[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Oct 1 14:40:14 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/13 ===
===========================================================================

version 44
Author: lunar
Date:   2013-10-01T13:10:26+00:00

   Roger pointed out that the private beta did not allow sign up from the
   outside

--- version 43
+++ version 44
@@ -61,30 +61,30 @@
 ---------------------------------------
 
 The Tor Stack Exchange page [6], which reached 100% commitment last
-week, has now been moved into the ‘private beta’ stage. Runa Sandvik
+week [7], has now been moved into the ‘private beta’ stage. Runa Sandvik
 clarified that “the purpose behind it is to ensure that users who
 committed to the site’s proposal have a chance to start asking and
 answering questions, as well as help with the initial community building
-activities that will define and shape the site” [7]. She added that “the
+activities that will define and shape the site” [8]. She added that “the
 more experts who participate in the private beta, the more certain it is
 that our page will move on to the next stage (i.e.  the public beta).”
 
 Fruitful discussions are already taking place: Karsten Loesing wrote to
 the wider community on the question of what to do about contact
 information for bridge operators after it was posed on Stack
-Exchange. [8]
+Exchange. [9]
 
-Roger Dingledine put out a call [9] for Tor developers and anonymity
+Roger Dingledine put out a call [10] for Tor developers and anonymity
 researchers to participate in answering questions on the site, adding
 “Steven, Philipp, Jens, and I can't do it by ourselves.” If you have
-expert knowledge to contribute, please contact Roger for the necessary
-details, or visit the proposal page [10] and sign up there!
+expert knowledge to contribute, please send an email to
+help at rt.torproject.org to get an invitation!
 
    [6] http://tor.stackexchange.com
-   [7] https://lists.torproject.org/pipermail/tor-talk/2013-September/030187.html
-   [8] https://lists.torproject.org/pipermail/tor-relays/2013-September/002936.html
-   [9] https://lists.torproject.org/pipermail/tor-dev/2013-September/005519.html
-  [10] http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privacy-and-security
+   [7] http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privacy-and-security
+   [8] https://lists.torproject.org/pipermail/tor-talk/2013-September/030187.html
+   [9] https://lists.torproject.org/pipermail/tor-relays/2013-September/002936.html
+  [10] https://lists.torproject.org/pipermail/tor-dev/2013-September/005519.html
 
 liballium: Pluggable Transports utility library in C
 ----------------------------------------------------

version 43
Author: harmony
Date:   2013-10-01T12:31:39+00:00

   pick nits

--- version 42
+++ version 43
@@ -12,7 +12,7 @@
 ========================================================================
 
 Welcome to the fourteenth issue of Tor Weekly News, the weekly
-newsletter that covers what is happening in the much-discussed Tor
+newsletter that covers what’s happening in the much-discussed Tor
 community.
 
 Tor Browser Bundle 3.0alpha4 released
@@ -51,7 +51,7 @@
 improvements to Tor server identity keys, Nick merged some small patches
 into the Tor mainline branch, and collected promises of several more to
 come.  He also directed a few enquiring minds towards Tor's online
-community, saying “I hope we'll be seeing more of some of the folks I
+community, saying “I hope we’ll be seeing more of some of the folks I
 talked to on our mailing lists and IRC channels soon”.
 
    [4] https://lists.torproject.org/pipermail/tor-talk/2013-September/030238.html
@@ -111,7 +111,7 @@
 hidden service sites. The most straightforward documentation for hidden
 services is in the torrc file itself [14]. A more in-depth guide can be
 found on the Tor Project website [15]. The website also documents how
-hidden services work [16].  Technical details can be found in the
+hidden services work [16]. Technical details can be found in the
 Rendezvous Specification document [17].
 
