[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Mar 25 13:40:11 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/12 ===
===========================================================================

version 46
Author: harmony
Date:   2014-03-25T12:57:33+00:00

   remove double spaces

--- version 45
+++ version 46
@@ -179,7 +179,7 @@
 
 The new Tor Browser releases were again prevented from working properly
 by WebRoot Internet Security. The error message is “Couldn’t load
-XPCOM”.  Users need to disable WebRoot, whitelist the appropriate Tor
+XPCOM”. Users need to disable WebRoot, whitelist the appropriate Tor
 Browser files, and more importantly contact WebRoot support to warn them
 that their product is breaking the Tor Browser and, to the best of Tor
 support’s knowledge, Firefox stable releases. Ideally, WebRoot should
@@ -194,7 +194,7 @@
 uighur1984 wanted to set up a hidden service for their public-facing
 website [32] and decided that the HiddenServiceDir should be the same
 like the DocumentRoot of the website. This led to some problems with
-access rights.  Sam Whited clarified that both directories should be
+access rights. Sam Whited clarified that both directories should be
 separated: the data in the HiddenServiceDir doesn't contain any actual
 data from the website, but only the keys and other information from the
 hidden service.

version 45
Author: harmony
Date:   2014-03-25T12:50:55+00:00

   apostrophe

--- version 44
+++ version 45
@@ -178,7 +178,7 @@
  [30]: http://support.mozilla.org/en-US/kb/export-firefox-bookmarks-to-backup-or-transfer
 
 The new Tor Browser releases were again prevented from working properly
-by WebRoot Internet Security. The error message is “Couldn't load
+by WebRoot Internet Security. The error message is “Couldn’t load
 XPCOM”.  Users need to disable WebRoot, whitelist the appropriate Tor
 Browser files, and more importantly contact WebRoot support to warn them
 that their product is breaking the Tor Browser and, to the best of Tor

version 44
Author: harmony
Date:   2014-03-25T12:35:58+00:00

   freeze

--- version 43
+++ version 44
@@ -3,6 +3,8 @@
 '''Editor:''' harmony
 
 '''Subject:''' Tor Weekly News — March 26th, 2014
+
+'''Status:''' Frozen! Only language and technical fixes accepted. New items should go in next week's edition. Expected publication time: 2014-03-25 12:00 UTC. 
 
 {{{
 ========================================================================

version 43
Author: harmony
Date:   2014-03-25T12:34:20+00:00

   numerize & wrap

--- version 42
+++ version 43
@@ -15,32 +15,32 @@
 Tor 0.2.5.3-alpha is out
 ------------------------
 
-Nick Mathewson cut a new release of the Tor development branch [XXX]
-on March 23rd: “Tor 0.2.5.3-alpha includes all the fixes from
-0.2.4.21. It contains two new anti-DoS features for Tor relays, resolves
-a bug that kept SOCKS5 support for IPv6 from working, fixes several
-annoying usability issues for bridge users, and removes more old code
-for unused directory formats.”
-
-This release also marks the first step toward the stabilization of
-Tor 0.2.5, as from now on “no feature patches not already written will
-be considered for inclusion”.
-
-The source is available at the usual location [XXX], as are
-updated binary packages.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032448.html
- [XXX]: https://www.torproject.org/dist/
+Nick Mathewson cut a new release of the Tor development branch [1] on
+March 23rd: “Tor 0.2.5.3-alpha includes all the fixes from 0.2.4.21. It
+contains two new anti-DoS features for Tor relays, resolves a bug that
+kept SOCKS5 support for IPv6 from working, fixes several annoying
+usability issues for bridge users, and removes more old code for unused
+directory formats.”
+
+This release also marks the first step toward the stabilization of Tor
+0.2.5, as from now on “no feature patches not already written will be
+considered for inclusion”.
+
+The source is available at the usual location [2], as are updated binary
+packages.
+
+  [1]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032448.html
+  [2]: https://www.torproject.org/dist/
 
 Tails 0.23 is out…
 ------------------
 
 …but many Tails users are already running it. Now that incremental
-upgrades have been turned on by default with the previous release,
-users of Tails on USB sticks have been able to enjoy the process
-of a smooth upgrade in three clicks.
-
-As always, the new release [XXX] fixes several security holes [XXX]. That
+upgrades have been turned on by default with the previous release, users
+of Tails on USB sticks have been able to enjoy the process of a smooth
+upgrade in three clicks.
+
+As always, the new release [3] fixes several security holes [4]. That
 alone should make anyone switch. But the new version finally brings two
 long awaited features and many small improvements.
 
@@ -49,45 +49,44 @@
 address by default. This will help prevent the tracking of one’s
 geographical location accross networks. For more information about MAC
 spoofing, why it matters and when it might be relevant to turn it off,
-be sure to read the very well-written documentation [XXX].
+be sure to read the very well-written documentation [5].
 
 Another important feature is the integrated support for proxies and Tor
 bridges. This should be of immense help to users of Tails on censored
 networks. The integration is done by using the Tor Launcher
-extension [XXX], familiar to everyone who has used recent versions of
-the Tor Browser.
+extension [6], familiar to everyone who has used recent versions of the
+Tor Browser.
 
 For examples of smaller features and bugfixes: Tor, obfsproxy, I2P,
 Pidgin and the web browser have been upgraded, a 64-bit kernel is used
-on most systems to pave the way for UEFI support, documentation is
-now accessible from the greeter, and the “New identity” option in the
+on most systems to pave the way for UEFI support, documentation is now
+accessible from the greeter, and the “New identity” option in the
 browser is available again.
 
-The next Tails release is scheduled for April 29th and will be 1.0.
-For this important milestone in 5 years of intense work, the Tails
-team is still looking for a logo [XXX].
-
- [XXX]: https://tails.boum.org/news/version_0.23/
- [XXX]: https://tails.boum.org/security/Numerous_security_holes_in_0.22.1/
- [XXX]: https://tails.boum.org/doc/first_steps/startup_options/mac_spoofing/
- [XXX]: https://gitweb.torproject.org/tor-launcher.git
- [XXX]: https://tails.boum.org/news/logo_contest/
+The next Tails release is scheduled for April 29th and will be 1.0.  For
+this important milestone in 5 years of intense work, the Tails team is
+still looking for a logo [7].
+
+  [3]: https://tails.boum.org/news/version_0.23/
+  [4]: https://tails.boum.org/security/Numerous_security_holes_in_0.22.1/
+  [5]: https://tails.boum.org/doc/first_steps/startup_options/mac_spoofing/
+  [6]: https://gitweb.torproject.org/tor-launcher.git
+  [7]: https://tails.boum.org/news/logo_contest/
 
 New Tor Browser releases
 ------------------------
 
 The Tor Browser team put out two new releases based on Firefox
-24.4.0esr [XXX]. Version 3.5.3 [XXX] is meant as a safe upgrade for
-every Tor Browser user. Among other changes, the new version
-contains an updated Tor, a fix for a potential freeze, a fix for
-the Ubuntu keyboard issue and a way to prevent disk leaks when watching
-videos.
-
-On top of the preceding changes, version 3.6-beta-1 [XXX] is the
+24.4.0esr [8]. Version 3.5.3 [9] is meant as a safe upgrade for every
+Tor Browser user. Among other changes, the new version contains an
+updated Tor, a fix for a potential freeze, a fix for the Ubuntu keyboard
+issue and a way to prevent disk leaks when watching videos.
+
+On top of the preceding changes, version 3.6-beta-1 [10] is the
 culmination of a months-long effort to seamlessly integrate pluggable
-transports [XXX] into the Tor Browser. In the network settings, users can
-now choose “Connect with provided bridges” and select from “obfs3” [XXX],
-“fte” [XXX] or “flashproxy” [XXX]. Entering custom bridges is also
+transports [11] into the Tor Browser. In the network settings, users can
+now choose “Connect with provided bridges” and select from “obfs3” [12],
+“fte” [13] or “flashproxy” [14]. Entering custom bridges is also
 supported and will work for direct, obfs2 and obfs3 bridges.
 
