[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Mon May 26 20:40:12 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/21 ===
===========================================================================
version 45
Author: harmony
Date: 2014-05-26T19:50:21+00:00
remove xxx
--- version 44
+++ version 45
@@ -10,7 +10,7 @@
========================================================================
Welcome to the twenty-first issue of Tor Weekly News in 2014, the weekly
-newsletter that covers what is happening in the XXX Tor community.
+newsletter that covers what is happening in the Tor community.
OnionShare and tor’s ControlPort
--------------------------------
version 44
Author: harmony
Date: 2014-05-26T19:40:06+00:00
i'll edit this week
--- version 43
+++ version 44
@@ -1,8 +1,8 @@
''47th issue of Tor Weekly News. Covering what's happening from May 20th, 2014 to May 27th, 2014. To be released on May 28th, 2014.''
-'''Editor:'''
-
-'''Subject:''' Tor Weekly News — XXX Xth, 2014
+'''Editor:''' harmony
+
+'''Subject:''' Tor Weekly News — May 28th, 2014
{{{
========================================================================
version 43
Author: harmony
Date: 2014-05-26T19:29:46+00:00
add timb item to misc
--- version 42
+++ version 43
@@ -117,6 +117,12 @@
a Gtk+ system tray applet to monitor Tor circuits.
[XXX]: https://github.com/yawning/or-applet
+
+Arlo Breault is making progress on the Tor Instant Messenger Bundle: a
+minimalistic user interface for OTR encryption [XXX], one of the key
+features missing from the finished software, has now been implemented.
+
+ [XXX]: https://bugs.torproject.org/11533
Israel Leiva published [XXX] the initial version of a design
proposal [XXX] for the “Revamp GetTor” Google Summer of Code project,
@@ -221,5 +227,3 @@
}}}
Possible items:
-
- * Instantbird OTR support with minimalistic UI https://bugs.torproject.org/11533
version 42
Author: harmony
Date: 2014-05-26T18:57:22+00:00
add a bug2plug
--- version 41
+++ version 42
@@ -178,6 +178,19 @@
If you can unravel this mystery, please submit your answer to the question.
[XXX]: https://tor.stackexchange.com/q/1866/88
+
+Easy development tasks to get involved with
+-------------------------------------------
+
+The metrics website displays graphs on bridge users by pluggable
+transport [XXX], but we’d like to have another graph with total
+pluggable transport usage [XXX]. Karsten Loesing outlined the steps
+for adding such a graph, which require some knowledge of R and ggplot2.
+If you enjoy writing R and want to add this new graph to the metrics
+website, give it a try and post your results on the ticket.
+
+ [XXX] https://metrics.torproject.org/users.html#userstats-bridge-transport
+ [XXX] https://bugs.torproject.org/11799
Upcoming events
---------------
version 41
Author: harmony
Date: 2014-05-26T18:53:14+00:00
my mistake
--- version 40
+++ version 41
@@ -107,7 +107,7 @@
Stem now offers a control interpreter, “a new method for interacting
with Tor’s control interface that combines an interactive python
-interpreter with raw access similar to telnet”. [XXX]. Damian Johnson
+interpreter with raw access similar to telnet” [XXX]. Damian Johnson
wrote a new tutorial [XXX] to give an overview of what can be done with it.
[XXX]: https://blog.torproject.org/blog/new-feature-tor-interpreter
version 40
Author: harmony
Date: 2014-05-26T18:51:26+00:00
language tweaks
--- version 39
+++ version 40
@@ -88,7 +88,7 @@
track, however there is still a long way ahead for the project to be
appropriately ‘ripe’ for usage in actually privacy-relevant and
critically important scenarios.” All reported issues should have been
-fixed in release 1.5 [XXX], released May 14th.
+fixed in release 1.5 [XXX] on May 14th.
[XXX]: https://cure53.de/pentest-report_onion-browser.pdf
[XXX]: https://mike.tig.as/onionbrowser/
@@ -98,7 +98,7 @@
Yawning Angel: “obfs4 is ScrambleSuit with djb crypto. Instead of obfs3 style
UniformDH and CTR-AES256/HMAC-SHA256, obfs4 uses a combination of
Curve25519, Elligator2, HMAC-SHA256, XSalsa20/Poly1305 and SipHash-2-4”.
-The feature set offered by obfs4 is comparable to ScrambleSuit with minor
+The feature set offered by obfs4 is comparable to ScrambleSuit, with minor
differences. Yawning is now asking the community for comments, reviews, and
tests [XXX].
@@ -113,7 +113,7 @@
[XXX]: https://blog.torproject.org/blog/new-feature-tor-interpreter
[XXX]: https://stem.torproject.org/tutorials/down_the_rabbit_hole.html
-On the controller front, Yawning Angel also hacked on or-applet [XXX],
+Also on the controller front, Yawning Angel hacked on or-applet [XXX],
a Gtk+ system tray applet to monitor Tor circuits.
[XXX]: https://github.com/yawning/or-applet
@@ -136,9 +136,9 @@
[XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-May/033032.html
[XXX]: https://www.torproject.org/projects/obfsproxy-instructions.html
-AddressSanitizer [XXX] (ASan) is a powerful memory error detector. Software
-built with such technology makes it a lot hard to exploit programming error
-related to memory management. Georg Koppen has happily announced [XXX]
+AddressSanitizer [XXX] (ASan) is a powerful memory error detector: software
+built with such technology makes it a lot harder to exploit programming errors
+related to memory management. Happily, Georg Koppen has announced [XXX]
the first test packages of the Tor Browser built with ASan hardening.
[XXX]: https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer
@@ -156,7 +156,7 @@
welcome page, they were unable to reach any website with the Tor Browser.
It appears that with a recent update, the Sophos anti-virus solution
interferes with the Tor Browser. In order to be able to use the Tor Browser
-again, one must open Sophos Anti-Virus, then “Preferences” and in the
+again, one must open Sophos Anti-Virus, then “Preferences”, and in the
“Web Protection” panel position all switches to off.
News from Tor StackExchange
version 39
Author: harmony
Date: 2014-05-26T18:44:42+00:00
include quote from blog
--- version 38
+++ version 39
@@ -105,7 +105,9 @@
[XXX]: https://github.com/Yawning/obfs4
[XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006897.html
-Stem now offers an interactive prompt to control Tor [XXX]. Damian Johnson
+Stem now offers a control interpreter, “a new method for interacting
+with Tor’s control interface that combines an interactive python
+interpreter with raw access similar to telnet”. [XXX]. Damian Johnson
wrote a new tutorial [XXX] to give an overview of what can be done with it.
[XXX]: https://blog.torproject.org/blog/new-feature-tor-interpreter
version 38
Author: harmony
Date: 2014-05-26T18:40:56+00:00
promote items
--- version 37
+++ version 38
@@ -12,12 +12,61 @@
Welcome to the twenty-first issue of Tor Weekly News in 2014, the weekly
newsletter that covers what is happening in the XXX Tor community.
-Feature XXX
------------
-
-Feature 1 with cited source [XXX]
-
- [XXX]:
+OnionShare and tor’s ControlPort
+--------------------------------
+
+Micah Lee published OnionShare [XXX], a program that “makes it simple to
+share a file securely using a password-protected Tor hidden service”. It
+originally ran only in Tails, but has now been made compatible with
+other GNU/Linux distros, Windows, and OS X. As part of that process,
+Micah wondered [XXX] about the best way to make the program work with a
+Tor Browser or system tor process, as “I would really like to not be in
+the business of distributing Tor myself”. meejah [XXX] and David
+Stainton [XXX] responded with relevant details of the Stem and txtorcon
+controller libraries, which allow this kind of operation to take place
+via tor’s ControlPort.
+
+ [XXX]: https://github.com/micahflee/onionshare
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006895.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006896.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006899.html
+ [XXX]: https://stem.torproject.org/
+ [XXX]: https://github.com/meejah/txtorcon
+
+The “Tor and HTTPS” visualization made translatable
+---------------------------------------------------
+
+Lunar announced [XXX] the creation of a repository [XXX] for an
+SVG+Javascript version of the EFF’s interactive “Tor and HTTPS”
+visualization [XXX], which has proven useful in explaining to users the
+types of data that can be leaked or intercepted, and by whom, when using
+Tor or HTTPS (or both, or neither). As Lunar wrote, “The good news is
+that it’s translatable”: copies have so far been published in 18
+languages. The amount of translation required is very small, so if you'd
+like to contribute in your language then download the POT file [XXX] and
+submit a patch!
