[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Nov 19 11:00:15 UTC 2013
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/20 ===
===========================================================================
version 33
Author: lunar
Date: 2013-11-19T10:15:03+00:00
minor reword
--- version 32
+++ version 33
@@ -122,7 +122,7 @@
Roger Dingledine calls for help [XXX] in the collection of the new Tor related articles in the press [XXX].
“According to the website [XXX] the last time there was a meaningful article about Tor was July 1st.
-This is very far from the case.” If you want to help please just edit the wiki page [XXX].
+This is very far from the case.” If you want to help, just edit the wiki page [XXX].
[XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031134.html
[XXX] https://trac.torproject.org/projects/tor/ticket/10182
version 32
Author: lunar
Date: 2013-11-19T10:14:15+00:00
minor reword
--- version 31
+++ version 32
@@ -114,8 +114,9 @@
Miscellaneous news
------------------
-Radu Rădeanu came up with a workaround [XXX] for Tor users on Ubuntu 13.10
-which temporarily fixes keyboard bug in 64-bit TBBs in a combination with IBus.
+Radu Rădeanu came up with a workaround [XXX] for Tor users on Ubuntu 13.10
+which temporarily fixes keyboard bug in 64-bit Tor Browser Bundles when
+used in combination with IBus.
[XXX] https://trac.torproject.org/projects/tor/ticket/9353#comment:38
version 31
Author: lunar
Date: 2013-11-19T10:13:19+00:00
reword tails feature/ff24
--- version 30
+++ version 31
@@ -128,13 +128,13 @@
[XXX] https://www.torproject.org/press/press
[XXX] https://trac.torproject.org/projects/tor/wiki/TorArticles
-Tails folks have started [XXX] reviewing and merging the feature/ff24 branch into devel
-as a candidate for the future release of the Tails 0.22 [XXX,XXX,XXX].
+Firefox 24 is soon going to replace version 17 as “stable” supported release by Mozilla.
+intrigeri has completed his work in updating Tails' browser to the point where it “is good
+enough for Tails 0.22” [XXX]. Builds from the “feature/ff24” are available [XXX] for
+wider testing.
[XXX] https://mailman.boum.org/pipermail/tails-dev/2013-November/004165.html
- [XXX] https://labs.riseup.net/code/issues/6370
- [XXX] https://labs.riseup.net/code/issues/6371
- [XXX] https://labs.riseup.net/code/issues/5768
+ [XXX] http://nightly.tails.boum.org/build_Tails_ISO_feature-ff24/
Andreas Jonsson released [XXX] initial sandboxed version of the TBB 3.0 series
which is ready for testing [XXX]. This security feature should prevent an exploit
version 30
Author: lunar
Date: 2013-11-19T10:09:09+00:00
minor fix
--- version 29
+++ version 30
@@ -147,7 +147,7 @@
[XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
[XXX] https://github.com/trams242/tor-browser-bundle
-Check Mike Perry's october report to see what he has been up to lately [XXX].
+Check Mike Perry's october report to see what he has been up to in October [XXX].
[XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000384.html
version 29
Author: lunar
Date: 2013-11-19T10:08:43+00:00
reword os x sandboxing with Andreas' description of the feature
--- version 28
+++ version 29
@@ -137,7 +137,12 @@
[XXX] https://labs.riseup.net/code/issues/5768
Andreas Jonsson released [XXX] initial sandboxed version of the TBB 3.0 series
-which is ready for testing [XXX]. Currently supports only OSX 10.9.
+which is ready for testing [XXX]. This security feature should prevent an exploit
+from stealing user data : the Tor Browser will not be allowed to execute
+any programs, nor will it be allowed to read or modify data on disk except
+in the users “downloads”-folder and its own profile. The sandbox is currently
+only supported on OS X 10.9 “but making it work all the way down to 10.6
+is not unlikely”.
[XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
[XXX] https://github.com/trams242/tor-browser-bundle
@@ -184,8 +189,8 @@
| https://events.ccc.de/congress/2013/
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-Matt Pagan.
+This issue of Tor Weekly News has been assembled by XXX, XXX,
+Matt Pagan, and Andreas Jonsson.
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
version 28
Author: lunar
Date: 2013-11-19T10:05:01+00:00
move the link in between, probably easier to read that way
--- version 27
+++ version 28
@@ -157,6 +157,10 @@
to connect to synIRC through Tor will receive a message telling them their computer
is part of a botnet.
+ [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
+ [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
+ [XXX] https://tails.boum.org/doc/anonymous_internet/pidgin/
+
Users will occasionally ask for support using Tor on ChromeOS. ChromeOS is based
on Linux, so it is theoretically possible to run the Linux Tor Browser Bundle on
ChromeOS. In practice, the Chromebook prevents users from executing new software
@@ -166,9 +170,6 @@
wiki. As of this writing, there is no documented way of running Tor Browser Bundle on
ChromeOS.
