At 09:12 3/27/2016 -0500, you wrote:
>For the past several days the number of relays
>measured by my bwuath ... have been slowly declining. . .
I've noticed the problem as one of my relays has
been radically overrated for eight days and is
clearly not being measured. The relay currently
has consensus of 200% of normal and the link limit
is saturated at all times. I might have to shut
it down for a couple of days to avoid going over
the ISP traffic allocation. Yesterday Faravahar
…
[View More]measured it at close to zero (typical after
overrating), but the four other BWauths haven't
budged.
I still plan on launching a project to run a passive
BWauth and to fix bugs, eventually restructuring
the scanning scheme. But life has not cooperated
and I haven't been able to make time for it yet.
With luck I should be able to get it underway by May.
[View Less]
For the past several days the number of relays measured by my bwuath
(whose data is given my maatuska) have been slowly declining.
Originally I had an alert when it was below 8800, a few days I noticed
it going below that. By today it's decreased to below 8700 to 8664.
It's not the lowest bwauth measuring, but I don't see anything
obviously wrong with my bwauth to indicate the decline. (The number I
mentioned is number of lines in the bwscan.V3BandwidthsFile file, not
the measured relays that …
[View More]make it into the consensus - but the
comparison I just made did use the consensus count.)
I wanted to send this email as a potential advance notice; but also
ask if there had been any discussion of the bwauth system in Valencia,
and if there is any current planned improvements in it.
-tom
[View Less]
Hopefully the exclamation marks work. Thanks Sebastian for kicking us
off! We have just twelve project ideas at present and many of those
will go poof due to being outdated. We need moar!!!
Please, please give thought to if there's something you'd care to
mentor this summer. This is a great opportunity to kickstart
development and get a new community member at the same time! We're a
bit behind the eight ball right now since Google is evaluating our
proposal as we speak, and if selected …
[View More]students will be checking us out
on Monday (2/29).
Got something? Then just shoot us text like the following and
Sebastian or I would be happy to add it...
https://www.torproject.org/getinvolved/volunteer.html.en#Coding
Cheers! -Damian
[View Less]
Hi all,
I'm working with a TV producer who is doing a three-hour film about the
history of the Internet and wants to Interview someone in the US who
uses Tor for a sort of every-day use case unrelated to the information
security field (person avoiding stalking? Looking at your business competitor?
I have a few people but she's not that interested in
them. Can you think of anyone who would be good? It seems like a
promising film. I'm planning to refer them to LFP but would like to see
what I …
[View More]can do to identify other people as well.
Cheers,
Katie
-- Kate Krauss Director of Communications and Public Policy
kate(a)torproject.org @TorProject 1-718-864-6647 (works for Signal also)
PGP: CC0D 9B42 DE89 D4D0 619B A606 DDEB 3937 7D18 973B
--
Kate Krauss
Director of Communications
and Public Policy
kate(a)torproject.org
@TorProject
1-718-864-6647 (works for Signal also)
PGP: CC0D 9B42 DE89 D4D0 619B A606 DDEB 3937 7D18 973B
[View Less]
I re-ran some of our analysis scripts from the "Do You See What I See?"
paper to bring the graphs up to the present day. In the paper, our
OONI-derived data only went up to August 2015, but now it's update to
the present. Take a look at this graph, which shows the rate of Tor
blocking over time (it's an updated version of Figure 7):
https://people.torproject.org/~dcf/graphs/ooni-tor-blocker-rate-20160323.png
The interesting characteristic is CloudFlare: after suddenly decreasing
from 3% to 1%…
[View More] in June 2015, and slowly decreasing over the course of
months to almost 0%, CloudFlare's blocking rate in the OONI data set
suddenly increased to about 4% in December 2015. This is consistent with
my own experience, that CloudFlare was pretty easy for a while, but
lately it's much harder.
