I was invited to go to Twitter and talk about Sheharbano's, Sadia's, Mobin's, Srikanth's, Vern's, Steven's, Damon's, and my research about web sites blocking Tor users: https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
I'm not a Twitter user, beyond sometimes reading the web interface, so I haven't experienced blocking myself. But I've heard of Tor users being blocked by Twitter. Is there anything you'd like me to say to or ask of them? I know about the #dontblocktor hashtag (which is more often directed at CloudFlare than Twitter); I know that Leif was off Twitter for a while; I know about Marie's survey of users at https://pad.systemli.org/p/twitterdontblocktor. Anything else?
On Thu, Mar 17, 2016 at 02:58:28PM -0700, David Fifield wrote:
I was invited to go to Twitter and talk about Sheharbano's, Sadia's, Mobin's, Srikanth's, Vern's, Steven's, Damon's, and my research about web sites blocking Tor users: https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
Awesome!
I'm not a Twitter user, beyond sometimes reading the web interface, so I haven't experienced blocking myself. But I've heard of Tor users being blocked by Twitter. Is there anything you'd like me to say to or ask of them? I know about the #dontblocktor hashtag (which is more often directed at CloudFlare than Twitter); I know that Leif was off Twitter for a while; I know about Marie's survey of users at https://pad.systemli.org/p/twitterdontblocktor. Anything else?
Isabela and I went there and met with Michael Coates back in December.
Some of the topics we covered then (and you should be sure to re-cover if they make sense to you):
- Facebook managed to get a lot more internal support once they did an internal study about just how many Facebook users they had using Tor (answer: a whole heck of a lot). I would bet that Twitter could gain ammunition internally by doing a similar study. They could re-use the bulkexitlist tools in some way to distinguish which connections are coming via Tor.
- This same mechanism on their side could let them track whether and when they are challenging Tor users with phone number requests or the like. There are many anecdotes around that topic but not so many facts, and they have actual facts they could look at.
- They should set up an onion address for Twitter (seriously, why are they so behind the times?)
- Isabela pointed out to them that the Twitter android app had dangerously broken proxy support, meaning it was bypassing its proxy settings sometimes. I wonder how that fix is going.
- If you are interested, you might help them line up "country X blocked twitter" events with our metrics graphs of Tor usage in that country, to see if there are cool graphs there.
I encourage other people here to list (productive) things we should want from Twitter too.
--Roger
On Thu, Mar 17, 2016 at 06:13:27PM -0400, Roger Dingledine wrote:
- They should set up an onion address for Twitter (seriously, why are
they so behind the times?)
They've been implementing important new features like Moments and lightboxes, of course.
- Isabela pointed out to them that the Twitter android app had dangerously
broken proxy support, meaning it was bypassing its proxy settings sometimes. I wonder how that fix is going.
I'll note that the Twitter Android app has actually gotten markedly worse from this perspective recently; it now embeds a web preview with unclear behavior WRT proxy settings which you can't skip when following a link in a tweet, and then "open in browser" forces Chrome; it used to be possible to go directly to OrFox.
On Wed, 30 Mar 2016 12:40:07 +0000 Andrea Shepard andrea@torproject.org wrote:
On Thu, Mar 17, 2016 at 06:13:27PM -0400, Roger Dingledine wrote:
- They should set up an onion address for Twitter (seriously, why
are they so behind the times?)
They've been implementing important new features like Moments and lightboxes, of course.
Changing the like icon to a heart costed millions in VC money and engineering man hours as well.
This may or may not be helpful, but all the way back in 2014, Isa worked on a fix for this while still at Twitter. We met up at HOPE and discussed concerns on both sides a bit, and talked about how to incorporate the exit lists into their firewall. This was the first time the problem was fixed.
The problem reappeared after a couple of months, so the fix was clearly not permanent. The second time I spoke with various people at Twitter and again there was discussion of how to keep the whitelist/greylist up-to-date, how to compliment twitter's existing report/behavior detection system, and how restricting access from Tor IPs disproportionately affects censored Twitter users (Turkey's block was still pretty fresh on people's minds).
