[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Apr 8 21:40:17 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/14 ===
===========================================================================

version 52
Author: harmony
Date:   2014-04-08T20:57:56+00:00

   add credit

--- version 51
+++ version 52
@@ -325,7 +325,7 @@
 
 
 This issue of Tor Weekly News has been assembled by harmony, Matt Pagan,
-Jens Kubieziel, and Lunar.
+Jens Kubieziel, Lunar, and Roger Dingledine.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 51
Author: harmony
Date:   2014-04-08T20:43:48+00:00

   fix more urls

--- version 50
+++ version 51
@@ -99,8 +99,8 @@
  [18]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000509.html
  [19]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000510.html
  [20]: https://lists.torproject.org/pipermail/tor-mirrors/2014-April/000512.html
- [21]: https://www.torproject.org/getinvolved/mirrors.html.en
- [22]: https://www.torproject.org/docs/running-a-mirror.html.en
+ [21]: https://www.torproject.org/getinvolved/mirrors
+ [22]: https://www.torproject.org/docs/running-a-mirror
  [23]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-mirrors
 
 Mission Impossible: Hardening Android for Security and Privacy

version 50
Author: arma
Date:   2014-04-08T20:20:19+00:00

   tighten language

--- version 49
+++ version 50
@@ -25,8 +25,7 @@
 communication”. Tor is one of the very many networking programs that use
 OpenSSL to communicate over the Internet, so within a few hours of the
 bug’s disclosure Roger Dingledine posted [3] a security advisory
-containing some initial thoughts on how it might affect different areas
-of the Tor ecosystem.
+describing how it affects different areas of the Tor ecosystem.
 
 “The short version is: upgrade your openssl” [4]. Tor Browser users
 should await the imminent release of new packages, while those using a

version 49
Author: harmony
Date:   2014-04-08T20:13:19+00:00

   fix url

--- version 48
+++ version 49
@@ -210,7 +210,7 @@
 
  [41]: https://pressfreedomfoundation.org/bundle/encryption-tools-journalists#donate
  [42]: https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
- [43]: https://tails.boum.org/contribute/index.en.html
+ [43]: https://tails.boum.org/contribute/index
 
 Two Tor-affiliated projects — the Open Observatory of Network
 Interference and Tails — have each submitted a proposal to this year’s

version 48
Author: harmony
Date:   2014-04-08T19:57:58+00:00

   freeze

--- version 47
+++ version 48
@@ -3,6 +3,8 @@
 '''Editor:''' harmony
 
 '''Subject:''' Tor Weekly News — April 9th, 2014
+
+'''Status:''' FROZEN. Language and technical fixes only. New items should go in [wiki:TorWeeklyNews/2014/15 next week's edition]. Expected publication time 2014-04-09 12:00 UTC.
 
 {{{
 ========================================================================
@@ -15,18 +17,18 @@
 The Heartbleed Bug and Tor
 --------------------------
 
-OpenSSL bug CVE-2014-0160 [XXX], also known as the Heartbleed bug [XXX],
+OpenSSL bug CVE-2014-0160 [1], also known as the Heartbleed bug [2],
 “allows anyone on the Internet to read the memory of systems protected
 by the vulnerable versions of the OpenSSL software”, potentially
 enabling the compromise of information including “user names and
 passwords, instant messages, emails, and business critical documents and
 communication”. Tor is one of the very many networking programs that use
 OpenSSL to communicate over the Internet, so within a few hours of the
-bug’s disclosure Roger Dingledine posted [XXX] a security advisory
+bug’s disclosure Roger Dingledine posted [3] a security advisory
 containing some initial thoughts on how it might affect different areas
 of the Tor ecosystem.
 
-“The short version is: upgrade your openssl” [XXX]. Tor Browser users
+“The short version is: upgrade your openssl” [4]. Tor Browser users
 should await the imminent release of new packages, while those using a
 system Tor should upgrade their OpenSSL version and manually restart
 their Tor process. For relay operators, “best practice would be to
@@ -36,12 +38,12 @@
 at your convenience”. Clients, relays, and services using an older
 version of OpenSSL, including Tails, are not affected by this bug.
 
-For mobile devices, Nathan Freitas called [XXX] for immediate testing of
+For mobile devices, Nathan Freitas called [5] for immediate testing of
 Orbot 13.0.6-beta-3, which not only upgrades OpenSSL but also contains a
-fix for the transproxy leak described by Mike Perry two weeks ago [XXX],
-in addition to smaller fixes and improvements from 13.0.6-beta-1 [XXX]
-and subsequently. You can obtain a copy of the .apk file directly from
-the Guardian Project’s distribution page [XXX].
+fix for the transproxy leak described by Mike Perry two weeks ago [6],
+in addition to smaller fixes and improvements from 13.0.6-beta-1 [7] and
+subsequently. You can obtain a copy of the .apk file directly from the
+Guardian Project’s distribution page [8].
 
 Ultimately, “if you need strong anonymity or privacy on the Internet,
 you might want to stay away from the Internet entirely for the next few
@@ -49,14 +51,14 @@
 more detailed explanation if you are unsure what this bug might mean for
 you.
 
- [XXX]: https://www.openssl.org/news/vulnerabilities.html#2014-0160
- [XXX]: http://heartbleed.com/
- [XXX]: https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032602.html
- [XXX]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-April/003383.html
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032503.html
- [XXX]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-April/003375.html
- [XXX]: https://guardianproject.info/releases/
+  [1]: https://www.openssl.org/news/vulnerabilities.html#2014-0160
+  [2]: http://heartbleed.com/
+  [3]: https://blog.torproject.org/blog/openssl-bug-cve-2014-0160
+  [4]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032602.html
+  [5]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-April/003383.html
+  [6]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032503.html
+  [7]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-April/003375.html
+  [8]: https://guardianproject.info/releases/
 
 A hall of Tor mirrors
 ---------------------
@@ -65,7 +67,7 @@
 as a well-researched and -developed censorship circumvention tool — and,
 regrettably, so are censorship authorities. Events such as last month’s
 (short-lived) disruption of access to the main Tor Project website from
-some Turkish internet connections [XXX] have reaffirmed the need for
+some Turkish internet connections [9] have reaffirmed the need for
 multiple distribution channels that users can turn to during a
 censorship event in order to acquire a copy of the Tor Browser, secure
 their browsing, and beat the censors. One of the simplest ways of
@@ -73,39 +75,39 @@
 somewhere else.
 
 Recent days have seen the establishment of a large number of new Tor
-website mirrors, for which thanks must go to Max Jakob Maass [XXX],
-Ahmad Zoughbi [XXX], Darren Meyer [XXX], Piratenpartei Bayern [XXX],
-Bernd Fix [XXX], Florian Walther [XXX], the Electronic Frontier
-Foundation (on a subdomain formerly housing the Tor Project’s official
-site) [XXX], the Freedom of the Press Foundation [XXX], Caleb Xu [XXX],
-George Kargiotakis [XXX], and Tobias Markus [XXX], as well as to all the
-mirror operators of longer standing [XXX].
+website mirrors, for which thanks must go to Max Jakob Maass [10], Ahmad
+Zoughbi [11], Darren Meyer [12], Piratenpartei Bayern [13], Bernd
+Fix [14], Florian Walther [15], the Electronic Frontier Foundation (on a
+subdomain formerly housing the Tor Project’s official site) [16], the
+Freedom of the Press Foundation [17], Caleb Xu [18], George
+Kargiotakis [19], and Tobias Markus [20], as well as to all the mirror
+operators of longer standing [21].
 
 If you’d like to participate in the effort to render blocking of the Tor
 website even more futile, please see the instructions for running a
-mirror [XXX], and then come to the tor-mirrors mailing list [XXX] to
+mirror [22], and then come to the tor-mirrors mailing list [23] to
 notify the community!
 
- [XXX]: https://www.eff.org/deeplinks/2014/03/when-tor-block-not-tor-block
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000497.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000499.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000500.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000501.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000505.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000506.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000507.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000508.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000509.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000510.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-April/000512.html
- [XXX]: https://www.torproject.org/getinvolved/mirrors.html.en
- [XXX]: https://www.torproject.org/docs/running-a-mirror.html.en
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-mirrors
+  [9]: https://www.eff.org/deeplinks/2014/03/when-tor-block-not-tor-block
+ [10]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000497.html
+ [11]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000499.html
+ [12]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000500.html
+ [13]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000501.html
+ [14]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000505.html
+ [15]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000506.html
+ [16]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000507.html
+ [17]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000508.html
+ [18]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000509.html
+ [19]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000510.html
+ [20]: https://lists.torproject.org/pipermail/tor-mirrors/2014-April/000512.html
+ [21]: https://www.torproject.org/getinvolved/mirrors.html.en
+ [22]: https://www.torproject.org/docs/running-a-mirror.html.en
+ [23]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-mirrors
 
 Mission Impossible: Hardening Android for Security and Privacy
 --------------------------------------------------------------
 
-On the Tor Blog, Mike Perry posted [XXX] another large and comprehensive
+On the Tor Blog, Mike Perry posted [24] another large and comprehensive
 hacking guide, this time describing “the installation and configuration
 of a prototype of a secure, full-featured, Android telecommunications
 device with full Tor support, individual application firewalling, true
@@ -129,129 +131,129 @@
 suggestions for future work at the bottom of the guide, and feel free to
 share your ideas with the community.
 
