[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Dec 9 21:40:07 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/49 ===
===========================================================================

version 15
Author: harmony
Date:   2014-12-09T21:05:56+00:00

   me

--- version 14
+++ version 15
@@ -1,6 +1,6 @@
 ''75th issue of Tor Weekly News. Covering what's happening from December 2nd, 2014 to December 9th, 2014. To be released on December 10th, 2014.''
 
-'''Editor:'''
+'''Editor:''' Harmony
 
 '''Subject:''' Tor Weekly News — December 10th, 2014
 

version 14
Author: harmony
Date:   2014-12-09T21:05:19+00:00

   more misc

--- version 13
+++ version 14
@@ -36,7 +36,7 @@
 ------------------
 
 The Tails team announced [XXX] a new version of the amnesic live
-operating system. As well as updates to Linux and Tor Browser, Tails
+operating system. Alongside updates to Linux and Tor Browser, Tails
 1.2.1 finally disables the Truecrypt encryption manager, which was
 abandoned by its developers earlier this year. There have been warnings
 about this change for several months, but users who have not yet
@@ -107,6 +107,16 @@
 
  [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-December/005907.html
 
+Jacob Appelbaum recommended [XXX] possible ways to reduce the attack
+surface presented by the kernel and the firewall in Tails. He also
+compiled [XXX] a dataset containing historical hashes and signatures
+of Tails files: “In the future, I’ll write a program that uses the dataset
+in a useful manner. In an ideal world, we’d have a way to use a Tails disk
+to verify any other Tails disk.”
+
+ [XXX]: https://mailman.boum.org/pipermail/tails-dev/2014-December/007537.html
+ [XXX]: https://mailman.boum.org/pipermail/tails-dev/2014-December/007588.html
+
 Tor help desk roundup
 ---------------------
 
@@ -200,7 +210,3 @@
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
-
-Notes:
- * Tails and forensics https://mailman.boum.org/pipermail/tails-dev/2014-December/007588.html
- * Reducing attack surface of kernel in Tails https://mailman.boum.org/pipermail/tails-dev/2014-December/007537.html

version 13
Author: harmony
Date:   2014-12-09T20:56:21+00:00

   tweaks

--- version 12
+++ version 13
@@ -10,7 +10,7 @@
 ========================================================================
 
 Welcome to the forty-ninth issue in 2014 of Tor Weekly News, the weekly
-newsletter that covers what’s happening in the XXX Tor community.
+newsletter that covers what’s happening in the Tor community.
 
 Tor Browser 4.0.2 and 4.5-alpha-2 are out
 -----------------------------------------
@@ -118,31 +118,30 @@
 
 If you're a coder, see if any of the projects on our volunteer page [XXX] capture 
 your interest. You can also look for tickets on our bug-tracker [XXX] that are filed 
-with the "easy" component if you want to submit some patches.
-
-If you're interested in doing outreach, consider joining the Tor Weekly News 
+with the “easy” component if you want to submit some patches.
+
+If you’re interested in doing outreach, consider joining the Tor Weekly News 
 team [XXX]. 
 
 If you'd like to get involved with translations, please join a team on our 
-Transifex [XXX]. If a team for the language you'd like to translate into does not 
-exist (check carefully), please go ahead and request a new team. It will take a day 
+Transifex [XXX]. If a team for the language you’d like to translate into does not 
+yet exist (check carefully), please go ahead and request a new team. It will take a day 
 or two for the team to be approved, so please be patient.
 
-[XXX]: https://www.torproject.org/docs/debian.html.en
-[XXX]: https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports#Howtosetupabridgewithpluggabletransports
-[XXX]: https://www.torproject.org/getinvolved/volunteer.html.en#Projects
-[XXX]: https://trac.torproject.org/projects/tor/report
-[XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-[XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-[XXX]: https://www.transifex.com/projects/p/torproject/ 
+[XXX]: https://www.torproject.org/docs/debian
+[XXX]: https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports#Howtosetupabridgewithpluggabletransports
+[XXX]: https://www.torproject.org/getinvolved/volunteer#Projects
+[XXX]: https://trac.torproject.org/projects/tor/report
+[XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+[XXX]: https://www.transifex.com/projects/p/torproject/
 
 News from Tor StackExchange
 ---------------------------
 
 strand raised a question about the code regarding rendezvous and introduction
 points [XXX]. Within src/or/rendservice.c there are several occurances of
-onion_address. Now strand wants to know which function catches what from a
-hidden service. If you can answer this question, please come to Tor's
+onion_address, and strand wants to know which function catches what from a
+hidden service. If you can answer this question, please come to Tor’s
 Q&A page and give us some insights.
 
