[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Oct 21 13:20:09 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/16 ===
===========================================================================

version 15
Author: lunar
Date:   2013-10-21T12:45:11+00:00

   ticket #10000

--- version 14
+++ version 15
@@ -104,6 +104,12 @@
  [XXX] http://www.secure.edu.pl/
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000364.html
 
+Ximin Luo has been the first to create a ticket with 5 digits [XXX] on Tor
+tracker. At the current rate, ticket #20000 should happen by the end of 2015…
+Or will the project continued growth make this happen sooner?
+
+ [XXX] https://bugs.torproject.org/10000
+
 Item 1 with cited source [XXX].
 
 Item 2 with cited source [XXX].

version 14
Author: lunar
Date:   2013-10-21T11:32:20+00:00

   cover Andrew's trip

--- version 13
+++ version 14
@@ -98,6 +98,12 @@
 Miscellaneous news
 ------------------
 
+Andrew Lewman was invited to speak at SECURE Poland 2013 [XXX] and sent
+a report on his trip [XXX] to Warsaw.
+
+ [XXX] http://www.secure.edu.pl/
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000364.html
+
 Item 1 with cited source [XXX].
 
 Item 2 with cited source [XXX].
@@ -143,7 +149,6 @@
 Possible items:
 
  * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
- * Trip Report for SECURE Poland 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000364.html
  * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
  * Usability issues with existing OTR clients https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html
  * Call for testing Tails 0.21 rc1 https://tails.boum.org/news/test_0.21-rc1/index.en.html

version 13
Author: lunar
Date:   2013-10-21T11:28:35+00:00

   also volunteer for this week

--- version 12
+++ version 13
@@ -1,6 +1,6 @@
 ''Seventeenth issue of Tor Weekly News. Covering what's happening from October 15th, 2013 to October 22th, 2013. To be released on October 23th, 2013.''
 
-'''Editor:''' 
+'''Editor:''' Lunar
 
 '''Subject:''' Tor Weekly News — October 23th, 2013
 

version 12
Author: lunar
Date:   2013-10-21T11:28:05+00:00

   first strike at Roger's blog post

--- version 11
+++ version 12
@@ -11,6 +11,50 @@
 
 Welcome to the seventeenth issue of Tor Weekly News, the weekly
 newsletter that covers what is happening in the XXX Tor community.
+
+Tor's anonymity and guards parameters
+-------------------------------------
+
+In a lengthly blog post [XXX], Roger Dingledine looked back on three
+research papers published in the past year. Some of them have been
+covered and most of the time misunderstood by the press. A good recap
+of the research problems, what the findings mean and possible solutions
+hopefully will help everyone understand better.
+
+Introduced in 2005 [XXX], entry guards were added to recognise that
+“some circuits are going to be compromised, but it's better to increase
+your probability of having no compromised circuits at the expense of
+also increasing the proportion of your circuits that will be compromised
+if any of them are.” Roger “originally picked ‘one or two months’ for
+guard rotation” but the initial parameters called for more in-depth
+research [XXX].
+
+That call was heard by “the Tor research community [XXX], and it's great
+that Tor gets such attention. We get this attention because we put so
+much effort into making it easy [XXX] for researchers to analyze Tor.”
+In his writing Roger highlights the finding of three papers. Two of them
+published at WPES 2012 and Oakland 2013, and another upcoming at
+CCS2013.
+
+These research efforts highlighted several deffiencies way Tor handles
+entry guards. Roger details five complementary fixes: using fewer
+guards, keeping the same guards for longer, better handling of
+brief unreachability of a guard, making the network bigger, and smarter
+assignment of the guard flag to relays. Some will require further
+research to identify the best solution. There's also other aspects
+regarding systems which don't currently record guards such as Tails, how
+pluggable transports could prevent attackers from recognizing Tor users,
+or enhancing measurements from the bandwidth authorities…
+
+The whole blog post is insightful and is a must read for everyone who
+wish to better understand some of Tor's risk mitigation strategies. It
+is also full of little and big things where you could make a difference!
+
+ [XXX] https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters
+ [XXX] https://blog.torproject.org/blog/top-changes-tor-2004-design-paper-part-2
+ [XXX] https://blog.torproject.org/blog/research-problem-better-guard-rotation-parameters
+ [XXX] http://freehaven.net/anonbib/
+ [XXX] https://research.torproject.org/
 
 New Release of XXX
 ------------------
@@ -99,7 +143,6 @@
 Possible items:
 
  * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
- * Improving Tor's anonymity by changing guard parameters https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters
  * Trip Report for SECURE Poland 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000364.html
  * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
  * Usability issues with existing OTR clients https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html

version 11
Author: asn
Date:   2013-10-21T10:48:52+00:00

   --

--- version 10
+++ version 11
@@ -20,6 +20,15 @@
 XXX: details about release
 
  [XXX]
+
+Hidden Service research
+-----------------------
+
+George posted a list of items that need work on the Hidden Service area [XXX].
+It's not an exhaustive list, but it might help with upgrading the Hidden Service design.
+Help and comments are welcome!
+
+  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005637.html
 
 Monthly status reports for XXX month 2013
 -----------------------------------------

version 10
Author: lunar
Date:   2013-10-21T10:32:22+00:00

   arturo's report

--- version 9
+++ version 10
@@ -94,4 +94,5 @@
  * Trip Report for SECURE Poland 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000364.html
  * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
  * Usability issues with existing OTR clients https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html
- * Call for testing Tails 0.21 rc1 https://tails.boum.org/news/test_0.21-rc1/index.en.html+ * Call for testing Tails 0.21 rc1 https://tails.boum.org/news/test_0.21-rc1/index.en.html
+ * Arthuro's report for September https://lists.torproject.org/pipermail/tor-reports/2013-October/000366.html
version 9
Author: lunar
Date:   2013-10-21T09:42:26+00:00

   add possible item

--- version 8
+++ version 9
@@ -93,4 +93,5 @@
  * Improving Tor's anonymity by changing guard parameters https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters
  * Trip Report for SECURE Poland 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000364.html
  * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
- * Usability issues with existing OTR clients https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html+ * Usability issues with existing OTR clients https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html
+ * Call for testing Tails 0.21 rc1 https://tails.boum.org/news/test_0.21-rc1/index.en.html
version 8
Author: mttp
Date:   2013-10-21T05:40:11+00:00

   --

--- version 7
+++ version 8
@@ -36,7 +36,11 @@
 Tor Help Desk Roundup
 ---------------------
 
-This week users asked many questions. 
+The Tor Help Desk continues to be bombarded with help requests from users
+behind university proxies who cannot use ORPort bridges or the Pluggable 
+Transports Browser to circumvent their network's firewall. Although the 
+cases are not all the same, bridges on port 443 or port 80 do not always 
+suffice to circumvent such proxies. 
 
 Miscellaneous news
 ------------------



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list