Tor Weekly News — January 8th, 2013

Lunar lunar at torproject.org
Wed Jan 8 13:14:34 UTC 2014


========================================================================
Tor Weekly News                                        January 8th, 2013
========================================================================

Welcome to the first issue for the year 2014 of Tor Weekly News, the
weekly newsletter that covers what is happening in the impressive Tor
community. The tor-news mailing list has reached a thousand subscribers.
Thanks for following us!

Tor at the 30th Chaos Communication Congress
--------------------------------------------

The Chaos Computer Club held its thirtieth congress [1] in Hamburg,
Germany during the days and nights of December 26th-30th. The congress
had over 9,000 participants. The topic of pervasive surveillance was
more present than ever, and Tor was a common answer to many questions.

   [1] https://events.ccc.de/congress/2013/

“We are living in interesting times” was the subtitle of Jacob Appelbaum
and Roger Dingledine’s talk for this year [2]. Their tour of what
happened to Tor in the past years and more importantly in the past
months was seen by more than 3,000 attendees in Hamburg and a couple
more from the live stream and recordings. Later on, Sophie Bayerlein had
decorated a wall with her visual summary of the talk [3].

   [2] http://media.ccc.de/browse/congress/2013/30C3_-_5423_-_en_-_saal_1_-_201312272030_-_the_tor_network_-_jacob_-_arma.html
   [3] https://events.ccc.de/congress/2013/wiki/Projects:VisualNotes#The_TOR_Project

The talk was quickly followed by a “How to help Tor?” workshop. Lunar
reported [4] “an overwhelming success as more than 200 people showed up.
We were not prepared for helping so many folks waiting to learn how they
can help Tor. It still created interesting discussions, I believe, and I
hope we will find ways to interact more with the larger community in the
upcoming weeks, especially concerning outreach to the general public.”

   [4] https://lists.torproject.org/pipermail/tor-reports/2014-January/000420.html

Earlier the same day, a meetup of Tor relay operators was held. The
small room was packed with at least 60-70 attendees. Several relay
operator organizations reported on their progress: DFRI [5], Frënn vun
der Ënn, Icetor [6], Noisetor, Nos oignons [7], Swiss Privacy
Foundation [8] and Zwiebelfreunde. Many of these projects did not exist
last year, and new organizations are still being created, like The
Torrorists [9] who also gave a quick status update. Nikita Borisov gave
a quick presentation of the traceroute research experiment [10] and
encouraged more operators to run the test script. Several operators of
important relays and directory authorities also assisted the session.
Let’s hope everyone shared the same feelings as Jason from Icetor: “It
was really excellent meeting all of you and great for my morale to see
all the people understanding and working towards common goals. Perhaps
it’s just due to my remoteness, but I rarely get to discuss projects
like this at such an intricate level.”

   [5] https://www.dfri.se/wiki/20131227-DFRI.pdf
   [6] http://icetor.is/slides/icetor-relay-slides.pdf
   [7] https://nos-oignons.net/Pr%C3%A9sentations/30C3/2013-12-27-30C3-Tor_relay_ops-Nos-oignons.pdf
   [8] http://www.privacyfoundation.ch/assets/files/presentation_association_20131227.pdf
   [9] http://www.torrorists.de/
  [10] http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html

On the lightning talks front, Kai Engert presented DetecTor [11,12,13],
David Fifield covered the basics of Tor pluggable transports [14], and
Michael Zeltner introduced tor2tcp [15,16]. Some OnionCat [17]
developers have also been spotted in the corridors.

  [11] http://detector.io/
  [12] Slides:
       https://events.ccc.de/congress/2013/wiki/images/1/1b/LT-Day_3-14.45-DetecTor.IO.pdf
  [13] Video:
       http://media.ccc.de/browse/congress/2013/30C3_-_5563_-_en_-_saal_g_-_201312291245_-_lightning_talks_day_3_-_nickfarr.html
       at 1:56:25
  [14] https://www.bamsoftware.com/talks/30c3-pt/
  [15] https://poum.niij.org/
  [16] Video:
       http://media.ccc.de/browse/congress/2013/30C3_-_5564_-_en_-_saal_g_-_201312301245_-_lightning_talks_day_4_-_nickfarr.html
       at 1:41:00
  [17] https://www.onioncat.org/

The Chaos Communication Congress is one of the rare events where an
impressive number of members of the Tor community have a chance to
interact. Let’s hope it has been a fruitful time for everyone!

Tor website needs your help!
----------------------------

One of the outcomes of the “How to help Tor?” session at the 30C3 was
that there were quite some people interested in helping the Tor project
with its website. In order to foster anyone’s participation, a larger
call for help [18] has been sent.

It starts by acknowledging that “Tor has shifted in the recent years
from being a project prominently used by researchers, developers, and
security experts to the wider audience of anyone concerned about their
privacy”. As its primary audience shifted, “it is again time for
important changes” to the website structure and design.

As one can read in the call or browse through the website related
tickets [19], it’s going to be a challenging task. A new mailing list
has been created [20] to coordinate the efforts. Join if you want to
help!

