[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed Sep 25 10:00:06 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/12 ===
===========================================================================

version 43
Author: lunar
Date:   2013-09-25T09:29:39+00:00

   minor adjustments

--- version 42
+++ version 43
@@ -33,32 +33,32 @@
 month, drawn from a one-time donation by the U.S. Government's Broadcasting
 Board of Governors.
 
-The ensuing debate focused both on the technical aspects of reimbursement —
+The ensuing debate focused both on the technical aspects of reimbursement —
 that is, how best to determine the division of funds based on information
 harvested from the network metrics [4] — and the question of the security
 issues that could potentially arise from such a scheme [5].
 
 Moritz specified that currently the only organizations to qualify for
-reimbursements are those that he personally knows: “so, if you're interested
+reimbursements are those that he personally knows: “so, if you’re interested
 in becoming a partner, start social interaction with me”, he wrote. Questions
 or comments regarding these proposals are welcome on the tor-relays list, and
 further announcements and discussion about the reimbursement system will be
 published on its dedicated mailing lists [6].
 
- [1] https://blog.torproject.org/blog/turning-funding-more-exit-relays
- [2] https://lists.torproject.org/pipermail/tor-relays/2013-April/001996.html
- [3] https://lists.torproject.org/pipermail/tor-relays/2013-September/002824.html
- [4] https://lists.torproject.org/pipermail/tor-relays/2013-September/002825.html
- [5] https://lists.torproject.org/pipermail/tor-relays/2013-September/002831.html
- [6] https://lists.torproject.org/pipermail/tor-relays/2013-May/002138.html
+   [1] https://blog.torproject.org/blog/turning-funding-more-exit-relays
+   [2] https://lists.torproject.org/pipermail/tor-relays/2013-April/001996.html
+   [3] https://lists.torproject.org/pipermail/tor-relays/2013-September/002824.html
+   [4] https://lists.torproject.org/pipermail/tor-relays/2013-September/002825.html
+   [5] https://lists.torproject.org/pipermail/tor-relays/2013-September/002831.html
+   [6] https://lists.torproject.org/pipermail/tor-relays/2013-May/002138.html
 
 Tails 0.20.1 is out
 -------------------
 
-Tails saw its 33rd release on September 19th [7]. The most visible change
+Tails saw its 33rd release on September 19th [7]. The most visible change
 might be the upgrade of tor to version 0.2.4.17-rc, which should result in
 faster and more reliable access to the network after the sudden bump in
-Tor clients [8]. 
+Tor clients [8].
 
 Among other minor bugfixes and improvements, persistence volumes are now properly unmounted
 on shutdown. This should prevent data loss in some situations, and avoid a sometimes lengthy
@@ -67,10 +67,10 @@
 It also fixes several important security issues [9]. It is recommended that
 all users upgrade as soon as possible [10].
 
- [7] https://tails.boum.org/news/version_0.20.1/
- [8] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
- [9] https://tails.boum.org/security/Numerous_security_holes_in_0.20/
- [10] https://tails.boum.org/news/version_0.20.1/
+   [7] https://tails.boum.org/news/version_0.20.1/
+   [8] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
+   [9] https://tails.boum.org/security/Numerous_security_holes_in_0.20/
+  [10] https://tails.boum.org/news/version_0.20.1/
 
 New Tor Browser Bundles released
 --------------------------------
@@ -86,22 +86,22 @@
 
 Once again, it is recommended that all users upgrade as soon as possible.
 
- [11] https://blog.torproject.org/blog/new-tor-browser-bundles-firefox-1709esr
- [12] https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox17.0.9
- [13] https://bugs.torproject.org/8839
- [14] https://bugs.torproject.org/9713
+  [11] https://blog.torproject.org/blog/new-tor-browser-bundles-firefox-1709esr
+  [12] https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox17.0.9
+  [13] https://bugs.torproject.org/8839
+  [14] https://bugs.torproject.org/9713
 
 Tor mini-hackathon at GNU 30th Anniversary Celebration
 ------------------------------------------------------
 
