Hi,
Here are our meeting logs:
http://meetbot.debian.net/tor-meeting/2022/tor-meeting.2022-07-05-13.59.log…
And our meeting notes:
## Tor Community Team meeting pad
Next meeting: Monday, July 11, 2022 - 1400 UTC
Weekly meetings, every Monday at 14:00 UTC, in #tor-meeting at OFTC
(channel is logged while meetings are in progress)
## Goal of this meeting
Weekly check-in about the status of Community Team work at Tor.
## Links to Useful documents
* Previous meetings: https://forum.torproject.net/tag/community-team
* Monthly l10n hangout:
https://community.torproject.org/localization/hangouts/
* Known issues with Tor Browser:
https://tb-manual.torproject.org/known-issues/
and Tor Browser for Android:
https://tb-manual.torproject.org/mobile-tor/#known-issues
## Discussion
* Q3 roadmap: discussion at the next community team meeting - https://tor.meet.coop/gus-dib-5tv-zu3
* Tor user documentation guideline: https://gitlab.torproject.org/tpo/community/team/-/issues/5
- Scope of this guideline: tb-manual, support portal, community
portal.
- Formal vs informal: informal
- Avoid contractions?: yes
* input needed for social media bank: https://pad.riseup.net/p/hackweek-social-media-bank-83X6P-keep
## Status
Gus:
Last weeks:
- cdr.link migration:
https://gitlab.torproject.org/tpo/community/support/-/issues/40083
- Verified Tor official Telegram bots and channel: @gettor_bot,
@getbridgesbot, @torproject. @torprojectsupportbot verification
process is still ongoing.
- Tor relay operator meetup:
https://gitlab.torproject.org/tpo/community/relays/-/issues/47
- Community Team Q3 roadmap
This week:
- Follow up Sponsor9 trainings in East Africa
- Tor Training with AWJ Project this Wednesday about onion
services
- Team 1:1s
- Sponsor30: work with organizations from Ecuador about Tor
online training next month
- S96:
https://gitlab.torproject.org/tpo/community/relays/-/issues/44
- Sponsor123, Sponsor9 and Sponsor96 meetings
- Training with Ushahidi / Kenya
Joydeep:
Last week(s):
- user support work on RT, Forum and cdr.link
- Tor Forum retrospective at All hands
- cdr.link migration related tasks
This week:
- 1:1 with Gus
- sync with the UX team
Nina:
Last week:
- New cdr.link instance - migration and familiarisation
- User support on Telegram, email, IRC
- HackWeek
This week:
- Editing some RT articles to make them in line with our
telegram activities
- User support
- 1:1 with Gus
Rhatto:
Last week:
- Sauteed Week! https://gitlab.torproject.org/rhatto/sauteed-week
This week:
- Sponsor 123 meetings and deployments
emmapeel:
Last week:
- hackweek
- support russian translator and bring back her input
- plan some stuff for new grant
This week:
- more support for s125
- deal with gitlab backlog
- refine the social media bank project from the hackweek
raya:
Last weeks:
- 1:1 with EA orgs for Tor trainings
- ToTs with EA orgs for Tor trainings
- S123 coordination and meetings
- AWJ training interpretation
- Hackweek!
This week:
- S123 coordination and board cleanup
- S123 meeting with networks
- S123 review meeting of censorship circumvention campaign
- AWJ training
- L10n lab sync meeting
- 1:1 with EA org for Tor training
--
The Tor Project
Community Team Lead
Hi all :)
This is my monthly status report for June 2022.
Main activities during the period:
0. [Onionprobe][] (an onion sites monitoring tool):
* Expected HTTP status codes:
* Per-endpoint configuration specifying a list of expected HTTP status
codes, useful when it's expected that an endpoint returns a status other
than 200.
* Custom metric indicating if the status code is expected or not.
1. [Onionmine][] (a wrapper for Onion Service vanity address generation):
* Adds MINE_ONLY_IF_NO_SELECTED_KEY_EXISTS parameter, useful for batch
generation of keys.
* Encrypted storage support for selected candidates.
2. Created the EOTK Log parser tool an library:
https://gitlab.torproject.org/tpo/onion-services/eotk-log-parser
3. Worked with the Sauteed Onions proposal during the Tor Hackweek:
https://gitlab.torproject.org/rhatto/sauteed-week
4. Other activities related to Sponsor 123 such as development, deployment,
monitoring and support).
[Onionprobe]: https://gitlab.torproject.org/tpo/onion-services/onionprobe
[Onionmine]: https://gitlab.torproject.org/tpo/onion-services/onionmine
--
Silvio Rhatto
pronouns he/him
Hi, everyone,
This is my Status report for June 2022.
As usual, my focus in June was on supporting Russian-speaking users of
Tor Browser on various channels: Telegram, IRC, and email.
1. User support
Overall:
537 tickets were successfully resolved!
- Telegram channel (@TorProjectSupportBot): 407
- Email (frontdesk@tpo): 130
The majority of requests were censorship-related - bridges and
troubleshooting around them. But there were issues with TB not working
on Windows 10 and proxy server bug [1]
2. Migration
The migration to the new cdr.link instance happened at the end of June
[2]. I tested the new one final instance after it became our main one.
So I shared my experience of 5 months of using the cdr.link for tech
support [3], which was positive. During the discussion, a few good ideas
came up - to use the tag system from the start and to communicate with
the users that we deleted all the previous data, so they need to
re-share background info with us.
So now, this channel is published on the Tor Project website [2] and is
open to any user regardless of the language.
3. Hackweek
Taking part in Hackweek, I started to gather useful information on the
countries with a high risk of censorship events, the work I plan to
continue.
[1]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/40536
[2] https://gitlab.torproject.org/tpo/tpa/team/-/issues/40592
[3] https://gitlab.torproject.org/tpo/community/support/-/issues/40084
[4] https://support.torproject.org/misc/bug-or-feedback/
Hi Everyone,
I believe tomorrow is an official Tor holiday, so we will move the Tor Browser weekly meeting back a
day to Tuesday (2022-07-05) at 1100 UTC in #tor-meeting on OFTC IRC.
best,
-Richard
Hi everyone!
Here is my status report for June 2022.
At the beginning of the month, I finished reviewing, reordering, and
improving our patch set [0], as part of the work for S131.
Then, I merged other changes I had worked on during the past months: the
offline manual is now a thing, and we also merged the new mechanism to
deal with the .securedrop.tor.onion domains. With it, we could remove
HTTPS Everywhere from the desktop version of TBB.
All these changes are available in Tor Browser 11.5a13.
Some other minor changes I have been working on will be available in the
next release (possibly, the first stable of Tor Browser 11.5).
The latest issues I have been working on are about fonts. We want to
improve script support in Tor Browser [1], at least on Windows and
Linux. macOS will have to wait because we found an issue with bundled
fonts [2], which turned out to be an upstream problem [3], for which I
proposed a patch to Mozilla.
Please, let us know if the pages in your language are not rendered or
rendered incorrectly in Tor Browser.
Finally, the last week has been hackweek at the Tor Project.
I joined the project to improve support for pluggable transport in Tails.
Thanks,
Pier
[0]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/commits/tor-br…
[1]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/30589
[2]
https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/41004
[3] https://bugzilla.mozilla.org/show_bug.cgi?id=1774413