- [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
- [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
- [XXX] https://tails.boum.org/doc/anonymous_internet/pidgin/
[XXX] http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
Upcoming events
version 27
Author: lunar
Date: 2013-11-19T10:04:17+00:00
tails for irc
--- version 26
+++ version 27
@@ -151,6 +151,7 @@
Users have asked the help desk for support connecting to IRC through Tor.
There are some guides on sending IRC traffic through Tor on the wiki [XXX,XXX].
+Tails also comes with Pidgin preconfigured for IRC [XXX].
However, it will not matter if the IRC client is correctly configured if the
if the intended IRC network blocks all Tor users. For example, users trying
to connect to synIRC through Tor will receive a message telling them their computer
@@ -167,6 +168,7 @@
[XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
[XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
+ [XXX] https://tails.boum.org/doc/anonymous_internet/pidgin/
[XXX] http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
Upcoming events
version 26
Author: lunar
Date: 2013-11-19T10:02:06+00:00
reword proposal story
--- version 25
+++ version 26
@@ -89,17 +89,25 @@
Current state of the proposals
------------------------------
-Nick Mathewson took a closer look on the proposals and their current status.
-As a result he published two lists based on the one he sent out in June of
-last year [XXX], which is based on the one he did in May [XXX] of the year before.
+In 2007, Tor developers settled on a formal process for changes in Tor
+specifications or other major changes [XXX]. At this heart of this process
+in the “proposal” documents that are discussed on the tor-dev mailing list [XXX]
+and archived in the “torspec” Git repository [XXX].
-The first one [XXX] aims on the proposals that have changed their status and
-become closed, dead, or superseded since the previous listing.
-The second one [XXX] consists of open, needs-revision, and needs-research proposals which
-are listed in it.
+Last week, Nick Mathewson took a closer look at what have changed since the
+last round up [XXX] he did in June last year. Since then [XXX], 16 proposals has
+been implemented in tor 0.2.3, 0.2.4 and 0.2.5 and two have been superseded
+or deemed unhelpful.
+Nick subsequently posted [XXX] a review of all “open”, “needs-revision”, and
+“needs-research” proposals. They are many different tasks to be picked
+by someone who wishes to help Tor in these 42 proposals, be it by doing research,
+code, leading discussions or more in-depth analysis.
+
+ [XXX] https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/001-process.txt
+ [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
+ [XXX] https://gitweb.torproject.org/torspec.git/tree/HEAD:/proposals
[XXX] https://lists.torproject.org/pipermail/tor-dev/2012-June/003641.html
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2011-May/002637.html
[XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html
[XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
version 25
Author: lunar
Date: 2013-11-19T09:46:33+00:00
reword the story about check
--- version 24
+++ version 25
@@ -71,16 +71,20 @@
New version of check.torproject.org
-----------------------------------
-Late Friday night on 15 November 2013, Andrew Lewman et al. switched check.torproject.org
-to a new version [XXX]. This version was written by Arlo in Go [XXX] to allow the site
-to better handle the daily load hitting the website and led to closing a lot of tickets [XXX].
+On the 15th of November, regular users of the Tor Browser Bundle have probably noticed
+a change in their preferred welcome page. Andrew Lewman had just switched check.torproject.org
+to a new version [XXX] written by Arlo Breault in Go [XXX]. The new codebase [XXX]
+should allow the service to better handle the increasingly high number of connections. Several
+fixes [XXX] were also made during the reimplementation regarding wording, translations and other
+meaningful details.
-Please report any issues you encounter to the "Tor Check" component [XXX].
+Please report any issues you encounter to the “Tor Check” component of the
+Tor bug tracker.
[XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031126.html
[XXX] https://trac.torproject.org/projects/tor/ticket/9529
- [XXX] https://trac.torproject.org/projects/tor/query?status=closed&changetime=2013-11-15..&component=Tor+Check&col=id&col=summary&col=status&col=owner&col=type&col=priority&col=milestone&order=priority
- [XXX] https://bugs.torproject.org/
+ [XXX] https://gitweb.torproject.org/check.git
+ [XXX] https://trac.torproject.org/projects/tor/query?status=closed&changetime=2013-11-15..&component=Tor+Check
Current state of the proposals
------------------------------
version 24
Author: lunar
Date: 2013-11-19T09:38:10+00:00
reword the USB stick story
--- version 23
+++ version 24
@@ -51,18 +51,22 @@
USB Sticks for Tails
--------------------
-Moritz Bartl come up with a great idea to provide USB sticks with write-protection switch
-for using Tails in more secure way [XXX] at the upcoming 30C3 in Hamburg [XXX].
-According to Moritz it is pretty difficult to get sticks which support booting from it in
-read-only mode, so he ended up contacting various Chinese suppliers. “Even there, the
-selection of sticks with write protection is very limited.”
+It is often recommended to run Tails from a read-only medium in order to prevent any malware
+to permanently mess with the system. “CD is best, but many
+devices these days don't have an optical drive, and handling CDs is not
+as convenient as a USB stick” wrote Moritz Bartl on tor-talk [XXX].
-Check out interesting discussion which followed [XXX] and if you know about better options
-please let Moritz know.
