[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Wed Nov 13 06:40:08 UTC 2013
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/19 ===
===========================================================================
version 44
Author: arma
Date: 2013-11-13T06:06:30+00:00
--
--- version 43
+++ version 44
@@ -158,7 +158,7 @@
David Fifield released the new Pluggable Transports Tor Browser Bundle [22]
version 2.4.17-rc-1-pt2 based on Tor Browser Bundle 2.4.17-rc-1. The
only change from the previous release of the pluggable transport bundle
-is a workaround [23] that restore working transports on Mac OS X
+is a workaround [23] that makes transports resume working on Mac OS X
Mavericks.
[22] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-rc-1-pt2-firefox-17010esr
version 43
Author: arma
Date: 2013-11-13T06:01:49+00:00
--
--- version 42
+++ version 43
@@ -79,7 +79,7 @@
researchers to re-evaluate existing defenses “such as HTTPOS [6], SPDY
and pipeline randomization, Guard node adaptive padding [7], and Traffic
Morphing [8]“, and to think about “the development of additional
-defenses”. Mikes ends his post by mentioning that some new defenses can
+defenses”. Mike ends his post by mentioning that some new defenses can
also be dual purpose and help with end-to-end correlation attacks.
[5] https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks
version 42
Author: arma
Date: 2013-11-13T06:01:17+00:00
--
--- version 41
+++ version 42
@@ -77,7 +77,7 @@
these papers have claimed, and that defenses are actually easier than is
presently assumed by the current body of literature.” He encourages
researchers to re-evaluate existing defenses “such as HTTPOS [6], SPDY
-and pipeline randomization, and Guard node adaptive padding [7], Traffic
+and pipeline randomization, Guard node adaptive padding [7], and Traffic
Morphing [8]“, and to think about “the development of additional
defenses”. Mikes ends his post by mentioning that some new defenses can
also be dual purpose and help with end-to-end correlation attacks.
version 41
Author: arma
Date: 2013-11-13T05:58:44+00:00
spell georg's name right
--- version 40
+++ version 41
@@ -29,12 +29,12 @@
expectations.
With the 3.0 series of Tor Browser Bundle, the browser is directly
-responsible for configuring and handling the tor daemon. Users only see
+responsible for configuring and handling the tor daemon. Users only see
one single application. It's clearer that only the browser will go
through the Tor network. Starting and stopping the browser will take
-care of starting and stopping tor, no extra steps are required.
-
-Mike Perry, Kathleen Brade, Mark Smith, Geoerg Kopen, among others, are
+care of starting and stopping tor -- no extra steps are required.
+
+Mike Perry, Kathleen Brade, Mark Smith, Georg Koppen, among others, are
working hard to perfect many other usability and technical improvements
that are part of Tor Browser Bundle 3.0 which has now reached the “beta”
stage.
version 40
Author: arma
Date: 2013-11-13T05:56:16+00:00
helpful comma
--- version 39
+++ version 40
@@ -23,7 +23,7 @@
With previous Tor Browser Bundles, users had to interact with two
different applications, Vidalia and the browser itself. Vidalia was
-responsible for handling and configuring the tor daemon and the
+responsible for handling and configuring the tor daemon, and the
browser had no knowledge of the connection status and other details.
The result was confusing error messages, and mismatched user
expectations.
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list