[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Jun 10 20:40:09 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/23 ===
===========================================================================

version 58
Author: arma
Date:   2014-06-10T19:59:09+00:00

   --

--- version 57
+++ version 58
@@ -55,7 +55,7 @@
 Tor users and relay operators should make sure to update their OpenSSL
 and Tor packages as soon as possible; those using a system tor (rather
 than or in addition to the Tor Browser) should ensure that they restart
-it once the updates are installed, otherwise they will not take effect.
+it once the updates are installed; otherwise they will not take effect.
 
   [5]: http://ccsinjection.lepidum.co.jp/
   [6]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033161.html

version 57
Author: harmony
Date:   2014-06-10T19:17:51+00:00

   freeze

--- version 56
+++ version 57
@@ -3,6 +3,8 @@
 '''Editor:''' harmony
 
 '''Subject:''' Tor Weekly News — June 11th, 2014
+
+'''Status:''' FROZEN. Only technical and language fixes allowed. New items should go in [wiki:TorWeeklyNews/2014/24 next week's edition]. Expected publication time 2014-06-11 12:00 UTC.
 
 {{{
 ========================================================================
@@ -15,36 +17,36 @@
 The EFF announces its 2014 Tor Challenge
 ----------------------------------------
 
-As part of the wider “Reset the Net” event [XXX], the Electronic
-Frontier Foundation has launched [XXX] another in its occasional series
-of Tor Challenges. The goal of the campaign is to increase the Tor
-network’s capacity and diversity by encouraging members of the public to
-run relays, and directing them to the legal and technical guidance
-necessary to do so.
+As part of the wider “Reset the Net” event [1], the Electronic Frontier
+Foundation has launched [2] another in its occasional series of Tor
+Challenges. The goal of the campaign is to increase the Tor network’s
+capacity and diversity by encouraging members of the public to run
+relays, and directing them to the legal and technical guidance necessary
+to do so.
 
 So far, over 600 relays have been started (or had their capacity
 increased) as part of the campaign: you can see a running total of
-relays and bytes transferred on the campaign page [XXX]. Once you’ve set
+relays and bytes transferred on the campaign page [3]. Once you’ve set
 up your relay, you can register it on the page (anonymously or credited
 to your name); stickers and T-shirts are on offer for those who run
 relays of a certain size or for a certain period.
 
 If you run into trouble setting up your relay, you can also find expert
-advice and discussion on the tor-relays mailing list [XXX] or the #tor
+advice and discussion on the tor-relays mailing list [4] or the #tor
 channel on irc.oftc.net.
 
- [XXX]: https://blog.torproject.org/blog/reset-net
- [XXX]: https://blog.torproject.org/blog/tor-challenge-2014
- [XXX]: https://www.eff.org/torchallenge/
- [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
+  [1]: https://blog.torproject.org/blog/reset-net
+  [2]: https://blog.torproject.org/blog/tor-challenge-2014
+  [3]: https://www.eff.org/torchallenge/
+  [4]: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
 
 Tor and the “EarlyCCS” bug
 --------------------------
 
 Following April’s much-loved “Heartbleed” bug, another OpenSSL
-vulnerability was discovered — nicknamed “EarlyCCS” [XXX] — that could
+vulnerability was discovered — nicknamed “EarlyCCS” [5] — that could
 have an impact on the security of many internet services, including Tor.
-Nick Mathewson explained [XXX] that although “Tor is comparatively
+Nick Mathewson explained [6] that although “Tor is comparatively
 resilient to having one layer of crypto removed”, it may be affected to
 the extent that “an adversary in the position to run a MITM attack on a
 Tor client or relay could cause a TLS connection to be negotiated
@@ -55,125 +57,126 @@
 than or in addition to the Tor Browser) should ensure that they restart
 it once the updates are installed, otherwise they will not take effect.
 
