[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Mar 11 13:00:12 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/10 ===
===========================================================================

version 47
Author: harmony
Date:   2014-03-11T12:18:37+00:00

   small language fixes

--- version 46
+++ version 47
@@ -36,16 +36,16 @@
 Tails launches a logo contest
 -----------------------------
 
-Do you want to design a piece of artwork that might be seen by hundred
+Do you want to design a piece of artwork that might be seen by hundreds
 of thousands of people everyday? A drawing that will appear on websites,
-t-shirts, stickers and software that protects anonymity and privacy?
+t-shirts, stickers, and software that protects anonymity and privacy?
 
 Tails is starting a logo contest [3] to “give Tails the visual impact it
 deserves”. Designers have a precise list of requirements to follow that
 was drawn from past discussions amongst Tails developers. Participants
-should submit a version of the logo spelling Tails and one without text,
-there is also a list of suggestions of complementary material that would
-be welcome.
+should submit a version of the logo that incorporates the word “Tails”
+as well as one without text; there is also a list of suggestions for
+complementary material that would be welcome.
 
 As the Tails team want to have the logo ready for its upcoming 1.0
 release, designers have until March 31st to send their submission. Be
@@ -123,7 +123,7 @@
   [23]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004037.html
   [24]: http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html
 
-Tails reported on their 2013 bounty program [25] that lead to several
+Tails reported on their 2013 bounty program [25] which lead to several
 changes useful for Tails in upstream software.
 
   [25]: https://tails.boum.org/news/bounties_2013_report/
@@ -156,19 +156,19 @@
 News from Tor StackExchange
 ---------------------------
 
-The last weeks brought several vulnerabilities in the GnuTLS library and
-the SSL protocol in general [34]. Ivar wanted to know, if the GnuTLS bug
-affected Tor somehow [35]. As Tor uses OpenSSL instead of GnuTLS, the
-answer is no.
+The last few weeks have seen several vulnerabilities in the GnuTLS
+library and the SSL protocol in general [34]. Ivar wanted to know if the
+GnuTLS bug affected Tor somehow [35]; as Tor uses OpenSSL instead of
+GnuTLS, the answer is no.
 
   [34]: http://www.gnutls.org/security.html#GNUTLS-SA-2014-2
   [35]: https://tor.stackexchange.com/q/1652/88
 
-tor_user found the option Socks5Proxy and wanted to know what OR
-connection are and if this option allows running a Tor node over a SOCKS
-proxy [36]. Jens Kubieziel explained that OR connections are such
-between two relays or between client and relay. It can also be used to
-run a relay over a SOCKS proxy. 
+tor_user found the option “Socks5Proxy” in the Tor manual, and wanted to
+know what OR connections are and if this option allows running a Tor
+node over a SOCKS proxy [36]. Jens Kubieziel explained that OR
+connections are those between two relays or between a client and a relay.
+It can also be used to run a relay over a SOCKS proxy. 
 
   [36]: https://tor.stackexchange.com/q/1654/88
 

version 46
Author: lunar
Date:   2014-03-11T12:06:37+00:00

   FREEZE!

--- version 45
+++ version 46
@@ -1,6 +1,8 @@
 ''36th issue of Tor Weekly News. Covering what's happening from March 4th, 2014 to March 11th, 2014. To be released on March 12th, 2014.''
 
 '''Editor:''' Lunar
+
+'''Status:''' FROZEN. Only language and technical fixes accepted. New items should go in [wiki:TorWeeklyNews/2014/11 next week's edition]. Expected publication time: 2014-03-12 12:00 UTC.
 
 '''Subject:''' Tor Weekly News — March 12th, 2014
 
@@ -15,127 +17,127 @@
 New release of tor-ramdisk
 --------------------------
 
-On March 9th, Anthony G. Basile released [XXX] a new version of
-tor-ramdisk [XXX]. Tor-ramdisk is a “micro Linux distribution whose only
+On March 9th, Anthony G. Basile released [1] a new version of
+tor-ramdisk [2]. Tor-ramdisk is a “micro Linux distribution whose only
 purpose is to host a Tor server in an environment that maximizes
 security and privacy. Security is enhanced by hardening the kernel and
 binaries, and privacy is enhanced by forcing logging to be off at all
 levels so that even the Tor operator only has access to minimal
 information. Finally, since everything runs in ephemeral memory, no
-information survives a reboot […].”
+information survives a reboot […].”
 
 The new version contains Tor 2.4.21 and an updated kernel. The main
-change is the addition of “haveged, a daemon to help generate entropy
-on diskless systems, for a more cryptographically sound system”.
-
- [XXX]: http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-March/000127.html
- [XXX]: http://opensource.dyc.edu/tor-ramdisk
+change is the addition of “haveged, a daemon to help generate entropy on
+diskless systems, for a more cryptographically sound system”.
+
+   [1]: http://opensource.dyc.edu/pipermail/tor-ramdisk/2014-March/000127.html
+   [2]: http://opensource.dyc.edu/tor-ramdisk
 
 Tails launches a logo contest
 -----------------------------
 
-Do you want to design a piece of artwork that might be seen by
-hundred of thousands of people everyday? A drawing that will appear
-on websites, t-shirts, stickers and software that protects anonymity
-and privacy?
-
-Tails is starting a logo contest [XXX] to “give Tails the visual
-impact it deserves”. Designers have a precise list of requirements
-to follow that was drawn from past discussions amongst Tails
-developers. Participants should submit a version of the logo
-spelling Tails and one without text, there is also a list of
-suggestions of complementary material that would be welcome.
+Do you want to design a piece of artwork that might be seen by hundred
+of thousands of people everyday? A drawing that will appear on websites,
+t-shirts, stickers and software that protects anonymity and privacy?
+
+Tails is starting a logo contest [3] to “give Tails the visual impact it
+deserves”. Designers have a precise list of requirements to follow that
+was drawn from past discussions amongst Tails developers. Participants
+should submit a version of the logo spelling Tails and one without text,
+there is also a list of suggestions of complementary material that would
+be welcome.
 
 As the Tails team want to have the logo ready for its upcoming 1.0
-release, designers have until March 31st to send their submission.
-Be quick!
-
- [XXX]: https://tails.boum.org/news/logo_contest/
+release, designers have until March 31st to send their submission. Be
+quick!
+
+   [3]: https://tails.boum.org/news/logo_contest/
 
 More status reports for February 2014
 -------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of February continued, with Isis Lovecruft [XXX], Andrew
-Lewman [XXX], Matt Pagan [XXX], and Kevin P. Dyer [XXX] releasing their
-reports this week.
-
-The Tails developers also reported on their recent progress [XXX], and
-Roger Dingledine sent out the report for SponsorF [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000479.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000480.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000482.html
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000483.html
- [XXX]: https://tails.boum.org/news/report_2014_02/
- [XXX]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000484.html
+month of February continued, with Isis Lovecruft [4], Andrew Lewman [5],
+Matt Pagan [6], and Kevin P. Dyer [7] releasing their reports this week.
+
+The Tails developers also reported on their recent progress [8], and
+Roger Dingledine sent out the report for SponsorF [9].
+
+   [4]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000479.html
+   [5]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000480.html
+   [6]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000482.html
+   [7]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000483.html
+   [8]: https://tails.boum.org/news/report_2014_02/
+   [9]: https://lists.torproject.org/pipermail/tor-reports/2014-March/000484.html
 
 Miscellaneous news
 ------------------
 
-Tails issued the call for testing for its 0.23 release [XXX]. At the very least,
-the long awaited features that are MAC spoofing and bridge integration would
-benefit from wider testing. Enthusiasts are encouraged to report their
-findings [XXX] on the newly created tails-tester mailing list [XXX].
-
- [XXX]: https://tails.boum.org/news/test_0.23-rc1/ 
- [XXX]: https://mailman.boum.org/pipermail/tails-testers/2014-March/000000.html
- [XXX]: https://tails.boum.org/news/tails-testers/
-
-Nick Mathewson called on anyone who wanted to make Tor relays 3 to 10% faster
-to review his patches. Have a look at #9683 [XXX] and #9841 [XXX] if you want
-to help out.
-
- [XXX]: https://bugs.torproject.org/9683
- [XXX]: https://bugs.torproject.org/9841
+Tails issued the call for testing for its 0.23 release [10]. At the very
+least, the long awaited features that are MAC spoofing and bridge
+integration would benefit from wider testing. Enthusiasts are encouraged
+to report their findings [11] on the newly created tails-tester mailing
+list [12].
+
+  [10]: https://tails.boum.org/news/test_0.23-rc1/ 
+  [11]: https://mailman.boum.org/pipermail/tails-testers/2014-March/000000.html
+  [12]: https://tails.boum.org/news/tails-testers/
+
+Nick Mathewson called on anyone who wanted to make Tor relays 3 to 10%
+faster to review his patches. Have a look at #9683 [13] and #9841 [14]
+if you want to help out.
+
+  [13]: https://bugs.torproject.org/9683
+  [14]: https://bugs.torproject.org/9841
 
