The idea is that clients need to include more information in their connection requests, so the onion service can prioritize which requests it responds to. (3/8)
Over the past few years, Tor developers have read days of network logs trying to understand and fix the DoS threat. Because of our protocol's inherent asymmetric nature, there is no easy fix, and a more fundamental approach is needed to address it. (2/8)
We are officially launching the Tor Project Membership Program, a new way for nonprofit and private sector organizations to financially support our work. 🎉
Challenges, priorities, and progress in anti-censorship technology at Tor
Censorship circumvention is a complex and ever evolving problem, and this blog post summarizes our approach in tackling it.
Read more our new blog post: https://blog.torproject.org/anti-censorship-challenges-priorities-progress
PrivChat Chapter #2 - the Good, the Bad, and the Ugly of Censorship Circumvention!
Today, at 17:00 UTC ⏰
Hosted by Cory Doctorow
End of #MoreOnionsPorFavor campaign!
Over 60 organisations and individuals - small, medium, and large onions - have reached out to us to be part of this campaign.
México sin bloqueo:“Finalmente la red de Telmex ahora cuenta con 5 nodos de la red Tor" por Jacobo Nájera.
PrivChat Chapter #2 - The Good, the Bad, and the Ugly of Censorship Circumvention
Hosted by Cory Doctorow.
[August 28th ∙ 10:00 AM Pacific Time ∙ 17:00 UTC ∙ 13:00 Eastern Time]
- Felicia Anthonio (Access Now),
- Vrinda Bhandari (Internet Freedom Foundation ),
- Cecylia Bocovich (Tor Project ),
- Arturo Filastò (OONI )
We are considering two options that provide long-term defense against the problem of onion service DoS attacks, while maintaining onion service usability & security:
1. Defenses based on anonymous tokens and
2. Defenses based on Proof-of-Work
Read our blog post about DoS protections
To celebrate smashing 74 bugs last year with the Bug Smash Fund, we are running a special offer:
This week only (August 17-21), everyone who donates exactly $74 (must be $74!) will receive two mystery t-shirts + a pack of stickers from Tor.
In May and June 2020 we found and removed a group of Tor exit relays that were messing with exit traffic. They left almost all exit traffic alone, and we don't know whether any users were successfully attacked.
With your help, in 2019 the Bug Smash Fund allowed Tor to close 74 tickets that improved tor padding, testing, onion services, tooling for development, & more. This work keeps Tor Browser, the Tor network, and the many tools that rely on Tor strong, safe, and running smoothly.
Tor’s Bug Smash Fund is back for its second year! 👾 💥
Every donation made today through the month of August will go towards the important work of finding & fixing bugs + conducting routine maintenance. #TorBugSmash
Support for v2 onion services will be removed from SecureDrop in February 2021. Journalists and admins, if you see this warning when accessing your SecureDrop, it's time to migrate to v3 onion services:
SecureDrop 1.5.0 will be released on July 28, 2020. This release will include a kernel update, deprecation warnings for v2 onion services, improved error-handling in the API, and a number of community contributions:
More good news: a federal appeals court has issued an order preventing USAGM from installing a hand-picked board to replace the previously existing leadership of the Open Technology Fund. #saveinternetfreedom
PrivChat is a brand-new fundraising event series held to raise donations for the Tor Project. Through PrivChat, we will bring you important information related to what is happening in tech, human rights, and internet freedom by convening experts for a chat with our community.
We advance human rights and defend your privacy online through free software and open networks.
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!