[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Fri Aug 14 14:20:04 UTC 2015


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2015/31 ===
===========================================================================

version 2
Author: harmony
Date:   2015-08-14T13:49:52+00:00

   --

--- version 1
+++ version 2
@@ -15,66 +15,141 @@
 Contents
 --------
 
- 1. XXX
- 2. XXX
+ 1. Tor Browser 5.0 and 5.5a1 are out
+ 2. Tails 1.5 is out
+ 3. OnioNS beta testing version is out
+ 4. Miscellaneous news
+ 5. Upcoming events
 
-Feature XXX
------------
+Tor Browser 5.0 and 5.5a1 are out
+---------------------------------
 
-Feature 1 with cited source [XXX]
+The Tor Browser team put out two new releases of the privacy-preserving
+web browser. Version 5.0 [XXX], the first release in the new stable
+series, is based on Firefox 38ESR, “which should mean improved support
+for HTML5 video on Youtube, as well as a host of other improvements”.
+Updates to Tor Browser are now downloaded automatically in the
+background, removing the need for users to go through the update wizard
+manually. New privacy features in this release include first-party
+domain bar isolation of more identifier sources, and “defenses from the
+5.0-alpha series for keystroke (typing) fingerprinting and some
+instances of performance/timing fingerprinting”.
 
- [XXX]:
+The first alpha release [XXX] in the 5.5 series, meanwhile, fixes the recent
+pdf.js exploit [XXX] to which users of 5.0a3 and 5.0a4 had been
+vulnerable; it also contains a refined version of the new font
+fingerprinting defenses in which “Tor Browser now ships with a standard
+set of fonts, and prefers to use the provided fonts instead of native
+ones in most cases”.
 
-Monthly status reports for XXX month 2015
------------------------------------------
+For full changelogs and download instructions, please see the team’s
+announcements. Both of these new releases contain important security
+updates, so please upgrade your Tor Browser as soon as you can.
 
-The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+ [XXX]: https://blog.torproject.org/blog/tor-browser-50-released
+ [XXX]: https://blog.torproject.org/blog/tor-browser-55a1-released
+ [XXX]: https://blog.mozilla.org/security/2015/08/06/firefox-exploit-found-in-the-wild/
 
- [XXX]:
- [XXX]:
- [XXX]:
- [XXX]:
+Tails 1.5 is out
+----------------
+
+The Tails developers announced version 1.5 [XXX] of the anonymous live
+operating system. This release disables access to the local network in
+Tor Browser, restricting this activity to Tails’ “unsafe browser”. It
+also ships with Tor Browser 5.0, and a 32-bit GRUB EFI bootloader, so
+“Tails should now start on some tablets with Intel Bay Trail processors,
+among others”.
+
+For a list of all the changes in this release, please see the team’s
+announcement. This is an important security update, so please download
+your copy as soon as possible, either from the Tails website or via the
+incremental updater.
+
+ [XXX]: https://tails.boum.org/news/version_1.5/
+
+OnioNS beta testing version is out
+----------------------------------
+
+Jesse Victors announced [XXX] the first beta testing release of his Tor
+Summer of Privacy project, the Onion Name System (OnioNS). OnioNS is a
+distributed system that links hard-to-remember and hard-to-verify onion
+service addresses (such as “onions55e7yam27n.onion”) to domain names
+that are easier for humans to read and recall (like “example.tor”).
+
+The software that comprises OnioNS is divided into three main parts:
+OnioNS-HS, OnioNS-client, and OnioNS-server. These are respectively
+intended to be run by onion services wishing to claim domain names,
+clients (such as Tor Browser users) wanting to visit services using
+these names, and the servers that let the system function. Whichever
+software you download will also require the OnioNS-common library in
+order to work.
+
+This is a beta testing version, so Jesse warns that it is not ready to
+be used on production onion services and that name-claims made now may
+not survive in the long-term. If you’re willing to give the system a
+try, however, please see Jesse’s message for further information, and
+feel free to send “feedback as to how usable the system is and areas
+where it could be improved” to the tor-dev mailing list, or file issues
+on the bug tracker of the relevant software package [XXX].
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-August/009221.html
+ [XXX]: https://github.com/Jesse-V?tab=repositories
 
 Miscellaneous news
 ------------------
 
-Item 1 with cited source [XXX].
+Karsten Loesing deployed version 2.4 of Onionoo [XXX] , the Tor network
+data observatory. This release implements an optional “effective_family”
+field to Onionoo details documents, listing all the relays with which
+the relay in question is in an effective, mutual family relationship.
+“The main goal here is to make it easier to detect misconfigured relay
+families.  This can be relay operators or friendly people watching
+over the Tor network and reminding relay operators to fix their
+configurations.”
 
-Item 2 with cited source [XXX].
+ [XXX]: https://onionoo.torproject.org
 
-Item 3 with cited source [XXX].
+Colin Childs sent out a call [XXX] for new volunteers to man the Tor
+help desk, which offers individual support to Tor users all over the
+world. If you can use Tor Browser and other Tor software with confidence
+and have a good understanding of the theory behind Tor, know how to use
+GnuPG (or are willing to learn), and are an active member of the Tor
+community who wants to help users on an ongoing basis, then please see
+Colin’s message for more details.
 
- [XXX]:
- [XXX]:
- [XXX]:
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2015-August/038713.html
 
-Tor help desk roundup
----------------------
+The Tails project sent out its monthly report for July [XXX], featuring
+development updates, upcoming events, and summaries of ongoing
+discussions.
 
-Summary of some questions sent to the Tor help desk. 
+ [XXX]: https://tails.boum.org/news/report_2015_07/
 
-News from Tor StackExchange
----------------------------
+George Kadianakis sent out the SponsorR report [XXX], and also submitted
+his own status report for July [XXX].
 
-Text with cited source [XXX].
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-August/000896.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-August/000894.html
 
- [XXX]:
+Alec Muffett revived [XXX] the discussion around possible human factors
+to consider when devising a new and more secure system of onion
+addresses (such as the one suggested in proposal 224 [XXX]).
 
-Easy development tasks to get involved with
--------------------------------------------
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-August/009223.html
+ [XXX]: https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt
 
-Text with cited source [XXX].
+Sue Gardner invited [XXX] active Tor community members to take part in a
+short survey as part of her work to devise a long-term strategic plan
+for the Tor Project.
 
- [XXX]: 
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-August/009235.html
 
-This week in Tor history
-------------------------
+Thomas White put out a call [XXX] for “good guides on using Tor with
+common applications” to form part of a “small site dedicated to Tor
+usage [that] will convey, in as simple as possible terms, how to put as
+many applications as possible through Tor”.
 
-Text with cited source [XXX].
-
- [XXX]: 
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2015-August/038718.html
 
 Upcoming events
 ---------------
@@ -102,8 +177,7 @@
                    | https://ooni.torproject.org/event/adina15/
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Harmony.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list