[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Mar 4 13:20:14 UTC 2014
===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/9 ====
===========================================================================
version 77
Author: phw
Date: 2014-03-04T12:32:35+00:00
Fix typos.
--- version 76
+++ version 77
@@ -115,10 +115,10 @@
Miscellaneous news
------------------
-Members of the Prosecco research team has released a new attack on the
+Members of the Prosecco research team have released a new attack on the
TLS protocol [21] — dubbed “Triple Handshake” — allowing impersonation
of a given client when client authentication is in use together with
-session resumption and renegociation. Nick Mathewson has published a
+session resumption and renegotiation. Nick Mathewson has published a
detailed analysis on why Tor is not affected [22]. He also outlines
future changes to make Tor resistant to even more potential TLS issues.
@@ -366,7 +366,7 @@
This issue of Tor Weekly News has been assembled by harmony, Lunar, qbi,
-Matt Pagan, Karsten Loesing, Mike Perry and dope457.
+Matt Pagan, Karsten Loesing, Mike Perry, dope457, and Philipp Winter.
Want to continue reading TWN? Please help us create this newsletter.
version 76
Author: lunar
Date: 2014-03-04T12:08:37+00:00
FREEZE!
--- version 75
+++ version 76
@@ -1,6 +1,8 @@
''35th issue of Tor Weekly News. Covering what's happening from February 25th, 2014 to March 4th, 2014. To be released on March 5th, 2014.''
'''Editor:''' Lunar
+
+'''Status:''' FROZEN. New items should go in [wiki:TorWeeklyNews/2014/10 next week's edition]. Expected publication time: 2014-03-05 12:00 UTC.
'''Subject:''' Tor Weekly News — March 5th, 2014
@@ -10,34 +12,34 @@
========================================================================
Welcome to the ninth issue of Tor Weekly News in 2014, the weekly
-newsletter that covers what is happening in the XXX Tor community.
+newsletter that covers what is happening in the Tor community.
Tor 0.2.4.21 is out
-------------------
-Roger Dingledine announced [XXX] the release of Tor 0.2.4.21, whose
+Roger Dingledine announced [1] the release of Tor 0.2.4.21, whose
major new feature is the forced inclusion of at least one NTor-capable
relay in any given three-hop circuit as a defence against adversaries
who might be able to break 1024-bit encryption; this feature was first
-seen in the latest alpha release (0.2.5.2-alpha) three weeks ago [XXX],
+seen in the latest alpha release (0.2.5.2-alpha) three weeks ago [2],
but is here incorporated into the current stable series.
You can find full details of this release’s other features and bugfixes
in Roger’s announcement.
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032242.html
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032150.html
+ [1]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032242.html
+ [2]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032150.html
Tor in Google Summer of Code 2014
---------------------------------
As has been the case over the past several years, Tor will once again
-be participating [XXX] in Google’s annual Summer of Code program —
+be participating [3] in Google’s annual Summer of Code program —
aspiring software developers have the chance to work on a Tor-related
project with financial assistance from Google and expert guidance from a
core Tor Project member. Several prospective students have already
contacted the community with questions about the program, and Damian
-Johnson took to the Tor Blog [XXX] to give a brief summary of what
+Johnson took to the Tor Blog [4] to give a brief summary of what
students can expect from the Summer of Code, and what the Tor Project
expects from its students.
@@ -51,8 +53,8 @@
program, please have a look through Damian’s advice and then, as he
says, “come to the list or IRC channel and talk to us!”
- [XXX]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
- [XXX]: https://blog.torproject.org/blog/tor-google-summer-code-2014
+ [3]: https://www.google-melange.com/gsoc/org2/google/gsoc2014/tor
+ [4]: https://blog.torproject.org/blog/tor-google-summer-code-2014
Two ways to help with Tails development
---------------------------------------
@@ -61,7 +63,7 @@
system is the ability to thwart attempts at tracking the movements
of network-enabled devices by spoofing the MAC address on each boot.
As part of the testing process for this new feature, the Tails
-developers have released [XXX] an experimental disk image which
+developers have released [5] an experimental disk image which
turns it on by default, alongside a step-by-step guide to trying it
out and reporting any issues encountered. However, as the developers
state, “this is a test image. Do not use it for anything other than
@@ -70,7 +72,7 @@
know what you find.
