[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Nov 19 15:40:06 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/20 ===
===========================================================================

version 37
Author: lunar
Date:   2013-11-19T14:53:41+00:00

   add references, word wrap, fix links, fix typo

--- version 36
+++ version 37
@@ -1,8 +1,8 @@
 ''21th issue of Tor Weekly News. Covering what's happening from November 12th, 2013 to November 19th, 2013. To be released on November 20th, 2013.''
 
-'''Editor: dope457''' 
+'''Editor: dope457'''
 
-'''Status:''' FROZEN! Only technical and language fixes are now accepted. New items should go on [wiki:TorWeeklyNews/2013/21 next week's edition]. Expected publication time 2013-11-20 12:00 UTC. 
+'''Status:''' FROZEN! Only technical and language fixes are now accepted. New items should go on [wiki:TorWeeklyNews/2013/21 next week's edition]. Expected publication time 2013-11-20 12:00 UTC.
 
 '''Subject:''' Tor Weekly News — November 20th, 2013
 
@@ -11,156 +11,163 @@
 Tor Weekly News                                      November 20th, 2013
 ========================================================================
 
-Welcome to the twenty-first issue of Tor Weekly News, the weekly newsletter that
-covers what is happening in the XXX Tor community.
+Welcome to the twenty-first issue of Tor Weekly News, the weekly
+newsletter that covers what is happening in the Tor community.
 
 tor 0.2.4.18-rc is out
 ----------------------
 
 On the 16th of November, Roger Dingledine released the fourth release
-candidate for the tor 0.2.4.x series [XXX].
-As Roger puts it: “It takes a variety of fixes from the 0.2.5.x branch 
-to improve stability, performance, and better handling of edge cases.”
-Readers curious for more details can look at the announcement for the
-complete list of changes.
+candidate for the tor 0.2.4.x series [1]. As Roger puts it: “It takes a
+variety of fixes from the 0.2.5.x branch to improve stability,
+performance, and better handling of edge cases.” Readers curious for
+more details can look at the announcement for the complete list of
+changes.
 
-The source is available [XXX] as well as updated Debian packages [XXX].
-All relay operators should upgrade. Updated Tor Browser Bundles
-are in the making and should be available shortly.
+The source is available [2] as well as updated Debian packages [3]. All
+relay operators should upgrade. Updated Tor Browser Bundles are in the
+making and should be available shortly.
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031110.html
- [XXX] https://www.torproject.org/dist/
- [XXX] https://www.torproject.org/docs/debian.html#development
+   [1] https://lists.torproject.org/pipermail/tor-talk/2013-November/031110.html
+   [2] https://www.torproject.org/dist/
+   [3] https://www.torproject.org/docs/debian.html#development
 
 USB Sticks for Tails
 --------------------
 
-It is often recommended to run Tails from a read-only medium in order to prevent any malware
-to permanently mess with the system. “CD is best, but many
-devices these days don't have an optical drive, and handling CDs is not
-as convenient as a USB stick” wrote Moritz Bartl on tor-talk [XXX].
+It is often recommended to run Tails from a read-only medium in order to
+prevent any malware to permanently mess with the system. “CD is best,
+but many devices these days don’t have an optical drive, and handling
+CDs is not as convenient as a USB stick” wrote Moritz Bartl on
+tor-talk [4].
 
-It looks like one of the very few specific brand of USB sticks available in Germany
-that had a proper hardware protection switch can no longer be used to boot Tails.
-Moritz ended up contacting various Chinese suppliers. “Even there, the 
-selection of sticks with write protection is very limited” but eventually
-one model was found acceptable. Moritz intend to re-sell a bulk of them at
-the upcoming 30C3 in Hamburg [XXX].
+It looks like one of the very few specific brand of USB sticks available
+in Germany that had a proper hardware protection switch can no longer be
+used to boot Tails. Moritz ended up contacting various Chinese
+suppliers. “Even there, the selection of sticks with write protection is
+very limited” but eventually one model was found acceptable. Moritz
+intend to re-sell a bulk of them at the upcoming 30C3 in Hamburg [5].
 
-Feel free to join the discussion or contact Moritz privately for more details.
+Feel free to join the discussion or contact Moritz privately for more
+details.
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031092.html
- [XXX] https://events.ccc.de/congress/2013/
+   [4] https://lists.torproject.org/pipermail/tor-talk/2013-November/031092.html
+   [5] https://events.ccc.de/congress/2013/
 
 New version of check.torproject.org
 -----------------------------------
 
-On the 15th of November, regular users of the Tor Browser Bundle have probably noticed
-a change in their preferred welcome page. Andrew Lewman had just switched check.torproject.org 
-to a new version [XXX] written by Arlo Breault in Go [XXX]. The new codebase [XXX]
-should allow the service to better handle the increasingly high number of connections. Several
-fixes [XXX] were also made during the reimplementation regarding wording, translations and other
-meaningful details.
+On the 15th of November, regular users of the Tor Browser Bundle have
+probably noticed a change in their preferred welcome page. Andrew Lewman
+had just switched check.torproject.org to a new version [6] written by
+Arlo Breault in Go [7]. The new codebase [8] should allow the service to
+better handle the increasingly high number of connections. Several
+fixes [9] were also made during the reimplementation regarding wording,
+translations and other meaningful details.
 
-Please report any issues you encounter to the “Tor Check” component of the
-Tor bug tracker.
+Please report any issues you encounter to the “Tor Check” component of
+the Tor bug tracker.
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031126.html
- [XXX] https://trac.torproject.org/projects/tor/ticket/9529
- [XXX] https://gitweb.torproject.org/check.git
- [XXX] https://trac.torproject.org/projects/tor/query?status=closed&changetime=2013-11-15..&component=Tor+Check
+   [6] https://lists.torproject.org/pipermail/tor-talk/2013-November/031126.html
+   [7] https://bugs.torproject.org/9529
+   [8] https://gitweb.torproject.org/check.git
+   [9] https://trac.torproject.org/projects/tor/query?status=closed&changetime=2013-11-15..&component=Tor+Check
 
 Current state of the proposals
 ------------------------------
 
 In 2007, Tor developers settled on a formal process for changes in Tor
-specifications or other major changes [XXX]. At this heart of this process
-in the “proposal” documents that are discussed on the tor-dev mailing list [XXX]
-and archived in the “torspec” Git repository [XXX].
+specifications or other major changes [10]. At this heart of this
+process in the “proposal” documents that are discussed on the tor-dev
+mailing list [11] and archived in the “torspec” Git repository [12].
 
-Last week, Nick Mathewson took a closer look at what have changed since the
-last round up [XXX] he did in June last year. Since then [XXX], 16 proposals has
-been implemented in tor 0.2.3, 0.2.4 and 0.2.5 and two have been superseded
-or deemed unhelpful.
+Last week, Nick Mathewson took a closer look at what have changed since
+the last round up [13] he did in June last year. Since then [14], 16
+proposals has been implemented in tor 0.2.3, 0.2.4 and 0.2.5 and two
+have been superseded or deemed unhelpful.
 
-Nick subsequently posted [XXX] a review of all “open”, “needs-revision”, and
-“needs-research” proposals. They are many different tasks to be picked
-by someone who wishes to help Tor in these 42 proposals, be it by doing research,
-code, leading discussions or more in-depth analysis. 
+Nick subsequently posted [15] a review of all “open”, “needs-revision”,
+and “needs-research” proposals. They are many different tasks to be
+picked by someone who wishes to help Tor in these 42 proposals, be it by
+doing research, code, leading discussions or more in-depth analysis.
 
- [XXX] https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/001-process.txt
- [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
- [XXX] https://gitweb.torproject.org/torspec.git/tree/HEAD:/proposals
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2012-June/003641.html
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
+  [10] https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/001-process.txt
+  [11] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
+  [12] https://gitweb.torproject.org/torspec.git/tree/HEAD:/proposals
+  [13] https://lists.torproject.org/pipermail/tor-dev/2012-June/003641.html
+  [14] https://lists.torproject.org/pipermail/tor-dev/2013-November/005797.html
+  [15] https://lists.torproject.org/pipermail/tor-dev/2013-November/005798.html
 
 Miscellaneous news
 ------------------
 
-Radu Rădeanu came up with a workaround [XXX] for Tor users on Ubuntu 13.10 
-which temporarily fixes keyboard bug in 64-bit Tor Browser Bundles when
-used in combination with IBus.
+Radu Rădeanu came up with a workaround [16] for Tor users on Ubuntu
+13.10 which temporarily fixes keyboard bug in 64-bit Tor Browser Bundles
+when used in combination with IBus.
 
