======================================================================== Tor Weekly News July 9th, 2014 ======================================================================== Welcome to the twenty-seventh issue of Tor Weekly News in 2014, the weekly newsletter that covers what is happening in the Tor community. On being targeted by the NSA ---------------------------- Das Erste has published an article [1] and supporting material [2] showing how the NSA explicitly targets Tor and Tails user through the XKEYSCORE Deep Packet Inspection system. Several other media picked up the news, and it was also discussed in various threads on the tor-talk mailing list [3,4,5,6,7,8,9]. The Tor Project’s view has been reposted [10] on the blog. To a comment that said “I felt like i am caught in the middle of a two gigantic rocks colliding each other”, Roger Dingledine replied [11]: “You’re one of the millions of people every day who use Tor. And because of the diversity of users […], just because they know you use Tor doesn’t mean they know *why* you use Tor, or what you do with it. That’s still way better than letting them watch all of your interactions with all websites on the Internet.” [1]: http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html [2]: http://daserste.ndr.de/panorama/xkeyscorerules100.txt [3]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033473.html [4]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033564.html [5]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033640.html [6]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033642.html [7]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033656.html [8]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033703.html [9]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033749.html [10]: https://blog.torproject.org/blog/being-targeted-nsa [11]: https://blog.torproject.org/blog/being-targeted-nsa#comment-64376 More monthly status reports for June 2014 ----------------------------------------- The wave of regular monthly reports from Tor project members for the month of June continued, with submissions from Georg Koppen [12], Lunar [13], Noel David Torres Taño [14], Matt Pagan [15], Colin C. [16], Arlo Breault [17], and George Kadianakis [18]. Mike Perry reported on behalf of the Tor Browser team [19]. [12]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000576.html [13]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000577.html [14]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000578.html [15]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000579.html [16]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000580.html [17]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000583.html [18]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000585.html [19]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000584.html Miscellaneous news ------------------ An Austrian Tor exit node operator interpreted [20] their conviction in a first ruling as judging them “guilty of complicity, because he enabled others to transmit content of an illegal nature through the service”. Moritz Bartl from Torservers.net [21] commented [22]: “We strongly believe that it can be easily challenged. […] We will definitely try and find some legal expert in Austria and see what we can do to fight this.” [20]: https://network23.org/blackoutaustria/2014/07/01/to-whom-it-may-concern-engl... [21]: https://www.torservers.net/ [22]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033613.html Linus Nordberg is expanding the idea of public, append-only, untrusted log à la Certificate Transparency [23] to the Tor consensus. Linus submitted a new draft proposal to the tor-dev mailing list for reviews [24]. [23]: http://www.certificate-transparency.org/ [24]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007092.html Miguel Freitas reported [25] that twister [26] — a fully decentralized P2P microblogging platform — was now able to run over Tor. As Miguel wrote, “running twister on top of Tor was a long time goal, […] the Tor support allows a far more interesting threat model”. [25]: https://lists.torproject.org/pipermail/tor-talk/2014-July/033580.html [26]: http://twister.net.co/ Google Summer of Code students have sent a new round of reports after the mid-term: Israel Leiva on the GetTor revamp [27], Amogh Pradeep on Orbot and Orfox improvements [28], Mikhail Belous on the multicore tor daemon [29], Daniel Martí on incremental updates to consensus documents [30], Sreenatha Bhatlapenumarthi on the Tor Weather rewrite [31], Quinn Jarrell on the pluggable transport combiner [32], Noah Rahman on Stegotorus enhancements [33], Marc Juarez on website fingerprinting defenses [34], Juha Nurmi on the ahmia.fi project [35], and Zack Mullaly on the HTTPS Everywhere secure ruleset update mechanism [36]. [27]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007074.html [28]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007083.html [29]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007086.html [30]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007087.html [31]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007091.html [32]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007094.html [33]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007095.html [34]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000581.html [35]: https://lists.torproject.org/pipermail/tor-reports/2014-July/000582.html [36]: https://lists.eff.org/pipermail/https-everywhere/2014-July/002182.html sajolida, tchou and Giorgio Maone from NoScript drafted a specification [37] for a Firefox extension to download and verify Tails. [37]: https://mailman.boum.org/pipermail/tails-dev/2014-July/006288.html Tor help desk roundup --------------------- One way to volunteer for Tor is to run a mirror [38] of the Tor Project website. Instructions [39] are available for anyone wanting to run a mirror. Mirrors are useful for those who, for one reason or another, cannot access or use the main Tor Project website. Volunteers who have successfully set up a synced a mirror can report their mirror to the tor-mirrors mailing list [40] to get it included in the full mirrors list. [38]: https://www.torproject.org/getinvolved/mirrors.html [39]: https://www.torproject.org/docs/running-a-mirror.html [40]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-mirrors Easy development tasks to get involved with ------------------------------------------- ooniprobe is a tool for conducting network measurements that are useful for detecting network interference. When ooniprobe starts it should perform checks to verify that the config file is correct [41]. If that is not the case, it should fail gracefully at startup. The ticket indicates where this check should be added to the ooniprobe codebase [42]. If you’d like to do some easy Python hacking, be sure to give this ticket a try. [41]: https://bugs.torproject.org/11983 [42]: https://gitweb.torproject.org/ooni-probe.git Upcoming events --------------- July 11 16:00 UTC | Pluggable transports online meeting | #tor-dev, irc.oftc.net | https://lists.torproject.org/pipermail/tor-dev/2014-July/007114.html | July 15 | Researchers & Practitioners Meetup @ PETS | Amsterdam, The Netherlands | https://blog.torproject.org/events/researchers-practitioners-meetup-pets-ams... | July 15-19 | 14th Privacy Enhancing Technologies Symposium | Amsterdam, The Netherlands | https://petsymposium.org/2014/ This issue of Tor Weekly News has been assembled by Lunar, harmony, Matt Pagan, and Karsten Loesing. Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page [43], write down your name and subscribe to the team mailing list [44] if you want to get involved! [43]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews [44]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team -- tor-talk mailing list - tor-talk@lists.torproject.org To unsubscribe or change other settings go to https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk