Tor Weekly News — December 10th, 2014
Welcome to the forty-ninth issue in 2014 of Tor Weekly News, the weekly newsletter that covers what’s happening in the Tor community.
Tor Browser 4.0.2 and 4.5-alpha-2 are out
Both releases contain important security updates and all users should upgrade as soon as possible; please see Georg’s post for full details. You can obtain your copy from the project page, or through the in-browser updater.
Tails 1.2.1 is out
The Tails team announced a new version of the amnesic live operating system. Alongside updates to Linux and Tor Browser, Tails 1.2.1 finally disables the Truecrypt encryption manager, which was abandoned by its developers earlier this year. There have been warnings about this change for several months, but users who have not yet migrated their data away from Truecrypt (or who are not able to) can still access these volumes with cryptsetup by following Tails’ own guide.
The default configuration of GnuPG has also been changed in line with accepted best practices. If you want to take advantage of this, there is a simple step you need to perform; please see the team’s post for more details, and get your copy of the new Tails from the download page or through the incremental updater.
More monthly status reports for November 2014
The wave of regular monthly reports from Tor project members for the month of November continued, with reports from Pearl Crescent, Sukhbir Singh, Leiah Jansen, Matt Pagan, Arlo Breault, Colin C., and Nicolas Vigier.
George Kadianakis sent out an updated draft of the proposal to safely collect hidden service statistics from Tor relays.
Nick Mathewson gave a talk to the Computer Systems Security class at MIT on the subject of “Anonymous Communication”.
David Fifield summarized the costs incurred in November by the infrastructure for the meek pluggable transport.
The Tails team wondered about the best way to prioritize adding support for pluggable transports: “Assuming we add support for Scramblesuit in Tails 1.3, then what usecases won’t we be supporting, that we could support better with obfs4 or meek?”
usprey wrote up a guide to configuring a Tor relay on a server running Arch Linux: “All and any feedback will be appreciated! Are there any privacy concerns about using pdnsd to cache DNS locally?”
Jacob Appelbaum recommended possible ways to reduce the attack surface presented by the kernel and the firewall in Tails. He also compiled a dataset containing historical hashes and signatures of Tails files: “In the future, I’ll write a program that uses the dataset in a useful manner. In an ideal world, we’d have a way to use a Tails disk to verify any other Tails disk.”
Tor help desk roundup
Users often write to find out how they can help the Tor Project. There are several ways to help out.
If you’re a coder, see if any of the projects on our volunteer page capture your interest. You can also look for tickets on our bug tracker that are filed with the “easy” component if you want to submit some patches.
If you’re interested in doing outreach, consider joining the Tor Weekly News team.
If you’d like to get involved with translations, please join a team on our Transifex. If a team for the language you’d like to translate into does not yet exist (check carefully), please go ahead and request a new team. It will take a day or two for the team to be approved, so please be patient.
News from Tor StackExchange
strand raised a question about the code regarding rendezvous and introduction points. Within src/or/rendservice.c there are several occurrences of onion_address, and strand wants to know which function catches what from a hidden service. If you can answer this question, please come to Tor’s Q&A page and give us some insights.
This week in Tor history
A year ago this week, the Freedom of the Press Foundation launched its “Encryption Tools for Journalists” crowdfunding campaign, distributing the proceeds to five free software security projects, including the Tor Project and Tails. As of this writing, 1256 donors have contributed $136,977.05 in support of journalists’ right to communicate with sources and carry out research without being subjected to invasive surveillance. Thanks to the FPF and to everyone who has donated so far!
This issue of Tor Weekly News has been assembled by Matt Pagan, qbi, David Fifield, Arlo Breault, Karsten Loesing, and Harmony.
Want to continue reading TWN? Please help us create this newsletter. We still need more volunteers to watch the Tor community and report important news. Please see the project page, write down your name and subscribe to the team mailing list if you want to get involved!