- [XXX]: https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy
+ [24]: https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy
 
 More monthly status reports for March 2014
 ------------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of March continued, with submissions from Arlo Breault [XXX],
-Colin Childs [XXX], George Kadianakis [XXX], Michael Schloh von
-Bennewitz [XXX], Philipp Winter [XXX], and Kevin Dyer [XXX].
-
-Arturo Filastò reported on behalf of the OONI team [XXX], while Mike
-Perry did likewise for the Tor Browser team [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000497.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000499.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000500.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000501.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000502.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000503.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000496.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000498.html
+month of March continued, with submissions from Arlo Breault [25], Colin
+Childs [26], George Kadianakis [27], Michael Schloh von Bennewitz [28],
+Philipp Winter [29], and Kevin Dyer [30].
+
+Arturo Filastò reported on behalf of the OONI team [31], while Mike
+Perry did likewise for the Tor Browser team [32].
+
+ [25]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000497.html
+ [26]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000499.html
+ [27]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000500.html
+ [28]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000501.html
+ [29]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000502.html
+ [30]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000503.html
+ [31]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000496.html
+ [32]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000498.html
 
 Miscellaneous news
 ------------------
 
-Michael Schloh von Bennewitz introduced himself [XXX] as the Tor
+Michael Schloh von Bennewitz introduced himself [33] as the Tor
 Project’s new browser hacker: “since I want to improve third party
 cookie logic (increase granularity & improve intuitive UI) and remove
 nasty clipboard temp files left around, I’m starting by getting to know
 the TBB build process…and compiling documentation of irregularities as
 well as requirements”. Amongst other things, Michael has already started
-work on a “semiofficial” guide [XXX] to configuring a virtual machine
-for building the Tor Browser. A warm welcome to him!
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006655.html
- [XXX]: https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/VMSetup
-
-David Goulet announced [XXX] the seventh release candidate for Torsocks
-2.0.0 [XXX], the updated version of the wrapper for safely using network
+work on a “semiofficial” guide [34] to configuring a virtual machine for
+building the Tor Browser. A warm welcome to him!
+
+ [33]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006655.html
+ [34]: https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/VMSetup
+
+David Goulet announced [35] the seventh release candidate for Torsocks
+2.0.0 [36], the updated version of the wrapper for safely using network
 applications with Tor. “Nothing major, fixes and some code refactoring
 went in”, said David. Please review, test, and report any issues you
 find.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006649.html
- [XXX]: https://gitweb.torproject.org/torsocks.git
-
-Nathan Freitas posted [XXX] a brief analysis of the role played by Orbot in
-the recent Turkish internet service disruption: “it might be good to
+ [35]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006649.html
+ [36]: https://gitweb.torproject.org/torsocks.git
+
+Nathan Freitas posted [37] a brief analysis of the role played by Orbot
+in the recent Turkish internet service disruption: “it might be good to
 think about Turkey’s Twitter block as a “censorship-lite” event, not
 unlike the UK or Indonesia, and then figure out how we can encourage
 more adoption.”
 
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032574.html
-
-Jann Horn drew attention [XXX] to a potential issue caused by some Tor
+ [37]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032574.html
+
+Jann Horn drew attention [38] to a potential issue caused by some Tor
 relays sending out globally-sequential IP IDs. Roger Dingledine
-linked [XXX] to an academic paper connected with the same question,
-while Daniel Bilik suggested [XXX] one method of preventing this from
-happening on FreeBSD. Exactly how significant this issue is (or is not)
-for the Tor network is very much an open question; further research into
-which operating systems it affects, and how it might be related to known
+linked [39] to an academic paper connected with the same question, while
+Daniel Bilik suggested [40] one method of preventing this from happening
+on FreeBSD. Exactly how significant this issue is (or is not) for the
+Tor network is very much an open question; further research into which
+operating systems it affects, and how it might be related to known
 attacks against anonymity, would be very welcome.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004199.html
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004206.html
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004207.html
-
-As part of their current campaign [XXX] to fund usable encryption tools
+ [38]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004199.html
+ [39]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004206.html
+ [40]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004207.html
+
+As part of their current campaign [41] to fund usable encryption tools
 (including Tor) for journalists, the Freedom of the Press Foundation
-published [XXX] a blog post on the “little-known” Tails operating
-system, featuring quotes from three of the journalists most prominently
+published [42] a blog post on the “little-known” Tails operating system,
+featuring quotes from three of the journalists most prominently
 associated with the recent Snowden disclosures (Laura Poitras, Glenn
 Greenwald, and Barton Gellman) attesting to the important role Tails has
 played in their ability to carry out their work. If you’re impressed by
 what you read, please donate to the campaign — or become a Tails
-contributor [XXX]!
-
- [XXX]: https://pressfreedomfoundation.org/bundle/encryption-tools-journalists#donate
- [XXX]: https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
- [XXX]: https://tails.boum.org/contribute/index.en.html
+contributor [43]!
+
+ [41]: https://pressfreedomfoundation.org/bundle/encryption-tools-journalists#donate
+ [42]: https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
+ [43]: https://tails.boum.org/contribute/index.en.html
 
 Two Tor-affiliated projects — the Open Observatory of Network
 Interference and Tails — have each submitted a proposal to this year’s
-Knight News Challenge [XXX]. The OONI proposal [XXX] involves further
+Knight News Challenge [44]. The OONI proposal [45] involves further
 developing the ooni-probe software suite and deploying it in countries
 around the world, as well as working on analysis and visualization of
-the data gathered, in collaboration with the Chokepoint Project [XXX];
-while Tails’ submission [XXX] proposes to “improve Tails to limit the
+the data gathered, in collaboration with the Chokepoint Project [46];
+while Tails’ submission [47] proposes to “improve Tails to limit the
 impact of security flaws, isolate critical applications, and provide
 same-day security updates”. Voting is limited to the Knight Foundation’s
 trustees, but feel free to read each submission and leave your comments
 for the developers.
 
- [XXX]: https://www.newschallenge.org
- [XXX]: https://www.newschallenge.org/challenge/2014/submissions/global-internet-monitoring-project
- [XXX]: https://chokepointproject.net/
- [XXX]: https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates
-
-Robert posted [XXX] a short proposal for “a prototype of a
+ [44]: https://www.newschallenge.org
+ [45]: https://www.newschallenge.org/challenge/2014/submissions/global-internet-monitoring-project
+ [46]: https://chokepointproject.net/
+ [47]: https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates
+
+Robert posted [48] a short proposal for “a prototype of a
 next-generation Tor control interface, aiming to combine the strengths
 of both the present control protocol and the state-of-the-art
 libraries”. The idea was originally destined for this year’s GSoC
 season, but in the event Robert opted instead to “get some feedback and
 let the idea evolve.”
 
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006627.html
-
-After the end of the Tails logo contest [XXX] last week, sajolida
-announced [XXX] that the winner will be declared by April 9th, after a
+ [48]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006627.html
+
+After the end of the Tails logo contest [49] last week, sajolida
+announced [50] that the winner will be declared by April 9th, after a
 week of voting by the most active Tails contributors.
 
- [XXX]: https://tails.boum.org/blueprint/logo/
- [XXX]: https://mailman.boum.org/pipermail/tails-dev/2014-April/005390.html
+ [49]: https://tails.boum.org/blueprint/logo/
+ [50]: https://mailman.boum.org/pipermail/tails-dev/2014-April/005390.html
 
 Following last week’s progress on the Tor website redesign campaign,
-William Papper presented [XXX] a functioning beta version [XXX] of the
-new download page that he and a team of contributors have been building.
-Have a look, and let the www-team list [XXX] know what works and what
+William Papper presented [51] a functioning beta version [52] of the new
+download page that he and a team of contributors have been building.
+Have a look, and let the www-team list [53] know what works and what
 doesn’t!
 
- [XXX]: https://lists.torproject.org/pipermail/www-team/2014-April/000301.html
- [XXX]: http://wpapper.github.io/tor-download-web/
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team
+ [51]: https://lists.torproject.org/pipermail/www-team/2014-April/000301.html
+ [52]: http://wpapper.github.io/tor-download-web/
+ [53]: https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team
 
 Tor help desk roundup
 ---------------------
@@ -259,38 +261,38 @@
 Tor Browser users often try to set a proxy when they don’t need to.
 Many users think they can circumvent website bans or get additional
 security by doing this. Discussion on clarifying the tor-launcher
-interface is taking place on the bug tracker [XXX].
-
-[XXX]: https://bugs.torproject.org/11405
+interface is taking place on the bug tracker [54].
+
+ [54]: https://bugs.torproject.org/11405
 
 News from Tor StackExchange
 ---------------------------
 
-Tor’s StackExchange did its second site self-evaluation [XXX]. Users
-were asked to review ten questions and their respective answers. This
-should help to improve the site's overall quality.
+Tor’s StackExchange did its second site self-evaluation [55]. Users were
+asked to review ten questions and their respective answers. This should
+help to improve the site's overall quality.
 
 The question “Why does GnuPG show the signature of Erinn Clark as not
-trusted?” [XXX] got the best rating. When a user verified the downloaded
+trusted?” [56] got the best rating. When a user verified the downloaded
 copy of Tor Browser Bundle, GnuPG showed Erinn’s signature as
 not-trusted. Jens Kubieziel explained the trust model of GnuPG in his
-answer, and gapz referred to the handbook [XXX].
+answer, and gapz referred to the handbook [57].
 
 The following questions need better answers: “How to validate
-certificates?” [XXX]; “Why does Atlas sometimes show a different IP
-address from https://check.torproject.org?” [XXX]; “Site login does not
-persist” [XXX]; and “My Atlas page is blank” [XXX].
+certificates?” [58]; “Why does Atlas sometimes show a different IP
+address from https://check.torproject.org?” [59]; “Site login does not
+persist” [60]; and “My Atlas page is blank” [61].
 
 If you know good answers to these questions, please help the users of
 Tor StackExchange.
 
- [XXX]: https://meta.tor.stackexchange.com/q/196/88
- [XXX]: https://tor.stackexchange.com/q/1573/88
- [XXX]: http://gnupg.org/gph/en/manual/x334.html
- [XXX]: https://tor.stackexchange.com/q/1584/88
- [XXX]: https://tor.stackexchange.com/q/1439/88
- [XXX]: https://tor.stackexchange.com/q/1536/88
- [XXX]: https://tor.stackexchange.com/q/1587/88
+ [55]: https://meta.tor.stackexchange.com/q/196/88
+ [56]: https://tor.stackexchange.com/q/1573/88
+ [57]: http://gnupg.org/gph/en/manual/x334.html
+ [58]: https://tor.stackexchange.com/q/1584/88
+ [59]: https://tor.stackexchange.com/q/1439/88
+ [60]: https://tor.stackexchange.com/q/1536/88
+ [61]: https://tor.stackexchange.com/q/1587/88
 
 Upcoming events
 ---------------
@@ -328,10 +330,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [62], write down your
+name and subscribe to the team mailing list [63] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [62]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [63]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
version 47
Author: harmony
Date:   2014-04-08T19:48:31+00:00

   add credits

--- version 46
+++ version 47
@@ -27,14 +27,14 @@
 of the Tor ecosystem.
 
 “The short version is: upgrade your openssl” [XXX]. Tor Browser users
-should await new packages, while those using a system Tor should upgrade
-their OpenSSL version and manually restart their Tor process. For relay
-operators, “best practice would be to update your OpenSSL package,
-discard all the files in keys/ in your DataDirectory, and restart your
-Tor to generate new keys”, and for hidden service administrators, “to
-move to a new hidden-service address at your convenience”. Clients,
-relays, and services using an older version of OpenSSL, including Tails,
-are not affected by this bug.
+should await the imminent release of new packages, while those using a
+system Tor should upgrade their OpenSSL version and manually restart
+their Tor process. For relay operators, “best practice would be to
+update your OpenSSL package, discard all the files in keys/ in your
+DataDirectory, and restart your Tor to generate new keys”, and for
+hidden service administrators, “to move to a new hidden-service address
+at your convenience”. Clients, relays, and services using an older
+version of OpenSSL, including Tails, are not affected by this bug.
 