 Other usability changes include wording improvements in the connection
@@ -97,113 +96,115 @@
 Please upgrade, in any case, and consider helping iron out the remaining
 issues in the 3.6 branch.
 
- [XXX]: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox24.4
- [XXX]: https://blog.torproject.org/blog/tor-browser-353-released
- [XXX]: https://blog.torproject.org/blog/tor-browser-36-beta-1-released
- [XXX]: https://www.torproject.org/docs/pluggable-transports.html
- [XXX]: https://gitweb.torproject.org/pluggable-transports/obfsproxy.git/blob/refs/heads/master:/doc/obfs3/obfs3-protocol-spec.txt
- [XXX]: https://fteproxy.org/
- [XXX]: https://crypto.stanford.edu/flashproxy/
+  [8]: https://www.mozilla.org/security/known-vulnerabilities/firefoxESR.html#firefox24.4
+  [9]: https://blog.torproject.org/blog/tor-browser-353-released
+ [10]: https://blog.torproject.org/blog/tor-browser-36-beta-1-released
+ [11]: https://www.torproject.org/docs/pluggable-transports.html
+ [12]: https://gitweb.torproject.org/pluggable-transports/obfsproxy.git/blob/refs/heads/master:/doc/obfs3/obfs3-protocol-spec.txt
+ [13]: https://fteproxy.org/
+ [14]: https://crypto.stanford.edu/flashproxy/
 
 Miscellaneous news
 ------------------
 
-Since the 3.5 release, “Tor Browser Bundle is more like a
-standalone browser and less like a bundle”. This led the Tor
-Browser team to plan to “rename it to just ‘Tor Browser’ everywhere” [XXX].
-
- [XXX]: https://bugs.torproject.org/11193
-
-Thanks to Berkay [XXX] and to André Schulz [XXX] for running mirrors of
+Since the 3.5 release, “Tor Browser Bundle is more like a standalone
+browser and less like a bundle”. This led the Tor Browser team to plan
+to “rename it to just ‘Tor Browser’ everywhere” [15].
+
+ [15]: https://bugs.torproject.org/11193
+
+Thanks to Berkay [16] and to André Schulz [17] for running mirrors of
 the Tor Project website!
 
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000491.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000492.html
-
-Alex reported [XXX] an “important case about Tor relay operators”
-which came to court in Athens, Greece on March 18th. The defendant,
-a Tor relay operator, was acquitted after proving that the IP address used
-for criminal activity was in fact a Tor relay.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032441.html
+ [16]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000491.html
+ [17]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000492.html
+
+Alex reported [18] an “important case about Tor relay operators” which
+came to court in Athens, Greece on March 18th. The defendant, a Tor
+relay operator, was acquitted after proving that the IP address used for
+criminal activity was in fact a Tor relay.
+
+ [18]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032441.html
 
 Connections to Twitter from inside Turkey were blocked by the Turkish
-government on 20th March [XXX], leading to an increase in the number of Tor
-users there [XXX, XXX].
-
- [XXX]: http://arstechnica.com/tech-policy/2014/03/freedom-shmeedum-turkeys-government-moves-to-wipe-out-twitter/
- [XXX]: https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2014-01-01&end=2014-03-23&country=tr&events=off#userstats-relay-country
- [XXX]: http://www.bbc.com/news/technology-26714214
+government on 20th March [19], leading to an increase in the number of
+Tor users there [20, 21].
+
+ [19]: http://arstechnica.com/tech-policy/2014/03/freedom-shmeedum-turkeys-government-moves-to-wipe-out-twitter/
+ [20]: https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2014-01-01&end=2014-03-23&country=tr&events=off#userstats-relay-country
+ [21]: http://www.bbc.com/news/technology-26714214
 