All in all, there were three or so rounds of Twitter blocking discussion between me and various Twitter peeps. I'd say that the three problems that surfaced in these discussions were a) lack of "problem ownership" on either side, b) lack of awareness of the problem on Twitter's side (everyone always spoke as if the problem were new, that they'd never heard of it etc), c) Twitter repeatedly implementing fixes and then either not updating them or forgetting about them entirely. Automation is very straightforward, at least for importing the list of exits.
You're in a better position than really any other Tor-affiliated person, since you've been invited. So, I'm pretty optimistic about a long-term fix.
best, Griffin
* caveat: Isa knew about the problem and already had a solid idea for a fix. Now she works for Tor :-) Coincidence!!!
-- Sent from my phone. How many NSA programs is that? "The E in email stands for Evidence." ~Willie Brown On Thu, Mar 17, 2016 at 5:58 PM, David Fifield < david@bamsoftware.com [david@bamsoftware.com] > wrote: I was invited to go to Twitter and talk about Sheharbano's, Sadia's, Mobin's, Srikanth's, Vern's, Steven's, Damon's, and my research about web sites blocking Tor users: https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
I'm not a Twitter user, beyond sometimes reading the web interface, so I haven't experienced blocking myself. But I've heard of Tor users being blocked by Twitter. Is there anything you'd like me to say to or ask of them? I know about the #dontblocktor hashtag (which is more often directed at CloudFlare than Twitter); I know that Leif was off Twitter for a while; I know about Marie's survey of users at https://pad.systemli.org/p/twitterdontblocktor. Anything else? _______________________________________________ tor-project mailing list tor-project@lists.torproject.org https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-project
On Mar 17, 2016, at 2:58 PM, David Fifield david@bamsoftware.com wrote:
I was invited to go to Twitter and talk about Sheharbano's, Sadia's, Mobin's, Srikanth's, Vern's, Steven's, Damon's, and my research about web sites blocking Tor users: https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
I'm not a Twitter user, beyond sometimes reading the web interface, so I haven't experienced blocking myself. But I've heard of Tor users being blocked by Twitter. Is there anything you'd like me to say to or ask of them? I know about the #dontblocktor hashtag (which is more often directed at CloudFlare than Twitter); I know that Leif was off Twitter for a while; I know about Marie's survey of users at https://pad.systemli.org/p/twitterdontblocktor. Anything else?
Not directly related, but maybe give them a heads up that Tor Messenger now supports OTR over Twitter DMs. I'm slightly concerned that the encrypted messages may be flagged as spam.
https://blog.torproject.org/blog/tor-messenger-010b5-released
On Thu, Mar 17, 2016 at 02:58:28PM -0700, David Fifield wrote:
I was invited to go to Twitter and talk about Sheharbano's, Sadia's, Mobin's, Srikanth's, Vern's, Steven's, Damon's, and my research about web sites blocking Tor users: https://www.benthamsgaze.org/2016/02/23/do-you-see-what-i-see/
I'm not a Twitter user, beyond sometimes reading the web interface, so I haven't experienced blocking myself. But I've heard of Tor users being blocked by Twitter. Is there anything you'd like me to say to or ask of them? I know about the #dontblocktor hashtag (which is more often directed at CloudFlare than Twitter); I know that Leif was off Twitter for a while; I know about Marie's survey of users at https://pad.systemli.org/p/twitterdontblocktor. Anything else?
Thanks, everyone, for your suggestions. Sadia and I visited Twitter yesterday and we brought up the issues you mentioned. Here is the summary email we sent them afterward.
----
This is the mailing list thread where we asked what messages Tor people had for Twitter: https://lists.torproject.org/pipermail/tor-project/2016-March/000184.html
Here is a survey of some Twitter users, asking if they've ever encountered difficulties as a result of using Tor: https://pad.systemli.org/p/twitterdontblocktor
Our paper and the presentation slides: https://www.eecs.berkeley.edu/~sa499/papers/ndss2016.pdf https://www.bamsoftware.com/talks/talk_ndss16_twitter.pdf Our code and data will eventually be linked from here: http://dx.doi.org/10.5522/00/5 But as I understand it, there's some snag with the university providing storage, so in the meantime you can just ask us for anything specific.
