[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Oct 29 13:20:25 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/17 ===
===========================================================================

version 37
Author: lunar
Date:   2013-10-29T12:46:05+00:00

   fix numbers *sigh*

--- version 36
+++ version 37
@@ -133,31 +133,31 @@
 
 David Goulet is asking for a final round of reviews of his rewrite
 of torsocks [12] so it can replace the old implementation. Lunar
-has updated the package in Debian experimental to encourage testing.
-A few portability bugs and a deadlock [13] has already been ironed out in the
+has updated the package in Debian experimental to encourage testing [13].
+A few portability bugs and a deadlock [14] has already been ironed out in the
 process.
 
   [12] https://trac.torproject.org/projects/tor/ticket/10007
   [13] https://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html
   [14] https://github.com/dgoulet/torsocks/commit/e55eae3d3
 
-The next Tails contributor meeting will be held on November 6th [14]. The present
+The next Tails contributor meeting will be held on November 6th [15]. The present
 agenda has “firewall exceptions for user-run local services”, “decide what kind of
 questions go into the FAQ”, among other topics.
 
   [15] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
 
-Matthew Finkel has sent a draft proposal [15] with possible solutions for
+Matthew Finkel has sent a draft proposal [16] with possible solutions for
 Hidden Services backed by multiple servers. Several comments have been
 made already, with Nick Mathewson giving a heads-up on the work
-he has started on merging thoughts and discussions in a new specification [16].
+he has started on merging thoughts and discussions in a new specification [17].
 
   [16] https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html 
   [17] https://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt 
 
-James B. reported [17] a tutorial on bsdnow.tv [18] describing how to setup
+James B. reported [18] a tutorial on bsdnow.tv [19] describing how to setup
 Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their last week's
-podcast called “A Brief Intorduction” [19] features a live demonstration
+podcast called “A Brief Intorduction” [20] features a live demonstration
 (beginning at 43:52).
 
   [18] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
@@ -166,7 +166,7 @@
 
 The Guardian Project has made a new release of its chat application
 for Android systems. ChatSecure v12 (previously known has Gibberbot)
-contains several new features [20] and is fully integrated with Orbot.
+contains several new features [21] and is fully integrated with Orbot.
 
   [21] https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
 
@@ -187,8 +187,8 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [21], write down your
-name and subscribe to the team mailing list [22] if you want to
+important news. Please see the project page [22], write down your
+name and subscribe to the team mailing list [23] if you want to
 get involved!
 
   [22] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews

version 36
Author: lunar
Date:   2013-10-29T12:42:51+00:00

   FREEZE

--- version 35
+++ version 36
@@ -1,6 +1,8 @@
 ''18th issue of Tor Weekly News. Covering what's happening from October 22th, 2013 to October 29th, 2013. To be released on October 30th, 2013.''
 
 '''Editor:''' Lunar
+
+'''Status:''' FROZEN. Only technical and languages fixes are to be made. New items should go in [wiki:TorWeeklyNews/2013/18 next week's edition]. Publication should happen 2013-10-30 12:00 UTC.
 
 '''Subject:''' Tor Weekly News — October 30th, 2013
 

version 35
Author: lunar
Date:   2013-10-29T12:41:42+00:00

   add numbers to references

--- version 34
+++ version 35
@@ -17,13 +17,13 @@
 
 The Google Summer of Code 2013 program is over since the end of
 September. While Nick, Moritz and Damian attended the GSoC Mentor
-Summit [XXX] at Google's main campus last week, here are a few highlights
+Summit [1] at Google's main campus last week, here are a few highlights
 from three of the five projects that were carried through the summer.
 
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
+   [1] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
 
 Robert worked on enhancing Tor's Path Selection algorithm. The
-enhancement [XXX] uses active measurements of the Round-Trip-Time of Tor
+enhancement [2] uses active measurements of the Round-Trip-Time of Tor
 circuits. Rejecting the slowest circuits will improve the average
 latency of Tor circuits. The results of this work will hopefully be
 integrated into Tor 0.2.5.x and should then be usable by users.  Robert
@@ -32,48 +32,48 @@
 have made that decision and can definitely recommend doing so to
 others.”
 
