[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed Sep 25 11:00:06 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/12 ===
===========================================================================

version 45
Author: dope457
Date:   2013-09-25T10:21:26+00:00

   correction

--- version 44
+++ version 45
@@ -150,8 +150,7 @@
 ------------------
 
 Jacob Appelbaum inquired with VUPEN about the Tor Project having the
-right of first refusal for Tor Browser bugs, in order to protect users
-[23].
+right of first refusal for Tor Browser bugs, in order to protect users [23].
 
   [23] http://storify.com/fredericjacobs/discussion-between-tor-s-ioerror-and-vupen-s-chaou
 

version 44
Author: dope457
Date:   2013-09-25T10:20:38+00:00

   word wrap

--- version 43
+++ version 44
@@ -11,39 +11,40 @@
 Tor Weekly News                                     September 25th, 2013
 ========================================================================
 
-Welcome to the thirteenth issue of Tor Weekly News, the weekly newsletter that
-covers what's happening in the well-heeled Tor community.
+Welcome to the thirteenth issue of Tor Weekly News, the weekly newsletter
+that covers what's happening in the well-heeled Tor community.
 
 Reimbursement of exit operators
 -------------------------------
 
-In July 2012, Roger Dingledine wrote a post on the Tor blog [1] in which he
-raised the prospect of offering funding to organizations running fast Tor exit
-nodes. In so doing, Roger wrote, “we will improve the network's diversity as
-well as being able to handle more users.” He also announced that donors were
-already interested in financing such a scheme. Then, in April this year, Moritz
-Bartl stated [2] that torservers.net was looking to move away from establishing
-additional exit nodes, in favor of providing support of various kinds to partner
-organizations running their own exits.
-
-These plans, and the discussion they provoked, are now about to bear fruit
-in the form of a financial reimbursement scheme directed at torservers.net's
-partner organizations. Moritz wrote again on the the tor-relays list [3]
-to announce that reimbursements are scheduled to begin at the end of this
-month, drawn from a one-time donation by the U.S. Government's Broadcasting
-Board of Governors.
-
-The ensuing debate focused both on the technical aspects of reimbursement —
-that is, how best to determine the division of funds based on information
-harvested from the network metrics [4] — and the question of the security
-issues that could potentially arise from such a scheme [5].
+In July 2012, Roger Dingledine wrote a post on the Tor blog [1] in which
+he raised the prospect of offering funding to organizations running fast
+Tor exit nodes. In so doing, Roger wrote, “we will improve the network's
+diversity as well as being able to handle more users.” He also announced
+that donors were already interested in financing such a scheme. Then, in
+April this year, Moritz Bartl stated [2] that torservers.net was looking
+to move away from establishing additional exit nodes, in favor of
+providing support of various kinds to partner organizations running their
+own exits.
+
+These plans, and the discussion they provoked, are now about to bear
+fruit in the form of a financial reimbursement scheme directed at
+torservers.net's partner organizations. Moritz wrote again on the the
+tor-relays list [3] to announce that reimbursements are scheduled to
+begin at the end of this month, drawn from a one-time donation by the
+U.S. Government's Broadcasting Board of Governors.
+
+The ensuing debate focused both on the technical aspects of reimbursement
+— that is, how best to determine the division of funds based on
+information harvested from the network metrics [4] — and the question of
+the security issues that could potentially arise from such a scheme [5].
 
 Moritz specified that currently the only organizations to qualify for
-reimbursements are those that he personally knows: “so, if you’re interested
-in becoming a partner, start social interaction with me”, he wrote. Questions
-or comments regarding these proposals are welcome on the tor-relays list, and
-further announcements and discussion about the reimbursement system will be
-published on its dedicated mailing lists [6].
+reimbursements are those that he personally knows: “so, if you’re
+interested in becoming a partner, start social interaction with me”, he
+wrote. Questions or comments regarding these proposals are welcome on the
+tor-relays list, and further announcements and discussion about the
+reimbursement system will be published on its dedicated mailing lists [6].
 
    [1] https://blog.torproject.org/blog/turning-funding-more-exit-relays
    [2] https://lists.torproject.org/pipermail/tor-relays/2013-April/001996.html
@@ -56,16 +57,16 @@
 -------------------
 
 Tails saw its 33rd release on September 19th [7]. The most visible change
-might be the upgrade of tor to version 0.2.4.17-rc, which should result in
-faster and more reliable access to the network after the sudden bump in
-Tor clients [8].
-
-Among other minor bugfixes and improvements, persistence volumes are now properly unmounted
-on shutdown. This should prevent data loss in some situations, and avoid a sometimes lengthy
-pause upon activation.
-
-It also fixes several important security issues [9]. It is recommended that
-all users upgrade as soon as possible [10].
+might be the upgrade of tor to version 0.2.4.17-rc, which should result
+in faster and more reliable access to the network after the sudden bump
+in Tor clients [8].
+
+Among other minor bugfixes and improvements, persistence volumes are now
+properly unmounted on shutdown. This should prevent data loss in some
+situations, and avoid a sometimes lengthy pause upon activation.
+
+It also fixes several important security issues [9]. It is recommended
+that all users upgrade as soon as possible [10].
 
    [7] https://tails.boum.org/news/version_0.20.1/
    [8] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
@@ -75,14 +76,15 @@
 New Tor Browser Bundles released
 --------------------------------
 
-A new set of stable and beta Tor Browser Bundles was released [11] on September 20th.
-The Tor Browser is now based on Firefox 17.0.9esr and fixes several important
-security issues [12].
-
-Queries for the default search engine, Startpage, are no longer subject to its
-invasive “family filter” [13]. The beta branch also include an updated version of
-HTTPS Everywhere that no longer causes a storm of requests to clients1.google.com,
-an issue reported by many users after the last release [14].
+A new set of stable and beta Tor Browser Bundles was released [11] on
+September 20th. The Tor Browser is now based on Firefox 17.0.9esr and
+fixes several important security issues [12].
+
+Queries for the default search engine, Startpage, are no longer subject
+to its invasive “family filter” [13]. The beta branch also include an
+updated version of HTTPS Everywhere that no longer causes a storm of
+requests to clients1.google.com, an issue reported by many users after
+the last release [14].
 
