[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed May 21 09:40:11 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/20 ===
===========================================================================

version 44
Author: lunar
Date:   2014-05-21T08:57:47+00:00

   nitpick from GeKo

--- version 43
+++ version 44
@@ -59,7 +59,7 @@
 Mike has raised the issue [8] on Mozilla's dev-privacy mailing-list
 where Henri Sivonen replied that device-identifying information
 will be hashed together with a “per-origin browser-generated secret“
-that would “persists until the user asks the salt to be forgotten”. 
+that “persists until the user asks the salt to be forgotten”. 
 So it does not look as gloom as it initially appeared. As always,
 the devil is in the details.
 

version 43
Author: lunar
Date:   2014-05-21T08:54:25+00:00

   Mozilla has thought about privacy after all

--- version 42
+++ version 43
@@ -38,9 +38,9 @@
 -------------------------------------------
 
 Mozilla’s decision to support playing media with digital
-restrictions [5] in Firefox by implementing the W3C EME specification has
-raised a fair amount of controversy. Paul Crable wanted to know [6] what
-it meant for the Tor Browser.
+restrictions [5] in Firefox by implementing the W3C EME specification
+has raised a fair amount of controversy. Paul Crable wanted to know [6]
+what it meant for the Tor Browser.
 
 Mike Perry answered [7] that “simply removing the DRM will be trivial,
 and it will be high on our list of tasks”.
@@ -56,101 +56,105 @@
 only due to ease of increased revenue generation from a fully identified
 userbase.”
 
-“It seems that neither Mozilla nor Google have fully thought through the
-social effects of giving a unique device-id to arbitrary websites”, as
-Mike concludes.
+Mike has raised the issue [8] on Mozilla's dev-privacy mailing-list
+where Henri Sivonen replied that device-identifying information
+will be hashed together with a “per-origin browser-generated secret“
+that would “persists until the user asks the salt to be forgotten”. 
+So it does not look as gloom as it initially appeared. As always,
+the devil is in the details.
 
    [5]: https://hacks.mozilla.org/2014/05/reconciling-mozillas-mission-and-w3c-eme/
    [6]: https://lists.torproject.org/pipermail/tor-talk/2014-May/032947.html
    [7]: https://lists.torproject.org/pipermail/tor-talk/2014-May/032985.html
+   [8]: https://groups.google.com/forum/#!topic/mozilla.dev.privacy/3jA9zt1pXVo
 
 Miscellaneous news
 ------------------
 
-David Goulet reported [8] on the status of the development of Torsocks
+David Goulet reported [9] on the status of the development of Torsocks
 2.0, the library for safely using applications with Tor.
 
-   [8]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006872.html
-
-Karsten Loesing posted [9] on the Tor Blog to commemorate the tenth
-anniversary of the first archived Tor directory, and discussed the different ways
-in which the public archive of directory data is being used for research
-and development.
-
-   [9]: https://blog.torproject.org/blog/10-years-collecting-tor-directory-data
-
-Karsten also notified [10] the community of a change in the compression
-algorithm used for the tarballs of archived metrics data, which has reduced
-their total size from 212 gigabytes to 33 — an 85% gain!
-
-  [10]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006884.html
-
-Knock [11] is a variant of port-knocking that might be useful in the
+   [9]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006872.html
+
+Karsten Loesing posted [10] on the Tor Blog to commemorate the tenth
+anniversary of the first archived Tor directory, and discussed the
+different ways in which the public archive of directory data is being
+used for research and development.
+
+  [10]: https://blog.torproject.org/blog/10-years-collecting-tor-directory-data
+
+Karsten also notified [11] the community of a change in the compression
+algorithm used for the tarballs of archived metrics data, which has
+reduced their total size from 212 gigabytes to 33 — an 85% gain!
+
+  [11]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006884.html
+
+Knock [12] is a variant of port-knocking that might be useful in the
 future for pluggable transports. “As Knock uses two fields in the TCP
 header in order to hide information and we explicitly want to be
-compatible with machines sitting in typical home networks”, writes [12]
+compatible with machines sitting in typical home networks”, writes [13]
 Julian Kirsch, “we thus created a program which tests if Knock would
-work in your environment.” Please give it a try [13] to help the team
+work in your environment.” Please give it a try [14] to help the team
 figure out if Knock could be deployed in the wild.
 
