[tor-project] Tor Browser team meeting notes, 9 September 2019

Georg Koppen gk at torproject.org
Tue Sep 10 13:22:00 UTC 2019


We held our weekly Tor Browser meeting yesterday in #tor-meeting2. Here
is the IRC log:


and below are the notes from our meeting pad:

    - Do we have an estimate of how many Tor Browser alpha users there
are? (mcs) (GeKo: not really. but we could try to find out. boklm
volunteered to file a ticket for the metrics folks)

     Last week:
         - sent monthly report to tor-project (this time for July and
         - helped with the alpha release (so far nothing exploded, good!)
         - helped getting 8.5.6 out (looked into #31616 over the weekend)
         - made progress on #31538: it feels we are close to tracking
the issue down, wish me luck ;)
         - made progress on #30429
         - set up macOS system for #30126
         - wrote patches for #31450, #31621, #27493 and started to work
on #31584
         - reviewed #28822, #31598, #30384, #31457, #31562
     This week:
         - Bug 30126: Apple notarization
         - Bug 31538: Windows reproducibility
         - moar reviews
         - #31597 (Mozilla bug review for bugs squashed between Firefox
         - finish missing pieces for #30429

 - Worked on the wasm bug:
   - Think I have it close enough to finish this week.

mcs and brade:
    Last week:
        - #31457 (disable per-installation profiles).
            - Created patch which has been reviewed and merged by gk
        - #30126 (Make Tor Browser on macOS compatible with Apple's
            - Discussed next steps with gk.
            - Installed macOS 10.15 beta to a USB hard drive to use for
     This week/upcoming:
        - #31607 (App menu items stop working).
        - #31491 (clean up the old meek http helper browser profiles).
        - Testing for #30126 (Make Tor Browser on macOS compatible with
Apple's notarization).
        - Work on other tbb-9.0-must-alpha tickets as time permits,
        - Reminder: we have vacation planned for the week of September 23rd.

    Last week:
        - Helped publish new releases
        - Worked on #31448 (gold and lld break linking 32bit Linux
bundles we need to resort to bfd)
        - Reviewed https://github.com/torproject/support/issues/12
        - Started looking at #31646 (Update abicheck to require newer
    This week:
         - Some reviews:

       - #31596 (Bump mingw-w64 version to pick up fix for #31567),

       - #31450 (Still use GCC for 64bit Linux debug builds after switch
to 68 ESR),

       - #31621 (Fix node bug that makes large writes to stdout fail),

       - #31641 (Provide link to Tor Browser for Android alpha on our
alpha download page)

      - Work on #31448 (gold and lld break linking 32bit Linux bundles
we need to resort to bfd) and other tbb-9.0-must-alpha toolchain tickets

      - Open a ticket to add alpha users update pings to metrics graphs

    Last Week:
  - #31564: Android bundles not reproducible - poor google
documentation, key repo with google vendor code not available is blocker
for this approach. Tested out apktool as way forward. Initial results
look good, Any objections to moving forward with this? (GeKo: sounds
good, but let's use the apktool as it comes with Debian as that saves us

    This week

  - #31564: Add decompile/recompile of resource apks to project build.
  - #31568: Gradle how-to
  - open tickets for tor-android-service patches

    Last week:
        - browser privacy meetup, will post my notes somewhere later today
    This week:
        - pick back up #31286

            - review build for y'all to see the mocked UX

            - rebase to latest, assuming I can get the local linux build
toolchain working

    Last week:
        - Fix onboarding regressions + address review comments (#28822).
        - #31562  - The circuit display is not visible on error pages in
Tor Browser based on ESR68
        - #31575  - Firefox is phoning home during start-up in Tor
Browser based on ESR 68 (needs review)
        - #30662 - Make sure about:newtab is blank (needs review)
        - #31601 - Don't let Mozilla recommend extensions again (needs
    This week:
        - #26345 - Finish Disable tracking protection UI in FF67-esr
        - There are still requests to mozillla (apart from
activity-stream), investigate. (tjr: what're they?) (acat: i don't
remember, I think the stack trace of the request pointed to some Updater
telemetry file? But it came from RemoteSettingsClient.js, so probably
worth checking for all usages of that). (tjr: Ah, this is Kinto/Remote
Settings.  Could be addon/gpu blocklist, or onecrl, or crlite, or
intermediate preloading... many things use remote settings.)
        - Work on other tbb-9.0-must-alpha tickets.
        - Investigate if serviceworkers can still see localized msgs in
        - Maybe do a bit of mozilla upstream backlog (e.g. 30683).


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20190910/fbdca7e5/attachment.sig>

More information about the tor-project mailing list