- [XXX] https://bitbucket.org/ra_/tor-rtt
+   [2] https://bitbucket.org/ra_/tor-rtt
 
 Johannes Fürmann created a censorship simulation tool that facilitates
 testing of applications in a simulated network which can be configured
 and extended to behave like censorship infrastructure in various
-countries. EvilGenius [XXX] can be used to do automated “smoke testing”,
+countries. EvilGenius [3] can be used to do automated “smoke testing”,
 i.e. find out if code still works properly if a node in the network
 manipulates traffic in different ways. Other than that, it can be used
 to automatically test decentralized network applications. “Overall,
 working with Tor was a great experience and I hope to be able to work
 with the Tor community again” said Johannes.
 
- [XXX] https://github.com/TheTorProject/EvilGenius
+   [3] https://github.com/TheTorProject/EvilGenius
 
 Kostas Jakeliūnas worked on creating a searchable and scalable Tor Metrics
-data archive [XXX]. This required implementing a Tor relay consensus and
+data archive [4]. This required implementing a Tor relay consensus and
 descriptor search backend that can encompass most of the archival data
 available (as of now, the currently running backend covers relays from
 2008 up until now).
 
 Those curious to browse Tor relay archives — searching for a needle in the
 very large haystack or just looking around — might enjoy playing with the
-current test platform [XXX]. It can run powerful queries on the large
+current test platform [5]. It can run powerful queries on the large
 dataset without query parameter/span restrictions. Many use cases are
-supported [XXX] — for example, since the newest consensus data is always
+supported [6] — for example, since the newest consensus data is always
 available, the backend can be used in an ExoneraTor-like fashion.
 
 Together with Karsten Loesing, Kostas hopes to integrate this system with
-the current Onionoo [XXX], hopefully further empowering (and eventually
+the current Onionoo [7], hopefully further empowering (and eventually
 simplifying) the overall Tor Metrics ecosystem.
 
 Kostas described the project as “an interesting and challenging one — a
-lot of work […] to make it robust and truly scalable.” He also added:
+lot of work […] to make it robust and truly scalable.” He also added:
 “Working with Tor was a great experience: I found the developer
 community to be welcoming indeed, comprised of many people who are
 professionals in their field.  It should be noted that where there are
 interesting problems and a clear cause, great people assemble.”
 
- [XXX] http://github.com/wfn/torsearch
- [XXX] http://ts.mkj.lt:5555/
- [XXX] https://github.com/wfn/torsearch/blob/master/docs/use_cases_examples.md
- [XXX] https://www.torproject.org/projects/onionoo.html.en
+   [4] http://github.com/wfn/torsearch
+   [5] http://ts.mkj.lt:5555/
+   [6] https://github.com/wfn/torsearch/blob/master/docs/use_cases_examples.md
+   [7] https://www.torproject.org/projects/onionoo.html.en
 
 Collecting data to answer network adversaries
 ---------------------------------------------
@@ -83,7 +83,7 @@
 For example, traffic that crosses the same country as it enters and
 leaves the Tor network can potentially be deanonymized by an authority
 in that country who can monitor all network communication.” 
-Karsten Loesing began his call for help to Tor relay operators [XXX]
+Karsten Loesing began his call for help to Tor relay operators [8]
 by stating a problem that has recently attracted some interest by the
 research community.
 
@@ -101,17 +101,17 @@
 
 In order to participate, shell scripts are available which automate most
 of the process. They have been reviewed with care from several members
-of the Tor community and are available from a Git repository [XXX].
+of the Tor community and are available from a Git repository [9].
 Since Karsten's initial email, Anupam Das has assembled a FAQ regarding
-scope, resource consumption, and other topics [XXX].
+scope, resource consumption, and other topics [10].
 
 Be sure to run the scripts if you can. As Karsten concluded “with your
 help, we will keep improving to face the new challenges to privacy and
 freedom online.”
 
- [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
- [XXX] https://bitbucket.org/anupam_das/traceroute-from-tor-relays
- [XXX] http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html#faq
+   [8] https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
+   [9] https://bitbucket.org/anupam_das/traceroute-from-tor-relays
+  [10] http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html#faq
 
 Tor Help Desk Roundup
 ---------------------
@@ -122,51 +122,51 @@
 the browser's text fields, including the URL and search bars. So 
 far this problem appears to be resolved by removing ibus with apt-get 
 before running the Tor Browser. Users who need ibus can try running 
-`export GTK_IM_MODULE=xim`, as documented in Trac ticket #9353 [XXX].
+`export GTK_IM_MODULE=xim`, as documented in Trac ticket #9353 [11].
 
- [XXX] https://bugs.torproject.org/9353
+  [11] https://bugs.torproject.org/9353
 
 Miscellaneous news
 ------------------
 
 David Goulet is asking for a final round of reviews of his rewrite
-of torsocks [XXX] so it can replace the old implementation. Lunar
+of torsocks [12] so it can replace the old implementation. Lunar
 has updated the package in Debian experimental to encourage testing.
-A few portability bugs and a deadlock [XXX] has already been ironed out in the
+A few portability bugs and a deadlock [13] has already been ironed out in the
 process.
 
- [XXX] https://trac.torproject.org/projects/tor/ticket/10007
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html
- [XXX] https://github.com/dgoulet/torsocks/commit/e55eae3d3
+  [12] https://trac.torproject.org/projects/tor/ticket/10007
+  [13] https://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html
+  [14] https://github.com/dgoulet/torsocks/commit/e55eae3d3
 
-The next Tails contributor meeting will be held on November 6th [XXX]. The present
+The next Tails contributor meeting will be held on November 6th [14]. The present
 agenda has “firewall exceptions for user-run local services”, “decide what kind of
 questions go into the FAQ”, among other topics.
 
- [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
+  [15] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
 
-Matthew Finkel has sent a draft proposal [XXX] with possible solutions for
+Matthew Finkel has sent a draft proposal [15] with possible solutions for
 Hidden Services backed by multiple servers. Several comments have been
 made already, with Nick Mathewson giving a heads-up on the work
-he has started on merging thoughts and discussions in a new specification [XXX].
+he has started on merging thoughts and discussions in a new specification [16].
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html 
- [XXX] https://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt 
+  [16] https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html 
+  [17] https://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt 
 
-James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
+James B. reported [17] a tutorial on bsdnow.tv [18] describing how to setup
 Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their last week's
-podcast called “A Brief Intorduction” [XXX] features a live demonstration
+podcast called “A Brief Intorduction” [19] features a live demonstration
 (beginning at 43:52).
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
- [XXX] http://www.bsdnow.tv/tutorials/tor
- [XXX] http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction
+  [18] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
+  [19] http://www.bsdnow.tv/tutorials/tor
+  [20] http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction
 
 The Guardian Project has made a new release of its chat application
 for Android systems. ChatSecure v12 (previously known has Gibberbot)
-contains several new features [XXX] and is fully integrated with Orbot.
+contains several new features [20] and is fully integrated with Orbot.
 
- [XXX] https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
+  [21] https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
 
 Upcoming events
 ---------------
@@ -185,10 +185,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [21], write down your
+name and subscribe to the team mailing list [22] if you want to
 get involved!
 
-  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+  [22] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [23] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}

version 34
Author: lunar
Date:   2013-10-29T12:40:16+00:00

   credits

--- version 33
+++ version 34
@@ -180,8 +180,8 @@
           | http://www.sigsac.org/ccs/CCS2013/
 
 
-This issue of Tor Weekly News has been assembled by XXX, ra,
-Johannes Fürmann, Kostas Jakeliūnas and XXX.
+This issue of Tor Weekly News has been assembled by Lunar, dope457,
+Matt Pagan, Kostas Jakeliūnas, ra, and Johannes Fürmann.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 33
Author: lunar
Date:   2013-10-29T12:37:40+00:00

   fix tense

--- version 32
+++ version 33
@@ -83,7 +83,7 @@
 For example, traffic that crosses the same country as it enters and
 leaves the Tor network can potentially be deanonymized by an authority
 in that country who can monitor all network communication.” 
-Karsten Loesing has begun his call for help to Tor relay operators [XXX]
+Karsten Loesing began his call for help to Tor relay operators [XXX]
 by stating a problem that has recently attracted some interest by the
 research community.
 

version 32
Author: lunar
Date:   2013-10-29T12:36:31+00:00

   restore time

--- version 31
+++ version 32
@@ -156,7 +156,7 @@
 James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
 Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their last week's
 podcast called “A Brief Intorduction” [XXX] features a live demonstration
-(beginning at XXX).
+(beginning at 43:52).
 
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  [XXX] http://www.bsdnow.tv/tutorials/tor

version 31
Author: lunar
Date:   2013-10-29T12:36:10+00:00

   write about chatsecure

--- version 30
+++ version 31
@@ -162,6 +162,12 @@
  [XXX] http://www.bsdnow.tv/tutorials/tor
  [XXX] http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction
 
+The Guardian Project has made a new release of its chat application
+for Android systems. ChatSecure v12 (previously known has Gibberbot)
+contains several new features [XXX] and is fully integrated with Orbot.
+
+ [XXX] https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
+
 Upcoming events
 ---------------
 
@@ -185,8 +191,4 @@
 
   [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
-
- * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/+}}}
version 30
Author: wfn
Date:   2013-10-29T12:31:14+00:00

   Fix minor grammar/cosmetic issues

--- version 29
+++ version 30
@@ -12,12 +12,12 @@
 Welcome to the eighteenth issue of Tor Weekly News, the weekly
 newsletter that covers what is happening in the Tor community.
 
-A few highlights from this year Google Summer of Code
+A few highlights from this year's Google Summer of Code
 -----------------------------------------------------
 
 The Google Summer of Code 2013 program is over since the end of
 September. While Nick, Moritz and Damian attended the GSoC Mentor
-Summit [XXX] at Google's main campus last week, here is a few highlights
+Summit [XXX] at Google's main campus last week, here are a few highlights
 from three of the five projects that were carried through the summer.
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
@@ -28,7 +28,7 @@
 latency of Tor circuits. The results of this work will hopefully be
 integrated into Tor 0.2.5.x and should then be usable by users.  Robert
 wrote: “Working with the Tor community is very encouraging since there
-are highely skilled and enthusiastic people around. I am really happy to
+are highly skilled and enthusiastic people around. I am really happy to
 have made that decision and can definitely recommend doing so to
 others.”
 
@@ -46,21 +46,20 @@
 
  [XXX] https://github.com/TheTorProject/EvilGenius
 
-Kostas Jakeliūnas worked on creating a searchable and
-scalable Tor Metrics data archive [XXX]. This required implementing a Tor
-relay consensus and descriptor search backend that can encompass most
-of the archival data available (as of now, the currently running
-backend covers relays from 2008 up until now).
+Kostas Jakeliūnas worked on creating a searchable and scalable Tor Metrics
+data archive [XXX]. This required implementing a Tor relay consensus and
+descriptor search backend that can encompass most of the archival data
+available (as of now, the currently running backend covers relays from
+2008 up until now).
 
-Those curious to browse Tor relay archives — searching for
-needles in the very large haystack or just looking around —
-might enjoy playing with the current test platform [XXX]. It can run
-powerful queries on the large dataset without query parameter/span
-restrictions.  Many use cases are supported [XXX] — for example, since the
-newest consensus data is always available, the backend can be used in an
-ExoneraTor-like fashion.
+Those curious to browse Tor relay archives — searching for a needle in the
+very large haystack or just looking around — might enjoy playing with the
+current test platform [XXX]. It can run powerful queries on the large
+dataset without query parameter/span restrictions. Many use cases are
+supported [XXX] — for example, since the newest consensus data is always
+available, the backend can be used in an ExoneraTor-like fashion.
 
-Together with Karsten Loesing, Kostas hope to integrate this system with
+Together with Karsten Loesing, Kostas hopes to integrate this system with
 the current Onionoo [XXX], hopefully further empowering (and eventually
 simplifying) the overall Tor Metrics ecosystem.
 
@@ -84,16 +83,16 @@
 For example, traffic that crosses the same country as it enters and
 leaves the Tor network can potentially be deanonymized by an authority
 in that country who can monitor all network communication.” 
-Karsten Loesing begun his call for help to Tor relay operators [XXX]
+Karsten Loesing has begun his call for help to Tor relay operators [XXX]
 by stating a problem that has recently attracted some interest by the
 research community.
 
-In which part of the Internet a Tor relay lies is easy enough to answer,
-but “determining routes with high confidence has been difficult“ so far.
-The best source of information could come from the relay operators,
-as Karsten wrote: “To figure out where traffic travels from your relay,
-we'd like you to run a bunch of ‘traceroutes’ — network measurements
-that show the paths traffic takes.”
+The question “which part of the Internet does a Tor relay lie in” is
+easy enough to answer, but “determining routes with high confidence has
+been difficult“ so far. The best source of information could come from
+the relay operators, as Karsten wrote: “To figure out where traffic
+travels from your relay, we'd like you to run a bunch of ‘traceroutes’ —
+network measurements that show the paths traffic takes.”
 
 This one-time experiment — for now — is meant to be used by “several
 researchers, but the leads are Anupam Das, a Ph.D. student at the
@@ -102,11 +101,11 @@
 
 In order to participate, shell scripts are available which automate most
 of the process. They have been reviewed with care from several members
-of the Tor community and available from a Git repository [XXX].
-Since Karsten initial email, Anupam Das has assembled a FAQ regarding
+of the Tor community and are available from a Git repository [XXX].
+Since Karsten's initial email, Anupam Das has assembled a FAQ regarding
 scope, resource consumption, and other topics [XXX].
 