- [XXX]: http://ccsinjection.lepidum.co.jp/
- [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033161.html
+  [5]: http://ccsinjection.lepidum.co.jp/
+  [6]: https://lists.torproject.org/pipermail/tor-talk/2014-June/033161.html
 
 A new website for the directory archive
 ---------------------------------------
 
-Karsten Loesing announced [XXX] the new CollecTor service [XXX], which spins off
-the directory archive section from the Metrics [XXX] portal.
-
-What’s different? Archive tarballs are now provided in a directory structure
-rather than a single directory [XXX], recently published descriptors can now be
-accessed much more easily [XXX], and the documentation of descriptor
-formats [XXX] has been updated.
-
-The now obsolete rsync access to metrics-archive and metrics-recent will be
-discontinued on August 4, 2014.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006942.html
- [XXX]: https://collector.torproject.org/
- [XXX]: https://metrics.torproject.org/
- [XXX]: https://collector.torproject.org/archive/
- [XXX]: https://collector.torproject.org/recent/
- [XXX]: https://collector.torproject.org/formats.html
+Karsten Loesing announced [7] the new CollecTor service [8], which spins
+off the directory archive section from the Metrics [9] portal.
+
+What’s different? Archive tarballs are now provided in a directory
+structure rather than a single directory [10], recently published
+descriptors can now be accessed much more easily [11], and the
+documentation of descriptor formats [12] has been updated.
+
+The now obsolete rsync access to metrics-archive and metrics-recent will
+be discontinued on August 4, 2014.
+
+  [7]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006942.html
+  [8]: https://collector.torproject.org/
+  [9]: https://metrics.torproject.org/
+ [10]: https://collector.torproject.org/archive/
+ [11]: https://collector.torproject.org/recent/
+ [12]: https://collector.torproject.org/formats.html
 
 More monthly status reports for May 2014
 ----------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of May continued, with reports from Karsten Loesing [XXX], Isis
-Lovecruft (who submitted reports for both April [XXX] and May [XXX]), 
-George Kadianakis [XXX], Nicolas Vigier [XXX], and Roger Dingledine [XXX].
-
-Roger also sent the report for SponsorF [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000551.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000553.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000552.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000554.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000556.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000559.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000558.html
+month of May continued, with reports from Karsten Loesing [13], Isis
+Lovecruft (who submitted reports for both April [14] and May [15]),
+George Kadianakis [16], Nicolas Vigier [17], and Roger Dingledine [18].
+
+Roger also sent the report for SponsorF [19].
+
+ [13]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000551.html
+ [14]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000553.html
+ [15]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000552.html
+ [16]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000554.html
+ [17]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000556.html
+ [18]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000559.html
+ [19]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000558.html
 
 Miscellaneous news
 ------------------
 
-Version 3.6.2 of the Tor Browser is ready for testing [XXX]. Please try it out
-and report any issues you may find.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-qa/2014-June/000415.html
-
-The Tails developers formally announced [XXX] the upcoming Tails
+Version 3.6.2 of the Tor Browser is ready for testing [20]. Please try
+it out and report any issues you may find.
+
+ [20]: https://lists.torproject.org/pipermail/tor-qa/2014-June/000415.html
+
+The Tails developers formally announced [21] the upcoming Tails
 Hackfest, inviting absolutely “anyone interested in making Tails more
 usable and more secure” to join them in Paris on the 5th and 6th of July
 (immediately after the Tor dev meeting) and “learn about the challenges
 faced by Tails, and how you can be part of the solution”. Fuller details
-of the venue and timetable can be found on the Tails website [XXX].
-
- [XXX]: https://tails.boum.org/news/Join_us_at_the_Tails_HackFest_2014/
- [XXX]: https://tails.boum.org/blueprint/HackFest_2014_Paris/
+of the venue and timetable can be found on the Tails website [22].
+
+ [21]: https://tails.boum.org/news/Join_us_at_the_Tails_HackFest_2014/
+ [22]: https://tails.boum.org/blueprint/HackFest_2014_Paris/
 