These percentages are out of all HTTP requests issued by ooniprobe, and
only count cases where the Tor request was blocked but the non-Tor
request was not blocked. There could also be other confounding factors
that we haven't investigated, like maybe OONI's URL list or probe
distribution changed suddenly. If you would like to dig deeper, here is
the source code that generates the graph:
git clone https://www.bamsoftware.com/git/ooni-tor-blocks.git
The findblocks.csv file in the source contains a summary of each HTTP
request pair issued by ooniprobe, distilled from the raw reports.
[View Less]
[If you do not use sudo on torproject.org systems, you need not read this.]
Comrades,
some of you maintain services on torproject.org hosts. Generally, these
services run under their dedicated role user, and you use sudo to switch to
these roles.
Up until now, you have used the LDAP password to authenticate to sudo. We want
to change this.
The LDAP password is the one you got sent in encrypted mail when your account
was first created on db.torproject.org. You might have (should have) …
[View More]changed
that on the web-interface [db]. This password is the one that also allows you
to log into the management interface [db-login] there and change for instance
your mail forwarding configuration or your jabber password
[jabber-announce-mail].
The plan is to have a password dedicated to just sudo.
To set it, please go to the user management website [db-login] (pick "Update my
info"), and set a new (strong) sudo password for yourself. If you want, you
can set a password that works for all the hosts that are managed by
torproject-admin (*). Alternatively, or additionally, you can have per-host
sudo passwords -- just select the appropriate host in the pull-down box.
Once set on the web interface, you will have to confirm the new settings by
sending a signed challenge to the mail interface. Please ensure you don't
introduce any additional line breaks.
Note that setting a sudo password will only enable you to use sudo to
configured accounts on configured hosts. Consult the output of "sudo -l" if
you don't know what you may do. (If you don't know, chances are you don't need
to nor can use sudo.)
For now, both the LDAP password and the new sudo password will work to
authenticate to sudo. Starting in the second week of April, the LDAP password
will no longer be accepted for this purpose.
If you have any questions, please ask.
Thanks,
weasel
[db] https://db.torproject.org/
[db-login] https://db.torproject.org/login.html
[jabber-announce-mail]
https://lists.torproject.org/pipermail/tor-project/2016-February/000064.html
--
| .''`. ** Debian **
Peter Palfrader | : :' : The universal
https://www.palfrader.org/ | `. `' Operating System
| `- https://www.debian.org/
[View Less]
On Tue, Mar 22, 2016, at 12:03 PM, David Goulet wrote:
> LibrePlanet 2016 was last weekend and we were a couple of Tor people
> there (I
> won't list them since I didn't ask them before writing this email).
> Please,
> "other Tor people", feel free to add anything to this thread about what
> happened there if you think it would be relevant.
I am sorry I could not make it this year, as I was out of town on a
family trip. Thank you so much for this report.
> I would like …
[View More]to share one thing with all of you that I learned there. It+
> might
> not be news to some of you but one part of it below was for me.
Through the Guardian Project, we have had numerous interaction with
activists, journalists, trainers and organizations based in or
supporting communities in Mexico. The triple threat of corporations,
government and cartels is real and dire, leaving pretty much no one, no
rule of law, or process to trust. Often these various groups are
infiltrated by one another, so you end up with mobile operators metadata
or surveillance data being acquired by cartels through employees who
sell it to them or are pressured into it.
With all of this, I can understand how free software and services and
projects like Tor must seem like real, tangible, critical allies, and am
glad you could connect with them on this topic.
> Anyway, I'll stop here. It was a great conference imo and I encourage
> anyone
> that can attend to do so next year.
I'll be there!
+n
[View Less]
Hello Tor!
LibrePlanet 2016 was last weekend and we were a couple of Tor people there (I
won't list them since I didn't ask them before writing this email). Please,
"other Tor people", feel free to add anything to this thread about what
happened there if you think it would be relevant.
I would like to share one thing with all of you that I learned there. It might
not be news to some of you but one part of it below was for me.
