[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Nov 5 14:20:10 UTC 2013
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/18 ===
===========================================================================
version 43
Author: dope457
Date: 2013-11-05T13:39:42+00:00
--
--- version 42
+++ version 43
@@ -201,7 +201,3 @@
[40] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[41] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
}}}
-
-Possible items:
-
- * bananaphone PT https://lists.torproject.org/pipermail/tor-dev/2013-October/005694.html https://github.com/david415/obfsproxy/tree/david-bananaphone-nacl-hammertime https://github.com/leif/bananaphone — i'll write about that next week (Lunar)
version 42
Author: dope457
Date: 2013-11-05T13:39:22+00:00
freeze
--- version 41
+++ version 42
@@ -1,6 +1,8 @@
''Nineteenth issue of Tor Weekly News. Covering what's happening from October 29th, 2013 to November 5th, 2013. To be released on November 6th, 2013.''
'''Editor:''' dope457
+
+'''Status:''' FROZEN. Only technical and languages fixes are to be made. New items should go in [wiki:TorWeeklyNews/2013/19 next week's edition]. Publication should happen 2013-11-06 12:00 UTC.
'''Subject:''' Tor Weekly News — November 6th, 2013
version 41
Author: dope457
Date: 2013-11-05T13:36:59+00:00
contributors
--- version 40
+++ version 41
@@ -187,8 +187,8 @@
| https://events.ccc.de/congress/2013/
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, dope457, and
+Matt Pagan.
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
version 40
Author: dope457
Date: 2013-11-05T13:35:23+00:00
numbers
--- version 39
+++ version 40
@@ -15,7 +15,7 @@
Tails 0.21 is out
-----------------
-The Tails developers anounced the 34th release [XXX] of the live system
+The Tails developers anounced the 34th release [1] of the live system
based on Debian and Tor that preserves the privacy and anonymity of its
users.
@@ -23,30 +23,30 @@
user running the desktop: Tor control port cannot be directly accessed
anymore to disallow configuration changes and IP address retrieval, and
the persistence settings now requires privileged access. On top of these
-specific changes, the release include security fixes [XXX] from the
+specific changes, the release include security fixes [2] from the
Firefox 17.0.10esr release and for a few other Debian packages.
More visible improvements include the ability to persist printer
settings, support for running from more SD card reader types, and a
panel launcher for the password manager. For the curious, more details
-can be found in the full changelog [XXX].
+can be found in the full changelog [3].
As with every releases: be sure to upgrade!
- [XXX] https://tails.boum.org/news/version_0.21/
- [XXX] https://tails.boum.org/security/Numerous_security_holes_in_0.20.1/
- [XXX] https://git-tails.immerda.ch/tails/plain/debian/changelog
+ [1] https://tails.boum.org/news/version_0.21/
+ [2] https://tails.boum.org/security/Numerous_security_holes_in_0.20.1/
+ [3] https://git-tails.immerda.ch/tails/plain/debian/changelog
New Tor Browser Bundles based on Firefox 17.0.10esr
---------------------------------------------------
-Erinn Clark released new versions of the Tor Browser Bundle [XXX] on November
+Erinn Clark released new versions of the Tor Browser Bundle [4] on November
1st. The previously “beta” bundles have moved to the “release candidate” stage and
are almost identical to the stable ones, except for the version of the tor
daemon. A couple of days later, David Fifield also released updated “pluggable
-transport“ bundles [XXX].
-
-The new bundles include all security fixes from Firefox 17.0.10esr [XXX], and
+transport“ bundles [5].
+
+The new bundles include all security fixes from Firefox 17.0.10esr [6], and
updated versions of libpng, NoScript and HTTPS Everywhere. It also contains
a handful of improvements and fixes to the Tor Browser patches.
@@ -56,38 +56,38 @@
This should be the last bundles based on the 17 branch of Firefox as it is
going to be superceded by the 24 branch as the new long-term supported version
in 6 weeks. Major progress has already been made by Mike Perry and Perl
-Crescent to update the Tor Browser changes and review the new code base [XXX].
