[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Dec 10 13:20:05 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/23 ===
===========================================================================

version 41
Author: lunar
Date:   2013-12-10T12:37:07+00:00

   FREEZE

--- version 40
+++ version 41
@@ -1,6 +1,8 @@
 ''24th issue of Tor Weekly News. Covering what's happening from December 3rd, 2013 to December 10th, 2013. To be released on December 11th, 2013.''
 
 '''Editor:''' Lunar
+
+'''Status:''' FROZEN. Only technical and language fixes allowed. New items should go on [wiki:TorWeeklyNews/2013/24 next week's page]. Expected publication time 2013-12-10 12:00 UTC
 
 '''Subject:''' Tor Weekly News — December 11th, 2013
 
@@ -9,149 +11,159 @@
 Tor Weekly News                                      December 11th, 2013
 ========================================================================
 
-Welcome to the twenty-forth issue of Tor Weekly News, the weekly newsletter that
-covers what is happening in the XXX Tor community.
+Welcome to the twenty-forth issue of Tor Weekly News, the weekly
+newsletter that covers what is happening in the Tor community.
 
 Introducing a new Lead Automation Engineer
 ------------------------------------------
 
 The Tor Project welcomed a new member, Nicolas Vigier, in the role of
 Lead Automation Engineer. He swiftly got down to business by putting out
-a call [XXX] for automation-related feedback “from developers of any tor
+a call [1] for automation-related feedback “from developers of any tor
 components”, promising a summary of “the current status regarding build,
 packaging, testing, and what should be done” to improve the automated
 processes involved in Tor development, as well as “some proposals and a
 general plan for the work to be done during the coming months”, an early
-version of which is already online [XXX]. A warm welcome to him!
+version of which is already online [2]. A warm welcome to him!
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005906.html
- [XXX] https://people.torproject.org/~boklm/automation/tor-automation-review.html
+   [1] https://lists.torproject.org/pipermail/tor-dev/2013-December/005906.html
+   [2] https://people.torproject.org/~boklm/automation/tor-automation-review.html
 
 Freedom of the Press Foundation launch a support campaign for Tor
 -----------------------------------------------------------------
 
-In his report for November [XXX], Roger Dingledine wrote: “We've also been pondering
-lately how to do a fundraising or donations drive, to help move us off our
-reliance on government funders.” The good news is that Tor has many supporters.
+In his report for November [3], Roger Dingledine wrote: “We've also been
+pondering lately how to do a fundraising or donations drive, to help
+move us off our reliance on government funders.” The good news is that
+Tor has many supporters.
 
 The Freedom of the Press Foundation just started a campaign to support
-encryption tools for journalists [XXX] that is going to last for two months.
-The campaign is gathering funds for Tor core development work, the Tails live
-system [XXX], the encrypted mobile communication tools RedPhone and
-TextSecure [XXX], and the encrypted email platform LEAP [XXX].
+encryption tools for journalists [4] that is going to last for two
+months.  The campaign is gathering funds for Tor core development work,
+the Tails live system [5], the encrypted mobile communication tools
+RedPhone and TextSecure [6], and the encrypted email platform LEAP [7].
 
-Spread the word and help make the campaign a success [XXX]. Direct donations
-to The Tor Project are also always possible [XXX].
+Spread the word and help make the campaign a success [8]. Direct
+donations to The Tor Project are also always possible [9].
 
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000396.html
- [XXX] https://pressfreedomfoundation.org/blog/2013/12/freedom-press-foundation-launches-campaign-support-encryption-tools-journalists
- [XXX] https://tails.boum.org/
- [XXX] https://whispersystems.org/
- [XXX] https://leap.se/
- [XXX] https://pressfreedomfoundation.org/
- [XXX] https://www.torproject.org/donate/
+   [3] https://lists.torproject.org/pipermail/tor-reports/2013-December/000396.html
+   [4] https://pressfreedomfoundation.org/blog/2013/12/freedom-press-foundation-launches-campaign-support-encryption-tools-journalists
+   [5] https://tails.boum.org/
+   [6] https://whispersystems.org/
+   [7] https://leap.se/
+   [8] https://pressfreedomfoundation.org/
+   [9] https://www.torproject.org/donate/
 
 More monthly status reports for November 2013
 ---------------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of November continued, with reports from Roger Dingledine [XXX],
-Georg Koppen [XXX], Karsten Loesing [XXX], Matt Pagan [XXX], Nicolas Vigier [XXX]
-Philipp Winter [XXX], Damian Johnson [XXX], and Noel David Torres Taño [XXX].
+month of November continued, with reports from Roger Dingledine [10],
+Georg Koppen [11], Karsten Loesing [12], Matt Pagan [13], Nicolas
+Vigier [14] Philipp Winter [15], Damian Johnson [16], and Noel David
+Torres Taño [17].
 
