Changes between Version 37 and Version 38 of TorWeeklyNews/2013/20


Ignore:
Timestamp:
Nov 20, 2013, 3:03:49 PM (5 years ago)
Author:
lunar
Comment:

sent (and I shouldn't have to cover !)

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2013/20

    v37 v38  
    33'''Editor: dope457'''
    44
    5 '''Status:''' FROZEN! Only technical and language fixes are now accepted. New items should go on [wiki:TorWeeklyNews/2013/21 next week's edition]. Expected publication time 2013-11-20 12:00 UTC.
    6 
    7 '''Subject:''' Tor Weekly News — November 20th, 2013
    8 
    9 {{{
    10 ========================================================================
    11 Tor Weekly News                                      November 20th, 2013
    12 ========================================================================
    13 
    14 Welcome to the twenty-first issue of Tor Weekly News, the weekly
    15 newsletter that covers what is happening in the Tor community.
    16 
    17 tor 0.2.4.18-rc is out
    18 ----------------------
    19 
    20 On the 16th of November, Roger Dingledine released the fourth release
    21 candidate for the tor 0.2.4.x series [1]. As Roger puts it: “It takes a
    22 variety of fixes from the 0.2.5.x branch to improve stability,
    23 performance, and better handling of edge cases.” Readers curious for
    24 more details can look at the announcement for the complete list of
    25 changes.
    26 
    27 The source is available [2] as well as updated Debian packages [3]. All
    28 relay operators should upgrade. Updated Tor Browser Bundles are in the
    29 making and should be available shortly.
    30 
    31    [1] https://lists.torproject.org/pipermail/tor-talk/2013-November/031110.html
    32    [2] https://www.torproject.org/dist/
    33    [3] https://www.torproject.org/docs/debian.html#development
    34 
    35 USB Sticks for Tails
    36 --------------------
    37 
    38 It is often recommended to run Tails from a read-only medium in order to
    39 prevent any malware to permanently mess with the system. “CD is best,
    40 but many devices these days don’t have an optical drive, and handling
    41 CDs is not as convenient as a USB stick” wrote Moritz Bartl on
    42 tor-talk [4].
    43 
    44 It looks like one of the very few specific brand of USB sticks available
    45 in Germany that had a proper hardware protection switch can no longer be
    46 used to boot Tails. Moritz ended up contacting various Chinese
    47 suppliers. “Even there, the selection of sticks with write protection is
    48 very limited” but eventually one model was found acceptable. Moritz
    49 intend to re-sell a bulk of them at the upcoming 30C3 in Hamburg [5].
    50 
    51 Feel free to join the discussion or contact Moritz privately for more
    52 details.
    53 
    54    [4] https://lists.torproject.org/pipermail/tor-talk/2013-November/031092.html
    55    [5] https://events.ccc.de/congress/2013/
    56 
    57 New version of check.torproject.org
    58 -----------------------------------
    59 
    60 On the 15th of November, regular users of the Tor Browser Bundle have
    61 probably noticed a change in their preferred welcome page. Andrew Lewman
    62 had just switched check.torproject.org to a new version [6] written by
    63 Arlo Breault in Go [7]. The new codebase [8] should allow the service to
    64 better handle the increasingly high number of connections. Several
    65 fixes [9] were also made during the reimplementation regarding wording,
    66 translations and other meaningful details.
    67 
    68 Please report any issues you encounter to the “Tor Check” component of
    69 the Tor bug tracker.
    70 
    71    [6] https://lists.torproject.org/pipermail/tor-talk/2013-November/031126.html
    72    [7] https://bugs.torproject.org/9529
    73    [8] https://gitweb.torproject.org/check.git
    74    [9] https://trac.torproject.org/projects/tor/query?status=closed&changetime=2013-11-15..&component=Tor+Check
    75 
    76 Current state of the proposals
    77 ------------------------------
    78 
    79 In 2007, Tor developers settled on a formal process for changes in Tor
    80 specifications or other major changes [10]. At this heart of this
    81 process in the “proposal” documents that are discussed on the tor-dev
    82 mailing list [11] and archived in the “torspec” Git repository [12].
    83 
    84 Last week, Nick Mathewson took a closer look at what have changed since
    85 the last round up [13] he did in June last year. Since then [14], 16
    86 proposals has been implemented in tor 0.2.3, 0.2.4 and 0.2.5 and two
    87 have been superseded or deemed unhelpful.
    88 
    89 Nick subsequently posted [15] a review of all “open”, “needs-revision”,
    90 and “needs-research” proposals. They are many different tasks to be
    91 picked by someone who wishes to help Tor in these 42 proposals, be it by
    92 doing research, code, leading discussions or more in-depth analysis.
    93 
    94   [10] https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/001-process.txt
    95   [11] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
    96   [12] https://gitweb.torproject.org/torspec.git/tree/HEAD:/proposals