Turning to the longer-term development of the project, the team also
-published [XXX] a detailed set of guidelines for anyone who wants to
+published [6] a detailed set of guidelines for anyone who wants to
help improve Tails itself by contributing to the development of Debian,
the operating system on which Tails is based. They include advice on the
relationship between the two distributions, tasks in need of attention,
@@ -78,201 +80,201 @@
keen on the idea of helping two free-software projects at one stroke,
please have a look!
- [XXX]: https://tails.boum.org/news/spoof-mac/
- [XXX]: https://tails.boum.org/contribute/how/debian/
+ [5]: https://tails.boum.org/news/spoof-mac/
+ [6]: https://tails.boum.org/contribute/how/debian/
Monthly status reports for February 2014
----------------------------------------
The wave of regular monthly reports from Tor project members for the
month of February has begun. Georg Koppen released his report
-first [XXX], followed by reports from Sherief Alaa [XXX], Pearl
-Crescent [XXX], Nick Mathewson [XXX], Colin C. [XXX], Lunar [XXX],
-Kelley Misata [XXX], Damian Johnson [XXX], George Kadianakis [XXX],
-Philipp Winter [XXX], and Karsten Loesing [XXX].
-
-Lunar also reported on behalf of the help desk [XXX], while Mike Perry
-did the same on behalf of the Tor Browser team [XXX], and Arturo Filastò
-for the OONI team [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000464.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000465.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000466.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000467.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000468.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000471.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000472.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000474.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000475.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000476.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000478.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000469.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000473.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000477.html
+first [7], followed by reports from Sherief Alaa [8], Pearl
+Crescent [9], Nick Mathewson [10], Colin C. [11], Lunar [12],
+Kelley Misata [13], Damian Johnson [14], George Kadianakis [15],
+Philipp Winter [16], and Karsten Loesing [17].
+
+Lunar also reported on behalf of the help desk [18], while Mike Perry
+did the same on behalf of the Tor Browser team [19], and Arturo Filastò
+for the OONI team [20].
+
+ [7]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000464.html
+ [8]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000465.html
+ [9]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000466.html
+ [10]: https://lists.torproject.org/pipermail/tor-reports/2014-February/000467.html
+ [11]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000468.html
+ [12]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000471.html
+ [13]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000472.html
+ [14]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000474.html
+ [15]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000475.html
+ [16]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000476.html
+ [17]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000478.html
+ [18]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000469.html
+ [19]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000473.html
+ [20]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000477.html
Miscellaneous news
------------------
Members of the Prosecco research team has released a new attack on the
-TLS protocol [XXX] — dubbed “Triple Handshake” — allowing impersonation
+TLS protocol [21] — dubbed “Triple Handshake” — allowing impersonation
of a given client when client authentication is in use together with
session resumption and renegociation. Nick Mathewson has published a
-detailed analysis on why Tor is not affected [XXX]. He also outlines
+detailed analysis on why Tor is not affected [22]. He also outlines
future changes to make Tor resistant to even more potential TLS issues.
- [XXX]: https://secure-resumption.com/
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006372.html
-
-Mike Perry announced [XXX] the start of a weekly Tor Browser developer’s
+ [21]: https://secure-resumption.com/
+ [22]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006372.html
+
+Mike Perry announced [23] the start of a weekly Tor Browser developer’s
meeting, to be held on #tor-dev on irc.oftc.net. These meetings are
tentatively scheduled for 19:00 UTC on Wednesdays. Details on the format
-and flow of the meetings can be found on the tor-dev and tbb-dev [XXX]
+and flow of the meetings can be found on the tor-dev and tbb-dev [24]
mailing lists.
- [XXX]: https://lists.torproject.org/pipermail/tbb-dev/2014-February/000000.html
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tbb-dev
+ [23]: https://lists.torproject.org/pipermail/tbb-dev/2014-February/000000.html
+ [24]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tbb-dev
Roger Dingledine and Nick Mathewson were among the signatories of an
-open letter [XXX] published by the EFF which offers ten principles for
+open letter [25] published by the EFF which offers ten principles for
technology companies to follow in protecting users from illegal
surveillance.
- [XXX]: https://www.eff.org/deeplinks/2014/02/open-letter-to-tech-companies
-
-Nick Mathewson also detailed [XXX] a change in the way that the core Tor
+ [25]: https://www.eff.org/deeplinks/2014/02/open-letter-to-tech-companies
+
+Nick Mathewson also detailed [26] a change in the way that the core Tor
development team will use the bugtracker’s “milestone” feature to
separate tickets marked for resolution in a given Tor version from those
that can be deferred to a later release.
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006341.html
-
-Nick then sent out [XXX] the latest in his irregular series of
+ [26]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006341.html
+
+Nick then sent out [27] the latest in his irregular series of
Tor proposal status updates, containing summaries of each open proposal,
guidance for reviewers, and notes for further work. If you'd like to
help Tor’s development by working on one of these proposals, start here!
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006342.html
+ [27]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006342.html
On the subject of proposals, two new ones were sent to the tor-dev list
-for review: proposal 228 [XXX], which offers a way for relays to prove
+for review: proposal 228 [28], which offers a way for relays to prove
ownership of their onion keys as well as their identity key, and
-proposal 229 [XXX] based on Yawning Angel’s unnumbered submission from
+proposal 229 [29] based on Yawning Angel’s unnumbered submission from
last week, which concerns improvements to the SOCKS5 protocol for
communication between clients, Tor, and pluggable transports.
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006304.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006340.html
-
-Nicholas Merrill wrote [XXX] to the Liberationtech list to announce that
+ [28]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006304.html
+ [29]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006340.html
+
+Nicholas Merrill wrote [30] to the Liberationtech list to announce that
xmpp.net now lists XMPP servers that are reachable over hidden
-services [XXX], and that xmpp.net’s server scanner works with these as
+services [31], and that xmpp.net’s server scanner works with these as
well.
- [XXX]: https://mailman.stanford.edu/pipermail/liberationtech/2014-February/013041.html
- [XXX]: https://xmpp.net/reports.php#onions
-
-Patrick Schleizer announced [XXX] the release of version 8 of
-Whonix [XXX] — an operating system focused on anonymity, privacy and
+ [30]: https://mailman.stanford.edu/pipermail/liberationtech/2014-February/013041.html
+ [31]: https://xmpp.net/reports.php#onions
+
+Patrick Schleizer announced [32] the release of version 8 of
+Whonix [33] — an operating system focused on anonymity, privacy and
security based on the Tor anonymity network, Debian and security by
isolation. The curious should take a look at the long changelog.
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032227.html
- [XXX]: https://www.whonix.org/
+ [32]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032227.html
+ [33]: https://www.whonix.org/
Kelley Misata wrote up an account of her talk “Journalists — Staying
Safe in a Digital World”, which she delivered at the Computer-Assisted
-Reporting Conference in Baltimore [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000470.html
+Reporting Conference in Baltimore [34].
+
+ [34]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000470.html
Having co-authored a paper in 2012 on usability issues connected with
-the Tor Browser Bundle [XXX], Greg Norcie drew attention [XXX] to a
-follow-up study named “Why Johnny Can’t Blow the Whistle”, [XXX] which
+the Tor Browser Bundle [35], Greg Norcie drew attention [36] to a
+follow-up study named “Why Johnny Can’t Blow the Whistle”, [37] which
focuses on verifying the conclusions of the earlier tests while
exploring a number of other possible usability improvements. The study
was, however, carried out before the release of Tor Browser version 3,
which improved the bundle’s usability based on earlier suggestions.
- [XXX]: http://petsymposium.org/2012/papers/hotpets12-1-usability.pdf
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032205.html
- [XXX]: http://www.norcie.com/papers/torUSEC.pdf
+ [35]: http://petsymposium.org/2012/papers/hotpets12-1-usability.pdf
+ [36]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032205.html
+ [37]: http://www.norcie.com/papers/torUSEC.pdf
Mac OS X users will be thrilled to learn that the next Tor Browser
-Bundle will be shipped as a DMG (disk image) [XXX] instead of the
-previous unusual .ZIP archive [XXX].
-
- [XXX]: https://people.torproject.org/~mikeperry/images/TBBDMG.png
- [XXX]: https://bugs.torproject.org/4261
-
-David Rajchenbach-Teller from Mozilla reached out [XXX] to the Tor
+Bundle will be shipped as a DMG (disk image) [38] instead of the
+previous unusual .ZIP archive [39].
+
+ [38]: https://people.torproject.org/~mikeperry/images/TBBDMG.png
+ [39]: https://bugs.torproject.org/4261
+
+David Rajchenbach-Teller from Mozilla reached out [40] to the Tor
Browser developers about their overhaul of the Firefox Session Restore
mechanism. This is another milestone in the growing collaboration
between the Tor Project and Mozilla.
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032204.html
-
-On the “anonymity is hard” front, David Fifield reported [XXX] a
+ [40]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032204.html
+
+On the “anonymity is hard” front, David Fifield reported [41] a
fingerprinting issue on the Tor Browser. Fallback charsets can be used
to learn the user locale as they vary from one to another. The next
release of the Tor Browser will use “windows-1252” for all locales, as
this matches the impersonated “User-Agent” string (Firefox — English
version — on Windows) that it already sends in its HTTP headers.
- [XXX]: https://bugs.torproject.org/10703
-
-Yawning Angel called for help [XXX] in testing and reviewing
+ [41]: https://bugs.torproject.org/10703
+
+Yawning Angel called for help [42] in testing and reviewing
obfsclient-0.0.1rc2, the second obfsclient release candidate this week:
“assuming nothing is broken, this will most likely become v0.0.1,
though I may end up disabling Session Ticket handshakes.”
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006358.html
-
-David Fifield published [XXX] a guide to patching meek, an HTTP
+ [42]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006358.html
+
+David Fifield published [43] a guide to patching meek, an HTTP
pluggable transport, so that it can be used to send traffic via
-Lantern [XXX], a censorship circumvention system which “acts as an HTTP
+Lantern [44], a censorship circumvention system which “acts as an HTTP
proxy and proxies your traffic through trusted friends.”
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006356.html
- [XXX]: https://www.getlantern.org/
-
-Fortasse started a discussion [XXX] on tor-talk about using HTTPS
+ [43]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006356.html
+ [44]: https://www.getlantern.org/
+
+Fortasse started a discussion [45] on tor-talk about using HTTPS
Everywhere to redirect Tor Browser users to .onion addresses when
available. Several people commented regarding the procedure, its
security, or how it could turn the Tor Project or the EFF into some kind
of registrar.
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032220.html
-
-anonym has been busy [XXX] adapting the configuration interface from the
+ [45]: https://lists.torproject.org/pipermail/tor-talk/2014-February/032220.html
+
+anonym has been busy [46] adapting the configuration interface from the
Tor Browser — called “Tor Launcher” — to Tails’ needs. Preliminary
results can already be seen in the images built from the experimental
-branch [XXX].
-
- [XXX]: https://mailman.boum.org/pipermail/tails-dev/2014-February/005023.html
- [XXX]: http://nightly.tails.boum.org/build_Tails_ISO_experimental/
-
-Ramo wrote [XXX] to announce their Nagios plugin project [XXX] to the
+branch [47].
+
+ [46]: https://mailman.boum.org/pipermail/tails-dev/2014-February/005023.html
+ [47]: http://nightly.tails.boum.org/build_Tails_ISO_experimental/
+
+Ramo wrote [48] to announce their Nagios plugin project [49] to the
relay operator community. Lunar pointed out a complementary probe named
-“check_tor.py” [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004007.html
- [XXX]: https://github.com/goodvikings/tor_nagios/
- [XXX]: http://anonscm.debian.org/gitweb/?p=users/lunar/check_tor.git;a=blob;f=README;hb=HEAD
-
-Virgil Griffith has sent a draft proposal [XXX] for changes to improve
+“check_tor.py” [50].
+
+ [48]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004007.html
+ [49]: https://github.com/goodvikings/tor_nagios/
+ [50]: http://anonscm.debian.org/gitweb/?p=users/lunar/check_tor.git;a=blob;f=README;hb=HEAD
+
+Virgil Griffith has sent a draft proposal [51] for changes to improve
the latency of hidden services when using the “Tor2web” mode. Roger
-Dingledine commented [XXX] that one of the proposed changes actually
+Dingledine commented [52] that one of the proposed changes actually
opened a new research question regarding the actual latency benefits.
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006347.html
-
-David Goulet has released the forth candidate of his Torsocks rewrite [XXX].
+ [51]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html
+ [52]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006347.html
+
+David Goulet has released the forth candidate of his Torsocks rewrite [53].
This new version comes after “a big code review from Nick and help from a lot
of people contributing and testing”. But more reviews and testing are now
welcome!
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006371.html
+ [53]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006371.html
Tor help desk roundup
---------------------
@@ -283,49 +285,49 @@
internet connections, and internet censorship have all been known to cause Tor
failures, it is not always easy to determine the source of the problem.
Thankfully, the Tor Browser team is working on making the logs easier to
-access in case of failures (#10059 [XXX], #10603 [XXX]).
-
- [XXX]: https://trac.torproject.org/projects/tor/ticket/10603
- [XXX]: https://trac.torproject.org/projects/tor/ticket/10059
+access in case of failures (#10059 [54], #10603 [55]).
+
+ [54]: https://trac.torproject.org/projects/tor/ticket/10603
+ [55]: https://trac.torproject.org/projects/tor/ticket/10059
News from Tor StackExchange
---------------------------
Janice needs to be able to connect from an IP address in a specific city
-and wanted to know if Tor can be used to do so [XXX]. Several users
+and wanted to know if Tor can be used to do so [56]. Several users
suggested that this is not possible with Tor. For city-level
IP addresses, it might better to use other services like a proxy or
a tunnel, provided one does not require anonymity.
- [XXX]: https://tor.stackexchange.com/q/1485/88
+ [56]: https://tor.stackexchange.com/q/1485/88
The Tor Browser Bundle sets the default font to Times New Roman 16pt and allows
pages to use their own fonts. User joeb likes to change the settings and wonders
-how this increases the possibility to fingerprint a user [XXX]. gacar suggests
+how this increases the possibility to fingerprint a user [57]. gacar suggests
that this will improve fingerprinting attacks. Several important sites use font
-probing to fingerprint their users [XXX]. Changing the default fonts is
+probing to fingerprint their users [58]. Changing the default fonts is
likely to make a user stand out from the common anonymity set.
- [XXX]: https://tor.stackexchange.com/q/1619/88
- [XXX]: https://www.cosic.esat.kuleuven.be/fpdetective/#results
-
-Kristopher Ives wondered [XXX] if Tor uses some kind of compression. Several users
-searched the source code archives for “gzip” [XXX] and found code which deals
+ [57]: https://tor.stackexchange.com/q/1619/88
+ [58]: https://www.cosic.esat.kuleuven.be/fpdetective/#results
+
+Kristopher Ives wondered [59] if Tor uses some kind of compression. Several users
+searched the source code archives for “gzip” [60] and found code which deals
with directory information. Jens Kubieziel argued that Tor operates on
encrypted data and compressing encrypted data usually results in a increase
in size. So it makes no sense to compress this data.
- [XXX]: https://tor.stackexchange.com/q/1598/88
- [XXX]: https://gitweb.torproject.org/tor.git?a=search&h=HEAD&st=grep&s=gzip
+ [59]: https://tor.stackexchange.com/q/1598/88
+ [60]: https://gitweb.torproject.org/tor.git?a=search&h=HEAD&st=grep&s=gzip
Stackexchange uses bounties to award higher reputations to answers. By using
this one can attract attention and get better answers or an answer at all. The
-question about using DNSSEC and DNScrypt over Tor [XXX] is probably the first
+question about using DNSSEC and DNScrypt over Tor [61] is probably the first
which received a bounty. An answer to this question would be rewarded
with 50 points. However they have not been earned yet. So if you know an
answer, please enlighten the rest of the community.
- [XXX]: https://tor.stackexchange.com/q/1503/88
+ [61]: https://tor.stackexchange.com/q/1503/88
Upcoming events
---------------
@@ -369,13 +371,10 @@
Want to continue reading TWN? Please help us create this newsletter.
We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [62], write down your
+name and subscribe to the team mailing list [63] if you want to
get involved!
- [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [62]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [63]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
}}}
-
-Possible items:
-
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list