Changes between Version 3 and Version 4 of TorWeeklyNews/2015/31


Ignore:
Timestamp:
Aug 14, 2015, 10:27:15 PM (4 years ago)
Author:
harmony
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • TorWeeklyNews/2015/31

    v3 v4  
    55'''Subject:''' Tor Weekly News — August 14th, 2015
    66
    7 {{{
    8 ========================================================================
    9 Tor Weekly News                                        August 14th, 2015
    10 ========================================================================
    11 
    12 Welcome to the thirty-first issue in 2015 of Tor Weekly News, the weekly
    13 newsletter that covers what’s happening in the Tor community.
    14 
    15 Contents
    16 --------
    17 
    18  1. Tor Browser 5.0 and 5.5a1 are out
    19  2. Tails 1.5 is out
    20  3. OnioNS beta testing version is out
    21  4. Miscellaneous news
    22  5. Upcoming events
    23 
    24 Tor Browser 5.0 and 5.5a1 are out
    25 ---------------------------------
    26 
    27 The Tor Browser team put out two new releases of the privacy-preserving
    28 web browser. Version 5.0 [1], the first release in the new stable
    29 series, is based on Firefox 38ESR, “which should mean improved support
    30 for HTML5 video on Youtube, as well as a host of other improvements”.
    31 Updates to Tor Browser are now downloaded automatically in the
    32 background, removing the need for users to go through the update wizard
    33 manually. New privacy features in this release include first-party
    34 domain bar isolation of more identifier sources, and “defenses from the
    35 5.0-alpha series for keystroke (typing) fingerprinting and some
    36 instances of performance/timing fingerprinting”.
    37 
    38 The first alpha release [2] in the 5.5 series, meanwhile, fixes the
    39 recent pdf.js exploit [3] to which users of 5.0a3 and 5.0a4 had been
    40 vulnerable; it also contains a refined version of the new font
    41 fingerprinting defenses in which “Tor Browser now ships with a standard
    42 set of fonts, and prefers to use the provided fonts instead of native
    43 ones in most cases”.
    44 
    45 For full changelogs and download instructions, please see the team’s
    46 announcements. Both of these new releases contain important security
    47 updates, so please upgrade your Tor Browser as soon as you can.
    48 
    49   [1]: https://blog.torproject.org/blog/tor-browser-50-released
    50   [2]: https://blog.torproject.org/blog/tor-browser-55a1-released
    51   [3]: https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
    52 
    53 Tails 1.5 is out
    54 ----------------
    55 
    56 The Tails developers announced version 1.5 [4] of the anonymous live
    57 operating system. This release disables access to the local network in
    58 Tor Browser, restricting this activity to Tails’ “unsafe browser”. It
    59 also ships with Tor Browser 5.0, and a 32-bit GRUB EFI bootloader, so
    60 “Tails should now start on some tablets with Intel Bay Trail processors,
    61 among others”.
    62 
    63 For a list of all the changes in this release, please see the team’s
    64 announcement. This is an important security update, so please download
    65 your copy as soon as possible, either from the Tails website or via the
    66 incremental updater.
    67 
    68   [4]: https://tails.boum.org/news/version_1.5/
    69 
    70 OnioNS beta testing version is out
    71 ----------------------------------
    72 
    73 Jesse Victors announced [5] the first beta testing release of his Tor
    74 Summer of Privacy project, the Onion Name System (OnioNS). OnioNS is a
    75 distributed system that links hard-to-remember and hard-to-verify onion
    76 service addresses (such as “onions55e7yam27n.onion”) to domain names
    77 that are easier for humans to read and recall (like “example.tor”).
    78 
    79 The software that comprises OnioNS is divided into three main parts:
    80 OnioNS-HS, OnioNS-client, and OnioNS-server. These are respectively
    81 intended to be run by onion services wishing to claim domain names,
    82 clients (such as Tor Browser users) wanting to visit services using
    83 these names, and the servers that let the system function. Whichever
    84 software you download will also require the OnioNS-common library in
    85 order to work.
    86 
    87 This is a beta testing version, so Jesse warns that it is not ready to
    88 be used on production onion services and that name-claims made now may
    89 not survive in the long-term. If you’re willing to give the system a
    90 try, however, please see Jesse’s message for further information, and
    91 feel free to send “feedback as to how usable the system is and areas
    92 where it could be improved” to the tor-dev mailing list, or file issues
    93 on the bug tracker of the relevant software package [6].
