[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Apr 29 11:20:05 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/17 ===
===========================================================================
version 34
Author: lunar
Date: 2014-04-29T10:38:43+00:00
FREEZE
--- version 33
+++ version 34
@@ -2,7 +2,7 @@
'''Editor:''' Lunar
-'''Status:''' Writing in progress. Expected freeze time 2014-04-29 '''10:00 UTC'''.
+'''Status:''' FROZEN. Only technical and language fixes. New items should go on [wiki:TorWeeklyNews/2014/18 next week's edition]. Expected publication time 2014-04-30 12:00 UTC.
'''Subject:''' Tor Weekly News — April 30th, 2014
@@ -18,7 +18,7 @@
-----------------------------
The latest incarnation of the current development branch of Tor,
-dubbed 0.2.5.4-alpha, has been released on April 26th [XXX]. The release
+dubbed 0.2.5.4-alpha, has been released on April 26th [1]. The release
mainly brings security and performance improvements for clients
and relays.
@@ -28,7 +28,7 @@
Other improvements include fixing two expensive functions on busy relays,
better TLS ciphersuite preference lists, support for run-time
-hardening on compilers that support AddressSanitizer [XXX], and more work on
+hardening on compilers that support AddressSanitizer [2], and more work on
the Linux sandbox code. There are also several usability fixes for
clients (especially clients that use bridges), two new TransPort
protocols supported (one on OpenBSD, one on FreeBSD), and various
@@ -37,17 +37,17 @@
As Nick Mathewson wrote: “This release marks end-of-life for Tor 0.2.2.x;
those Tor versions have accumulated many known flaws”.
-Source code is available at the usual location [XXX] and binary
+Source code is available at the usual location [3] and binary
packages have already started to be updated.
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032817.html
- [XXX]: https://code.google.com/p/address-sanitizer/
- [XXX]: https://www.torproject.org/dist/
+ [1]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032817.html
+ [2]: https://code.google.com/p/address-sanitizer/
+ [3]: https://www.torproject.org/dist/
Introducing the 2014 Google Summer of Code projects
---------------------------------------------------
-As announced in February [XXX], Tor is once again participating in
+As announced in February [4], Tor is once again participating in
Google’s Summer of Code program, allowing students and aspiring
developers the chance to work on a Tor-related project with funding from
Google and expert guidance from Tor Project members. After several
@@ -55,69 +55,69 @@
proposals have now been chosen, and some of the students took to the
tor-dev mailing list to introduce themselves and their upcoming work.
-Juha Nurmi [XXX] will continue to work on the already-operational
-ahmia.fi hidden service search engine, while Marc Juarez [XXX] will be
+Juha Nurmi [5] will continue to work on the already-operational
+ahmia.fi hidden service search engine, while Marc Juarez [6] will be
“implementing the building blocks for a future padding-based website
fingerprinting countermeasure as a pluggable transport”. Daniel
-Martí [XXX] has taken up the challenge of implementing proposal
-140 [XXX], which aims to considerably reduce the size of the network
-consensus data that Tor clients fetch every hour, and Israel Leiva [XXX]
+Martí [7] has taken up the challenge of implementing proposal
+140 [8], which aims to considerably reduce the size of the network
+consensus data that Tor clients fetch every hour, and Israel Leiva [9]
plans to spruce up the neglected GetTor service, which allows users to
download the Tor Browser Bundle even if the Tor website and its mirrors
-are inaccessible. Amogh Pradeep [XXX] will be contributing to the
+are inaccessible. Amogh Pradeep [10] will be contributing to the
Guardian Project’s development of Orfox, a new Android web browser to be
-used with Orbot, while Kostas Jakeliunas [XXX] returns to Tor GSoC to
+used with Orbot, while Kostas Jakeliunas [11] returns to Tor GSoC to
construct a new BridgeDB distributor, serving bridge addresses to users
in censored areas over Twitter, and possibly other channels as well.
-Quinn Jarrell [XXX] will be working on building a pluggable
+Quinn Jarrell [12] will be working on building a pluggable
transports combiner that “will allow transports to be chained together
to form more varieties of transports and make them harder to detect
and block”.
You can read more about each proposal in the respective introductory
messages and their replies; a full list of accepted projects is
-available on the Google Summer of Code website [XXX]. As Daniel wrote,
+available on the Google Summer of Code website [13]. As Daniel wrote,
“comments are very welcome”!