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-May/033001.html
+ [XXX]: https://www.eff.org/pages/tor-and-https/
+ [XXX]: https://people.torproject.org/~lunar/tor-and-https/
+ [XXX]: https://gitweb.torproject.org/user/lunar/tor-and-https.git/blob/HEAD:/tor-and-https.pot
+
+A Child’s Garden of Pluggable Transports
+----------------------------------------
+
+David Fifield published [XXX] “A Child’s Garden of Pluggable
+Transports” [XXX], a detailed visualization of different pluggable
+transport protocols, including “aspects of different transports that I
+think are hard to intuit, such as what flash proxy rendezvous looks
+like, and how transports look under the encrypted layer that is visible
+to a censor”. A few other transports supported by Tor [XXX] are not yet
+discussed in the guide; “if you know how to run any of those transports,
+and you know an effective way to visualize it, please add it to the
+page”, wrote David.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006891.html
+ [XXX]: https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
+ [XXX]: https://www.torproject.org/docs/pluggable-transports
Miscellaneous news
------------------
@@ -33,39 +82,6 @@
[XXX]: http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-May/000131.html
[XXX]: http://opensource.dyc.edu/tor-ramdisk
-Micah Lee published OnionShare [XXX], a program that “makes it simple to
-share a file securely using a password-protected Tor hidden service”. It
-originally ran only in Tails, but has now been made compatible with
-other GNU/Linux distros, Windows, and OS X. As part of that process,
-Micah wondered [XXX] about the best way to make the program work with a
-Tor Browser or system tor process, as “I would really like to not be in
-the business of distributing Tor myself”. meejah [XXX] and David
-Stainton [XXX] responded with relevant details of the Stem and txtorcon
-controller libraries, which allow this kind of operation to take place
-via tor’s ControlPort.
-
- [XXX]: https://github.com/micahflee/onionshare
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006895.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006896.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006899.html
- [XXX]: https://stem.torproject.org/
- [XXX]: https://github.com/meejah/txtorcon
-
-Lunar announced [XXX] the creation of a repository [XXX] for an
-SVG+Javascript version of the EFF’s interactive “Tor and HTTPS”
-visualization [XXX], which has proven useful in explaining to users the
-types of data that can be leaked or intercepted, and by whom, when using
-Tor or HTTPS (or both, or neither). As Lunar wrote, “The good news is
-that it’s translatable”: copies have so far been published in 18
-languages. The amount of translation required is very small, so if you'd
-like to contribute in your language then download the POT file [XXX] and
-submit a patch!
-
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-May/033001.html
- [XXX]: https://www.eff.org/pages/tor-and-https/
- [XXX]: https://people.torproject.org/~lunar/tor-and-https/
- [XXX]: https://gitweb.torproject.org/user/lunar/tor-and-https.git/blob/HEAD:/tor-and-https.pot
-
Cure53 audited the security [XXX] of the Onion Browser [XXX], a web
browser for iOS platforms tunneling traffic through Tor. From the
conclusion: “we believe that the Onion Browser project is on the right
@@ -77,20 +93,6 @@
[XXX]: https://cure53.de/pentest-report_onion-browser.pdf
[XXX]: https://mike.tig.as/onionbrowser/
[XXX]: https://mike.tig.as/onionbrowser/security/#v1_5
-
-David Fifield published [XXX] “A Child’s Garden of Pluggable
-Transports” [XXX], a detailed visualization of different pluggable
-transport protocols, including “aspects of different transports that I
-think are hard to intuit, such as what flash proxy rendezvous looks
-like, and how transports look under the encrypted layer that is visible
-to a censor”. A few other transports supported by Tor [XXX] are not yet
-discussed in the guide; “if you know how to run any of those transports,
-and you know an effective way to visualize it, please add it to the
-page”, wrote David.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-May/006891.html
- [XXX]: https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPluggableTransports
- [XXX]: https://www.torproject.org/docs/pluggable-transports
A new pluggable transport, currently named obfs4 [XXX], is being crafted by
Yawning Angel: “obfs4 is ScrambleSuit with djb crypto. Instead of obfs3 style
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list