> "2. Share the survey with your networks and encourage them to pass it
> along. We would like to get a diverse range of developers to take the
> survey.”
> Begin forwarded message:
>
> From: s2e(a)seamustuohy.com
> Subject: [Netfreedom] Request for help: International Developer Survey
> Date: April 5, 2017 at 7:41:21 AM PDT
> To: netfreedom(a)lists.cymru.com
>
> Hello all,
>
> In the Guardian Project <https://guardianproject.info/>'s current work with
> the FDroid <https://f-droid.org/> community to make it a secure,
> streamlined, and verifiable app distribution channel for high-risk
> environments we have started to become more aware of the challenges and
> risks facing software developers who build software in around the world.
>
> There are a wealth of resources available on how to support and collaborate
> with high-risk users. Unsurprisingly, we could not find any guidance on how
> to support and collaborate with developers where the internet is heavily
> monitored and/or filtered, let alone developers who might be at risk
> because of the software they develop.
>
> We have started conducting research on developers from a range of closed
> and closing spaces. We hope that the results of this research will help
> international software projects and organizations better understand and
> respond to the unique needs of different international developer
> communities.
>
> Part of this user research was the development of the challenges.tech survey
> <https://challenges.tech/> which will be used to help us form a better
> understanding of the challenges international developers face, their
> motivations, and their priorities. With the help of the Localization Lab
> <https://www.localizationlab.org/> we have translated this survey into
> Chinese, Spanish, Farsi, French, and Russian.
>
> We have two requests:
>
> 1. If you are a developer take this survey <https://www.challenges.tech/>
> (It takes about 10 minutes.)
> 2. Share the survey with your networks and encourage them to pass it
> along. We would like to get a diverse range of developers to take the
> survey.
>
> *https://challenges.tech* <https://challenges.tech>
>
> We will close down the survey in a month (End of April). We will then replace the
> challenges.tech website with the aggregated survey results. We will also
> publicly share the overall results our research on the Guardian Project
> <https://guardianproject.info/> website in a research report. We hope that
> this report will help international organizations and software development
> projects understand and respond to the unique needs of different
> international developer communities.
>
> Best,
> s2e
>
> --
> seamus tuohy
> Principal Consultant | Prudent Innovation
> s2e(a)prudentinnovation.org
> PGP: 36AC 272E B7CF EDD5 F907 E488 B619 3EC7 3CF0 7AA7
> _______________________________________________
> Netfreedom mailing list
> Netfreedom(a)lists.cymru.com
> https://lists.cymru.com/mailman/listinfo/netfreedom
Hello Everyone,
We are beginning the search for our next writer/editor. Sadly, Cass will be leaving Tor Project at the end of the month for another position, though she says she’ll stay involved with Tor. :) She wanted to break the news herself, but she is on vacation for a bit longer and we would like to get the process started. She will follow up with you all soon.
The job posting is attached as a PDF and live on our website: https://www.torproject.org/about/jobs-editor.html.en
If you know of anyone who would be good at this position, please forward this email or the link to them!
Thank you. Have a nice weekend! :)
Cheers,
Erin Wyatt
HR Manager
ewyatt(a)torproject.org
GPG Fingerprint: 35E7 2A9F 6655 45F9 2CB6 6624 BA0C 9400 F80F 91CE
Hi all!
In March we made three releases, Tor Browser 6.5.1[1], 7.0a2[2], and
7.0a2-hardened[3].
Tor Browser 6.5.1 was the first point release in the 6.5 series fixing
mainly regressions we found after 6.5 got out and containing version
bumps to a variety of our components to close security holes. We needed
to put some effort into creating a new patch for our W^X JIT
implementation as the backported patch we used got broken by a security fix.
The alpha and the hardened releases shipped tor 0.3.0.4-rc but included
otherwise nearly the same changes as the stable one.
Besides work related to our releases we focused mainly on making our
build system faster and more scalable[4], and on moving to Firefox ESR
52[6]. We organized our tickets in a way that blockers for our switch to
ESR 52 in our nightly builds were easily visible by using the keyword
`tbb-7.0-must-nightly`. We solved all of them and are about to start
nightly builds with a browser based on ESR 52. Bundles should be
available from tomorrow on.[6] We made further progress on our build
system improvements as well and nightly builds using rbm, our new
reproducible builds manager, should be available this month, too.[7]
The full list of tickets closed by the Tor Browser team in March is
accessible using the TorBrowserTeam201703 tag in our bug tracker[8].
In April we plan to get a set of new releases out (6.5.2, 7.0a3, and
7.0a3-hardened) and focus on getting the alpha series into a stable
shape. We have created special keywords to track both the work needed
for the alpha and the work to get it stablilized while retaining all the
properties outlined in our design documentation. Those keywords are:
`tbb-7.0-must-alpha` and `tbb-7.0-must`. If there is time left we plan
to work further on making our build system faster and more scalable. We
intend to set up regular nightly builds which would allow us to quantify
the build time improvements we expect from the new build infrastructure.[9]
All tickets on our radar for this month can be seen with the
TorBrowserTeam201704 tag in our bug tracker.[10]
Georg
[1] https://blog.torproject.org/blog/tor-browser-651-released
[2] https://blog.torproject.org/blog/tor-browser-70a2-released
[3] https://blog.torproject.org/blog/tor-browser-70a2-hardened-released
[4] https://trac.torproject.org/projects/tor/ticket/17379
[5] https://trac.torproject.org/projects/tor/query?keywords=~ff52-esr
[6] https://people.torproject.org/~linus/builds/
[7] See https://trac.torproject.org/projects/tor/ticket/17379 and child
tickets
[8]
https://trac.torproject.org/projects/tor/query?status=closed&keywords=~TorB…
[9] https://trac.torproject.org/projects/tor/ticket/21286
[10]
https://trac.torproject.org/projects/tor/query?keywords=~TorBrowserTeam2017…
Hi all! My status report this month includes a few trip photos so
think I'll just provide a link this time...
http://blog.atagar.com/march2017/
Cheers! -Damian
Hello all,
Here's what we've been up to in March. ᕦ(^o^)ᕤ
1: Performed user tests on the mobile security slider [1].
We redesigned the security slider for mobile devices, and in the
process, altered the settings and text. From testing, we found out that
people expected the slider to operate differently (some dragged the
slider, some clicked at discrete points, some people clicked on the
words below the slider), and we've used this feedback make sure that all
of these interactions have a response. Participants read all of the text
in the interface and felt better about the new naming convention, but
more improvements could be made to correctly communicate what these
settings are for.
2: Designed the portals for torproject.org [2], especially the support
page [3].
We've designed the support page, and are now working on the content that
will go on the page. Alison and Colin are writing up frequently asked
questions and their respective answers to those questions. We're going
to focus heavily on assisting with the download and installation process
by OS, and cover the most commonly asked questions sent to help@tpo.
Brainstorming at the dev meeting clarified what purposes the other
portals can serve as well.
3: Brainstormed improving tor launcher, browser fonts, and security
slider for tor browser.
All of these were a result of dev meeting goodness. We plan to make
design changes to tor launcher to make it easy to use (we should do this
now), then work on automating the connection process by pinging relays
and bridges to see which ones are reachable (proposal almost finalized),
and eventually work on a meek-fronted scheme that interacts with
bridgeDB for safe connections (proposal pending). We are unsure how the
browser fonts affect the end users, and if it bugs them enough for them
to switch. We also noted that the security slider is hard to adjust, and
is global, which makes user usually default to the lowest security
setting required by any of the sites they regularly frequent.
4: Attended rightscon and interacted with human rights activists,
policymakers, and funders [4].
I, Linda, attended this event, and found it quite energizing. It's not
everyday that you can interact with at-risk users from all over the
world. I also learned a lot, which I liked.
5: Made tor-official images and banners [5].
Elio made some pretty nice looking images! We plan to use them
eventually, when tpo.org is redesigned.
