[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Sun Apr 6 21:40:04 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/14 ===
===========================================================================

version 29
Author: harmony
Date:   2014-04-06T20:56:53+00:00

   write android item

--- version 28
+++ version 29
@@ -11,13 +11,6 @@
 
 Welcome to the fourteenth issue of Tor Weekly News in 2014, the weekly
 newsletter that covers what is happening in the XXX Tor community.
-
-Feature XXX
------------
-
-Feature 1 with cited source [XXX]
-
- [XXX]:
 
 A hall of Tor mirrors
 ---------------------
@@ -63,6 +56,35 @@
  [XXX]: https://www.torproject.org/docs/running-a-mirror.html.en
  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-mirrors
 
+Mission Impossible: Hardening Android for Security and Privacy
+--------------------------------------------------------------
+
+On the Tor Blog, Mike Perry posted [XXX] another large and comprehensive
+hacking guide, this time describing “the installation and configuration
+of a prototype of a secure, full-featured, Android telecommunications
+device with full Tor support, individual application firewalling, true
+cell network baseband isolation, and optional ZRTP encrypted voice and
+video support.” The walkthrough covers hardware selection and setup,
+recommended software, Google-free backups, and disabling the built-in
+microphone of a Nexus 7 tablet (with a screwdriver).
+
+As it stands, following this guide may require a certain level of
+patience, but as Mike wrote, “it is our hope that this work can be
+replicated and eventually fully automated, given a good UI, and rolled
+into a single ROM or ROM addon package for ease of use. Ultimately,
+there is no reason why this system could not become a full fledged off
+the shelf product, given proper hardware support and good UI for the
+more technical bits.”
+
+Mike has already added to and improved parts of the guide following
+contributions from users in the comments beneath the post. If you would
+like to work (or already are working) at the cutting-edge of research
+into mobile device security and usability, take a look at Mike’s
+suggestions for future work at the bottom of the guide, and feel free to
+share your ideas with the community.
+
+ [XXX]: https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy
+
 More monthly status reports for March 2014
 ------------------------------------------
 
@@ -124,7 +146,7 @@
 
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032574.html
 
-Robert posted [XXX] a brief proposal for “a prototype of a
+Robert posted [XXX] a short proposal for “a prototype of a
 next-generation Tor control interface, aiming to combine the strengths
 of both the present control protocol and the state-of-the-art
 libraries”. The idea was originally destined for this year’s GSoC
@@ -195,6 +217,4 @@
 Possible items:
 
  * sequential IP IDs on Tor relays https://lists.torproject.org/pipermail/tor-relays/2014-March/004199.html https://en.wikipedia.org/wiki/Idle_Scan https://lists.torproject.org/pipermail/tor-relays/2014-April/004205.html https://lists.torproject.org/pipermail/tor-relays/2014-April/004206.html https://lists.torproject.org/pipermail/tor-relays/2014-April/004207.html http://lists.nycbug.org/pipermail/tor-bsd/2014-April/000127.html
- * next-gen control interface idea https://lists.torproject.org/pipermail/tor-dev/2014-April/006627.html
- * Mission Impossible https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy
  * Getting JTorCtl down from the attic https://lists.torproject.org/pipermail/tor-dev/2014-April/006637.html


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list