   [14] https://www.torproject.org/docs/faq.html.en#torrc

version 42
Author: harmony
Date:   2013-10-01T12:26:13+00:00

   add numbers, make spaces non-breaking, wrap

--- version 41
+++ version 42
@@ -11,121 +11,127 @@
 Tor Weekly News                                        October 2nd, 2013
 ========================================================================
 
-Welcome to the fourteenth issue of Tor Weekly News, the weekly newsletter that
-covers what is happening in the much-discussed Tor community.
+Welcome to the fourteenth issue of Tor Weekly News, the weekly
+newsletter that covers what is happening in the much-discussed Tor
+community.
 
 Tor Browser Bundle 3.0alpha4 released
 -------------------------------------
 
-On September 28th, Mike Perry released alpha 4 of
-the new Tor Browser Bundle 3.0 series [XXX]. The main highlights
-of this series are the important usability improvements that integrate
-Tor configuration and control into the browser itself, rather than relying
-on the unmaintained Vidalia interface.
+On September 28th, Mike Perry released alpha 4 of the new Tor Browser
+Bundle 3.0 series [1]. The main highlights of this series are the
+important usability improvements that integrate Tor configuration and
+control into the browser itself, rather than relying on the unmaintained
+Vidalia interface.
 
 The latest iteration is based on Firefox 10.0.9esr, which brings with it
-a lot of important security fixes. It also fixes a fingerprinting issue by
-randomizing the timestamp sent when establishing an HTTPS connection.
+a lot of important security fixes. It also fixes a fingerprinting issue
+by randomizing the timestamp sent when establishing an HTTPS connection.
 
 Two small but important usability improvements in the new Tor Launcher
-component were made: users can now directly copy and paste “bridge” lines
-from the bridge database [XXX], while clock-skews that would prevent Tor from
-functioning properly are now reported to users.
+component were made: users can now directly copy and paste “bridge”
+lines from the bridge database [2], while clock-skews that would prevent
+Tor from functioning properly are now reported to users.
 
-Download your copy, test it, and report any problems you find. If you're feeling
-adventurous, you can also try out the crucial new security process
-by independently reproducing the binaries from the publicly-reviewable
-source code [XXX].
+Download your copy, test it, and report any problems you find. If you're
+feeling adventurous, you can also try out the crucial new security
+process by independently reproducing the binaries from the
+publicly-reviewable source code [3].
 
-  [XXX] https://blog.torproject.org/blog/tor-browser-bundle-30alpha4-released
-  [XXX] https://bridges.torproject.org/
-  [XXX] https://gitweb.torproject.org/builders/tor-browser-bundle.git/blob/HEAD:/gitian/README.build
+   [1] https://blog.torproject.org/blog/tor-browser-bundle-30alpha4-released
+   [2] https://bridges.torproject.org/
+   [3] https://gitweb.torproject.org/builders/tor-browser-bundle.git/blob/HEAD:/gitian/README.build
 
 Tor mini-hackathon at GNU 30th anniversary
 ------------------------------------------
 
-The Tor mini-hackathon at the GNU 30th anniversary event [XXX] took place over the weekend,
-and Nick Mathewson sent out a brief report [XXX] on how things went. As well as working
-on proposal 220, which involves improvements to Tor server identity keys, Nick merged some
-small patches into the Tor mainline branch, and collected promises of several more to come.
-He also directed a few enquiring minds towards Tor's online community, saying “I hope we'll
-be seeing more of some of the folks I talked to on our mailing lists and IRC channels soon”.
+The Tor mini-hackathon at the GNU 30th anniversary event [4] took place
+over the weekend, and Nick Mathewson sent out a brief report [5] on how
+things went. As well as working on proposal 220, which involves
+improvements to Tor server identity keys, Nick merged some small patches
+into the Tor mainline branch, and collected promises of several more to
+come.  He also directed a few enquiring minds towards Tor's online
+community, saying “I hope we'll be seeing more of some of the folks I
+talked to on our mailing lists and IRC channels soon”.
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-September/030238.html
- [XXX] https://www.gnu.org/gnu30/
+   [4] https://lists.torproject.org/pipermail/tor-talk/2013-September/030238.html
+   [5] https://www.gnu.org/gnu30/
 