 Testing of the upcoming Tor Browser Bundle 3.6 with pluggable transports
-included has started [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-qa/2014-March/thread.html
-
-Many thanks to Samuel D. Leslie [XXX] and MacLemon [XXX] for running
+included has started [15].
+
+  [15]: https://lists.torproject.org/pipermail/tor-qa/2014-March/thread.html
+
+Many thanks to Samuel D. Leslie [16] and MacLemon [17] for running
 mirrors of the Tor Project website!
 
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000483.html
- [XXX]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000484.html
+  [16]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000483.html
+  [17]: https://lists.torproject.org/pipermail/tor-mirrors/2014-March/000484.html
 
 Karsten Loesing sent out the minutes of the March 5th Weather rewrite
-online meeting [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006400.html
-
-Alex reported [XXX] on an effort to use ScrambleSuit [XXX] with OpenVPN.
-Ultimately, Yawning Angel identified a flaw in OpenVPN implementation of the
-SOCKS protocol [XXX] and even wrote a patch for it [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006394.html 
- [XXX]: http://www.cs.kau.se/philwint/scramblesuit/
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
- [XXX]: https://github.com/Yawning/openvpn/commit/7474f1acfc
-
-Sebastian Urbach announced [XXX] that Trying Trusted Tor Traceroutes [XXX]
+online meeting [18].
+
+  [18]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006400.html
+
+Alex reported [19] on an effort to use ScrambleSuit [20] with OpenVPN.
+Ultimately, Yawning Angel identified a flaw in OpenVPN implementation of
+the SOCKS protocol [21] and even wrote a patch for it [22].
+
+  [19]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006394.html 
+  [20]: http://www.cs.kau.se/philwint/scramblesuit/
+  [21]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006427.html
+  [22]: https://github.com/Yawning/openvpn/commit/7474f1acfc
+
+Sebastian Urbach announced [23] that Trying Trusted Tor Traceroutes [24]
 has “reached 100 completed runs from different ip’s (not to mention the
-multiple runs).” To all participating relay operators, he added: “Thank you
-very much for your support, you officially rock!”
-
- [XXX]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004037.html
- [XXX]: http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html
-
-Tails reported on their 2013 bounty program [XXX] that lead to several changes
-useful for Tails in upstream software.
-
- [XXX]: https://tails.boum.org/news/bounties_2013_report/
-
-Erinn Clark discovered [XXX] another fake OpenPGP key with her name and email
-address. Watch out! The canonical list of keys used for Tor signatures [XXX] is
-still available on the Tor Project’s website. Also consider verifying all
-signatures [XXX] for the reproducible Tor Browser Bundles [XXX].
-
- [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006422.html
- [XXX]: https://www.torproject.org/docs/signing-keys.html
- [XXX]: https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures
- [XXX]: https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
+multiple runs).” To all participating relay operators, he added: “Thank
+you very much for your support, you officially rock!”
+
+  [23]: https://lists.torproject.org/pipermail/tor-relays/2014-March/004037.html
+  [24]: http://web.engr.illinois.edu/~das17/tor-traceroute_v1.html
+
+Tails reported on their 2013 bounty program [25] that lead to several
+changes useful for Tails in upstream software.
+
+  [25]: https://tails.boum.org/news/bounties_2013_report/
+
+Erinn Clark discovered [26] another fake OpenPGP key with her name and
+email address. Watch out! The canonical list of keys used for Tor
+signatures [27] is still available on the Tor Project’s website. Also
+consider verifying all signatures [28] for the reproducible Tor Browser
+Bundles [29].
+
+  [26]: https://lists.torproject.org/pipermail/tor-dev/2014-March/006422.html
+  [27]: https://www.torproject.org/docs/signing-keys.html
+  [28]: https://github.com/isislovecruft/scripts/blob/master/verify-gitian-builder-signatures
+  [29]: https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
 
