[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Apr 14 18:20:03 UTC 2015
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2015/15 ===
===========================================================================
version 3
Author: harmony
Date: 2015-04-14T17:33:37+00:00
this week
--- version 2
+++ version 3
@@ -1,6 +1,6 @@
''93rd issue of Tor Weekly News. Covering what's happening from April 7th, 2015 to April 14th, 2015. To be released on April 15th, 2015.''
-'''Editor:'''
+'''Editor:''' Harmony
'''Subject:''' Tor Weekly News — April 15th, 2015
@@ -10,78 +10,174 @@
========================================================================
Welcome to the fifteenth issue in 2015 of Tor Weekly News, the weekly
-newsletter that covers what’s happening in the XXX Tor community.
+newsletter that covers what’s happening in the Tor community.
-Feature XXX
------------
+Contents
+--------
-Feature 1 with cited source [XXX]
+ 1. Tor Browser 4.0.8 is out
+ 2. Hidden services that aren’t hidden
+ 3. Tor Summer of Privacy — entry closing soon!
+ 4. More monthly status reports for March 2015
+ 5. Miscellaneous news
+ 6. Upcoming events
- [XXX]:
+Tor Browser 4.0.8 is out
+------------------------
-Monthly status reports for XXX month 2015
------------------------------------------
+Mike Perry announced [XXX] a new stable release by the Tor Browser team.
+This version is exactly the same as 4.0.7, which was briefly advertised
+to users last week but then withdrawn because a bug [XXX] would have
+caused it to endlessly recommend updating.
-The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+This release includes Tor 0.2.5.12, which fixes the recent onion
+service [XXX] and client [XXX] crash bugs.
- [XXX]:
- [XXX]:
- [XXX]:
- [XXX]:
+There is no corresponding Tor Browser alpha update; that series will
+become the new stable release in a couple of weeks.
-Tails published their monthly report for March. https://tails.boum.org/news/report_2015_03 Read to know what happened and some of the future plans :)
+Download your copy of Tor Browser 4.0.8 from the project page [XXX], or
+over the in-browser update system.
+
+ [XXX]: https://blog.torproject.org/blog/tor-browser-408-released
+ [XXX]: https://bugs.torproject.org/15637
+ [XXX]: https://bugs.torproject.org/15600
+ [XXX]: https://bugs.torproject.org/15601
+ [XXX]: https://www.torproject.org/projects/torbrowser.html
+
+Hidden services that aren’t hidden
+----------------------------------
+
+As the name implies, Tor hidden services (also known as “onion
+services”) are location-hidden and anonymous, just like regular Tor
+clients. There may be instances, however, in which a potential hidden
+service operator doesn’t much care about being hidden: they are more
+interested in the other unique properties of hidden services, like free
+end-to-end encryption and authentication, or they want to prevent their
+users from accidentally sending information non-anonymously. For
+example, even though everyone knows who Facebook are and where to find
+them, their users still have things to gain from using their .onion
+address [XXX].
+
+At the moment, these kinds of services are still forced to use the
+regular hidden service protocol, meaning they connect to rendezvous
+points [XXX] over a Tor circuit. Hiding someone who doesn’t want to be
+hidden is an inefficient use of network resources, and needlessly slows
+down connections to the service in question, so Tor developers have been
+discussing the possibility of enabling “direct onion services”, which
+sacrifice anonymity for improved performance.
+
+George Kadianakis requested feedback on a draft [XXX] of a Tor proposal
+for this feature. One of the major questions still to be resolved is how
+to ensure that nobody enables this option by mistake, or fails to
+understand the implications for their service’s anonymity. Possible
+solutions include choosing a better name, making the configuration file
+option sound more ominous, or even requiring the operator to compile Tor
+themselves with a special flag.
+
+See George’s proposal for more use-cases and full details of the
+concept, and feel free to comment on the tor-dev list thread.
+
+ [XXX]: https://blog.torproject.org/blog/facebook-hidden-services-and-https-certs
+ [XXX]: https://www.torproject.org/docs/hidden-services
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-April/008625.html
+
+Tor Summer of Privacy — entry closing soon!
+-------------------------------------------
+
+If you’d like to participate in the first-ever Tor Summer of
+Privacy [XXX], you still have the chance — but be quick, as the
+application period closes on Friday.
