Changes between Version 14 and Version 15 of TorWeeklyNews/2014/46


Ignore:
Timestamp:
Nov 19, 2014, 2:03:46 PM (5 years ago)
Author:
harmony
Comment:

sent

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2014/46

    v14 v15  
    55'''Subject:''' Tor Weekly News — November 19th, 2014
    66
    7 {{{
    8 ========================================================================
    9 Tor Weekly News                                      November 19th, 2014
    10 ========================================================================
    11 
    12 Welcome to the forty-sixth issue in 2014 of Tor Weekly News, the weekly
    13 newsletter that covers what’s happening in the Tor community.
    14 
    15 Tor Browser 4.5-alpha-1 is out
    16 ------------------------------
    17 
    18 Mike Perry announced [1] the first alpha release in the Tor Browser 4.5
    19 series. This version goes some way to restoring one of the features most
    20 missed by users following the removal of the now-defunct Vidalia
    21 interface from Tor Browser — the ability to quickly visualize the Tor
    22 circuit that the current page is using. Clicking on the green Torbutton
    23 icon in the Tor Browser window now brings up a small diagram showing the
    24 IP addresses of all relays in a circuit, and the states in which they
    25 are located; this may help users evaluate the suitability of the
    26 circuits their Tor has selected, and also to quickly identify a
    27 malicious exit relay if they notice unusual behavior in downloaded pages
    28 and files.
    29 
    30 Another key user-facing innovation in this release is the “security
    31 slider”. Users can now choose from four security settings in Torbutton’s
    32 “Preferences” window — “low (default)”, “medium-low”, “medium-high”, and
    33 “high” — that allow them to customize their Tor Browser based on their
    34 own security and usability needs, while still working to prevent
    35 “partitioning” attacks, which try to identify users based on their
    36 unusual browser configuration.
    37 
    38 For other important additions in this series, please see the full
    39 changelog in Mike’s post. If you want to try out this alpha version, you
    40 can find it on the Tor Browser project page [2] or in the distribution
    41 directory [3]; please report any bugs you find!
    42 
    43   [1]: https://blog.torproject.org/blog/tor-browser-45-alpha-1-released
    44   [2]: https://www.torproject.org/projects/torbrowser.html#downloads-alpha
    45   [3]: https://www.torproject.org/dist/torbrowser/4.5-alpha-1/
    46 
    47 Tor Browser on 32-bit Macs approaches end-of-life
    48 -------------------------------------------------
    49 
    50 Now that Apple has discontinued support for the last remaining 32-bit
    51 Mac systems, Mike Perry announced [4] that the Tor Browser team will
    52 soon stop distributing 32-bit builds of its software. This week’s
    53 4.5-alpha-1, like all future releases in the 4.5 series, is only
    54 available in a 64-bit build, and all support for 32-bit systems will end
    55 once 4.5 supersedes 4.0.
    56 
    57 “32-bit Mac users likely have a month or two to decide what to do”,
    58 wrote Mike. “If your actual Mac hardware is 64-bit capable, you can
    59 upgrade to either the 64-bit edition of OSX 10.6 (which we will continue
    60 to support for a bit longer), or use the app store to upgrade to 10.9 or
    61 10.10. If your hardware is not 64-bit capable and won’t run these newer
    62 Mac operating systems, you should still be able to use Tails [5], which
    63 contains the Tor Browser.”
    64 
    65 As a side effect of this transition, Tor Browser 4.0’s experimental
    66 in-browser secure updater will not handle the upgrade to the 64-bit
    67 build correctly for any Mac user; the old version must instead be
    68 replaced manually with the new one.
    69 
    70   [4]: https://blog.torproject.org/blog/end-life-plan-tor-browser-32-bit-macs
    71   [5]: https://tails.boum.org
    72 
    73 Miscellaneous news
    74 ------------------
    75 
    76 Roger Dingledine [6] and Sambuddho Chakravarty [7] responded on the Tor
    77 blog to inaccurate reports of a new attack against Tor, based on a
    78 recent study co-authored by Sambuddho. “It’s great to see more research
    79 on traffic correlation attacks, especially on attacks that don’t need to
    80 see the whole flow on each side. But it’s also important to realize that
    81 traffic correlation attacks are not a new area”, wrote Roger.