    94 
    95   [5]: https://lists.torproject.org/pipermail/tor-dev/2015-August/009221.html
    96   [6]: https://github.com/Jesse-V?tab=repositories
    97 
    98 Miscellaneous news
    99 ------------------
    100 
    101 Karsten Loesing deployed version 2.4 of Onionoo [7] , the Tor network
    102 data observatory. This release implements an optional “effective_family”
    103 field to Onionoo details documents, listing all the relays with which
    104 the relay in question is in an effective, mutual family relationship.
    105 “The main goal here is to make it easier to detect misconfigured relay
    106 families.  This can be relay operators or friendly people watching over
    107 the Tor network and reminding relay operators to fix their
    108 configurations.”
    109 
    110   [7]: https://onionoo.torproject.org
    111 
    112 Colin Childs sent out a call [8] for new volunteers to man the Tor help
    113 desk, which offers individual support to Tor users all over the world.
    114 If you can use Tor Browser and other Tor software with confidence and
    115 have a good understanding of the theory behind Tor, know how to use
    116 GnuPG (or are willing to learn), and are an active member of the Tor
    117 community who wants to help users on an ongoing basis, then please see
    118 Colin’s message for more details.
    119 
    120   [8]: https://lists.torproject.org/pipermail/tor-talk/2015-August/038713.html
    121 
    122 The Tails project sent out its monthly report for July [9], featuring
    123 development updates, upcoming events, and summaries of ongoing
    124 discussions.
    125 
    126   [9]: https://tails.boum.org/news/report_2015_07/
    127 
    128 George Kadianakis sent out the SponsorR report [10], and also submitted
    129 his own status report for July [11].
    130 
    131  [10]: https://lists.torproject.org/pipermail/tor-reports/2015-August/000896.html
    132  [11]: https://lists.torproject.org/pipermail/tor-reports/2015-August/000894.html
    133 
    134 Alec Muffett revived [12] the discussion around possible human factors
    135 to consider when devising a new and more secure system of onion
    136 addresses (such as the one suggested in proposal 224 [13]).
    137 
    138  [12]: https://lists.torproject.org/pipermail/tor-dev/2015-August/009223.html
    139  [13]: https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
    140 
    141 Sue Gardner invited [14] active Tor community members to take part in a
    142 short survey as part of her work to devise a long-term strategic plan
    143 for the Tor Project.
    144 
    145  [14]: https://lists.torproject.org/pipermail/tor-dev/2015-August/009235.html
    146 
    147 Thomas White put out a call [15] for “good guides on using Tor with
    148 common applications” to form part of a “small site dedicated to Tor
    149 usage [that] will convey, in as simple as possible terms, how to put as
    150 many applications as possible through Tor”.
    151 
    152  [15]: https://lists.torproject.org/pipermail/tor-talk/2015-August/038718.html
    153 
    154 Upcoming events
    155 ---------------
    156 
    157   Aug 17 17:00 UTC | OONI development meeting
    158                    | #ooni, irc.oftc.net
    159                    |
    160   Aug 17 18:00 UTC | Tor Browser meeting
    161                    | #tor-dev, irc.oftc.net
    162                    |
    163   Aug 18 18:00 UTC | little-t tor patch workshop
    164                    | #tor-dev, irc.oftc.net
    165                    |
    166   Aug 19 02:00 UTC | Pluggable transports/bridges meeting
    167                    | #tor-dev, irc.oftc.net
    168                    |
    169   Aug 19 13:30 UTC | little-t tor development meeting
    170                    | #tor-dev, irc.oftc.net
    171                    |
    172   Aug 19 14:00 UTC | Measurement team meeting
    173                    | #tor-project, irc.oftc.net
    174                    |
    175   Oct 01 09:00 CET | ADINA15: A Dive Into Network Anomalies
    176                    | Rome, Italy
    177                    | https://ooni.torproject.org/event/adina15/
    178 
    179 
    180 This issue of Tor Weekly News has been assembled by Harmony.
    181 
    182 Want to continue reading TWN? Please help us create this newsletter.
    183 We still need more volunteers to watch the Tor community and report
    184 important news. Please see the project page [16], write down your
    185 name and subscribe to the team mailing list [17] if you want to
    186 get involved!
    187 
    188  [16]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
    189  [17]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
    190 }}}
     7'''Status:''' [https://lists.torproject.org/pipermail/tor-news/2015-August/000109.html Sent].