 Several of Tor’s Google Summer of Code students submitted their regular
-progress reports: Juha Nurmi on the ahmia.fi project [XXX], Israel
-Leiva on the GetTor revamp [XXX], Amogh Pradeep on the Orbot+Orfox
-project [XXX], Quinn Jarrell on the pluggable transport combiner [XXX],
-Marc Juarez on the link-padding pluggable transport development [XXX],
-Noah Rahman on the Stegotorus refactoring work [XXX], Sreenatha
-Bhatlapenumarthi on the Tor Weather rewrite [XXX], Daniel Martí on
-the implementation of consensus diffs [XXX], and Mikhail Belous on the
-multicore tor daemon [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000555.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006959.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006960.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006961.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000557.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006962.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006964.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006966.html
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006984.html
-
-Thanks to moparisthebest [XXX] for running a mirror of the Tor Project
+progress reports: Juha Nurmi on the ahmia.fi project [23], Israel Leiva
+on the GetTor revamp [24], Amogh Pradeep on the Orbot+Orfox
+project [25], Quinn Jarrell on the pluggable transport combiner [26],
+Marc Juarez on the link-padding pluggable transport development [27],
+Noah Rahman on the Stegotorus refactoring work [28], Sreenatha
+Bhatlapenumarthi on the Tor Weather rewrite [29], Daniel Martí on the
+implementation of consensus diffs [30], and Mikhail Belous on the
+multicore tor daemon [31].
+
+ [23]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000555.html
+ [24]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006959.html
+ [25]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006960.html
+ [26]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006961.html
+ [27]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000557.html
+ [28]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006962.html
+ [29]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006964.html
+ [30]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006966.html
+ [31]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006984.html
+
+Thanks to moparisthebest [32] for running a mirror of the Tor Project
 website!
 
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-June/000612.html
-
-Roger Dingledine asked [XXX] the tor-relays mailing list about the
+ [32]: https://lists.torproject.org/pipermail/tor-mirrors/2014-June/000612.html
+
+Roger Dingledine asked [33] the tor-relays mailing list about the
 situation of Mac OS X users who would like to run Tor relays, and what
 steps should be taken to make it easier for them to do so “now that the
 Vidalia bundles are deprecated and hard to find”.
 
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-June/004642.html
-
-Isis Lovecruft has deployed BridgeDB version 0.2.2 [XXX] which contains many
-fixes and translation updates. The email autoresponder should not reply
-with empty emails any more.
-
- [XXX]: https://gitweb.torproject.org/bridgedb.git/blob_plain/cb8b01bc:/CHANGELOG
-
-Damian Johnson has written up [XXX] several ideas regarding a possible rewrite of the
-ExoneraTor service [XXX] in Python.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006970.html
- [XXX]: https://exonerator.torproject.org/
-
-HTTPS is sometimes heavily throttled by censors, making it hard to download
-the Tor Browser over an HTTPS link. Israel Leiva is asking for feedback [XXX] about
-making the GetTor email service reply with links to unencrypted HTTP servers as a work-around.
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006977.html
+ [33]: https://lists.torproject.org/pipermail/tor-relays/2014-June/004642.html
+
+Isis Lovecruft has deployed BridgeDB version 0.2.2 [34] which contains
+many fixes and translation updates. The email autoresponder should not
+reply with empty emails any more.
+
+ [34]: https://gitweb.torproject.org/bridgedb.git/blob_plain/cb8b01bc:/CHANGELOG
+
+Damian Johnson has written up [35] several ideas regarding a possible
+rewrite of the ExoneraTor service [36] in Python.
+
+ [35]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006970.html
+ [36]: https://exonerator.torproject.org/
+
+HTTPS is sometimes heavily throttled by censors, making it hard to
+download the Tor Browser over an HTTPS link. Israel Leiva is asking for
+feedback [37] about making the GetTor email service reply with links to
+unencrypted HTTP servers as a work-around.
+
+ [37]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006977.html
 
 Tor help desk roundup
 ---------------------
 
 The help desk has been asked for information on TorCoin, a proposed
-cryptocurrency. TorCoin is not affiliated with or endorsed by the Tor 
-Project. The Tor Project publishes guidelines on the use of its trademark
-to try to prevent confusing uses of the Tor name [XXX].
-
-[XXX]: https://www.torproject.org/docs/trademark-faq.html.en
+cryptocurrency. TorCoin is not affiliated with or endorsed by the Tor
+Project. The Tor Project publishes guidelines on the use of its
+trademark to try to prevent confusing uses of the Tor name [38].
+
+ [38]: https://www.torproject.org/docs/trademark-faq.html.en
 
 Easy development tasks to get involved with
 -------------------------------------------
@@ -181,12 +184,12 @@
 obfsproxy, the traffic obfuscator, opens the “authcookie” file for each
 new incoming connection. George Kadianakis suggests that it should
 instead read the file on startup and keep its content in memory during
-operation [XXX]. obfsproxy is written in Python/Twisted. The change
+operation [39]. obfsproxy is written in Python/Twisted. The change
 should be pretty small, but if you like finding the right places that
 need changing, feel free to look at the ticket and post your patch
 there.
 
