!
Across projects, we received 6 pull requests. Notably, the newly
launched OONI Explorer received 4 pull requests, one of which was a
major refactoring exercise: https://github.com/ooni/explorer/pull/336
### OONI workshop in Taiwan
Our Taiwanese partners, the Open Culture Foundation (OCF), hosted an
OONI workshop in Taipei on 17th October 2019.
Information about their workshop is available here:
https://ocftw.kktix.cc/events/iffcc201910
### Manual for OONI Probe rapid response in Chile
Our Chilean partners, Derechos Digitales, created and published a manual
(in Spanish) which explains how to use OONI Probe:
https://www.derechosdigitales.org/13931/manual-rapido-de-ooni-probe-para-mo…
The use of OONI Probe was heavily promoted by Derechos Digitales during
the protests in Chile:
https://twitter.com/derechosdigital/status/1187101399001260032
### Blog post about OONI Probe
The Civilsphere Project (dedicated to supporting NGOs, journalists, and
human rights defenders) published a blog post (also in Spanish) where
they explain OONI and how to use OONI Probe (likely in response to the
protests in Chile):
https://www.civilsphereproject.org/blog/2019/10/22/que-es-ooni-y-como-usarlo
In their blog post, Civilsphere discuss why it's important to measure
internet censorship, what OONI Probe can measure, how to run OONI Probe
(and associated potential risks), how to configure OONI Probe settings,
and how to find OONI data.
## Press coverage
CNET published an article about OONI (titled: "These watchdogs track
secret online censorship across the globe"):
https://www.cnet.com/features/the-watchdogs-tracking-secret-online-censorsh…
OONI Probe was also listed as a tool to fight authoritarianism in the
following article:
https://toolsandnotions.comprehensophy.org/technologies-that-counter-author…
## Userbase
In October 2019, OONI Probe was run 485,623 times from 5,561 different
vantage points in 214 countries around the world.
This information can also be found through our stats:
https://api.ooni.io/stats
~ The OONI team.
--
Maria Xynou
Research & Partnerships Director
Open Observatory of Network Interference (OONI)
https://ooni.torproject.org/
PGP Key Fingerprint: 2DC8 AFB6 CA11 B552 1081 FBDE 2131 B3BE 70CA 417E
Vegas Team Meeting Notes
NOVEMBER 14 2019
NEW BUSINESS
- The network team uses "network-team" as a way to highlight us all on IRC. Do other teams have official things like that? Do they want one? [nickm]
* Resolution: every team should pick up a string like this and set it up to highlight for themselves. Any team that doesn't want to, doesn't have to. Let people know what string you've picked; The Tor Browser team has "tbb-team”.
- Announcement in case any of you want to apply or you want to bring it to the teams. From MOSS program managers: "Finally, a friend and colleague of MOSS, Kara de la Marck, is launching a peer mentorship program for open source maintainers in early 2020. It will be a six-week program that covers topics like sustainability, governance and diversity and inclusion. To learn more about the program or to sign up to become a participant or mentor, please visit https://posse.community." [gaba]
- Getting started on the new email service project, review the "Goals" section here: https://help.torproject.org/tsa/howto/submission/ [anarcat]
* Discussion: friendly reminder that vegas team ppl agreed to help with documentation and support for email service; need someone to help design a handbook to answer the "so how do i configure my email client to use that thing anyways?”; anarcat will put help needed on a pad when he’s ready; people who are losing their tor project email should file trac tickets.
- How are we coordinating the invitation process to our dev meeting for, say, tor core members and external stakeholders (if we wanted to save money we should get to it as fast as possible) [GeKo]
* Answer: we will start this process when Isa gets back; we will also discuss if/how many open days we’ll have.