- [XXX] https://trac.torproject.org/projects/tor/ticket/9353#comment:38
+  [16] https://bugs.torproject.org/9353#comment:38
 
-Roger Dingledine calls for help [XXX] in the collection of the new Tor related articles in the press [XXX].
-“According to ​the website [XXX] the last time there was a meaningful article about Tor was July 1st. 
-This is very far from the case.” If you want to help, just edit the wiki page [XXX].
+Roger Dingledine calls for help [17] in the collection of the new Tor
+related articles in the press [18]. “According to the website [19] the
+last time there was a meaningful article about Tor was July 1st. This is
+very far from the case.” If you want to help, just edit the wiki
+page [20].
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031134.html
- [XXX] https://trac.torproject.org/projects/tor/ticket/10182
- [XXX] https://www.torproject.org/press/press
- [XXX] https://trac.torproject.org/projects/tor/wiki/TorArticles
+  [17] https://lists.torproject.org/pipermail/tor-talk/2013-November/031134.html
+  [18] https://bugs.torproject.org/10182
+  [19] https://www.torproject.org/press/press
+  [20] https://trac.torproject.org/projects/tor/wiki/TorArticles
 
-Firefox 24 is soon going to replace version 17 as “stable” supported release by Mozilla.
-intrigeri has completed his work in updating Tails' browser to the point where it “is good
-enough for Tails 0.22” [XXX]. Builds from the “feature/ff24” are available [XXX] for
-wider testing.
+Firefox 24 is soon going to replace version 17 as “stable” supported
+release by Mozilla. intrigeri has completed his work in updating Tails’
+browser to the point where it “is good enough for Tails 0.22” [21].
+Builds from the “feature/ff24” are available [22] for wider testing.
 
- [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-November/004165.html
- [XXX] http://nightly.tails.boum.org/build_Tails_ISO_feature-ff24/
+  [21] https://mailman.boum.org/pipermail/tails-dev/2013-November/004165.html
+  [22] http://nightly.tails.boum.org/build_Tails_ISO_feature-ff24/
 
-Andreas Jonsson released [XXX] initial sandboxed version of the TBB 3.0 series 
-which is ready for testing [XXX]. This security feature should prevent an exploit
-from stealing user data : the Tor Browser will not be allowed to execute
-any programs, nor will it be allowed to read or modify data on disk except
-in the users “downloads”-folder and its own profile. The sandbox is currently
-only supported on OS X 10.9 “but making it work all the way down to 10.6
-is not unlikely”.
+Andreas Jonsson released [23] initial sandboxed version of the TBB 3.0
+series which is ready for testing [24]. This security feature should
+prevent an exploit from stealing user data : the Tor Browser will not be
+allowed to execute any programs, nor will it be allowed to read or
+modify data on disk except in the users “downloads”-folder and its own
+profile. The sandbox is currently only supported on OS X 10.9 “but
+making it work all the way down to 10.6 is not unlikely”.
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
- [XXX] https://github.com/trams242/tor-browser-bundle
+  [23] https://lists.torproject.org/pipermail/tor-talk/2013-November/031111.html
+  [24] https://github.com/trams242/tor-browser-bundle
 
-Check Mike Perry's october report to see what he has been up to in October [XXX].
+Check Mike Perry’s october report to see what he has been up to in
+October [25].
 
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-November/000384.html
+  [25] https://lists.torproject.org/pipermail/tor-reports/2013-November/000384.html
 
 Tor Help Desk Roundup
 ---------------------
 
-Users have asked the help desk for support connecting to IRC through Tor. 
-There are some guides on sending IRC traffic through Tor on the wiki [XXX,XXX].
-Tails also comes with Pidgin preconfigured for IRC [XXX].
-However, it will not matter if the IRC client is correctly configured if the
-if the intended IRC network blocks all Tor users. For example, users trying 
-to connect to synIRC through Tor will receive a message telling them their computer
-is part of a botnet. 
+Users have asked the help desk for support connecting to IRC through
+Tor. There are some guides on sending IRC traffic through Tor on the
+wiki [26,27]. Tails also comes with Pidgin preconfigured for IRC [28].
+However, it will not matter if the IRC client is correctly configured if
+the if the intended IRC network blocks all Tor users. For example, users
+trying to connect to synIRC through Tor will receive a message telling
+them their computer is part of a botnet.
 
