Changes between Version 9 and Version 10 of TorWeeklyNews/2015/18


Ignore:
Timestamp:
May 6, 2015, 12:03:03 PM (4 years ago)
Author:
harmony
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2015/18

    v9 v10  
    11''96th issue of Tor Weekly News. Covering what's happening from April 28th, 2015 to May 5th, 2015. To be released on May 6th, 2015.''
    22
    3 '''Editor:'''
     3'''Editor:''' Harmony
    44
    55'''Subject:''' Tor Weekly News — May 6th, 2015
    66
    7 {{{
    8 ========================================================================
    9 Tor Weekly News                                            May 6th, 2015
    10 ========================================================================
    11 
    12 Welcome to the eighteenth issue in 2015 of Tor Weekly News, the weekly
    13 newsletter that covers what’s happening in the Tor community.
    14 
    15 Contents
    16 --------
    17 
    18  1. Tor Project, Inc. appoints Interim Executive Director
    19  2. Monthly status reports for April 2015
    20  3. Miscellaneous news
    21  4. Upcoming events
    22 
    23 Tor Project, Inc. appoints Interim Executive Director
    24 -----------------------------------------------------
    25 
    26 Following the departure of the Tor Project, Inc.’s Executive Director,
    27 Andrew Lewman [1], the board of directors [2] has appointed Roger
    28 Dingledine as Interim Executive Director, and Nick Mathewson as Interim
    29 Deputy Executive Director, until long-term candidates for these roles
    30 are found. Roger and Nick are both co-founders and lead developers of
    31 Tor, and need no introduction here — but you can watch Roger’s
    32 conversation with the National Science Foundation [3] and (if you read
    33 Spanish) take a look at Nick’s recent interview with El País [4] to
    34 learn a bit more about who they are and what inspires them to work on
    35 Tor.
    36 
    37   [1]: https://blog.torproject.org/blog/roger-dingledine-becomes-interim-executive-director-tor-project
    38   [2]: https://www.torproject.org/about/board
    39   [3]: https://www.nsf.gov/news/mmg/mmg_disp.jsp?med_id=77516
    40   [4]: http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html
    41 
    42 Monthly status reports for April 2015
    43 -------------------------------------
    44 
    45 The wave of regular monthly reports from Tor project members for the
    46 month of April has begun. George Kadianakis released his report
    47 first [5] (offering updates on onion service research), followed by
    48 reports from Yawning Angel [6] (reporting on pluggable transport
    49 research and core Tor hacking), Sherief Alaa [7] (on support work,
    50 documentation rewrites, and testing), David Goulet [8] (on onion service
    51 and core Tor development), Nick Mathewson [9] (on core Tor development
    52 and organizational work), Leiah Jansen [10] (on graphic design and
    53 branding), Pearl Crescent [11] (on Tor Browser and Tor Launcher
    54 development and testing), Jacob Appelbaum [12] (on advocacy and
    55 outreach), Griffin Boyce [13] (on security research and Satori/Cupcake
    56 development), Damian Johnson [14] (on Stem development and coordinating
    57 Tor Summer of Privacy), Georg Koppen [15] (on Tor Browser Development
    58 and build system research), Juha Nurmi [16] (on ahmia.fi development and
    59 Tor outreach), and Israel Leiva [17] (on the GetTor project).
    60 
    61 Mike Perry reported on behalf of the Tor Browser team [18], giving
    62 details of the 4.5 release process, significant security enhancements,
    63 and work to ensure that the wider Internet community takes the Tor
    64 network into account when developing standards and protocols.
    65 
    66   [5]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000807.html
    67   [6]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000808.html
    68   [7]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000809.html
    69   [8]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000810.html
    70   [9]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000811.html
    71  [10]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000812.html
    72  [11]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000813.html
    73  [12]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000814.html
    74  [13]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000815.html
    75  [14]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000816.html
    76  [15]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000817.html
    77  [16]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000819.html
    78  [17]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000820.html
    79  [18]: https://lists.torproject.org/pipermail/tor-reports/2015-May/000818.html
    80 
    81 Miscellaneous news
    82 ------------------
    83 
    84 Isis Lovecruft announced [19] the release and deployment of version
    85 0.3.2 of BridgeDB [20], the software that handles bridge address
    86 collection and distribution for the Tor network. Notable changes include
    87 the setting of obfs4 as the default pluggable transport served to users,
    88 better handling of clients from the same IPv6 address block, and the
    89 exclusion of broken bridge lines from the database.
