[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Jan 14 15:20:10 UTC 2014
===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/2 ====
===========================================================================
version 59
Author: lunar
Date: 2014-01-14T14:39:00+00:00
it's 2014 now!
--- version 58
+++ version 59
@@ -2,7 +2,7 @@
'''Editor:''' Lunar
-'''Status:''' FROZEN! Only language and technical fixes allowed. New topics should go to [wiki:TorWeeklyNews/2014/3 next week's edition]. Expected publication time 2013-01-15 12:00 UTC.
+'''Status:''' FROZEN! Only language and technical fixes allowed. New topics should go to [wiki:TorWeeklyNews/2014/3 next week's edition]. Expected publication time 2014-01-15 12:00 UTC.
'''Subject:''' Tor Weekly News — January 15th, 2014
version 58
Author: lunar
Date: 2014-01-14T14:38:13+00:00
FREEZE
--- version 57
+++ version 58
@@ -1,6 +1,8 @@
''28th issue of Tor Weekly News. Covering what's happening from January 7th, 2014 to January 14th, 2014. To be released on January 15th, 2014.''
'''Editor:''' Lunar
+
+'''Status:''' FROZEN! Only language and technical fixes allowed. New topics should go to [wiki:TorWeeklyNews/2014/3 next week's edition]. Expected publication time 2013-01-15 12:00 UTC.
'''Subject:''' Tor Weekly News — January 15th, 2014
version 57
Author: lunar
Date: 2014-01-14T14:36:50+00:00
credits
--- version 56
+++ version 57
@@ -224,8 +224,9 @@
| http://today.gmu.edu/64330/
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, Matt Pagan,
+dope457, Sandeep, Karsten Loesing, Nicolas Vigier and
+the Tails developers.
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
version 56
Author: lunar
Date: 2014-01-14T14:33:00+00:00
number + word wrap
--- version 55
+++ version 56
@@ -15,56 +15,57 @@
Orbot 13 is out
---------------
-Orbot [XXX] — the Guardian Project's port of Tor on Android platforms —
-has received a major update [XXX]. Version 13 includes “all the latest
-bling across the board” meaning Tor 0.2.4.20 and updated versions
-of OpenSSL and XTables. Nathan also mentions “some important fixes to
-the Orbot service, to ensure it remains running in the background,
-and the active notification keeps working, as well. Finally,
-we've changed the way the native binaries are installed, making
-it more reliable and clean across devices.”
-
-After the initial release candidates, 13.0.1 [XXX], 13.0.2 and then
-13.0.3 were quickly made available to fix various reported issues.
-
-The new release is available from the Guardian Project's website [XXX],
+Orbot [1] — the Guardian Project's port of Tor on Android platforms —
+has received a major update [2]. Version 13 includes “all the latest
+bling across the board” meaning Tor 0.2.4.20 and updated versions of
+OpenSSL and XTables. Nathan also mentions “some important fixes to the
+Orbot service, to ensure it remains running in the background, and the
+active notification keeps working, as well. Finally, we've changed the
+way the native binaries are installed, making it more reliable and clean
+across devices.”
+
+After the initial release candidates, 13.0.1 [3], 13.0.2 and then 13.0.3
+were quickly made available to fix various reported issues.
+
+The new release is available from the Guardian Project's website [4],
F-Droid repository or Google Play.
- [XXX] https://guardianproject.info/apps/orbot/
- [XXX] https://lists.mayfirst.org/pipermail/guardian-dev/2014-January/002973.html
- [XXX] https://lists.mayfirst.org/pipermail/guardian-dev/2014-January/003016.html
- [XXX] https://guardianproject.info/releases/
+ [1] https://guardianproject.info/apps/orbot/
+ [2] https://lists.mayfirst.org/pipermail/guardian-dev/2014-January/002973.html
+ [3] https://lists.mayfirst.org/pipermail/guardian-dev/2014-January/003016.html
+ [4] https://guardianproject.info/releases/
Who are the Tor Project's website visitors?
-------------------------------------------
-Last week's call for help about Tor Project's website [XXX] has seen a
-pretty impressive response. Discussions then quickly sparkled on the newly
-created mailing list [XXX].
-
-As one of the first concrete outcome, Rey Dhuny contributed an initial set of
-“personas”, later improved by Max Jakob Maass, Silviu Riley with suggestions
-from others. Quoting Wikipedia [XXX]: “personas are fictional characters
-created to represent the different user types within a targeted demographic,
-attitude and/or behavior set that might use a site, brand or product in a
-similar way.”
-
-One can look up at the wiki page [XXX] to know more about the seven different
-users of the Tor website that have been currently identified: The Student,
-The Journalist, The Researcher, The Donor, The Engineer, The Activist, The
-Dissident. These personas should probably further refined, but are already a
-very useful tool to think about how to structure a new website.
-
-For anyone interested in following the effort, Andrew Lewman has spent time
-triaging all website related tickets [XXX] and setting up a new milestone [XXX]
-to keep tabs on tasks and issues.
-
- [XXX] https://blog.torproject.org/blog/tor-website-needs-your-help
- [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team
- [XXX] https://en.wikipedia.org/wiki/Persona_%28user_experience%29
- [XXX] https://trac.torproject.org/projects/tor/wiki/Website#Personas
- [XXX] https://trac.torproject.org/projects/tor/report/45
- [XXX] https://trac.torproject.org/projects/tor/milestone/Tor%20Website%203.0
+Last week's call for help about Tor Project's website [5] has seen a
+pretty impressive response. Discussions then quickly sparkled on the
+newly created mailing list [6].
+
+As one of the first concrete outcome, Rey Dhuny contributed an initial
+set of “personas”, later improved by Max Jakob Maass, Silviu Riley with
+suggestions from others. Quoting Wikipedia [7]: “personas are fictional
+characters created to represent the different user types within a
+targeted demographic, attitude and/or behavior set that might use a
+site, brand or product in a similar way.”
+
+One can look up at the wiki page [8] to know more about the seven
+different users of the Tor website that have been currently identified:
+The Student, The Journalist, The Researcher, The Donor, The Engineer,
+The Activist, The Dissident. These personas should probably further
+refined, but are already a very useful tool to think about how to
+structure a new website.
+
+For anyone interested in following the effort, Andrew Lewman has spent
+time triaging all website related tickets [9] and setting up a new
+milestone [10] to keep tabs on tasks and issues.
+
+ [5] https://blog.torproject.org/blog/tor-website-needs-your-help
+ [6] https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team
+ [7] https://en.wikipedia.org/wiki/Persona_%28user_experience%29
+ [8] https://trac.torproject.org/projects/tor/wiki/Website#Personas
+ [9] https://trac.torproject.org/projects/tor/report/45
+ [10] https://trac.torproject.org/projects/tor/milestone/Tor%20Website%203.0
Let's save Tor Weather!
-----------------------
@@ -76,135 +77,140 @@
Tor Weather is one of these small services run by the Tor Project that is meant
to make the life of relay operators easier. It can warn them when their
relay is down or when a new version of tor is available… and when they can
-receive the rewarding t-shirt [XXX]. Unfortunately, Tor Weather has been
-unmaintained for quite a while, and issues have accumulated [XXX] over time.
-
-Karsten Loesing has sent a call for help with suggestions on how the code
+receive the rewarding t-shirt [11]. Unfortunately, Tor Weather has been
+unmaintained for quite a while, and issues have accumulated [12] over time.
+
+Karsten Loesing has sent a call for help [13] with suggestions on how the code
can be simplified and improved. Abhiram Chintangal and Norbert Kurz have
already stated their interests. Coordination is done through the tor-dev
-mailing list [XXX] and a design wiki page [XXX]. Join them if you are up to
+mailing list [14] and a design wiki page [15]. Join them if you are up to
some Python hacking or spiffing up the web interface!
- [XXX] https://www.torproject.org/getinvolved/tshirt.html
- [XXX] https://trac.torproject.org/projects/tor/query?component=Tor+Weather&order=status
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2014-January/006039.html
- [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
- [XXX] https://trac.torproject.org/projects/tor/wiki/doc/weather-in-2014
+ [11] https://www.torproject.org/getinvolved/tshirt.html
+ [12] https://trac.torproject.org/projects/tor/query?component=Tor+Weather&order=status
+ [13] https://lists.torproject.org/pipermail/tor-dev/2014-January/006039.html
+ [14] https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
+ [15] https://trac.torproject.org/projects/tor/wiki/doc/weather-in-2014
More monthly status reports for December 2013
---------------------------------------------
The wave of regular monthly reports from Tor project members for the
month of December 2013 continued this week as well with the extended
-report form the Tails team [XXX] followed by reports from George
-Kadianakis [XXX], Kevin P Dyer [XXX], and Andrew Lewman [XXX].
