[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Mon Oct 27 23:40:06 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/43 ===
===========================================================================
version 12
Author: harmony
Date: 2014-10-27T23:02:16+00:00
me/remove unused sections
--- version 11
+++ version 12
@@ -1,6 +1,6 @@
''69th issue of Tor Weekly News. Covering what's happening from October 21st, 2014 to October 28th, 2014. To be released on October 29th, 2014.''
-'''Editor:'''
+'''Editor:''' Harmony
'''Subject:''' Tor Weekly News — October 29th, 2014
@@ -10,7 +10,7 @@
========================================================================
Welcome to the forty-third issue in 2014 of Tor Weekly News, the weekly
-newsletter that covers what is happening in the XXX Tor community.
+newsletter that covers what’s happening in the Tor community.
Tor 0.2.5.10 is out
-------------------
@@ -121,13 +121,6 @@
[XXX]: https://tor.stackexchange.com/q/4452/88
-Easy development tasks to get involved with
--------------------------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
-
Upcoming events
---------------
version 11
Author: harmony
Date: 2014-10-27T23:00:52+00:00
consistency
--- version 10
+++ version 11
@@ -12,8 +12,8 @@
Welcome to the forty-third issue in 2014 of Tor Weekly News, the weekly
newsletter that covers what is happening in the XXX Tor community.
-Tor 0.2.5.10 is released
-------------------------
+Tor 0.2.5.10 is out
+-------------------
The 0.2.5.x branch of the core Tor software hit stable, with the release
of 0.2.5.10. As Nick Mathewson explained [XXX], there have been no
version 10
Author: harmony
Date: 2014-10-27T23:00:04+00:00
the story so far
--- version 9
+++ version 10
@@ -12,42 +12,96 @@
Welcome to the forty-third issue in 2014 of Tor Weekly News, the weekly
newsletter that covers what is happening in the XXX Tor community.
-Feature XXX
------------
+Tor 0.2.5.10 is released
+------------------------
-Feature 1 with cited source [XXX]
+The 0.2.5.x branch of the core Tor software hit stable, with the release
+of 0.2.5.10. As Nick Mathewson explained [XXX], there have been no
+changes since last week’s 0.2.5.9-rc release, and the new features will
+be familiar to readers of Tor Weekly News over the past year of
+development, but highlights include “improved denial-of-service
+resistance for relays, new compiler hardening options, and a system-call
+sandbox for hardened installations on Linux”, as well as improvements to
+transparent proxying, building and testing, pluggable transport
+usability, and much more.
- [XXX]:
+This release means that Tor versions in the 0.2.3.x series, which has
+“received no patches or attention for some while” and “accumulated many
+known flaws” [XXX], are now deprecated. Relay operators running these
+versions must upgrade as soon as possible, or risk having their relays
+rejected from the network in the near future.
-Monthly status reports for XXX month 2014
------------------------------------------
+Please see Nick’s release announcement for the full changelog, and
+download your copy of the 0.2.5.10 source code from the distribution
+directory [XXX] or a prebuilt package from your usual repositories.
-The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
-
- [XXX]:
- [XXX]:
- [XXX]:
- [XXX]:
+ [XXX]: https://lists.torproject.org/pipermail/tor-announce/2014-October/000096.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-October/005590.html
+ [XXX]: https://dist.torproject.org/
Miscellaneous news
------------------
-Item 1 with cited source [XXX].
+Jacob Appelbaum announced [XXX] version 0.1.3 of TorBirdy, a torifying
+extension for the Thunderbird email client. Among other things, this
+release fixes the recently-reported “wrote:” bug [XXX], disables the
+automatic downloading of messages from POP3 accounts, and ensures that
+draft messages for IMAP accounts are stored on the local system rather
+than sent over the network. However, as Jacob wrote, “it’s still
+experimental”, so “use at your own risk”. See the release announcement
+for a full changelog.
-Item 2 with cited source [XXX].
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-October/035326.html
+ [XXX]: https://bugs.torproject.org/13480
-Item 3 with cited source [XXX].
+Anthony G. Basile announced [XXX] version 20141022 of tor-ramdisk, the
+micro Linux distribution whose only purpose is to host a Tor server in
+an environment that maximizes security and privacy. This release
+addresses the recent POODLE attack [XXX] with updates to Tor and
+OpenSSL, and also upgrades the Linux kernel.
- [XXX]:
- [XXX]:
- [XXX]:
+ [XXX]: http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-October/000134.html
+ [XXX]: https://blog.torproject.org/blog/new-sslv3-attack-found-disable-sslv3-torbrowser
-Tor help desk roundup
----------------------
+Yawning Angel called for testing [XXX] of the revamped tor-fw-helper, a
+tool that automates the port forwarding required (for example) by the
+flash proxy [XXX] pluggable transport. Please see Yawning’s message for
+full testing instructions and other important information: “Questions,
+Comments, Feedback appreciated”.
-Summary of some questions sent to the Tor help desk.
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-October/007670.html
+ [XXX]: https://crypto.stanford.edu/flashproxy/
+
+On the Tor blog, Andrew Lewman responded [XXX] to the abuse of Tor by
+creators of so-called “ransomware”, or malware that tries to restrict
+access to users’ files unless a ransom is paid; these extortionists
+sometimes ask their victims to install Tor software in order to
+communicate with them over a hidden service, leading users to the
+mistaken belief that The Tor Project is somehow involved. As Andrew
+wrote, this software “is unrelated to The Tor Project. We didn’t produce
+it, and we didn’t ask to be included in the criminal infection of any
+computer.” Users may find the information provided by the BBC [XXX] and
+Bleeping Computer [XXX] to be helpful in resolving the problem.
+
+ [XXX]: https://blog.torproject.org/blog/tor-misused-criminals
+ [XXX]: https://www.bbc.com/news/technology-28661463
+ [XXX]: http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
+
+Josh Pitts posted an analysis [XXX] of apparently malicious behavior by
+a Tor relay that was modifying binary files downloaded over Tor circuits
+in which it was the exit node. As Roger Dingledine responded [XXX],
+“we’ve now set the BadExit flag on this relay, so others won’t
+accidentally run across it”.
+
+ [XXX]: http://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-October/035340.html
+
+David Fifield pointed out [XXX] “an apparent negative correlation
+between obfs3 users and vanilla users” in the Tor Metrics portal’s
+bridge user graphs [XXX] and wondered what might be causing it.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-October/007659.html
+ [XXX]: https://metrics.torproject.org/users.html?graph=userstats-bridge-transport&transport=%3COR%3E&transport=obfs3#userstats-bridge-transport
News from Tor StackExchange
---------------------------
@@ -98,12 +152,3 @@
[XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
[XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
}}}
-
- * TorBirdy 0.1.3 released https://lists.torproject.org/pipermail/tor-talk/2014-October/035326.html
- * Tor-ramdisk 20141022 released http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-October/000134.html
- * Tor 0.2.5.10 *stable* https://lists.torproject.org/pipermail/tor-announce/2014-October/000096.html
- * https://blog.torproject.org/blog/tor-misused-criminals
- * The phantom patcher https://lists.torproject.org/pipermail/tor-talk/2014-October/035340.html
- * 0.2.3 is deprecated https://lists.torproject.org/pipermail/tor-relays/2014-October/005590.html
- * tor-fw-helper redux https://lists.torproject.org/pipermail/tor-dev/2014-October/007670.html
- * seeming anticorrelation between obfs3 and vanilla bridges https://lists.torproject.org/pipermail/tor-dev/2014-October/007659.html
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list