Can you collect data from a large group of people while still protecting each individual's privacy? Differential privacy answers yes — with a mathematical proof to back it up. This article introduces the concept, traces its history from early anonymization failures to real-world deployments, and explores what it means for users and policymakers in Taiwan and the broader Chinese-speaking world.
In June 2025, Cure53 completed a penetration test and source code review of TorVPN for Android and its underlying Rust networking layer, Onionmasq. The Tor Project published the results in April 2026. The headline finding: Tor's core tunnel establishment and routing logic held up well. But there are specific technical issues worth understanding if you're recommending or deploying this tool in Taiwan's context.
On 2 April 2026, Taiwan’s Executive Yuan (the cabinet) approved the Financial Supervisory Commission’s draft Virtual Asset Service Act and sent it to the Legislative Yuan for review. If you follow crypto policy or stablecoins, this matters because Taiwan is moving from an anti–money laundering registration regime toward a licensing regime for service providers. This post is a status briefing that gathers the April 2026 cabinet move in one place for readers who mostly skip the Mandarin policy wires. It stays at the policy level. For legal questions, talk to a qualified professional in Taiwan.
The Tor Project post, A Server That Forgets: Exploring Stateless Relays, is grounded in real operator experience from Osservatorio Nessuno in Italy. It is not just a technical tour. It asks a basic trust question: if a relay can be seized, searched, or physically cloned, what exactly can an adversary still learn?
First, the article starts from actual seizure and raid precedents. That makes the threat model concrete. Relay operators are not debating abstract malware only; many are planning for legal process and physical hardware exposure.
Second, it gives a rare end-to-end map of the stack: TPM, measured boot, remote attestation, RAM-only runtime, VM images, and tooling paths such as Patela and stboot. Most discussions in our region cover one layer at a time. This one connects them.
Third, it keeps the hard parts visible. Re-sealing after updates, conflicts between stateless images and unattended upgrades, memory ceilings without swap, and the risk of losing a Stable flag due to restarts are all left as open engineering work, not hidden in marketing language.
A stateless system reboots into a known image and does not keep writable disk state. In security terms, this shifts defaults:
physical seizure yields less forensic material;
configuration drift is constrained by declarative rebuilds;
persistence across reboots becomes harder for attackers;
reproducibility and auditability become more realistic goals.
For Tor relays, there is one unavoidable tension: identity must survive reboots. Relays build reputation over time through long-term keys. If keys disappear on every boot, the node loses its standing and utility.
That is where TPM-backed key handling matters. Keys can be bound to measured boot state and used without handing raw private key material to the operating system. Remote attestation can then let an external verifier check what software stack actually booted. But the limitations are real too, including key-type mismatches and operational complexity.
This year we are excited to partner with ETHTaipei (Taipei Ethereum Community) on program coordination. Both communities approach anonymous payments from different angles. To ensure each submission reaches the most fitting audience, we will review proposals together:
Application-oriented and introductory talks: prioritized for the Anonymity Networks Community track
Technical and protocol-level talks: may be moved to the ETHTaipei blockchain track
You do not need to decide which track to submit to — we will discuss placement with speakers during the review process. Both communities will cross-promote their schedules, so attendees can move between tracks to follow related topics across the event.
On Day 2 (Aug 9), both communities plan to co-organize a dedicated session on Anonymous Payments. Speakers and attendees interested in this topic are especially encouraged to take note. If you have a relevant proposal, feel free to mention in your submission notes that you are interested in being included in the cross-community session.
This track is for lawful use and does not support money laundering, tax evasion, or other illegal activity.
For topics involving anonymity tools, crypto assets, or coin mixing, focus on education and risk understanding, and remind audiences about legal differences across jurisdictions.
Public teaching materials and demo assets should follow COSCUP requirements and use open licenses.
COSCUP is Taiwan's annual open-source community conference, centered on open-source collaboration and free admission. This track aims to connect technology communities and civic groups, expand practical exchange and local collaboration around anonymity, privacy, and internet freedom, and make participation easier for people who prefer a lower-profile presence with less personal data exposure.
The Anonymity Networks Community is now accepting proposals for the COSCUP 2026 Anonymity Networks Community Track. This is our second year running related sessions at COSCUP. Through this open CFP, we hope to invite more people who care about or actively practice anonymity to share their work. The track runs for two days and includes talks, workshops, demos, and field experience sharing.
Arti is Tor’s next-generation Rust implementation. The 2.2.0 release is notable because it pushes a previously experimental access path into day-to-day usability: HTTP CONNECT is now included in full builds and enabled by default, sharing the same port as SOCKS.
For teams operating in filtered enterprise, campus, or public networks, that matters immediately. For developers embedding Arti, this release also expands RPC ergonomics with non-blocking requests, event-loop integration, and a new superuser administration path. In one version, Arti improves both network practicality and operational controllability.
We're excited to share that the Tor Project invited us to contribute a guest blog post about our experience running a Tor relay on a university network in Taiwan. You can read the full article here: Setting up a Tor Relay at a university in Taiwan.
Taiwan occupies a unique position in the global internet freedom landscape. While the country enjoys relatively open access to the web, it operates under persistent geopolitical pressure and is regularly targeted by sophisticated cyber operations. In this context, privacy tools like Tor aren't fringe utilities — they're practical infrastructure for journalists, researchers, civil society organizations, and anyone who needs to communicate or organize without being observed. Building awareness and local capacity around these tools is part of what our community is working toward.
We follow Tails releases because they ship the same building blocks many of us recommend in real life: Tor, a hardened desktop, and tools for people who cannot assume a “normal” network path. 7.6, dated 2026-03-26, is worth translating not for one killer feature, but for two changes that affect how people get online and how they store secrets on a live system.
Tor bridges are not exotic; they are often the difference between “Tor works” and “Tor never connects.” In places where Tor traffic is filtered or throttled, users learn to hunt for bridges through side channels—paste sites, trusted contacts, or ad‑hoc instructions. Tails 7.6 brings that guidance into the Tor Connection assistant: pick Connect to Tor automatically, and if the network blocks Tor outright, the bridge screen can Ask for a Tor bridge based on your region, pulling candidates via the Tor Project’s Moat service—the same family of tech Tor Browser has used since 11.5—with the fetch disguised using domain fronting.
For readers in Taiwan and across East/Southeast Asia: censorship models differ, but the pattern is familiar—TLS interception, routing games, or “soft” blocking that fails open only for some apps. A Tails image that surfaces bridge acquisition in-product lowers the bar for journalists, lawyers, and civil‑society volunteers who already juggle operational risk; they should not also have to memorize bridge workflows from blog posts.
The second headline is Secrets replacing KeePassXC. That is a product decision, not a security downgrade by default: Secrets is tighter with GNOME, which matters on Tails because accessibility regressions (on‑screen keyboard, cursor sizing) are real blockers for some users. KeePassXC power users can still add it via Additional Software; the database format overlaps, so migration is meant to be frictionless.
In February 2026, anarcat from the Tor system administration team (TPA) published a post titled \"Keeping track of decisions using the ADR model\".
After reading it, we felt it offered a very practical way to think about proposals, decision-making, and how to write things down so that people can actually find and understand them later.
This post is not a translation of the original article. Instead, it is our own summary and reflection on:
what problem TPA was trying to solve with ADRs,
what they actually changed in their process,
how other projects handle proposals and decisions, and
how this connects to the context we are familiar with.