Changes between Version 13 and Version 14 of TorWeeklyNews/2015/13


Ignore:
Timestamp:
Apr 1, 2015, 10:18:37 PM (4 years ago)
Author:
harmony
Comment:

sent

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2015/13

    v13 v14  
    55'''Subject:''' Tor Weekly News — April 1st, 2015
    66
    7 {{{
    8 ========================================================================
    9 Tor Weekly News                                          April 1st, 2015
    10 ========================================================================
    11 
    12 Welcome to the thirteenth issue in 2015 of Tor Weekly News, the weekly
    13 newsletter that covers what’s happening in the Tor community.
    14 
    15 Tor Browser 4.0.6 and 4.5a5 are out
    16 -----------------------------------
    17 
    18 Mike Perry announced two new releases by the Tor Browser team. Tor
    19 Browser 4.0.6 [1] contains updates to Firefox, meek, and OpenSSL; it is
    20 also the last release planned to run on 32-bit Apple hardware. If you
    21 have a 64-bit Mac and are running Mac OS X 10.8, you can expect to be
    22 automatically upgraded to Tor Browser 4.5, optimized for your hardware,
    23 later this month. If you are running OS X 10.6 or 10.7, however, you
    24 will need to update manually once that version of Tor Browser is
    25 released, as described in the end-of-life announcement last year [2].
    26 
    27 Tor Browser 4.5a5 [3], meanwhile, includes several exciting security and
    28 usability updates. Tor Browser’s windows, when resized, will now “snap”
    29 to one of a limited range of sizes, to prevent an adversary from
    30 fingerprinting a user based on their unique browser size; the Security
    31 Slider now offers information about the features that are disabled at
    32 each security level; and Tor circuits remain in use for a longer period,
    33 avoiding the errors that can result when websites detect a change in
    34 your connection. You can read about all these features and more in
    35 Mike’s announcement.
    36 
    37 These new releases contain important security updates, and all users
    38 should upgrade as soon as possible. As usual, you can get your copy of
    39 the new software using the in-browser updater, or from the project
    40 page [4].
    41 
    42   [1]: https://blog.torproject.org/blog/tor-browser-406-released
    43   [2]: https://blog.torproject.org/blog/tor-browser-45a5-released
    44   [3]: https://blog.torproject.org/blog/end-life-plan-tor-browser-32-bit-macs
    45   [4]: https://www.torproject.org/projects/torbrowser.html
    46 
    47 Tails 1.3.2 is out
    48 ------------------
    49 
    50 Tails version 1.3.2 [5] was put out on March 31. This release includes
    51 updates to key software, fixing numerous security issues. All Tails
    52 users must upgrade as soon as possible; see the announcement for
    53 download instructions.
    54 
    55   [5]: https://tails.boum.org/news/version_1.3.2
    56 
    57 Crowdsourcing the future (of onion services)
    58 --------------------------------------------
    59 
    60 Onion (or hidden) services are web (or other) services hosted in the Tor
    61 network that have anonymity, authentication, and confidentiality built
    62 in. As George Kadianakis writes, “anything you can build on the
    63 Internet, you can build on hidden services — but they’re better”. A
    64 major task for the Tor community in the near future is making these
    65 important tools more widely available, and usable by groups who urgently
    66 need them, so George took to the Tor blog [6] to solicit ideas for
    67 future onion service-related projects that could form the basis for a
    68 crowdfunding campaign. “Long story short, we are looking for feedback!
    69 What hidden services projects would you like to see us crowdfund? How do
    70 you use hidden services; what makes them important to you? How you want
    71 to see them evolve?…Also, we are curious about which crowdfunding
    72 platforms you prefer and why.”
    73 
    74 See the full post for an introduction to onion services, why they
    75 matter, why a crowdfunding campaign makes sense, and how to join in with
    76 your own ideas.
    77 
    78   [6]: https://blog.torproject.org/blog/crowdfunding-future-hidden-services
    79 
    80 Spreading the word about Tor with free brochures
    81 ------------------------------------------------
    82 
    83 Tor advocates play an important role in talking to groups and audiences
    84 around the world about the ways Tor and online anonymity can benefit
    85 them. Until now, printed materials offering a simple introduction to the
    86 basic concepts behind Tor have been hard to come by, so Karsten Loesing
    87 announced [7] a set of brochures, aimed at various audiences, that can
    88 be freely printed and distributed at Tor talks, tech conferences, public
    89 demonstrations, or just for fun.
    90 
    91 If you don’t have access to printing facilities, you can contact the Tor
    92 Project [8] with details of your event and requirements and receive a
    93 stack of brochures, possibly in return for a report or other feedback.
    94 Spread the word, and feel free to screen the Tor animation [9] in your
    95 language while you’re at it!
    96 
    97   [7]: https://blog.torproject.org/blog/spread-word-about-tor
    98   [8]: https://www.torproject.org/about/contact
    99   [9]: https://blog.torproject.org/blog/releasing-tor-animation
    100 
    101 Monthly status reports for March 2015
    102 -------------------------------------
    103 
    104 The wave of regular monthly reports from Tor project members for the
    105 month of March has begun. Damian Johnson released his report first [10],
    106 followed by reports from Tom Ritter [11], Philipp Winter [12], Pearl
    107 Crescent [13], Nick Mathewson [14], Juha Nurmi [15], and Isabela
    108 Bagueros [16].
    109 
    110  [10]: https://lists.torproject.org/pipermail/tor-reports/2015-March/000782.html
    111  [11]: https://lists.torproject.org/pipermail/tor-reports/2015-March/000783.html
    112  [12]: https://lists.torproject.org/pipermail/tor-reports/2015-March/000784.html
    113  [13]: https://lists.torproject.org/pipermail/tor-reports/2015-March/000785.html
    114  [14]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000786.html
    115  [15]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000787.html
    116  [16]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000788.html
    117 
    118 Miscellaneous news
    119 ------------------
    120 
    121 Anthony G. Basile announced [17] version 20150322 of tor-ramdisk, the
    122 micro Linux distribution whose only purpose is to host a Tor server in
    123 an environment that maximizes security and privacy. This release
    124 includes updates to Tor, busybox, OpenSSL, and the Linux kernel.
    125 
    126  [17]: https://lists.torproject.org/pipermail/tor-talk/2015-March/037355.html
    127 
    128 George Kadianakis used some newly-discovered bridge statistics [18] to
    129 generate visual bandwidth histories, in order “to better understand how
    130 much bridges are used”. “Questions and feedback on my methodology are
    131 welcome”, writes George. On the other hand, “we should think about the
    132 privacy implications of these statistics since they are quite
    133 fine-grained (multiple measurements per day) and some bridges don’t have
    134 many clients (hence small anonymity set for them)”, so if you have
    135 comments on this topic feel free to send them to the thread.
    136 
    137  [18]: https://lists.torproject.org/pipermail/tor-dev/2015-March/008541.html
    138 
    139 News from Tor StackExchange
    140 ---------------------------
    141 
    142 Tor’s StackExchange site is currently running a self-evaluation [19]. On
    143 the evaluation page [20] you’ll see some questions and answers. Please
    144 go through this list and rate those questions. It helps the Q&A site to
    145 improve those answers and see where weaknesses are.
    146 
    147  [19]: http://meta.tor.stackexchange.com/questions/249/lets-get-critical-mar-2015-site-self-evaluation
    148  [20]: https://tor.stackexchange.com/review/site-eval
    149 
    150 User 2313265939 lives in a heavily censored region and wants an
    151 OnionPi [21] to connect to the meek-amazon pluggable transport [22]. If
    152 you have an answer, please share it with this user.
    153 
    154  [21]: https://learn.adafruit.com/onion-pi/overview
    155  [22]: https://tor.stackexchange.com/q/6538/88
    156 
    157 This week in Tor history
    158 ------------------------
    159 
    160 A year ago this week [23], Tor developers were discussing the
    161 possibility of distributing bridge relay addresses via QR code, to avoid
    162 tricky copy-pastes and input errors that might cause a failed
    163 connection.  Today, you can request some bridge lines from BridgeDB [24]
    164 and select “Show QR code” to be shown…exactly that. Bridge address QR
    165 code recognition will soon make its way [25] into the Orbot stable
    166 release, as well, so your simple censorship circumvention is no longer
    167 dependent on finicky touchscreen keyboards!
    168 
    169  [23]: https://lists.torproject.org/pipermail/tor-news/2014-April/000039.html
    170  [24]: https://bridges.torproject.org/
    171  [25]: https://lists.mayfirst.org/pipermail/guardian-dev/2015-March/004283.html
    172 
    173 Upcoming events
    174 ---------------
    175 
    176   Apr 03 20:00 UTC | Tails contributors meeting
    177                    | #tails-dev, irc.oftc.net
    178                    | https://mailman.boum.org/pipermail/tails-project/2015-March/000159.html
    179                    |
    180   Apr 06 18:00 UTC | Tor Browser online meeting
    181                    | #tor-dev, irc.oftc.net
    182                    |
    183   Apr 06 18:00 UTC | OONI development meeting
    184                    | #ooni, irc.oftc.net
    185                    |
    186   Apr 07 18:00 UTC | little-t tor patch workshop
    187                    | #tor-dev, irc.oftc.net
    188                    |
    189   Apr 16 - 18      | Roger @ 2015 German-American Frontiers of Engineering Symposium
    190                    | Potsdam, Germany
    191                    | http://www.naefrontiers.org/Symposia/GAFOE/21649/44840.aspx
    192                    |
    193   Apr 24           | Roger @ CTIC Privacy Conference
    194                    | University of Pennsylvania Law School
    195                    | https://www.law.upenn.edu/newsevents/calendar.php#event_id/48977/view/event
    196 
    197 
    198 This issue of Tor Weekly News has been assembled by Harmony, Karsten
    199 Loesing, and qbi.
    200 
    201 Want to continue reading TWN? Please help us create this newsletter.
    202 We still need more volunteers to watch the Tor community and report
    203 important news. Please see the project page [26], write down your
    204 name and subscribe to the team mailing list [27] if you want to
    205 get involved!
    206 
    207  [26]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    208  [27]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
    209 }}}
     7'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2015-April/000091.html Sent].