 Tor Stack Exchange page in private beta
 ---------------------------------------
 
-The Tor Stack Exchange page [XXX], which reached 100% commitment last week, has
-now been moved into the ‘private beta’ stage. Runa Sandvik clarified that
-“the purpose behind it is to ensure that users who committed to the site’s
-proposal have a chance to start asking and answering questions, as well as
-help with the initial community building activities that will define and shape
-the site” [XXX]. She added that “the more experts who participate in the private
-beta, the more certain it is that our page will move on to the next stage (i.e.
-the public beta).”
+The Tor Stack Exchange page [6], which reached 100% commitment last
+week, has now been moved into the ‘private beta’ stage. Runa Sandvik
+clarified that “the purpose behind it is to ensure that users who
+committed to the site’s proposal have a chance to start asking and
+answering questions, as well as help with the initial community building
+activities that will define and shape the site” [7]. She added that “the
+more experts who participate in the private beta, the more certain it is
+that our page will move on to the next stage (i.e.  the public beta).”
 
-Fruitful discussions are already taking place: Karsten Loesing wrote to the wider
-community on the question of what to do about contact information for bridge
-operators after it was posed on Stack Exchange. [XXX]
+Fruitful discussions are already taking place: Karsten Loesing wrote to
+the wider community on the question of what to do about contact
+information for bridge operators after it was posed on Stack
+Exchange. [8]
 
-Roger Dingledine put out a call [XXX] for Tor developers and anonymity
-researchers to participate in answering questions on the site, adding “Steven,
-Philipp, Jens, and I can't do it by ourselves.” If you have expert knowledge to
-contribute, please contact Roger for the necessary details, or visit the proposal
-page [XXX] and sign up there!
+Roger Dingledine put out a call [9] for Tor developers and anonymity
+researchers to participate in answering questions on the site, adding
+“Steven, Philipp, Jens, and I can't do it by ourselves.” If you have
+expert knowledge to contribute, please contact Roger for the necessary
+details, or visit the proposal page [10] and sign up there!
 
- [XXX] http://tor.stackexchange.com
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-September/030187.html
- [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-September/002936.html
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005519.html
- [XXX] http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privacy-and-security
+   [6] http://tor.stackexchange.com
+   [7] https://lists.torproject.org/pipermail/tor-talk/2013-September/030187.html
+   [8] https://lists.torproject.org/pipermail/tor-relays/2013-September/002936.html
+   [9] https://lists.torproject.org/pipermail/tor-dev/2013-September/005519.html
+  [10] http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privacy-and-security
 
 liballium: Pluggable Transports utility library in C
 ----------------------------------------------------
 
-Yawning Angel announced a new library to ease the task of writing pluggable
-transports [XXX]. liballium is a “simple library that handles the Tor Pluggable
-Transport Configuration protocol. The idea is for this library to be the C/C++
-equivalent to pyptlib [XXX] (and maybe more, depending on how much time I have
-to work on it).”
+Yawning Angel announced a new library to ease the task of writing
+pluggable transports [11]. liballium is a “simple library that handles
+the Tor Pluggable Transport Configuration protocol. The idea is for this
+library to be the C/C++ equivalent to pyptlib [12] (and maybe more,
+depending on how much time I have to work on it).”
 
-The code is available for review [XXX] featuring “a reasonably well commented example.”
+The code is available for review [13] featuring “a reasonably well
+commented example.”
 
 Feel free to follow up with “questions, comments, feedback”!
 