-
- [XXX] https://blog.torproject.org/blog/new-tor-browser-bundles-firefox-17010esr
- [XXX] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-rc-1-pt1-firefox-17010esr
- [XXX] https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox17.0.10
- [XXX] https://trac.torproject.org/projects/tor/query?keywords=~ff24-esr
+Crescent to update the Tor Browser changes and review the new code base [7].
+
+ [4] https://blog.torproject.org/blog/new-tor-browser-bundles-firefox-17010esr
+ [5] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-rc-1-pt1-firefox-17010esr
+ [6] https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox17.0.10
+ [7] https://trac.torproject.org/projects/tor/query?keywords=~ff24-esr
Monthly status reports for October 2013
---------------------------------------
The wave of regular monthly reports from Tor project members for the
month of October has begun early this time to reach the tor-reports
-mailing-list: Damian Johnson [XXX], Linus Nordberg [XXX], Karsten Loesing
-[XXX], Philipp Winter [XXX], Ximin Luo [XXX], Lunar [XXX], Kelley Misata [XXX],
-Matt Pagan [XXX], Sherief Alaa [XXX], Nick Mathewson [XXX], Pearl Crescent [XXX],
-George Kadianakis [XXX], Colin Childs [XXX], Arlo Breault [XXX], and Sukhbir Singh [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000369.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000370.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000371.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000372.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000373.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000374.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000375.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000376.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000377.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000378.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000379.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000380.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000381.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000382.html
+mailing-list: Damian Johnson [8], Linus Nordberg [9], Karsten Loesing
+[10], Philipp Winter [11], Ximin Luo [12], Lunar [13], Kelley Misata [14],
+Matt Pagan [15], Sherief Alaa [16], Nick Mathewson [17], Pearl Crescent [18],
+George Kadianakis [19], Colin Childs [20], Arlo Breault [21], and Sukhbir Singh [22].
+
+ [8] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
+ [9] https://lists.torproject.org/pipermail/tor-reports/2013-October/000369.html
+ [10] https://lists.torproject.org/pipermail/tor-reports/2013-October/000370.html
+ [11] https://lists.torproject.org/pipermail/tor-reports/2013-November/000371.html
+ [12] https://lists.torproject.org/pipermail/tor-reports/2013-November/000372.html
+ [13] https://lists.torproject.org/pipermail/tor-reports/2013-November/000373.html
+ [14] https://lists.torproject.org/pipermail/tor-reports/2013-November/000374.html
+ [15] https://lists.torproject.org/pipermail/tor-reports/2013-November/000375.html
+ [16] https://lists.torproject.org/pipermail/tor-reports/2013-November/000376.html
+ [17] https://lists.torproject.org/pipermail/tor-reports/2013-November/000377.html
+ [18] https://lists.torproject.org/pipermail/tor-reports/2013-November/000378.html
+ [19] https://lists.torproject.org/pipermail/tor-reports/2013-November/000379.html
+ [20] https://lists.torproject.org/pipermail/tor-reports/2013-November/000380.html
+ [21] https://lists.torproject.org/pipermail/tor-reports/2013-November/000381.html
+ [22] https://lists.torproject.org/pipermail/tor-reports/2013-November/000382.html
Tor Help Desk Roundup
---------------------
@@ -98,8 +98,8 @@
as the physical address of the website operator, for a higher price. Sites that use
these certificates get the lock icon by their URL outlined in green. The Tor Project
adds protection to the validity of our SSL certificate a different way, by supplying
-our SSL certificate fingerprint on our FAQ page[XXX]. You can double check that
-fingerprint on any of the Tor Project's mirror pages as well[XXX].
+our SSL certificate fingerprint on our FAQ page [23]. You can double check that
+fingerprint on any of the Tor Project's mirror pages as well [24].
One person wanted to known why a website they were visiting over Firefox was telling
them that they were not using Tor, even though Vidalia told them that Tor was running.
@@ -110,70 +110,70 @@
not a great idea because the two interfaces are almost identical, and it is easy to get
the two browsers mixed up, even if you know what you are doing.