-Nick Mathewson sent an invitation [15] encouraging everyone to attend the GNU 30th Anniversary 
+Nick Mathewson sent an invitation [15] encouraging everyone to attend the GNU 30th Anniversary
 Celebration [16] on September 28th and 29th at MIT, Cambridge, MA, USA.
 Part of the event is a hackathon, and Tor is featured alongside a few other projects.
-If you want to spend some of the weekend helping the Tor community, sign up on the webpage [17] and come along! 
-
- [15] https://lists.torproject.org/pipermail/tor-talk/2013-September/030154.html
- [16] https://gnu.org/gnu30/celebration
- [17] https://crm.fsf.org/civicrm/event/register?id=10
+If you want to spend some of the weekend helping the Tor community, sign up on the webpage [17] and come along!
+
+  [15] https://lists.torproject.org/pipermail/tor-talk/2013-September/030154.html
+  [16] https://gnu.org/gnu30/celebration
+  [17] https://crm.fsf.org/civicrm/event/register?id=10
 
 Clock skew: false alarm
 -----------------------
@@ -117,28 +117,31 @@
 
 The issue was quickly worked around, and fixed properly a few hours later [20].
 
- [18] https://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/222-remove-client-timestamps.txt
- [19] https://lists.torproject.org/pipermail/tor-relays/2013-September/002888.html
- [20] https://bugs.torproject.org/9798
+  [18] https://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/222-remove-client-timestamps.txt
+  [19] https://lists.torproject.org/pipermail/tor-relays/2013-September/002888.html
+  [20] https://bugs.torproject.org/9798
 
 Tor Help Desk Roundup
 ---------------------
 
-One user contacted the help desk for assistance running torbrowser, an application 
-not affiliated with the Tor Project that attempts to mimic the Tor Browser Bundle. 
-The torbrowser application violates the Tor Project's trademark, and the Tor Project 
-encourages users to avoid it . Multiple Tor Project developers have contacted 
-SourceForge, which hosts this application's website, attempting to get the project 
-removed. Andrew Lewman has said that lawyers have now been engaged [21].
-
-A number of University students continued to contact the help desk to report difficulties 
-circumventing their University's Cyberoam firewall. These students report being unable 
-to access the Tor network even when using the Pluggable Transports Browser with obfs3
-bridges. One person reported success circumventing the firewall when using an obfsproxy
-bridge on port 443. This issue is ongoing, but a bug report has been filed [22].
-
- [21] https://lists.torproject.org/pipermail/tor-talk/2013-August/029614.html
- [22] https://bugs.torproject.org/projects/tor/ticket/9601
+One user contacted the help desk for assistance running torbrowser, an
+application not affiliated with the Tor Project that attempts to mimic
+the Tor Browser Bundle. The torbrowser application violates the Tor
+Project’s trademark, and the Tor Project encourages users to avoid it.
+Multiple Tor Project developers have contacted SourceForge, which hosts
+this application’s website, attempting to get the project removed.
+Andrew Lewman has said that lawyers have now been engaged [21].
+
+A number of University students continued to contact the help desk to
+report difficulties circumventing their University’s Cyberoam firewall.
+These students report being unable to access the Tor network even when
+using the Pluggable Transports Browser with obfs3 bridges. One person
+reported success circumventing the firewall when using an obfsproxy
+bridge on port 443. This issue is ongoing, but a bug report has been
+filed [22].
+
+  [21] https://lists.torproject.org/pipermail/tor-talk/2013-August/029614.html
+  [22] https://bugs.torproject.org/projects/tor/ticket/9601
 
 Miscellaneous news
 ------------------
@@ -146,33 +149,32 @@
 Jacob Appelbaum inquired with VUPEN about the Tor Project having the right of first
 refusal for Tor Browser bugs, in order to protect users [23].
 
- [23] http://storify.com/fredericjacobs/discussion-between-tor-s-ioerror-and-vupen-s-chaou
+  [23] http://storify.com/fredericjacobs/discussion-between-tor-s-ioerror-and-vupen-s-chaou
 
 The proposed Tor page on Stack Exchange has now reached 100% commitment, and will soon
 be launching as a live beta. Thanks to everyone who signed up! [24].
 
- [24] http://area51.stackexchange.com/proposals/56447/tor
+  [24] http://area51.stackexchange.com/proposals/56447/tor
 
 sajolida reported on the latest Tails “low-hanging fruits session”. The date and a
 tentative agenda for the next online contributors meeting have also been set [25,26].
 
