[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Jan 6 21:40:05 UTC 2015


===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2015/1 ====
===========================================================================

version 6
Author: harmony
Date:   2015-01-06T21:06:27+00:00

   capitalize

--- version 5
+++ version 6
@@ -126,7 +126,7 @@
  [XXX]: https://metrics.torproject.org/about.html#consensus
  [XXX]: https://metrics.torproject.org/about.html#directory-authority
 
-Nick also clarified [XXX] that a recently-discovered libevent
+Nick also clarified [XXX] that a recently-discovered Libevent
 vulnerability has no effect on Tor.
 
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2015-January/036379.html

version 5
Author: harmony
Date:   2015-01-06T21:05:03+00:00

   write

--- version 4
+++ version 5
@@ -1,6 +1,6 @@
 ''79th issue of Tor Weekly News. Covering what's happening from December 30th, 2014 to January 6th, 2015. To be released on January 7th, 2015.''
 
-'''Editor:''' 
+'''Editor:''' Harmony
 
 '''Subject:''' Tor Weekly News — January 7th, 2015
 
@@ -10,82 +10,185 @@
 ========================================================================
 
 Welcome to the first issue in 2015 of Tor Weekly News, the weekly
-newsletter that covers what’s happening in the XXX Tor community.
-
-Feature XXX
+newsletter that covers what’s happening in the Tor community.
+
+Tor 0.2.6.2-alpha is out
+------------------------
+
+Nick Mathewson announced [XXX] the second alpha release in the Tor
+0.2.6.x series. As well as including the cell scheduling changes [XXX]
+and hidden service statistics collection [XXX] reported in recent issues
+of TWN, this release makes it harder to portscan hidden services by
+closing circuits if a client tries to connect to a non-existent port. It
+also contains numerous bugfixes and new unit tests; please see Nick’s
+announcement for the full changelog. The source code is available as
+usual from the distribution directory [XXX].
+
+ [XXX]: https://blog.torproject.org/blog/tor-0262-alpha-released
+ [XXX]: https://bugs.torproject.org/9262
+ [XXX]: https://bugs.torproject.org/13192
+ [XXX]: https://dist.torproject.org/
+
+Tor at 31c3
 -----------
 
