[tor-project] Initial roadmap for the anti-censorship team
Hans-Christoph Steiner
hans at guardianproject.info
Wed Dec 19 10:54:06 UTC 2018
Looks like a good overview. I'd like to see two other pieces fit in
there somehow:
* Encrypted SNI for domain fronting
* getting the code deployable on all the platforms Tor supports
The latter means having people available with the requisite skill sets
for deploying things on Windows, macOS, Android, etc. I think it needs
to be on the roadmap because it can be a surprising amount of work, and
that work can be dramatically reduced based on early choices. For
example, Python is easy on GNU/Linux and macOS, but a poor choice on
Windows and Android.
.hc
Roger Dingledine:
> Here is an early brainstorming list of the scope for our future
> anti-censorship team. Let us know if we left out a critical category.
> And of course once we have actual team members I expect they will take
> this initial roadmap and do something even smarter than this list. :)
>
> (1) BridgeDB:
> - Automated monitoring
> - Understand current usage patterns, consider improving the design
> Don't get obfs4 bridges blocked by other transports (#28655)
>
> (2) Pluggable Transports:
> - Improve the PT interface with Tor, to pass logs etc (#25502)
> [with network team]
> - Tor Browser can use other circumvention tools as proxies (#28556)
> [with browser team]
> - Specific PTs:
> Maintain obfs4proxy (like fixing the iat bug that let Kazakhstan block it)
> Snowflake
> Httpsproxy
> Marionette
> Domain front through community sites
> - Talk to research groups to keep in touch about their PT research work
>
> (3) Improve Tor user experience for users in censored / crappy networks:
> - Gettor: automated monitoring and automated updates. Improve UX.
> - Understanding and reducing client time to bootstrap [with network team]
> and other parameters that are tuned poorly for slow networks
>
> (4) Understand Tor censorship:
> - Tor Browser network testing mode (#23839, #28531) [with browser team]
> - Reachability scanning for the default (shipped in Tor Browser) bridges
> [with ooni]
> - Understand bridge load and bridge blocking (e.g. fix user counting bugs
> that are making our Turkey count wrong) [with network / metrics teams]
>
> (5) Help users use bridges:
> - Help NGOs get their users on bridges (#28015, #28526)
> - Tor Browser *automates* picking the right PTs [with browser team]
>
> (6) Community outreach and integration: [with community team]
> - [Initial list of outreach partner NGOs elided for now, since some of
> them have opsec needs to keep their people safe]
>
> _______________________________________________
> tor-project mailing list
> tor-project at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-project
>
--
PGP fingerprint: EE66 20C7 136B 0D2C 456C 0A4D E9E2 8DEA 00AA 5556
https://pgp.mit.edu/pks/lookup?op=vindex&search=0xE9E28DEA00AA5556
More information about the tor-project
mailing list