+
+Competition for places is already strong, so make it as easy as possible
+for your entry to be chosen: look at previous applications [XXX] for an
+idea of what Tor developers like to see, drum up interest from potential
+mentors on the tor-dev mailing list [XXX] or IRC channel [XXX], link to
+your best code samples, and show the community that you can take the
+initiative in moving your project forward. Good luck!
+
+ [XXX]: https://trac.torproject.org/projects/tor/wiki/org/TorSoP
+ [XXX]: https://www.torproject.org/about/gsoc#Example
+ [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev
+ [XXX]: https://www.torproject.org/about/contact#irc
+
+More monthly status reports for March 2015
+------------------------------------------
+
+A few more Tor developers submitted monthly reports for March: Isis
+Lovecruft [XXX] (for work on BridgeDB and pluggable transports), Arlo
+Breault [XXX] (reporting on Tor Messenger and Tor Check), and Karsten
+Loesing [XXX] (for projects including hidden service statistics,
+translation coordination, and Tor network tools).
+
+The Tails team published its March report [XXX]. Take a look for updates
+on development, funding, and outreach; summaries of ongoing discussions;
+Tails in the media; and much more besides.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000802.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000803.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-April/000804.html
+ [XXX]: https://tails.boum.org/news/report_2015_03
Miscellaneous news
------------------
-Item 1 with cited source [XXX].
+Nathan Freitas announced [XXX] the third release candidate for Orbot
+v15. This version supports the x86 processor architecture, so devices
+such as the Galaxy Tab 3 and the Asus Zenphone/Padphone are now
+officially Tor-compatible. See Nathan’s announcement for the full
+changelog.
-Item 2 with cited source [XXX].
+ [XXX]: https://lists.mayfirst.org/pipermail/guardian-dev/2015-April/004316.html
-Item 3 with cited source [XXX].
+Giovanni Pellerano announced [XXX] GlobalLeaks 2.60.65, featuring lots
+of bugfixes, improved localization (including eight new languages), and
+more.
- [XXX]:
- [XXX]:
- [XXX]:
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2015-April/037457.html
-Tor help desk roundup
----------------------
+David Fifield located and fixed [XXX] a problem with meek’s Microsoft
+Azure backend that was causing it to run much more slowly than the other
+two options. “If you tried meek-azure before, but it was too slow, give
+it another try!”
-Summary of some questions sent to the Tor help desk.
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-April/008637.html
-News from Tor StackExchange
----------------------------
+Thanks to John Penner [XXX] for running a mirror of the Tor Project’s
+website and software!
-Text with cited source [XXX].
-
- [XXX]:
-
-Easy development tasks to get involved with
--------------------------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
-
-This week in Tor history
-------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
+ [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2015-April/000870.html
Upcoming events
---------------
-Jul XX-XX | Event XXX brief description
- | Event City, Event Country
- | Event website URL
- |
-Jul XX-XX | Event XXX brief description
- | Event City, Event Country
- | Event website URL
+ Apr 15 13:30 UTC | little-t tor development meeting
+ | #tor-dev, irc.oftc.net
+ |
+ Apr 16 - 18 | Roger @ 2015 German-American Frontiers of Engineering Symposium
+ | Potsdam, Germany
+ | http://www.naefrontiers.org/Symposia/GAFOE/21649/44840.aspx
+ |
+ Apr 20 18:00 UTC | Tor Browser online meeting
+ | #tor-dev, irc.oftc.net
+ |
+ Apr 20 18:00 UTC | OONI development meeting
+ | #ooni, irc.oftc.net
+ |
+ Apr 21 18:00 UTC | little-t tor patch workshop
+ | #tor-dev, irc.oftc.net
+ |
+ Apr 24 | Roger @ CTIC Privacy Conference
+ | University of Pennsylvania Law School
+ | https://www.law.upenn.edu/newsevents/calendar.php#event_id/48977/view/event
+ |
+ Apr 29 02:00 UTC | Pluggable transports/bridges meeting
+ | #tor-dev, irc.oftc.net
+ | https://lists.torproject.org/pipermail/tor-dev/2015-April/008627.html
+ |
+ May 05 - 06 | Andrew @ Collision
+ | Las Vegas, USA
+ | https://collisionconf.com
This issue of Tor Weekly News has been assembled by XXX, XXX, and
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list