Commit 30d227cc authored by Gaba's avatar Gaba
Browse files

Merge branch 'Burnleydev-main-patch-61371' into 'main'


See merge request !19
parents 9cc4727b 5ff41f1a
......@@ -84,7 +84,7 @@ To add yourself to a group use the group's pad please.
## 3 Add support for UDP sockets over onion services, possibly with enabling support for WebRTC in Tor Browser
- Pad:
- Notes: [Add support for UDP sockets over onion services](
- Contact: sysrqb (UTC-5(-ish))
- Skills: C/C++, familiar with tor and/or Firefox and/or webrtc
- Goal: Present Hack Week results via Tor Browser on BBB
......@@ -97,49 +97,49 @@ To add yourself to a group use the group's pad please.
## 4 Visualize Tor metrics's data in ways that it can be useful for community
- Pad:
- Notes: [Visualize Tor metrics's data](
- Contact: gus and gaba (UTC-3)
- Skills: data visualization
- Summary: The goal is to have a dashboard with Tor usage per country in a way that is easy to see big changes happening. Right now we need to select each country to see the Tor usage. It would be good to have a way to see all the countries and the onews where usage is increasing (via bridge and direct connection)
## 5 Prototype Rust+Arti-based HTTP frontend cache for directory authorities
- Pad:
- Notes: [Prototype Rust+Arti-based HTTP](
- Contact: nickm (UTC-5)
- Skills: Rust hacking experience helpful.
- Summary: Directory authorities are under a lot of unnecessary load from excessive download requests. We have other projects in mind to reduce those requests, but one workaround is to add a frontend cache in front of one or more of the authorities' HTTP ports. With this project we'll write a Rust server use Arti's download and validation code to fetch directory information from an authority, and expose that information via a set of HTTP requests. With luck, our code will be reuseable in the future when relays or authorities are rewritten in Rust.
## 6 Onionshare download accelerator
- Pad:
- Notes: [Onionshare download accelerator](
- Contact: Mike (UTC-6) or maybe Micah (UTC-8?)
- Skills: Python, HTTP/1.1, SOCKS
- Journalists are requesting ways to download large files from onion services faster. This is actually possible already with HTTP, without any Tor client modifications. By splitting up requests into 250k chunks using HTTP range requests, and using SOCKS username and password to allocate these requests properly onto different circuits, we can hit ~6 megabytes/sec per guard (so ~12 megabytes/sec with 2 gaurds), with a custom HTTP download acelerator. This download accelerator could be provided as part of onionshare. For more details, see
## 7 Vanguards doc updates, bugfixes, packages for onionshare and/or Tor Browser
- Pad:
- Notes: [Vanguards doc updates, bugfixes, packages](
- Contacts: Mike (UTC-6)
- Skills: Python, tech doc writing and/or review, packaging/build eng
- Summary: The vanguards Tor control port addon provides defense against Guard discovery attacks, as well as other attacks against onion services, onion clients, and even Tor Browser exit traffic. Vanguards is in need of some doc updates, bugfixes, and we could even package it for one of onionshare or Tor Browser. Packaging it with Onionshare also helps improve the security properties of the above download accelerator item. See the bugtracker for specific items:
## 8 Circuit Padding Simulator
- Pad:
- Notes: [Circuit Padding Simulator](
- Contacts: Mike (UTC-6). Or maybe Tobias Pulls (UTC+1), or maybe asn (UTC+1)
- Skills: Tor unit test framework, Tor C, maybe python
- Summary: The Tor circuit padding framework is under active use by researchers to improve padding defenses against website traffic fingerprinting, and onion service circuit fingerprinting. The simulator is in need of update to the latest Tor release, as well as in need of performance improvements, and a more accurate way to deal with time-based features. See
## 9 Onion service v3 support for arti
- Pad:
- Notes: [Onion service v3 support for arti](
- Contacts: asn (UTC-3)
- Skills: Onion services protocol, Rust, arti
- Summary: arti currently does not do v3 onion services. Let's do some solid work towards making that possible.
## 10 Network Health tooling using Rust and arti
- Pad:
- Notes: [Network Health tooling using Rust and arti](
- Contacts: dgoulet (UTC-5)
- Skills: Love, Passion and Legos
- Summary: Network health has a series of tools in order to query the consensus, search for patterns and correlate relays. This project is to rewrite some of them into one unified tool written in Rust and using arti for any Tor related interactions such as looking up the consensus or creating circuits for testing connectivity.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment