[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Dec 16 19:00:04 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/24 ===
===========================================================================

version 37
Author: harmony
Date:   2013-12-16T18:21:42+00:00

   even more info from moritz/minor language fixes

--- version 36
+++ version 37
@@ -20,14 +20,14 @@
 dedication of this series to the memory of Aaron Swartz (1986-2013).
 
 Tor 0.2.4 boasts a large number of major new features, among them a
-new circuit handshake, improved link
-encryption, a flexible approach to the queueing of circuit creation
-requests, and the use of “directory guards” to defend against
-client-enumeration attacks. You can consult the full changelog in
-Roger's announcement, and download the source code [XXX]
+new circuit handshake, improved link encryption, a flexible approach
+to the queueing of circuit creation requests, and the use of “directory
+guards” to defend against client-enumeration attacks. You can consult
+the full changelog in Roger's announcement, and download the source
+code from the package archive [XXX].
 
-As no code changes were made since the previous release candidate,
-there is no reasons for users of tor 0.2.4.18-rc to hurry an upgrade.
+As no code changes have been made since the previous release candidate,
+there is no reasons for users of tor 0.2.4.18-rc to upgrade in a hurry.
 
  [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031392.html
  [XXX] https://www.torproject.org/dist/
@@ -79,31 +79,35 @@
 In order to make the most efficient use of this significant contribution
 to the Tor network while maintaining its diversity, wrote Moritz, “we need
 to find seven more organizations that are willing to rent servers for a
-period of at least 2 years” [XXX]. For this reason, he called for groups
-interested in supporting the Tor network to get in contact, in
-order to discuss how they can best set up and maintain Tor services.
-The first such partnership will be with
-the Institute for War and Peace Reporting's Cyber Arabs group [XXX].
+period of at least 2 years” [XXX], adding that “we really want to avoid
+having organizations run both high bandwidth exit relays and a larger
+number of Tor bridges: An operator should not see both traffic entering
+the Tor network and traffic leaving the Tor network” [XXX].
 
-If you
-represent an organization that could make this much-needed contribution
-to the Tor network, please contact the Torservers.net team, or join them at
-the Tor relay operators meetup during the upcoming Chaos Communication
-Congress in Hamburg [XXX].
+For this reason, he called for groups interested in supporting the Tor
+network to get in contact, in order to discuss how they can best set up
+and maintain Tor services. The first such partnership will be with the
+Institute for War and Peace Reporting's Cyber Arabs group [XXX].
+
+If you represent an organization that could make this much-needed
+contribution to the Tor network, please contact the Torservers.net
+team, or join them at the Tor relay operators meetup during the
+upcoming Chaos Communication Congress in Hamburg [XXX].
 
  [XXX] https://blog.torservers.net/20131213/torservers-awarded-250000-by-digital-defenders.html
  [XXX] http://digitaldefenders.org/
  [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-December/003495.html
+ [XXX] https://mailman.stanford.edu/pipermail/liberationtech/2013-December/012376.html
  [XXX] https://www.cyber-arabs.com/
  [XXX] https://events.ccc.de/congress/2013/wiki/Session:Torservers_Meetup
 
 Miscellaneous news
 ------------------
 
-The Tails team reported on the vast amount of activities that happened during
-November 2013 [XXX]. Upcoming in next Tails releases: updated I2P, a new
-clock applet with configurable timezone, better localization, incremental
-upgrades, safer persistence, MAC spoofing…
+The Tails team reported on the vast amount of activity that occurred during
+November 2013 [XXX]. Coming up in the next few Tails releases are an updated
+I2P, a new clock applet with configurable timezone, better localization,
+incremental upgrades, safer persistence, MAC spoofing…
 
  [XXX] https://tails.boum.org/news/report_2013_11/
 
@@ -137,7 +141,7 @@
 
  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005948.html
 
-Lunar has sent reports from the Tor help desk for October [XXX] and November [XXX].
+Lunar sent reports from the Tor help desk for October [XXX] and November [XXX].
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000404.html
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000405.html



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list