Every year people from the Tor Project communities present the State of the Onion, a compilation of updates from our different projects, at conferences around the world. We use this opportunity to talk about highlights of the work we’ve accomplished during the year and what we are excited about in the upcoming year.
With COVID-19 pandemic this year, we didn’t have the chance to ‘tour’ our State of the Onion during any face-to-face conferences. So we decided to bring the State of the Onion to you in a special livestream on November 16 from 16:00 - 18:00 UTC.*
We have an awesome, comprehensive program this year, as we want to show off all the work that the Tor Project has been doing as well as highlight the work from people in our community. Isabela Bagueros, our executive director, will host this event and help to provide continuity for everything we’ll discuss.
Presentation on the work we’ve been doing to deliver trainings to communities around the world, how we’re adapting this work during the COVID-19 pandemic, as well as how we’re building connections with users through the year.
Tor Browser
Matthew Finkel
Tor Browser Team Lead
Presentation on the successful migration of Tor Browser desktop and mobile onto Fenix, the newest version of Firefox.
User experience
Antonela Debiasi
UX Lead & Designer
Presentation on the user experience improvements we have made in Tor tools during 2020 and what’s coming next in 2021.
Onion services
David Goulet
Network Team Developers
Presentation on onion services improvements we’ve accomplished in 2020.
Tokens
George Kadianakis
Network Team Developer
Presentation on research to implement tokens to improve Tor usability and the results of our work over the last year.
Tor network performance
Mike Perry
Scalability and Network Performance Lead
Presentation on our efforts to improve performance on the Tor network.
Network simulation
Jim Newsome
Shadow Developer
Presentation on work to improve Shadow, the Tor network simulator used to conduct experiments with potential improvements before making these changes on the live network.
Network Health
Georg Koppen
Network Health Team Lead
Presentation on improving the health of the network and watching for bad relays.
Censorship circumvention
Cecylia
Anti-Censorship Team
Presentation on how we have improved Tor as a censorship circumvention tool in 2020 and a preview of what’s coming next.
Core tor
Nick Mathewson
Core Tor CTO
Presentation on our efforts to move into an implementation in Rust.
Integration
Alex Færøy
Network Team Lead
Presentation on work to help third-party developers to integrate tor into their applications and the work we’re doing to improve these integrations.
Part II — Tor Community
We have also invited other projects who are part of the Tor community to present and share their updates.
Presentation on recent SecureDrop improvements and the collaboration with Tor to create proof-of-concept human-memorable names for SecureDrop onion services addresses.
> You can ask questions or join the conversation in two ways: use the Twitter hashtag #StateOfTheOnion2020 or by using the live chat feature on the YouTube stream.
Not by the sites where Tor Project's other social accounts are? Not by Mastodon? Not by IRC or mailing list? So we have to have an account on Twitter or Google?
Always enjoyable. Perchance how might we bypass the Tor Blog censoring committee?
As a community, you can't hear from us if you keep censoring us. Or at least keep turning a blind eye to certain unnamed Tor staff members positively giddy about the censor button.
Btw still waiting on that open forum. Going on 6 months now.. zzz...
I tried Ricochet and didn't like it because 1. your username/address is constant so it accumulates a profile over time, 2. you have only one username/address so you cannot separate identities, 3. you need to be connected constantly so other people are able to message you, 4. the username you give out is an address to your local machine which exposes your local machine to DoS which, worse yet, can undergo traffic analysis by a global adversary to geolocate you.
> Presentation on the successful migration of Tor Browser desktop and mobile onto Fenix, the newest version of Firefox.
Users need more information on the javascript flaw in the "Safest" setting in Tor Browser. Note that Tails 4.12 users are getting a pop-up warning that this flaw is critical and unfixed. (Tails 4.13 is due out next week and I hope this edition will fix the problem.)
Comments
Please note that the comment area below has been archived.
Will the livestream be…
Will the livestream be recorded?
Yep! After the even, you'll…
Yep! After the event, you'll be able to access the recording at the same YouTube link above.
Thank you!
Thank you!
Would be great to see a…
Would be great to see a recording uploaded to some PeerTube instance like LibreMedia!
> You can ask questions or…
> You can ask questions or join the conversation in two ways: use the Twitter hashtag #StateOfTheOnion2020 or by using the live chat feature on the YouTube stream.
Not by the sites where Tor Project's other social accounts are? Not by Mastodon? Not by IRC or mailing list? So we have to have an account on Twitter or Google?
Join us for our anonymity…
Join us for our anonymity talk via your surveillance network of choice!
Both of which are extremely…
Both of which are extremely hostile to Tor users...
"plus hear from the Tor…
"plus hear from the Tor community"
Always enjoyable. Perchance how might we bypass the Tor Blog censoring committee?
As a community, you can't hear from us if you keep censoring us. Or at least keep turning a blind eye to certain unnamed Tor staff members positively giddy about the censor button.
Btw still waiting on that open forum. Going on 6 months now.. zzz...
not a single word about…
not a single word about relays operators. still looking forward to this event
would be nice to have a virtual tor relays operators meetup though
what is that, 17 short…
what is that, 17 short presentations? a lot of topics for 120min ... or will there be multiple streams?
Yes, 17 short presentations.
Yes, 17 short presentations.
>Ricochet Refresh I didn't…
>Ricochet Refresh
I tried Ricochet and didn't like it because 1. your username/address is constant so it accumulates a profile over time, 2. you have only one username/address so you cannot separate identities, 3. you need to be connected constantly so other people are able to message you, 4. the username you give out is an address to your local machine which exposes your local machine to DoS which, worse yet, can undergo traffic analysis by a global adversary to geolocate you.
> Presentation on the…
> Presentation on the successful migration of Tor Browser desktop and mobile onto Fenix, the newest version of Firefox.
Users need more information on the javascript flaw in the "Safest" setting in Tor Browser. Note that Tails 4.12 users are getting a pop-up warning that this flaw is critical and unfixed. (Tails 4.13 is due out next week and I hope this edition will fix the problem.)