[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Jun 17 16:40:04 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/24 ===
===========================================================================
version 36
Author: harmony
Date: 2014-06-17T15:58:04+00:00
language fixes
--- version 35
+++ version 36
@@ -31,14 +31,14 @@
Collecting statistics from Tor exits in a privacy-sensitive manner
------------------------------------------------------------------
-Optimizing the Tor network to better support the most common use cases
-could make a real difference in its perceived usability. Unfortunately,
-Tor is an anonymity network. Understanding what are the most common use
-cases in a way that does not endanger its users is far from being a
+Optimizing the Tor network to better support the most common use-cases
+could make a real difference to its perceived usability. Unfortunately,
+Tor is an anonymity network. Understanding what the most common use-cases
+are, in a way that does not endanger its users, is far from being a
trivial problem.
-There has been some cases of inconsiderate spying of Tor network users
-in the past [XXX]. This is one of the motivation for the Tor Project to
+There has been some cases of inconsiderate spying on Tor network users
+in the past [XXX]. This is one of the motivations for the Tor Project to
provide and research properly anonymized statistics through the
Metrics [XXX] and CollecTor [XXX] portals.
@@ -61,33 +61,33 @@
variety of compulsion attacks and compromises. Finally, the granularity
of the statistics is reduced […] to foil correlation attacks.”
-PrivEx threat model is described in section 3 and matches the current
+PrivEx’s threat model is described in section 3, and matches the current
mode of operation of the Tor network, relying on a set of mostly honest
-collectors while being able to cope with a limited amount of malicious
+collectors while being able to cope with a limited number of malicious
nodes. Two variants are described: one “is secure in the
honest-but-curious setting but can be disrupted by a misbehaving actor”
while “the other is secure in the covert adversary setting in that
-misbehaving servers can be identified” but more computationally
+misbehaving servers can be identified”, but is more computationally
expensive.
Tariq mentions that implementations of the two variants of PrivEx
described in the tech report have been created and should soon be
released to the community. The researchers expect to “start by rolling
out our own PrivEx-enabled exits in the Tor network and begin collecting
-destination visit statistics” around the “June-August timeframe”. The
-section 6 contains an analysis of the overhead in both CPU and bandwidth
-of the two PrivEx variants and the requirements seem reasonable.
-
-Given how privacy matters to the Tor community and all network users,
+destination visit statistics” around the “June-August timeframe”. Section
+6 contains an analysis of the overhead in both CPU and bandwidth of the
+two PrivEx variants, and the requirements seem reasonable.
+
+Given how much privacy matters to the Tor community and to all network users,
the researchers wants “a measure of confidence that collecting data with
PrivEx is inherently good and is being done in a responsible and
intelligent manner”. They are therefore asking the “community at large”
-to review the design of the proposal and its implementation once
+to review the design of the proposal, and its implementation once
released.
-If no fundamental flaws is discovered in the process, the Tor community
-might finally be able to enjoy better network statistics in a mid-term
-future.
+If no fundamental flaws are discovered in the process, the Tor community
+might finally be able to enjoy better network statistics in the
+not-too-distant future.
[XXX]: http://www.ifca.ai/pub/fc11/wecsr11/soghoian.pdf
[XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006999.html
@@ -102,7 +102,7 @@
In a new blog post [XXX], George Kadianakis reported on some recent
pluggable transports [XXX] developments. Some — like the release of
Tor Browser 3.6 [XXX], the deprecation of obfs2 [XXX], the new meek
-transport [XXX], or the recently-written “Childs Garden Of Pluggable
+transport [XXX], or the recently-written “Child’s Garden Of Pluggable
Transports” guide [XXX] should already be known to regular readers of
Tor Weekly News.
@@ -141,7 +141,7 @@
meejah announced [XXX] a new release of txtorcon — a Twisted-based
asynchronous Tor control protocol implementation. Version 0.10.0 adds
-support for Twisted's endpoint strings. meejah explains: “this means that
+support for Twisted’s endpoint strings. meejah explains: “this means that
ANY Twisted program that uses endpoints can accept ‘onion:’ strings to
bring up a hidden services easily […]. Typically, no code changes to
the application should be needed […].”
@@ -205,7 +205,7 @@
[XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033250.html
-Chris Double outlined [XXX] a detailed but experimental method for using
+Chris Double described [XXX] a detailed but experimental method for using
Tor with Firefox OS, the mobile operating system from Mozilla. “This
is just a proof of concept. Don’t depend on this […] Ideally Tor would be
integrated with Firefox OS so that you can start and stop it as a service
@@ -230,23 +230,23 @@
News from Tor StackExchange
---------------------------
-bk201 found some randomly looking domain names in the logs of some
+bk201 found some random-looking domain names in the logs of some
network software. These connection attempts disappeared when Tor was
-closed [XXX]. So bk201 wants to know what they are. Lunar explained
-that they are requests for non-existant domain names. Tor wants to
+closed [XXX], so bk201 wants to know what they are. Lunar explained
+that they are requests for non-existent domain names. Tor wants to
find out if some DNS servers send fake answers. This feature was
added in 2007 [XXX].
[XXX]: https://tor.stackexchange.com/q/3324/88
[XXX]: https://gitweb.torproject.org/tor.git/blob/HEAD:/ReleaseNotes#l6663
-user1747 often visits web sites which provide their services within the
-visible web and as hidden service. DuckDuckGo might serve as an example.
+user1747 often visits web sites which provide their services both within the
+visible web and as a hidden service (DuckDuckGo might serve as an example).
Does the Tor Browser Bundle (TBB) automatically switch to a hidden service
in this case [XXX]? mirimir explained that there is no connection between
-DNS and the names of hidden services. So TBB doesn't not know about this
-hidden service and can't connect automatically. user2949 pointed to a
-plugin [XXX] similar to HTTPS Everywhere. This plugin forwards a request to
+DNS and the names of hidden services, so TBB doesn’t know about this
+hidden service and can’t connect automatically. user2949 pointed to a
+plugin [XXX], similar to HTTPS Everywhere, that forwards a request to
a hidden service if it is available.
[XXX]: https://tor.stackexchange.com/q/3262/88
@@ -283,6 +283,4 @@
[XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
+}}}
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list