Notes for May 11 2017 meeting:
Nick:
1) Wrapping up 0.3.1.x features; on to bugfixes next.
2) Progress wrt personnel
Alison:
1) Lots of grantwriting
2) Trying to make it to Seattle at the end of this month/beginning of next.
3) LFP just initiated a big survey to many of our participating
libraries to see what they've done wrt privacy practices and policies.
4) Community team continues to work on support portal content.
5) The trainers we're working with in Pakistan just wrapped up a big
youth summit in Peshawar. Waiting for the report back on that!
6) Community team members will be helping with the mirror list redesign
(#22178)
Arturo:
1) Releasing tomorrow a new version of ooniprobe mobile with 4
additional languages: Arabic, Farsi, Russian, Greek
2) Wrote/published OONI team status report for April
3) We now have much better monitoring of OONI infrastructure based on
prometheus with alerting to slack, IRC and email when pieces of the
infrastructure go down
4) On Sunday Maria and Arturo are going to be speaking at Open Source
Conference Albania (https://oscal.openlabs.cc/)
Shari:
1) Reviewing applications for Communications Director. Setting up
initial interviews for next week.
2) Preparing for board meeting.
3) Begun researching strategic planning firms.
4) Edited grant proposals.
5) Getting ready for Tommy (writer) to start. Lining up things for him
to do.
6) Preparing for a bunch of people coming to Seattle in a couple of weeks.
Mike:
1) Met with Isa an Isis about bridge distribution
2) Discussed new hires for DRL with Isa; we still need a little budget
clarity
3) Working on padding branches
Isabela:
1) sent reviewed DRL proposal to Laura - sent out deliverables to
stakeholders involved in the proposal
2) working on organize network team hackfest
3) met with mike and isis on building the experience for tor launcher
automation (notes to come)
4) writing sponsor4 april report (little late with this one)
5) hiro should freeze the blog today and we will start the migration to
the new blog - we will have a blog post up and email tor-project about that
6) linda is working on wireframes of the new portals with antonella and
will be at SIF next week
7) my article on coding rights (anti-vigilancia) newsletter was
published, is about how to use orbot and orfox. Lots of ppl at
cryptorave liked it a lot because they heard all day about tor and
appreciate to learn how to use it on mobile. (will tweet it from
torproject is in PT and ES)
8) synced with Brad and others on things we can invoice for sponsorR and
sponsor4
9) still on prep-work to get the job posts out - hopefully pads for job
descriptions will be send out by EOW
Georg:
1) we are about to release another alpha (probably the last one before
Tor Browser 7.0) to test our latest fixes
2) preparations for SIF
3) thought a bit more about our upcoming work regarding the bridge
distribution problem (Sponsor4, obj 2.2)
Karsten:
1) We'll likely complete fourth of six Sponsor X deliverables by the end
of this week.
2) We're going to have iwakeh as backup operator for CollecTor really soon.
3) We're planning to put out metrics-lib 1.7.0 soon and 2.0.0 in June.
Hello everyone!
I am Pushkar, one of GSoC17 accepted students. I am a third year
undergraduate at International Institute of Information Technology,
Hyderabad (India). I have been working on 'Ahmia - Hidden Service Search'
[0][1] for some time now and will be extending my contribution through GSoC
this summer. I am being mentored by Juha Nurmi (numes) and George (asn).
Ahmia is a search engine that indexes, searches, and catalogs content
published on Tor Hidden Services. Furthermore, it is a medium to share
meaningful insights, statistics, and news about the Tor network itself.
There are several improvements and upgrades required in Ahmia.
*>>Tasks *
● Automate Blacklisting
Fetch a list of child abuse media sites and remove these sites from
Elasticsearch. Also add MD5 checksums of child abuse websites to banned
database for others to check.
● Add Hidden Services page
Improve the existing Add page so that adding a website stores the data to
SQL Database under '/onionsadded'. From there crawler can crawl these
websites once a day. Remove the entries after 1 week so that the list is
fresh .
● Data visualization
Graphs need to plotted for various statistics in the Statistics page. Some
examples include:
○ Linking structure between sites and keyword based labeling for onions in
the graph
-
○ Popularity of domains according to backlinks and search clicks. I
plan to use either Google Charts or D3.js to plot these graphs.