-  [11]: https://gnunet.org/knock
-  [12]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006873.html
-  [13]: https://gnunet.org/knock_nat_tester
-
-Thanks to Jesse Victors [14], Andrea [15], Nicholas Merrill [16], and
-Martin A. [17] for running mirrors of the Tor Project website!
-
-  [14]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000581.html
-  [15]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000589.html
-  [16]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000592.html
-  [17]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000594.html
-
-Michael Schloh von Bennewitz has been busy analyzing a disk leak [18] in
-Tor Browser: when one copies a significant chunk of text to the clipboard,
-a temporary file is created with its content. Michael found a possible
-fix and is welcoming reviews [19].
-
-  [18]: https://bugs.torproject.org/9701
-  [19]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006875.html
-
-Nicolas Vigier has been investigating [20] some extra connections made
+  [12]: https://gnunet.org/knock
+  [13]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006873.html
+  [14]: https://gnunet.org/knock_nat_tester
+
+Thanks to Jesse Victors [15], Andrea [16], Nicholas Merrill [17], and
+Martin A. [18] for running mirrors of the Tor Project website!
+
+  [15]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000581.html
+  [16]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000589.html
+  [17]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000592.html
+  [18]: https://lists.torproject.org/pipermail/tor-mirrors/2014-May/000594.html
+
+Michael Schloh von Bennewitz has been busy analyzing a disk leak [19] in
+Tor Browser: when one copies a significant chunk of text to the
+clipboard, a temporary file is created with its content. Michael found a
+possible fix and is welcoming reviews [20].
+
+  [19]: https://bugs.torproject.org/9701
+  [20]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006875.html
+
+Nicolas Vigier has been investigating [21] some extra connections made
 by the Tor Browser on startup to the local resolver and the default port
 or the SOCKS proxy. 
 
-  [20]: https://lists.torproject.org/pipermail/tbb-dev/2014-May/000050.html
+  [21]: https://lists.torproject.org/pipermail/tbb-dev/2014-May/000050.html
 
 Shawn Nock proved us once more that talking to ISP is key to run Tor
 relays on high-speed links. Shawn’s exit node was abruptly shut down by
-its provider [21] on May 15th. After a well-crafted plea explaining why
-Tor is important, the provider restored the service [22] on the very
+its provider [22] on May 15th. After a well-crafted plea explaining why
+Tor is important, the provider restored the service [23] on the very
 same day!
 
-  [21]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004553.html
-  [22]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004555.html
+  [22]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004553.html
+  [23]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004555.html
 
 However, dope457 reported that their provider is now giving them trouble
-for being the operator of a non-exit relay [23], due to a large amount
+for being the operator of a non-exit relay [24], due to a large amount
 of traffic on the DNS port (53), which is being used as the ORPort by a
-recently-established Tor relay [24], as pointed out [25] by Roman
+recently-established Tor relay [25], as pointed out [26] by Roman
 Mamedov.
 