-
- [XXX] https://tails.boum.org/news/report_2013_12/
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2014-January/000427.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2014-January/000428.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2014-January/000430.html
+report form the Tails team [16] followed by reports from George
+Kadianakis [17], Kevin P Dyer [18], and Andrew Lewman [19].
+
+ [16] https://tails.boum.org/news/report_2013_12/
+ [17] https://lists.torproject.org/pipermail/tor-reports/2014-January/000427.html
+ [18] https://lists.torproject.org/pipermail/tor-reports/2014-January/000428.html
+ [19] https://lists.torproject.org/pipermail/tor-reports/2014-January/000430.html
Miscellaneous news
------------------
-The Tails team has put out a call for testing the first release candidate for
-Tails 0.22.1 [XXX]. The new version will bring several bugfixes, an updated
-kernel, and many improvements to the upgrader application.
-
- [XXX] https://tails.boum.org/news/test_0.22.1-rc1/
-
-Directory authorities are in the process of upgrading their directory signing key
-to RSA 2048. This has been done for five out of nine authorities [XXX]. The
-changes might result in some temporary error messages in logs of Tor relays, as it
-did [XXX] when “gabelmoo” changed its key on January 11th.
-
- [XXX] https://bugs.torproject.org/10324
- [XXX] https://people.torproject.org/~linus/sign2048.html
- [XXX] https://atlas.torproject.org/#details/7EA6EAD6FD83083C538F44038BBFA077587DD755
- [XXX] https://lists.torproject.org/pipermail/tor-relays/2014-January/003592.html
-
-Nicolas Vigier has sent a proposal [XXX] about replacing the current Gitian-based
-build system for the Tor Browser Bundle by a system based on burps [XXX]. Nicolas
-also worked on a prototype [XXX] to go with his proposal.
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2014-January/006047.html
- [XXX] http://burps.boklm.eu/
- [XXX] https://github.com/boklm/burps-tor
-
-Nick Mathewson mentioned [XXX] that the “Sniper Attack” paper [XXX] by Rob
-Jansen, Florian Tschorsch, Aaron Johnson, and Björn Scheuermann was now available.
-This paper describes serious Denial of Service attacks through memory exhaustion.
-The issue is fixed “thanks to advice from the paper's authors, in Tor 0.2.4.x
-and later”.
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2014-January/006038.html
- [XXX] http://www-users.cs.umn.edu/~jansen/papers/sniper-ndss2014.pdf
-
-In order to prevent attacks [XXX] on hidden services based on predicting which directory
-will be used, directory authorities need to periodicly produce shared
-unpredictable random strings. To address the issue, Nicholas Hopper has sent “a
-threshold signature-based proposal for a shared RNG” [XXX], now up for reviews.
-
- [XXX] https://bugs.torproject.org/8244
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2014-January/006053.html
-
-The next session of low-hanging fruits for Tails will happen [XXX] on February 8th
-in the #tails IRC channel OFTC at 10:00 CET.
-
- [XXX] https://tails.boum.org/contribute/meetings/201401/
-
-Thanks to stalkr.net [XXX], Maki Hoshisawa [XXX] and cYbergueRrilLa AnonyMous
-NeXus [XXX] for running new mirrors of the Tor Project website.
-
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000439.html
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000442.html
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000443.html
-
-Jaromil announced [XXX] the release of Dowse, “a transparent proxy setup
-supporting Tor”. One feature is that it detects “all URLs whose domain ends in
-.onion, routing them directly to Tor, effectively making the onion network
-accessible without any plugin or software installed.” The transport proxy
-approach has known issues [XXX] but can still be of interest to some users. Jaromil
-is seeking feedback and opinions from the community.
-
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2014-January/031632.html
- [XXX] http://dyne.org/software/dowse
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-July/028833.html
-
-Microsoft's Geoff McDonald wrote a blog post [XXX] describing how they have
-helped remove half of the estimated four millions of Tor clients [XXX]
-installed by the Sefnit botnet without the computer's owner knowledge.
-
- [XXX] https://blogs.technet.com/b/mmpc/archive/2014/01/09/tackling-the-sefnit-botnet-tor-hazard.aspx
- [XXX] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
-
-Koumbit has been working on Torride [XXX], a live distribution to run Tor
-relays — not unlike Tor-ramdisk [XXX] — but based on Debian. Version 1.1.0
-has been released [XXX] on January 10th.
