[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Mon Mar 24 16:40:05 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/12 ===
===========================================================================
version 33
Author: harmony
Date: 2014-03-24T15:57:00+00:00
some language fixes
--- version 32
+++ version 33
@@ -23,10 +23,10 @@
for unused directory formats.”
This release also marks a first step toward the stabilization of
-Tor 0.2.5 as from now on “no feature patches not already written will
+Tor 0.2.5, as from now on “no feature patches not already written will
be considered for inclusion”.
-The source is available at the usual location [XXX], just like
+The source is available at the usual location [XXX], as are
updated binary packages.
[XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032448.html
@@ -35,26 +35,26 @@
Tails 0.23 is out…
------------------
-… but many Tails users are already running it. Now that incremental
+…but many Tails users are already running it. Now that incremental
upgrades have been turned on by default with the previous release,
users of Tails on USB sticks have been able to enjoy the process
-of smooth upgrade in three clicks.
-
-As always, the new release [XXX] fix several security holes [XXX]. That
+of a smooth upgrade in three clicks.
+
+As always, the new release [XXX] fixes several security holes [XXX]. That
alone should make anyone switch. But the new version finally brings two
long awaited features and many small improvements.
Tails will now do “MAC spoofing” by default. To hide the hardware
address used on the local network, Tails will now use a randomized
-address by default. This will help to prevent the tracking of one's
+address by default. This will help prevent the tracking of one’s
geographical location accross networks. For more information about MAC
spoofing, why it matters and when it might be relevant to turn it off,
-be sure to read the very well written documentation [XXX].
+be sure to read the very well-written documentation [XXX].
Another important feature is the integrated support for proxies and Tor
-bridges. This should vastly help users to use Tails on censored
+bridges. This should be of immense help to users of Tails on censored
networks. The integration is done by using the Tor Launcher
-extension [XXX], familiar to everyone who used recent versions of
+extension [XXX], familiar to everyone who has used recent versions of
the Tor Browser.
For examples of smaller features and bugfixes: Tor, obfsproxy, I2P,
@@ -63,7 +63,7 @@
now accessible from the greeter, and the “New identity” option in the
browser is available again.
-The next Tails release is scheduled on April 29th and will be 1.0.
+The next Tails release is scheduled for April 29th and will be 1.0.
For this important milestone in 5 years of intense work, the Tails
team is still looking for a logo [XXX].
@@ -76,26 +76,26 @@
New Tor Browser releases
------------------------
-The Tor Browser team has made two new releases based on Firefox
-24.4.0esr [XXX]. Version 3.5.3 [XXX] is meant as a safe upgrade for
-every Tor Browser users. Among other changes, the new version also
+The Tor Browser team put out two new releases based on Firefox
+24.4.0esr [XXX]. Version 3.5.3 [XXX] is meant as a safe upgrade for
+every Tor Browser user. Among other changes, the new version
contains an updated Tor, a fix for a potential freeze, a fix for
-the Ubuntu keyboard issue and breach a disk leaks for videos.
-
-On top of the previous changes, version 3.6-beta-1 [XXX] is the
-completion of months long efforts for seamless integration of pluggable
-transports [XXX] in the Tor Browser. In the network settings, users can
-now choose the “Connect with provided bridges” and pick one of
-“obfs3” [XXX], “fte” [XXX] or “flashproxy” [XXX]. Entering custom
-bridges is indeed supported and will work for direct, obfs2 and obfs3
-bridges.
-
-Other usability changes include wording improvements on the connection
-wizard, translatable Tor status messages, and the usage of disk image
+the Ubuntu keyboard issue and a way to prevent disk leaks when watching
+videos.
+
+On top of the preceding changes, version 3.6-beta-1 [XXX] is the
+culmination of a months-long effort to seamlessly integrate pluggable
+transports [XXX] into the Tor Browser. In the network settings, users can
+now choose “Connect with provided bridges” and select from “obfs3” [XXX],
+“fte” [XXX] or “flashproxy” [XXX]. Entering custom bridges is also
+supported and will work for direct, obfs2 and obfs3 bridges.
+
+Other usability changes include wording improvements in the connection
+wizard, translatable Tor status messages, and the use of disk image
(DMG) instead of ZIP archives for Mac OS X.
-Upgrade in any cases, and consider helping to iron out the remaining
-issues off the 3.6 branch.
+Please upgrade, in any case, and consider helping iron out the remaining
+issues in the 3.6 branch.
[XXX]: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox24.4
[XXX]: https://blog.torproject.org/blog/tor-browser-353-released
@@ -109,7 +109,7 @@
------------------
Since the 3.5 release, “Tor Browser Bundle is more like a
-standalone browser and less like a bundle”. This lead the Tor
+standalone browser and less like a bundle”. This led the Tor
Browser team to plan to “rename it to just ‘Tor Browser’ everywhere” [XXX].
[XXX]: https://bugs.torproject.org/11193
@@ -120,9 +120,9 @@
[XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000491.html
[XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000492.html
-Alex reported about an “important case about Tor relay operators”
+Alex reported an “important case about Tor relay operators”
which came to court in Athens, Greece on March 18th. The defendant,
-a Tor relay operator was acquitted after earing that the IP address used
+a Tor relay operator, was acquitted after proving that the IP address used
for criminal activity was in fact a Tor relay.
[XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032441.html
@@ -153,7 +153,7 @@
[XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004134.html
Aymeric Vitte wrote to tor-talk [XXX] to mention an implementation
-of the Tor protocol in JavaScript. This is lost work for the community
+of the Tor protocol in JavaScript. This is wasted work for the community
as the project is sadly not free software.
[XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032432.html
@@ -167,10 +167,10 @@
[XXX]: http://support.mozilla.org/en-US/kb/export-firefox-bookmarks-to-backup-or-transfer
-The new Tor Browser releases were again prevented to work properly by
+The new Tor Browser releases were again prevented from working properly by
WebRoot Internet Security. The error message is “Couldn't load XPCOM”.
Users need to disable WebRoot, whitelist the appropriate Tor Browser
-files, and more importantly to contact WebRoot support to warn them
+files, and more importantly contact WebRoot support to warn them
that their product is breaking the Tor Browser and, to the best of Tor
support's knowledge, Firefox stable releases. Ideally, WebRoot should
test new releases before harming Tor users. See #11268 [XXX] if you want
version 32
Author: harmony
Date: 2014-03-24T15:44:59+00:00
add BBC link about Turkey
--- version 31
+++ version 32
@@ -129,10 +129,11 @@
Connections to Twitter from inside Turkey were blocked by the Turkish
government on 20th March [XXX], leading to an increase in the number of Tor
-users there [XXX].
+users there [XXX, XXX].
[XXX]: http://arstechnica.com/tech-policy/2014/03/freedom-shmeedum-turkeys-government-moves-to-wipe-out-twitter/
[XXX]: https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2014-01-01&end=2014-03-23&country=tr&events=off#userstats-relay-country
+ [XXX]: http://www.bbc.com/news/technology-26714214
Jacob Appelbaum presented a keynote titled “Free software for freedom,
surveillance and you” at LibrePlanet 2014 [XXX]. The presentation
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list