[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Apr 29 11:20:05 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/17 ===
===========================================================================

version 34
Author: lunar
Date:   2014-04-29T10:38:43+00:00

   FREEZE

--- version 33
+++ version 34
@@ -2,7 +2,7 @@
 
 '''Editor:''' Lunar
 
-'''Status:''' Writing in progress. Expected freeze time 2014-04-29 '''10:00 UTC'''.
+'''Status:''' FROZEN. Only technical and language fixes. New items should go on [wiki:TorWeeklyNews/2014/18 next week's edition]. Expected publication time 2014-04-30 12:00 UTC.
 
 '''Subject:''' Tor Weekly News — April 30th, 2014
 
@@ -18,7 +18,7 @@
 -----------------------------
 
 The latest incarnation of the current development branch of Tor,
-dubbed 0.2.5.4-alpha, has been released on April 26th [XXX]. The release
+dubbed 0.2.5.4-alpha, has been released on April 26th [1]. The release
 mainly brings security and performance improvements for clients
 and relays.
 
@@ -28,7 +28,7 @@
 
 Other improvements include fixing two expensive functions on busy relays,
 better TLS ciphersuite preference lists, support for run-time
-hardening on compilers that support AddressSanitizer [XXX], and more work on
+hardening on compilers that support AddressSanitizer [2], and more work on
 the Linux sandbox code. There are also several usability fixes for
 clients (especially clients that use bridges), two new TransPort
 protocols supported (one on OpenBSD, one on FreeBSD), and various
@@ -37,17 +37,17 @@
 As Nick Mathewson wrote: “This release marks end-of-life for Tor 0.2.2.x;
 those Tor versions have accumulated many known flaws”.
 
-Source code is available at the usual location [XXX] and binary
+Source code is available at the usual location [3] and binary
 packages have already started to be updated.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032817.html
- [XXX]: https://code.google.com/p/address-sanitizer/
- [XXX]: https://www.torproject.org/dist/
+   [1]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032817.html
+   [2]: https://code.google.com/p/address-sanitizer/
+   [3]: https://www.torproject.org/dist/
 
 Introducing the 2014 Google Summer of Code projects
 ---------------------------------------------------
 
-As announced in February [XXX], Tor is once again participating in
+As announced in February [4], Tor is once again participating in
 Google’s Summer of Code program, allowing students and aspiring
 developers the chance to work on a Tor-related project with funding from
 Google and expert guidance from Tor Project members. After several
@@ -55,69 +55,69 @@
 proposals have now been chosen, and some of the students took to the
 tor-dev mailing list to introduce themselves and their upcoming work.
 
-Juha Nurmi [XXX] will continue to work on the already-operational
-ahmia.fi hidden service search engine, while Marc Juarez [XXX] will be
+Juha Nurmi [5] will continue to work on the already-operational
+ahmia.fi hidden service search engine, while Marc Juarez [6] will be
 “implementing the building blocks for a future padding-based website
 fingerprinting countermeasure as a pluggable transport”. Daniel
-Martí [XXX] has taken up the challenge of implementing proposal
-140 [XXX], which aims to considerably reduce the size of the network
-consensus data that Tor clients fetch every hour, and Israel Leiva [XXX]
+Martí [7] has taken up the challenge of implementing proposal
+140 [8], which aims to considerably reduce the size of the network
+consensus data that Tor clients fetch every hour, and Israel Leiva [9]
 plans to spruce up the neglected GetTor service, which allows users to
 download the Tor Browser Bundle even if the Tor website and its mirrors
-are inaccessible. Amogh Pradeep [XXX] will be contributing to the
+are inaccessible. Amogh Pradeep [10] will be contributing to the
 Guardian Project’s development of Orfox, a new Android web browser to be
-used with Orbot, while Kostas Jakeliunas [XXX] returns to Tor GSoC to
+used with Orbot, while Kostas Jakeliunas [11] returns to Tor GSoC to
 construct a new BridgeDB distributor, serving bridge addresses to users
 in censored areas over Twitter, and possibly other channels as well.
-Quinn Jarrell [XXX] will be working on building a pluggable
+Quinn Jarrell [12] will be working on building a pluggable
 transports combiner that “will allow transports to be chained together
 to form more varieties of transports and make them harder to detect
 and block”.
 
 You can read more about each proposal in the respective introductory
 messages and their replies; a full list of accepted projects is
-available on the Google Summer of Code website [XXX]. As Daniel wrote,
+available on the Google Summer of Code website [13]. As Daniel wrote,
 “comments are very welcome”!
 
- [XXX]: https://blog.torproject.org/blog/tor-google-summer-code-2014
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006739.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006741.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006744.html
- [XXX]: https://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/140-consensus-diffs.txt
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006745.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006748.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006749.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006777.html
- [XXX]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
+   [4]: https://blog.torproject.org/blog/tor-google-summer-code-2014
+   [5]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006739.html
+   [6]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006741.html
+   [7]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006744.html
+   [8]: https://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/140-consensus-diffs.txt
+   [9]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006745.html
+  [10]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006748.html
+  [11]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006749.html
+  [12]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006777.html
+  [13]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
 
 Miscellaneous news
 ------------------
 
-Meejah has released version 0.9.2 of txtorcon [XXX] — the Tor controller library
+Meejah has released version 0.9.2 of txtorcon [14] — the Tor controller library
 for the Twisted Python framework: “this release adds a few minor bug-fixes and
 a few API enhancements”.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006766.html
+  [14]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006766.html
 
 The Tails team is looking for enthusiasts equiped with Bluetooth keyboard
-and mouse [XXX] to ensure that Tails works properly with such hardware.
+and mouse [15] to ensure that Tails works properly with such hardware.
 
- [XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-April/000010.html
+  [15]: https://mailman.boum.org/pipermail/tails-testers/2014-April/000010.html
 
-Matthew Finkel sent a copy of the email that was sent to bridge operators [XXX]
+Matthew Finkel sent a copy of the email that was sent to bridge operators [16]
 to warn them about the “Heartbleed” vulnerability and actions that should be
 taken. If you know any bridge operator which might not have filled their
 contact information, please forward the message!
 
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004428.html
+  [16]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004428.html
 
 Karsten Loesing has been working on switching Onionoo — the web service
 to retrieve information about the Tor network — to use the Gson library
 instead of plain string concatenation to format its JSON output. As the
 change might break some applications, client authors should test
-their applications [XXX] and see if everything still work as it should.
+their applications [17] and see if everything still work as it should.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006772.html
+  [17]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006772.html
 
 Tor help desk roundup
 ---------------------
@@ -126,29 +126,29 @@
 mirrors are offline. The sites were taken down during the fallout from 
 the Heartbleed security vulnerability. New hidden service addresses 
 were not generated. The sysadmin team has expressed that they no longer 
-wish to maintain these services [XXX]. 
+wish to maintain these services [18]. 
 
- [XXX]: https://bugs.torproject.org/11567
+  [18]: https://bugs.torproject.org/11567
 
 News from Tor StackExchange
 ---------------------------
 
 Kristopher Ives is working on a card game using Tor. Each user accepts
 inbound connections through hidden services and also needs to make
-outbound connections [XXX]. Tom Ritter acknowledged it was possible to
+outbound connections [19]. Tom Ritter acknowledged it was possible to
 use only one Tor daemon to do both.
 
- [XXX]: https://tor.stackexchange.com/q/1592/88
+  [19]: https://tor.stackexchange.com/q/1592/88
 
 Dan gets the error message “Cannot load XPCOM” whenever Tor Browser is
-started [XXX]. Jens Kubieziel points to the discussion at #10789 [XXX].
+started [20]. Jens Kubieziel points to the discussion at #10789 [21].
 The culprit is WebRoot Internet Security as it prevents proper loading
 all browser components. Either uninstalling it or adding DLL files
-to the whitelist has helped other users [XXX].
+to the whitelist has helped other users [22].
 
- [XXX]: https://tor.stackexchange.com/q/2012/88 
- [XXX]: https://trac.torproject.org/projects/tor/ticket/10789
- [XXX]: https://blog.torproject.org/blog/tor-browser-352-released#comment-47052
+  [20]: https://tor.stackexchange.com/q/2012/88 
+  [21]: https://trac.torproject.org/projects/tor/ticket/10789
+  [22]: https://blog.torproject.org/blog/tor-browser-352-released#comment-47052
 
 Upcoming events
 ---------------
@@ -170,10 +170,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [23], write down your
+name and subscribe to the team mailing list [24] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+  [23]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [24]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}

version 33
Author: lunar
Date:   2014-04-29T10:36:59+00:00

   credits

--- version 32
+++ version 33
@@ -165,8 +165,8 @@
                  | Stockholm, Sweden
                  | http://www.stockholminternetforum.se/
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, harmony,
+Matt Pagan, and qbi.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list