[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Oct 21 15:40:08 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/16 ===
===========================================================================

version 21
Author: lunar
Date:   2013-10-21T14:59:29+00:00

   minor rewording

--- version 20
+++ version 21
@@ -118,7 +118,7 @@
 Tails has issued a call for testing [XXX] of its upcoming 0.21 release. The
 new version contains two security fixes regarding access to the Tor control
 port and persistent settings [XXX] among other improvements and package
-updates [XXX]. “Test wildly!” as the Tails team says.
+updates [XXX]. “Test wildly!” as the Tails team wrote it.
 
  [XXX] https://tails.boum.org/news/test_0.21-rc1/index.en.html
  [XXX] https://git-tails.immerda.ch/tails/plain/wiki/src/doc/first_steps/persistence/upgrade.mdwn?h=bugfix/safer-persistence

version 20
Author: lunar
Date:   2013-10-21T14:46:53+00:00

   rewrite a little bit of the entry abot hidden services

--- version 19
+++ version 20
@@ -60,7 +60,10 @@
 -----------------------
 
 George posted a list of items that need work on the Hidden Service area [XXX].
-It's not an exhaustive list, but it might help with upgrading the Hidden Service design.
+Despite not exhaustive, the list contains many items that might help with
+upgrading the Hidden Service design, be it around security, performance,
+guard issues or “petname” systems.
+
 Help and comments are welcome!
 
   [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005637.html

version 19
Author: lunar
Date:   2013-10-21T14:34:08+00:00

   write up about reports

--- version 18
+++ version 19
@@ -133,6 +133,12 @@
 
  [XXX] https://bugs.torproject.org/10000
 
+Roger Dingledine reported [XXX] on his activities for September and October.
+Arturo Filastò also reported [XXX] on his September.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000366.html
+
 Upcoming events
 ---------------
 
@@ -161,5 +167,3 @@
 Possible items:
 
  * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
- * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
- * Arthuro's report for September https://lists.torproject.org/pipermail/tor-reports/2013-October/000366.html

version 18
Author: lunar
Date:   2013-10-21T14:31:10+00:00

   cover calls for testing 0.21~rc1

--- version 17
+++ version 18
@@ -112,6 +112,15 @@
 Miscellaneous news
 ------------------
 
+Tails has issued a call for testing [XXX] of its upcoming 0.21 release. The
+new version contains two security fixes regarding access to the Tor control
+port and persistent settings [XXX] among other improvements and package
+updates [XXX]. “Test wildly!” as the Tails team says.
+
+ [XXX] https://tails.boum.org/news/test_0.21-rc1/index.en.html
+ [XXX] https://git-tails.immerda.ch/tails/plain/wiki/src/doc/first_steps/persistence/upgrade.mdwn?h=bugfix/safer-persistence
+ [XXX] https://git-tails.immerda.ch/tails/plain/debian/changelog?id=0.21-rc1
+
 Andrew Lewman was invited to speak at SECURE Poland 2013 [XXX] and sent
 a report on his trip [XXX] to Warsaw.
 
@@ -153,5 +162,4 @@
 
  * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
  * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
- * Call for testing Tails 0.21 rc1 https://tails.boum.org/news/test_0.21-rc1/index.en.html
  * Arthuro's report for September https://lists.torproject.org/pipermail/tor-reports/2013-October/000366.html

version 17
Author: lunar
Date:   2013-10-21T14:04:01+00:00

   clean up cruft

--- version 16
+++ version 17
@@ -56,15 +56,6 @@
  [XXX] http://freehaven.net/anonbib/
  [XXX] https://research.torproject.org/
 
-New Release of XXX
-------------------
-
-XXX: cite specific release date, numbers, and developers responsible
-
-XXX: details about release
-
- [XXX]
-
 Hidden Service research
 -----------------------
 
@@ -109,18 +100,6 @@
  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html
  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005640.html
 
-Monthly status reports for XXX month 2013
------------------------------------------
-
-The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
-
- [XXX]
- [XXX]
- [XXX]
- [XXX]
-
 Tor Help Desk Roundup
 ---------------------
 
@@ -144,23 +123,6 @@
 Or will the project continued growth make this happen sooner?
 
  [XXX] https://bugs.torproject.org/10000
-
-Item 1 with cited source [XXX].
-
-Item 2 with cited source [XXX].
-
-Item 3 with cited source [XXX].
-
- [XXX]
- [XXX]
- [XXX]
-
-Vulnerabilities
----------------
-
-XXX: Reported vulnerabilities [XXX].
-
- [XXX] vulnerability report source
 
 Upcoming events
 ---------------

version 16
Author: lunar
Date:   2013-10-21T13:52:22+00:00

   write about OTR usability

--- version 15
+++ version 16
@@ -73,6 +73,41 @@
 Help and comments are welcome!
 
   [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005637.html
+
+Usability issues in existing OTR clients
+----------------------------------------
+
+The consensus after the first round of discussions and research done in
+the prospect of providing a new secure instant-messaging Tor bundle
+[XXX] is to use Mozilla Instantbird at its core. Arlo Breault sent out a
+draft plan [XXX] on how to do so.
+
+Instantbird currently lacks a core feature to turn it into the Tor
+Messenger: support for the OTR [XXX] protocol for encrypted chat. Now is
+thus a good time to gather usability issues in existing OTR clients.
+
+Mike Perry kicked off the discussion [XXX] by pointing out several
+defiencies regarding problems with multiple clients, key management
+issues, and other sub-optimal behaviours.
+
+Ian Goldberg — original author of the pervasive OTR plugin for Pidgin —
+pointed out [XXX] that at least one of the behaviour singled out by Mike
+was “done on purpose. The thing it's trying to prevent is that Alice
+and Bob are chatting, and Bob ends OTR just before Alice hits Enter on
+her message. If Alice's client went to "Not private" instead of
+"Finished", Alice's message would be sent in the clear, which is
+undesirable.  Switching to "Finished" makes Alice have to actively
+acknowledge that the conversation is no longer secure.”
+
+This tradeoff is a good example of how designing usable and secure user
+interfaces can be hard. Usability, in itself, is an often overlooked
+security feature. Now is a good time to contribute your ideas!
+
+ [XXX] https://trac.torproject.org/projects/tor/wiki/org/sponsors/Otter/Attentive
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005616.html
+ [XXX] https://otr.cypherpunks.ca/
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005640.html
 
 Monthly status reports for XXX month 2013
 -----------------------------------------
@@ -156,6 +191,5 @@
 
  * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
  * Roger's status report, September/October 2013 https://lists.torproject.org/pipermail/tor-reports/2013-October/000365.html
- * Usability issues with existing OTR clients https://lists.torproject.org/pipermail/tor-dev/2013-October/005636.html
  * Call for testing Tails 0.21 rc1 https://tails.boum.org/news/test_0.21-rc1/index.en.html
- * Arthuro's report for September https://lists.torproject.org/pipermail/tor-reports/2013-October/000366.html+ * Arthuro's report for September https://lists.torproject.org/pipermail/tor-reports/2013-October/000366.html



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list