● Replace Polipo with Tor Socks5 proxy in ahmia-crawler
As of now Ahmia crawler uses Polipo as an HTTP proxy to direct tor traffic.
But since Polipo is now no longer maintained and torsocks can provide
better functionality, the crawler code needs to be updated to use torsocks.
Modules like socksipy can be used to connect crawler to torsocks.
● Upgrade support from Elastic 2.4.0 to 5.X
Ahmia settings should be adjusted accordingly to support Elastic 5.X. It
will require a full cluster restart since rolling upgrades are not
supported in major version upgrade. Upgrading includes replacing Groovy
scripts with Painless. Painless is sandboxed and a Elasticsearch targeted
scripting language which replaced Groovy in Elastic 5.0.0.
● Detailed Documentation and update software dependencies
A detailed documentation at ahmia.fi[0] as well as on the Github page[1].
● Advance search options
-
Advance Search options as mentioned below can be incorporated in search
bar to allow better customisable searches.
○ Double quotes(""): Returns pages that contain exactly "term"(case
sensitive).
○ AND operator(&&): Logical AND gate i.e. it returns all the pages that
contain all queries separated by ‘&&’.
○ OR operator(||): Logical OR gate i.e it returns all the pages that
contain queries separated by ‘||’.
This is one of the optional tasks I have included. If any of the
features mentioned above is not completed in the given timeline, this
feature will be dropped and priority will be given to the uncompleted task.
>>Timeline
Week 1 - Automating blacklisting of onions with child abuse content
Week 2 - Tweaking 'Add' page to save the added onion under '/onionsadded'
Week 3 - Replace Polipo with Torsocks5 in ahmia-crawler
Week 4 - 1st Evaluation
Week 5+6 - Data visualization of statistics
Week 7 - Upgrade support from Elastic2.4.0 to Elastic5.X
Week 8 - 2nd Evaluation
Week 9 - Updating dependancies and documentation
Week 10 - Adding advanced search options like "",|| and &&
Week 11 - Catch up and bug fixes
I will be mailing biweekly status report to this list. Feel free to contact
me if you have any suggestions or doubts.
IRC: mdhash
I would like to thank Juha and the Tor team for their constant support and
guidance. It has been a great experience for me to contribute to TorProject
and I look forward to be a core member of the community.
Thanks,
Pushkar Pathak
[0]: https://ahmia.fi
[1]: https://github.com/ahmia
* Didn't change the title in previous letter, sorry :/
Hi everyone!
My name is Nur-Magomed, I’m 4th year student from North-Caucasus Federal
University, Russia. This summer, I will be working on Crash Reporter for
Tor Browser as a part of GSoC 2017. My mentors are: Tom Ritter - Primary
Mentor, Georg (gk) - Backup Mentor.
At the beginning I would like to thank all Tor dev community and my mentors
that helped me and accepted my proposal, I’m glad to be a part of Tor dev
community!
About project
Crash Reporter will be helping developers to improve Tor Browser, find bugs
and crash reasons easier, that would make Tor Browser more stable and
user-friendly.
Mozilla Firefox has the crash reporter based on Google BreakPad with server
side - Mozilla Socorro. My summer work is focused at adapting Firefox Crash
Reporter for Tor Browser (Linux version). And also adapting Socorro for
changed Crash Reporter and run it as “.onion” service.
Full project proposal can be found at blog [1] or in PDF file [2].
Project timeline
GSoC coding period starts on May 30 and ends on August 21 comprising a
total of 12 weeks:
week 1 - 5 : Crash Reporter client side
|
+--- week 1+2 : Build Tor Browser with Crash reporter. Improving crash data
minidumps generator (don’t save privacy data in reports)
|
+--- week 3 : Redesign report’s client UI form, making functionality to
delete data after sent, removing not necessary UI functions
|
+--- week 4 : Adapting report’s sender for Tor network (sending through Tor
network)
|
+--- week 5 : Testing and review code
week 6 - 11 : Crash Reporter server side based on Socorro
|
+---week 6+7 : working on Collector, adapting it according to changed
minidumps
|
+---week 8+9 : updating DB structure, adapting Processor (for DB and for
Collector’s reports)
|
+---week 9+10 : Working on statistic site - updating design templates, ORM
classes for DB, and etc.