-
- [XXX] https://redmine.koumbit.net/projects/torride
- [XXX] http://opensource.dyc.edu/tor-ramdisk/
- [XXX] https://redmine.koumbit.net/news/17
+The Tails team has put out a call for testing the first release
+candidate for Tails 0.22.1 [20]. The new version will bring several
+bugfixes, an updated kernel, and many improvements to the upgrader
+application.
+
+ [20] https://tails.boum.org/news/test_0.22.1-rc1/
+
+Directory authorities are in the process [21] of upgrading their
+directory signing key to RSA 2048. This has been done for five out of
+nine authorities [22]. The changes might result in some temporary error
+messages in logs of Tor relays, as it did [23] when “gabelmoo” [24]
+changed its key on January 11th.
+
+ [21] https://bugs.torproject.org/10324
+ [22] https://people.torproject.org/~linus/sign2048.html
+ [23] https://lists.torproject.org/pipermail/tor-relays/2014-January/003592.html
+ [24] https://atlas.torproject.org/#details/7EA6EAD6FD83083C538F44038BBFA077587DD755
+
+Nicolas Vigier has sent a proposal [25] about replacing the current
+Gitian-based build system for the Tor Browser Bundle by a system based
+on burps [26]. Nicolas also worked on a prototype [27] to go with his
+proposal.
+
+ [25] https://lists.torproject.org/pipermail/tor-dev/2014-January/006047.html
+ [26] http://burps.boklm.eu/
+ [27] https://github.com/boklm/burps-tor
+
+Nick Mathewson mentioned [28] that the “Sniper Attack” paper [29] by Rob
+Jansen, Florian Tschorsch, Aaron Johnson, and Björn Scheuermann was now
+available. This paper describes serious Denial of Service attacks
+through memory exhaustion. The issue is fixed “thanks to advice from
+the paper's authors, in Tor 0.2.4.x and later”.
+
+ [28] https://lists.torproject.org/pipermail/tor-dev/2014-January/006038.html
+ [29] http://www-users.cs.umn.edu/~jansen/papers/sniper-ndss2014.pdf
+
+In order to prevent attacks [30] on hidden services based on predicting
+which directory will be used, directory authorities need to periodicly
+produce shared unpredictable random strings. To address the issue,
+Nicholas Hopper has sent “a threshold signature-based proposal for a
+shared RNG” [31], now up for reviews.
+
+ [30] https://bugs.torproject.org/8244
+ [31] https://lists.torproject.org/pipermail/tor-dev/2014-January/006053.html
+
+The next session of low-hanging fruits for Tails will happen [32] on
+February 8th in the #tails IRC channel OFTC at 10:00 CET.
+
+ [32] https://tails.boum.org/contribute/meetings/201401/
+
+Thanks to stalkr.net [33], Maki Hoshisawa [34] and cYbergueRrilLa
+AnonyMous NeXus [35] for running new mirrors of the Tor Project website.
+
+ [33] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000439.html
+ [34] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000442.html
+ [35] https://lists.torproject.org/pipermail/tor-mirrors/2014-January/000443.html
+
+Jaromil announced [36] the release of Dowse [37], “a transparent proxy
+setup supporting Tor”. One feature is that it detects “all URLs whose
+domain ends in .onion, routing them directly to Tor, effectively making
+the onion network accessible without any plugin or software installed.”
+The transport proxy approach has known issues [38] but can still be of
+interest to some users. Jaromil is seeking feedback and opinions from
+the community.
+
+ [36] https://lists.torproject.org/pipermail/tor-talk/2014-January/031632.html
+ [37] http://dyne.org/software/dowse
+ [38] https://lists.torproject.org/pipermail/tor-talk/2013-July/028833.html
+
+Microsoft's Geoff McDonald wrote a blog post [39] describing how they
+have helped remove half of the estimated four millions of Tor
+clients [40] installed by the Sefnit botnet without the computer's owner
+knowledge.
+
+ [39] https://blogs.technet.com/b/mmpc/archive/2014/01/09/tackling-the-sefnit-botnet-tor-hazard.aspx
+ [40] https://blog.torproject.org/blog/how-to-handle-millions-new-tor-clients
+
+Koumbit has been working on Torride [41], a live distribution to run Tor
+relays — not unlike Tor-ramdisk [42] — but based on Debian. Version
+1.1.0 has been released [43] on January 10th.