    82 
    83   [6]: https://blog.torproject.org/blog/traffic-correlation-using-netflows
    84   [7]: https://blog.torproject.org/blog/traffic-correlation-using-netflows#comment-78918
    85 
    86 The Tails team set out the December release schedule [8] for version
    87 1.2.1 of the anonymous live operating system.
    88 
    89   [8]: https://mailman.boum.org/pipermail/tails-dev/2014-November/007422.html
    90 
    91 Giovanni Pellerano announced [9] version 3.1.30 of Tor2web, which now
    92 supports web access to Tor hidden services over TLS. Access to the
    93 Facebook hidden service, the most high-profile instance of an
    94 HTTPS-enabled .onion site, is blocked in this version, as Tor2web offers
    95 no benefit in cases where there exists an identical service on the
    96 regular or “naked” web, and may actually present additional risk of
    97 compromise.
    98 
    99   [9]: https://lists.torproject.org/pipermail/tor-talk/2014-November/035742.html
    100 
    101 Griffin Boyce requested feedback [10] on a “very rough” version of
    102 Stormy [11], the simple hidden service setup wizard. “I’d love to get
    103 feedback on places where it breaks and where it could use a major
    104 structural change […] the current setup is entirely for development and
    105 should not be used as-is.”
    106 
    107  [10]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007798.html
    108  [11]: https://github.com/glamrock/Stormy
    109 
    110 Virgil Griffith started a discussion [12] on the suitability of the name
    111 “hidden services” as opposed to other possible terms like “onion
    112 service” or “onion site”. Among the many responses, Roger Dingledine
    113 suggested [13] that an alternative name like “onion service” “makes
    114 people have to learn what it is rather than guessing (and often guessing
    115 wrong)”, while Nathan Freitas pointed out [14] that as “typical users
    116 don’t talk about web services, they talk about web sites or pages”,
    117 “onion site” might be a term worth adopting.
    118 
    119  [12]: https://lists.torproject.org/pipermail/tor-talk/2014-November/035658.html
    120  [13]: https://lists.torproject.org/pipermail/tor-talk/2014-November/035660.html
    121  [14]: https://lists.torproject.org/pipermail/tor-talk/2014-November/035662.html
    122 
    123 Tom Ritter put forward [15] a number of improvements to the integration
    124 of HTTPS certificates and hidden services, following “a spirited debate
    125 on IRC”.
    126 
    127  [15]: https://lists.torproject.org/pipermail/tor-dev/2014-November/007786.html
    128 
    129 The Wikimedia Foundation is the latest high-profile organization to set
    130 up a non-exit Tor relay [16]. “It’s just a small contribution to the
    131 network. Really — anyone can do it.”
    132 
    133  [16]: https://lists.torproject.org/pipermail/tor-talk/2014-November/035655.html
    134 
    135 Upcoming events
    136 ---------------
    137 
    138   Nov 19 13:30 UTC | little-t tor development meeting
    139                    | #tor-dev, irc.oftc.net
    140                    |
    141   Nov 19 16:00 UTC | Pluggable transports meeting
    142                    | #tor-dev, irc.oftc.net
    143                    |
    144   Nov 20 16:00 UTC | OONI development meeting
    145                    | #ooni, irc.oftc.net
    146                    |
    147   Nov 24 18:00 UTC | Tor Browser online meeting
    148                    | #tor-dev, irc.oftc.net
    149                    |
    150   Nov 25 17:00 UTC | little-t tor patch workshop
    151                    | #tor-dev, irc.oftc.net
    152                    |
    153   Dec 03 20:00 UTC | Tails contributors meeting
    154                    | #tails-dev, irc.oftc.net
    155                    | https://mailman.boum.org/pipermail/tails-dev/2014-November/007418.html
    156 
    157 
    158 This issue of Tor Weekly News has been assembled by Harmony and Lunar.
    159 
    160 Want to continue reading TWN? Please help us create this newsletter.
    161 We still need more volunteers to watch the Tor community and report
    162 important news. Please see the project page [17], write down your
    163 name and subscribe to the team mailing list [18] if you want to
    164 get involved!
    165 
    166  [17]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    167  [18]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
    168 }}}
     7'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2014-November/000072.html Sent].