|
+---week 11 : Testing and review code. Setting up service on Tor network.
week 12: Final testing, documentation
Before coding will start there are some tasks to do (I'm starting work):
> be sure which ones of fields or of their combinations could be
privacy-sensitive
> find the best way that explains to user what happened and what he can do
after crash (in UI design)
> try build Tor Browser with Crash Reporter from Firefox [for Linux]
I will send bi-weekly status reports to this list, and also public it on my
blog [1].
Please don’t hesitate to contact me if you have any suggestions.
E-Mail: nmagoru [at] gmail.com
IRC (OFTC): nmago
Time Zone: UTC+03:00
Kind regards,
Nur-Magomed
Links:
[1] https://torcrashreporter.wordpress.com/2017/04/03/google-summer-of-code-
proposal-crash-reporter-for-tor-browser/
[2] https://torcrashreporter.files.wordpress.com/2017/05/final_proposal.pdf
Hi everyone!
My name is Nur-Magomed, I’m 4th year student from North-Caucasus Federal
University, Russia. This summer, I will be working on Crash Reporter for
Tor Browser as a part of GSoC 2017. My mentors are: Tom Ritter - Primary
Mentor, Georg (gk) - Backup Mentor.
At the beginning I would like to thank all Tor dev community and my mentors
that helped me and accepted my proposal, I’m glad to be a part of Tor dev
community!
About project
Crash Reporter will be helping developers to improve Tor Browser, find bugs
and crash reasons easier, that would make Tor Browser more stable and
user-friendly.
Mozilla Firefox has the crash reporter based on Google BreakPad with server
side - Mozilla Socorro. My summer work is focused at adapting Firefox Crash
Reporter for Tor Browser (Linux version). And also adapting Socorro for
changed Crash Reporter and run it as “.onion” service.
Full project proposal can be found at blog [1] or in PDF file [2].
Project timeline
GSoC coding period starts on May 30 and ends on August 21 comprising a
total of 12 weeks:
week 1 - 5 : Crash Reporter client side
|
+--- week 1+2 : Build Tor Browser with Crash reporter. Improving crash data
minidumps generator (don’t save privacy data in reports)
|
+--- week 3 : Redesign report’s client UI form, making functionality to
delete data after sent, removing not necessary UI functions
|
+--- week 4 : Adapting report’s sender for Tor network (sending through Tor
network)
|
+--- week 5 : Testing and review code
week 6 - 11 : Crash Reporter server side based on Socorro
|
+---week 6+7 : working on Collector, adapting it according to changed
minidumps
|
+---week 8+9 : updating DB structure, adapting Processor (for DB and for
Collector’s reports)
|
+---week 9+10 : Working on statistic site - updating design templates, ORM
classes for DB, and etc.
|
+---week 11 : Testing and review code. Setting up service on Tor network.
week 12: Final testing, documentation
Before coding will start there are some tasks to do (I'm starting work):
> be sure which ones of fields or of their combinations could be
privacy-sensitive
> find the best way that explains to user what happened and what he can do
after crash (in UI design)
> try build Tor Browser with Crash Reporter from Firefox [for Linux]
I will send bi-weekly status reports to this list, and also public it on my
blog [1].
Please don’t hesitate to contact me if you have any suggestions.
E-Mail: nmagoru [at] gmail.com
IRC (OFTC): nmago
Time Zone: UTC+03:00
Kind regards,
Nur-Magomed
Links:
[1]
https://torcrashreporter.wordpress.com/2017/04/03/google-summer-of-code-pro…
[2] https://torcrashreporter.files.wordpress.com/2017/05/final_proposal.pdf
Hello Tor!
Here are some updates related to what the OONI team has been up to in
April 2017.
# OONI Monthly Report: April 2017
The OONI team made steady progress in April 2017.