GENERAL NOTES
+ Philipp
• Philipp and Roger attended OTF summit in Taiwan
• Cecylia and Roger attended RACE PI meeting in San Jose
• Reached out to more people for private obfs4 bridge distribution
• GetTor, BridgeDB, and Snowflake maintenance
+ Gaba
• Starting S31 report
• Nextcloud migration
• Roadmaps
• Trac up to date
• Grants proposals
• Will give a talk at SeaGL tomorrow.
+ Nick
• The network team uses "network-team" as a way to highlight us all on IRC. Do other teams have official things like that? Do they want one?
• New RC coming out in next few days; stable backport releases aimed for early December when we are less hosed.
• Wrapping up sponsor 31. Lots to do there.
+ Sarah
• Campaign continues to do well. We've raised $20K more than we raised last year at this point, even though we started the campaign 5 days earlier in 2018.
+ Steph
• EOY Campaign, running promotions, wrote a blog post on surveillance
• Rating outreachy applicants and making a decision. We had 16 applicants for the communications spot.
• Talking to Alison about LFI comms plans
• Will be applying for the OTF Learning Lab -- will talk over at grants meeting next week
+ Anarcat
• getting started on the new email service project, review the "Goals" section here: https://help.torproject.org/tsa/howto/submission/ [anarcat]
• new caching service tweaks, now 88% hit ratio, will hopefully go down to 300$/mth costs in november! shiny graphs at https://grafana.torproject.org/d/p21-cvJWk/cache-health
• dealt with an unusual amount of email
• cymru might get unstuck, stay tuned
• updated my harvest timesheets, i had forgotten for two months (!)
• held a sysadmin meeting last month which has my last month/next month tasks https://help.torproject.org/tsa/meeting/2019-11-04/
+ Alex:
• Went to Freedom not Fear together with Gus. Met a lot of European internet activists and learned a bit there.
• Catching up on my backlog with all the CVs for the Shadow Developer hire.
• Network team retrospective went well. The team seems to be doing well.
• Starting to think a bit about our roadmapping in December.
+ Gus
• Went to Freedom not Fear with Alex. We joined three Tor activities (Tor Meetup, Onion Services and Censorship circumvention). I suggest to our european friends to add this event to their annual agenda.
• Organizing Tor activities with our italian friends:
• https://blog.torproject.org/events/tor-workshop-strike-spa-roma
• https://blog.torproject.org/events/non-e-la-silicon-valley-ma-si-mangia-meg…
• Reviewing Outreachies final application.
• Finish to update Tor training slides with the latest TB release and sending to our training partners in Global South.
• Doing other communities things
• Syncing with Pili about Sponsor9 phase 2 report.
+ Pili
• S9 Phase 2 report
• S44 report
• Doing a bit of trac triaging for browser team
• S27 meeting
• Tor Browser release meeting
+ Erin
• Shadow dev screening
• Misc. HR/org ops stuff
• Gaba coming to Seattle! We plan to livestream her State of the Onion talk at SeaGL on Instagram. Kinda late for most people - 16:15 PDT (00:15 UTC), but hopefully we can save/share the vid.
+ Karsten
• Put out several releases as part of extending CollecTor's index.json to contain descriptor types and publication times as well as SHA-256 file digests.
• Rewrote exit scanner part that does the scanning without writing properly formatted exit lists in Python.
Here is our meeting log:
http://meetbot.debian.net/tor-meeting/2019/tor-meeting.2019-11-14-18.00.html
And here is our meeting pad:
Anti-censorship work meeting pad
--------------------------------
Next meeting: Thursday November 14th 18:00 UTC
Weekly meetings, every Thursday at 18:00 UTC, in #tor-meeting at OFTC (channel is logged while meetings are in progress).
== Goal of this meeting ==
Weekly checkin about the status of anti-censorship work at Tor.
Coordinate collaboration between people/teams on anti-censorship at Tor.
== Links to Useful documents ==
* Our anti-censorship roadmap: https://dip.torproject.org/torproject/anti-censorship/roadmap/boards
* Our roadmap consists of a subset of trac tickets.
