[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Wed Feb 5 11:00:05 UTC 2014
===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/5 ====
===========================================================================
version 56
Author: sand339
Date: 2014-02-05T10:22:44+00:00
reviewed. minor language edits made
--- version 55
+++ version 56
@@ -61,12 +61,12 @@
an attacker.
With the on-going effort to create a new protocol for hidden
-services [3], now seemed a good time for George Kadianakis to raise this
-issue [4]. Previously there was little control for the hidden services
+services [3], now seems to be a good time for George Kadianakis to raise
+this issue [4]. In the past there was little control for the hidden services
operators over their secret key. The new design enables offline
management operations which include key revocation.
-As George put it, currently well-known solutions “are always messy and
+As George puts it, currently well-known solutions “are always messy and
don't work really well (look at SSL's OCSP [5] and CRLs [6]).” So how can
“the legitimate Hidden Service can inform a client that its keys got
compromised”?
@@ -99,7 +99,7 @@
parties over Tor. Matt and Colin have worked on a documentation on how
to setup both the client and the server side [9] for Tor users.
-But the client is currently only safely usable on Linux system with
+But the client is currently safely usable only on Linux system with
torsocks and on Tails. On other operating systems, the Mumble client
will unfortunately leak the address of the server to the local DNS
resolver [10].
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list