 For mobile devices, Nathan Freitas called [XXX] for immediate testing of
 Orbot 13.0.6-beta-3, which not only upgrades OpenSSL but also contains a
@@ -323,8 +323,8 @@
                  | http://www.csc.tntech.edu/wicys/
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by harmony, Matt Pagan,
+Jens Kubieziel, and Lunar.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 46
Author: harmony
Date:   2014-04-08T19:38:57+00:00

   add orbot 13.0.6b1 link

--- version 45
+++ version 46
@@ -39,9 +39,9 @@
 For mobile devices, Nathan Freitas called [XXX] for immediate testing of
 Orbot 13.0.6-beta-3, which not only upgrades OpenSSL but also contains a
 fix for the transproxy leak described by Mike Perry two weeks ago [XXX],
-in addition to smaller fixes and improvements from 13.0.6-beta-1 and
-subsequently. You can obtain a copy of the .apk file directly from the
-Guardian Project’s distribution page [XXX].
+in addition to smaller fixes and improvements from 13.0.6-beta-1 [XXX]
+and subsequently. You can obtain a copy of the .apk file directly from
+the Guardian Project’s distribution page [XXX].
 
 Ultimately, “if you need strong anonymity or privacy on the Internet,
 you might want to stay away from the Internet entirely for the next few
@@ -55,6 +55,7 @@
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032602.html
  [XXX]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-April/003383.html
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-March/032503.html
+ [XXX]: https://lists.mayfirst.org/pipermail/guardian-dev/2014-April/003375.html
  [XXX]: https://guardianproject.info/releases/
 
 A hall of Tor mirrors

version 45
Author: harmony
Date:   2014-04-08T18:52:40+00:00

   wrong dates

--- version 44
+++ version 45
@@ -1,12 +1,12 @@
-''40th issue of Tor Weekly News. Covering what's happening from April 2nd, 2014 to April 9th, 2014. To be released on April 10th, 2014.''
+''40th issue of Tor Weekly News. Covering what's happening from April 1st, 2014 to April 8th, 2014. To be released on April 9th, 2014.''
 
 '''Editor:''' harmony
 
-'''Subject:''' Tor Weekly News — April 10th, 2014
+'''Subject:''' Tor Weekly News — April 9th, 2014
 
 {{{
 ========================================================================
-Tor Weekly News                                         April 10th, 2014
+Tor Weekly News                                          April 9th, 2014
 ========================================================================
 
 Welcome to the fourteenth issue of Tor Weekly News in 2014, the weekly

version 44
Author: harmony
Date:   2014-04-08T18:33:38+00:00

   add kevin's report

--- version 43
+++ version 44
@@ -136,7 +136,7 @@
 The wave of regular monthly reports from Tor project members for the
 month of March continued, with submissions from Arlo Breault [XXX],
 Colin Childs [XXX], George Kadianakis [XXX], Michael Schloh von
-Bennewitz [XXX], and Philipp Winter [XXX].
+Bennewitz [XXX], Philipp Winter [XXX], and Kevin Dyer [XXX].
 
 Arturo Filastò reported on behalf of the OONI team [XXX], while Mike
 Perry did likewise for the Tor Browser team [XXX].
@@ -146,6 +146,7 @@
  [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000500.html
  [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000501.html
  [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000502.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000503.html
  [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000496.html
  [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-April/000498.html
 


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/15 ===
===========================================================================

version 2
Author: harmony
Date:   2014-04-08T18:56:42+00:00

   add items

--- version 1
+++ version 2
@@ -79,4 +79,9 @@
 
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+}}}
+
+Possible items:
+
+ * Shroud: request for feedback https://lists.torproject.org/pipermail/tor-dev/2014-April/006657.html
+ * Proposal 230: How to change RSA1024 identity keys https://lists.torproject.org/pipermail/tor-dev/2014-April/006658.html
version 1
Author: harmony
Date:   2014-04-08T18:52:52+00:00

   create page

--- 
+++ version 1
@@ -0,0 +1,82 @@
+''41st issue of Tor Weekly News. Covering what's happening from April 8th, 2014 to April 15th, 2014. To be released on April 16th, 2014.''
+
+'''Editor:''' 
+
+'''Subject:''' Tor Weekly News — April 16th, 2014
+
+{{{
+========================================================================
+Tor Weekly News                                         April 16th, 2014
+========================================================================
+
+Welcome to the fifteenth issue of Tor Weekly News in 2014, the weekly
+newsletter that covers what is happening in the XXX Tor community.
+
+Feature XXX
+-----------
+
+Feature 1 with cited source [XXX]
+
+ [XXX]:
+
+Monthly status reports for XXX month 2014
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]:
+ [XXX]:
+ [XXX]:
+ [XXX]:
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]:
+ [XXX]:
+ [XXX]:
+
+Tor help desk roundup
+---------------------
+
+Summary of some questions sent to the Tor help desk. 
+
+News from Tor StackExchange
+---------------------------
+
+Text with cited source [XXX].
+
+ [XXX]:
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list