[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Sep 23 13:00:12 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/38 ===
===========================================================================

version 39
Author: lunar
Date:   2014-09-23T12:22:43+00:00

   formatting

--- version 38
+++ version 39
@@ -213,7 +213,7 @@
 
 The tor daemon has a SafeLogging configuration option that removes all
 potentially sensitive parts of log messages and replaces them with
-[scrubbed]. However, this option does not cover hidden services
+“[scrubbed]”. However, this option does not cover hidden services
 operated by the tor daemon. Extending this option involves scanning
 through some code, but Nick says it could be some interesting code; if
 you're up to reading and patching some C code and then reading some

version 38
Author: harmony
Date:   2014-09-23T12:02:41+00:00

   fixes/user194's statement about slow relays being hsdirs is iffy

--- version 37
+++ version 38
@@ -189,22 +189,22 @@
 News from Tor StackExchange
 ---------------------------
 
-Jobiwan has a machine inside the network which should act as SOCKS proxy. When the
-Tor Browser is configured to use this proxy, it complains that something went wrong
-Tor does not work in this browser [XXX]. However Jobiwan can use Tor Browser with this
-settings and wants to know why this message is printed and if it is safe to use it
-this way. Do you know a good answer to this question? Please share your thoughts
-and provide an answer.
+Jobiwan has a machine on their network which should act as a SOCKS proxy.
+When Tor Browser is configured to use this proxy, it complains that Tor
+is not working in this browser [XXX]. However, Jobiwan is able to visit
+hidden services with these settings, and wants to know why this message
+is printed and if it is safe to use Tor Browser this way. Do you know a
+good answer to this question? If so, please share your thoughts.
 
  [XXX]: https://tor.stackexchange.com/q/4173/88
 
-Andy Smith asks if slow relays are useful for the Tor network [XXX]. Roya recommends
-that a large number of slow relays than a slow number of fast relays, at least
-anonymity-wise. This is because this helps to grow diversity in the network and makes
-it harder for the attacker to deanonymize users. On the other side user194 and Relay
-Operator wrote that a slow relay provides not much advantage for the network. They
-recommend to use it as Hidden Service directory or spend a few dollars renting a
-fast virtual server.
+Andy Smith asks if slow relays are useful for the Tor network [XXX].
+Roya suggests that a large number of slow relays is better than a small
+number of fast relays, at least anonymity-wise, because this helps to
+grow diversity in the network and makes it harder for an attacker to
+deanonymize users. On the other hand, user194 and Relay Operator write
+that a slow relay does not provide much benefit for the network. They
+recommend spending a few dollars more to rent a fast virtual server.
 
  [XXX]: https://tor.stackexchange.com/q/4050/88
 

version 37
Author: harmony
Date:   2014-09-23T11:50:35+00:00

   remove XXX

--- version 36
+++ version 37
@@ -10,8 +10,7 @@
 ========================================================================
 
 Welcome to the thirty-eighth issue in 2014 of Tor Weekly News, the
-weekly newsletter that covers what is happening in the XXX Tor
-community.
+weekly newsletter that covers what’s happening in the Tor community.
 
 The EFF concludes its 2014 Tor Challenge
 ----------------------------------------

version 36
Author: harmony
Date:   2014-09-23T11:49:33+00:00

   add credits

--- version 35
+++ version 36
@@ -247,8 +247,8 @@
                    | https://blog.torproject.org/events/www.icsi.berkeley.edu/icsi/events/2014/10/1984-plus-30
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-Matt Pagan.
+This issue of Tor Weekly News has been assembled by harmony, Lunar, qbi,
+Matt Pagan, Karsten Loesing, Arlo Breault, and Roger Dingledine.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 35
Author: harmony
Date:   2014-09-23T11:46:38+00:00

   add events

--- version 34
+++ version 35
@@ -226,13 +226,25 @@
 Upcoming events
 ---------------
 
