Hacker Newsnew | past | comments | ask | show | jobs | submit | hellais's commentslogin

OONI | Mobile Developer | Full-time | Remote | https://ooni.org/

Are you a mobile developer interested in defending human rights on the internet? We have a job opening for you!

The OONI team (a non-profit fighting internet censorship, originally born out of the Tor Project) is looking for a dedicated mobile developer to work on OONI Probe: a free software app designed to measure internet censorship and network performance.

If you join our team, you will lead the development of the OONI Probe mobile app, supporting human rights defenders worldwide to investigate and fight internet censorship.

You will work on improving the OONI Probe mobile app and create new features to meet our global community’s needs. The Android app is currently written in Java, while the iOS app is written in Objective-C, but you are also welcome to use Kotlin or Swift.

Ideally, you would work on both the Android and iOS versions of OONI Probe. But as OONI Probe Android is run by most OONI Probe users around the world, we are primarily interested in contracting a developer with strong Android app development experience and expertise.

This is a full-time 12-month contract position, starting ASAP. The contract may be extended depending on the contractor’s performance and the availability of funds. The yearly contractor fee will range between 50,000-60,000 EUR depending on the contractor’s relevant experience and expertise.

This is a fully remote position. Even before the COVID-19 pandemic, the OONI team always worked remotely online. We communicate and coordinate through OONI Slack channels, we have video/voice meetings regularly, and we track our work on GitHub.

Our team members are currently based in Europe and North America, but we encourage applications from anywhere in the world.

https://ooni.org/post/2021-job-opening-ooni-mobile-developer...


Tor over Tor Hidden Services does not go in plaintext and it does not matter if exit nodes are being sniffed, because you never leave the Tor network.

That is SSL is not a problem for you, because the URL is self authenticating. This is especially useful if you have a newspaper, because you can print the address on the paper and not have to worry about CA and this kind of stuff.

Worth looking at is probably also GlobaLeaks (https://globaleaks.org/) that is a system that also uses Tor HS. This system is more actively developed and is designed to be extendable.

We are also happy to say that just last week we released the 0.2 release of GlobaLeaks. You can see a live demo on our site: https://globaleaks.org/.


On the other hand, the page telling you what the Hidden Service URL is does go across the Internet as plaintext and can be modified to contain a malicious URL by exit nodes if you view it via Tor, which you'd probably want to.


Well, the government can connect the onion URI to the new yorker. Would it be feasible to use domestic warrants to identify the server? I'm not sure as to what end as it would still be end-to-end encrypted.


That's fine, the anonymity works both ways. You can't access an .onion without using tor, and in this way, use of tor prevents the .onion service from knowing who you are.

Contrast The Silk Road, where the .onion is being used primarily to protect the identity of the service itself (as most of the users give their physical addresses to the service).

Both are hidden services. One is privacy for the client, one is privacy for the server.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: