Changes between Version 20 and Version 21 of TorWeeklyNews/2014/49


Ignore:
Timestamp:
Dec 10, 2014, 12:11:11 PM (4 years ago)
Author:
harmony
Comment:

sent

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2014/49

    v20 v21  
    55'''Subject:''' Tor Weekly News — December 10th, 2014
    66
    7 {{{
    8 ========================================================================
    9 Tor Weekly News                                      December 10th, 2014
    10 ========================================================================
    11 
    12 Welcome to the forty-ninth issue in 2014 of Tor Weekly News, the weekly
    13 newsletter that covers what’s happening in the Tor community.
    14 
    15 Tor Browser 4.0.2 and 4.5-alpha-2 are out
    16 -----------------------------------------
    17 
    18 Georg Koppen announced new stable and alpha releases by the Tor Browser
    19 team. Tor Browser 4.0.2 [1] fixes the Windows compiler bugs that were
    20 resulting in frequent crashes, ensures entries in the cache are once
    21 again isolated by URL bar domain, and prevents the user’s locale setting
    22 from being leaked by the JavaScript engine. Tor Browser 4.5-alpha-2 [2]
    23 brings further improvements to Torbutton’s new circuit visualization
    24 panel, which can now be turned off by visiting about:config and setting
    25 “extensions.torbutton.display_circuit” to “false”, as well as to the
    26 security slider.
    27 
    28 Both releases contain important security updates and all users should
    29 upgrade as soon as possible; please see Georg’s post for full details.
    30 You can obtain your copy from the project page [3], or through the
    31 in-browser updater.
    32 
    33   [1]: https://blog.torproject.org/blog/tor-browser-402-released
    34   [2]: https://blog.torproject.org/blog/tor-browser-45-alpha-2-released
    35   [3]: https://www.torproject.org/projects/torbrowser.html
    36 
    37 Tails 1.2.1 is out
    38 ------------------
    39 
    40 The Tails team announced [4] a new version of the amnesic live operating
    41 system. Alongside updates to Linux and Tor Browser, Tails 1.2.1 finally
    42 disables the Truecrypt encryption manager, which was abandoned by its
    43 developers earlier this year. There have been warnings about this change
    44 for several months, but users who have not yet migrated their data away
    45 from Truecrypt (or who are not able to) can still access these volumes
    46 with cryptsetup by following Tails’ own guide [5].
    47 
    48 The default configuration of GnuPG has also been changed in line with
    49 accepted best practices [6]. If you want to take advantage of this,
    50 there is a simple step you need to perform; please see the team’s post
    51 for more details, and get your copy of the new Tails from the download
    52 page [7] or through the incremental updater.
    53 
    54   [4]: https://tails.boum.org/news/version_1.2.1/
    55   [5]: https://tails.boum.org/doc/encryption_and_privacy/truecrypt/
    56   [6]: https://help.riseup.net/en/security/message-security/openpgp/best-practices
    57   [7]: https://tails.boum.org/download/
    58 
    59 More monthly status reports for November 2014
    60 ---------------------------------------------
    61 
    62 The wave of regular monthly reports from Tor project members for the
    63 month of November continued, with reports from Pearl Crescent [8],
    64 Sukhbir Singh [9], Leiah Jansen [10], Matt Pagan [11], Arlo
    65 Breault [12], Colin C. [13], and Nicolas Vigier [14].
    66 
    67 Karsten Loesing reported on behalf of the Tor Network Tools team [15],
    68 and Roger Dingledine sent out the report for SponsorF [16].
    69 
    70   [8]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000718.html
    71   [9]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000719.html
    72  [10]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000720.html
    73  [11]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000721.html
    74  [12]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000723.html
    75  [13]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000724.html
    76  [14]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000725.html
    77  [15]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000722.html
    78  [16]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000726.html
    79 
    80 Miscellaneous news
    81 ------------------
    82 
    83 George Kadianakis sent out [17] an updated draft of the proposal to
    84 safely collect hidden service statistics from Tor relays.
    85 
    86  [17]: https://lists.torproject.org/pipermail/tor-dev/2014-December/007928.html
    87 
    88 Nick Mathewson gave a talk [18] to the Computer Systems Security class
    89 at MIT on the subject of “Anonymous Communication”.
    90 
    91  [18]: https://www.youtube.com/watch?v=rIf_VZQr-dw
    92 
    93 David Fifield summarized [19] the costs incurred in November by the
    94 infrastructure for the meek pluggable transport.
    95 
    96  [19]: https://lists.torproject.org/pipermail/tor-dev/2014-December/007916.html
    97 
    98 The Tails team wondered [20] about the best way to prioritize adding
    99 support for pluggable transports: “Assuming we add support for
    100 Scramblesuit in Tails 1.3, then what usecases won’t we be supporting,
    101 that we could support better with obfs4 or meek?”
    102 
    103  [20]: https://mailman.boum.org/pipermail/tails-dev/2014-December/007580.html
    104 
    105 usprey wrote up a guide [21] to configuring a Tor relay on a server
    106 running Arch Linux: “All and any feedback will be appreciated! Are there
    107 any privacy concerns about using pdnsd to cache DNS locally?”
    108 
    109  [21]: https://lists.torproject.org/pipermail/tor-relays/2014-December/005907.html
    110 
    111 Jacob Appelbaum recommended [22] possible ways to reduce the attack
    112 surface presented by the kernel and the firewall in Tails. He also
    113 compiled [23] a dataset containing historical hashes and signatures of
    114 Tails files: “In the future, I’ll write a program that uses the dataset
    115 in a useful manner. In an ideal world, we’d have a way to use a Tails
    116 disk to verify any other Tails disk.”
    117 
    118  [22]: https://mailman.boum.org/pipermail/tails-dev/2014-December/007537.html
    119  [23]: https://mailman.boum.org/pipermail/tails-dev/2014-December/007588.html
    120 
    121 Tor help desk roundup
    122 ---------------------
    123 
    124 Users often write to find out how they can help the Tor Project. There
    125 are several ways to help out.
    126 
    127 If you have access to a server, consider setting up a Tor relay [24] to
    128 expand the network, or a bridge relay [25] to help internet users stuck
    129 behind censorship.
    130 
    131 If you’re a coder, see if any of the projects on our volunteer page [26]
    132 capture your interest. You can also look for tickets on our
    133 bug tracker [27] that are filed with the “easy” component if you want to
    134 submit some patches.
    135 
    136 If you’re interested in doing outreach, consider joining the Tor Weekly
    137 News team [28].
    138 
    139 If you’d like to get involved with translations, please join a team on
    140 our Transifex [29]. If a team for the language you’d like to translate
    141 into does not yet exist (check carefully), please go ahead and request a
    142 new team. It will take a day or two for the team to be approved, so
    143 please be patient.
    144 
    145  [24]: https://www.torproject.org/docs/debian
    146  [25]: https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports#Howtosetupabridgewithpluggabletransports
    147  [26]: https://www.torproject.org/getinvolved/volunteer#Projects
    148  [27]: https://trac.torproject.org/projects/tor/report
    149  [28]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    150  [29]: https://www.transifex.com/projects/p/torproject/
    151 
    152 News from Tor StackExchange
    153 ---------------------------
    154 
    155 strand raised a question about the code regarding rendezvous and
    156 introduction points [30]. Within src/or/rendservice.c there are several
    157 occurrences of onion_address, and strand wants to know which function
    158 catches what from a hidden service. If you can answer this question,
    159 please come to Tor’s Q&A page and give us some insights.
    160 
    161  [30]: https://tor.stackexchange.com/q/848/88
    162 
    163 This week in Tor history
    164 ------------------------
    165 
    166 A year ago this week [31], the Freedom of the Press Foundation launched
    167 its “Encryption Tools for Journalists” crowdfunding campaign [32],
    168 distributing the proceeds to five free software security projects,
    169 including the Tor Project and Tails. As of this writing, 1256 donors
    170 have contributed $136,977.05 in support of journalists’ right to
    171 communicate with sources and carry out research without being subjected
    172 to invasive surveillance. Thanks to the FPF and to everyone who has
    173 donated so far!
    174 
    175  [31]: https://lists.torproject.org/pipermail/tor-news/2013-December/000024.html
    176  [32]: https://freedom.press/bundle/encryption-tools-journalists
    177 
    178 Upcoming events
    179 ---------------
    180 
    181   Dec 10 13:30 UTC | little-t tor development meeting
    182                    | #tor-dev, irc.oftc.net
    183                    |
    184   Dec 10 16:00 UTC | Pluggable transports meeting
    185                    | #tor-dev, irc.oftc.net
    186                    |
    187   Dec 12 20:00 UTC | Tails low-hanging fruit session
    188                    | #tails-dev, irc.oftc.net
    189                    | https://mailman.boum.org/pipermail/tails-dev/2014-December/007593.html
    190                    |
    191   Dec 15 18:00 UTC | Tor Browser online meeting
    192                    | #tor-dev, irc.oftc.net
    193                    |
    194   Dec 15 18:00 UTC | OONI development meeting
    195                    | #ooni, irc.oftc.net
    196                    |
    197   Dec 16 18:00 UTC | little-t tor patch workshop
    198                    | #tor-dev, irc.oftc.net
    199                    | https://lists.torproject.org/pipermail/tor-dev/2014-December/007929.html
    200                    |
    201   Dec 27-31        | Tor @ 31st Chaos Communication Congress
    202                    | Hamburg, Germany
    203                    | https://events.ccc.de/congress/2014/wiki/Main_Page
    204 
    205 
    206 This issue of Tor Weekly News has been assembled by Matt Pagan, qbi,
    207 David Fifield, Arlo Breault, Karsten Loesing, and Harmony.
    208 
    209 Want to continue reading TWN? Please help us create this newsletter.
    210 We still need more volunteers to watch the Tor community and report
    211 important news. Please see the project page [33], write down your
    212 name and subscribe to the team mailing list [34] if you want to
    213 get involved!
    214 
    215  [33]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    216  [34]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
    217 }}}
     7'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2014-December/000075.html Sent].