[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Apr 29 22:40:04 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/17 ===
===========================================================================

version 36
Author: harmony
Date:   2014-04-29T22:01:46+00:00

   pedantry

--- version 35
+++ version 36
@@ -18,13 +18,13 @@
 -----------------------------
 
 The latest incarnation of the current development branch of Tor,
-dubbed 0.2.5.4-alpha, has been released on April 26th [1]. The release
-mainly brings security and performance improvements for clients
+dubbed 0.2.5.4-alpha, was released on April 26th [1]. This release
+brings mainly security and performance improvements for clients
 and relays.
 
-As a preventive measure (as there's no evidence that the keys
-have been compromised), authority signing keys that were used
-while susceptible to the OpenSSL “heartbleed” bug are now blacklisted.
+As a preventive measure (there being no evidence that the keys have been
+compromised), authority signing keys that were used while susceptible to
+the OpenSSL “heartbleed” bug are now blacklisted.
 
 Other improvements include fixing two expensive functions on busy relays,
 better TLS ciphersuite preference lists, support for run-time
@@ -93,20 +93,21 @@
 Miscellaneous news
 ------------------
 
-Meejah has released version 0.9.2 of txtorcon [14] — the Tor controller library
-for the Twisted Python framework: “this release adds a few minor bug-fixes and
-a few API enhancements”.
+Meejah released version 0.9.2 of txtorcon [14] — the Tor controller
+library for the Twisted Python framework: “this release adds a few minor
+bug-fixes and a few API enhancements”.
 
   [14]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006766.html
 
-The Tails team is looking for enthusiasts equipped with Bluetooth keyboard
-and mouse [15] to ensure that Tails works properly with such hardware.
+The Tails team is looking for enthusiasts equipped with a Bluetooth
+keyboard and mouse [15] to ensure that Tails works properly with such
+hardware.
 
   [15]: https://mailman.boum.org/pipermail/tails-testers/2014-April/000010.html
 
-Matthew Finkel sent a copy of the email that was sent to bridge operators [16]
-to warn them about the “Heartbleed” vulnerability and actions that should be
-taken. If you know any bridge operator which might not have filled their
+Matthew Finkel forwarded a copy of the email that was sent to bridge operators [16]
+to warn them about the “Heartbleed” vulnerability, and the actions that should be
+taken as a result. If you know any bridge operator who might not have filled in their
 contact information, please forward the message!
 
   [16]: https://lists.torproject.org/pipermail/tor-relays/2014-April/004428.html
@@ -115,14 +116,14 @@
 to retrieve information about the Tor network — to use the Gson library
 instead of plain string concatenation to format its JSON output. As the
 change might break some applications, client authors should test
-their applications [17] and see if everything still work as it should.
+their applications [17] and see if everything still works as it should.
 
   [17]: https://lists.torproject.org/pipermail/tor-dev/2014-April/006772.html
 
 Tor help desk roundup
 ---------------------
 
-The help desk has been asked why the Tor Project's hidden service site
+The help desk has been asked why the Tor Project’s hidden service site
 mirrors are offline. The sites were taken down during the fallout from 
 the Heartbleed security vulnerability. New hidden service addresses 
 were not generated. The sysadmin team has expressed that they no longer 
@@ -134,17 +135,17 @@
 ---------------------------
 
 Kristopher Ives is working on a card game using Tor. Each user accepts
-inbound connections through hidden services and also needs to make
+inbound connections through hidden services, and also needs to make
 outbound connections [19]. Tom Ritter acknowledged it was possible to
 use only one Tor daemon to do both.
 
   [19]: https://tor.stackexchange.com/q/1592/88
 
 Dan gets the error message “Cannot load XPCOM” whenever Tor Browser is
-started [20]. Jens Kubieziel points to the discussion at #10789 [21].
-The culprit is WebRoot Internet Security as it prevents proper loading
-all browser components. Either uninstalling it or adding DLL files
-to the whitelist has helped other users [22].
+started [20]. Jens Kubieziel pointed to the discussion at #10789 [21].
+The culprit is WebRoot Internet Security as it prevents the proper
+loading of all browser components; either uninstalling it or adding DLL
+files to the whitelist has helped other users [22].
 
   [20]: https://tor.stackexchange.com/q/2012/88 
   [21]: https://trac.torproject.org/projects/tor/ticket/10789



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list