+It looks like one of the very few specific brand of USB sticks available in Germany
+that had a proper hardware protection switch can no longer be used to boot Tails.
+Moritz ended up contacting various Chinese suppliers. “Even there, the
+selection of sticks with write protection is very limited” but eventually
+one model was found acceptable. Moritz intend to re-sell a bulk of them at
+the upcoming 30C3 in Hamburg [XXX].
+
+Feel free to join the discussion or contact Moritz privately for more details.
[XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031092.html
- [XXX] https://events.ccc.de/congress/2013/wiki/Main_Page
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/thread.html#31100
+ [XXX] https://events.ccc.de/congress/2013/
New version of check.torproject.org
-----------------------------------
version 23
Author: dope457
Date: 2013-11-19T09:17:43+00:00
proposals
--- version 22
+++ version 23
@@ -24,7 +24,7 @@
- Re-enabling TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later [XXX].
-Major bugfixes:
+Along with major bugfixes:
- No longer stop reading or writing on cpuworker connections when our rate
limiting buckets go empty. Now we should handle circuit handshake requests
@@ -77,6 +77,23 @@
[XXX] https://trac.torproject.org/projects/tor/ticket/9529
[XXX] https://trac.torproject.org/projects/tor/query?status=closed&changetime=2013-11-15..&component=Tor+Check&col=id&col=summary&col=status&col=owner&col=type&col=priority&col=milestone&order=priority
[XXX] https://bugs.torproject.org/
+
+Current state of the proposals
+------------------------------
+
+Nick Mathewson took a closer look on the proposals and their current status.
+As a result he published two lists based on the one he sent out in June of
+last year [XXX], which is based on the one he did in May [XXX] of the year before.
+
+The first one [XXX] aims on the proposals that have changed their status and
+become closed, dead, or superseded since the previous listing.
+The second one [XXX] consists of open, needs-revision, and needs-research proposals which
+are listed in it.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2012-June/003641.html
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2011-May/002637.html
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
Miscellaneous news
------------------
@@ -162,5 +179,3 @@
}}}
Possible items:
-
- * Status of proposal https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
version 22
Author: dope457
Date: 2013-11-19T08:56:40+00:00
events
--- version 21
+++ version 22
@@ -139,13 +139,13 @@
Upcoming events
---------------
-Jul XX-XX | Event XXX brief description
- | Event City, Event Country
- | Event website URL
+Nov 20 | Tor’s New Offices — Open House
+ | Cambridge, Massachusetts
+ | https://blog.torproject.org/events/tors-new-cambridge-offices-open-house
|
-Jul XX-XX | Event XXX brief description
- | Event City, Event Country
- | Event website URL
+Dec 27-30 | Tor @ 30th Chaos Communication Congress
+ | Hamburg, Germany
+ | https://events.ccc.de/congress/2013/
This issue of Tor Weekly News has been assembled by XXX, XXX, and
version 21
Author: dope457
Date: 2013-11-19T08:51:46+00:00
miscs
--- version 20
+++ version 21
@@ -95,14 +95,29 @@
[XXX] https://www.torproject.org/press/press
[XXX] https://trac.torproject.org/projects/tor/wiki/TorArticles
+Tails folks have started [XXX] reviewing and merging the feature/ff24 branch into devel
+as a candidate for the future release of the Tails 0.22 [XXX,XXX,XXX].
+
+ [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-November/004165.html
+ [XXX] https://labs.riseup.net/code/issues/6370
+ [XXX] https://labs.riseup.net/code/issues/6371
+ [XXX] https://labs.riseup.net/code/issues/5768
+
+Andreas Jonsson released [XXX] initial sandboxed version of the TBB 3.0 series
+which is ready for testing [XXX]. Currently supports only OSX 10.9.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
+ [XXX] https://github.com/trams242/tor-browser-bundle
+
Check Mike Perry's october report to see what he has been up to lately [XXX].
[XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000384.html
Tor Help Desk Roundup
---------------------
+
Users have asked the help desk for support connecting to IRC through Tor.
-There are some guides on sending IRC traffic through Tor on the wiki [XXX][XXX].
+There are some guides on sending IRC traffic through Tor on the wiki [XXX,XXX].
However, it will not matter if the IRC client is correctly configured if the
if the intended IRC network blocks all Tor users. For example, users trying
to connect to synIRC through Tor will receive a message telling them their computer
@@ -117,9 +132,9 @@
wiki. As of this writing, there is no documented way of running Tor Browser Bundle on
ChromeOS.
-[XXX]: https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
-[XXX]: https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
-[XXX]: http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
+ [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
+ [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
+ [XXX] http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
Upcoming events
---------------
@@ -148,6 +163,4 @@
Possible items:
- * Status of proposal https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
- * OSX sandbox available for tbb3 (10.9 only) https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
- * tails feature/ff24 branch is ready for wider testing https://mailman.boum.org/pipermail/tails-dev/2013-November/004165.html https://tails.boum.org/blueprint/iceweasel_24/+ * Status of proposal https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list