First, there was a talk from two activists from Mexico that deploy …
[View More]free
software in indigenous communities, in states like Chiapas and other
autonomous communities around Mexico. They build, install and teach those
solutions. On the list of software they use, Tor was one of them (and Bitmask!
shootout to our LEAP friends! :). After the talk, I went to talk to them on
why it's being used for which it seems a _non_ optional software for them.
They told me that all those communities around Mexico they work with face very
important surveillance threat which sometimes have physical consequences for
lots of people (you can imagine...). This comes from three different sources
they explaines me. The first one is corporation. Those corp. are there for the
massive natural ressources those regions have and they are regurlarly causing
natural disasters so there are a lots of activists fighting that at the street
level and at the legal level. Using Tor is essential so they evade corporate
spying which is apparently intense. They can coordinate safely and do their
legal research about those corporations in privacy.
The second source of surveillance is, no surprise there, government which
sleeps with those corporations and has a reach outside of the region that is
country wide thus much more invasive in terms of surveillance. Again, Tor!
The last one is the cartels. They explained to me that the cartels, in the
region(s) they control, have infrastructure in place to spy on electronic
devices and Internet communications. And you can also imagine that _they_
don't fuck around there when they catch someone doing something against their
agenda.
All in all, for them Tor is a matter of _survival_ and that is absolutely
mandatory to their everyday life which is a suprising number of people in
Mexico. Up to this day, it's been *years* they've been deploying those
softwares around the country and continue to do so for which Tor is a core
component. Those two activists were able to travel, talk about it and continue
to do their work in part because of Tor (and of course other software like
Tails, Bitmask, GPG, ...).
It's really great to be honest, as a Tor developer, to get this kind of
feedback and also understanding (well as best as possible since I never lived
something like that) their situation and needs. Also, +9k for translation of
our documentation and tools, English works fine for rich and powerful
colonialist countries ;).
I've also talked to people from https://about.commonsearch.org/ for which they
have been "mining" a .onion address for weeks now to get a vanity one. They
are behind CloudFlare because of the cost it saves them but will at least have
a .onion for Tor users. We'll see where that goes...
Mr. Stallman tried to convince me that TBB should be based on IceCat[1] and
put me in contact with the maintainer... This all happened after I gave him
"Fuck CloudFlare" stickers for which he was SO happy that he asked me more so
he can put them everywhere he goes. (For those who don't know, he uses Tor
_all_ the time and he is quite pissed about CloudFlare.)
Anyway, I'll stop here. It was a great conference imo and I encourage anyone
that can attend to do so next year.
Cheers!
David
[1] https://www.gnu.org/software/gnuzilla/
[View Less]
Hi Alison,
Here's the mail from last summer, with the "new" (as of then) organization
and coordination plan. Hopefully this will be useful to you in figuring
out the past, present, and future for the community team.
I am also cc'ing tor-project here, since there's nothing sekrit in the
below mail, and we should get into the habit of publishing stuff that
used to maybe be sensitive but now probably isn't.
--Roger
----- Forwarded message from Roger Dingledine <arma(a)mit.edu> -----
…
[View More]Date: Mon, 25 May 2015 09:02:22 -0400
From: Roger Dingledine <arma(a)mit.edu>
To: tor-internal(a)lists.torproject.org
Subject: Team-based structure (Vegas Plan, mark 2)
Hi folks!
In my last mail I mentioned the topic of org structure. In my mind the
main goals we're trying to solve with a better-understood structure are:
1) Better communication and coordination, both inside the team and
between teams.
2) Give everybody a home. That is, have a named person who can help
you when you need help with something (there's a conflict between you
and somebody, you need some specific resource to accomplish your tasks,
you don't know what you should work on next, ...).
