wiki:TorWeeklyNews/2014/12

Version 24 (modified by lunar, 7 years ago) (diff)

write about #11193

38th issue of Tor Weekly News. Covering what's happening from March 18th, 2014 to March 25th, 2014. To be released on March 26th, 2014.

Editor:

Subject: Tor Weekly News — March 26th, 2014

========================================================================
Tor Weekly News                                         March 26th, 2014
========================================================================

Welcome to the twelfth issue of Tor Weekly News in 2014, the weekly
newsletter that covers what is happening in the XXX Tor community.

Tor 0.2.5.3-alpha is out
------------------------

Nick Mathewson cut a new release of the development branch of Tor [XXX]
on March 23rd: “Tor 0.2.5.3-alpha includes all the fixes from
0.2.4.21. It contains two new anti-DoS features for Tor relays, resolves
a bug that kept SOCKS5 support for IPv6 from working, fixes several
annoying usability issues for bridge users, and removes more old code
for unused directory formats.”

This release also marks a first step toward the stabilization of
Tor 0.2.5 as from now on “no feature patches not already written will
be considered for inclusion”.

The source is available at the usual location [XXX], just like
updated binary packages.

 [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032448.html
 [XXX]: https://www.torproject.org/dist/

Tails 0.23 is out…
------------------

… but many Tails users are already running it.  Now that incremental
upgrades have been turned on by default with the previous release,
users of Tails on USB sticks have been able to enjoy the process
of smooth upgrade in three clicks.

As always, the new release [XXX] fix several security holes [XXX]. That
alone should make anyone switch. But the new version finally brings two
long awaited features and many small improvements.

Tails will now do “MAC spoofing” by default. To hide the hardware
address used on the local network, Tails will now use a randomized
address by default. This will help to prevent the tracking of one's
geographical location accross networks. For more information about MAC
spoofing, why it matters and when it might be relevant to turn it off,
be sure to read the very well written documentation [XXX].

Another important feature is the integrated support for proxies and Tor
bridges. This should vastly help users to use Tails on censored
networks. The integration is done by using the Tor Launcher
extension [XXX], familiar to everyone who used recent versions of
the Tor Browser.

For examples of smaller features and bugfixes: Tor, obfsproxy, I2P,
Pidgin and the web browser have been upgraded, a 64-bit kernel is used
on most systems to pave the way for UEFI support, documentation is
now accessible from the greeter, and the “New identity” option in the
browser is available again.

The next Tails release is scheduled on April 29th and will be 1.0.
For this important milestone in 5 years of intense work, the Tails
team is still looking for a logo [XXX].

 [XXX]: https://tails.boum.org/news/version_0.23/
 [XXX]: https://tails.boum.org/security/Numerous_security_holes_in_0.22.1/
 [XXX]: https://tails.boum.org/doc/first_steps/startup_options/mac_spoofing/
 [XXX]: https://gitweb.torproject.org/tor-launcher.git
 [XXX]: https://tails.boum.org/news/logo_contest/

New Tor Browser releases
------------------------

The Tor Browser team has made two new releases based on Firefox
24.4.0esr [XXX].  Version 3.5.3 [XXX] is meant as a safe upgrade for
every Tor Browser users.  Among other changes, the new version also
contains an updated Tor, a fix for a potential freeze, a fix for
the Ubuntu keyboard issue and breach a disk leaks for videos.

On top of the previous changes, version 3.6-beta-1 [XXX] is the
completion of months long efforts for seamless integration of pluggable
transports [XXX] in the Tor Browser. In the network settings, users can
now choose the “Connect with provided bridges” and pick one of
“obfs3” [XXX], “fte” [XXX] or “flashproxy” [XXX]. Entering custom
bridges is indeed supported and will work for direct, obfs2 and obfs3
bridges.

Other usability changes include wording improvements on the connection
wizard, translatable Tor status messages, and the usage of disk image
(DMG) instead of ZIP archives for Mac OS X. 

Upgrade in any cases, and consider helping to iron out the remaining
issues off the 3.6 branch.

 [XXX]: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox24.4
 [XXX]: https://blog.torproject.org/blog/tor-browser-353-released
 [XXX]: https://blog.torproject.org/blog/tor-browser-36-beta-1-released
 [XXX]: https://www.torproject.org/docs/pluggable-transports.html
 [XXX]: https://gitweb.torproject.org/pluggable-transports/obfsproxy.git/blob/refs/heads/master:/doc/obfs3/obfs3-protocol-spec.txt
 [XXX]: https://fteproxy.org/
 [XXX]: https://crypto.stanford.edu/flashproxy/

Miscellaneous news
------------------

Since the 3.5 release, “Tor Browser Bundle is more like a
standalone browser and less like a bundle”. This lead the Tor
Browser team to plan to “rename it to just ‘Tor Browser’ everywhere” [XXX].

 [XXX]: https://bugs.torproject.org/11193

Thanks to Berkay [XXX] and to André Schulz [XXX] for running mirrors of
the Tor Project website!

 [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000491.html
 [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000492.html

Connections to Twitter from inside Turkey were blocked by the Turkish
government on 20th March, leading to an increase in the number of Tor
users there [XXX].

 [XXX]: https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2014-01-01&end=2014-03-23&country=tr&events=off#userstats-relay-country

Tor help desk roundup
---------------------

Users sometimes want to know how to transfer their bookmarks from an old Tor 
Browser to an updated one. Mozilla provides instructions on how to do this
on their website [XXX].

 [XXX]: http://support.mozilla.org/en-US/kb/export-firefox-bookmarks-to-backup-or-transfer

Upcoming events
---------------

Mar 28 17:00 UTC | Pluggable transports online meeting
                 | #tor-dev OFTC
                 |
Mar 28 18:00 UTC | Tor Browser online meeting
                 | https://lists.torproject.org/pipermail/tbb-dev/2014-March/000026.html
                 | #tor-dev OFTC


This issue of Tor Weekly News has been assembled by XXX, XXX, and
XXX.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [XXX], write down your
name and subscribe to the team mailing list [XXX] if you want to
get involved!

  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team

Possible item: