[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed Apr 9 02:20:07 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/14 ===
===========================================================================

version 58
Author: arma
Date:   2014-04-09T01:33:18+00:00

   Get rid of new section about browser hacker, since it misinterpreted
   the mail

--- version 57
+++ version 58
@@ -162,104 +162,92 @@
 Miscellaneous news
 ------------------
 
-Michael Schloh von Bennewitz introduced himself [34] as the Tor
-Project’s new browser hacker: “since I want to improve third party
-cookie logic (increase granularity & improve intuitive UI) and remove
-nasty clipboard temp files left around, I’m starting by getting to know
-the TBB build process…and compiling documentation of irregularities as
-well as requirements”. Amongst other things, Michael has already started
-work on a “semiofficial” guide [35] to configuring a virtual machine for
-building the Tor Browser. A warm welcome to him!
-
- [34]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006655.html
- [35]: https://trac.torproject.org/projects/tor/wiki/doc/TorBrowser/VMSetup
-
-David Goulet announced [36] the seventh release candidate for Torsocks
-2.0.0 [37], the updated version of the wrapper for safely using network
+David Goulet announced [34] the seventh release candidate for Torsocks
+2.0.0 [35], the updated version of the wrapper for safely using network
 applications with Tor. “Nothing major, fixes and some code refactoring
 went in”, said David. Please review, test, and report any issues you
 find.
 
- [36]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006649.html
- [37]: https://gitweb.torproject.org/torsocks.git
-
-Nathan Freitas posted [38] a brief analysis of the role played by Orbot
+ [34]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006649.html
+ [35]: https://gitweb.torproject.org/torsocks.git
+
+Nathan Freitas posted [36] a brief analysis of the role played by Orbot
 in the recent Turkish internet service disruption: “it might be good to
 think about Turkey’s Twitter block as a “censorship-lite” event, not
 unlike the UK or Indonesia, and then figure out how we can encourage
 more adoption.”
 
- [38]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032574.html
-
-Jann Horn drew attention [39] to a potential issue caused by some Tor
+ [36]: https://lists.torproject.org/pipermail/tor-talk/2014-April/032574.html
+
+Jann Horn drew attention [37] to a potential issue caused by some Tor
 relays sending out globally-sequential IP IDs. Roger Dingledine
-linked [40] to an academic paper connected with the same question, while
-Daniel Bilik suggested [41] one method of preventing this from happening
+linked [38] to an academic paper connected with the same question, while
+Daniel Bilik suggested [39] one method of preventing this from happening
 on FreeBSD. Exactly how significant this issue is (or is not) for the
 Tor network is very much an open question; further research into which
 operating systems it affects, and how it might be related to known
 attacks against anonymity, would be very welcome.
 
- [39]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004199.html
- [40]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004206.html
- [41]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004207.html
-
-As part of their current campaign [42] to fund usable encryption tools
+ [37]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004199.html
+ [38]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004206.html
+ [39]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004207.html
+
+As part of their current campaign [40] to fund usable encryption tools
 (including Tor) for journalists, the Freedom of the Press Foundation
-published [43] a blog post on the “little-known” Tails operating system,
+published [41] a blog post on the “little-known” Tails operating system,
 featuring quotes from three of the journalists most prominently
 associated with the recent Snowden disclosures (Laura Poitras, Glenn
 Greenwald, and Barton Gellman) attesting to the important role Tails has
 played in their ability to carry out their work. If you’re impressed by
 what you read, please donate to the campaign — or become a Tails
-contributor [44]!
-
- [42]: https://pressfreedomfoundation.org/bundle/encryption-tools-journalists#donate
- [43]: https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
- [44]: https://tails.boum.org/contribute/index
+contributor [42]!
+
+ [40]: https://pressfreedomfoundation.org/bundle/encryption-tools-journalists#donate
+ [41]: https://pressfreedomfoundation.org/blog/2014/04/help-support-little-known-privacy-tool-has-been-critical-journalists-reporting-nsa
+ [42]: https://tails.boum.org/contribute/index
 
 Two Tor-affiliated projects — the Open Observatory of Network
 Interference and Tails — have each submitted a proposal to this year’s
-Knight News Challenge [45]. The OONI proposal [46] involves further
+Knight News Challenge [43]. The OONI proposal [44] involves further
 developing the ooni-probe software suite and deploying it in countries
 around the world, as well as working on analysis and visualization of
-the data gathered, in collaboration with the Chokepoint Project [47];
-while Tails’ submission [48] proposes to “improve Tails to limit the
+the data gathered, in collaboration with the Chokepoint Project [45];
+while Tails’ submission [46] proposes to “improve Tails to limit the
 impact of security flaws, isolate critical applications, and provide
 same-day security updates”. Voting is limited to the Knight Foundation’s
 trustees, but feel free to read each submission and leave your comments
 for the developers.
 
- [45]: https://www.newschallenge.org
- [46]: https://www.newschallenge.org/challenge/2014/submissions/global-internet-monitoring-project
- [47]: https://chokepointproject.net/
- [48]: https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates
-
-Robert posted [49] a short proposal for “a prototype of a
+ [43]: https://www.newschallenge.org
+ [44]: https://www.newschallenge.org/challenge/2014/submissions/global-internet-monitoring-project
+ [45]: https://chokepointproject.net/
+ [46]: https://www.newschallenge.org/challenge/2014/submissions/improve-tails-to-limit-the-impact-of-security-flaws-isolate-critical-applications-and-provide-same-day-security-updates
+
+Robert posted [47] a short proposal for “a prototype of a
 next-generation Tor control interface, aiming to combine the strengths
 of both the present control protocol and the state-of-the-art
 libraries”. The idea was originally destined for this year’s GSoC
 season, but in the end Robert opted instead to “get some feedback and
 let the idea evolve.”
 
