<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Tor Project blog</title><link href="https://blog.torproject.org/" rel="alternate"></link><link href="https://blog.torproject.org/feed.xml" rel="self"></link><id>urn:uuid:201c3fb3-b4bd-3a4e-85ed-16327d11d7a6</id><updated>2024-12-04T00:00:00Z</updated><author><name>The Tor Project</name></author><subtitle>Official channel for news and updates from the Tor Project</subtitle><entry><title>Making new connections: from BridgeDB to Rdsys</title><link href="https://blog.torproject.org/making-connections-from-bridgedb-to-rdsys/" rel="alternate"></link><updated>2024-12-04T00:00:00Z</updated><author><name>meskio, pavel</name></author><id>urn:uuid:e098c578-8c21-3f8a-9ac6-b274c2e481f6</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/making-connections-from-bridgedb-to-rdsys/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/making-connections-from-bridgedb-to-rdsys/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/making-connections-from-bridgedb-to-rdsys/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;For over a decade, BridgeDB was the reluctant champion helping users bypass censorship and connect to the open web. &lt;a href="https://gitlab.torproject.org/tpo/anti-censorship/bridgedb/-/tags/bridgedb-0.0.1"&gt;Released more than 11 years ago as a prototype&lt;/a&gt;, the bridge distribution mechanism surpassed its original lifespan, honorably serving the Tor community. However, as censorship techniques evolved, BridgeDB became overburdened with the many updates necessary to adapt to these new challenges. Over time, this led to an accumulation of technical debt and outdated code which made further improvements and maintenance increasingly difficult. It became clear that to keep up with the dynamic nature of anti-censorship work, Tor needed a more robust, flexible and easier to maintain solution.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Enter Rdsys:&lt;/strong&gt; the next-generation bridge distribution system. Developed from the ground up, it incorporates the learnings from over 15 years of anti-censorship work to overcome the limitations of its predecessor. In October 2024, Tor completed the migration to Rdsys, retiring Bridge DB. This transition ensures a more flexible, maintainable, and user-friendly approach to bridge distribution, strengthening Tor's ability to counter censorship and making the web more accessible to those who need it most.&lt;/p&gt;
&lt;h2&gt;Learning from the past&lt;/h2&gt;
&lt;p&gt;When Tor was first adopted by people circumventing censorship, it quickly became a target for censors. Blocking the public list of Tor relays was an easy way to cut off access. The solution? Bridges---relays that aren't listed publicly to make it harder for censors to block access to Tor. But as soon as bridges were introduced, two challenges emerged: how to disguise bridge traffic and how to distribute bridges securely without exposing them to censors.&lt;/p&gt;
&lt;p&gt;While the former was addressed with different &lt;a href="https://youtu.be/8mdtSgHWhXY"&gt;bridge types&lt;/a&gt;, BridgeDB addressed the latter: It needed to give legitimate users access to bridges while making it difficult for censors to obtain the entire list. So, it employed several distribution mechanisms, including web-based or email requests, and a Tor Browser API called MOAT. Users could either obtain bridge addresses through a website and by requesting them via email, or by solving captchas.&lt;/p&gt;
&lt;p&gt;These approaches allowed for some degree of censorship protection, but they weren't foolproof. Censors could still attempt to scrape websites, flood the email system to collect bridges, or bypass them by leveraging human CAPTCHA-solving services.&lt;/p&gt;
&lt;p&gt;As censorship tactics became more sophisticated, we kept adding to its original code base, resulting in an accumulation of technical debt. While it was a great solution at the time, BridgeDB grew increasingly difficult to maintain.&lt;/p&gt;
&lt;h2&gt;Pathing towards the future&lt;/h2&gt;
&lt;p&gt;Recognizing BridgeDB's limitations, we began developing Rdsys as a replacement four years ago. Unlike its predecessor, Rdsys is built as a modular system, dividing responsibilities into separate components--such as distribution logic and communication methods (e.g., email, Telegram)--that work together seamlessly. This architecture lets us experiment with new ideas and, eventually, adapt to emerging threats without overhauling the entire system:&lt;/p&gt;
&lt;h3&gt;Exploring new distribution channels&lt;/h3&gt;
&lt;p&gt;Rdsys enabled us to explore bridge distribution channels by leveraging platforms widely used in censored regions. For example, in response to increasing censorship in Russia, we successfully distributed bridges through Telegram. This approach takes advantage of account history, distinguishing between old and new accounts to ensure bridges are given to real users, not bots or censors creating accounts en masse.&lt;/p&gt;
&lt;h3&gt;Adding new tools&lt;/h3&gt;
&lt;p&gt;The modular design allows us to test and deploy new anti-censorship tools more rapidly to stay ahead of evolving tactics. &lt;a href="https://gitlab.torproject.org/tpo/anti-censorship/lox"&gt;Lox&lt;/a&gt;, for instance, is a bridge distribution mechanism that detects blocked bridges and uses a reputation-based approach rewarding users whose bridges remain unblocked.&lt;/p&gt;
&lt;h3&gt;Eliminating the hassle of captchas&lt;/h3&gt;
&lt;p&gt;For many, captchas are frustratingly inaccessible, presenting challenges for users with disabilities, those who rely on screen readers, or individuals using older devices with limited capabilities. For some users, solving captchas can even be impossible due to language barriers or overly complex visual puzzles, creating a bottleneck in their efforts to connect to the open web. &lt;/p&gt;
&lt;p&gt;Beyond user experience, captchas have also become increasingly ineffective as a security measure. Censors have adapted to them, employing automated tools or other methods to bypass these obstacles. This renders captchas less of a deterrent for those aiming to restrict access while maintaining their burden on legitimate users.&lt;/p&gt;
&lt;p&gt;By shifting away from captchas, Rdsys improves the accessibility and reliability of Tor bridges, ensuring that more users--particularly those in regions facing heavy censorship--can connect without unnecessary roadblocks. &lt;/p&gt;
&lt;h2&gt;What's next?&lt;/h2&gt;
&lt;p&gt;Looking ahead, the goal is not just to maintain access to the internet, but to expand it. This is where you, dear reader, come in!&lt;/p&gt;