- [XXX]: https://blog.torproject.org/blog/tor-google-summer-code-2014
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006739.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006741.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006744.html
- [XXX]: https://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/140-consensus-diffs.txt
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006745.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006748.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006749.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006777.html
- [XXX]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
+ [4]: https://blog.torproject.org/blog/tor-google-summer-code-2014
+ [5]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006739.html
+ [6]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006741.html
+ [7]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006744.html
+ [8]: https://gitweb.torproject.org/torspec.git/blob_plain/refs/heads/master:/proposals/140-consensus-diffs.txt
+ [9]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006745.html
+ [10]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006748.html
+ [11]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006749.html
+ [12]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006777.html
+ [13]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
Miscellaneous news
------------------
-Meejah has released version 0.9.2 of txtorcon [XXX] — the Tor controller library
+Meejah has released version 0.9.2 of txtorcon [14] — the Tor controller library
for the Twisted Python framework: “this release adds a few minor bug-fixes and
a few API enhancements”.
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006766.html
+ [14]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006766.html
The Tails team is looking for enthusiasts equiped with Bluetooth keyboard
-and mouse [XXX] to ensure that Tails works properly with such hardware.
+and mouse [15] to ensure that Tails works properly with such hardware.
- [XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-April/000010.html
+ [15]: https://mailman.boum.org/pipermail/tails-testers/2014-April/000010.html
-Matthew Finkel sent a copy of the email that was sent to bridge operators [XXX]
+Matthew Finkel sent a copy of the email that was sent to bridge operators [16]
to warn them about the “Heartbleed” vulnerability and actions that should be
taken. If you know any bridge operator which might not have filled their
contact information, please forward the message!
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004428.html
+ [16]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004428.html
Karsten Loesing has been working on switching Onionoo — the web service
to retrieve information about the Tor network — to use the Gson library
instead of plain string concatenation to format its JSON output. As the
change might break some applications, client authors should test
-their applications [XXX] and see if everything still work as it should.
+their applications [17] and see if everything still work as it should.
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006772.html
+ [17]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006772.html
Tor help desk roundup
---------------------
@@ -126,29 +126,29 @@
mirrors are offline. The sites were taken down during the fallout from
the Heartbleed security vulnerability. New hidden service addresses
were not generated. The sysadmin team has expressed that they no longer
-wish to maintain these services [XXX].
+wish to maintain these services [18].
- [XXX]: https://bugs.torproject.org/11567
+ [18]: https://bugs.torproject.org/11567
News from Tor StackExchange
---------------------------
Kristopher Ives is working on a card game using Tor. Each user accepts
inbound connections through hidden services and also needs to make
-outbound connections [XXX]. Tom Ritter acknowledged it was possible to
+outbound connections [19]. Tom Ritter acknowledged it was possible to
use only one Tor daemon to do both.
- [XXX]: https://tor.stackexchange.com/q/1592/88
+ [19]: https://tor.stackexchange.com/q/1592/88
Dan gets the error message “Cannot load XPCOM” whenever Tor Browser is
-started [XXX]. Jens Kubieziel points to the discussion at #10789 [XXX].
+started [20]. Jens Kubieziel points to the discussion at #10789 [21].
The culprit is WebRoot Internet Security as it prevents proper loading
all browser components. Either uninstalling it or adding DLL files
-to the whitelist has helped other users [XXX].
+to the whitelist has helped other users [22].
- [XXX]: https://tor.stackexchange.com/q/2012/88
- [XXX]: https://trac.torproject.org/projects/tor/ticket/10789
- [XXX]: https://blog.torproject.org/blog/tor-browser-352-released#comment-47052
+ [20]: https://tor.stackexchange.com/q/2012/88
+ [21]: https://trac.torproject.org/projects/tor/ticket/10789
+ [22]: https://blog.torproject.org/blog/tor-browser-352-released#comment-47052
Upcoming events
---------------
@@ -170,10 +170,10 @@
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [23], write down your
+name and subscribe to the team mailing list [24] if you want to
get involved!
- [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+ [23]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [24]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}
version 33
Author: lunar
Date: 2014-04-29T10:36:59+00:00
credits
--- version 32
+++ version 33
@@ -165,8 +165,8 @@
| Stockholm, Sweden
| http://www.stockholminternetforum.se/
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, harmony,
+Matt Pagan, and qbi.
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list