-Be sure to run the scripts if you can. As Karten concluded “with your
+Be sure to run the scripts if you can. As Karsten concluded “with your
 help, we will keep improving to face the new challenges to privacy and
 freedom online.”
 
@@ -121,7 +120,7 @@
 many Ubuntu users who upgraded form Ubuntu 13.04 to 13.10. The 
 commonly reported error is that users cannot enter text in any of 
 the browser's text fields, including the URL and search bars. So 
-far this problem appears be resolved by removing ibus with apt-get 
+far this problem appears to be resolved by removing ibus with apt-get 
 before running the Tor Browser. Users who need ibus can try running 
 `export GTK_IM_MODULE=xim`, as documented in Trac ticket #9353 [XXX].
 
@@ -142,22 +141,22 @@
 
 The next Tails contributor meeting will be held on November 6th [XXX]. The present
 agenda has “firewall exceptions for user-run local services”, “decide what kind of
-questions go into the FAQ” among other topics.
+questions go into the FAQ”, among other topics.
 
  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
 
 Matthew Finkel has sent a draft proposal [XXX] with possible solutions for
 Hidden Services backed by multiple servers. Several comments have been
 made already, with Nick Mathewson giving a heads-up on the work
-in has started on merging thoughts and discussions in a new specification [XXX].
+he has started on merging thoughts and discussions in a new specification [XXX].
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html
- [XXX] https://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html 
+ [XXX] https://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt 
 
 James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
-Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their week's
-podcast, called “A Brief Intorduction” [XXX] features a live demonstration
-(beginning at 43:52).
+Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their last week's
+podcast called “A Brief Intorduction” [XXX] features a live demonstration
+(beginning at XXX).
 
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  [XXX] http://www.bsdnow.tv/tutorials/tor
@@ -190,4 +189,4 @@
 
 Possible items:
 
- * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
+ * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
version 29
Author: lunar
Date:   2013-10-29T12:28:07+00:00

   add timing

--- version 28
+++ version 29
@@ -157,7 +157,7 @@
 James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
 Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their week's
 podcast, called “A Brief Intorduction” [XXX] features a live demonstration
-(beginning at XXX).
+(beginning at 43:52).
 
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  [XXX] http://www.bsdnow.tv/tutorials/tor

version 28
Author: lunar
Date:   2013-10-29T12:10:09+00:00

   write about scalable hidden services

--- version 27
+++ version 28
@@ -146,6 +146,14 @@
 
  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
 
+Matthew Finkel has sent a draft proposal [XXX] with possible solutions for
+Hidden Services backed by multiple servers. Several comments have been
+made already, with Nick Mathewson giving a heads-up on the work
+in has started on merging thoughts and discussions in a new specification [XXX].
+
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html
+ [XXX] https://gitweb.torproject.org/user/nickm/torspec.git/blob/refs/heads/rendspec-ng:/rend-spec-ng.txt
+
 James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
 Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their week's
 podcast, called “A Brief Intorduction” [XXX] features a live demonstration
@@ -183,4 +191,3 @@
 Possible items:
 
  * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
- * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html

version 27
Author: lunar
Date:   2013-10-29T12:01:51+00:00

   don't mention Damian's report twice, we'll have it next week in the
   report section

--- version 26
+++ version 27
@@ -146,11 +146,6 @@
 
  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
 
-Damian Johnson has sent his status report [XXX] for October. Don't miss the
-few impressions from the GSoC Mentor Summit.
-
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
-
 James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
 Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their week's
 podcast, called “A Brief Intorduction” [XXX] features a live demonstration

version 26
Author: lunar
Date:   2013-10-29T12:00:19+00:00

   mention bsdnow.tv's articles

--- version 25
+++ version 26
@@ -151,6 +151,15 @@
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
 
+James B. reported [XXX] a tutorial on bsdnow.tv [XXX] describing how to setup
+Tor relays, bridges, exit nodes and hidden services on FreeBSD. Their week's
+podcast, called “A Brief Intorduction” [XXX] features a live demonstration
+(beginning at XXX).
+
+ [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
+ [XXX] http://www.bsdnow.tv/tutorials/tor
+ [XXX] http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction
+
 Upcoming events
 ---------------
 
@@ -178,6 +187,5 @@
 
 Possible items:
 
- * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
  * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html

version 25
Author: lunar
Date:   2013-10-29T11:50:56+00:00

   mention FAQ for traceroute stuff

--- version 24
+++ version 25
@@ -102,12 +102,17 @@
 
 In order to participate, shell scripts are available which automate most
 of the process. They have been reviewed with care from several members
-of the Tor community and available from a Git repository [XXX]. Be sure
-to run it if you can. As Karten concluded “with your help, we will keep
-improving to face the new challenges to privacy and freedom online.”
+of the Tor community and available from a Git repository [XXX].
+Since Karsten initial email, Anupam Das has assembled a FAQ regarding
+scope, resource consumption, and other topics [XXX].
+
+Be sure to run the scripts if you can. As Karten concluded “with your
+help, we will keep improving to face the new challenges to privacy and
+freedom online.”
 
  [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  [XXX] https://bitbucket.org/anupam_das/traceroute-from-tor-relays
+ [XXX] http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html#faq
 
 Tor Help Desk Roundup
 ---------------------

version 24
Author: lunar
Date:   2013-10-29T11:45:30+00:00

   reword a little bit torsocks

--- version 23
+++ version 24
@@ -125,12 +125,15 @@
 Miscellaneous news
 ------------------
 
-David Goulet asks for code review of the new torsocks 2.X [XXX].
-Thanks to Lunar updated package with the second release candidate
-of torsocks is available in Debian experimental [XXX].
+David Goulet is asking for a final round of reviews of his rewrite
+of torsocks [XXX] so it can replace the old implementation. Lunar
+has updated the package in Debian experimental to encourage testing.
+A few portability bugs and a deadlock [XXX] has already been ironed out in the
+process.
 
  [XXX] https://trac.torproject.org/projects/tor/ticket/10007
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html
+ [XXX] https://github.com/dgoulet/torsocks/commit/e55eae3d3
 
 The next Tails contributor meeting will be held on November 6th [XXX]. The present
 agenda has “firewall exceptions for user-run local services”, “decide what kind of

version 23
Author: lunar
Date:   2013-10-29T11:39:16+00:00

   remove cruft

--- version 22
+++ version 23
@@ -10,7 +10,7 @@
 ========================================================================
 
 Welcome to the eighteenth issue of Tor Weekly News, the weekly
-newsletter that covers what is happening in the XXX Tor community.
+newsletter that covers what is happening in the Tor community.
 
 A few highlights from this year Google Summer of Code
 -----------------------------------------------------
@@ -109,27 +109,6 @@
  [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  [XXX] https://bitbucket.org/anupam_das/traceroute-from-tor-relays
 
-New Release of XXX
-------------------
-
-XXX: cite specific release date, numbers, and developers responsible
-
-XXX: details about release
-
- [XXX]
-
-Monthly status reports for XXX month 2013
------------------------------------------
-
-The wave of regular monthly reports from Tor project members for the
-month of XXX has begun. XXX released his report first [XXX], followed
-by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
-
- [XXX]
- [XXX]
- [XXX]
- [XXX]
-
 Tor Help Desk Roundup
 ---------------------
 
@@ -164,13 +143,6 @@
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
 
-Vulnerabilities
----------------
-
-XXX: Reported vulnerabilities [XXX].
-
- [XXX] vulnerability report source
-
 Upcoming events
 ---------------
 

version 22
Author: lunar
Date:   2013-10-29T11:38:17+00:00

   write about traceroute measurements

--- version 21
+++ version 22
@@ -76,6 +76,39 @@
  [XXX] https://github.com/wfn/torsearch/blob/master/docs/use_cases_examples.md
  [XXX] https://www.torproject.org/projects/onionoo.html.en
 
+Collecting data to answer network adversaries
+---------------------------------------------
+
+“The anonymity of a connection over Tor is vulnerable
+to an adversary who can observe it in enough places along its route.
+For example, traffic that crosses the same country as it enters and
+leaves the Tor network can potentially be deanonymized by an authority
+in that country who can monitor all network communication.” 
+Karsten Loesing begun his call for help to Tor relay operators [XXX]
+by stating a problem that has recently attracted some interest by the
+research community.
+
+In which part of the Internet a Tor relay lies is easy enough to answer,
+but “determining routes with high confidence has been difficult“ so far.
+The best source of information could come from the relay operators,
+as Karsten wrote: “To figure out where traffic travels from your relay,
+we'd like you to run a bunch of ‘traceroutes’ — network measurements
+that show the paths traffic takes.”
+
+This one-time experiment — for now — is meant to be used by “several
+researchers, but the leads are Anupam Das, a Ph.D. student at the
+University of Illinois at Urbana-Champaign, and his advisor Nikita
+Borisov.”
+
+In order to participate, shell scripts are available which automate most
+of the process. They have been reviewed with care from several members
+of the Tor community and available from a Git repository [XXX]. Be sure
+to run it if you can. As Karten concluded “with your help, we will keep
+improving to face the new challenges to privacy and freedom online.”
+
+ [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
+ [XXX] https://bitbucket.org/anupam_das/traceroute-from-tor-relays
+
 New Release of XXX
 ------------------
 