-  [23]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004562.html
-  [24]: https://atlas.torproject.org/#details/44EFAF942314F756FC7EA50292D5B383E568A9BD
-  [25]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004563.html
+  [24]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004562.html
+  [25]: https://atlas.torproject.org/#details/44EFAF942314F756FC7EA50292D5B383E568A9BD
+  [26]: https://lists.torproject.org/pipermail/tor-relays/2014-May/004563.html
 
 Now that ICANN is “selling” top-level domain names, Anders Andersson
-raised concerns [26] about the .onion extension used by Tor. Fortunately,
-RFC6761 [27] defines a process regarding special-use domain names. Last
-November, Christian Grothoff, Matthias Wachs, Hellekin O. Wolf, and
-Jacob Appelbaum submitted a request to reserve several TLDs used in
-peer-to-peer systems [28]. Hellekin sent an update [29] about the
-procedure: “the current status quo from the IETF so far is that this
+raised concerns [27] about the .onion extension used by Tor.
+Fortunately, RFC6761 [28] defines a process regarding special-use domain
+names. Last November, Christian Grothoff, Matthias Wachs, Hellekin O.
+Wolf, and Jacob Appelbaum submitted a request to reserve several TLDs
+used in peer-to-peer systems [29]. Hellekin sent an update [30] about
+the procedure: “the current status quo from the IETF so far is that this
 issue is not a priority”.
 
-  [26]: https://lists.torproject.org/pipermail/tor-talk/2014-May/032974.html
-  [27]: https://tools.ietf.org/html/rfc6761
-  [28]: https://tools.ietf.org/html/draft-grothoff-iesg-special-use-p2p-names-02
-  [29]: https://lists.torproject.org/pipermail/tor-talk/2014-May/032983.html
+  [27]: https://lists.torproject.org/pipermail/tor-talk/2014-May/032974.html
+  [28]: https://tools.ietf.org/html/rfc6761
+  [29]: https://tools.ietf.org/html/draft-grothoff-iesg-special-use-p2p-names-02
+  [30]: https://lists.torproject.org/pipermail/tor-talk/2014-May/032983.html
 
 Tor help desk roundup
 ---------------------
@@ -164,57 +168,57 @@
 News from Tor StackExchange
 ---------------------------
 
-The Tor StackExchange site [30] now provides more than 1000 answers to
-user-supplied questions. However, there are still ~130 questions [31]
+The Tor StackExchange site [31] now provides more than 1000 answers to
+user-supplied questions. However, there are still ~130 questions [32]
 which need a good answer, so if you happen to know one then please visit
 the site and help out.
 
-The majority of the questions are about the Tor Browser Bundle [32], but
-hidden services also attract a large amount of attention [33].  When it
-comes to operating systems, there are 42 Windows-related questions [34],
-while questions about Tails [35] and Whonix [36] number nearly 50. All
+The majority of the questions are about the Tor Browser Bundle [33], but
+hidden services also attract a large amount of attention [34].  When it
+comes to operating systems, there are 42 Windows-related questions [35],
+while questions about Tails [36] and Whonix [37] number nearly 50. All
 your questions about Tor and related software are welcome.
 
-  [30]: https://tor.stackexchange.com/
-  [31]: https://tor.stackexchange.com/unanswered
-  [32]: https://tor.stackexchange.com/questions/tagged/tor-browser-bundle
-  [33]: https://tor.stackexchange.com/questions/tagged/hidden-services
-  [34]: https://tor.stackexchange.com/questions/tagged/windows
-  [35]: https://tor.stackexchange.com/questions/tagged/tails
-  [36]: https://tor.stackexchange.com/questions/tagged/whonix
+  [31]: https://tor.stackexchange.com/
+  [32]: https://tor.stackexchange.com/unanswered
+  [33]: https://tor.stackexchange.com/questions/tagged/tor-browser-bundle
+  [34]: https://tor.stackexchange.com/questions/tagged/hidden-services
+  [35]: https://tor.stackexchange.com/questions/tagged/windows
+  [36]: https://tor.stackexchange.com/questions/tagged/tails
+  [37]: https://tor.stackexchange.com/questions/tagged/whonix
 