-  [XXX] https://www.torproject.org/docs/pluggable-transports.html
-  [XXX] https://gitweb.torproject.org/pluggable-transports/pyptlib.git
-  [XXX] https://github.com/Yawning/liballium
+  [11] https://www.torproject.org/docs/pluggable-transports.html
+  [12] https://gitweb.torproject.org/pluggable-transports/pyptlib.git
+  [13] https://github.com/Yawning/liballium
 
 Tor Help Desk Roundup
 ---------------------
 
-Multiple users wrote to the help desk asking for guidance setting up hidden 
-service sites. The most straightforward documentation for hidden services is 
-in the torrc file itself [XXX]. A more in-depth guide can be found on the Tor 
-Project website [XXX]. The website also documents how hidden services work [XXX]. 
-Technical details can be found in the Rendezvous Specification document [XXX].
+Multiple users wrote to the help desk asking for guidance setting up
+hidden service sites. The most straightforward documentation for hidden
+services is in the torrc file itself [14]. A more in-depth guide can be
+found on the Tor Project website [15]. The website also documents how
+hidden services work [16].  Technical details can be found in the
+Rendezvous Specification document [17].
 
-[XXX]: https://www.torproject.org/docs/faq.html.en#torrc
-[XXX]: https://www.torproject.org/docs/tor-hidden-service.html.en
-[XXX]: https://www.torproject.org/docs/hidden-services.html.en
-[XXX]: https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=rend-spec.txt
+  [14] https://www.torproject.org/docs/faq.html.en#torrc
+  [15] https://www.torproject.org/docs/tor-hidden-service.html.en
+  [16] https://www.torproject.org/docs/hidden-services.html.en
+  [17] https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=rend-spec.txt
 
 Monthly status reports for September 2013
 -----------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of September has begun. Runa Sandvik released her report first [XXX], followed
-by reports from Damian Johnson [XXX], Philipp Winter [XXX], Sherief Alaa [XXX], and
-Noel David Torres Taño [XXX].
+month of September has begun. Runa Sandvik released her report
+first [18], followed by reports from Damian Johnson [19], Philipp
+Winter [20], Sherief Alaa [21], and Noel David Torres Taño [22].
 
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000341.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000342.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000343.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000344.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000345.html
+  [18] https://lists.torproject.org/pipermail/tor-reports/2013-September/000341.html
+  [19] https://lists.torproject.org/pipermail/tor-reports/2013-September/000342.html
+  [20] https://lists.torproject.org/pipermail/tor-reports/2013-October/000343.html
+  [21] https://lists.torproject.org/pipermail/tor-reports/2013-October/000344.html
+  [22] https://lists.torproject.org/pipermail/tor-reports/2013-October/000345.html
 
 Miscellaneous news
 ------------------
@@ -133,33 +139,33 @@
 Mike Perry published his new GPG public key, adding: “this new key will
 be used to sign email from me going forward, and will be used to sign
 software releases until such time as I get around to creating a second
-set of keys on a hardware token for that purpose” [XXX].
+set of keys on a hardware token for that purpose” [23].
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005518.html
+  [23] https://lists.torproject.org/pipermail/tor-dev/2013-September/005518.html
 
 David Fifield updated the Pluggable Transports bundles using the latest
-Tor Browser Bundle [XXX]. In order to benefit from the improvements and
+Tor Browser Bundle [24]. In order to benefit from the improvements and
 security fixes, please update!
 
-  [XXX] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-beta-2-pt3-firefox-1709esr
+  [24] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-beta-2-pt3-firefox-1709esr
 
-intrigeri sent a release schedule for Tails 0.21 [XXX]. The first release candidate
-should be out on October 20th.
+intrigeri sent a release schedule for Tails 0.21 [25]. The first release
+candidate should be out on October 20th.
 
-  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003719.html
+  [25] https://mailman.boum.org/pipermail/tails-dev/2013-September/003719.html
 
-Roger Dingledine sent out “a list of criteria to consider when evaluating
-pluggable transports for readiness of deployment to users”, asking for
-comments on his initial draft [XXX].
+Roger Dingledine sent out “a list of criteria to consider when
+evaluating pluggable transports for readiness of deployment to users”,
+asking for comments on his initial draft [26].
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005528.html
+  [26] https://lists.torproject.org/pipermail/tor-dev/2013-September/005528.html
 
-If you have the necessary hardware and want to help Tails out, please test two
-upcoming features: persistent printer settings [XXX] and support for more SD
-card readers (the “sdio” type) [XXX].
+If you have the necessary hardware and want to help Tails out, please
+test two upcoming features: persistent printer settings [27] and support
+for more SD card readers (the “sdio” type) [28].
 
