[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed Feb 5 11:00:05 UTC 2014


===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/5 ====
===========================================================================

version 56
Author: sand339
Date:   2014-02-05T10:22:44+00:00

   reviewed. minor language edits made

--- version 55
+++ version 56
@@ -61,12 +61,12 @@
 an attacker.
 
 With the on-going effort to create a new protocol for hidden
-services [3], now seemed a good time for George Kadianakis to raise this
-issue [4]. Previously there was little control for the hidden services
+services [3], now seems to be a good time for George Kadianakis to raise 
+this issue [4]. In the past there was little control for the hidden services
 operators over their secret key. The new design enables offline
 management operations which include key revocation.
 
-As George put it, currently well-known solutions “are always messy and
+As George puts it, currently well-known solutions “are always messy and
 don't work really well (look at SSL's OCSP [5] and CRLs [6]).” So how can
 “the legitimate Hidden Service can inform a client that its keys got
 compromised”?
@@ -99,7 +99,7 @@
 parties over Tor. Matt and Colin have worked on a documentation on how
 to setup both the client and the server side [9] for Tor users.
 
-But the client is currently only safely usable on Linux system with
+But the client is currently safely usable only on Linux system with
 torsocks and on Tails. On other operating systems, the Mumble client
 will unfortunately leak the address of the server to the local DNS
 resolver [10].



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list