[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed Nov 13 06:40:08 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/19 ===
===========================================================================

version 44
Author: arma
Date:   2013-11-13T06:06:30+00:00

   --

--- version 43
+++ version 44
@@ -158,7 +158,7 @@
 David Fifield released the new Pluggable Transports Tor Browser Bundle [22]
 version 2.4.17-rc-1-pt2 based on Tor Browser Bundle 2.4.17-rc-1. The
 only change from the previous release of the pluggable transport bundle
-is a workaround [23] that restore working transports on Mac OS X
+is a workaround [23] that makes transports resume working on Mac OS X
 Mavericks.
 
   [22] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-rc-1-pt2-firefox-17010esr

version 43
Author: arma
Date:   2013-11-13T06:01:49+00:00

   --

--- version 42
+++ version 43
@@ -79,7 +79,7 @@
 researchers to re-evaluate existing defenses “such as HTTPOS [6], SPDY
 and pipeline randomization, Guard node adaptive padding [7], and Traffic
 Morphing [8]“, and to think about “the development of additional
-defenses”.  Mikes ends his post by mentioning that some new defenses can
+defenses”. Mike ends his post by mentioning that some new defenses can
 also be dual purpose and help with end-to-end correlation attacks.
 
    [5] https://blog.torproject.org/blog/critique-website-traffic-fingerprinting-attacks

version 42
Author: arma
Date:   2013-11-13T06:01:17+00:00

   --

--- version 41
+++ version 42
@@ -77,7 +77,7 @@
 these papers have claimed, and that defenses are actually easier than is
 presently assumed by the current body of literature.” He encourages
 researchers to re-evaluate existing defenses “such as HTTPOS [6], SPDY
-and pipeline randomization, and Guard node adaptive padding [7], Traffic
+and pipeline randomization, Guard node adaptive padding [7], and Traffic
 Morphing [8]“, and to think about “the development of additional
 defenses”.  Mikes ends his post by mentioning that some new defenses can
 also be dual purpose and help with end-to-end correlation attacks.

version 41
Author: arma
Date:   2013-11-13T05:58:44+00:00

   spell georg's name right

--- version 40
+++ version 41
@@ -29,12 +29,12 @@
 expectations.
 
 With the 3.0 series of Tor Browser Bundle, the browser is directly
-responsible for configuring and handling the tor daemon.  Users only see
+responsible for configuring and handling the tor daemon. Users only see
 one single application. It's clearer that only the browser will go
 through the Tor network. Starting and stopping the browser will take
-care of starting and stopping tor, no extra steps are required.
-
-Mike Perry, Kathleen Brade, Mark Smith, Geoerg Kopen, among others, are
+care of starting and stopping tor -- no extra steps are required.
+
+Mike Perry, Kathleen Brade, Mark Smith, Georg Koppen, among others, are
 working hard to perfect many other usability and technical improvements
 that are part of Tor Browser Bundle 3.0 which has now reached the “beta”
 stage.

version 40
Author: arma
Date:   2013-11-13T05:56:16+00:00

   helpful comma

--- version 39
+++ version 40
@@ -23,7 +23,7 @@
 
 With previous Tor Browser Bundles, users had to interact with two
 different applications, Vidalia and the browser itself. Vidalia was
-responsible for handling and configuring the tor daemon and the
+responsible for handling and configuring the tor daemon, and the
 browser had no knowledge of the connection status and other details.
 The result was confusing error messages, and mismatched user
 expectations.



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list