&lt;p&gt;Earlier this year, &lt;a href="https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/"&gt;we launched Webtunnel&lt;/a&gt;, a new bridge type that blends itself into other web traffic. This was made possible in part through new systems like Rdsys, but mostly by the power of thousands of volunteers, contributors, and &lt;a href="https://community.torproject.org/user-research/become-tester/"&gt;alpha testers&lt;/a&gt; who are committed to empowering internet users worldwide to reclaim their right to &lt;a href="https://blog.torproject.org/2024-fundraiser-donations-matched/"&gt;speak, browse, and search anonymously&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Now, &lt;a href="https://blog.torproject.org/call-for-webtunnel-bridges/"&gt;we are calling on the Tor and Internet freedom community once again to help us scale Tor's anti-censorship efforts.&lt;/a&gt; If you've ever thought about contributing to &lt;a href="https://torproject.org/donate/donate-fb-2024"&gt;Tor's development&lt;/a&gt; or of &lt;a href="https://community.torproject.org/relay/setup/webtunnel/"&gt;running a Tor bridge&lt;/a&gt;, today is the day. Together, we can ensure that everyone, everywhere has access to a free and open internet.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://torproject.org/donate/donate-bp5-yec2024"&gt;&lt;img class=align-center src="https://blog.torproject.org/making-connections-from-bridgedb-to-rdsys/donate-button.png" alt="Donate Button"&gt;&lt;/a&gt;&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/circumvention"&gt;
          circumvention
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/human-rights"&gt;
          human rights
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/announcements"&gt;
          announcements
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Arti 1.3.1 is released: onion services, RPC, relay development, and more</title><link href="https://blog.torproject.org/arti_1_3_1_released/" rel="alternate"></link><updated>2024-12-03T00:00:00Z</updated><author><name>gabi</name></author><id>urn:uuid:f1b1d664-3b63-37a3-980e-899da7287725</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/arti_1_3_1_released/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/arti_1_3_1_released/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/arti_1_3_1_released/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Arti is our ongoing project to create a next-generation Tor client in
Rust.   Now we're announcing the latest release, Arti 1.3.1.&lt;/p&gt;
&lt;p&gt;This release continues development on Arti Relay and the RPC subsystem,
and adds the initial scaffolding for service-side proof-of-work support.
It also contains a number of bugfixes, cleanups,
as well as improvements to our CI infrastructure.&lt;/p&gt;
&lt;p&gt;For full details on what we've done, and for information about
many smaller and less visible changes as well,
please see the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/CHANGELOG.md#arti-131---2-december-2024"&gt;CHANGELOG&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For more information on using Arti, see our top-level &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/README.md"&gt;README&lt;/a&gt;, and the
documentation for the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/tree/main/crates/arti"&gt;&lt;code&gt;arti&lt;/code&gt; binary&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Thanks to everybody who's contributed to this release,
including Lionel Goffaux.&lt;/p&gt;
&lt;p&gt;And as always, our deep thanks to
&lt;a href="https://zcashcommunitygrants.org/"&gt;Zcash Community Grants&lt;/a&gt;,
the &lt;a href="https://www.state.gov/bureaus-offices/under-secretary-for-civilian-security-democracy-and-human-rights/bureau-of-democracy-human-rights-and-labor/"&gt;Bureau of Democracy, Human Rights and Labor&lt;/a&gt;,
and our &lt;a href="https://www.torproject.org/about/sponsors/"&gt;other sponsors&lt;/a&gt;
for funding the development of Arti!&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/announcements"&gt;
          announcements
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tails 6.10</title><link href="https://blog.torproject.org/new-release-tails-6-10/" rel="alternate"></link><updated>2024-11-28T00:00:00Z</updated><author><name>tails</name></author><id>urn:uuid:1b58edc5-05b0-34ba-8648-8d2316ca2875</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tails-6-10/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tails-6-10/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tails-6-10/lead.jpg"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;h2&gt;Changes and updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Tor Browser&lt;/em&gt; to &lt;a href="https://blog.torproject.org/new-release-tor-browser-1403"&gt;14.0.3&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; from 115.16.0 to &lt;a href="https://www.thunderbird.net/en-US/thunderbird/128.4.3esr/releasenotes/"&gt;128.4.3&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Fixed problems&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Fix support for Trezor hardware wallets in &lt;em&gt;Electrum&lt;/em&gt;. (&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/issues/20138"&gt;#20138&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Fix an issue that prevented the Tails desktop to open with fewer memory. (&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/issues/20631"&gt;#20631&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Disable saving telemetry data in &lt;em&gt;Thunderbird&lt;/em&gt;. (&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/issues/20661"&gt;#20661&lt;/a&gt;)&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details, read our
&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog"&gt;changelog&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Get Tails 6.10&lt;/h2&gt;
&lt;h3&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 6.0 or later to 6.10.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a &lt;a href="https://tails.net/doc/upgrade/#manual"&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;To install Tails 6.10 on a new USB stick&lt;/h3&gt;
&lt;p&gt;Follow our installation instructions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/windows/"&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/mac/"&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/linux/"&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/expert/"&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Persistent Storage on the USB stick will be lost if you install instead of
upgrading.&lt;/p&gt;
&lt;h3&gt;To download only&lt;/h3&gt;
&lt;p&gt;If you don't need installation or upgrade instructions, you can download Tails