+
+ [41] https://redmine.koumbit.net/projects/torride
+ [42] http://opensource.dyc.edu/tor-ramdisk/
+ [43] https://redmine.koumbit.net/news/17
Tor help desk roundup
---------------------
-Many users have been emailing for clarification on the Tor
-Browser's interface. The first time Tor Browser is started,
-users are asked if their network is free of obstacles. Many
-users do not if their network is free of obstacles or not.
-A network is free of obstacles if does not censor
-connections to the Tor network. Ticket #10610 [XXX] has been opened to
-discuss possible improvements.
-
-A number of users have reported problems using the Tor Browser in
-Backtrack Linux. Backtrack is unusual among Linux distributions in
-that the user can only log in as root; there are no other user
-accounts. The Tor Browser cannot be run as root. One solution for
-Backtrack users is to create a new account with the `useradd` command
-and then run the Tor Browser as that user with the `sudo` command.
-
- [XXX] https://bugs.torproject.org/10610
+Many users have been emailing for clarification on the Tor Browser's
+interface. The first time Tor Browser is started, users are asked if
+their network is free of obstacles. Many users do not if their network
+is free of obstacles or not. A network is free of obstacles if does not
+censor connections to the Tor network. Ticket #10610 [44] has been
+opened to discuss possible improvements.
+
+A number of users have reported problems using the Tor Browser in
+Backtrack Linux. Backtrack is unusual among Linux distributions in that
+the user can only log in as root; there are no other user accounts. The
+Tor Browser cannot be run as root. One solution for Backtrack users is
+to create a new account with the `useradd` command and then run the Tor
+Browser as that user with the `sudo` command.
+
+ [44] https://bugs.torproject.org/10610
Upcoming events
---------------
@@ -223,10 +229,10 @@
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [45], write down your
+name and subscribe to the team mailing list [46] if you want to
get involved!
- [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
- [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [45] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [46] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
}}}
version 55
Author: lunar
Date: 2014-01-14T14:21:09+00:00
cleanup uncovered items and move to next week the rest
--- version 54
+++ version 55
@@ -229,12 +229,4 @@
[XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-Possible items:
-
-* some stats year 2013 for my Tor Network Status site torstatus.blutmagie.de http://torstatus.blutmagie.de/monthlyhistory2013.png http://torstatus.blutmagie.de/countrylist2013.pdf — ''I'm unconvinced this is noteworthy but if someone feels it should be included, just write something up'', Lunar
-* Tor now built into DD-WRT https://lists.torproject.org/pipermail/tor-talk/2014-January/031705.html http://svn.dd-wrt.com/changeset/23229 — ''I'm unable to find documentation, or a ticket, or a significant changeset. So I'll pass. Feel free to have another look.'', Lunar
-
-To mention when TBB 3.5.1 will be officially out:
-
-* Accessibility support fixed, it can properly be used with a Screen Reader https://lists.torproject.org/pipermail/tor-talk/2014-January/031575.html
+}}}
===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/3 ====
===========================================================================
version 2
Author: lunar
Date: 2014-01-14T14:21:04+00:00
report from last week
--- version 1
+++ version 2
@@ -81,4 +81,8 @@
[XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+}}}
+
+To mention when TBB 3.5.1 will be officially out:
+
+* Accessibility support fixed, it can properly be used with a Screen Reader https://lists.torproject.org/pipermail/tor-talk/2014-January/031575.html
version 1
Author: lunar
Date: 2014-01-14T14:20:21+00:00
import template
---
+++ version 1
@@ -0,0 +1,84 @@
+''29th issue of Tor Weekly News. Covering what's happening from January 14th, 2014 to January 21th, 2014. To be released on January 22th, 2014.''
+
+'''Editor:'''
+
+'''Subject:''' Tor Weekly News — January 22th, 2014
+
+{{{
+========================================================================
+Tor Weekly News January 22th, 2014
+========================================================================
+
+Welcome to the third issue in 2014 of Tor Weekly News, the weekly
+newsletter that covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]
+
+Monthly status reports for XXX month 2014
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+ [XXX]
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+
+Tor help desk roundup
+---------------------
+
+Summary of some questions sent to the Tor help desk.
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX] vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+ | Event City, Event Country
+ | Event website URL
+ |
+Jul XX-XX | Event XXX brief description
+ | Event City, Event Country
+ | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+ [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list