We released the stable version of ooniprobe's distribution for Raspberry
Pis ("Lepidopter"), as well as the beta version of our data processing
pipeline. We created proof of concepts for the orchestrator backend and
the client component, and we improved the monitoring of our
infrastructure. We also made progress towards new ooniprobe mobile and
desktop releases which feature improvements based on community feedback
and translations in 4 additional languages.
Below we provide some highlights from OONI's activities in April 2017.
## Stable release of ooniprobe's distribution for Raspberry Pis
("Lepidopter")
We released the stable version of ooniprobe's distribution for Raspberry
Pis (lepidopter). It includes the latest version of ooniprobe (2.2.0),
as well as a series of improvements and bugfixes.
The full changelog for this release can be found here:
https://github.com/TheTorProject/lepidopter/blob/master/ChangeLog.md#lepido…
To install this version of the image follow the instructions detailed here:
https://ooni.torproject.org/install/lepidopter/
## Proof of Concept (PoC) for orchestrator backend
We have implemented a proof of concept prototype for the OONI
orchestrator backend specified here:
https://github.com/TheTorProject/ooni-spec/blob/master/opos/OONI-Probe-Orch…
In this iteration of the probe orchestration mechanism (source code
available here: https://github.com/TheTorProject/proteus).
The following functionality is supported:
* Ability for probes to register with the orchestration registry
(https://github.com/TheTorProject/proteus/tree/master/proteus-registry)
* Ability for probes to update the metadata about their probe
(https://github.com/TheTorProject/proteus/tree/master/proteus-registry)
* Support for sending push notifications via Apple Push Notifcation
service and Firebase Cloud Messagging
(https://github.com/TheTorProject/proteus/tree/master/proteus-notify)
* Support for administrators to schedule measurements via a web
interface
(https://github.com/TheTorProject/proteus/tree/master/proteus-frontend)
* Ability for probes to receive the tasks they have been notified about
and mark them as accepted, rejected or done
(https://github.com/TheTorProject/proteus/tree/master/proteus-events)
* Multiple architecture build system
The next steps include the deployment of the testing infrastructure for
the orchestration backend and starting to test it out inside of the
mobile apps.
## Proof of Concept (PoC) for orchestrator in probe
A proof of concept prototype was written to support orchestration inside
of measurement-kit:
https://github.com/measurement-kit/measurement-kit/pull/1210.
The client component supports the basic orchestration workflow that
includes:
* Probes registering with the orchestration system;
* Probes updating the probe metadata;
* Probe listing the tasks they should be running;
* Probes accepting, rejecting and concluding a task.
A sample command line interface that demonstrates the full orchestration
workflow has also been implemented to do end-to-end testing.
## New ooniprobe releases
We worked towards new releases of ooniprobe in April. The latest version
of ooniprobe includes:
* Integration of OONI's HTTP Header Field Manipulation test into
ooniprobe mobile apps
* Improvements to ooniprobe based on community feedback
* Translations in 4 additional languages: Arabic, Farsi, Russian and Greek
* Support for Right-To-Left languages in ooniprobe mobile and ooniprobe
desktop
ooniprobe now supports a total of 9 languages: English, Arabic, Farsi,
Russian, Hindi, Spanish, French, Italian and Greek.
## Beta version of next-generation pipeline
The pipeline is ready to process data on a daily basis, it has already
reduced our storage usage by factor of ~3x enabling faster data
processing. The pipeline still has some bugs to be investigated and some
features to be implemented to replace prev-generation pipeline, but all
stability bugs are fixed at the moment.
The beta version of the pipeline can be found at
https://github.com/TheTorProject/ooni-pipeline/pull/62
## Improvements to OONI infrastructure
We have done a series of improvements to the OONI infrastructure,
including adding support for better monitoring based on prometheus:
https://github.com/TheTorProject/ooni-sysadmin/pull/106 (and
https://github.com/TheTorProject/ooni-sysadmin/pull/108). Some probes
for sending us notifications when some of the core infrastructure
components (bouncer, collectors, test-helpers, ooni-explorer and
ooni-measurements) go down have been setup.