6.10 directly:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download/"&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download-iso/"&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Support and feedback&lt;/h2&gt;
&lt;p&gt;For support and feedback, visit the &lt;a href="https://tails.net/support/"&gt;Support
section&lt;/a&gt; on the Tails website.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/partners"&gt;
          partners
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Tor in Russia: A call for more WebTunnel bridges</title><link href="https://blog.torproject.org/call-for-webtunnel-bridges/" rel="alternate"></link><updated>2024-11-28T00:00:00Z</updated><author><name>gus</name></author><id>urn:uuid:df27cd87-dd09-3c88-a981-d3de18a74971</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/call-for-webtunnel-bridges/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/call-for-webtunnel-bridges/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/call-for-webtunnel-bridges/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Recent reports from Tor users in Russia indicate an escalation in online censorship with the goal of blocking access to Tor and other circumvention tools. This new wave includes attempts to block Tor bridges and pluggable transports developed by the Tor Project, removal of circumvention apps from stores, and targeting popular hosting providers, shrinking the space for bypassing censorship. &lt;a href="https://gitlab.torproject.org/tpo/anti-censorship/censorship-analysis/-/issues/40046"&gt;Despite these ongoing actions&lt;/a&gt;, Tor remains effective.&lt;/p&gt;
&lt;p&gt;One alarming trend is the targeted blocking of popular hosting providers by Roscomnadzor. As many circumvention tools are using them, this action made some Tor bridges inaccessible to many users in Russia. As Roscomnadzor and internet service providers in Russia are increasing their blocking efforts, the need for more &lt;a href="https://community.torproject.org/relay/setup/webtunnel/"&gt;WebTunnel bridges&lt;/a&gt; has become urgent.&lt;/p&gt;
&lt;h2&gt;Why Webtunnel bridges?&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Webtunnel&lt;/em&gt; is a new type of bridge that is particularly effective at flying under a censors's radar. Its design blends itself into other web traffic, allowing a user to &lt;a href="https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/"&gt;hide in plain sight&lt;/a&gt;. And since its launch earlier this year, we've made sure to prioritize small download sizes for more convenient distribution and simplified the support of uTLS intergration further mimicing the characteristics of more widespread browsers. This makes Webtunnel safe for general users because it helps conceal the fact that a tool like Tor is being used.&lt;/p&gt;
&lt;p&gt;We are calling on the Tor community and the Internet freedom community to help us scale up WebTunnel bridges. If you've ever thought about running a Tor bridge, &lt;strong&gt;now is the time&lt;/strong&gt;. Our goal is to deploy &lt;strong&gt;200 new WebTunnel bridges&lt;/strong&gt; by the end of this December (2024) to open secure access for users in Russia.&lt;/p&gt;
&lt;h2&gt;How to run a Tor WebTunnel bridge&lt;/h2&gt;
&lt;p&gt;On the International Day Against Online Censorship in March, we published a blog post introducing &lt;a href="https://blog.torproject.org/introducing-webtunnel-evading-censorship-by-hiding-in-plain-sight/"&gt;WebTunnel: "Hiding in Plain Sight"&lt;/a&gt;. Setting up a WebTunnel bridge requires some system administration skills, but we've streamlined the process to make it as straightforward as possible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1. Using Docker:&lt;/strong&gt; We offer a Docker image that simplifies deploying the Tor bridge and WebTunnel transport. Some additional configuration of your web server is required.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;2. Ansible automation:&lt;/strong&gt; A WebTunnel Ansible role, created by community member Jacobo Nájera, provides another way to set up a WebTunnel bridge quickly.&lt;/p&gt;
&lt;p&gt;You can find the technical requirements in our &lt;a href="https://community.torproject.org/relay/setup/webtunnel/"&gt;WebTunnel guide&lt;/a&gt;. In short, you'll need:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;A static IPv4 address (preferred)&lt;/li&gt;
&lt;li&gt;A self-hosted website&lt;/li&gt;
&lt;li&gt;A valid SSL/TLS certificate (e.g., Let's Encrypt)&lt;/li&gt;
&lt;li&gt;Bandwidth usage: at least 1 TB/month, but more is recommendable.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Important:&lt;/strong&gt; Avoid using free shared DNS services, as they are frequently blocked in Russia and other regions. Consult our community &lt;a href="https://community.torproject.org/relay/community-resources/good-bad-isps/"&gt;Good/Bad ISPs&lt;/a&gt; page for finding a provider for your WebTunnel bridge and avoiding popular hosting companies.&lt;/p&gt;
&lt;h2&gt;Bridge campaign rules for participation&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The campaign starts today, November 28, 2024, and will run until March 10, 2025.&lt;/strong&gt; As a token of our appreciation for your volunteer work, we're offering a Tor t-shirt to operators who run 5 or more WebTunnel bridges during this period. Please note: Only one t-shirt will be awarded per operator. See the technical requirements below to participate in the campaign.&lt;/p&gt;
&lt;h3&gt;Technical requirements for campaign&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Operators must run one WebTunnel bridge per IPv4. It is acceptable to use multiple subdomains or distinct domains.&lt;/li&gt;
&lt;li&gt;Include a valid email address as your contact information. Or we won't be able to confirm and validate your participation in the campaign.&lt;/li&gt;
&lt;li&gt;Maintain your bridges running for at least 1 year.&lt;/li&gt;
&lt;li&gt;Ensure your bridges have a solid uptime, operating close to 24/7. Reboots for updates are fine.&lt;/li&gt;
&lt;li&gt;Your bridge must remain functional during the campaign period.&lt;/li&gt;
&lt;li&gt;Do not host your bridges with &lt;a href="https://ntc.party/t/12845"&gt;Hetzner&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;How to participate&lt;/h3&gt;
&lt;p&gt;After spinning up and verifying that your five WebTunnel bridges are working, confirm your participation by emailing frontdesk@torproject.org with the following template:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;Subject: Participation in Bridge Campaign 2025
Body: Hi,
I'm signing up for the Tor Bridge Campaign. These are my bridges: 
    &amp;lt;Add here your bridge lines&amp;gt;
My t-shirt is (pick your size: https://gitlab.torproject.org/tpo/community/team/-/wikis/tshirts/tshirt-size-charts). 