* The anti-censorship team's wiki page: https://trac.torproject.org/projects/tor/wiki/org/teams/AntiCensorshipTeam
* GetTor's roadmap: https://dip.torproject.org/groups/torproject/anti-censorship/gettor-project…
* Tickets that need reviews: https://trac.torproject.org/projects/tor/query?status=needs_review&componen…
* Projects from sponsors we are working on:
* https://trac.torproject.org/projects/tor/wiki/org/sponsors/Sponsor30
* https://trac.torproject.org/projects/tor/wiki/org/sponsors/Sponsor28
---------------------------
--- 14th November 2019 ---
---------------------------
== Announcements ==
* Remember we are moving to https://nc.torproject.net for nextcloud. If you have anything else in nc.riseup.net or storm.torproject.org please move it
== Discussion ==
* Gettor update
* Survival guide here: https://dip.torproject.org/torproject/anti-censorship/gettor-project/gettor…
* Let's agree on an IRC "team handle" that we configure highlights for. This will allow both team-internal and team-external people to reach our team.
* There already is "network-team" and "tb-team"
* "ac-team" and "anti-censorship-team"
* Kicked out old snowflake proxies with #29207 update
* It will take a while for metrics to come in, but it looks like we still have plenty.
* Cupcake hadn't been updated at all since the original import of Snowflake
* dcf is ready to migrate the Snowflake broker to the IPv6 host (#29258). He can update the snowflake-broker.bamsoftware.com address from which snowflake-broker.freehaven.net will follow. Tor Metrics should automatically start following the new broker after that.
* Just want to be sure people are around to react in case something goes wrong.
* I'd like to copy over the metrics log, but otherwise i'm ready --cohosh
* Sponsor 30: we are skipping the November meeting as Hellais and Phw already met during summit.
Work Plan for November: https://nc.torproject.net/s/7MYXRmTgirqKKyk
* Create an evaluation framework for bridge distribution and selection methods. (anti-censorship team) #31274
* Improve documentation on how to set up a bridge server and different pluggable transport bridge servers. (anti-censorship team) #31280
* Create scripts and configuration code for setting up a bridge on cloud providers to make it easier for operators to launch a new bridge. (anti-censorship team) #31281
* Any update to the roadmap? https://dip.torproject.org/torproject/anti-censorship/roadmap/-/boards
== Actions ==
* Please add your October'19 highlights to our (very late) monthly report: https://pad.riseup.net/p/Z7EjorhnnuNLVnA7Tdda
== Interesting links ==
* Geneva: Evolving Censorship Evasion Strategies: https://censorbib.nymity.ch/pdf/Bock2019a.pdf
* They're using genetic algorithms to derive evasion strategies
== Updates ==
FORMAT!
Name:
This week:
- What you worked on this week.
Next week:
- What you are planning to work on next week (related to anti-censorship work).
Help with:
- Something you may need help with.
Hiro:
Started restoring Twitter Responder.
When retrieving tweets I need to check for new tweets only otherwise Gettor will end up responding to old back log and already answered messages. <-- is this #27330 ?
Next Week:
- Work on gettor specs <-- Is this #3781?
- More with review of strings and website content and translation
phw:
This week (2019-11-14):
* Attended OTF summit.
* Had a chat with Arturo about sponsor 30
* Talked to people about private obfs4 bridge distribution
* Lots of censorship-related information sharing
* Thought about information sharing list for projects that ship obfs4.
* Attended OTF advisory council meeting.
* Filed #32276 to help BridgeDB see client IP addresses of moat requests.
* Merged two new obfs4 bridge setup guides (thanks to egypcio).
* Revised and merged #32203 (no BridgeDB metrics for vanilla bridges); released BridgeDB v0.9.1.
* Updated BridgeDB dependencies because of security issue in pillow.
* More root cause analysis of #15404 (BridgeDB's email responses aren't localised).