With that in mind, here is one way we could divide up into teams:
---------------------------------------------------------------------
Community team
Kate
Jake
Harmony
Leiah
Nima
Sebastian
Network team
Nick
Yawning
George
Dgoulet
Andrea
Isis
Aaron Gibson
Applications team
Mike
Geko
Pearl Crescent
Arthur
Nicolas
Arlo
Sukhbir
Support team
Measurement team
Karsten
Arturo
Philipp Winter
Virgil
Operations team
Tom
Steve
Sue Abt
---------------------------------------------------------------------
Some observations to help you understand why I made these choices:
- I called the community team that name rather than outreach or advocacy
or communications because its focus is on our people, inside and out:
communicating to them, learning from them, getting them involved in making
more Tor. So it includes Tor Weekly News, making the website accessible,
handling press, doing trainings and conferences and materials to go with
that, and all forms of outreach.
- The "network" team is what I would have called the "tor" team, but
Nick used the word 'network' once so I'm using it here. This is the
backend: the program called Tor, the pluggable transports, the bridge
distribution, the network simulators, the scripts that support directory
authorities, etc.
- The applications team works on the programs that end users think of
as Tor: Tor Browser, other apps that bundle Tor, the equivalents on
Android/iOS, and builds and QA for these applications. This team also
works on enabling users to actually use these applications: that includes
phrases like UX design, documentation, making sure that users can find
answers to common questions, and making sure that developers know which
questions are common so they can prioritize them.
- The measurement team mashes together metrics, OONI, badexit detection,
onionoo and the community websites that draw from onionoo, and the
research groups who care about our data.
- And lastly, I put an explicit operations team on the list, even
though it is small and probably doesn't have enough people on it to do
everything it will want to do. But I realized that if I didn't list it,
I would be reinforcing the assumption that "operations team" and "execdir"
are synonyms.
- There are other tiny and lonely teams that I didn't list. For example,
we might imagine an "infrastructure team" with weasel and qbi on
it. But I'm wary of loading our kind volunteer sysadmins down with the
communication responsibilities of being their own team. I guess the other
conclusion there is that we should sketch out which teams are missing
now compared to the future well-functioning and better-balanced Tor,
and figure out a plan and timeline for getting from here to there.
- Some of the choices could easily have gone another way. For example,
why is the badexit detection work in the measurement team, and not in
the network team? Is Tails part of applications, or part of community?
We'll need to adapt based on what's working and what isn't working.
- There are many people and groups that I didn't list in the above. That
doesn't mean we don't like you, or that you're less valuable than the
people I did list. I mostly focused on the people who get paid in some
way for this work. Many of our volunteers fit into multiple categories
(e.g. Matt Finkel could be community, could be network, probably
could be a third as well). I'll leave it to them which team they want
to be their 'home', also keeping in mind that these don't need to be
permanent decisions. So think of this as an opportunity to choose your
own destiny. :)
- You'll notice that Isabela and Roger aren't in the list. That's because
I've signed us up to be facilitators of the whole process. Maybe that
means you can think of us like being on every team? We should be careful
of accidentally thinking of these two people as k+1 people each though.
- You'll also notice that these teams are broken up by functionality and
purpose, not by funders. So for example we don't have a SponsorR team,
even though that project ties together many teams. So we're going to
need to cooperate and coordinate between the teams to keep various
funders happy.
---------------------------------------------------------------------
How do the teams work? You'll notice I didn't call out 'team leaders'
or 'managers' or the like.
The goal, original Vegas plan style, is for each team to self-organize
so it can fulfill its responsibilities. Some teams will pick a person
to be their primary person. Other teams will divide up responsibilities,
or trade off, or whatever works for them.
That said, I did list a person at the top of each team who I'm hoping
will be instrumental in leading the self-organizing.
---------------------------------------------------------------------
What are the responsibilities of each team? That's something we should
work through together. Here are some we might choose:
- Keep everybody inside the team coordinated on what needs to be done,
who's doing it, how it's going, etc.
- Summarize for the other teams what your team is up to -- what you've
done and what you want to do.
- Summarize for your own team what the other teams are up to. That
is, here is one way to solve the n-to-n communication scaling problem.
- Solve problems inside your team when you can, and when you can't,
escalate them to get help from the other teams. That is, part of the
team responsibility is to help the other teams when they have problems
they can't solve internally. As opposed to turning me into the central
manager for everybody -- one day we might have a dedicated operations
director who magically fills that role, but we're not there right now,
and we're probably going to be happier if we're better at handling
issues as a team of teams.