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;To validate your participation, please contact us using the same email address listed in your contactinfo. You can expect your reward to be shipped in &lt;strong&gt;Q2 2025&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Russian censors targeting pluggable transports&lt;/h2&gt;
&lt;p&gt;Tor-powered applications like Tor Browser include built-in censorship circumvention features, but censors in Russia are increasingly targeting these mechanisms. For example, user reports suggest that &lt;a href="https://gitlab.torproject.org/tpo/anti-censorship/censorship-analysis/-/issues/40050"&gt;obfs4 connections are being blocked on some 4G mobile networks in Russia&lt;/a&gt;. Despite this, obfs4 remains the most widely used pluggable transport for Tor users in the country. Snowflake has also experienced partial blocks at certain providers and Tor's &lt;a href="https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/issues/40407"&gt;Anti-Censorship Team have been investigating&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Analyzing censorship tactics, developing fixes, and implementing new mitigations takes time and resources. In the meantime, Tor WebTunnel bridges serve as an urgent and immediate way to bypass censorship in Russia.&lt;/p&gt;
&lt;p&gt;Tor-powered applications are critical for combating online censorship in heavily restricted regions. In a country where &lt;a href="https://cepa.org/article/russias-bankers-become-secret-policemen/"&gt;"the biggest banks were instructed to punish customers using credit cards to pay for VPN services"&lt;/a&gt;, free and open source tools like Tor are some of the few remaining alternatives for keeping users connected.&lt;/p&gt;
&lt;h2&gt;Background: Tor blocked in Russia (2021)&lt;/h2&gt;
&lt;p&gt;In late 2021, the Russian government attempted to block Tor, &lt;a href="https://blog.torproject.org/tor-censorship-in-russia/"&gt;as we detailed in our blog post.&lt;/a&gt; Despite the censors' best efforts, Russian users were able to circumvent the block using Tor bridges.&lt;/p&gt;
&lt;p&gt;Upon launch of WebTunnel in early 2024, we only had 60 WebTunnel bridges. Today, the number has more than doubled to 143. However, we must improve our efforts to meet the rising demand and counter the evolving censorship landscape.&lt;/p&gt;
&lt;p&gt;If you've ever considered running a Tor bridge, now is an excellent time to get started. Please help us spread the word as your help is urgently needed.&lt;/p&gt;
&lt;h2&gt;I want to help, but I am not tech-savvy&lt;/h2&gt;
&lt;p&gt;No problem, you can help us spread the word. Now, more so than ever, it is important to speak up. Share this in your social networks–online AND offline. If enough people read this, we can reach those who can support with the technical aspects of this ask.&lt;/p&gt;
&lt;p&gt;You can also make a &lt;a href="https://donate.torproject.org"&gt;donation&lt;/a&gt; to the Tor Project. Right now, all donations are matched. That means when you donate $25, your donation will be matched by a generous donor, meaning Tor receives a total of $50. Every donation helps build our power in this fight.&lt;/p&gt;
&lt;h2&gt;Other resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://blog.torproject.org/tor-censorship-in-russia/"&gt;Responding to Tor Censorship in Russia (2021)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=YlZZQYLIXe8"&gt;DEF Con: How Russia is Trying to Block Tor (2022)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/circumvention"&gt;
          circumvention
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/announcements"&gt;
          announcements
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/network"&gt;
          network
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>The freedom to browse with privacy</title><link href="https://blog.torproject.org/freedom-to-browse/" rel="alternate"></link><updated>2024-11-27T00:00:00Z</updated><author><name>arturom</name></author><id>urn:uuid:d528e8a5-7223-333f-b839-b9c1ccae5fbf</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/freedom-to-browse/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/freedom-to-browse/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/freedom-to-browse/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Oftentimes we share stories about journalists, activists, whistleblowers, and people in authoritarian governments using Tor to speak truth to power without risking their lives. These are meaningful examples of the importance of Tor—but it’s important to remember that &lt;strong&gt;everyone&lt;/strong&gt;, everywhere has the right to speak, browse and search with freedom and with privacy. That’s why today, we’re sharing a story from Signh*, an anonymous user who submitted their story to &lt;a href="https://blog.torproject.org/support-tor-project-share-your-story/"&gt;our call for Tor stories&lt;/a&gt;. People like Signh, who don't consider themselves tech-savvy, also deserve the right to browse freely.&lt;/p&gt;
&lt;p&gt;*=pseudonym.&lt;/p&gt;
&lt;h1&gt;Who you support by supporting Tor: Signh, UK&lt;/h1&gt;
&lt;p&gt;Singh is a woman living in the UK who values her privacy and controls her online identity with Tor Browser. She's not a tech expert, but she understands the importance of protecting her personal data in today's digital world.&lt;/p&gt;
&lt;p&gt;When Singh goes online, she mostly spends her time on social sites, and often gets caught doom scrolling about specific social and political issues that impact her life. Her activity leaves a trail of information that can be collected and used by her Internet Service Provider (ISP) and the websites she visits. Singh doesn't want companies knowing what she does online or where she's located, because she doesn't want that data being used to manipulate the content she's served.&lt;/p&gt;
&lt;p&gt;That's where Tor Browser comes in. By using Tor Browser and its encryption and anonymity features, Singh can browse the web with confidence, knowing that her online activity is hidden from prying eyes. Her ISP can't see the websites she's visiting, and the websites she visits can't see her IP address. Tor Browser even protects her from fingerprinting techniques and cookies deployed by advertising technologies.&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;"I do not face any direct threats or risks regarding my use of the internet, and solely use Tor to avoid mass surveillance of my browsing history. Although my physical well being is not threatened by the mass surveillance I mentally feel much more at ease knowing that my browsing history is protected by using Tor."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;With Tor, Singh has the power to decide who gets access to her browsing activity and IP address. She's not just a consumer; she's an active participant in her online experience.&lt;/p&gt;