 Once again, it is recommended that all users upgrade as soon as possible.
 
@@ -94,10 +96,11 @@
 Tor mini-hackathon at GNU 30th Anniversary Celebration
 ------------------------------------------------------
 
-Nick Mathewson sent an invitation [15] encouraging everyone to attend the GNU 30th Anniversary
-Celebration [16] on September 28th and 29th at MIT, Cambridge, MA, USA.
-Part of the event is a hackathon, and Tor is featured alongside a few other projects.
-If you want to spend some of the weekend helping the Tor community, sign up on the webpage [17] and come along!
+Nick Mathewson sent an invitation [15] encouraging everyone to attend the
+GNU 30th Anniversary Celebration [16] on September 28th and 29th at MIT,
+Cambridge, MA, USA. Part of the event is a hackathon, and Tor is featured
+alongside a few other projects. If you want to spend some of the weekend
+helping the Tor community, sign up on the webpage [17] and come along!
 
   [15] https://lists.torproject.org/pipermail/tor-talk/2013-September/030154.html
   [16] https://gnu.org/gnu30/celebration
@@ -106,14 +109,14 @@
 Clock skew: false alarm
 -----------------------
 
-Small offsets in system time offer an attractive opportunity for fingerprinting Tor
-clients. In order to eliminate unnecessary exposure, Nick Mathewson has been working on
-proposal 222 [18].
-
-Unfortunately, this process introduced a bug into the tor daemon which became apparent
-after the directory authority named “turtles” was upgraded. The result was that relays
-started to warn their operators of an implausible clock skew [19]. This was, of course,
-a false alarm.
+Small offsets in system time offer an attractive opportunity for
+fingerprinting Tor clients. In order to eliminate unnecessary exposure,
+Nick Mathewson has been working on proposal 222 [18].
+
+Unfortunately, this process introduced a bug into the tor daemon which
+became apparent after the directory authority named “turtles” was
+upgraded. The result was that relays started to warn their operators of
+an implausible clock skew [19]. This was, of course, a false alarm.
 
 The issue was quickly worked around, and fixed properly a few hours later [20].
 
@@ -129,8 +132,8 @@
 the Tor Browser Bundle. The torbrowser application violates the Tor
 Project’s trademark, and the Tor Project encourages users to avoid it.
 Multiple Tor Project developers have contacted SourceForge, which hosts
-this application’s website, attempting to get the project removed.
-Andrew Lewman has said that lawyers have now been engaged [21].
+this application’s website, attempting to get the project removed. Andrew
+Lewman has said that lawyers have now been engaged [21].
 
 A number of University students continued to contact the help desk to
 report difficulties circumventing their University’s Cyberoam firewall.
@@ -146,33 +149,36 @@
 Miscellaneous news
 ------------------
 
-Jacob Appelbaum inquired with VUPEN about the Tor Project having the right of first
-refusal for Tor Browser bugs, in order to protect users [23].
+Jacob Appelbaum inquired with VUPEN about the Tor Project having the
+right of first refusal for Tor Browser bugs, in order to protect users
+[23].
 
   [23] http://storify.com/fredericjacobs/discussion-between-tor-s-ioerror-and-vupen-s-chaou
 
-The proposed Tor page on Stack Exchange has now reached 100% commitment, and will soon
-be launching as a live beta. Thanks to everyone who signed up! [24].
+The proposed Tor page on Stack Exchange has now reached 100% commitment,
+and will soon be launching as a live beta. Thanks to everyone who signed
+up! [24].
 
   [24] http://area51.stackexchange.com/proposals/56447/tor
 
-sajolida reported on the latest Tails “low-hanging fruits session”. The date and a
-tentative agenda for the next online contributors meeting have also been set [25,26].
+sajolida reported on the latest Tails “low-hanging fruits session”. The
+date and a tentative agenda for the next online contributors meeting have
+also been set [25,26].
 
   [25] https://mailman.boum.org/pipermail/tails-dev/2013-September/003703.html
   [26] https://mailman.boum.org/pipermail/tails-dev/2013-September/003696.html
 
-As GSoC entered its final phase, Kostas Jakeliunas reported on the searchable
-metrics archive [27], Johannes Fürmann on EvilGenius [28], and Cristian-Matei Toader
-on Tor capabilities [29].
+As GSoC entered its final phase, Kostas Jakeliunas reported on the
+searchable metrics archive [27], Johannes Fürmann on EvilGenius [28], and
+Cristian-Matei Toader on Tor capabilities [29].
 
   [27] https://lists.torproject.org/pipermail/tor-dev/2013-September/005483.html
   [28] https://lists.torproject.org/pipermail/tor-dev/2013-September/005484.html
   [29] https://lists.torproject.org/pipermail/tor-dev/2013-September/005490.html
 
-How can we provide Tor users an easy way to verify the signatures on Tor software?
-Sherief Alaa raised this question on the tor-dev mailing list when asking for
-comments on plans to write a “small” GUI tool [30].
+How can we provide Tor users an easy way to verify the signatures on Tor
+software? Sherief Alaa raised this question on the tor-dev mailing list
+when asking for comments on plans to write a “small” GUI tool [30].
 
   [30] https://lists.torproject.org/pipermail/tor-dev/2013-September/005491.html
 



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list