-  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003744.html
-  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003757.html
+  [27] https://mailman.boum.org/pipermail/tails-dev/2013-September/003744.html
+  [28] https://mailman.boum.org/pipermail/tails-dev/2013-September/003757.html
 
 Upcoming events
 ---------------
@@ -173,15 +179,15 @@
           | http://www.sigsac.org/ccs/CCS2013/
 
 
-This issue of Tor Weekly News has been assembled by harmony, Lunar, dope457,
-Matt Pagan, and XXX.
+This issue of Tor Weekly News has been assembled by harmony, Lunar,
+dope457, and Matt Pagan.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [29], write down your
+name and subscribe to the team mailing list [30] if you want to
 get involved!
 
-  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+  [29] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [30] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
version 41
Author: harmony
Date:   2013-10-01T12:00:46+00:00

   freeze

--- version 40
+++ version 41
@@ -1,6 +1,8 @@
 ''Fourteenth issue of Tor Weekly News. Covering what's happening from September 25th, 2013 to October 1st, 2013. To be released on October 2nd, 2013.''
 
 '''Editor:''' harmony
+
+'''Status: FROZEN.''' New items should go in [wiki:TorWeeklyNews/2013/14 next week's edition]. Expected release time 2013-10-02 12:00 UTC.
 
 '''Subject:''' Tor Weekly News — October, 2nd 2013
 

version 40
Author: harmony
Date:   2013-10-01T11:45:50+00:00

   add last-minute report

--- version 39
+++ version 40
@@ -116,12 +116,14 @@
 
 The wave of regular monthly reports from Tor project members for the
 month of September has begun. Runa Sandvik released her report first [XXX], followed
-by reports from Damian Johnson [XXX], Philipp Winter [XXX], and Sherief Alaa [XXX].
+by reports from Damian Johnson [XXX], Philipp Winter [XXX], Sherief Alaa [XXX], and
+Noel David Torres Taño [XXX].
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000341.html
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000342.html
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000343.html
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000344.html
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000345.html
 
 Miscellaneous news
 ------------------

version 39
Author: harmony
Date:   2013-10-01T10:00:41+00:00

   small changes

--- version 38
+++ version 39
@@ -10,7 +10,7 @@
 ========================================================================
 
 Welcome to the fourteenth issue of Tor Weekly News, the weekly newsletter that
-covers what is happening in the great Tor community.
+covers what is happening in the much-discussed Tor community.
 
 Tor Browser Bundle 3.0alpha4 released
 -------------------------------------
@@ -31,9 +31,9 @@
 functioning properly are now reported to users.
 
 Download your copy, test it, and report any problems you find. If you're feeling
-adventurous, you can also try out the new crucial security process
-by independently reproducing the binaries from the publicly
-reviewable source code [XXX].
+adventurous, you can also try out the crucial new security process
+by independently reproducing the binaries from the publicly-reviewable
+source code [XXX].
 
   [XXX] https://blog.torproject.org/blog/tor-browser-bundle-30alpha4-released
   [XXX] https://bridges.torproject.org/
@@ -43,7 +43,7 @@
 ------------------------------------------
 
 The Tor mini-hackathon at the GNU 30th anniversary event [XXX] took place over the weekend,
-and Nick Mathewson sent out a brief report [XXX] into how things went. As well as working
+and Nick Mathewson sent out a brief report [XXX] on how things went. As well as working
 on proposal 220, which involves improvements to Tor server identity keys, Nick merged some
 small patches into the Tor mainline branch, and collected promises of several more to come.
 He also directed a few enquiring minds towards Tor's online community, saying “I hope we'll
@@ -157,13 +157,6 @@
   [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003744.html
   [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003757.html
 