[1]
https://trac.torproject.org/projects/tor/wiki/doc/UX/OrfoxSecuritySlider#Te…
[2]
https://trac.torproject.org/projects/tor/wiki/doc/UX/TorProjectWebsite
[3] https://trac.torproject.org/projects/tor/wiki/doc/UX/SupportPage
[4] https://www.rightscon.org/program/
[5] https://github.com/uracreative/tor-assets
٩(◕‿◕)۶,
Linda
--
Current Key: https://pgp.mit.edu/pks/lookup?search=lindanaeunlee
GPG Fingerprint: FA0A C9BE 2881 B347 9F4F C0D7 BE70 F826 5ED2 8FA2
Hi!
I'm trying to be a little more proactive in sending out links to our
meetbot logs for the network team. We're also trying a new format
where we put our status reports on a pad in parallel and talk about
them during the meeting. So I'm going to paste from the pad into this
mail, and include a link to the meetbot log at the end of the mail.
If you want to ask us about something you see here, please use a
public mailing list: sending emails to individual developers is a tiny
bit creepy sometimes.
==================================================
Weekly network team meeting 3 April 2017
New format!
To discuss:
* Rotating roles
* This pad format
* putting out 0.3.0 -- anything else?
* New dirauth in 030 stable?
* GSoC
* We didn't triage 0.3.1 in Amsterdam.
===================================================
username:
last week:
*
*
this week:
*
*
nickm:
last week:
* got back from amsterdam; that went well, both in terms of work
done and in negative d(drama)/dt
* Resurrected calltool, my assembly-reading objdump-parsing
callgraph generator. Needs more work; output still isn't right.
available at https://gitweb.torproject.org/user/nickm/calltool.git/ .
output is not to be trusted yet.
* a couple of small cleanup patches (remove tor-checkkey, use
openssl includes less)
* general consensus diff backend hacking (sponsor4)
* lots of talking about crypto, followups, etc
this week:
* I'm hoping to put out 0.3.0.5-rc. Help?
* I'm hoping to start merging mikeperry's netflow patches. Help?
* Gotta go through all our notes from the meeting and see what
turns into a to-do item.
* Going to see how far I can get on the consensus diff
implementation. It would be cool to have it working by some time next
week, but that's ambitious.
* We've got to look at gsoc applications; they're due today.
* Enjoy the lovely boston weather.
asn:
last week:
- returned from amsterdam
- wrote a blog post about UX of onion addresses. hopefully publishing today.
- started looking into ed25519 blinding stuff.
- replied to some of the email backlog.
this week:
- figure out what to do with ed25519 key clamping and AONT construction
- review ed25519 blinding code. update spec. add docs.
- maybe start thinking about cpath crypto API for prop224. not sure
if i will have time.
pastly:
1. Finishing up work on getting my kist code ready to be
reviewed by my employer so I can share it with Tor to get feedback.
As part of that, I'm planning on implementing run-time switching
between schedulers with function pointers. For example, scheduler_run
would be a function pointer to scheduler_run_vanilla or
scheduler_run_kist based on the UseKIST torrc option. Changing UseKIST
and reloading Tor would just update pointers and clean up memory if
necessary.
Does that sound like a mergable idea?
(yes, sure, assuming it's clean :) -NM)
2. I saw that the network team is working on a new
responsibility rotation, including front-line support in #tor.
First, I'd like to volunteer to help with front-line support.
(sounds good! we should all take turns. -NM)
Second, I think +R should be removed from #tor, at least when I
am actively online. We get roughly zero spam right now, but we also
get very little support requests. I think this is relevant to this
meeting if network team is wanting to get more active on the
front-line.
(not a network-team call afaik -NM)
catalyst:
last week:
* returned from AMS
* polished my 13790 patch
* started looking at 0.3.1.x milestone bugs
this week:
* find a few 0.3.1.x milestone bugs to work on
("revision_stalled" etc. where the user has been unresponsive about
revisions)
* learn more about PT and anti-censorship
Sebastian:
Rust team founded with Alex and Chelsea
Lots of Rust hacking
We can link Rust now :)
Started a consdiff implementation. No unsafe code, 50%
performance of C impl without tweaks (C is somewhat optimized)
dgoulet:
last week:
- Amsterdam was very productive for me. Worked a bunch with
asn on prop224 implementation.
Came back quite unhealthy so I'm working through that. I've
emptied my email stack for now.