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000396.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000397.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000398.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000399.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000400.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000401.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000402.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000403.html
+  [10] https://lists.torproject.org/pipermail/tor-reports/2013-December/000396.html
+  [11] https://lists.torproject.org/pipermail/tor-reports/2013-December/000397.html
+  [12] https://lists.torproject.org/pipermail/tor-reports/2013-December/000398.html
+  [13] https://lists.torproject.org/pipermail/tor-reports/2013-December/000399.html
+  [14] https://lists.torproject.org/pipermail/tor-reports/2013-December/000400.html
+  [15] https://lists.torproject.org/pipermail/tor-reports/2013-December/000401.html
+  [16] https://lists.torproject.org/pipermail/tor-reports/2013-December/000402.html
+  [17] https://lists.torproject.org/pipermail/tor-reports/2013-December/000403.html
 
 Miscellaneous news
 ------------------
 
-David Fifield has produced updated “pluggable transport bundles” [XXX] based on the
-2.4.18 browser bundles. Be sure to update!
+David Fifield has produced updated “pluggable transport bundles” [18]
+based on the 2.4.18 browser bundles. Be sure to update!
 
- [XXX] https://blog.torproject.org/blog/pluggable-transports-bundles-2418-rc-1-pt1-and-2418-rc-2-pt1-firefox-17011esr
+  [18] https://blog.torproject.org/blog/pluggable-transports-bundles-2418-rc-1-pt1-and-2418-rc-2-pt1-firefox-17011esr
 
-David also announced [XXX] great progress in integrating our current set of pluggable
-transports within the new Tor Browser 3 build infrastructure.
+David also announced [19] great progress in integrating our current set
+of pluggable transports within the new Tor Browser 3 build
+infrastructure.
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005913.html
+  [19] https://lists.torproject.org/pipermail/tor-dev/2013-December/005913.html
 
 Thanks to Himanshu from India, Andrew Lewman could deploy a new
-script [XXX] to list mirrors of the Tor Project's website [XXX].
-The new code will ensure that mirrored files are “100% the same as those
-on torproject.org (hashing, pgp signatures, etc)” and will remove
-and re-instate mirrors accordingly.
+script [20] to list mirrors of the Tor Project's website [21].  The new
+code will ensure that mirrored files are “100% the same as those on
+torproject.org (hashing, pgp signatures, etc)” and will remove and
+re-instate mirrors accordingly.
 
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000394.html
- [XXX] https://www.torproject.org/getinvolved/mirrors.html.en
+  [20] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000394.html
+  [21] https://www.torproject.org/getinvolved/mirrors.html.en
 
-Thanks BarkerJr [XXX], DevRandom [XXX] and Userzap [XXX] for setting up new mirrors!
+Thanks BarkerJr [22], DevRandom [23] and Userzap [24] for setting up new
+mirrors!
 
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-October/000381.html
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-November/000384.html
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-November/000389.html
+  [22] https://lists.torproject.org/pipermail/tor-mirrors/2013-October/000381.html
+  [23] https://lists.torproject.org/pipermail/tor-mirrors/2013-November/000384.html
+  [24] https://lists.torproject.org/pipermail/tor-mirrors/2013-November/000389.html
 
-Nathan Freitas announced that Orfox was going to replace Orweb [XXX] in the
-Guardian Project set of secure communication tools. Orfox is based on Firefox
-engine and is likely to behave closer to the Tor Browser. “However, Orfox is
-still very early (not alpha yet) and has not been fully tested. I would either
-do your own testing and report back to us, or only use the app for non
-sensitive/critical browsing for now” Nathan added [XXX].
+Nathan Freitas announced that Orfox was going to replace Orweb [25] in
+the Guardian Project set of secure communication tools. Orfox is based
+on Firefox engine and is likely to behave closer to the Tor Browser.
+“However, Orfox is still very early (not alpha yet) and has not been
+fully tested. I would either do your own testing and report back to us,
+or only use the app for non sensitive/critical browsing for now” Nathan
+added [26].
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031331.html 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031340.html
+  [25] https://lists.torproject.org/pipermail/tor-talk/2013-December/031331.html 
+  [26] https://lists.torproject.org/pipermail/tor-talk/2013-December/031340.html
 