-Feature 1 with cited source [XXX]
-
- [XXX]:
-
-Monthly status reports for XXX month 2014
------------------------------------------
+The 31st edition of the Chaos Communication Congress [XXX], an annual
+highlight in the free software and security calendar, took place in
+Hamburg, and as usual Tor featured in several key talks over the course
+of the long weekend.
+
+Roger Dingledine and Jacob Appelbaum’s appropriately grand-sounding
+“State of the Onion” address [XXX], a round-up of the year’s
+events in the Tor community, took place once again, with guest
+contributions from journalist and filmmaker Laura Poitras and OONI
+developer Arturo Filastò. Topics included the relationship between
+censorship and surveillance, the misinterpretation of academic research
+by journalists, new pluggable transports, and much more.
+
+Laura Poitras also joined Julia Angwin, Jack Gillum, and Nadia Heninger
+for “Crypto Tales from the Trenches” [XXX], in which the journalists
+described their experiences with security software when doing research
+and communicating with sources. “I don’t think any of us could do our
+work without Tor”, said Laura, while Julia described the Tails operating
+system as “her favorite success story” in this field.
+
+Tor Browser developer Mike Perry joined Seth Schoen to discuss [XXX] the
+concept of deterministic builds, the implementation of which has been
+one of the Tor Project’s major successes over the past year. Mike and
+Seth demonstrated some of the attacks that this system aims to defend
+against, as well as the work that Tor, F-Droid, and Debian have all been
+doing to make their processes compatible with the deterministic build
+process.
+
+Finally, Dr. Gareth Owen of Portsmouth University presented [XXX] the
+results of research into the content and usage of Tor hidden
+services. The research involved setting up a number of Tor relays,
+waiting until they gained the “HSDir” flag, then counting the number of
+times a particular service’s descriptor was requested, as well as
+manually categorizing the services whose descriptors were learned. Dr.
+Owen found that while the largest category of onion services by number
+could be characterized as “drugs”, the majority of the descriptor
+requests he saw were for services in his “abuse” category. The talk
+itself discusses some possible limitations of the data gathered, and Tor
+developers have responded on the Tor blog with further
+analysis [XXX, XXX].
+
+ [XXX]: https://events.ccc.de/congress/2014/wiki/Main_Page
+ [XXX]: http://media.ccc.de/browse/congress/2014/31c3_-_6251_-_en_-_saal_1_-_201412301400_-_state_of_the_onion_-_jacob_-_arma.html
+ [XXX]: http://media.ccc.de/browse/congress/2014/31c3_-_6154_-_en_-_saal_1_-_201412272300_-_crypto_tales_from_the_trenches_-_nadia_heninger_-_julia_angwin_-_laura_poitras_-_jack_gillum.html
+ [XXX]: http://media.ccc.de/browse/congress/2014/31c3_-_6240_-_en_-_saal_g_-_201412271400_-_reproducible_builds_-_mike_perry_-_seth_schoen_-_hans_steiner.html
+ [XXX]: http://media.ccc.de/browse/congress/2014/31c3_-_6112_-_en_-_saal_2_-_201412301715_-_tor_hidden_services_and_deanonymisation_-_dr_gareth_owen.html
+ [XXX]: https://blog.torproject.org/blog/tor-80-percent-percent-1-2-percent-abusive
+ [XXX]: https://blog.torproject.org/blog/some-thoughts-hidden-services
+
+Monthly status reports for December 2014
+----------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
-
- [XXX]:
- [XXX]:
- [XXX]:
- [XXX]:
+month of December has begun. Philipp Winter released his report
+first [XXX], followed by reports from Damian Johnson [XXX], Pearl
+Crescent [XXX], Juha Nurmi [XXX], Nick Mathewson [XXX], Sherief
+Alaa [XXX], Sukhbir Singh [XXX], Leiah Jansen [XXX], David Goulet [XXX],
+Michael Schloh von Bennewitz [XXX], Colin C. [XXX], Georg Koppen [XXX],
+Arlo Breault [XXX], and George Kadianakis [XXX].
+
+Colin C. also sent out the help desk report [XXX], while Arturo Filastò
+reported on behalf of the OONI team [XXX] and Mike Perry for the Tor
+Browser team [XXX].
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000727.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000728.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000729.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000730.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000731.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-December/000732.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000733.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000734.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000735.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000736.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000738.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000740.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000742.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000743.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000737.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000739.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2015-January/000741.html
 
 Miscellaneous news
 ------------------
 
-ChatSecure iOS v3.0 has been released [XXX].  ChatSecure has added Tor support using Claudiu-Vlad Ursache’s CPAProxy.  It's currently in testing and not to be used for strong anonymity, but it's a good step forward.  Download ChatSecure from the App Store or compile from Github. 
-
-Item 2 with cited source [XXX].
-
-Item 3 with cited source [XXX].
-
- [https://chatsecure.org/blog/chatsecure-ios-v3-released/]:
- [XXX]:
- [XXX]:
- [XXX]:
- [XXX]:
-
-Tor help desk roundup
----------------------
-
-Summary of some questions sent to the Tor help desk. 
-
-News from Tor StackExchange
----------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
-
-Easy development tasks to get involved with
--------------------------------------------
-
-Text with cited source [XXX].
-
- [XXX]: 
-
-This week in Tor history
-------------------------
-
-Text with cited source [XXX].
-
- [XXX]: 
+Nick Mathewson and Andrea Shepard drafted a proposal [XXX] for including
+a hash chain in the consensus [XXX] produced by Tor directory
+authorities, in order to prevent certain kinds of attack on the dirauths
+and their keys.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-January/008087.html
+ [XXX]: https://metrics.torproject.org/about.html#consensus
+ [XXX]: https://metrics.torproject.org/about.html#directory-authority
+
+Nick also clarified [XXX] that a recently-discovered libevent
+vulnerability has no effect on Tor.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2015-January/036379.html
+
+In connection with the current push to collect statistics relating to
+Tor hidden services in a privacy-preserving manner, Aaron Johnson
+noted [XXX] that there are two further desirable sets of statistics
+which might pose a risk to anonymity if gathered incorrectly, and
+discussed possible solutions to the problem.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-January/008086.html
+
+David Fifield published a summary [XXX] of costs incurred by the meek
+pluggable transport for the month of December 2014.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-January/008082.html
+
+David also continued his experiments on historical Tor metrics data with
+visualizations of a recent sybil attack [XXX], and wondered [XXX] what
+might have been responsible for a sudden change in the way that users in
+Kazakhstan were choosing to connect to the Tor network in October 2014.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2015-January/008095.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-talk/2015-January/036346.html
+
+Sebastian Urbach noted [XXX] a sudden drop in the number of Tor relays
+acting as hidden service directories, and wondered about the cause. As
+SiNA Rabbani clarified [XXX], the amount of time a relay needs to have
+been running before it earns the “HSDir” flag was increased by directory
+authorities, in response to a recent sybil attack.
+
+ [XXX]: https://lists.torproject.org/pipermail/tor-relays/2015-January/006051.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-relays/2015-January/006063.html
+
+The developers of ChatSecure for iOS announced [XXX] that their recent
+3.0 release includes experimental support for connections to XMPP chat
+servers over Tor, and briefly described how they added the new feature.
+
+ [XXX]: https://chatsecure.org/blog/chatsecure-ios-v3-released/
 