 Jacob Appelbaum presented a keynote titled “Free software for freedom,
-surveillance and you” at LibrePlanet 2014 [XXX]. The presentation
-was done remotely from Berlin using Tor and GStreamer [XXX].
-
- [XXX]: http://libreplanet.org/2014/program/sessions.html
- [XXX]: https://github.com/ioerror/freenote
-
-James Valleroy wrote to tor-relays [XXX] asking the best way to configure
-the FreedomBox  [XXX] as a Tor bridge. Lance Hathaway explained [XXX] about pluggable
-transports and Roger Dingledine mentioned [XXX] the potential issues of relaying
-a bridge and a hidden service at the same time.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004108.html
- [XXX]: https://wiki.debian.org/FreedomBox
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004111.html
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004134.html
-
-Aymeric Vitte wrote to tor-talk [XXX] to mention an implementation
-of the Tor protocol in JavaScript. This is wasted work for the community
-as the project is sadly not free software.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032432.html
-
-A Tor exit operator recently held [XXX] an Ask Me Anything on Reddit, which was quite
-successful, generating over 800 upvotes, 478 comments, and being read by
-thousands. The most popular questions were focused on how to improve the use
-of Tor, the legality of exit nodes, discussions on hidden services, the workings
-of Tor, and many other topics related to privacy and security.
-
- [XXX]: https://pay.reddit.com/r/IAmA/comments/20243q/iaman_operator_of_eight_tor_relays_including_two
+surveillance and you” at LibrePlanet 2014 [22]. The presentation was
+done remotely from Berlin using Tor and GStreamer [23].
+
+ [22]: http://libreplanet.org/2014/program/sessions.html
+ [23]: https://github.com/ioerror/freenote
+
+James Valleroy wrote to tor-relays [24] asking the best way to configure
+the FreedomBox [25] as a Tor bridge. Lance Hathaway explained [26] about
+pluggable transports and Roger Dingledine mentioned [27] the potential
+issues of relaying a bridge and a hidden service at the same time.
+
+ [24]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004108.html
+ [25]: https://wiki.debian.org/FreedomBox
+ [26]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004111.html
+ [27]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004134.html
+
+Aymeric Vitte wrote to tor-talk [28] to mention an implementation of the
+Tor protocol in JavaScript. This is wasted work for the community as the
+project is sadly not free software.
+
+ [28]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032432.html
+
+A Tor exit operator recently held [29] an Ask Me Anything on Reddit,
+which was quite successful, generating over 800 upvotes, 478 comments,
+and being read by thousands. The most popular questions were focused on
+how to improve the use of Tor, the legality of exit nodes, discussions
+on hidden services, the workings of Tor, and many other topics related
+to privacy and security.
+
+ [29]: https://pay.reddit.com/r/IAmA/comments/20243q/iaman_operator_of_eight_tor_relays_including_two
 
 Tor help desk roundup
 ---------------------
 
-Users sometimes want to know how to transfer their bookmarks from an old Tor 
-Browser to an updated one. Mozilla provide instructions on how to do this
-on their website [XXX].
-
- [XXX]: http://support.mozilla.org/en-US/kb/export-firefox-bookmarks-to-backup-or-transfer
-
-The new Tor Browser releases were again prevented from working properly by
-WebRoot Internet Security. The error message is “Couldn't load XPCOM”.
-Users need to disable WebRoot, whitelist the appropriate Tor Browser
-files, and more importantly contact WebRoot support to warn them
+Users sometimes want to know how to transfer their bookmarks from an old
+Tor Browser to an updated one. Mozilla provide instructions on how to do
+this on their website [30].
+
+ [30]: http://support.mozilla.org/en-US/kb/export-firefox-bookmarks-to-backup-or-transfer
+
+The new Tor Browser releases were again prevented from working properly
+by WebRoot Internet Security. The error message is “Couldn't load
+XPCOM”.  Users need to disable WebRoot, whitelist the appropriate Tor
+Browser files, and more importantly contact WebRoot support to warn them
 that their product is breaking the Tor Browser and, to the best of Tor
 support’s knowledge, Firefox stable releases. Ideally, WebRoot should
-test new releases before harming Tor users. See #11268 [XXX] if you want
+test new releases before harming Tor users. See #11268 [31] if you want
 to help.
 
- [XXX]: https://bugs.torproject.org/11268
+ [31]: https://bugs.torproject.org/11268
 
 News from Tor StackExchange
 ---------------------------
 
-uighur1984 wanted to set up a hidden service for their public-facing website [XXX]
-and decided that the HiddenServiceDir should be the same like the
-DocumentRoot of the website. This led to some problems with access rights.
-Sam Whited clarified that both directories should be separated: the data
-in the HiddenServiceDir doesn't contain any actual data from the website, but
-only the keys and other information from the hidden service.
-
- [XXX]: https://tor.stackexchange.com/q/1783/88
-
-Gondalse shot a video showing policemen torturing a citizen. The release of
-the video led to a trial, and Gondalse fears that someone might try to track the
-owner of the video down [XXX]. Jens Kubieziel pointed out some OPSEC rules,
-and showed which problems can lead to deanonymization.
-
- [XXX]: https://tor.stackexchange.com/q/1790/88 
+uighur1984 wanted to set up a hidden service for their public-facing
+website [32] and decided that the HiddenServiceDir should be the same
+like the DocumentRoot of the website. This led to some problems with
+access rights.  Sam Whited clarified that both directories should be
+separated: the data in the HiddenServiceDir doesn't contain any actual
+data from the website, but only the keys and other information from the
+hidden service.
+
+ [32]: https://tor.stackexchange.com/q/1783/88
+
+Gondalse shot a video showing policemen torturing a citizen. The release
+of the video led to a trial, and Gondalse fears that someone might try
+to track the owner of the video down [33]. Jens Kubieziel pointed out
+some OPSEC rules, and showed which problems can lead to deanonymization.
+
+ [33]: https://tor.stackexchange.com/q/1790/88 
 
 Upcoming events
 ---------------
@@ -228,10 +229,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [34], write down your
+name and subscribe to the team mailing list [35] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [34]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [35]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}

version 42
Author: harmony
Date:   2014-03-25T12:32:03+00:00

   two missing XXXs

--- version 41
+++ version 42
@@ -120,7 +120,7 @@
  [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000491.html
  [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000492.html
 
-Alex reported an “important case about Tor relay operators”
+Alex reported [XXX] an “important case about Tor relay operators”
 which came to court in Athens, Greece on March 18th. The defendant,
 a Tor relay operator, was acquitted after proving that the IP address used
 for criminal activity was in fact a Tor relay.
@@ -143,7 +143,7 @@
  [XXX]: https://github.com/ioerror/freenote
 
 James Valleroy wrote to tor-relays [XXX] asking the best way to configure
-the FreedomBox as a Tor bridge. Lance Hathaway explained [XXX] about pluggable
+the FreedomBox  [XXX] as a Tor bridge. Lance Hathaway explained [XXX] about pluggable
 transports and Roger Dingledine mentioned [XXX] the potential issues of relaying
 a bridge and a hidden service at the same time.
 

version 41
Author: harmony
Date:   2014-03-25T12:18:17+00:00

   remove cruft

--- version 40
+++ version 41
@@ -10,7 +10,7 @@
 ========================================================================
 
 Welcome to the twelfth issue of Tor Weekly News in 2014, the weekly
-newsletter that covers what is happening in the XXX Tor community.
+newsletter that covers what is happening in the Tor community.
 
 Tor 0.2.5.3-alpha is out
 ------------------------

version 40
Author: harmony
Date:   2014-03-25T12:16:46+00:00

   add contributor

--- version 39
+++ version 40
@@ -224,7 +224,7 @@
 
 
 This issue of Tor Weekly News has been assembled by Lunar, Matt Pagan,
-harmony, and qbi.
+harmony, qbi, and Jesse Victors.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 39
Author: harmony
Date:   2014-03-25T12:16:17+00:00

   write AmA story into misc

--- version 38
+++ version 39
@@ -157,6 +157,14 @@
 as the project is sadly not free software.
 
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032432.html
+
+A Tor exit operator recently held [XXX] an Ask Me Anything on Reddit, which was quite
+successful, generating over 800 upvotes, 478 comments, and being read by
+thousands. The most popular questions were focused on how to improve the use
+of Tor, the legality of exit nodes, discussions on hidden services, the workings
+of Tor, and many other topics related to privacy and security.
+
+ [XXX]: https://pay.reddit.com/r/IAmA/comments/20243q/iaman_operator_of_eight_tor_relays_including_two
 
 Tor help desk roundup
 ---------------------



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list