You can inspect the public stats by accessing the grafana frontend to
prometheus at the following URL (username: guest, password: guest):
http://prometheus.infra.ooni.io:3000/
## Outreach and community engagement
On 7th April we presented OONI at the International Journalism Festival
(IJF) in Perugia, Italy. Information about our talk, titled "Uncovering
Internet Censorship", can be found here:
http://www.journalismfestival.com/programme/2017/uncovering-internet-censor…
We also hosted our monthly community meeting on
https://slack.openobservatory.org/ on 25th April (meeting minutes:
http://meetbot.debian.net/ooni/2017/ooni.2017-04-25-15.59.log.html). As
part of the meeting, we discussed the translation of ooniprobe and
approaches for upcoming data visualizations.
## Userbase
In April 2017 ooniprobe was run 57,471 times from 1,535 different
vantage points across 158 countries around the world.
This information can also be found through our stats here:
https://measurements.ooni.torproject.org/stats
~ The OONI team
Hi! Our meeting logs are available from
http://meetbot.debian.net/tor-dev/2017/tor-dev.2017-05-08-16.59.html
Below is the text of the pad we worked on this meeting, with all our
status updates.
---------------------------
Network team meeting notes, 8 May 2017
============================
Discussion topics:
- Last week of merge window. Please help review? [NM]
- Don't forget your needs_revision tickets (if any) [NM]
- some problems brewing re directory downloads and guards? (#21969) [TY]
- network team hackfest!
Post meeting:
- Please look at all tickets in maint-0.3.1
https://trac.torproject.org/projects/tor/query?status=accepted&status=assig…
- If you're the owner on it, and it's a feature that's not going to
happen for 0.3.1 -- please defer or find somebody else to do it this
week?
- If it's in "new" and you're going to do it, please make it
accepted or assigned?
- If it's in needs_revision -- can you revise it?
- If it's in needs_review -- can you review it?
============================
Nick:
- Last week:
- Finished consensus-diff implementation
- Hacked together a connsensus-compression backend for ahf's prop278 work
- Review, merge, review, merge.
- Worked on fixes to some longstanding chutney bugs
- Met with UX folks and TBB folks and PT folks to talk about bootstrapping UI
- Met with Taylor to work on bootstrapping status report API, talk
about faster bootstrapping
- This week:
- Review code and try to merge it.
- Tor presentation at MIT class on Wednesday (6.858).
- Complete or defer all my enhancement-y coding tasks for 0.3.1.x
- Make tickets for ideas about faster bootstrapping in 0.3.2
komlo:
- Last week:
- Submitted for review additions to the torspec glossary (#21744)
- Added notes to, excited for Sebastian's initial Rust patch (#22106)
- This week:
- Still working on a rust protover. Right now, implementing
compute_vote & thinking about how to translate smartlists between
Rust/C FFI
- Helping with current bwauth code on #21846, thanks teor for the review
catalyst:
last week:
- fixed #22103 by deleting useless checks
- several rounds of followup fixes due to test case memory management!
- Tor Launcher usability meeting
- met with nickm to outline an improved model of bootstrapping so we
can hopefully have a better UX in the future
- did some research into exponential backoff techniques (we're not
doing too badly, but maybe we should tune our constants?)
- analyzed my obfs4 bootstrap stuff a bit more; wrote up some comments
and uploaded a log file to #21969
- helped nickm with #22143
this week:
- help nickm refine the bootstrap status reporting improvements
- more obfs4 bootstrap failure analysis?
- other bootstrap UX improvement work
asn:
Last week
- Finalized the rend e2e circuit branch (#21859) and now
it's in needs_review for 0.3.2.
- Finalized ed25519 validation branch (#22006) and now it's
in needs_review for 0.3.1.
- Think about guard discovery stuff.
- Open a new prop224 spec ticket (#22052). Waiting for feedback.
- Posted some theories in #21969
This week:
- Work on #21043: prop224 client-side descriptor fetching
- Do some SponsorR bookkeeping.
- More guard discovery stuff.
Mike:
Last week:
- Reviewed Prop247 and commented in email.
- Padding and Rusting
This week:
- Meeting with Isa about Bridge discovery, other things
- More padding, more rusting
pastly:
- we submitted our KIST paper last week
- investigating EWMA cell_count values vs Tor queueing time
- sometimes Tor queue times are longer than their expected
minimum possible
- this could be okay. but what type of clients are being
queued longer? Bulk? Bulk and web?