    90 
    91  [19]: https://lists.torproject.org/pipermail/tor-dev/2015-May/008760.html
    92  [20]: https://bridges.torproject.org
    93 
    94 Tom Ritter shared a slide deck [21] offering “a 100-foot overview on
    95 Tor”: “Before I post it on twitter or a blog, I wanted to send it around
    96 semi-publicly to collect any feedback people think is useful.”
    97 
    98  [21]: https://lists.torproject.org/pipermail/tor-talk/2015-May/037723.html
    99 
    100 Moritz Bartl announced [22] the Tor-BSD Diversity Project, which aims to
    101 mitigate the risks that the “overwhelming GNU/Linux monoculture” among
    102 Tor relay operators might pose to the security of the Tor network: “In a
    103 global anonymity network, monocultures are potentially disastrous.  A
    104 single kernel vulnerability in GNU/Linux that impacting Tor relays could
    105 be devastating. We want to see a stronger Tor network, and we believe
    106 one critical ingredient for that is operating system diversity.”
    107 
    108  [22]: https://lists.torproject.org/pipermail/tor-talk/2015-April/037649.html
    109 
    110 David Fifield published the regular summary of costs incurred by the
    111 infrastructure for meek in April [23], detailing a large increase in
    112 simultaneous users over the last month (from 2000 to 5000), and the
    113 possible effects of a larger meek userbase on the Tor Metrics
    114 portal’s [24] bridge user graphs.
    115 
    116  [23]: https://lists.torproject.org/pipermail/tor-dev/2015-May/008767.html
    117  [24]: https://metrics.torproject.org
    118 
    119 John Brooks suggested [25] that, when the “next-generation onion
    120 services” proposal [26] is implemented, there will no longer be any
    121 reason to use both introduction points and hidden service
    122 directories [27] when establishing connections between Tor clients and
    123 onion services.  Calculating introduction points in the same way that
    124 HSDirs would be selected may have “substantial” benefits: “Services
    125 touch fewer relays and don’t need to periodically post descriptors.
    126 Client connections are much faster. The set of relays that can observe
    127 popularity is reduced.  It’s more difficult to become the IP of a
    128 targeted service.” See John’s proposal for a detailed explanation, and
    129 feel free to send your comments to the tor-dev mailing list.
    130 
    131  [25]: https://lists.torproject.org/pipermail/tor-dev/2015-April/008743.html
    132  [26]: https://gitweb.torproject.org/torspec.git/plain/proposals/224-rend-spec-ng.txt
    133  [27]: https://www.torproject.org/docs/hidden-services
    134 
    135 Upcoming events
    136 ---------------
    137 
    138   May 06 13:30 UTC | little-t tor development meeting
    139                    | #tor-dev, irc.oftc.net
    140                    |
    141   May 07 16:00 UTC | SponsorO support/documentation meeting
    142                    | #tor-project, irc.oftc.net
    143                    |
    144   May 08 16:00 UTC | SponsorO Tor Messenger/Tor Mail meeting
    145                    | #tor-project, irc.oftc.net
    146                    |
    147   May 11 18:00 UTC | Tor Browser meeting
    148                    | #tor-dev, irc.oftc.net
    149                    |
    150   May 11 18:00 UTC | OONI development meeting
    151                    | #ooni, irc.oftc.net
    152                    |
    153   May 12 18:00 UTC | little-t tor patch workshop
    154                    | #tor-dev, irc.oftc.net
    155                    |
    156   May 12 19:00 UTC | Tails low-hanging fruit session
    157                    | #tails-dev, irc.oftc.net
    158                    | https://mailman.boum.org/pipermail/tails-dev/2015-May/008704.html
    159                    |
    160   May 13 02:00 UTC | Pluggable transports/bridges meeting
    161                    | #tor-dev, irc.oftc.net
    162 
    163 
    164 This issue of Tor Weekly News has been assembled by Harmony, Roger
    165 Dingledine, and Karsten Loesing.
    166 
    167 Want to continue reading TWN? Please help us create this newsletter.
    168 We still need more volunteers to watch the Tor community and report
    169 important news. Please see the project page [28], write down your
    170 name and subscribe to the team mailing list [29] if you want to
    171 get involved!
    172 
    173  [28]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    174  [29]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
    175 }}}
     7'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2015-May/000096.html Sent].