14:58:40 #startmeeting Tor Browser Weekly meeting 2023-03-06 14:58:40 Meeting started Mon Mar 6 14:58:40 2023 UTC. The chair is richard. Information about MeetBot at http://wiki.debian.org/MeetBot. 14:58:40 Useful Commands: #action #agreed #help #info #idea #link #topic. 14:58:47 hi 14:58:49 o/ 14:58:50 hi! 14:58:52 it's browser time 14:58:53 https://pad.riseup.net/p/tor-tbb-keep 14:58:56 hi 15:00:01 o/ 15:00:08 hello hello everyone 15:00:13 Hi! 15:00:26 shouldn't it be more like "it's browsing time"? 15:00:58 mighty morphin browsin' rangers? 15:01:07 anyway 15:01:12 totally 15:01:34 "Monday Marcho/ 06"? lol 15:01:48 window focus is hard 15:01:56 I know right? 15:03:21 ok i've no major points today 15:03:42 but first up, our new signing machines are getting plugged in this week! 15:04:08 after a comedy of bad/mismatched schedules since limerick 15:04:54 we've an issue tracking the work in gitlab but i expect this will be mostly a me and boklm thing to worry about 15:05:39 somewhat tangential to that, our windows code signing is expiring in May, so in the midst of all the signing machine migration we'll need to setup a new one 15:06:42 henry-x and dan_b: can you each give a high-level update on your s30/s96 UX work, any blockers, etc? 15:06:50 i can go 15:07:17 still working on the "prioritize onion" popup fixes. learned a lot, i think with henry-x's feedback this morning i have a good path forward 15:07:33 after that I still have a good bundle assigned to me last i checked. hopefully most should go a lot faster 15:08:09 also unrelated, my home network stopped responding so I can't log on to my mac to test mac stuff. trying to arrange a friend to go by and trouble shoot 15:08:37 typical computers >:[ 15:09:00 if your worried about timing of issues, let me know if you want me to pause the prioritize onion popup work and see if i can blow through some of hte other tasks quickly to derisk? 15:09:17 or am good to keep digging through this one 15:09:21 donuts: are you here by any chance? 15:10:06 yep! 15:10:10 hey! 15:10:25 hello :) 15:10:25 do we have a set date for when we need s30/96 builds for user testing? 15:10:46 For S30, the usability testing begins this month 15:11:08 I think it's march 16th, but I can check the ticket 15:11:39 oh that's informative. I def vote to temp pause this and see if I can iddentify and clear some easier issues first? 15:11:56 ok, and does that cover all of the UX updates we've been making or only a subset? 15:12:00 For me, I was thinking about the html structure for tor-browser#41600 . There's some limited interactivity in the popup, like the "Copy (onion) address" button, so I'll have to figure out how that is going to work with a keyboard 15:12:18 okay the schedule currently has usability testing for Tor Browser on the 17th and 18th 15:12:29 ok 15:12:32 richard: as many as possible please 15:12:43 17th of what? 15:12:47 March 15:13:00 for S96, we don't need any specific fixes done (it can be tested as is) 15:13:24 ok, I'll work a bit less on the fluent/weblate stuff then 15:13:42 anything that doesn't make it into usability testing in Ecuador in March can be pushed to Mexico in April 15:14:00 ok, if eitherof you have any s131 tasks y'all aren't actively working on please unassign yourself and we can redistribute 15:14:03 but yep S30 fixes are top top priority :) 15:14:52 Re the usability test, is it just going to be the alpha/nightly build? Or are we doing a separate build for it? 15:14:54 we can also test nightly builds this month, if that makes things slightly easier 15:14:59 aha, snap 15:15:05 the original plan was to test alphas 15:15:19 but it's a moderated test, so the facilitator can have a nightly installed instead 15:15:33 do you know what platform they would need? 15:15:46 well basically if there are no M1 macs that makes nightly a lot easier 15:15:54 otherwise we'd need to codesing for macOS 15:16:07 Nah has both an M1 machine and a Linux machine, I think they're planning on taking the latter though 15:16:38 ok we're almost certainly going to be doing the testing in nightly then 15:16:41 looking at the release calendar 15:17:53 that's totally fine 15:18:07 ok that leaves the remaining s131 things 15:18:57 thanks everyone ^^ 15:19:06 the remaining work falls into 4ish categories: about:preferences cleanup/remaining firefox feature removal, updater stuffs, webrtc, and *bug fixes* 15:20:10 and we have an ESR update coming at the end of this week 15:20:48 dan_b: I think you have the about:preferences cleanup ticket assigned to you, can you pick that up PieroV? 15:20:57 i do 15:21:05 its in MR stage but it's paused on UX feedback 15:21:20 mmm which ticket's that? 15:21:21 richard: nope, that one is for Tor Browser 15:21:24 And needs UX 15:21:56 oh awesome, i must have missed that 15:21:59 tor-browser!538 15:22:01 * richard skimming 15:22:10 for tor-browser#40656 15:22:17 oh yes, we won't get anywhere near that until TB 13.0 15:22:26 but it definitely does need UX 15:22:32 TL;DR: if we just hide the options we risk of getting very inconsistent UX 15:22:40 and also i think the corresponding privacy-browser#34 15:23:51 less so in privacy-browser tho right? 15:24:06 Yes, but still UX dependent 15:24:33 We provided a list of stuff, but I think it's never been reviewed? 15:24:43 PieroV, do you mean that we should track were in the UI these preferences are observed and hide / lock the controls? 15:24:52 w/were/where 15:25:07 yep, plus I think it could use some design work rather than just removing preferences wholesale 15:25:20 ma1: if we hide options that were visible, what do we do about users that customized them? 15:25:31 however the UX Team have three sponsors ending this/next month (and another potentially in Q3) so anything that's not explicitly spelled out in a contract is going to be later in the year from us, I'm afraid 15:25:39 *this/next quarter 15:25:40 We should let them know that we've removed them, or it might be confusing 15:25:56 right 15:26:02 And if we don't restore their defaults, how do we provide a way to do that? 15:26:12 Not all features are equal, though 15:26:18 The most scary one is password management 15:27:22 yeah, this is potentially a rabbit whole and it needs thought through properly 15:27:26 It seems we'll need a migration wizard 15:27:30 *rabbit hole 15:28:39 so, can we roadmap:future this for Q3/Q4? 15:28:56 I think so for Tor Browser 15:29:10 For S131 a better option would be remove first, and in case add back later 15:29:19 To avoid a similar need for a migration 15:29:23 we need a removal plan for s131 for the initial release 15:29:25 However, I think that the updater is top priority 15:29:27 yeah that^ 15:29:44 right, so just remove them from the privacy browser for the time being? 15:29:57 yeah 15:30:08 cool, makes sense 15:30:59 donuts: should we just starting ripping things out then and then come back to UX for freedback once it 'works'? 15:31:33 richard: yeah that sounds like a plan ^^ 15:31:39 ack 15:31:50 right now I have pb#34 assigned to me cus I had the tor-browser issue (with details) and MR 15:32:32 ok, let's let PieroV take those from you in the meantime 15:32:45 cool will assign 15:33:42 next up is the updater: we have endpoints so it *should* be a matter of updating the relevant browser pieces, and setting up a pipeline w/ s131 about deploying MARs 15:34:21 I'll see about getting these pieces up and running over the next weeks. if all goes well we'll be able to update the last alpha to the initial stable 15:34:25 I had to deal with the updater patch, alas, with the macro cleanup 15:34:51 do we need something from the updater patch in privacybrowser? 15:35:05 Having the data directory outside the browser simplifies a couple of things that were handled in these patches 15:35:12 well we'll have several more builds to iron out any problems 15:35:28 But I think we'll need to investigate what actually the updater patches do 15:35:39 And have them interact with the portable mode flag, if needed 15:35:55 Because we also customize the path where updates are saved 15:36:34 I think the symlink stuff won't be needed 15:36:49 (well, IIRC, it could be deleted from Tor Browser, too) 15:37:01 MAR signing might be needed 15:40:10 ok sounds like i need to coallate/track all of these things, will do that after this meeting 15:40:19 finally the last bit is webrtc 15:40:41 Enabled and working on Linux and macOS 15:40:46 i pinged msim, seems like his hardware issues have been resolved and should be updating his MR this week 15:41:07 but if it gets to abotu wednesday and we haven't any progress on it then we can just do the relevant squash/rebase ourselves 15:41:26 I'd like to get it enabled for windows for this week's build 15:41:41 and can also confirm it's working in Linux, been using it for BBB without issues :) 15:41:58 and ma1 you have the IP leak audit check related to that as well 15:42:26 webrtc, you mean? It was among my priorities this week 15:42:40 ma1: yep :) 15:43:11 and with that does anyone else have anything else to discuss/announce/etc? 15:43:24 Couple of minor things 15:43:51 (1) It sounds like gaba is back? Would be cool to figure out scheduling a Tor Demo Day. 15:44:16 ok if I've missed/glossed over anything re s131 we can chat later on IRC 15:44:27 go for it jeremy 15:44:37 and yes it seems like gaba is back from some time off 15:45:01 (2) I get the impression that all the Browser Team people are super busy this month; any idea how soon boklm will likely be able to review the openssl/linux-arm MR I sent in yesterday? 15:45:14 I'm planning to look at it this week 15:45:21 boklm: ok great, thanks 15:45:45 Jeremy_Rand_36C3[m]: actually a few days ago I 15:45:55 asked a slightly related thing 15:46:07 Maybe you know something, too :) 15:46:26 If I understand correctly, tor could use NSS instead of OpenSSL 15:46:50 gaba: FYI Robert Min has SOCKSification working in a demoable state, so doing a Tor Demo Day this month should work for us 15:47:03 great! i will check on when it can work 15:47:07 PieroV: ah yes, I saw you mentioned that but didn't have a chance to reply. 15:48:04 PieroV: NSS and OpenSSL have slightly different feature sets, are we confident that Tor's NSS support is on par feature wise with OpenSSL? I know OpenSSL supports Ed25519 certs while NSS doesn't, for example. 15:48:26 Oh, okay, that makes sense 15:49:00 PieroV: seems like the Network Team would probably know something about that 15:49:31 That said, if it is on par feature-wise, it seems like a good way to shave off some bytes from the binary 15:49:43 So certainly seems worth investigating 15:51:27 ok 15:51:34 PieroV: also note that NSS has a different TLS fingerprint from OpenSSL, but (1) I suspect PT makes that irrelevant, and (2) NSS is probably less censored than OpenSSL since NSS is what Firefox and Chromium use 15:51:59 That's very interesting, thanks! 15:52:27 But maybe having both OpenSSL and NSS based Tor in production usage at the same time is an anonymity set risk? 15:52:31 Not sure. 15:53:01 jeremy: depends, tor-brwoser desktop users tend to update to latest pretty quickly 15:53:20 so the window where we'd have two anonymity sets is fairly short 15:53:33 richard: right, but a lot of users are on system Tor, which will probably stay with OpenSSL unless we tell OS distros to switch 15:53:51 e.g. Tails and Whonix users 15:54:02 truue 15:54:10 well anyway 15:54:27 Anyway it definitely seems worth looking into 15:54:28 we can continue these chatters in IRC 15:54:41 Yep. Nothing else from my end for the meeting. 15:54:44 so let's #endmeeting and give you all 5 minutes before your next one :D 15:54:47 #endmeeting