&lt;p&gt;Singh is one of millions of users who choose Tor Browser for her online privacy needs and believes in the right to browse with freedom.&lt;/p&gt;
&lt;h1&gt;How to contribute&lt;/h1&gt;
&lt;p&gt;The Tor Project is a nonprofit, but it’s also a free software organization and a community-focused project. We are building technology to protect people's privacy and combat mass surveillance regardless of who is in power. Together, we are working against a billion dollar industry based on data collection and mass surveillance.&lt;/p&gt;
&lt;p&gt;We will continue to need your support to keep this fight going. Will you please consider giving to the Tor Project?&lt;/p&gt;
&lt;p&gt;&lt;a href="https://torproject.org/donate/donate-bp3-yec2024"&gt;&lt;img class=align-center src="https://blog.torproject.org/freedom-to-browse/donate-button_2x.png" alt="Donate Button"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This year, all gifts made before December 31 will be matched up to $300,000.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/fundraising"&gt;
          fundraising
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Alpha Release: Tor Browser 14.5a1</title><link href="https://blog.torproject.org/new-alpha-release-tor-browser-145a1/" rel="alternate"></link><updated>2024-11-26T00:00:00Z</updated><author><name>ma1</name></author><id>urn:uuid:8204f5a2-5b30-31aa-9393-24d7b1fcc65b</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-alpha-release-tor-browser-145a1/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-alpha-release-tor-browser-145a1/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-alpha-release-tor-browser-145a1/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 14.5a1 is now available from the &lt;a href="https://www.torproject.org/download/alpha/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/14.5a1/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;p&gt;We would like to thank the following community members for their contribution to this release:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;NoisyCoil for several patches allowing us to create aarch64 Linux builds of our browsers,&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41142"&gt;tor-browser-build#41142&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41306"&gt;tor-browser-build#41306&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41307"&gt;tor-browser-build#41307&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41266"&gt;tor-browser-build#41266&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;cypherpunks1 for Tor Browser UI improvements on Android,&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43241"&gt;tor-browser#43241&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43251"&gt;tor-browser#43251&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The full changelog since &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/main/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;Tor Browser 14.0a9&lt;/a&gt; is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated NoScript to 11.5.2&lt;/li&gt;
&lt;li&gt;Updated Tor to 0.4.8.13&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41710"&gt;Bug tor-browser#41710&lt;/a&gt;: Refactor about:torconnects relation to TorConnectParent&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42125"&gt;Bug tor-browser#42125&lt;/a&gt;: lock RFP part 2&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43307"&gt;Bug tor-browser#43307&lt;/a&gt;: Rebase Tor Browser alpha onto 128.5.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43313"&gt;Bug tor-browser#43313&lt;/a&gt;: Backport security fixes from Firefox 133&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 128.5.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42186"&gt;Bug tor-browser#42186&lt;/a&gt;: Drop about:tbupdate&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42597"&gt;Bug tor-browser#42597&lt;/a&gt;: Lox.generateInvite does not convert JSON object to string&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42739"&gt;Bug tor-browser#42739&lt;/a&gt;: Fix localization in the profile error dialog&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/42802"&gt;Bug tor-browser#42802&lt;/a&gt;: Make use of &lt;code&gt;:has&lt;/code&gt; CSS selector&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43237"&gt;Bug tor-browser#43237&lt;/a&gt;: Tweak Tor circuit display panel for screen readers&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43262"&gt;Bug tor-browser#43262&lt;/a&gt;: Onion keys dialog. "Remove" removes all keys, "Remove all" does nothing.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43263"&gt;Bug tor-browser#43263&lt;/a&gt;: Onion site keys: add some alerts for screen readers&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43294"&gt;Bug tor-browser#43294&lt;/a&gt;: Replace &lt;code&gt;Actor&lt;/code&gt; &lt;code&gt;willDestroy&lt;/code&gt; with &lt;code&gt;didDestroy&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43314"&gt;Bug tor-browser#43314&lt;/a&gt;: Tidy up connection preferences for screen readers and keyboard users&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/MozBug 1768724/-/issues/43165"&gt;Bug MozBug 1768724#43165&lt;/a&gt;: Disable Microsoft SSO on macOS [tor-browser]&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41786"&gt;Bug tor-browser#41786&lt;/a&gt;: Remove old fontconfig stuff at the next watershed update&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41799"&gt;Bug tor-browser#41799&lt;/a&gt;: Make lack of fonts.conf less of a footgun&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41298"&gt;Bug tor-browser-build#41298&lt;/a&gt;: Remove &lt;code&gt;--detach&lt;/code&gt; parameter from .desktop files&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41312"&gt;Bug tor-browser-build#41312&lt;/a&gt;: Remove comment in start-browser about --class and --name parameters&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41313"&gt;Bug tor-browser-build#41313&lt;/a&gt;: Show waiting cursor while app opens&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 128.5.