[tor-reports] SponsorR October 2015 report

George Kadianakis desnacked at riseup.net
Wed Nov 4 23:01:12 UTC 2015


George Kadianakis <desnacked at riseup.net> writes:

> Hello,
>
> here is the October 2015 report for SponsorR:
>
> - The first bunch of hidden service statistics is now enabled by default.  The
>   feature was enabled in tor-0.2.7.3 and the coverage graphs have already
>   climbed slightly: https://metrics.torproject.org/hidserv-frac-reporting.html
>
>   The stats enabled are:
>     * The total number of unique hidden services:
>       Graph: https://metrics.torproject.org/hidserv-dir-onions-seen.html
>     * The total volume of hidden service traffic on the network:
>       Graph: https://metrics.torproject.org/hidserv-rend-relayed-cells.html
>
> - As part of our larger statistical efforts, we did another security and privacy
>   evaluation of the above stats to ensure that the obfuscatory noise we are
>   adding is indeed completely covering the tracks of individual users.
>
>   We performed the evaluation by extracting all the hidden service statistics
>   values that were reported by relays over the month of September. Then we
>   manually inspected them to see that the noise we are adding is significantly
>   affecting the reports of relays. A more detailed analysis can be found here:
>      https://trac.torproject.org/projects/tor/ticket/15254#comment:33
>
>   We invite people to use or even expand our dataset to evaluate the privacy of
>   our statistics.
>
> - We also improved on the HSDir health tool that tracks the health of the HSDir
>   subsystem and the correctness of descriptor uploading by hidden services:
>      https://gitlab.com/hs-health/hs-health/blob/master/design.md
>
>   You can now see its results updated in real time:
>      http://ygzf7uqcusp4ayjs.onion/tor-health/tor-health/index.html
>
> - As part of our efforts to engage the research community, we met with UCL
>   researchers and students who have interest in anonymity-related topics like
>   hidden services, private statistics, and mixnets. We discussed ideas regarding
>   guard node security, detecting active end-to-end correlation attacks and
>   hidden service scaling techniques.
>
> - To further lubricate the research community, we published a document
>   describing the current status of open hidden service proposals. We also
>   provided a brief summary for each proposal so that researchers and developers
>   can get up to date faster:
>      https://lists.torproject.org/pipermail/torz-dev/2015-October/009762.html2
>

Oops. The link here should have been:
     https://lists.torproject.org/pipermail/tor-dev/2015-October/009762.html

Sorry about that!



More information about the tor-reports mailing list