* Closed #19839 (untranslated title strings in BridgeDB) because we seem to have fixed it already.
* Reviewed #31310 and #29207.
* Made progress on #31834 (improve Docker container).
* Reviewed status-check script for BridgeDB (will help test our email autoresponder).
Next week:
*
Help with:
*
Gaba: (updated October 30th)
Last week ():
* sponsor 30
This week (planned):
* more sponsors
ahf
Last week:
- Worked on #28930
This week:
- Finished refactoring parts of #28930. Trying to figure out if we should begin the discussion on how PT's can report back on bootstrap info.
- Continued to work on a tool to convert Trac tickets into Gitlab tickets.
cecylia (cohosh): last updated 2019-11-14
Last week:
- reviewed #31028 (websocket library change)
- ran some tests for #31971 (windows slowness) and couldn't reproduce it
- finished proxy-go tests (#30867)
- sponsor 28 PI meeting (travelled to California)
- reviewed gettor survival guide
- took a look at #32393 (gettor github links broken) and filed #32457 (to get access to gettor machine)
- review of gettor PR
- did a review of work so far on #31874
- deployed 29207 and #30867 at the broker, proxy-go instances, and for web extensions
- started looking at github API for gettor releases (#32480)
This week:
- continue on writing snowflake tests (#29259)
- more work on #29206 and #25723
- more grant writing
- have proxies report what kind they are to broker #31157 (related to #29207)
- gettor code reviews
- add more STUN servers to snowflake (#30579)
- come up with a concrete way to measure snowflake network health
catalyst:
week of 09/19 (planned):
- reviews
- sponsor31 planning
- coding style discussion
- comment on draft network team review guidelines
- #30984
week of 09/19 (actual):
- reviews
- sponsor31 planning
- talking with people about proposed network team review processes
week of 09/26 (planned):
- reviews
- sponsor31 doc coordination
- checking in on Season of Docs work
- #30984
arlolra: 2019-11-14
Last week:
- finished off / merged #31028
Next week:
- add a build step / documentation for code reuse in cupcake
- read up on turbo tunnel
Help with:
-
dcf: 2019-11-14
Last week:
- reviewed Gorilla WebSocket patch (#31028)
- reviewed proxy-go tests (#30867)
Next week:
- switch to new IPv6 broker (#29258)
- prototyping KCP and QUIC in meek
- revise ticket about Cupcake patch (#31497)
Help with:
- need meek-azure to redeploy meek-server for #31890
Next meeting: *Thursday*, November 21st , 15 UTC
Hi!
We had our meeting on Tuesday November 12th (it had to be rescheduled
this week).
New pad for the meeting: https://nc.torproject.net/s/4zQKoype2wbB3tx
Meeting Log:
http://meetbot.debian.net/tor-meeting2/2019/tor-meeting2.2019-11-12-15.01.l…
Agenda and Notes:
Nextcloud migration (karsten)
gaba creates a new pad on nc.torproject.net and copies all content from
here there, then tells us how to find it
Onionoo upgrade to 7.0-1.21.1 (karsten)
Exit scanner (irl)
Irl rewrote the exit scanner (just the scanner portion) in python. It
will be ready for review this week.
Roadmap - how are we doing? (gaba)
https://trello.com/b/Mu5fYg53/tor-metrics-roadmap
Releases last week:
#32353: Release metrics-lib 2.9.0
#32441: Release CollecTor 1.13.0
#32442: Release metrics-lib 2.9.1
#32443: Release Onionoo 7.0-1.21.1
#32444: Release ExoneraTor 4.2.0
#32445: Release metrics-web 1.3.0
#32452: Release CollecTor 1.13.1
cheers,
gaba
--
Project Manager: Network, Anti-Censorship and Metrics teams
gaba at torproject.org
she/her are my pronouns
GPG Fingerprint EE3F DF5C AD91 643C 21BE 8370 180D B06C 59CA BD19