-arkmd reported that TorBirdy was saving unencrypted drafts on the remote server
-on their system. Sukhbir Singh has not been able to reproduce the issue so far [XXX]
-but he is thinking of disabling the automatic save feature entirely [XXX].
+arkmd reported [27] that TorBirdy was saving unencrypted drafts on the
+remote server on their system. Sukhbir Singh has not been able to
+reproduce the issue so far [28] but he is thinking of disabling the
+automatic save feature entirely [29].
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005901.html 
- [XXX] https://trac.torproject.org/projects/tor/ticket/10309#comment:4
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005903.html
+  [27] https://lists.torproject.org/pipermail/tor-dev/2013-December/005901.html 
+  [28] https://trac.torproject.org/projects/tor/ticket/10309#comment:4
+  [29] https://lists.torproject.org/pipermail/tor-dev/2013-December/005903.html
 
-Christian announced [XXX] that Globe was “now officially hosted on the
+Christian announced [30] that Globe was “now officially hosted on the
 torproject servers”. Credits to Karsten Loesing and Peter Palfrader for
-setting up the infrastructure. Have a look at this new Tor relay and bridge
-explorer [XXX]!
+setting up the infrastructure. Have a look at this new Tor relay and
+bridge explorer [31]!
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031353.html
- [XXX] https://globe.torproject.org/
+  [30] https://lists.torproject.org/pipermail/tor-talk/2013-December/031353.html
+  [31] https://globe.torproject.org/
 
-ghostmaker advertised [XXX] “a small new tool for Windows called InjectSOCKS that can
-force other Windows software to do TCP connections via SOCKS.” InjectSOCKS source
-code and binaries are available from the project page.
+ghostmaker advertised [32] “a small new tool for Windows called
+InjectSOCKS that can force other Windows software to do TCP connections
+via SOCKS.” InjectSOCKS source code and binaries are available from the
+project page [33].
 
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005908.html
- [XXX] http://sourceforge.net/projects/injectsocks
+  [32] https://lists.torproject.org/pipermail/tor-dev/2013-December/005908.html
+  [33] http://sourceforge.net/projects/injectsocks
 
-The Tails team has issued a call for testing regarding incremental upgrades [XXX].
-One more step on the path to provide easy upgrades to Tails users.
+The Tails team has issued a call for testing regarding incremental
+upgrades [34].  One more step on the path to provide easy upgrades to
+Tails users.
 
- [XXX] https://tails.boum.org/news/test_incremental_upgrades/
+  [34] https://tails.boum.org/news/test_incremental_upgrades/
 
-The release schedule for Tails 0.22.1 [XXX] has been published by intrigeri.
-The expected release date for this point release is January 21th.
+The release schedule for Tails 0.22.1 [35] has been published by
+intrigeri.  The expected release date for this point release is January
+21th.
 
- [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-December/004405.html
+  [35] https://mailman.boum.org/pipermail/tails-dev/2013-December/004405.html
 
 Tor help desk roundup
 ---------------------
 
-Multiple users have asked the help desk for IPv6 bridges specifically. 
-Currently getting IPv6 bridges is not too easy, but the issue is known [XXX]
-and should be solved as the bridge distributor is improved. IPv6 bridges are
-functional in (at least part of)  China, but we do not have many of them to
-distribute. Please set up an IPv6 bridge if you can, it's only one
-“ORPort” line to add [XXX] to the usual configuration [XXX].
+Multiple users have asked the help desk for IPv6 bridges specifically.
+Currently getting IPv6 bridges is not too easy, but the issue is
+known [36] and should be solved as the bridge distributor is improved.
+IPv6 bridges are functional in (at least part of)  China, but we do not
+have many of them to distribute. Please set up an IPv6 bridge if you
+can, it's only one “ORPort” line to add [37] to the usual
+configuration [38].
 
- [XXX] https://bugs.torproject.org/projects/tor/ticket/9127
- [XXX] https://people.torproject.org/~linus/ipv6-relay-howto.html
- [XXX] https://www.torproject.org/docs/bridges.html.en#RunningABridge
+  [36] https://bugs.torproject.org/projects/tor/ticket/9127
+  [37] https://people.torproject.org/~linus/ipv6-relay-howto.html
+  [38] https://www.torproject.org/docs/bridges.html.en#RunningABridge
 
 Upcoming events
 ---------------
@@ -161,18 +173,15 @@
           | https://events.ccc.de/congress/2013/
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, harmony,
+dope457, Matt Pagan and Karsten Loesing.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [39], write down your
+name and subscribe to the team mailing list [40] if you want to
 get involved!
 
-  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+  [39] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [40] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
-
-Possible items:
-



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list