- [XXX]: https://bugs.torproject.org/9822
+ [39]: https://bugs.torproject.org/9822
 
 Upcoming events
 ---------------
@@ -213,12 +216,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [40], write down your
+name and subscribe to the team mailing list [41] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
+ [40]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+ [41]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}

version 56
Author: harmony
Date:   2014-06-10T19:10:27+00:00

   add missing anchor

--- version 55
+++ version 56
@@ -153,7 +153,7 @@
 
  [XXX]: https://gitweb.torproject.org/bridgedb.git/blob_plain/cb8b01bc:/CHANGELOG
 
-Damian Johnson has written up several ideas regarding a possible rewrite of the
+Damian Johnson has written up [XXX] several ideas regarding a possible rewrite of the
 ExoneraTor service [XXX] in Python.
 
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006970.html

version 55
Author: harmony
Date:   2014-06-10T19:05:42+00:00

   one more gsoc report

--- version 54
+++ version 55
@@ -121,8 +121,9 @@
 project [XXX], Quinn Jarrell on the pluggable transport combiner [XXX],
 Marc Juarez on the link-padding pluggable transport development [XXX],
 Noah Rahman on the Stegotorus refactoring work [XXX], Sreenatha
-Bhatlapenumarthi on the Tor Weather rewrite [XXX], and Daniel Martí on
-the implementation of consensus diffs [XXX].
+Bhatlapenumarthi on the Tor Weather rewrite [XXX], Daniel Martí on
+the implementation of consensus diffs [XXX], and Mikhail Belous on the
+multicore tor daemon [XXX].
 
  [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-June/000555.html
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006959.html
@@ -132,6 +133,7 @@
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006962.html
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006964.html
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006966.html
+ [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-June/006984.html
 
 Thanks to moparisthebest [XXX] for running a mirror of the Tor Project
 website!

version 54
Author: harmony
Date:   2014-06-10T19:03:37+00:00

   remove unused section

--- version 53
+++ version 54
@@ -172,13 +172,6 @@
 to try to prevent confusing uses of the Tor name [XXX].
 
 [XXX]: https://www.torproject.org/docs/trademark-faq.html.en
-
-News from Tor StackExchange
----------------------------
-
-Text with cited source [XXX].
-
- [XXX]:
 
 Easy development tasks to get involved with
 -------------------------------------------


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/24 ===
===========================================================================

version 1
Author: harmony
Date:   2014-06-10T19:22:47+00:00

   import template

--- 
+++ version 1
@@ -0,0 +1,89 @@
+''50th issue of Tor Weekly News. Covering what's happening from June 10th, 2014 to June 17th, 2014. To be released on June 18th, 2014.''
+
+'''Editor:''' 
+
+'''Subject:''' Tor Weekly News — June 18th, 2014
+
+{{{
+========================================================================
+Tor Weekly News                                          June 18th, 2014
+========================================================================
+
+Welcome to the twenty-fourth issue of Tor Weekly News in 2014, the
+weekly newsletter that covers what is happening in the Tor community.
+
+Feature XXX
+-----------
+
+Feature 1 with cited source [XXX]
+
+ [XXX]:
+
+Monthly status reports for XXX month 2014
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]:
+ [XXX]:
+ [XXX]:
+ [XXX]:
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]:
+ [XXX]:
+ [XXX]:
+
+Tor help desk roundup
+---------------------
+
+Summary of some questions sent to the Tor help desk. 
+
+News from Tor StackExchange
+---------------------------
+
+Text with cited source [XXX].
+
+ [XXX]:
+
+Easy development tasks to get involved with
+-------------------------------------------
+
+Text with cited source [XXX].
+
+ [XXX]: 
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list