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43232"&gt;Bug tor-browser#43232&lt;/a&gt;: Make the Android Meek transport easier to debug&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43241"&gt;Bug tor-browser#43241&lt;/a&gt;: Improve hiding non-private tab features on Android&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43251"&gt;Bug tor-browser#43251&lt;/a&gt;: Enable tab suggestions and autocomplete for private tabs on Android&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated Go to 1.22.9&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43272"&gt;Bug tor-browser#43272&lt;/a&gt;: Fix git fetch in translation CI&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43295"&gt;Bug tor-browser#43295&lt;/a&gt;: Update MR templates&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/40996"&gt;Bug tor-browser-build#40996&lt;/a&gt;: Do not version the .nobackup files&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41279"&gt;Bug tor-browser-build#41279&lt;/a&gt;: Add @pierov and @ma1 as new signers&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41284"&gt;Bug tor-browser-build#41284&lt;/a&gt;: Update relprep.py script to not synchronise changelogs between channels&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41288"&gt;Bug tor-browser-build#41288&lt;/a&gt;: Use exec_noco option when using exec&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41289"&gt;Bug tor-browser-build#41289&lt;/a&gt;: Fix single-browser in relprep.py&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41300"&gt;Bug tor-browser-build#41300&lt;/a&gt;: Add bea, clairehurst, and jwilde to tb_builders&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41304"&gt;Bug tor-browser-build#41304&lt;/a&gt;: Add a browser commit tag+signing script&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41306"&gt;Bug tor-browser-build#41306&lt;/a&gt;: Container dependencies are sorted before resolving templates&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41307"&gt;Bug tor-browser-build#41307&lt;/a&gt;: Container dependencies are not filtered for duplicates&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41321"&gt;Bug tor-browser-build#41321&lt;/a&gt;: Update PieroV's expired keys&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/rbm/-/issues/40006"&gt;Bug rbm#40006&lt;/a&gt;: Add option to avoid doing a git checkout when using the exec template function&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41286"&gt;Bug tor-browser-build#41286&lt;/a&gt;: Update the deploy update scripts to optinally take an override hash&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41142"&gt;Bug tor-browser-build#41142&lt;/a&gt;: Complete the toolchain for linux-aarch64&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41266"&gt;Bug tor-browser-build#41266&lt;/a&gt;: Build the Tor and Mullvad Browsers for aarch64 Linux&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41282"&gt;Bug tor-browser-build#41282&lt;/a&gt;: Add SSL to our custom Python for MozBug 1924022&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tor Browser 14.0.3</title><link href="https://blog.torproject.org/new-release-tor-browser-1403/" rel="alternate"></link><updated>2024-11-26T00:00:00Z</updated><author><name>morgan</name></author><id>urn:uuid:6b98595e-5a17-3ea3-9f56-5337b0f729b1</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-1403/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-1403/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-1403/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 14.0.3 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/14.0.3/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The full changelog since &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-14.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;Tor Browser 14.0.2&lt;/a&gt; is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43306"&gt;Bug tor-browser#43306&lt;/a&gt;: Rebase Tor Browser Stable onto 128.5.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43313"&gt;Bug tor-browser#43313&lt;/a&gt;: Backport security fixes from Firefox 133&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 128.5.0esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/MozBug 1768724/-/issues/43165"&gt;Bug MozBug 1768724#43165&lt;/a&gt;: Disable Microsoft SSO on macOS [tor-browser]&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 128.5.0esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated Go to 1.22.9&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/40996"&gt;Bug tor-browser-build#40996&lt;/a&gt;: Do not version the .nobackup files&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41284"&gt;Bug tor-browser-build#41284&lt;/a&gt;: Update relprep.py script to not synchronise changelogs between channels&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41300"&gt;Bug tor-browser-build#41300&lt;/a&gt;: Add bea, clairehurst, and jwilde to tb_builders&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Memory quota tracking in Arti, for Onion Service DoS resistance</title><link href="https://blog.torproject.org/arti_1_3_0_memquota/" rel="alternate"></link><updated>2024-11-19T00:00:00Z</updated><author><name>Diziet</name></author><id>urn:uuid:619bae93-1ae7-39f4-9c24-d2b4e58fa0aa</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/static/images/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/static/images/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/static/images/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Last week we &lt;a href="https://blog.torproject.org/arti_1_3_0_released/"&gt;released Arti 1.3.0&lt;/a&gt;,
the latest version of our rewrite of Tor in Rust.
One new feature in this release is memory quota tracking.&lt;/p&gt;
&lt;h3&gt;Tracking and restricting memory for queued data&lt;/h3&gt;
&lt;p&gt;The memory quota tracking feature allows you to restrict the amount of memory used by an Arti process.
In particular, it allows you to limit the amount of memory
&lt;em&gt;that other people can cause your Arti to use&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;This is particularly important when Arti is being used
to provide an Onion Service (aka a Tor Hidden Service).
Running an Onion Service means letting users from all over the network
connect to your service
(depending, to an extent, on your configuration settings).
That means those users can cause your system to do work,
and, generally, to store data in transit to and from your Onion Service.
In 2014, Jansen et al discovered that this kind of data storage can
&lt;a href="https://www.freehaven.net/anonbib/cache/sniper14.pdf"&gt;even be used to help deanonymise your service&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We have now implemented the recommended countermeasure:
Arti can track how much data is stored in its various queues.
When the configured limit is reached,
Arti starts shutting down connections, and discarding data,
until the queued data is below the limit.
We kill the connections with the oldest oustanding data.
This minimises the impact on unrelated, innocent, traffic.&lt;/p&gt;
&lt;p&gt;We'll also need this memory limit feature for Arti Relay,
which is currently being developed.&lt;/p&gt;
&lt;h3&gt;Configuration&lt;/h3&gt;
&lt;p&gt;In Arti, the memory quota tracker is controlled
by the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/36b074480a9bc4774648cb5e47ff06976f2992be/crates/arti/src/arti-example-config.toml#L457"&gt;&lt;code&gt;[system.memory]&lt;/code&gt;&lt;/a&gt;
configuration subsection in &lt;code&gt;arti.toml&lt;/code&gt;.
You can enable it by writing something like this:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;[system]
memory.max = "1 GiB"
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;The feature is compiled in by default.
Setting the limit for the first time requires an Arti restart.
After that, adjusting (or removing) the limit can be done
at runtime.&lt;/p&gt;
&lt;p&gt;There is also a &lt;code&gt;memory.low_water&lt;/code&gt; setting:
When Arti needs to free memory because &lt;code&gt;max&lt;/code&gt; is exceeded,
it keeps tearing down connections until the usage is below &lt;code&gt;low_water&lt;/code&gt;.
This &lt;a href="https://en.wikipedia.org/wiki/Hysteresis"&gt;hysteresis&lt;/a&gt; helps stop the system oscillating.
The defaualt value of &lt;code&gt;low_water&lt;/code&gt; is 75% of &lt;code&gt;max&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;(Note that unlike C Tor's &lt;code&gt;MaxMemInQueues&lt;/code&gt; setting,
the current default in Arti is &lt;em&gt;not&lt;/em&gt; to enable a memory limit.
In Arti you must turn on the feature explicitly, by setting &lt;code&gt;max&lt;/code&gt;.
We hope to get more experience of how it works for users in practice,
before we consider whether to enable a limit by default.)&lt;/p&gt;
&lt;h3&gt;Logging&lt;/h3&gt;
&lt;p&gt;After you've enabled memory quota tracking, you should see Arti print a log message like this:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;2024-10-31T16:55:55Z  INFO tor_memquota::mtracker: memory quota tracking initialised max=1.00 GiB low_water=768 MiB
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;You can tell if memory reclaim has been triggered:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;2024-10-31T17:22:19Z  INFO tor_memquota::mtracker::reclaim: memory tracking: 1.86 GiB &amp;gt; 1.00 GiB, reclamation started (target 768 MiB)
...
2024-10-31T17:22:20Z  INFO tor_memquota::mtracker::reclaim: memory tracking reclamation reached: 44.3 KiB (target 768 MiB): complete
&lt;/code&gt;&lt;/pre&gt;
&lt;h3&gt;Caution: very new code!&lt;/h3&gt;
&lt;p&gt;This is a very new feature.
There is a lot of complexity behind the scenes,
and by its nature it is difficult to do a full-scale integration test.
It is quite possible that there are bugs!
We'd like to hear your feedback, when you enable this feature.&lt;/p&gt;
&lt;p&gt;You can report issues you discover
&lt;a href="https://gitlab.torproject.org/tpo/core/arti"&gt;in our gitlab&lt;/a&gt;
(also available via an
&lt;a href="https://anonticket.torproject.org/"&gt;anonymous ticket reporting system&lt;/a&gt;).
You can also contact us informally by email, or on irc:
we're in &lt;code&gt;#tor-dev&lt;/code&gt; on &lt;a href="https://www.oftc.net/"&gt;OFTC&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Thanks to our sponsors&lt;/h3&gt;
&lt;p&gt;Thanks to
&lt;a href="https://zcashcommunitygrants.org/"&gt;Zcash Community Grants&lt;/a&gt;
for their funding,
which enabled the development of this feature,
and of course to our &lt;a href="https://www.torproject.org/about/sponsors/"&gt;other sponsors&lt;/a&gt;
for funding the development of Arti.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/onion-services-relays"&gt;
          onion-services relays
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tor Browser 14.0.2</title><link href="https://blog.torproject.org/new-release-tor-browser-1402/" rel="alternate"></link><updated>2024-11-13T00:00:00Z</updated><author><name>morgan</name></author><id>urn:uuid:958f65d7-9d81-3ef0-b68a-f391705163a8</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-1402/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-1402/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-1402/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 14.0.2 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/14.0.2/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version fixes a tor crash bug on macOS when attempting to visit onion sites with PoW protections enabled (&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43245"&gt;tor-browser#43245&lt;/a&gt;)&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The full changelog since &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-14.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;Tor Browser 14.0.1&lt;/a&gt; is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated NoScript to 11.5.2&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43257"&gt;Bug tor-browser#43257&lt;/a&gt;: NoScript-blocked content placeholders causing slow downs&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/32668"&gt;Bug tor-browser#32668&lt;/a&gt;: NoScript default whitelist re-appears on clicking NoScript Options / Reset&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43258"&gt;Bug tor-browser#43258&lt;/a&gt;: NoScript Lifecycle error on extension updates&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43262"&gt;Bug tor-browser#43262&lt;/a&gt;: Onion keys dialog. "Remove" removes all keys, "Remove all" does nothing.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43245"&gt;Bug tor-browser#43245&lt;/a&gt;: TB14 on macOS crashing when visiting some onionsites&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated Go to 1.22.9&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41286"&gt;Bug tor-browser-build#41286&lt;/a&gt;: Update the deploy update scripts to optinally take an override hash&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Defending the Tor network: Mitigating IP spoofing against Tor</title><link href="https://blog.torproject.org/defending-tor-mitigating-IP-spoofing/" rel="alternate"></link><updated>2024-11-08T00:00:00Z</updated><author><name>gus</name></author><id>urn:uuid:b1077341-0828-38dc-bdcc-a0242b72f2ce</id><content type="html">&lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/defending-tor-mitigating-IP-spoofing/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/defending-tor-mitigating-IP-spoofing/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/defending-tor-mitigating-IP-spoofing/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;At the end of October, &lt;a href="https://community.torproject.org/relay/governance/policies-and-proposals/directory-authority/"&gt;Tor directory authorities&lt;/a&gt;, &lt;a href="https://community.torproject.org/relay/"&gt;relay operators&lt;/a&gt;, and even the &lt;a href="https://gitlab.torproject.org/tpo/tpa/team/-/issues/41840"&gt;Tor Project sysadmin team&lt;/a&gt; received multiple abuse complaints from their providers about port scanning. These complaints were traced back to a coordinated IP spoofing attack, where an attacker spoofed non-exit relays and other Tor-related IPs to trigger abuse reports aimed at disrupting the Tor Project and the Tor network.&lt;/p&gt;