  [XXX]: https://tor.stackexchange.com/q/848/88
@@ -189,8 +188,8 @@
                    | https://events.ccc.de/congress/2014/wiki/Main_Page
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Matt Pagan, qbi,
+David Fifield, Arlo Breault, and Harmony.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 12
Author: harmony
Date:   2014-12-09T20:50:48+00:00

   write about new releases

--- version 11
+++ version 12
@@ -12,12 +12,48 @@
 Welcome to the forty-ninth issue in 2014 of Tor Weekly News, the weekly
 newsletter that covers what’s happening in the XXX Tor community.
 
-Feature XXX
------------
-
-Feature 1 with cited source [XXX]
-
- [XXX]:
+Tor Browser 4.0.2 and 4.5-alpha-2 are out
+-----------------------------------------
+
+Georg Koppen announced new stable and alpha releases by the Tor Browser
+team. Tor Browser 4.0.2 [XXX] fixes the Windows compiler bugs that were
+resulting in frequent crashes, ensures entries in the cache are once
+again isolated by URL bar domain, and prevents the user’s locale setting
+from being leaked by the Javascript engine. Tor Browser
+4.5-alpha-2 [XXX] further improves Torbutton’s new circuit visualization
+panel, which is now optional, as well as the security slider.
+
+Both releases contain important security updates and all users should
+upgrade as soon as possible; please see Georg’s post for full details.
+You can obtain your copy from the project page [XXX], or through the
+in-browser updater.
+
+ [XXX]: https://blog.torproject.org/blog/tor-browser-402-released
+ [XXX]: https://blog.torproject.org/blog/tor-browser-45-alpha-2-released
+ [XXX]: https://www.torproject.org/projects/torbrowser.html
+
+Tails 1.2.1 is out
+------------------
+
+The Tails team announced [XXX] a new version of the amnesic live
+operating system. As well as updates to Linux and Tor Browser, Tails
+1.2.1 finally disables the Truecrypt encryption manager, which was
+abandoned by its developers earlier this year. There have been warnings
+about this change for several months, but users who have not yet
+migrated their data away from Truecrypt (or who are not able to) can
+still access these volumes with cryptsetup by following Tails’s own
+guide [XXX].
+
+The default configuration of GnuPG has also been changed in line with
+accepted best practices [XXX]. If you want to take advantage of this,
+there is a simple step you need to perform; please see the team’s post
+for more details, and get your copy of the new Tails from the download
+page [XXX] or through the incremental updater.
+
+ [XXX]: https://tails.boum.org/news/version_1.2.1/
+ [XXX]: https://tails.boum.org/doc/encryption_and_privacy/truecrypt/
+ [XXX]: https://help.riseup.net/en/security/message-security/openpgp/best-practices
+ [XXX]: https://tails.boum.org/download/
 
 More monthly status reports for November 2014
 ---------------------------------------------
@@ -59,10 +95,9 @@
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-December/007916.html
 
 The Tails team wondered [XXX] about the best way to prioritize adding
-support for pluggable transports in the anonymous live operating system:
-“Assuming we add support for Scramblesuit in Tails 1.3, then what
-usecases won’t we be supporting, that we could support better with obfs4
-or meek?”
+support for pluggable transports: “Assuming we add support for
+Scramblesuit in Tails 1.3, then what usecases won’t we be supporting,
+that we could support better with obfs4 or meek?”
 
  [XXX]: https://mailman.boum.org/pipermail/tails-dev/2014-December/007580.html
 
@@ -167,9 +202,6 @@
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
 
-Notes: 
- * Tor Browser 4.0.2 https://blog.torproject.org/blog/tor-browser-402-released
- * Tor Browser 4.5-alpha-2 https://blog.torproject.org/blog/tor-browser-45-alpha-2-released
- * Tails 1.2.1 https://blog.torproject.org/blog/tails-121-out
+Notes:
  * Tails and forensics https://mailman.boum.org/pipermail/tails-dev/2014-December/007588.html
  * Reducing attack surface of kernel in Tails https://mailman.boum.org/pipermail/tails-dev/2014-December/007537.html



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list