  [18] https://blog.torproject.org/blog/tor-website-needs-your-help
  [19] https://trac.torproject.org/projects/tor/query?component=Website&order=status
  [20] https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team

Monthly status reports for December 2013
----------------------------------------

The wave of regular monthly reports from Tor project members for the
month of December has begun. Philipp Winter released his report
first [21], followed by reports from Pearl Crescent [22], Sherief
Alaa [23], Colin C. [24], Damian Johnson [25], Tor’s help desk [26],
Lunar [4], Karsten Loesing [27], Matt Pagan [28], Georg Koppen [29],
Ximin Luo [30], Nick Mathewson [31], and Nicolas Vigier [32].

  [21] https://lists.torproject.org/pipermail/tor-reports/2013-December/000414.html
  [22] https://lists.torproject.org/pipermail/tor-reports/2013-December/000415.html
  [23] https://lists.torproject.org/pipermail/tor-reports/2014-January/000416.html
  [24] https://lists.torproject.org/pipermail/tor-reports/2014-January/000417.html
  [25] https://lists.torproject.org/pipermail/tor-reports/2014-January/000418.html
  [26] https://lists.torproject.org/pipermail/tor-reports/2014-January/000419.html
  [27] https://lists.torproject.org/pipermail/tor-reports/2014-January/000421.html
  [28] https://lists.torproject.org/pipermail/tor-reports/2014-January/000422.html
  [29] https://lists.torproject.org/pipermail/tor-reports/2014-January/000423.html
  [30] https://lists.torproject.org/pipermail/tor-reports/2014-January/000424.html
  [31] https://lists.torproject.org/pipermail/tor-reports/2014-January/000425.html
  [32] https://lists.torproject.org/pipermail/tor-reports/2014-January/000426.html

Miscellaneous news
------------------

Anthony G. Basile released version 20131230 of Tor-ramdisk [33] — a
uClibc-based micro Linux distribution whose only purpose is to host a
Tor server — with an updated Linux kernel and Tor 0.2.4.20.

  [33] https://lists.torproject.org/pipermail/tor-talk/2014-January/031625.html

Gregory Maxwell started discussion on how to improve Hidden Services key
management [34]: “It would be preferable if it were possible to have a
HS master key which was kept _offline_ which could be use to authorize
use for some time period and/or revoke usage.” As Nick Mathewson pointed
out [35], the timing is right and such issues have a chance to be
addressed with the current redesign process [36,37].

  [34] https://lists.torproject.org/pipermail/tor-talk/2013-December/031533.html
  [35] https://lists.torproject.org/pipermail/tor-talk/2013-December/031546.html
  [36] https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/220-ecc-id-keys.txt
  [37] https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/224-rend-spec-ng.txt

The Tails team has announced: “The MAC address spoofing feature is ready
for testing. This feature prevents geographical tracking of your network
devices (and by extension, you) by randomizing their MAC addresses.”
Testing on a variety of hardware is now needed, give it a try [38]!

  [38] https://tails.boum.org/news/spoof-mac/

The next Tails contributor online meeting [39] will be held January 9th
on the IRC channel #tails-dev (OFTC) at 21:00 UTC.

  [39] https://mailman.boum.org/pipermail/tails-dev/2014-January/004627.html

The “test/rjb-migration” branch has been merged into the Tails
development tree [40]. It should now be fairly straightforward to run
the automated test suite on a Debian Wheezy system.

  [40] https://mailman.boum.org/pipermail/tails-dev/2013-December/004562.html

The Tor Project’s website has gained another new mirror, thanks PW [41]!

  [41] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000427.html

Johannes Fürmann asked [42] the relay operators community to review a
short documentation [43] on how to run multiple Tor processes on one
host.

  [42] https://lists.torproject.org/pipermail/tor-relays/2014-January/003564.html
  [43] https://gist.github.com/waaaaargh/8271499

Some users have been tricked into downloading malware from the
Torzip.com domain. Action is on-going [44] to shutdown the domain. In
the meantime, watch out!

  [44] https://bugs.torproject.org/10529

Tor help desk roundup
---------------------

Multiple people have now asked the help desk for support using the Tor
Browser on Windows RT. Windows RT is a new edition of Windows 8.1
designed for ARM devices like the Microsoft Surface. There is no
supported way of using Tor on Microsoft RT.

Many people have been emailing the help desk to ask how to get a new
identity or set up a relay now that Vidalia is no longer included in the
Tor Browser package. Vidalia is still available as a standalone
package [45]. More information on the transition away from Vidalia can
be found on the Tor Browser 3 FAQ wiki page [46].

  [45] https://people.torproject.org/~erinn/vidalia-standalone-bundles/
  [46] https://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ

Upcoming events
---------------

Jan 13-15 | Tor @ Real World Crypto 2014
          | New York City, USA
          | https://realworldcrypto.wordpress.com/
          |
Jan 14    | Roger @ NSF WATCH Seminar Series
          | Arlington, VA, USA
          | http://www.nsf.gov/cise/cns/watch/


This issue of Tor Weekly News has been assembled by Lunar, Matt Pagan,
dope457, Sandeep, weasel, rey, murb and nicoo.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [47], write down your
name and subscribe to the team mailing list [48] if you want to
get involved!

  [47] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [48] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.torproject.org/pipermail/tor-news/attachments/20140108/c3cc83a6/attachment.sig>


More information about the tor-news mailing list