- [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
- [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
- [XXX] https://tails.boum.org/doc/anonymous_internet/pidgin/
+  [26] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/InstantMessaging
+  [27] https://trac.torproject.org/projects/tor/wiki/doc/TorifyHOWTO/IrcSilc
+  [28] https://tails.boum.org/doc/anonymous_internet/pidgin/
 
-Users will occasionally ask for support using Tor on ChromeOS. ChromeOS is based
-on Linux, so it is theoretically possible to run the Linux Tor Browser Bundle on 
-ChromeOS. In practice, the Chromebook prevents users from executing new software 
-on their computers without putting their Chromebook into developer mode, and making 
-other modifications to their device [XXX]. Anyone who has successfully run the Tor 
-Browser Bundle on ChromeOS is invited to describe their experiences on the Tor Project 
-wiki. As of this writing, there is no documented way of running Tor Browser Bundle on 
-ChromeOS. 
+Users will occasionally ask for support using Tor on ChromeOS. ChromeOS
+is based on Linux, so it is theoretically possible to run the Linux Tor
+Browser Bundle on ChromeOS. In practice, the Chromebook prevents users
+from executing new software on their computers without putting their
+Chromebook into developer mode, and making other modifications to their
+device [29]. Anyone who has successfully run the Tor Browser Bundle on
+ChromeOS is invited to describe their experiences on the Tor Project
+wiki. As of this writing, there is no documented way of running Tor
+Browser Bundle on ChromeOS.
 
- [XXX] http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
+  [29] http://www.chromium.org/chromium-os/chromiumos-design-docs/security-overview
 
 Upcoming events
 ---------------
@@ -179,12 +186,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [30], write down your
+name and subscribe to the team mailing list [31] if you want to
 get involved!
 
-  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
+  [30] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [31] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}
version 36
Author: lunar
Date:   2013-11-19T14:49:52+00:00

   simplify piece about tor 0.2.4.18-rc

--- version 35
+++ version 36
@@ -14,41 +14,23 @@
 Welcome to the twenty-first issue of Tor Weekly News, the weekly newsletter that
 covers what is happening in the XXX Tor community.
 
-Tor 0.2.4.18-rc is out
+tor 0.2.4.18-rc is out
 ----------------------
 
-On Saturday, 16th of November Roger Dingledine released new version [XXX],
-in fact the fourth release candidate for the Tor 0.2.4.x series.
-As Roger puts it “It takes a variety of fixes from the 0.2.5.x branch 
+On the 16th of November, Roger Dingledine released the fourth release
+candidate for the tor 0.2.4.x series [XXX].
+As Roger puts it: “It takes a variety of fixes from the 0.2.5.x branch 
 to improve stability, performance, and better handling of edge cases.”
+Readers curious for more details can look at the announcement for the
+complete list of changes.
 
-According to Roger major feature of this release is:
-
-- Re-enabling TLS 1.1 and 1.2 when built with OpenSSL 1.0.1e or later [XXX].
-
-Along with major bugfixes:
-
-- No longer stop reading or writing on cpuworker connections when our rate 
-  limiting buckets go empty. Now we should handle circuit handshake requests 
-  more promptly [XXX].
-- If we are unable to save a microdescriptor to the journal, do not drop 
-  it from memory and then reattempt downloading it [XXX].
-- Stop trying to bootstrap all our directory information from only our 
-  first guard [XXX].
-- The new channel code sometimes lost track of in-progress circuits,
-  causing long-running clients to stop building new circuits. The
-  fix is to always call circuit_n_chan_done(chan, 0) from channel_closed() [XXX].
-
-For minor features and bugfixes see the full changelog [XXX] and please 
-be sure to upgrade [XXX].
+The source is available [XXX] as well as updated Debian packages [XXX].
+All relay operators should upgrade. Updated Tor Browser Bundles
+are in the making and should be available shortly.
 
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-November/031110.html
- [XXX] https://trac.torproject.org/projects/tor/ticket/6055
- [XXX] https://trac.torproject.org/projects/tor/ticket/9731
- [XXX] https://trac.torproject.org/projects/tor/ticket/9645
- [XXX] https://trac.torproject.org/projects/tor/ticket/9946
- [XXX] https://trac.torproject.org/projects/tor/ticket/9776
  [XXX] https://www.torproject.org/dist/
+ [XXX] https://www.torproject.org/docs/debian.html#development
 
 USB Sticks for Tails
 --------------------



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list