@@ -165,7 +198,6 @@
 
 Possible items:
 
- * Traceroute measurement from Tor relays https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
  * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html

version 21
Author: lunar
Date:   2013-10-29T11:15:49+00:00

   integrate the not completed blog post

--- version 20
+++ version 21
@@ -11,6 +11,70 @@
 
 Welcome to the eighteenth issue of Tor Weekly News, the weekly
 newsletter that covers what is happening in the XXX Tor community.
+
+A few highlights from this year Google Summer of Code
+-----------------------------------------------------
+
+The Google Summer of Code 2013 program is over since the end of
+September. While Nick, Moritz and Damian attended the GSoC Mentor
+Summit [XXX] at Google's main campus last week, here is a few highlights
+from three of the five projects that were carried through the summer.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
+
+Robert worked on enhancing Tor's Path Selection algorithm. The
+enhancement [XXX] uses active measurements of the Round-Trip-Time of Tor
+circuits. Rejecting the slowest circuits will improve the average
+latency of Tor circuits. The results of this work will hopefully be
+integrated into Tor 0.2.5.x and should then be usable by users.  Robert
+wrote: “Working with the Tor community is very encouraging since there
+are highely skilled and enthusiastic people around. I am really happy to
+have made that decision and can definitely recommend doing so to
+others.”
+
+ [XXX] https://bitbucket.org/ra_/tor-rtt
+
+Johannes Fürmann created a censorship simulation tool that facilitates
+testing of applications in a simulated network which can be configured
+and extended to behave like censorship infrastructure in various
+countries. EvilGenius [XXX] can be used to do automated “smoke testing”,
+i.e. find out if code still works properly if a node in the network
+manipulates traffic in different ways. Other than that, it can be used
+to automatically test decentralized network applications. “Overall,
+working with Tor was a great experience and I hope to be able to work
+with the Tor community again” said Johannes.
+
+ [XXX] https://github.com/TheTorProject/EvilGenius
+
+Kostas Jakeliūnas worked on creating a searchable and
+scalable Tor Metrics data archive [XXX]. This required implementing a Tor
+relay consensus and descriptor search backend that can encompass most
+of the archival data available (as of now, the currently running
+backend covers relays from 2008 up until now).
+
+Those curious to browse Tor relay archives — searching for
+needles in the very large haystack or just looking around —
+might enjoy playing with the current test platform [XXX]. It can run
+powerful queries on the large dataset without query parameter/span
+restrictions.  Many use cases are supported [XXX] — for example, since the
+newest consensus data is always available, the backend can be used in an
+ExoneraTor-like fashion.
+
+Together with Karsten Loesing, Kostas hope to integrate this system with
+the current Onionoo [XXX], hopefully further empowering (and eventually
+simplifying) the overall Tor Metrics ecosystem.
+
+Kostas described the project as “an interesting and challenging one — a
+lot of work […] to make it robust and truly scalable.” He also added:
+“Working with Tor was a great experience: I found the developer
+community to be welcoming indeed, comprised of many people who are
+professionals in their field.  It should be noted that where there are
+interesting problems and a clear cause, great people assemble.”
+
+ [XXX] http://github.com/wfn/torsearch
+ [XXX] http://ts.mkj.lt:5555/
+ [XXX] https://github.com/wfn/torsearch/blob/master/docs/use_cases_examples.md
+ [XXX] https://www.torproject.org/projects/onionoo.html.en
 
 New Release of XXX
 ------------------
@@ -86,8 +150,8 @@
           | http://www.sigsac.org/ccs/CCS2013/
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by XXX, ra,
+Johannes Fürmann, Kostas Jakeliūnas and XXX.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
@@ -104,4 +168,4 @@
  * Traceroute measurement from Tor relays https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
- * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html+ * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html

version 20
Author: lunar
Date:   2013-10-29T10:48:59+00:00

   Damian's + gsoc mentor summit

--- version 19
+++ version 20
@@ -62,6 +62,11 @@
 
  [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
 
+Damian Johnson has sent his status report [XXX] for October. Don't miss the
+few impressions from the GSoC Mentor Summit.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
+
 Vulnerabilities
 ---------------
 
