[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Sat Mar 1 16:40:11 UTC 2014


===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/9 ====
===========================================================================

version 33
Author: harmony
Date:   2014-03-01T16:02:38+00:00

   promote the tails thing and combine it with the other one

--- version 32
+++ version 33
@@ -48,11 +48,38 @@
 heard from before reading their application.”
 
 If you are hoping to contribute to Tor as part of the Summer of Code
-program, please have a look through Damian’s advice and then, as he says,
-“come to the list or IRC channel and talk to us!”
+program, please have a look through Damian’s advice and then, as he
+says, “come to the list or IRC channel and talk to us!”
 
  [XXX]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
  [XXX]: https://blog.torproject.org/blog/tor-google-summer-code-2014
+
+Two ways to help with Tails development
+---------------------------------------
+
+One of the most interesting upcoming additions to the Tails operating
+system is the ability to thwart attempts at tracking the movements
+of network-enabled devices by spoofing the MAC address on each boot.
+As part of the testing process for this new feature, the Tails
+developers have released [XXX] an experimental disk image which
+turns it on by default, alongside a step-by-step guide to trying it
+out and reporting any issues encountered. However, as the developers
+note, “this is a test image. Do not use it for anything other than
+testing this feature.” If you are willing to take note of this caveat,
+please feel free to download the test image and let the community
+know what you find.
+
+Turning to the longer-term development of the project, the team also
+published [XXX] a detailed set of guidelines for anyone who wants to
+help improve Tails itself by contributing to the development of Debian,
+the operating system on which Tails is based. They include advice on the
+relationship between the two distributions, tasks in need of attention,
+and channels for discussing issues with the Tails community; if you are
+keen on the idea of helping two free-software projects at one stroke,
+please have a look!
+
+ [XXX]: https://tails.boum.org/news/spoof-mac/
+ [XXX]: https://tails.boum.org/contribute/how/debian/
 
 Monthly status reports for February 2014
 ----------------------------------------
@@ -114,16 +141,6 @@
 
  [XXX]: https://mailman.stanford.edu/pipermail/liberationtech/2014-February/013041.html
  [XXX]: https://xmpp.net/reports.php#onions
-
-The Tails developers published [XXX] a detailed set of guidelines for
-anyone who wants to help improve Tails itself by contributing to the
-development of Debian, the operating system on which Tails is based.
-They include advice on the relationship between the two distributions,
-tasks in need of attention, and channels for discussing issues with the
-Tails community; if you are keen on the idea of helping two
-free-software projects at one stroke, please have a look!
-
- [XXX]: https://tails.boum.org/contribute/how/debian/
 
 Tor help desk roundup
 ---------------------
@@ -175,7 +192,6 @@
  * Why Johnny Can't Blow the Whistle https://lists.torproject.org/pipermail/tor-talk/2014-February/032205.html
  * onion-everywhere? https://lists.torproject.org/pipermail/tor-talk/2014-February/032220.html
  * obfsclient release candidate https://lists.torproject.org/pipermail/tor-dev/2014-February/006325.html
- * Tails Call for testing: MAC address spoofing https://tails.boum.org/news/spoof-mac/
  * fingerprinting through default charset #10703
  * change in milestone conventions https://lists.torproject.org/pipermail/tor-dev/2014-February/006341.html
  * tor2web proposal https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html

version 32
Author: harmony
Date:   2014-03-01T15:35:03+00:00

   add tails/debian item to misc

--- version 31
+++ version 32
@@ -115,6 +115,16 @@
  [XXX]: https://mailman.stanford.edu/pipermail/liberationtech/2014-February/013041.html
  [XXX]: https://xmpp.net/reports.php#onions
 
+The Tails developers published [XXX] a detailed set of guidelines for
+anyone who wants to help improve Tails itself by contributing to the
+development of Debian, the operating system on which Tails is based.
+They include advice on the relationship between the two distributions,
+tasks in need of attention, and channels for discussing issues with the
+Tails community; if you are keen on the idea of helping two
+free-software projects at one stroke, please have a look!
+
+ [XXX]: https://tails.boum.org/contribute/how/debian/
+
 Tor help desk roundup
 ---------------------
 
@@ -171,5 +181,4 @@
  * tor2web proposal https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html
  * Disk image instead of zip file for TBB on OS X: #4261 https://people.torproject.org/~mikeperry/images/TBBDMG.png
  * Whonix 8 https://lists.torproject.org/pipermail/tor-talk/2014-February/032227.html (should be misc: I have yet still to see an analysis by an outsider -- Lunar)
- * Progress on a new bridge mode in Tails using Tor Launcher https://mailman.boum.org/pipermail/tails-dev/2014-February/005023.html
- * Improving Tails... by working on Debian https://mailman.boum.org/pipermail/tails-dev/2014-February/005054.html+ * Progress on a new bridge mode in Tails using Tor Launcher https://mailman.boum.org/pipermail/tails-dev/2014-February/005023.html
version 31
Author: harmony
Date:   2014-03-01T15:00:22+00:00

   do more writing

--- version 30
+++ version 31
@@ -12,14 +12,47 @@
 Welcome to the ninth issue of Tor Weekly News in 2014, the weekly
 newsletter that covers what is happening in the XXX Tor community.
 
-New Release of XXX
-------------------
+Tor 0.2.4.21 is out
+-------------------
 
-XXX: cite specific release date, numbers, and developers responsible
+Roger Dingledine announced [XXX] the release of Tor 0.2.4.21, whose
+major new feature is the forced inclusion of at least one NTor-capable
+relay in any given three-hop circuit as a defence against adversaries
+who might be able to break 1024-bit encryption; this feature was first
+seen in the latest alpha release (0.2.5.2-alpha) three weeks ago [XXX],
+but is here incorporated into the current stable series.
 
-XXX: details about release
+You can find full details of this release’s other features and bugfixes
+in Roger’s announcement.
 
- [XXX]:
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032242.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032150.html
+
+Tor in Google Summer of Code 2014
+---------------------------------
+
+As has been the case over the past several years, Tor will once again
+be participating [XXX] in Google’s annual Summer of Code program —
+aspiring software developers have the chance to work on a Tor-related
+project with financial assistance from Google and expert guidance from a
+core Tor Project member. Several prospective students have already
+contacted the community with questions about the program, and Damian
+Johnson took to the Tor Blog [XXX] to give a brief summary of what
+students can expect from the Summer of Code, and what the Tor Project
+expects from its students.
+
+In particular, Damian encouraged potential applicants to discuss their
+ideas with the community on the tor-dev mailing list or IRC channel
+before submitting an application: “Communication is essential to success
+in the summer of code, and we’re unlikely to accept students we haven’t
+heard from before reading their application.”
+
+If you are hoping to contribute to Tor as part of the Summer of Code
+program, please have a look through Damian’s advice and then, as he says,
+“come to the list or IRC channel and talk to us!”
+
+ [XXX]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
+ [XXX]: https://blog.torproject.org/blog/tor-google-summer-code-2014
 
 Monthly status reports for February 2014
 ----------------------------------------
@@ -133,12 +166,10 @@
  * onion-everywhere? https://lists.torproject.org/pipermail/tor-talk/2014-February/032220.html
  * obfsclient release candidate https://lists.torproject.org/pipermail/tor-dev/2014-February/006325.html
  * Tails Call for testing: MAC address spoofing https://tails.boum.org/news/spoof-mac/
- * GSoC 2014 https://blog.torproject.org/blog/tor-google-summer-code-2014
  * fingerprinting through default charset #10703
  * change in milestone conventions https://lists.torproject.org/pipermail/tor-dev/2014-February/006341.html
  * tor2web proposal https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html
  * Disk image instead of zip file for TBB on OS X: #4261 https://people.torproject.org/~mikeperry/images/TBBDMG.png
- * Tor 0.2.4.21 https://lists.torproject.org/pipermail/tor-talk/2014-March/032242.html
  * Whonix 8 https://lists.torproject.org/pipermail/tor-talk/2014-February/032227.html (should be misc: I have yet still to see an analysis by an outsider -- Lunar)
  * Progress on a new bridge mode in Tails using Tor Launcher https://mailman.boum.org/pipermail/tails-dev/2014-February/005023.html
  * Improving Tails... by working on Debian https://mailman.boum.org/pipermail/tails-dev/2014-February/005054.html


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list