I still have quite the TODO (network team related and other
Tor things) so I'll try to go over it this afternoon.
- Bad relay world is moving with some discussions and soon blog post.
this week:
- I'm planning this week to finalize #20657 once and for all
then go crazy on
testing and fuzzing (for which I had a good workshop in AMS,
thanks nickm!)
haxxpop:
last week:
* Rewrite the get_responsible_hsdirs according to the comments of
dgoulet and asn
https://github.com/haxxpop/tor/pull/3/commits
this week:
* I will refactor that get_responsible_hsdirs if there are more
comments from the team
* Maybe find some other prop224 stuff to do
ahf:
since last meeting:
- Worked on prop#278 issues: #21667 + #21662 + #21663.
- Implemented proposal #274 in issue #21641.
- Helped review #21643, #21645, and #21651.
- Looked into a PT regression I caused in #21757 and
thereafter investigated if the regression would impact tor-fw-helper.
Looked into how tor-fw-helper worked, what it is, and if there was
still a need for the tool. Discussed deprecation strategy with Nick.
- Looked into our old IPv6 roadmap, issues related to IPv6
code as preparation for the Amsterdam meeting and GSoC proposal. -
Went to Amsterdam, met and talked to a lot of new people.
- Hosted a sponsor 4 session with Karsten (metrics team) +
Nathan (guardian project).
- Joined Sebastian and Chelsea's work on Rust porting. Read up on Rust.
this week:
- Finishing prop#278 related issues: currently working on
splitting them up into reviewable patches that fits the relevant
issues.
- Walk over my Amsterdam notes for different ideas and projects.
- Look into next steps for Sponsor#4 tasks.
- Need to talk to Karsten about the possible impact some of
the sponsor4 stuff might have to the metrics team.
(happy to talk, possibly after the meeting/tomorrow! -karsten)
isis:
since last meeting:
- wrote more of the paper/design spec that is due for my OTF
deliverable (#10 on
https://people.torproject.org/~isis/otf-etfp-sow.pdf)
- took two days off last week since the dev meeting went over
the weekend
- read a bunch of appengine documentation to get the meek
reflector for bridgedb working
- sketched out some UX stuff for the distributor and the API
that will be available to TB
- several talks with different rustlang developers who are
excited and want to know what we want out of rust
this week:
- still cruching a bit to finish the OTF deliverables by the
22nd, so more of the same work
Mike:
Last week:
* I spoke at IETF
* Recovered from AMS
* Finishing up the Firefox code review. About 1 more day of work.
This week:
* Resume working on Prop#254
* Do some followup from AMS
* More Meetings
yawning:
this week:
* Maybe poke at my optimized lattice crypto code some more.
Isabela:
Last week:
Worked on user growth strategy update - hope to share it by eow
Worked on final report for ISC
Tried to catch on AMS meetings notes
This week:
Get user growth strategy update done
catch up with the team on follow ups from the meeting
work on March report for sponsor4
===============================
Meetbot logs from the IRC meeting:
http://meetbot.debian.net/tor-dev/2017/tor-dev.2017-04-03-17.00.html
--
Nick
Good stuff:
-------- Forwarded Message --------
Subject: [OTF-Announce] Announcement of Funding Opportunities
Date: Fri, 31 Mar 2017 11:59:39 -0700 (PDT)
From: OTF-Announce <otf-announce(a)opentechfund.org>
Reply-To: otf-announce+managers(a)opentechfund.org
To: OTF-Announce <otf-announce(a)opentechfund.org>
--- OTF FUNDING ANNOUNCEMENTS ---
==============================================
Please find below several upcoming internet freedom-relevant funding
application deadlines. There are two sections, the first for OTF support
and the second for all alternative support mechanisms. Note that several
of the listed application windows close in the next couple days.
In addition to the open application windows listed below, you can also
check our compiled list of alternative sources of support. This is
especially true for efforts (like Rapid Response) that accept
applications on a rolling basis.
https://www.opentech.fund/apply/alternative-sources-support
If you have any questions on the information below, please feel free to
give a shout to us at OTFanytime. Thanks!