- [25] https://mailman.boum.org/pipermail/tails-dev/2013-September/003703.html
- [26] https://mailman.boum.org/pipermail/tails-dev/2013-September/003696.html
+  [25] https://mailman.boum.org/pipermail/tails-dev/2013-September/003703.html
+  [26] https://mailman.boum.org/pipermail/tails-dev/2013-September/003696.html
 
 As GSoC entered its final phase, Kostas Jakeliunas reported on the searchable
 metrics archive [27], Johannes Fürmann on EvilGenius [28], and Cristian-Matei Toader
 on Tor capabilities [29].
 
- [27] https://lists.torproject.org/pipermail/tor-dev/2013-September/005483.html
- [28] https://lists.torproject.org/pipermail/tor-dev/2013-September/005484.html
- [29] https://lists.torproject.org/pipermail/tor-dev/2013-September/005490.html
+  [27] https://lists.torproject.org/pipermail/tor-dev/2013-September/005483.html
+  [28] https://lists.torproject.org/pipermail/tor-dev/2013-September/005484.html
+  [29] https://lists.torproject.org/pipermail/tor-dev/2013-September/005490.html
 
 How can we provide Tor users an easy way to verify the signatures on Tor software?
 Sherief Alaa raised this question on the tor-dev mailing list when asking for
-comments on plans to write a “small” GUI tool [30].
-
- [30] https://lists.torproject.org/pipermail/tor-dev/2013-September/005491.html
-
+comments on plans to write a “small” GUI tool [30].
+
+  [30] https://lists.torproject.org/pipermail/tor-dev/2013-September/005491.html
 
 Upcoming events
 ---------------
@@ -194,8 +196,8 @@
           | http://ic.epfl.ch/privacy-surveillance
 
 
-This issue of Tor Weekly News has been assembled by Lunar, harmony, dope457, 
-Jacob Appelbaum, Matt Pagan, and XXX.
+This issue of Tor Weekly News has been assembled by harmony, Lunar,
+dope457, Matt Pagan, and Jacob Appelbaum.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 42
Author: harmony
Date:   2013-09-25T09:18:35+00:00

   minor language fixes

--- version 41
+++ version 42
@@ -96,8 +96,8 @@
 
 Nick Mathewson sent an invitation [15] encouraging everyone to attend the GNU 30th Anniversary 
 Celebration [16] on September 28th and 29th at MIT, Cambridge, MA, USA.
-Part of the event is a hackathon and Tor is featured alongside a few other projects.
-So if you want to spend some of the week-end to help the Tor community, sign up on the webpage [17] and come along! 
+Part of the event is a hackathon, and Tor is featured alongside a few other projects.
+If you want to spend some of the weekend helping the Tor community, sign up on the webpage [17] and come along! 
 
  [15] https://lists.torproject.org/pipermail/tor-talk/2013-September/030154.html
  [16] https://gnu.org/gnu30/celebration
@@ -131,7 +131,7 @@
 SourceForge, which hosts this application's website, attempting to get the project 
 removed. Andrew Lewman has said that lawyers have now been engaged [21].
 
-A number of University students continue contacting the help desk to report difficulties 
+A number of University students continued to contact the help desk to report difficulties 
 circumventing their University's Cyberoam firewall. These students report being unable 
 to access the Tor network even when using the Pluggable Transports Browser with obfs3
 bridges. One person reported success circumventing the firewall when using an obfsproxy
@@ -159,7 +159,7 @@
  [25] https://mailman.boum.org/pipermail/tails-dev/2013-September/003703.html
  [26] https://mailman.boum.org/pipermail/tails-dev/2013-September/003696.html
 
-While GSoC entered its final phase, Kostas Jakeliunas reported on the searchable
+As GSoC entered its final phase, Kostas Jakeliunas reported on the searchable
 metrics archive [27], Johannes Fürmann on EvilGenius [28], and Cristian-Matei Toader
 on Tor capabilities [29].
 
@@ -168,7 +168,7 @@
  [29] https://lists.torproject.org/pipermail/tor-dev/2013-September/005490.html
 
 How can we provide Tor users an easy way to verify the signatures on Tor software?
-Sherief Alaa has raised the question on the tor-dev mailing list when asking for
+Sherief Alaa raised this question on the tor-dev mailing list when asking for
 comments on plans to write a “small” GUI tool [30].
 
  [30] https://lists.torproject.org/pipermail/tor-dev/2013-September/005491.html



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list