- [49]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006627.html
-
-After the end of the Tails logo contest [50] last week, sajolida
-announced [51] that the winner will be declared by April 9th, after a
+ [47]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006627.html
+
+After the end of the Tails logo contest [48] last week, sajolida
+announced [49] that the winner will be declared by April 9th, after a
 week of voting by the most active Tails contributors.
 
- [50]: https://tails.boum.org/blueprint/logo/
- [51]: https://mailman.boum.org/pipermail/tails-dev/2014-April/005390.html
+ [48]: https://tails.boum.org/blueprint/logo/
+ [49]: https://mailman.boum.org/pipermail/tails-dev/2014-April/005390.html
 
 Following last week’s progress on the Tor website redesign campaign,
-William Papper presented [52] a functioning beta version [53] of the new
+William Papper presented [50] a functioning beta version [51] of the new
 download page that he and a team of contributors have been building.
-Have a look, and let the www-team list [54] know what works and what
+Have a look, and let the www-team list [52] know what works and what
 doesn’t!
 
- [52]: https://lists.torproject.org/pipermail/www-team/2014-April/000301.html
- [53]: http://wpapper.github.io/tor-download-web/
- [54]: https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team
+ [50]: https://lists.torproject.org/pipermail/www-team/2014-April/000301.html
+ [51]: http://wpapper.github.io/tor-download-web/
+ [52]: https://lists.torproject.org/cgi-bin/mailman/listinfo/www-team
 
 Tor help desk roundup
 ---------------------
@@ -267,38 +255,38 @@
 Tor Browser users often try to set a proxy when they don’t need to.
 Many users think they can circumvent website bans or get additional
 security by doing this. Discussion on clarifying the tor-launcher
-interface is taking place on the bug tracker [55].
-
- [55]: https://bugs.torproject.org/11405
+interface is taking place on the bug tracker [53].
+
+ [53]: https://bugs.torproject.org/11405
 
 News from Tor StackExchange
 ---------------------------
 
-Tor’s StackExchange did its second site self-evaluation [56]. Users were
+Tor’s StackExchange did its second site self-evaluation [54]. Users were
 asked to review ten questions and their respective answers. This should
 help to improve the site's overall quality.
 
 The question “Why does GnuPG show the signature of Erinn Clark as not
-trusted?” [57] got the best rating. When a user verified the downloaded
+trusted?” [55] got the best rating. When a user verified the downloaded
 copy of Tor Browser Bundle, GnuPG showed Erinn’s signature as
 not-trusted. Jens Kubieziel explained the trust model of GnuPG in his
-answer, and gapz referred to the handbook [58].
+answer, and gapz referred to the handbook [56].
 
 The following questions need better answers: “How to validate
-certificates?” [59]; “Why does Atlas sometimes show a different IP
-address from https://check.torproject.org?” [60]; “Site login does not
-persist” [61]; and “My Atlas page is blank” [62].
+certificates?” [57]; “Why does Atlas sometimes show a different IP
+address from https://check.torproject.org?” [58]; “Site login does not
+persist” [59]; and “My Atlas page is blank” [60].
 
 If you know good answers to these questions, please help the users of
 Tor StackExchange.
 
- [56]: https://meta.tor.stackexchange.com/q/196/88
- [57]: https://tor.stackexchange.com/q/1573/88
- [58]: http://gnupg.org/gph/en/manual/x334.html
- [59]: https://tor.stackexchange.com/q/1584/88
- [60]: https://tor.stackexchange.com/q/1439/88
- [61]: https://tor.stackexchange.com/q/1536/88
- [62]: https://tor.stackexchange.com/q/1587/88
+ [54]: https://meta.tor.stackexchange.com/q/196/88
+ [55]: https://tor.stackexchange.com/q/1573/88
+ [56]: http://gnupg.org/gph/en/manual/x334.html
+ [57]: https://tor.stackexchange.com/q/1584/88
+ [58]: https://tor.stackexchange.com/q/1439/88
+ [59]: https://tor.stackexchange.com/q/1536/88
+ [60]: https://tor.stackexchange.com/q/1587/88
 
 Upcoming events
 ---------------
@@ -336,10 +324,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [63], write down your
-name and subscribe to the team mailing list [64] if you want to
+important news. Please see the project page [61], write down your
+name and subscribe to the team mailing list [62] if you want to
 get involved!
 
- [63]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
- [64]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+ [61]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [62]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
version 57
Author: arma
Date:   2014-04-09T01:02:40+00:00

   --

--- version 56
+++ version 57
@@ -134,7 +134,7 @@
 contributions from users in the comments beneath the post. If you would
 like to work (or already are working) at the cutting-edge of research
 into mobile device security and usability, take a look at Mike’s
-suggestions for future work at the bottom of the guide, and feel free to
+suggestions for future work at the bottom of the guide, and please
 share your ideas with the community.
 
  [25]: https://blog.torproject.org/blog/mission-impossible-hardening-android-security-and-privacy



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list