Hello Tor, hello world!
Below you'll find the highlights of Tor metrics team work done in May 2018.
On behalf of the Tor metrics team, Karsten
Completed the draft document with graph specifications to now include all graphs on Tor Metrics.
Resolved a series of smaller inconsistencies in statistics on Tor Metrics, including: number of bytes spent on directory requests [1], bandwidth histories [2], and onion services [3].
[1] https://bugs.torproject.org/26002 [2] https://bugs.torproject.org/26015 [3] https://bugs.torproject.org/26022
Extended per-graph CSV files on Tor Metrics to support ad-hoc generation of CSV files without parameters to cover more data than what's displayed in a graph [4].
[4] https://bugs.torproject.org/25383
Improved explanations of metrics and flags on Relay Search [5, 6, 7]
[5] https://bugs.torproject.org/25881 [6] https://bugs.torproject.org/25854 [7] https://bugs.torproject.org/26079
Put out new releases of CollecTor and metrics-lib [8] as well as Onionoo, ExoneraTor, and metrics-web [9] to switch from Gson to Jackson as JSON library.
[8] https://lists.torproject.org/pipermail/tor-dev/2018-May/013191.html [9] https://lists.torproject.org/pipermail/tor-dev/2018-May/013204.html
Extended CollecTor's index.json file to include contributed data in preparation of serving metrics-related research data from the wider Tor community on Tor Metrics.
Hello metrics folks:
I wanted to note that this talk took place today in DC on Tor metrics; here is the abstract:
Just an FYI--hope everyone is enjoying their summer.
Cheers,
Kate
3:40 p.m. - 4:05 p.m. Speaker: Ryan Wails (U.S. Naval Research Laboratory) Title: Tunable Transparency: Secure Computation in the Tor Network Abstract: Tor is a widely popular tool for online privacy. Despite its focus on privacy, Tor benefits from some transparency about the operation of its network. Measurements of Tor help direct its developers, inform its users, and guide policymakers. Existing approaches to making these measurements, including Tor's current techniques, are limited in the types of measurements that can be made. We present a system that uses secure multiparty computation (MPC) protocols to give Tor full power to tune its transparency, that is, to compute any function of its relays' observations while keeping the observations themselves private. Our system scales to Tor's thousands of relays, provides security depending only on Tor's core trust assumption that a large fraction of its bandwidth is honest, and efficiently makes use of Tor's network and computational resources. We demonstrate how to use our system to compute two broadly-applicable statistics: the median of relay inputs and the cardinality of set-union across relays. We implement our protocols and experimentally test their performance in networks like Tor using the Shadow simulator. Our experiments show that, for a network of Tor's current size, a median can be computed in 25 minutes, given 11 hours of preprocessing, and that set-union cardinality can be computed in 13 seconds, given 7 hours of preprocessing.
tor-project@lists.torproject.org