[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Sep 22 16:20:04 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/38 ===
===========================================================================

version 22
Author: harmony
Date:   2014-09-22T15:48:46+00:00

   some fixes

--- version 21
+++ version 22
@@ -64,27 +64,28 @@
 
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-September/034898.html
 
-Released in December 2013, the SafePlug is a $49 router promising its
+Released in December 2013, the SafePlug is a $49 router that promises its
 users “complete security and anonymity” online by sending all of their
 traffic through Tor. Annie Edmundson from Princeton University released a
-summary [XXX] of the research presented during FOCI’14 [XXX]. The
-authors point out several security problem in the implementation of the
-SafePlug administration interface, and also emphasis more structural
-problems. “The most crucial problem with a torifying proxy is that it
+summary [XXX] of research presented during FOCI’14 [XXX] in which the
+authors point out several security problems in the implementation of the
+SafePlug administration interface, and also highlight other structural
+issues. “The most crucial problem with a torifying proxy is that it
 uses a bring-your-own-browser system, as opposed to a hardened browser,
 and therefore is susceptible to browser-based privacy leaks. This is why
-it’s better to use the Tor Browser Bundle […]” write Annie.
+it’s better to use the Tor Browser Bundle […]”, wrote Annie.
 
  [XXX]: https://freedom-to-tinker.com/blog/annee/security-audit-of-safeplug-tor-in-a-box/
  [XXX]: https://www.usenix.org/system/files/conference/foci14/foci14-edmundson.pdf
 
 The upcoming Tor Instant Messenger is based on Instantbird [XXX]. One
 key feature that was identified as missing in the latter is support for
-Off-The-Record encryption. After months of discussions and reviews
+Off-the-Record encryption [XXX]. After months of discussions and reviews
 to determine the right programming interface, Arlo Breault got the core
 modifications needed merged [XXX,XXX].
 
  [XXX]: http://instantbird.com/
+ [XXX]: https://otr.cypherpunks.ca/
  [XXX]: https://hg.mozilla.org/comm-central/rev/d2a0c6d324fa
  [XXX]: https://hg.mozilla.org/users/florian_queze.net/purple/rev/d971cac153ee
 

version 21
Author: harmony
Date:   2014-09-22T15:21:50+00:00

   write eff item

--- version 20
+++ version 21
@@ -1,6 +1,6 @@
 ''64th issue of Tor Weekly News. Covering what's happening from September 16th, 2014 to September 23rd, 2014. To be released on September 24th, 2014.''
 
-'''Editor:'''
+'''Editor:''' harmony
 
 '''Subject:''' Tor Weekly News — September 24th, 2014
 
@@ -13,12 +13,37 @@
 weekly newsletter that covers what is happening in the XXX Tor
 community.
 
-Feature XXX
------------
+The EFF concludes its 2014 Tor Challenge
+----------------------------------------
 
-Feature 1 with cited source [XXX]
+As Tor Weekly News reported in June [XXX], over the last few months the
+Electronic Frontier Foundation has been holding its second Tor Challenge
+to improve the strength and diversity of the Tor network by inspiring
+people to run Tor relays. The 2014 Challenge is now over, and Rainey
+Reitman of the EFF posted [XXX] some thoughts on the campaign and its
+outcome.
 
- [XXX]:
+1635 Tor relays (including 326 exit relays) were started up or had
+their capacity increased as part of the 2014 Tor Challenge, compared to
+549 at the end of the last campaign in 2011. As Rainey wrote, this
+number “far exceeded our hopes”; the success can be attributed to a
+coordinated promotional effort by the EFF, the Free Software Foundation,
+the Freedom of the Press Foundation, and the Tor Project, as well as to
+“the 1,000 individuals who cared enough to help contribute bandwidth to
+the Tor network.” Thanks to everyone who participated!
+
+It’s important to remember, though, that new relays only benefit Tor
+users as long as they stay running. Advice and support from experienced
+relay operators can always be found on the #tor IRC channel or the
+tor-relays mailing list [XXX]; if you missed out on the Tor Challenge
+this year but still want to contribute to a stronger, more stable Tor
+network, take a look at the Tor website [XXX] for advice on how to get
+started.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-news/2014-June/000049.html
+ [XXX]: https://www.eff.org/deeplinks/2014/09/tor-challenge-inspires-1635-tor-relays
+ [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
+ [XXX]: https://www.torproject.org/docs/tor-doc-relay
 
 Miscellaneous news
 ------------------
@@ -141,4 +166,3 @@
  * Guardiness: Yet another external dirauth script https://lists.torproject.org/pipermail/tor-dev/2014-September/007489.html
  * (event) https://mailman.boum.org/pipermail/tails-project/2014-September/000037.html next Tails contributors meeting
  * Attack linking Tor circuits https://lists.torproject.org/pipermail/tor-dev/2014-September/thread.html#7489
- * EFF's Tor challenge is over https://www.eff.org/deeplinks/2014/09/tor-challenge-inspires-1635-tor-relays



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list