@@ -98,6 +103,5 @@
 
  * Traceroute measurement from Tor relays https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
- * Reports: Damian https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
  * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
  * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html
version 19
Author: lunar
Date:   2013-10-29T10:18:47+00:00

   cover Tails next meeting

--- version 18
+++ version 19
@@ -56,6 +56,12 @@
  [XXX] https://trac.torproject.org/projects/tor/ticket/10007
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-October/030730.html
 
+The next Tails contributor meeting will be held on November 6th [XXX]. The present
+agenda has “firewall exceptions for user-run local services”, “decide what kind of
+questions go into the FAQ” among other topics.
+
+ [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
+
 Vulnerabilities
 ---------------
 
@@ -92,7 +98,6 @@
 
  * Traceroute measurement from Tor relays https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
- * next Tails meeting https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
  * Reports: Damian https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
  * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
  * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html
version 18
Author: lunar
Date:   2013-10-29T10:15:49+00:00

   force myself into editor

--- version 17
+++ version 18
@@ -1,6 +1,6 @@
 ''18th issue of Tor Weekly News. Covering what's happening from October 22th, 2013 to October 29th, 2013. To be released on October 30th, 2013.''
 
-'''Editor:''' 
+'''Editor:''' Lunar
 
 '''Subject:''' Tor Weekly News — October 30th, 2013
 

version 17
Author: lunar
Date:   2013-10-29T10:15:30+00:00

   fix another variant of "click here"

--- version 16
+++ version 17
@@ -42,9 +42,9 @@
 the browser's text fields, including the URL and search bars. So 
 far this problem appears be resolved by removing ibus with apt-get 
 before running the Tor Browser. Users who need ibus can try running 
-`export GTK_IM_MODULE=xim`, as documented in this bug [XXX].
+`export GTK_IM_MODULE=xim`, as documented in Trac ticket #9353 [XXX].
 
-[XXX]: https://bugs.torproject.org/projects/tor/ticket/9353
+ [XXX] https://bugs.torproject.org/9353
 
 Miscellaneous news
 ------------------

version 16
Author: lunar
Date:   2013-10-29T10:14:29+00:00

   drop the idea, the botnet will probably stay longer

--- version 15
+++ version 16
@@ -90,7 +90,6 @@
 
 Possible items:
 
- * looks like the botnet is declining… needs more information https://metrics.torproject.org/users.html
  * Traceroute measurement from Tor relays https://lists.torproject.org/pipermail/tor-relays/2013-October/003113.html
  * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  * next Tails meeting https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html

version 15
Author: lunar
Date:   2013-10-29T10:06:42+00:00

   add item

--- version 14
+++ version 15
@@ -95,4 +95,5 @@
  * Tor on BSD https://lists.torproject.org/pipermail/tor-talk/2013-October/030800.html
  * next Tails meeting https://mailman.boum.org/pipermail/tails-dev/2013-October/003956.html
  * Reports: Damian https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
- * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/+ * Gibberbot is now ChatSecure as of v12 https://play.google.com/store/apps/details?id=info.guardianproject.otr.app.im & https://guardianproject.info/2013/10/24/chatsecure-v12-provides-comprehensive-security-and-a-whole-new-look/
+ * [Draft Proposal] Scalable Hidden Services https://lists.torproject.org/pipermail/tor-dev/2013-October/005674.html

===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/18 ===
===========================================================================

version 2
Author: lunar
Date:   2013-10-29T12:01:04+00:00

   add item

--- version 1
+++ version 2
@@ -76,4 +76,8 @@
 
   [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+}}}
+
+Possible items:
+
+ * Damian's report https://lists.torproject.org/pipermail/tor-reports/2013-October/000367.html
version 1
Author: lunar
Date:   2013-10-29T11:54:15+00:00

   import template

--- 
+++ version 1
@@ -0,0 +1,79 @@
+''Nineteenth issue of Tor Weekly News. Covering what's happening from October 29th, 2013 to November 5th, 2013. To be released on November 6th, 2013.''
+
+'''Editor:''' 
+
+'''Subject:''' Tor Weekly News — November 6th, 2013
+
+{{{
+========================================================================
+Tor Weekly News                                       November 6th, 2013
+========================================================================
+
+Welcome to the nineteenth issue of Tor Weekly News, the weekly
+newsletter that covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]
+
+Monthly status reports for XXX month 2013
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+ [XXX]
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX] vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.



More information about the news-team mailing list