&lt;p&gt;Thanks to a joint effort from the Tor community, &lt;a href="https://www.opentech.fund/projects-we-support/supported-projects/interseclab/"&gt;InterSecLab&lt;/a&gt;, and the support of Andrew Morris and the team at &lt;a href="https://www.greynoise.io/"&gt;GreyNoise&lt;/a&gt;, the origin of these spoofed packets was identified and shut down on November 7th, 2024.&lt;/p&gt;
&lt;p&gt;We want to reassure everyone that this incident had no effect on Tor users. While the attack had a limited impact on the Tor network - taking a few relays offline temporarily - it caused unnecessary stress and inconvenience for many relay operators who had to address these complaints. Although this attack targeted our community, IP spoofing attacks can happen with any &lt;a href="https://cyberscoop.com/spoofed-bank-ip-address-greynoise-andrew-morris-bank-of-america"&gt;online service&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;There's still work ahead: we need to support relay operators in getting their accounts reinstated and assist providers in unblocking IPs for Tor directory authorities.&lt;/p&gt;
&lt;h3&gt;Hosting providers and abuse complaints&lt;/h3&gt;
&lt;p&gt;If you are a relay operator whose hosting provider is still blocking or has suspended your relay due to these complaints, here are steps you can take to resolve the issue:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Check Tor directory authorities reachability from your relay: If you suspect your provider has blocked Tor access -- i.e., because your relay dropped from the Tor consensus --, use &lt;a href="https://ooni.org/install/"&gt;OONI Probe&lt;/a&gt; and &lt;a href="https://ooni.org/nettest/tor/"&gt;"Circumvention" test&lt;/a&gt; to check the reachability of Tor directory authorities. If the test shows that most directory authorities are reachable, your relay will successfully (re-)connect to the Tor network. If Tor directory authorities are still blocked, please contact your hosting provider support and share this blog post.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Reply to your hosting company: If you got contacted by your provider due to the abuse complaints, share this blog post to help them understand the incident and clarify that your Tor relay was targeted by a spoofing attack, and is NOT originating any suspicious traffic. You can adapt and use this &lt;a href="https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/85#note_3126618"&gt;template about abuse complaints&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Community strength and collaboration&lt;/h3&gt;
&lt;p&gt;This incident has demonstrated the resilience and collaborative spirit of the Tor relay operator community. Over the past days, we've seen many instances of good collaboration to defend the Tor network: analysis, investigation, and knowledge sharing. Relay operators worked together to troubleshoot issues, support each other over email and chat, and keep relays online.&lt;/p&gt;
&lt;p&gt;We encourage relay operators to stay connected and informed through our &lt;a href="https://lists.torproject.org/mailman3/postorius/lists/tor-relays.lists.torproject.org/"&gt;official community channels&lt;/a&gt; and participate in our monthly relay operator meetups.&lt;/p&gt;
&lt;p&gt;Thank you to every relay operator for your ongoing efforts to run relays, protect online privacy, and support the Tor Project! &amp;lt;3&lt;/p&gt;
&lt;h3&gt;Background: What happened?&lt;/h3&gt;
&lt;p&gt;On October 20, Tor directory authorities began receiving abuse complaints claiming that their servers were engaged in unauthorized port scans. In the Tor network, directory authorities play a critical role in maintaining the list of available relays.&lt;/p&gt;
&lt;p&gt;This attack focused on non-exit relays, using spoofed SYN packets to make it appear that Tor relay IP addresses were the sources of these scans. This led to automated abuse complaints directed at data centers such as OVH, Hetzner, and other providers. The attacker's intent seems to have been to disrupt the Tor network and the Tor Project by getting these IPs on blocklists with these unfounded complaints.&lt;/p&gt;
&lt;p&gt;Pierre Bourdon, a relay operator, shared insights into the attack in his post, &lt;em&gt;&lt;a href="https://delroth.net/posts/spoofed-mass-scan-abuse/"&gt;"One weird trick to get the whole planet to send abuse complaints to your best friend(s)"&lt;/a&gt;&lt;/em&gt;, which sheds light on how the attacker used spoofed IP packets to trigger automated abuse complaints across the network. A huge thank you to Pierre for his detailed analysis and for sharing his findings with the community!&lt;/p&gt;
&lt;p&gt;While we received support from many individuals and organizations during this incident, we also experienced instances of unprofessional conduct, where a the refusal to investigate and lack of diligence inadvertently amplified the impact of this attack. Much of the reporting on this fake abuse attack comes from watchdogcyberdefense[.]com and we endorse the calls within the cybersecurity community to &lt;a href="https://seclists.org/nanog/2024/Nov/24"&gt;treat these reports with caution&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For a more detailed discussion, please refer to our &lt;a href="https://gitlab.torproject.org/tpo/network-health/analysis/-/issues/85"&gt;public ticket on the issue&lt;/a&gt; and &lt;a href="https://archive.torproject.org/websites/lists.torproject.org/pipermail/tor-relays/2024-October/021953.html"&gt;our mailing list&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;While spoofing activity is not specific to Tor, it’s concerning that someone would choose to deliberately disrupt a service that is essential for people experiencing digital surveillance and internet censorship. Tor plays a critical role in supporting freedom of access and expression globally, and targeting it undermines these fundamental rights. We are grateful for the resilience and dedication of our relay operator community, whose collective efforts ensure the strength of Tor’s decentralized network.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/network"&gt;
          network
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/relays"&gt;
          relays
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry></feed>