-Vulnerabilities
----------------
-
-XXX: Reported vulnerabilities [XXX].
-
- [XXX] vulnerability report source
-
 Upcoming events
 ---------------
 
@@ -176,8 +169,8 @@
           | http://www.sigsac.org/ccs/CCS2013/
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, Matt 
-Pagan, and XXX.
+This issue of Tor Weekly News has been assembled by harmony, Lunar, dope457,
+Matt Pagan, and XXX.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
@@ -187,8 +180,4 @@
 
   [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items :
-
- * result of the EPIC FOIA https://epic.org/2013/09/epic-foia-request-reveals-no-e.html+}}}
version 38
Author: dope457
Date:   2013-10-01T07:25:15+00:00

   reports

--- version 37
+++ version 38
@@ -116,12 +116,12 @@
 
 The wave of regular monthly reports from Tor project members for the
 month of September has begun. Runa Sandvik released her report first [XXX], followed
-by reports from Damian Johnson [XXX], name 3 [XXX], and name 4 [XXX].
+by reports from Damian Johnson [XXX], Philipp Winter [XXX], and Sherief Alaa [XXX].
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000341.html
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000342.html
- [XXX]
- [XXX]
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000343.html
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000344.html
 
 Miscellaneous news
 ------------------
@@ -191,4 +191,4 @@
 
 Possible items :
 
- * result of the EPIC FOIA https://epic.org/2013/09/epic-foia-request-reveals-no-e.html
+ * result of the EPIC FOIA https://epic.org/2013/09/epic-foia-request-reveals-no-e.html

===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/14 ===
===========================================================================

version 4
Author: lunar
Date:   2013-10-01T13:45:22+00:00

   add possible item

--- version 3
+++ version 4
@@ -64,4 +64,8 @@
 
   [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+}}}
+
+Possible item :
+
+ * gnupg and the web of trust https://lists.torproject.org/pipermail/tor-talk/2013-September/030235.html and follow-ups. Not strictly Tor related but damn relevant for our field and lot of insights from mike, dkg and isis… so probably deserve at least a pointer
version 3
Author: harmony
Date:   2013-10-01T12:35:03+00:00

   change ordinal

--- version 2
+++ version 3
@@ -9,7 +9,7 @@
 Tor Weekly News                                        October 9th, 2013
 ========================================================================
 
-Welcome to the twelvth issue of Tor Weekly News, the weekly newsletter that
+Welcome to the fifteenth issue of Tor Weekly News, the weekly newsletter that
 covers what is happening in the XXX Tor community.
 
 New Release of XXX

version 2
Author: harmony
Date:   2013-10-01T12:34:12+00:00

   format header

--- version 1
+++ version 2
@@ -1,8 +1,8 @@
-Fifteenth issue of Tor Weekly News. Covering what's happening from October 2nd, 2013 to October 8th, 2013. To be released on October 9th, 2013.
+''Fifteenth issue of Tor Weekly News. Covering what's happening from October 2nd, 2013 to October 8th, 2013. To be released on October 9th, 2013.''
 
-Editor:
+'''Editor:'''
 
-Subject: Tor Weekly News — October 9th, 2013
+'''Subject:''' Tor Weekly News — October 9th, 2013
 
 {{{
 ========================================================================

version 1
Author: harmony
Date:   2013-10-01T12:08:34+00:00

   import boilerplate

--- 
+++ version 1
@@ -0,0 +1,67 @@
+Fifteenth issue of Tor Weekly News. Covering what's happening from October 2nd, 2013 to October 8th, 2013. To be released on October 9th, 2013.
+
+Editor:
+
+Subject: Tor Weekly News — October 9th, 2013
+
+{{{
+========================================================================
+Tor Weekly News                                        October 9th, 2013
+========================================================================
+
+Welcome to the twelvth issue of Tor Weekly News, the weekly newsletter that
+covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX] vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list