The Tor Project is Hiring a Developer for OONI!
Are you a software engineer passionate about internet freedom and transparency? The Tor Project is hiring a full-time developer to work on OONI!
The Open Observatory of Network Interference (OONI) is a free software effort of the Tor Project which aims to detect online censorship and traffic manipulation around the world through the collection of network measurements.
OONI is based on free software tests that are designed to measure:
- Blocking of websites
- Systems responsible for censorship, surveillance and traffic manipulation
- Reachability of Tor, proxies, VPNs, and other systems
Since 2012, OONI has collected more than 9.5 million measurements across 96 countries, all of which are public and provide evidence and data to back up claims of network manipulation.
Why join OONI?
OONI is in a unique position to bring transparency to technical censorship. You can play a key part in keeping the web free and neutral.
By joining the team, you will play an important role not only in paving the road for a better interference detection system, but you will also be responsible for software run by activists around the world. Your work will help reveal unlawful censorship and surveillance around the world and aid the work of human rights defenders.
Becoming an OONI-tarian
As a core OONI developer, you will contribute to some of our active development efforts, including:
- Supporting advocacy groups in remotely controlling measurements from all the OONI probes they operate
- Re-engineering OONI’s data processing pipeline to allow for easier analysis
- Improving ooni-probe
- Improving ooni-backend
These tasks will increase the impact of the millions of measurements that OONI is currently hosting, the hundreds of vantage points around the world, and the future of censorship measurement.
Learn more and apply to join the OONI team as a core developer here.
Sometimes TorBrowser makes connection to 188.8.131.52 without tor.exe.
and make TorBrowser better.
Forgive me if I misunderstood (your post contains few details), but it sounds to me as if you might have noticed an unexpected connection to oscp.digicert.com when you were connecting to another site using Tor Browser, such as https:twitter.com. But if that other site was protected by https, Tor Browser *should* connect to some Certificate Authority site (digicert is one of the biggest) in order to fetch the certificate used to verify that you were connecting to the genuine twitter.com and not an FBI phishing site masquerading as twitter.com.
Tor Browser "should" fetch by tor.exe but firefox.exe shouldn't connect in clearnet!
Firefox.exe should be blocked in clearnet!