 Blue_Pyro uses Orweb on a mobile phone and wants to save images from
-websites [37]. Abel of Guardian recommended two options: first, a user
-can use Firefox mobile with privacy enhanced options [38], or one can try
-Orfox [39], a development version of a Firefox-based browser.
-
-  [37]: https://tor.stackexchange.com/q/1753/88
-  [38]: https://guardianproject.info/apps/firefoxprivacy/
-  [39]: https://guardianproject.info/builds/Orfox/latest/
+websites [38]. Abel of Guardian recommended two options: first, a user
+can use Firefox mobile with privacy enhanced options [39], or one can
+try Orfox [40], a development version of a Firefox-based browser.
+
+  [38]: https://tor.stackexchange.com/q/1753/88
+  [39]: https://guardianproject.info/apps/firefoxprivacy/
+  [40]: https://guardianproject.info/builds/Orfox/latest/
 
 Easy development tasks to get involved with
 -------------------------------------------
 
-Stem [40] is a Python controller library for Tor. It comes with
+Stem [41] is a Python controller library for Tor. It comes with
 tutorials and generally has pretty good test coverage. The newly-added
 example scripts, however, don’t yet have unit tests. Damian Johnson
-suggested ways to add unit tests for example scripts [41]; if you
-want to help out, learn how to get started [42], start writing unit
+suggested ways to add unit tests for example scripts [42]; if you
+want to help out, learn how to get started [43], start writing unit
 tests for the example scripts, and then comment on the ticket.
 
-  [40]: https://stem.torproject.org/
-  [41]: https://trac.torproject.org/projects/tor/ticket/11335
-  [42]: https://gitweb.torproject.org/stem.git
-
-The traffic obfuscator obfsproxy [43] should validate command-line
-arguments appropriately [44]. Right now, it’s printing an error and
+  [41]: https://stem.torproject.org/
+  [42]: https://trac.torproject.org/projects/tor/ticket/11335
+  [43]: https://gitweb.torproject.org/stem.git
+
+The traffic obfuscator obfsproxy [44] should validate command-line
+arguments appropriately [45]. Right now, it’s printing an error and
 continuing, but it should really abort. This sounds like a trivial
 change, but maybe there’s more to fix in the nearby code. If you like
 Python and want to give it a try, there’s more information for you on
 the ticket.
 
-  [43]: https://www.torproject.org/projects/obfsproxy.html
-  [44]: https://trac.torproject.org/projects/tor/ticket/9823
+  [44]: https://www.torproject.org/projects/obfsproxy.html
+  [45]: https://trac.torproject.org/projects/tor/ticket/9823
 
 Upcoming events
 ---------------
@@ -241,10 +245,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [45], write down your
-name and subscribe to the team mailing list [46] if you want to
+important news. Please see the project page [46], write down your
+name and subscribe to the team mailing list [47] if you want to
 get involved!
 
-  [45]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [46]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+  [46]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [47]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/21 ===
===========================================================================

version 3
Author: lunar
Date:   2014-05-21T09:03:37+00:00

   another item

--- version 2
+++ version 3
@@ -85,4 +85,5 @@
 
  * Micah Lee wrote Onionshare https://github.com/micahflee/onionshare ask about Tor integration https://lists.torproject.org/pipermail/tor-dev/2014-May/006895.html
  * A Child's Garden of Pluggable Transports https://lists.torproject.org/pipermail/tor-dev/2014-May/006891.html
- * RFC: obfs4 https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
+ * RFC: obfs4 https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
+ * or-applet https://github.com/yawning/or-applet

version 2
Author: lunar
Date:   2014-05-21T09:00:54+00:00

   add items

--- version 1
+++ version 2
@@ -79,4 +79,10 @@
 
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
+}}}
+
+Possible items:
+
+ * Micah Lee wrote Onionshare https://github.com/micahflee/onionshare ask about Tor integration https://lists.torproject.org/pipermail/tor-dev/2014-May/006895.html
+ * A Child's Garden of Pluggable Transports https://lists.torproject.org/pipermail/tor-dev/2014-May/006891.html
+ * RFC: obfs4 https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list