- Maintain the roadmaps for your team, including brainstorming things
you should do that funders would pay for, and helping to frame these
for funders so it's clear why they should. Some teams will do their
own grantwriting, whereas other teams aren't set up right now for being
good at it themselves. I'd like to resist having a separate 'fundraising
team', since that's a great way for teams to pretend that it's somebody
else's problem. This topic also ties into our general "how we want to
get funded" discussions -- in the future it can't all be writing grants.
In the past we've gone to new funders with peripheral (experimental)
projects, which has been risky because we don't always put the
organizational resources behind them to ensure their success. I think
our better strategy in the future is to do more fundraising by the
core projects, and use this funding to do the peripheral experimental
projects. For example, raise money for Tor Browser to generalize Tor
Launcher to make it easier to build things like Tor Messenger. More on
this topic later.
- One thing that's missing in this plan is the more traditional
"manager" roles: doing intra-team performance reviews, identifying
when people aren't pulling their weight, working to resolve issues
like this. I worry that doubling up the roles will, in Karsten's words,
"change the character of the team idea from a supporting structure to
a power structure." Is our best plan there to continue stalling until
we get the operations team more up to speed? Input here would be great.
(A supporting structure is still helpful here, because it gives more
chances to answer the question "What is so-and-so doing?")
Next week (June 4-6) some of us are getting together in Boston to discuss
structure among other topics. Somebody from each team will be there. So
please discuss amongst your team if there's some outcome or direction
you want us to be sure to include.
--Roger
----- End forwarded message -----
[View Less]
If you have been doing something exciting lately (I know many of you
have!), consider writing it up as a FOCI submission.
If you need help figuring out what to write, or what would be a good
submission, etc, let me or others know and we'll try to help. Also if
you've done a cool thing but don't have time to write it all up, you
might be able to team up with some academics here who would help with
the writing-up.
See recent FOCI programs here:
https://www.usenix.org/conference/foci15/workshop-…
[View More]programhttps://www.usenix.org/conference/foci14/workshop-programhttps://www.usenix.org/conference/foci13/workshop-program
--Roger
----- Forwarded message from Prateek Mittal <pmittal(a)princeton.edu> -----
Date: Mon, 21 Mar 2016 17:03:16 -0400
From: Prateek Mittal <pmittal(a)princeton.edu>
To: Roger Dingledine <arma(a)mit.edu>, Nick Mathewson <nickm(a)freehaven.net>, Mike
Perry <mikeperry(a)fscked.org>, karsten(a)torproject.org
Cc: Amir Houmansadr <amir(a)cs.umass.edu>, FOCI '16 Program Co-Chairs
<foci16chairs(a)usenix.org>, Sandy Ordonez <sandra(a)opentechfund.org>
Subject: Submit to FOCI '16?
Hi Roger, Nick, Mike, Karsten,
Hope things are well. Given exciting recent developments across the Tor
ecosystem, we are writing to encourage you (and your colleagues) to submit
your work to this year???s Workshop on Free and Open Communications on the
Internet (FOCI '16). FOCI 2016 will be co-located with USENIX Security in
Austin, TX on August 8 2016.
This year, we're looking for six-page papers on any aspect of freedom of
communications on the Internet, ranging from technical research on
circumventing or measuring censorship, to research at the intersection of
policy, regulation, social science and law. (For example, new Tor
mechanisms -- both planned and deployed, new threats facing Tor, and
experience + roadmap papers could all be a great fit.)
https://www.usenix.org/conference/foci16
<https://www.usenix.org/conference/foci16>The submission deadline is May 2.
Also, if you know anybody else who should know about it, please help us
spread the word.
Thanks!
Amir and Prateek (Co-Chairs)
--
Prateek Mittal
Assistant Professor
Princeton University
http://www.princeton.edu/~pmittal/
----- End forwarded message -----
[View Less]