[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Mar 4 14:00:13 UTC 2014


===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/9 ====
===========================================================================

version 79
Author: harmony
Date:   2014-03-04T13:26:20+00:00

   fix typo

--- version 78
+++ version 79
@@ -269,7 +269,7 @@
   [51]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html
   [52]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006347.html
 
-David Goulet released the forth candidate of his Torsocks
+David Goulet released the fourth candidate of his Torsocks
 rewrite [53]. This new version comes after “a big code review from Nick
 and help from a lot of people contributing and testing”. But more
 reviews and testing are now welcome!

version 78
Author: harmony
Date:   2014-03-04T13:24:31+00:00

   small language fixes

--- version 77
+++ version 78
@@ -115,12 +115,12 @@
 Miscellaneous news
 ------------------
 
-Members of the Prosecco research team have released a new attack on the
-TLS protocol [21] — dubbed “Triple Handshake” — allowing impersonation
-of a given client when client authentication is in use together with
-session resumption and renegotiation.  Nick Mathewson has published a
-detailed analysis on why Tor is not affected [22]. He also outlines
-future changes to make Tor resistant to even more potential TLS issues.
+Members of the Prosecco research team released a new attack on the TLS
+protocol [21] — dubbed “Triple Handshake” — allowing impersonation of a
+given client when client authentication is in use together with session
+resumption and renegotiation. Nick Mathewson published a detailed
+analysis of why Tor is not affected [22], and also outlines future
+changes to make Tor resistant to even more potential TLS issues.
 
   [21]: https://secure-resumption.com/
   [22]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006372.html
@@ -261,7 +261,7 @@
   [49]: https://github.com/goodvikings/tor_nagios/
   [50]: http://anonscm.debian.org/gitweb/?p=users/lunar/check_tor.git;a=blob;f=README;hb=HEAD
 
-Virgil Griffith has sent a draft proposal [51] for changes to improve
+Virgil Griffith sent a draft proposal [51] for changes to improve
 the latency of hidden services when using the “Tor2web” mode. Roger
 Dingledine commented [52] that one of the proposed changes actually
 opened a new research question regarding the actual latency benefits.
@@ -269,10 +269,10 @@
   [51]: https://lists.torproject.org/pipermail/tor-dev/2014-February/006344.html
   [52]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006347.html
 
-David Goulet has released the forth candidate of his Torsocks rewrite [53].
-This new version comes after “a big code review from Nick and help from a lot
-of people contributing and testing”. But more reviews and testing are now
-welcome!
+David Goulet released the forth candidate of his Torsocks
+rewrite [53]. This new version comes after “a big code review from Nick
+and help from a lot of people contributing and testing”. But more
+reviews and testing are now welcome!
 
   [53]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006371.html
 
@@ -302,10 +302,10 @@
   [56]: https://tor.stackexchange.com/q/1485/88
 
 The Tor Browser Bundle sets the default font to Times New Roman 16pt and allows
-pages to use their own fonts. User joeb likes to change the settings and wonders
-how this increases the possibility to fingerprint a user [57]. gacar suggests
-that this will improve fingerprinting attacks. Several important sites use font
-probing to fingerprint their users [58]. Changing the default fonts is
+pages to use their own fonts. User joeb likes to change the settings and wondered
+how this increases the possibility to fingerprint a user [57]. gacar suggested
+that this will facilitate fingerprinting attacks. Several important sites use font
+probing to fingerprint their users [58], and changing the default fonts is
 likely to make a user stand out from the common anonymity set.
 
   [57]: https://tor.stackexchange.com/q/1619/88
@@ -315,7 +315,7 @@
 searched the source code archives for “gzip” [60] and found code which deals
 with directory information. Jens Kubieziel argued that Tor operates on
 encrypted data and compressing encrypted data usually results in a increase
-in size. So it makes no sense to compress this data.
+in size, so it makes no sense to compress this data.
 
   [59]: https://tor.stackexchange.com/q/1598/88
   [60]: https://gitweb.torproject.org/tor.git?a=search&h=HEAD&st=grep&s=gzip
@@ -323,8 +323,8 @@
 Stackexchange uses bounties to award higher reputations to answers. By using
 this one can attract attention and get better answers or an answer at all. The
 question about using DNSSEC and DNScrypt over Tor [61] is probably the first
-which received a bounty. An answer to this question would be rewarded
-with 50 points. However they have not been earned yet. So if you know an
+to receive a bounty: an answer to this question would be rewarded
+with 50 points. However, they have not been earned yet, so if you know an
 answer, please enlighten the rest of the community.
 
   [61]: https://tor.stackexchange.com/q/1503/88
@@ -337,8 +337,8 @@
                  | http://fc14.ifca.ai/
                  |
 Mar 05 18:00 UTC | Tor Weather development meeting
+                 | #tor-dev, irc.oftc.net
                  | https://trac.torproject.org/projects/tor/wiki/doc/weather-in-2014
-                 | #tor-dev, irc.oftc.net
                  |
 Mar 05 19:00 UTC | Tor Browser development meeting
                  | #tor-dev, irc.oftc.net



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list