[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Mon Mar 10 15:00:07 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/10 ===
===========================================================================
version 33
Author: harmony
Date: 2014-03-10T14:11:45+00:00
add comment
--- version 32
+++ version 33
@@ -153,4 +153,4 @@
Possible items:
- * Tails gets a prize https://twitter.com/accessnow/status/441043400708857856 (better find other sources than a tweet though)
+ * Tails gets a prize https://twitter.com/accessnow/status/441043400708857856 (better find other sources than a tweet though) (maybe we should postpone this to next week if no more information emerges? no one awards $50K and then never mentions it again - harmony)
version 32
Author: harmony
Date: 2014-03-10T14:09:31+00:00
play it safe with gender (unless i'm missing something)
--- version 31
+++ version 32
@@ -79,7 +79,7 @@
[XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006400.html
-Alex reported [XXX] on his efforts to use ScrambleSuit [XXX] with OpenVPN.
+Alex reported [XXX] on an effort to use ScrambleSuit [XXX] with OpenVPN.
Ultimately, Yawning Angel identified a flaw in OpenVPN implementation of the
SOCKS protocol [XXX] and even wrote a patch for it [XXX].
version 31
Author: harmony
Date: 2014-03-10T14:07:32+00:00
small language/reference fixes
--- version 30
+++ version 31
@@ -15,7 +15,7 @@
New release of tor-ramdisk
--------------------------
-On March 9th, Anthony G. Basile has released [XXX] a new version of
+On March 9th, Anthony G. Basile released [XXX] a new version of
tor-ramdisk [XXX]. Tor-ramdisk is a “micro Linux distribution whose only
purpose is to host a Tor server in an environment that maximizes
security and privacy. Security is enhanced by hardening the kernel and
@@ -25,7 +25,7 @@
information survives a reboot […].”
The new version contains Tor 2.4.21 and an updated kernel. The main
-changes is the addition of “haveged, a daemon to help generate entropy
+change is the addition of “haveged, a daemon to help generate entropy
on diskless systems, for a more cryptographically sound system”.
[XXX]: http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-March/000127.html
@@ -36,11 +36,11 @@
The wave of regular monthly reports from Tor project members for the
month of February continued, with Isis Lovecruft [XXX], Andrew
-Lewman [XXX], Matt Pagan [XXX], Kevin P. Dyer [XXX] releasing their
+Lewman [XXX], Matt Pagan [XXX], and Kevin P. Dyer [XXX] releasing their
reports this week.
-The Tails developers also reported on their recent progress [XXX].
-Roger Dingledine sent the report for SponsorF [XXX].
+The Tails developers also reported on their recent progress [XXX], and
+Roger Dingledine sent out the report for SponsorF [XXX].
[XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000479.html
[XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000480.html
@@ -52,7 +52,7 @@
Miscellaneous news
------------------
-Tails has issued the call for testing for its 0.23 release [XXX]. At least
+Tails issued the call for testing for its 0.23 release [XXX]. At the very least,
the long awaited features that are MAC spoofing and bridge integration would
benefit from wider testing. Enthusiasts are encouraged to report their
findings [XXX] on the newly created tails-tester mailing list [XXX].
@@ -61,7 +61,7 @@
[XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-March/000000.html
[XXX]: https://tails.boum.org/news/tails-testers/
-Nick Mathewson called anyone who wanted to make Tor relays 3 to 10% faster
+Nick Mathewson called on anyone who wanted to make Tor relays 3 to 10% faster
to review his patches. Have a look at #9683 [XXX] and #9841 [XXX] if you want
to help out.
@@ -74,7 +74,7 @@
[XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000483.html
[XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000484.html
-Karsten Loesing has sent the minutes of the March 5th Weather rewrite
+Karsten Loesing sent out the minutes of the March 5th Weather rewrite
online meeting [XXX].
[XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006400.html
@@ -83,15 +83,15 @@
Ultimately, Yawning Angel identified a flaw in OpenVPN implementation of the
SOCKS protocol [XXX] and even wrote a patch for it [XXX].
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006394.html
[XXX]: http://www.cs.kau.se/philwint/scramblesuit/
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006394.html
[XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
[XXX]: https://github.com/Yawning/openvpn/commit/7474f1acfc
-Sebastian Urbach announced [XXX] that the Trying Trusted Tor Traceroutes [XXX]
-has “reached 100 completed runs from different ip's (not to mention the
+Sebastian Urbach announced [XXX] that Trying Trusted Tor Traceroutes [XXX]
+has “reached 100 completed runs from different ip’s (not to mention the
multiple runs).” To all participating relay operators, he added: “Thank you
-very much for your support, you officially rock !”
+very much for your support, you officially rock!”
[XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004037.html
[XXX]: http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html
@@ -103,7 +103,7 @@
Erinn Clark discovered [XXX] another fake OpenPGP key with her name and email
address. Watch out! The canonical list of keys used for Tor signatures [XXX] is
-still available on the Tor Project's website. Also consider verifying all
+still available on the Tor Project’s website. Also consider verifying all
signatures [XXX] for the reproducible Tor Browser Bundles [XXX].
[XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006422.html
@@ -114,7 +114,7 @@
Tor help desk roundup
---------------------
-Users have asked us why 'About TorBrowser' in the Tor Browser's
+Users have asked us why “About TorBrowser” in the Tor Browser’s
Help menu displays the Firefox Logo instead of the Tor logo.
This has been a known issue for some time, and fixing it is
not as easy it would seem. Relevant bug tickets here are
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list