-Jul XX-XX | Event XXX brief description
-          | Event City, Event Country
-          | Event website URL
-          |
-Jul XX-XX | Event XXX brief description
-          | Event City, Event Country
-          | Event website URL
+  Sep 24 13:30 UTC | little-t tor development meeting
+                   | #tor-dev, irc.oftc.net 
+                   |
+  Sep 24 16:00 UTC | Pluggable transport online meeting
+                   | #tor-dev, irc.oftc.net
+                   |
+  Sep 26 17:00 CET | OONI development meeting
+                   | #ooni, irc.oftc.net
+                   |
+  Sep 29 18:00 UTC | Tor Browser online meeting
+                   | #tor-dev, irc.oftc.net
+                   |
+  Oct 03 21:00 CET | Tails contributors meeting
+                   | #tails-dev, irc.indymedia.org/h7gf2ha3hefoj5ls.onion
+                   | https://mailman.boum.org/pipermail/tails-project/2014-September/000037.html
+                   |
+  Oct 06 08:30 PDT | Roger @ ISCI “1984+30” panel
+                   | UC Berkeley, California, USA
+                   | https://blog.torproject.org/events/www.icsi.berkeley.edu/icsi/events/2014/10/1984-plus-30
 
 
 This issue of Tor Weekly News has been assembled by XXX, XXX, and
@@ -250,5 +262,4 @@
 
 Possible items:
 
- * (event) https://mailman.boum.org/pipermail/tails-project/2014-September/000037.html next Tails contributors meeting
  * Attack linking Tor circuits https://lists.torproject.org/pipermail/tor-dev/2014-September/thread.html#7489

version 34
Author: harmony
Date:   2014-09-23T11:39:08+00:00

   add bugtoplug

--- version 33
+++ version 34
@@ -212,9 +212,16 @@
 Easy development tasks to get involved with
 -------------------------------------------
 
-Text with cited source [XXX].
-
- [XXX]: 
+The tor daemon has a SafeLogging configuration option that removes all
+potentially sensitive parts of log messages and replaces them with
+[scrubbed]. However, this option does not cover hidden services
+operated by the tor daemon. Extending this option involves scanning
+through some code, but Nick says it could be some interesting code; if
+you're up to reading and patching some C code and then reading some
+(hopefully scrubbed) logs, this ticket may be for you. Be sure to post
+your branch for review on the ticket [XXX].
+
+ [XXX]: https://bugs.torproject.org/2743
 
 Upcoming events
 ---------------

version 33
Author: harmony
Date:   2014-09-23T11:29:20+00:00

   write tails item

--- version 32
+++ version 33
@@ -92,6 +92,16 @@
 Miscellaneous news
 ------------------
 
+The Tails team wants to make sure that all the Debian packages on which
+Tails relies are “in good shape” before Jessie, the next Debian release,
+is frozen on 5th November. To that end, the team called for testing both
+of the software itself [XXX] and its translations [XXX] — if you’d like
+to help, find full instructions and links to the “barely-working”
+experimental disk images in the announcements.
+
+ [XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-September/000071.html
+ [XXX]: https://mailman.boum.org/pipermail/tails-l10n/2014-September/001553.html
+
 meek [XXX], the pluggable transport that routes Tor traffic through
 platforms which are “too big to block”, now works with Microsoft Azure
 in addition to the already-supported Google App Engine and Amazon Web
@@ -235,4 +245,3 @@
 
  * (event) https://mailman.boum.org/pipermail/tails-project/2014-September/000037.html next Tails contributors meeting
  * Attack linking Tor circuits https://lists.torproject.org/pipermail/tor-dev/2014-September/thread.html#7489
- * Please test l10n status of Tails/Jessie https://mailman.boum.org/pipermail/tails-l10n/2014-September/001553.html test our experimental Tails/Jessie ISO images https://mailman.boum.org/pipermail/tails-testers/2014-September/000071.html

version 32
Author: qbi
Date:   2014-09-23T11:08:21+00:00

   Tor.SE: slow relays

--- version 31
+++ version 32
@@ -189,6 +189,16 @@
 
  [XXX]: https://tor.stackexchange.com/q/4173/88
 
+Andy Smith asks if slow relays are useful for the Tor network [XXX]. Roya recommends
+that a large number of slow relays than a slow number of fast relays, at least
+anonymity-wise. This is because this helps to grow diversity in the network and makes
+it harder for the attacker to deanonymize users. On the other side user194 and Relay
+Operator wrote that a slow relay provides not much advantage for the network. They
+recommend to use it as Hidden Service directory or spend a few dollars renting a
+fast virtual server.
+
+ [XXX]: https://tor.stackexchange.com/q/4050/88
+
 Easy development tasks to get involved with
 -------------------------------------------
 



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list