-[XXX]: https://www.torproject.org/docs/faq.html.en#SSLcertfingerprint
-[XXX]: https://torproject.org/getinvolved/mirrors.html.en
+ [23] https://www.torproject.org/docs/faq.html.en#SSLcertfingerprint
+ [24] https://torproject.org/getinvolved/mirrors.html.en
Miscellaneous news
------------------
-The third beta release of TorBirdy has been released [XXX] as version 0.1.2.
+The third beta release of TorBirdy has been released [25] as version 0.1.2.
Among several other fixes and improvements it restores proper usage of Tor
-when used with Thunderbird 24. Be sure to upgrade [XXX]!
-
- [XXX] https://blog.torproject.org/blog/torbirdy-012-our-third-beta-release
- [XXX] https://www.torproject.org/dist/torbirdy/torbirdy-0.1.2.xpi
-
-starlight reported [XXX] on running a Tor relays with the daemon
-compiled with the AddressSanitizer [XXX] memory error detector available
+when used with Thunderbird 24. Be sure to upgrade [26]!
+
+ [25] https://blog.torproject.org/blog/torbirdy-012-our-third-beta-release
+ [26] https://www.torproject.org/dist/torbirdy/torbirdy-0.1.2.xpi
+
+starlight reported [27] on running a Tor relays with the daemon
+compiled with the AddressSanitizer [28] memory error detector available
since GCC 4.8
- [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-October/003187.html
- [XXX] https://code.google.com/p/address-sanitizer/
-
-Isis Lovecruft has sent two proposals [XXX] for improvements to
+ [27] https://lists.torproject.org/pipermail/tor-relays/2013-October/003187.html
+ [28] https://code.google.com/p/address-sanitizer/
+
+Isis Lovecruft has sent two proposals [29] for improvements to
BridgeDB. One is finished and addresses the switch to a “Distributed
Database System and RDBMS”. The second is still in draft stage and
“specifies a system for social distribution of the centrally-stored
bridges within BridgeDB”.
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005713.html
-
-Karsten Loesing announced [XXX] the availability of a new tech report he wrote with
+ [29] https://lists.torproject.org/pipermail/tor-dev/2013-November/005713.html
+
+Karsten Loesing announced [30] the availability of a new tech report he wrote with
Steven J. Murdoch, and Rob Jansen: “Evaluation of a libutp-based Tor Datagram
-Implementation” [XXX]. Be sure to have a look if you are interested in one of the
+Implementation” [31]. Be sure to have a look if you are interested in one of the
“promising approach to overcome Tor’s performance-related problems”.
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005700.html
- [XXX] https://research.torproject.org/techreports/libutp-2013-10-30.pdf
-
-SiNA Rabbani has been asking [XXX] for comments on two documents he wrote about
+ [30] https://lists.torproject.org/pipermail/tor-dev/2013-October/005700.html
+ [31] https://research.torproject.org/techreports/libutp-2013-10-30.pdf
+
+SiNA Rabbani has been asking [32] for comments on two documents he wrote about
how use cases and design of a “point-and-click” hidden service blogging tool,
-as part of the Cute Otter project [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005703.html
- [XXX] https://trac.torproject.org/projects/tor/attachment/wiki/org/sponsors/Otter/Cute
-
-David Goulet released third rc of Torsocks 2.0.0 [XXX] with a lot of fixes and
-improvements. Available to download from GitHub [XXX] and also as Debian package
-from experimental distribution [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005728.html
- [XXX] https://github.com/dgoulet/torsocks/archive/v2.0.0-rc3.tar.gz
- [XXX] http://packages.debian.org/experimental/torsocks
-
-Christian is working on a new round of improvements for Globe [XXX], a web application
+as part of the Cute Otter project [33].
+
+ [32] https://lists.torproject.org/pipermail/tor-dev/2013-October/005703.html
+ [33] https://trac.torproject.org/projects/tor/attachment/wiki/org/sponsors/Otter/Cute
+
+David Goulet released third rc of Torsocks 2.0.0 [34] with a lot of fixes and
+improvements. Available to download from GitHub [35] and also as Debian package
+from experimental distribution [36].