1. OTF FUNDING
==============================================
OTF - Internet Freedom Fund
Deadline: May 1, 2017
The Internet Freedom Fund is OTF's primary way to support projects and
people working on open and accessible technology-centric projects that
promote human rights, internet freedom, open societies, and help advance
inclusive and safe access to global communications networks. Successful
applicants are awarded monetary support up to $900,000 and no less than
$10,000, with preference given to those projects and people who are new
to the internet freedom community, helping those living within
repressive environments, and are requesting less than $300,000 for a
duration of less than 12 months.
Apply: https://www.opentech.fund/requests/internet-freedom-fund
<https://www.opentech.fund/requests/internet-freedom-fund>
OTF - Core Infrastructure Fund
Deadline: May 1, 2017
The Core Infrastructure Fund supports building blocks of digital
security and circumvention projects. This may include efforts focused on
sustaining or improving PGP, SSL, SSH, Tor, OTR, pluggable transports,
code libraries, and other technologies used within the core building
blocks of everyday Internet Freedom technology used by people throughout
the world to increase their access, privacy, and security online.
Apply: https://www.opentech.fund/requests/core-infrastructure-fund
<https://www.opentech.fund/requests/core-infrastructure-fund>
OTF - Rapid Response Fund
Deadline: Ongoing
The Rapid Response Fund is part of a broader OTF initiative which aims
to facilitate the development of a strong digital emergency response
community that can work together to resolve threats in a timely and
comprehensive manner. OTF offers both direct financial support as well
as technical services from trusted partners to resolve digital
emergencies experienced by high-risk Internet users and organizations,
such as bloggers, cyber activists, journalists. and human rights defenders.
Apply: https://www.opentech.fund/requests/rapid-response-fund
<https://www.opentech.fund/requests/rapid-response-fund>
OTF - Labs
Deadline: Ongoing
For more specific, one-off support needs and services, check out OTF's
Labs: Localization, Community, Engineering, Usability, Red Team, and Legal.
Learn more about the Labs at: https://www.opentech.fund/labs
<https://www.opentech.fund/labs>
2. ALTERNATIVE FUNDING & OPPORTUNITIES
==============================================
*ProPublica - Data Institute *Deadline: March 31, 2017 11:59 PM EST*
*
The Data Institute is "a 11-day intensive workshop on how to use data,
design and code for journalism. The workshop will be from June 7 to June
21 in our NYC offices."
More information: https://projects.propublica.org/graphics/summer *
*
*NLNet Foundation - Network and Internet Technology *Deadline: April 1,
2017*
*
"NLnet foundation supports a large array of activities, from software
development, standardisation work and development of educational
material up to hacker festivals, digital rights activities and the
international development of open source software licences. The NLnet
contribution can also be used as so called "matching" for other
subsidies from organisations such as the EU and Science foundations."
More information: https://www.nlnet.nl/news/2017/20170401-call-en.html
*Google - Summer of Code
*Deadline: April 3, 2017 16:00 UTC*
*
Work with and contribute to open source projects over the summer. Among
the 201 available mentor organizations are OTF-supported efforts K-9
Mail, Qubes OS, and Tor. "Google Summer of Code is open to university
students, age 18 and older in most countries."
More information: https://developers.google.com/open-source/gsoc/ *
*
*Knight Foundation - Prototype Fund *Deadline: April 3, 2017*
*
Knight Foundation's revamped Prototype Fund features thematic, rather
than general, calls for applications. This call "will focus on growing
concerns with trust in news and misinformation." Other changes include
award amount (now $50k) and project duration (9 months) among others. More
information: https://knightfoundation.org/challenges/knight-prototype-fund
*The Walkley Foundation - Media Incubator and Innovation Fund
*Deadline: April 6, 2017*
*
"The Fund is open to backing a broad range of ideas across the news,
media and civic engagement industries. We’re fairly open-minded about
what these projects could be. But we’d especially love to see ideas that
empower journalism to fulfill its critical role in democracy of speaking
truth to power, and supporting an engaged, connected and informed public."