== Measuring Tor users ==
You can examine your past logs to see what fraction of sessions used Tor. The data source you want to use for this is: https://collector.torproject.org/#type-tordnsel https://collector.torproject.org/archive/exit-lists/ It contains records of this form: ExitNode 63BA28370F543D175173E414D5450590D73E22DC Published 2010-12-28 07:35:55 LastStatus 2010-12-28 08:10:11 ExitAddress 91.102.152.236 2010-12-28 07:10:30 ExitAddress 91.102.152.227 2010-12-28 10:35:30 The "ExitAddress" lines are determined by actually building circuits through the exit; i.e., they won't be fooled by exits that exit traffic on a different IP address than they accept Tor connections on.
To be especially rigorous, you would want to also consider each exit node's exit policy, to check whether it allows exiting to Twitter on ports you care about. Those exit nodes that do not, should not be considered "exit nodes" from Twitter's point of view. For that, you probably want network status documents, and join on the fingerprint field. But I would guess that effect is very small: it would only matter if someone had an exit that did not allow access to Twitter, but they themselves access Twitter (not through Tor) on the same IP address. https://collector.torproject.org/#type-network-status-consensus-3
This is the same process that powers the https://check.torproject.org/ online test that checks if you are using Tor, and the https://exonerator.torproject.org/ service that checks if an IP address was an exit in the past. For real-time checks, you'll want to have a process that continually refreshes the exit list from https://collector.torproject.org/recent/exit-lists/ (they are published hourly). There is documentation and source code for running the Check and Exonerator services: https://gitweb.torproject.org/check.git/tree/ https://gitweb.torproject.org/exonerator.git/tree/ Here is sample Python code that parses various Collector documents and outputs a list of IP addresses: https://gitweb.torproject.org/check.git/tree/scripts/exitips.py The output of the above code is available here (same format as the tordnsel documents): https://check.torproject.org/exit-addresses
For an easy interface to the above data sources (current data only, not historical), see Onionoo, a web service that serves JSON descriptions of the current network. https://onionoo.torproject.org/protocol.html This query, for example, has "exit_addresses" and "exit_policy" fields. https://onionoo.torproject.org/details?type=relay This is probably the easiest data source to use when prototyping.
== Running an onion service ==
This is a mailing list for the operators of onion services. Alec Muffett, who helps run Facebook's onion service, is on it. https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-onions Here's a blog post on the Facebook service from Tor's point of view. It touches on TLS certs for onion services: https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
== Censorship events ==
The https://metrics.torproject.org/ portal makes it easy to get graphs of the number of Tor users. The two that are probably most interesting to you are: https://metrics.torproject.org/userstats-relay-country.html https://metrics.torproject.org/userstats-bridge-country.html The "relay" graph is users connecting directly to Tor in the usual way. The "bridge" graph is mostly users who have a censored Internet, who have to use Tor pluggable transports to circumvent censorship. This is what we used to make the graphs of Tor users in Turkey during the Twitter block of 2014: http://www.bbc.com/news/world-europe-26677134 https://metrics.torproject.org/userstats-relay-country.html?start=2014-01-01... https://metrics.torproject.org/userstats-bridge-country.html?start=2014-01-0... The graphs depict the *average number of concurrent users* during the day, with numerous caveats. For more details, see: https://gitweb.torproject.org/metrics-web.git/tree/doc/users-q-and-a.txt
== Tor Messenger ==
We didn't talk about this yesterday, but you should know that the most recent release of Tor Messenger, an instant messaging client, support sending encrypted OTR messages over Twitter DMs. The developers hope that the ciphertext messages won't get blocked as spam. https://blog.torproject.org/blog/tor-messenger-010b5-released
tor-project@lists.torproject.org