 Upcoming events
 ---------------
 
-Jul XX-XX | Event XXX brief description
-          | Event City, Event Country
-          | Event website URL
-          |
-Jul XX-XX | Event XXX brief description
-          | Event City, Event Country
-          | Event website URL
-
-
-This issue of Tor Weekly News has been assembled by XXX, David Fifield, and
-XXX.
+  Jan 07 13:30 UTC | little-t tor development meeting
+                   | #tor-dev, irc.oftc.net
+                   |
+  Jan 12 18:00 UTC | Tor Browser online meeting
+                   | #tor-dev, irc.oftc.net
+                   |
+  Jan 12 18:00 UTC | OONI development meeting
+                   | #ooni, irc.oftc.net
+                   |
+  Jan 13 18:00 UTC | little-t tor patch workshop
+                   | #tor-dev, irc.oftc.net
+                   |
+  Jan 16 19:30 UTC | Tails/Jessie progress meeting
+                   | #tails-dev, irc.oftc.net
+                   | https://mailman.boum.org/pipermail/tails-dev/2014-December/007696.html
+
+
+This issue of Tor Weekly News has been assembled by Harmony, David
+Fifield, and Catfish.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
@@ -96,11 +199,3 @@
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
-
-Possible items:
-
-* [http://events.ccc.de/congress/2014/wiki/Static:Main_Page 31c3] talks
- * [http://media.ccc.de/browse/congress/2014/31c3_-_6251_-_en_-_saal_1_-_201412301400_-_state_of_the_onion_-_jacob_-_arma.html State of the Onion] ([http://events.ccc.de/congress/2014/Fahrplan/events/6251.html schedule]).
- * [http://media.ccc.de/browse/congress/2014/31c3_-_6240_-_en_-_saal_g_-_201412271400_-_reproducible_builds_-_mike_perry_-_seth_schoen_-_hans_steiner.html  Reproducible Builds: Moving Beyond Single Points of Failure for Software Distribution] ([http://events.ccc.de/congress/2014/Fahrplan/events/6240.html schedule]). Mike Perry, Seth Schoen.
- * [http://media.ccc.de/browse/congress/2014/31c3_-_6112_-_en_-_saal_2_-_201412301715_-_tor_hidden_services_and_deanonymisation_-_dr_gareth_owen.html Tor: Hidden Services and Deanonymisation] ([http://events.ccc.de/congress/2014/Fahrplan/events/6112.html schedule]). Gareth Owen. Blog responses: [https://blog.torproject.org/blog/tor-80-percent-percent-1-2-percent-abusive 1] [https://blog.torproject.org/blog/some-thoughts-hidden-services 2].
- * [http://media.ccc.de/browse/congress/2014/31c3_-_6154_-_en_-_saal_1_-_201412272300_-_crypto_tales_from_the_trenches_-_nadia_heninger_-_julia_angwin_-_laura_poitras_-_jack_gillum.html Crypto Tales from the Trenches] ([http://events.ccc.de/congress/2014/Fahrplan/events/6154.html schedule]). Nadia Heninger, Julia Angwin, Laura Poitras and Jack Gillum. Mentions Tor and Tails.



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list