- if any circuits are being held back in Tor, it should be
ones with higher EWMA values (bulk). Verify that.
ahf:
Last week (unordered):
Sponsor 4:
- Read up on directory connections: the dirserv and
directory module.
- Started pushing patches for bug #21667 on `bugs/21667`
on gitlab.com/ahf still a few things left to do.
- Landed patches for #21665.
- Reviewed: #22143, #21649, #21650.
Coverity duty:
- Patches for CID: 1405875 (bug #22177): Needs an
additional patch to enhance the test.
- Patches for CID: 1405876 (bug #22164): Should be OK.
This week (ordered):
Sponsor 4:
- (review nickm's #22148)
- Finish bug #21667 (prop #278).
- Look at Nick's changes in #21668 + write/fix tests for it.
- Help Nick with reviews when need be for consdiff (if any?)
(#22148 plz)
dgoulet:
Last week:
- Finalized unit tests for #20657. Then, followed by stress testing
prop224 service. Many bugs were found but it's getting more and more
stable.
- Opened #22173 which will be needed by prop224 at some point.
- Some minor review of couple of tickets for 031 merge.
- Help asn for a Guard discovery mini dev meeting.
- Most prop224 groundwork tickets have been merged now in 031!
Woot! (#21888)
This week:
- Continue integration and stress testing #20657. I do have identified
some issues that need to be resolved. Once this is getting more stable,
I'll probably jump on client implementation with asn (final block!).
- Need to review and integrate the HS e2e crypto branch from asn (#21859).
isis:
last week:
- meeting with nick to discuss things to work on
- spent some time thinking about what i want out of employment/contract
- implemented more of the crypto we need for hyphae
- fought with Mike Hamburg's decaf_25519 implementation to try
to get testvectors
- mostly took the week off
this week:
- arranged a meeting with isa for this week, to brainstrom hyphae UI
- send notes from meeting with nick to shari
- still taking time off
isabela:
- last week I sent notes of tor launcher automation meeting -
following up on some to fthat this week
- Almost done with DRL review and will email deliverables to
stakeholders this week
- last week I did prep work for new hires (lots of new hires
coming with new proposals!) hopefully will start writing job posts
this week (not publish them yet)
- this week will work sponsor4 report for April
- this week will help organize hackfest
Notes for May 4 2017 meeting:
Nick:
1) Digicert renewals (plural)
1.1) blog.torproject.org (expires june 14.)
1.2) fa-blog.torproject.org (seems not to be used? redirects to blog.tpo)
1.3) petsymposium (not needed any more; we switched to let'sencrypt?)
1.3.1) Plan: see if we can move it all to letsencrypt; if not, tell nick
and he'll renew.
1.3.2) Update: during the meeting, arma asked weasel and weasel said
he'd migrate the blog cert to letsencrypt. nickm's current plan is to
renew nothing.
2) Personnel: adding an engineer
3) Possibility of sprint to work on guard discovery resistance?
Roger:
Things to discuss:
1) Torcoin. Trademarks in general.
2) Status of blog conversion?
3) GSoC decisions come out todayish.
Things I did in the last week:
4) I published our 2015 financials, and helped Linus publish some corp docs
5) I finished my two PETS reviews
6) I did several more talks and panels (Miami, Denver, Philly), to help
the public understand "the dark web"
Todo:
7) Writing Defcon submission (due today)
8) I should write up SponsorR milestones for Brad
9) Brad and I should make a plan re NSF foreigner funding question
10) Fastly blog post
11) Organize PETS stipends
12) Answer guard discovery meet-up thread
13) Answer VG and Comcast conference invite
14) Look at Linda's website mail
15) execdir@ forwards to Colin
Alison
1) More content creation for support portal
2) More grantwriting
3) Lots of trainings last week/this week/this month
4) Other stuff the community team is working on: Global South meeting
ideas, Global South outreach/training and the coordination thereof,
relay operator support, membership guidelines.
Shari
1) Lots of productive meetings in New York last week. Good meeting with
Mitchell Baker of Mozilla this week. Doing followup this week.
