[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[tor-talk] Tor Weekly News — December 24th, 2014



========================================================================
Tor Weekly News                                      December 24th, 2014
========================================================================

Welcome to the fifty-first issue in 2014 of Tor Weekly News, the weekly
newsletter that covers what’s happening in the Tor community.

Stem 1.3 is out
---------------

“After months down in the engine room”, Damian Johnson announced [1]
version 1.3 of Stem [2], the Tor controller library written in Python.
Among the many improvements in this release, Damian singled out the new
set of controller methods for working with hidden services, as well as
the 40% increase in descriptor parsing speed.

Please see the changelog [3] for full details of all the new features.

  [1]: https://blog.torproject.org/blog/stem-release-13
  [2]: https://stem.torproject.org/
  [3]: https://stem.torproject.org/change_log.html#version-1-3

Miscellaneous news
------------------

The team of researchers working on the collection of hidden service
statistics [4] asked relay operators for help by enabling these
statistics on their relays in the coming days and weeks. They included a
step-by-step tutorial [5] for enabling this feature, which has recently
been merged into Tor’s main branch.

  [4]: https://bugs.torproject.org/13509
  [5]: https://lists.torproject.org/pipermail/tor-relays/2014-December/005953.html

Building on Andrea Shepard’s recently-merged work on global cell
scheduling [6], Nick Mathewson announced [7] that the KIST socket
management algorithm proposed earlier this year [8] to reduce congestion
in the Tor network is now “somewhat implemented” for Linux.  You can
follow the testing and reviews on the associated ticket [9].

  [6]: https://bugs.torproject.org/9262
  [7]: https://lists.torproject.org/pipermail/tor-dev/2014-December/008001.html
  [8]: http://www.robgjansen.com/publications/kist-sec2014.pdf
  [9]: https://bugs.torproject.org/12890

Nick also asked for feedback [10] on the proposal to increase the
interval at which Tor relays report their bandwidth usage statistics
from fifteen minutes to four hours [11]: “Will this break anything you
know about?”

 [10]: https://lists.torproject.org/pipermail/tor-dev/2014-December/008007.html
 [11]: https://bugs.torproject.org/13988

Moritz Bartl invited [12] Tor relay operators to a meet-up [13] at the
upcoming Chaos Communication Congress in Hamburg: “We will do quick
presentations on recent and future activities around Torservers.net,
talk about events relevant to the Tor relay community, and what lies
ahead.”

 [12]: https://lists.torproject.org/pipermail/tor-relays/2014-December/005958.html
 [13]: https://events.ccc.de/congress/2014/wiki/Session:Tor_Relay_Operators_Meetup

Thanks to Thomas White for keeping the community updated [14] following
a brief period of suspicious activity around his exit relays and Onionoo
application mirrors!

 [14]: https://lists.torproject.org/pipermail/tor-talk/2014-December/036067.html

This week in Tor history
------------------------

A year ago this week [15], Tor Browser hit version 3.5, bringing with it
a pioneering deterministic build system [16] that set a new standard in
software distribution security, and has since drawn interest from many
other projects, including the Debian operating system [17]. It also laid
the long-obsolete Vidalia graphical controller to rest, replacing it
with the faster, sleeker Tor Launcher. The privacy-preserving browser is
now approaching version 4.5, and users can look forward to a security
slider [18] offering finer-grained tuning of security preferences, as
well as features that restore some of Vidalia’s circuit-visualization
capabilities [19].

 [15]: https://lists.torproject.org/pipermail/tor-news/2013-December/000026.html
 [16]: https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
 [17]: https://wiki.debian.org/ReproducibleBuilds
 [18]: https://bugs.torproject.org/9387
 [19]: https://bugs.torproject.org/8641

Upcoming events
---------------

  Dec 24 13:30 UTC | little-t tor development meeting
                   | #tor-dev, irc.oftc.net
                   |
  Dec 24 16:00 UTC | Pluggable transports meeting
                   | #tor-dev, irc.oftc.net
                   |
  Dec 27-30        | Tor @ 31st Chaos Communication Congress
                   | Hamburg, Germany
                   | https://events.ccc.de/congress/2014/wiki/Main_Page
                   |
  Dec 29 18:00 UTC | Tor Browser online meeting
                   | #tor-dev, irc.oftc.net
                   |
  Dec 29 18:00 UTC | OONI development meeting
                   | #ooni, irc.oftc.net
                   |
  Dec 30 18:00 UTC | little-t tor patch workshop
                   | #tor-dev, irc.oftc.net
                   |
  Jan 03 20:00 UTC | Tails contributors meeting
                   | #tails-dev, irc.oftc.net
                   | https://mailman.boum.org/pipermail/tails-dev/2014-December/007626.html
                   |
  Jan 07 09:00 GMT | Roger @ Real World Cryptography Workshop 2015
                   | London, England
                   | http://www.realworldcrypto.com/rwc2015


This issue of Tor Weekly News has been assembled by Harmony and Karsten
Loesing.

Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
important news. Please see the project page [20], write down your
name and subscribe to the team mailing list [21] if you want to
get involved!

 [20]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
 [21]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk