Skip to content

Recent Updates

Project updates and announcements, or subscribe to the mailing list.

2026/03 Community Update

2026/03 Community Update

We're excited to share that the Tor Project invited us to contribute a guest blog post about our experience running a Tor relay on a university network in Taiwan. You can read the full article here: Setting up a Tor Relay at a university in Taiwan.

Taiwan occupies a unique position in the global internet freedom landscape. While the country enjoys relatively open access to the web, it operates under persistent geopolitical pressure and is regularly targeted by sophisticated cyber operations. In this context, privacy tools like Tor aren't fringe utilities — they're practical infrastructure for journalists, researchers, civil society organizations, and anyone who needs to communicate or organize without being observed. Building awareness and local capacity around these tools is part of what our community is working toward.

Tails 7.6: bridges you can actually find, and a quieter password manager swap

Tails

We follow Tails releases because they ship the same building blocks many of us recommend in real life: Tor, a hardened desktop, and tools for people who cannot assume a “normal” network path. 7.6, dated 2026-03-26, is worth translating not for one killer feature, but for two changes that affect how people get online and how they store secrets on a live system.

Why this one matters (especially in regional context)

Tor bridges are not exotic; they are often the difference between “Tor works” and “Tor never connects.” In places where Tor traffic is filtered or throttled, users learn to hunt for bridges through side channels—paste sites, trusted contacts, or ad‑hoc instructions. Tails 7.6 brings that guidance into the Tor Connection assistant: pick Connect to Tor automatically, and if the network blocks Tor outright, the bridge screen can Ask for a Tor bridge based on your region, pulling candidates via the Tor Project’s Moat service—the same family of tech Tor Browser has used since 11.5—with the fetch disguised using domain fronting.

For readers in Taiwan and across East/Southeast Asia: censorship models differ, but the pattern is familiar—TLS interception, routing games, or “soft” blocking that fails open only for some apps. A Tails image that surfaces bridge acquisition in-product lowers the bar for journalists, lawyers, and civil‑society volunteers who already juggle operational risk; they should not also have to memorize bridge workflows from blog posts.

The second headline is Secrets replacing KeePassXC. That is a product decision, not a security downgrade by default: Secrets is tighter with GNOME, which matters on Tails because accessibility regressions (on‑screen keyboard, cursor sizing) are real blockers for some users. KeePassXC power users can still add it via Additional Software; the database format overlaps, so migration is meant to be frictionless.

Learning from TPA's ADR model

In February 2026, anarcat from the Tor system administration team (TPA) published a post titled \"Keeping track of decisions using the ADR model\".
After reading it, we felt it offered a very practical way to think about proposals, decision-making, and how to write things down so that people can actually find and understand them later.

This post is not a translation of the original article. Instead, it is our own summary and reflection on:

  • what problem TPA was trying to solve with ADRs,
  • what they actually changed in their process,
  • how other projects handle proposals and decisions, and
  • how this connects to the context we are familiar with.

Tor

From Discord’s Age Verification to Why We Self-Host Matrix

From Discord's age verification to why we self-host Matrix

On 2026/02/09, Discord announced a global “teen-by-default” rollout and stronger age verification (English coverage: BBC, Medianama). New and existing users will default to a teen-oriented experience; to relax content filters or access age-gated spaces, users must complete verification via facial age estimation or by submitting ID. Discord frames this as a commitment to teen safety and Safer Internet Day, and will use an “age inference model” in the background to help assign age groups.

We are not dismissing Discord’s intent—youth protection and compliance are serious. But such measures also mean one thing: large platforms will need more personal data and behavioural signals to “classify” users. Whether via face scans, ID documents, or algorithmic inference, the result is handing over “who you are, how old you are, where you are” to the platform and its partners. For many people who just want to chat, game, or collaborate, that may be an acceptable trade-off; for others, it raises the question: is there another way?

What we care about: who decides the rules, who holds the data

Commercial chat platforms have their own rules: terms of service, product direction, what data is retained, how algorithms and policies work—mostly driven by the company and shareholders, with little say for ordinary users and little visibility into how their data is used. This isn’t about “who is worse”; it’s about who gets to decide.

The anoni.net community has chosen a different path: self-hosting a Matrix homeserver. We run tuwunel, a high-performance Matrix homeserver implemented in Rust, on im.anoni.net for community discussion and 2026 theme collaboration. Server configuration, retention policy, and channel rules are decided by operators and the community together—smaller scope, more predictable, and more transparent. Our focus is clear: internet freedom, anonymous networks, and privacy in practice, not “anyone can join and talk about anything.” This is a themed, consensus-oriented workspace.

Project Proposal – g0v Hackath71n (g0v, the 71st Hackathon)

g0v hackath71n / g0v the 71st Hackathon

This time, we’re heading south to Kaohsiung (a.k.a. Takao) to participate in the “g0v Hackath71n – g0v the 71st Hackathon.” If you happen to be in southern Taiwan during this period, or if you’d like to travel south to Kaohsiung together—combining a short trip with a few days of remote work while joining the event—feel free to come find us at the hackathon. We’ve registered a booth to help move forward the progress of the “Anonymous Online Community” 2026 project!

At the moment, it looks like there are still a few spots available. If you’re interested in our project and would like to contribute, you’re very welcome to join us on the day of the event—no matter your background or area of expertise.

Continuing from 2025 into 2026: Personal Privacy Guidelines, Tor Relay Campus Deployment Competition, and Exploration of Anonymous Payments

Personal Privacy Guidelines, Tor Relay Campus Deployment Competition, and Exploration of Anonymous Payments

As 2025 comes to a close, we sincerely thank all our partners for their participation and support throughout the year. From project-based efforts to community building, we have accumulated many actions and valuable experiences over the past year. Below, we will look back on the key initiatives of 2025, and also share our next steps for promoting anonymous networks in 2026.

2025

RightsCon Taipei

In 2025, the international human rights–focused conference RightsCon was held in Taipei. Upon learning that the Tor/Tails and OONI teams would also be visiting Taiwan, we initiated and prepared related workshop events several months in advance. The event attracted over 300 participants and specifically invited partners from news media and civil society organizations to join the discussions.

After the event, we compiled and published a comprehensive retrospective article to document this rare and valuable exchange.

As a result of hosting this event, we also recruited many enthusiastic volunteers. Together with them, we continued subsequent preparations, laying the groundwork for related activities held in August 2025.

Setting Up a Tor Relay at National Taiwan Normal University: A Practical Experience of Communicating with the University and Leaving Open Possibilities

Preface: Why Talk About Anonymous Networks on Campus?

In an era where the internet is highly monitored and centrally managed, anonymous communication is no longer merely a technical option—it is a fundamental requirement for safe exploration, research, and expression. For Taiwan, this issue is especially tangible. Situated at a critical position in East Asia, internet freedom and communication resilience are no longer abstract values, but core societal capabilities that determine whether society can withstand pressure.

Universities and academic networks have historically been the earliest places where new technologies and public infrastructure are experimented with. The following interview documents how a computer science student at National Taiwan Normal University, also a member of the anonymous network community, stepped into institutional reality on campus, communicated with the university, and attempted to actually set up a Tor Relay.

Within the anonymous network community, we often talk about technology and ideals. But what is truly difficult is often not how to configure a Tor Relay, but whether “this machine can survive in the real world.”

This time, we interviewed a partner from the anonymous network community, NZ, who is currently studying in the Department of Computer Science at National Taiwan Normal University. He successfully set up a Tor Relay on campus—and not by doing it secretly, but by choosing to engage openly with the university system and completing the full administrative process.

NZ Su En-Li

蘇恩立 (Su En-Li, NZ) is currently a third-year undergraduate student in the Department of Computer Science and Information Engineering at National Taiwan Normal University. With a strong interest in information security and network governance, he is currently responsible for operating and maintaining the first Tor node on Taiwan Academic Network (TANet). In addition to hands-on technical practice, he is also dedicated to knowledge sharing, serving as an anonymous network course instructor in the GDGoC NTNU student club. He has long been involved in Taiwan’s open source and information security communities, and has volunteered multiple times at major technical conferences such as SITCON, HITCON, and COSCUP, demonstrating both community service experience and strong technical passion.

Taipei Coffee and Circumvention Meetup 2025/10

Taipei Coffee and Circumvention Meetup 2025/10
Image credited to Taipei Coffee and Circumvention Meetup 2025/10 https://ocftw.kktix.cc/events/internetfreedom-oct2025

After presenting InterSecLab's report on data leakage related to the Great Firewall of China at the "Taipei Coffee and Circumvention Meetup 2025/10," there were many discussions during the latter part of the event. The questions centered around what actions we can ultimately take in the face of state-level surveillance methods and capabilities.

The previously provided cybersecurity recommendations also need to be revisited and revised. Below, we will review some of the topics discussed that day through text. We also recommend taking some time to read this report, as it will provide a clearer outline of the risks and challenges we are facing.

Report: The Internet Coup

In mid-September, you may have noticed something significant: approximately 500GB of data was made public. This data pertains to China's Great Firewall (GFW) technology and how this system is exported and implemented in other authoritarian regimes.

InterSecLab, a digital security-focused laboratory, became aware of this leaked data around December 2024 and promptly took action. Over the course of 10 months, they collaborated with several organizations and tech communities to verify and analyze the leaked data. The findings were published in a report released on September 12, 2025.

Although we (Anonymous Network Community) did not assist in the initial stages, after the report was released, we quickly reviewed its content. The report confirmed many of the long-suspected capabilities of the Great Firewall. Furthermore, the report provided a clearer picture of the teams and organizations operating behind the scenes. Their development environment is similar to that of modern startup teams, with operations and maintenance for international deployments being remotely executable. In other words, the Chinese Communist Party government and other client countries can activate customized or general rules with a single click!

2025/08 Project Update

Project Update

The workshop held from 8/9 to 8/10 was successfully completed. We are currently preparing for post-workshop discussions and reviews, and considering future directions for improvement. Whether or not you participated in the two-day event, we sincerely thank you for your continued attention to our activities.

Up next, we would like to share some updates with you for the period in August 2025.

Booth、Brochure

After the workshop event, we also participated in the conferences of HITCON and PyConTW. Although we did not apply for a booth, we created a brochure about 'Anonymous Networks.' This brochure includes an introduction to our community and explanations about Tor/Tails, OONI, internet freedom, and anonymous network topics. It also details which open-source software our community currently uses to build services. This brochure was available for attendees to pick up at the conference venue.

In the future, this brochure will only be available at in-person events, with a limited number printed each time. We will continually update it with new information. During the workshop, we provided each participant with a copy. Based on observations from this event, we found it helpful for participants to understand the community's message about 'anonymous networks and internet freedom.' For future conferences or community events of a similar nature, we will actively apply for a booth to continue promoting our message.