2) Hired a writer (Tommy Collison) who starts 5/20. Circulating job
description for communications director. Figuring out tasks for new writer.
3) Researching strategic planning for open source projects. Reached out
to Sue Gardner about Wikimedia. Also looking at processes used by
Mozilla and Red Hat.
4) Settled on dates for Montreal meeting. We should start thinking about
team meeting day.
5) Lots of edits on lots of grants.
6) Talking with lots of folks about Tor's place in Internet of Things.
Karsten:
1) Finally submitted funding proposal that was due April 30.
2) Made OnionPerf's onion service measurements available on Tor Metrics
as beta.
3) Started preparing for metrics-lib 1.7.0 and 2.0.0 releases this month
and possibly the next, with a planned blog post in June.
4) Started using Harvest for time tracking.
5) Got a new CollecTor mirror up and running.
Georg:
1) Mainly worked on fixing Tor Browser 7.0 related bugs
2) Cross-team coordination for the bridge automation work
Mike:
1) Refreshed the Guard discovery (Prop247) branch and reviewed currently
open questions for a meeting.
2) Followed up with Mozilla's IoT person. Didn't hear back (spam
filtering of @torproject.org?)
3) Helping with Bridge testing design
4) Meeting with Isa next week. Hopefully we will both also have a chance
to talk to an an ethnographic researcher doing work on anonymity.
Isabela:
1) Submitted Metrics proposal
2) Working on proposal review questions - if all goes well we think this
work will start in July.
2.1) Will send email with deliverables list to all stakeholders to start
preparing teams for this work
3) Had meeting on Tor Launcher automation work (trying to see what are
the dependencies on different teams (under different sponsors
deliverables) - sending out a summary this week as well as some next steps
4) Lots of new hiring coming up with proposals being approved - I am
starting to prepare the work for drafting those job posts, defining the
positions and will reach out to stakeholders to coordinate writing.
5) Hiro - had progress on blog migration work - we will need to freeze
it for some time and will coordinate that with the community.
6) Linda is working on wireframes for the new portals / she is doing
this work with a volunteer for now. She will be at Stockholm internet
freedom event from SIDA
7) Plan on sending roadmaps to tor-project list / and send user growth
strategy update
Arturo:
1) Made a great deal of progress in implementing the client side
component of orchestration
2) We now have 100% ooniprobe translations in Greek, Farsi, Arabic and
Russian that are going to be part of next weeks release
Hi all,
Here are the meetbot logs for the last two community team meetings,
which covered our work in April:
http://meetbot.debian.net/tor-project/2017/tor-project.2017-04-19-18.01.log…http://meetbot.debian.net/tor-project/2017/tor-project.2017-05-03-18.02.log…
Here is what we've been working on in April:
- Members of the Community Team conducted trainings or gave Tor
presentations for Political Research Associates (US), University of
Michigan (US), Tennessee Library Association (US), Open Data Camp (India)
- Derecho Digitales submitted a proposal to OTF for their Tor
relay/public awareness/workshops/training campaign in Latin America.
They are in discussions with NoiseTor to help with this campaign as well.
- Support portal meetings now happen every Monday with members of the UX
and Community Teams. The Community Team's current priority for the
portal is creating all the q&a content. View our progress or help us out
here: https://gitweb.torproject.org/support-portal.git/tree/plain.
- We are in the early ideas phase of planning for the Outreach Portal,
which will be another component of the website redesign. This page will
include things like training materials, and outreach calendar, and
information for relay operators.
- We are making a list of Transifex contributors to send them tshirts!
- We officially ratified the Social Contract:
https://gitweb.torproject.org/community/policies.git/tree/social_contract.t….
- We collected and reviewed feedback from the Tor Meeting in Amsterdam.
- We worked on preliminary planning for a future Tor Meeting to take
place in the Global South. So far, most of the ideas for locations are
in Latin/South America.
- There are now two public channels for discussion of Tor outreach in
the Global South: tor-south(a)lists.torproject.org and #tor-south on IRC
in OFTC.
- We are writing two grants: one for Global South outreach, and one for
Library Freedom Project.
--
Alison Macrina
Community Team Lead
The Tor Project