More information: http://www.walkleys.com/innovationgrants/ *
*
*BudgIT - Civic-Tech Media Fellowship*
Deadline: April 10, 2017
"Public finance-focused civic-tech organization BudgIT is announcing a
six-month, highly competitive Civic-Tech Media Fellowship designed to
support six (6) journalists interested in covering human-angle stories.
The fellowship will include training on Data Journalism, Investigative
reporting, Desk research and provide up-to-date knowledge on the
intersection between journalism, civil society and new media."
More
information:
http://yourbudgit.com/call-for-application-budgit-civic-tech-media-fellowsh…
*
*
*Annenberg-Oxford Media Policy Summer Institute*
Deadline: April 14, 2017*
*
The Annenberg-Oxford Media Policy Summer Institute, held annually since
2004, brings together young scholars and regulators from around the
world to discuss important recent trends in technology and its influence
on information policy. The objective of the program is to help prepare,
motivate, encourage and support students and practitioners who aspire to
pursue a career in a media-related field, may it be in academia,
business or in policy-related fields. Applications are welcomed from
students and practitioners working in communications, media, law,
policy, regulation, and technology."
More
information:
http://globalnetpolicy.org/event/2017-annenberg-oxford-media-policy-summer-…
Application:
https://upennasc.hobsonsradius.com/ssc/aform/M00E4GfI670c0x67023M.ssc
*School of Data - Fellowship and Data Expert Programmes*
Deadline: April 16, 2017
"Fellowships are nine-month placements with School of Data for
data-literacy practitioners or enthusiasts...The 2017 Fellowship will
continue the thematic approach pioneered by the 2016 class. As a result,
we will be prioritising candidates who possess experience in, and
enthusiasm for, a specific area of data literacy training [and those
who] can demonstrate links with an organisation practising in this
defined area and/or links with an established network operating in the
field."
More
information:
https://schoolofdata.org/2017/03/02/apply-now-school-of-datas-fellowship-an…
*Citizen Lab Summer Institute 2017 *
Deadline: April 21, 2017
"The Citizen Lab Summer Institute on Monitoring Internet Openness and
Rights is an annual research workshop hosted at the Munk School of
Global Affairs, University of Toronto. The Citizen Lab Summer Institute
(CLSI) is a meeting place for researchers and practitioners from
academia, civil society, and the private sector who are working on
Internet openness, security, and rights. It brings together perspectives
from a wide range of backgrounds across technical and social science
disciplines. Participants range from established experts to those just
entering the area."
More information: https://citizenlab.org/summerinstitute/2017.html
Application:
https://citlab.wufoo.eu/forms/2017-citizen-lab-summer-institute/
*Internet Policy Observatory - **Call For Proposals: Joint Digital
Rights and Internet Freedom Research/Advocacy Projects*
Deadline: April 30, 2017
"Applications should propose a research project that would provide
empirical weight and further advocacy efforts in an area related to
digital rights and internet freedoms. Topics of relevance include but
are not limited to access to online resources, freedom of expression
online, the economic and social effects of internet policies, ICT
companies and human rights, privacy and surveillance online. Applicants
should be able to justify the need for the research and are expected to
produce a set of deliverables that are relevant to academic, advocacy,
and policymaking communities."
More
information: http://globalnetpolicy.org/our-research/call-for-proposals/
*
*
*Mozilla - Open Source Support (MOSS)*
Deadline: April 30, 2017
"MOSS is Mozilla’s program for supporting the Open Source and Free
Software movement...MOSS currently has 3 tracks: Foundational
Technology, Mission Partners, and Secure Open Source."
More information: https://wiki.mozilla.org/MOSS#Program_Overview
---------
In addition to the open application windows listed above, you can always
check our compiled list of alternative sources of support:
https://www.opentech.fund/apply/alternative-sources-support
<https://www.opentech.fund/apply/alternative-sources-support>
--
This is the announce list for Open Technology Fund,
https://www.opentechfund.org
---
You received this message because you are subscribed to the Google
Groups "OTF-Announce" group.
To unsubscribe from this group and stop receiving emails from it, send
an email to otf-announce+unsubscribe(a)opentechfund.org
<mailto:otf-announce+unsubscribe@opentechfund.org>.
For more options, visit
https://groups.google.com/a/opentechfund.org/d/optout.