    97   [13] https://lists.torproject.org/pipermail/tor-dev/2012-June/003641.html
    98   [14] https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html
    99   [15] https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
    100 
    101 Miscellaneous news
    102 ------------------
    103 
    104 Radu Rădeanu came up with a workaround [16] for Tor users on Ubuntu
    105 13.10 which temporarily fixes keyboard bug in 64-bit Tor Browser Bundles
    106 when used in combination with IBus.
    107 
    108   [16] https://bugs.torproject.org/9353#comment:38
    109 
    110 Roger Dingledine calls for help [17] in the collection of the new Tor
    111 related articles in the press [18]. “According to the website [19] the
    112 last time there was a meaningful article about Tor was July 1st. This is
    113 very far from the case.” If you want to help, just edit the wiki
    114 page [20].
    115 
    116   [17] https://lists.torproject.org/pipermail/tor-talk/2013-November/031134.html
    117   [18] https://bugs.torproject.org/10182
    118   [19] https://www.torproject.org/press/press
    119   [20] https://trac.torproject.org/projects/tor/wiki/TorArticles
    120 
    121 Firefox 24 is soon going to replace version 17 as “stable” supported
    122 release by Mozilla. intrigeri has completed his work in updating Tails’
    123 browser to the point where it “is good enough for Tails 0.22” [21].
    124 Builds from the “feature/ff24” are available [22] for wider testing.
    125 
    126   [21] https://mailman.boum.org/pipermail/tails-dev/2013-November/004165.html
    127   [22] http://nightly.tails.boum.org/build_Tails_ISO_feature-ff24/
    128 
    129 Andreas Jonsson released [23] initial sandboxed version of the TBB 3.0
    130 series which is ready for testing [24]. This security feature should
    131 prevent an exploit from stealing user data : the Tor Browser will not be
    132 allowed to execute any programs, nor will it be allowed to read or
    133 modify data on disk except in the users “downloads”-folder and its own
    134 profile. The sandbox is currently only supported on OS X 10.9 “but
    135 making it work all the way down to 10.6 is not unlikely”.
    136 
    137   [23] https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
    138   [24] https://github.com/trams242/tor-browser-bundle
    139 
    140 Check Mike Perry’s october report to see what he has been up to in
    141 October [25].
    142 
    143   [25] https://lists.torproject.org/pipermail/tor-reports/2013-November/000384.html
    144 
    145 Tor Help Desk Roundup
    146 ---------------------
    147 
    148 Users have asked the help desk for support connecting to IRC through
    149 Tor. There are some guides on sending IRC traffic through Tor on the
    150 wiki [26,27]. Tails also comes with Pidgin preconfigured for IRC [28].
    151 However, it will not matter if the IRC client is correctly configured if
    152 the if the intended IRC network blocks all Tor users. For example, users
    153 trying to connect to synIRC through Tor will receive a message telling
    154 them their computer is part of a botnet.
    155 
    156   [26] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
    157   [27] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
    158   [28] https://tails.boum.org/doc/anonymous_internet/pidgin/
    159 
    160 Users will occasionally ask for support using Tor on ChromeOS. ChromeOS
    161 is based on Linux, so it is theoretically possible to run the Linux Tor
    162 Browser Bundle on ChromeOS. In practice, the Chromebook prevents users
    163 from executing new software on their computers without putting their
    164 Chromebook into developer mode, and making other modifications to their
    165 device [29]. Anyone who has successfully run the Tor Browser Bundle on
    166 ChromeOS is invited to describe their experiences on the Tor Project
    167 wiki. As of this writing, there is no documented way of running Tor
    168 Browser Bundle on ChromeOS.
    169 
    170   [29] http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
    171 
    172 Upcoming events
    173 ---------------
    174 
    175 Nov 20    | Tor’s New Offices — Open House
    176           | Cambridge, Massachusetts
    177           | https://blog.torproject.org/events/tors-new-cambridge-offices-open-house
    178           |
    179 Dec 27-30 | Tor @ 30th Chaos Communication Congress
    180           | Hamburg, Germany
    181           | https://events.ccc.de/congress/2013/
    182 
    183 
    184 This issue of Tor Weekly News has been assembled by Lunar, dope457,
    185 Matt Pagan, and Andreas Jonsson.
    186 
    187 Want to continue reading TWN? Please help us create this newsletter.
    188 We still need more volunteers to watch the Tor community and report
    189 important news. Please see the project page [30], write down your
    190 name and subscribe to the team mailing list [31] if you want to
    191 get involved!
    192 
    193   [30] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    194   [31] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
    195 }}}
     5'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2013-November/000021.html Sent!]