 Tor help desk roundup
 ---------------------
@@ -143,32 +145,32 @@
 Users have asked us why “About TorBrowser” in the Tor Browser’s Help
 menu displays the Firefox Logo instead of the Tor logo.  This has been a
 known issue for some time, and fixing it is not as easy it would seem.
-Relevant bug tickets here are #2176 [XXX], #5194 [XXX], #5698 [XXX], and
-#10888 [XXX]. 
-
- [XXX]: https://bugs.torproject.org/2176
- [XXX]: https://bugs.torproject.org/5194
- [XXX]: https://bugs.torproject.org/5698
- [XXX]: https://bugs.torproject.org/10888
+Relevant bug tickets here are #2176 [30], #5194 [31], #5698 [32], and
+#10888 [33]. 
+
+  [30]: https://bugs.torproject.org/2176
+  [31]: https://bugs.torproject.org/5194
+  [32]: https://bugs.torproject.org/5698
+  [33]: https://bugs.torproject.org/10888
 
 News from Tor StackExchange
 ---------------------------
 
 The last weeks brought several vulnerabilities in the GnuTLS library and
-the SSL protocol in general [XXX]. Ivar wanted to know, if the GnuTLS
-bug affected Tor somehow [XXX]. As Tor uses OpenSSL instead of GnuTLS,
-the answer is no.
-
- [XXX]: http://www.gnutls.org/security.html#GNUTLS-SA-2014-2
- [XXX]: https://tor.stackexchange.com/q/1652/88
+the SSL protocol in general [34]. Ivar wanted to know, if the GnuTLS bug
+affected Tor somehow [35]. As Tor uses OpenSSL instead of GnuTLS, the
+answer is no.
+
+  [34]: http://www.gnutls.org/security.html#GNUTLS-SA-2014-2
+  [35]: https://tor.stackexchange.com/q/1652/88
 
 tor_user found the option Socks5Proxy and wanted to know what OR
 connection are and if this option allows running a Tor node over a SOCKS
-proxy [XXX]. Jens Kubieziel explained that OR connections are such
+proxy [36]. Jens Kubieziel explained that OR connections are such
 between two relays or between client and relay. It can also be used to
 run a relay over a SOCKS proxy. 
 
- [XXX]: https://tor.stackexchange.com/q/1654/88
+  [36]: https://tor.stackexchange.com/q/1654/88
 
 Upcoming events
 ---------------
@@ -200,10 +202,10 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [37], write down your
+name and subscribe to the team mailing list [38] if you want to
 get involved!
 
-  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+  [37]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [38]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}

version 45
Author: lunar
Date:   2014-03-11T12:04:09+00:00

   add credits

--- version 44
+++ version 45
@@ -195,8 +195,8 @@
                  | Washington, DC, USA
                  | http://today.gmu.edu/64330/
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, harmony,
+Matt Pagan and qbi.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report

version 44
Author: lunar
Date:   2014-03-11T12:02:36+00:00

   move to next week

--- version 43
+++ version 44
@@ -206,8 +206,4 @@
 
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
-
- * Tails gets a prize https://twitter.com/accessnow/status/441043400708857856 (better find other sources than a tweet though) (maybe we should postpone this to next week if no more information emerges? no one awards $50K and then never mentions it again - harmony)
+}}}

===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/11 ===
===========================================================================

version 2
Author: lunar
Date:   2014-03-11T12:02:30+00:00

   move from past week

--- version 1
+++ version 2
@@ -81,4 +81,9 @@
 
   [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+}}}
+
+
+Possible items:
+
+ * Tails gets a prize https://twitter.com/accessnow/status/441043400708857856 (better find other sources than a tweet though)
version 1
Author: lunar
Date:   2014-03-11T12:02:03+00:00

   import template

--- 
+++ version 1
@@ -0,0 +1,84 @@
+''37th issue of Tor Weekly News. Covering what's happening from March 11th, 2014 to March 18th, 2014. To be released on March 19th, 2014.''
+
+'''Editor:''' 
+
+'''Subject:''' Tor Weekly News — March 19th, 2014
+
+{{{
+========================================================================
+Tor Weekly News                                         March 19th, 2014
+========================================================================
+
+Welcome to the eleventh issue of Tor Weekly News in 2014, the weekly
+newsletter that covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]:
+
+Monthly status reports for XXX month 2014
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]:
+ [XXX]:
+ [XXX]:
+ [XXX]:
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]:
+ [XXX]:
+ [XXX]:
+
+Tor help desk roundup
+---------------------
+
+Summary of some questions sent to the Tor help desk. 
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX]: vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX]: https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX]: https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list