+
+ [34] https://lists.torproject.org/pipermail/tor-dev/2013-November/005728.html
+ [35] https://github.com/dgoulet/torsocks/archive/v2.0.0-rc3.tar.gz
+ [36] http://packages.debian.org/experimental/torsocks
+
+Christian is working on a new round of improvements for Globe [37], a web application
to learn about relays and bridges of the Tor network. The project seems close to
-be mature enough to replace Atlas [XXX] according to some.
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005725.html
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005735.html
+be mature enough to replace Atlas [38] according to some.
+
+ [37] https://lists.torproject.org/pipermail/tor-dev/2013-November/005725.html
+ [38] https://lists.torproject.org/pipermail/tor-dev/2013-November/005735.html
A discussion on the tor-relays mailing list prompted Roger Dingledine to ask
-about changing the current default exit policy [XXX] of the tor daemon. The current
+about changing the current default exit policy [39] of the tor daemon. The current
“restricted exit node” policy has been in place since 2003. As this has surprised
some operators, switching the default policy to “middle node” is under consideration.
- [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-November/003240.html
+ [39] https://lists.torproject.org/pipermail/tor-relays/2013-November/003240.html
Upcoming events
---------------
@@ -192,12 +192,12 @@
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [40], write down your
+name and subscribe to the team mailing list [41] if you want to
get involved!
- [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
- [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [40] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [41] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
}}}
Possible items:
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/19 ===
===========================================================================
version 4
Author: dope457
Date: 2013-11-05T13:49:12+00:00
--
--- version 3
+++ version 4
@@ -1,4 +1,4 @@
-''20th issue of Tor Weekly News. Covering what's happening from November 6th, 2013 to November 12th, 2013. To be released on November 13th, 2013.''
+''Twelfth issue of Tor Weekly News. Covering what's happening from November 6th, 2013 to November 12th, 2013. To be released on November 13th, 2013.''
'''Editor:'''
version 3
Author: dope457
Date: 2013-11-05T13:48:03+00:00
dates
--- version 2
+++ version 3
@@ -1,12 +1,12 @@
-''XXXth issue of Tor Weekly News. Covering what's happening from XXX Xth, 2013 to XXX Xth, 2013. To be released on XXX Xth, 2013.''
+''20th issue of Tor Weekly News. Covering what's happening from November 6th, 2013 to November 12th, 2013. To be released on November 13th, 2013.''
'''Editor:'''
-'''Subject:''' Tor Weekly News — XXX Xth, 2013
+'''Subject:''' Tor Weekly News — November 13th, 2013
{{{
========================================================================
-Tor Weekly News XXX Xth, 2013
+Tor Weekly News November 13th, 2013
========================================================================
Welcome to the Xth issue of Tor Weekly News, the weekly newsletter that
version 2
Author: dope457
Date: 2013-11-05T13:39:58+00:00
possible items from last issue
--- version 1
+++ version 2
@@ -76,4 +76,8 @@
[XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+}}}
+
+Possible items:
+
+ * bananaphone PT https://lists.torproject.org/pipermail/tor-dev/2013-October/005694.html https://github.com/david415/obfsproxy/tree/david-bananaphone-nacl-hammertime https://github.com/leif/bananaphone — i'll write about that next week (Lunar)
version 1
Author: dope457
Date: 2013-11-05T13:38:21+00:00
template
---
+++ version 1
@@ -0,0 +1,79 @@
+''XXXth issue of Tor Weekly News. Covering what's happening from XXX Xth, 2013 to XXX Xth, 2013. To be released on XXX Xth, 2013.''
+
+'''Editor:'''
+
+'''Subject:''' Tor Weekly News — XXX Xth, 2013
+
+{{{
+========================================================================
+Tor Weekly News XXX Xth, 2013
+========================================================================
+
+Welcome to the Xth issue of Tor Weekly News, the weekly newsletter that
+covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]
+
+Monthly status reports for XXX month 2013
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+ [XXX]
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX] vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+ | Event City, Event Country
+ | Event website URL
+ |
+Jul XX-XX | Event XXX brief description
+ | Event City, Event Country
+ | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+ [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list