[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Dec 17 14:40:05 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/24 ===
===========================================================================

version 46
Author: harmony
Date:   2013-12-17T14:01:18+00:00

   link to next week's issue

--- version 45
+++ version 46
@@ -4,7 +4,7 @@
 
 '''Subject:''' Tor Weekly News — December 18th, 2013
 
-'''Status:''' FROZEN. Only technical and language fixes allowed. New items should go on next week's page. Expected publication time 2013-12-18 14:00 UTC.
+'''Status:''' FROZEN. Only technical and language fixes allowed. New items should go on [wiki:TorWeeklyNews/2013/25 next week's page]. Expected publication time 2013-12-18 14:00 UTC.
 
 {{{
 ========================================================================

version 45
Author: harmony
Date:   2013-12-17T13:50:41+00:00

   freeze

--- version 44
+++ version 45
@@ -3,173 +3,178 @@
 '''Editor:''' harmony
 
 '''Subject:''' Tor Weekly News — December 18th, 2013
+
+'''Status:''' FROZEN. Only technical and language fixes allowed. New items should go on next week's page. Expected publication time 2013-12-18 14:00 UTC.
 
 {{{
 ========================================================================
 Tor Weekly News                                      December 18th, 2013
 ========================================================================
 
-Welcome to the twenty-fifth issue of Tor Weekly News, the weekly newsletter that
-covers what is happening in the ever-updating Tor community.
+Welcome to the twenty-fifth issue of Tor Weekly News, the weekly
+newsletter that covers what is happening in the ever-updating Tor
+community.
 
 Tor 0.2.4.19 is out
 -------------------
 
-After more than a year in the making, Roger Dingledine announced [XXX]
-the first stable release in the Tor 0.2.4 series, as well as the
-dedication of this series to the memory of Aaron Swartz (1986-2013).
-
-Tor 0.2.4 boasts a large number of major new features, among them a
-new circuit handshake, improved link encryption, a flexible approach
-to the queueing of circuit creation requests, and the use of “directory
-guards” to defend against client-enumeration attacks. You can consult
-the full changelog in Roger's announcement, and download the source
-code from the website [XXX].
+After more than a year in the making, Roger Dingledine announced [1] the
+first stable release in the Tor 0.2.4 series, as well as the dedication
+of this series to the memory of Aaron Swartz (1986-2013).
+
+Tor 0.2.4 boasts a large number of major new features, among them a new
+circuit handshake, improved link encryption, a flexible approach to the
+queueing of circuit creation requests, and the use of “directory guards”
+to defend against client-enumeration attacks. You can consult the full
+changelog in Roger's announcement, and download the source code from the
+website [2].
 
 As no code changes have been made since the previous release candidate,
 there is no reasons for users of tor 0.2.4.18-rc to upgrade in a hurry.
 
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031392.html
- [XXX] https://www.torproject.org/dist/
+   [1] https://lists.torproject.org/pipermail/tor-talk/2013-December/031392.html
+   [2] https://www.torproject.org/dist/
 
 Tor Browser Bundle 3.5rc1 is out
 --------------------------------
 
-Mike Perry announced [XXX] the first release candidate in the Tor
-Browser Bundle 3.5 series, and strongly encouraged users to update
-in anticipation of the imminent end-of-life of both the 2.x stable
-and 3.0 series, following Mozilla's deprecation of Firefox 17 ESR,
-on which both are based.
+Mike Perry announced [3] the first release candidate in the Tor Browser
+Bundle 3.5 series, and strongly encouraged users to update in
+anticipation of the imminent end-of-life of both the 2.x stable and 3.0
+series, following Mozilla's deprecation of Firefox 17 ESR, on which both
+are based.
 
 This release also includes a number of important security updates,
-alongside various bugfixes and usability improvements; for this
-reason as well, users should update as soon as possible.
-
- [XXX] https://blog.torproject.org/blog/tor-browser-bundle-35rc1-released
+alongside various bugfixes and usability improvements; for this reason
+as well, users should update as soon as possible.
+
+   [3] https://blog.torproject.org/blog/tor-browser-bundle-35rc1-released
 
 Tails 0.22 is out
 -----------------
 
-Tails saw its 35th release on December 11th [XXX]. It incorporates
-many major and minor improvements and bugfixes, and opens up the new
+Tails saw its 35th release on December 11th [4]. It incorporates many
+major and minor improvements and bugfixes, and opens up the new
 incremental-upgrade feature for beta-testing.
 
 As this is the first release to feature a browser based on the Firefox
-24 ESR series, some small inconveniences found their way in. Have a
-look at the known issues before giving it a go.
-
-Nevertheless, it fixes several important security issues [XXX], so it
-is recommended that all users upgrade as soon as possible.
-
- [XXX] https://tails.boum.org/news/version_0.22/
- [XXX] https://tails.boum.org/security/Numerous_security_holes_in_0.21/
+24 ESR series, some small inconveniences found their way in. Have a look
+at the known issues before giving it a go.
+
+Nevertheless, it fixes several important security issues [5], so it is
+recommended that all users upgrade as soon as possible.
+
+   [4] https://tails.boum.org/news/version_0.22/
+   [5] https://tails.boum.org/security/Numerous_security_holes_in_0.21/
 
 Torservers.net awarded $250,000 grant
 -------------------------------------
 
-The Torservers.net team announced [XXX] that they have received a
-$250,000 organizational grant, to be spread over two years, from the
-Digital Defenders Partnership [XXX], which in its own words was
-“established to provide rapid response to threats to internet freedom.”
+The Torservers.net team announced [6] that they have received a $250,000
+organizational grant, to be spread over two years, from the Digital
+Defenders Partnership [7], which in its own words was “established to
+provide rapid response to threats to internet freedom.”
 
 With this grant, wrote Moritz Bartl, “participating Torservers
-organizations will be able to sustain at least 3 Gbit/s of exit
-traffic, and 2000 fast and up-to-date bridges.”
+organizations will be able to sustain at least 3 Gbit/s of exit traffic,
+and 2000 fast and up-to-date bridges.”
 
 In order to make the most efficient use of this significant contribution
-to the Tor network while maintaining its diversity, wrote Moritz, “we need
-to find seven more organizations that are willing to rent servers for a
-period of at least 2 years” [XXX], adding that “we really want to avoid
-having organizations run both high bandwidth exit relays and a larger
-number of Tor bridges: An operator should not see both traffic entering
-the Tor network and traffic leaving the Tor network” [XXX].
+to the Tor network while maintaining its diversity, wrote Moritz, “we
+need to find seven more organizations that are willing to rent servers
+for a period of at least 2 years” [8], adding that “we really want to
+avoid having organizations run both high bandwidth exit relays and a
+larger number of Tor bridges: An operator should not see both traffic
+entering the Tor network and traffic leaving the Tor network” [9].
 
 For this reason, he called for groups interested in supporting the Tor
 network to get in contact, in order to discuss how they can best set up
 and maintain Tor services. The first such partnership will be with the
-Institute for War and Peace Reporting's Cyber Arabs group [XXX].
+Institute for War and Peace Reporting's Cyber Arabs group [10].
 
 If you represent an organization that could make this much-needed
-contribution to the Tor network, please contact the Torservers.net
-team, or join them at the Tor relay operators meetup during the
-upcoming Chaos Communication Congress in Hamburg [XXX].
-
- [XXX] https://blog.torservers.net/20131213/torservers-awarded-250000-by-digital-defenders.html
- [XXX] http://digitaldefenders.org/
- [XXX] https://lists.torproject.org/pipermail/tor-relays/2013-December/003495.html
- [XXX] https://mailman.stanford.edu/pipermail/liberationtech/2013-December/012376.html
- [XXX] https://www.cyber-arabs.com/
- [XXX] https://events.ccc.de/congress/2013/wiki/Session:Torservers_Meetup
+contribution to the Tor network, please contact the Torservers.net team,
+or join them at the Tor relay operators meetup during the upcoming Chaos
+Communication Congress in Hamburg [11].
+
+   [6] https://blog.torservers.net/20131213/torservers-awarded-250000-by-digital-defenders.html
+   [7] http://digitaldefenders.org/
+   [8] https://lists.torproject.org/pipermail/tor-relays/2013-December/003495.html
+   [9] https://mailman.stanford.edu/pipermail/liberationtech/2013-December/012376.html
+  [10] https://www.cyber-arabs.com/
+  [11] https://events.ccc.de/congress/2013/wiki/Session:Torservers_Meetup
 
 Miscellaneous news
 ------------------
 
-The Tails team reported on the vast amount of activity that occurred during
-November 2013 [XXX]. Coming up in the next few Tails releases are an updated
-I2P, a new clock applet with configurable timezone, better localization,
-incremental upgrades, safer persistence, MAC spoofing…
-
- [XXX] https://tails.boum.org/news/report_2013_11/
+The Tails team reported on the vast amount of activity that occurred
+during November 2013 [12]. Coming up in the next few Tails releases are
+an updated I2P, a new clock applet with configurable timezone, better
+localization, incremental upgrades, safer persistence, MAC spoofing…
+
+  [12] https://tails.boum.org/news/report_2013_11/
 
 meejah announced the release of txtorcon 0.8.2, and warned users that
 they should upgrade if they use that program's TCP4HiddenServiceEndpoint
 feature, in order to fix a bug that allows listening on hosts other than
-127.0.0.1 [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005927.html
-
-Kevin P Dyer announced the 0.2.2 release of fteproxy, which “includes the removal
-of gmpy as a dependency, additional documentation to explain the significance
-of language theoretical algorithms, and bounds checking of the input/output of
-our (un)ranking algorithms” [XXX]; this hot on the heels of 0.2.1, in which he
-“focused on breaking away from heavyweight dependencies: OpenFST and boost” [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005953.html
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005929.html
-
-Mike Perry shared his thoughts regarding the presence of the Tor Browser Bundle
-in centralized repositories such as the Apple App Store or Google Play, and the
-possibilities for attack that these stores open up [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005923.html
+127.0.0.1 [13].
+
+  [13] https://lists.torproject.org/pipermail/tor-dev/2013-December/005927.html
+
+Kevin P Dyer announced the 0.2.2 release of fteproxy, which “includes
+the removal of gmpy as a dependency, additional documentation to explain
+the significance of language theoretical algorithms, and bounds checking
+of the input/output of our (un)ranking algorithms” [14]; this hot on the
+heels of 0.2.1, in which he “focused on breaking away from heavyweight
+dependencies: OpenFST and boost” [15].
+
+  [14] https://lists.torproject.org/pipermail/tor-dev/2013-December/005953.html
+  [15] https://lists.torproject.org/pipermail/tor-dev/2013-December/005929.html
+
+Mike Perry shared his thoughts regarding the presence of the Tor Browser
+Bundle in centralized repositories such as the Apple App Store or Google
+Play, and the possibilities for attack that these stores open up [16].
+
+  [16] https://lists.torproject.org/pipermail/tor-dev/2013-December/005923.html
 
 Ondrej Mikle warned users of Enterprise Linux 5 that Tor RPM packages
 will no longer be built for their platform, owing to an “increasing
-number of required workarounds”. [XXX]
-
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031408.html
-
-Karsten Loesing published a summary of the past, present and the future of the
-Tor Metrics project, which he maintains, offering some context for the various
-changes that have recently been announced [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005948.html
-
-Lunar sent reports from the Tor help desk for October [XXX] and November [XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000404.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000405.html
-
-Jacob Appelbaum recapped his work over the last few months - from June to December -
-in a slew of reports [XXX,XXX,XXX,XXX,XXX,XXX,XXX].
-
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000407.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000408.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000409.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000410.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000411.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000412.html
- [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-December/000413.html
+number of required workarounds” [17].
+
+  [17] https://lists.torproject.org/pipermail/tor-talk/2013-December/031408.html
+
+Karsten Loesing published a summary of the past, present and the future
+of the Tor Metrics project, which he maintains, offering some context
+for the various changes that have recently been announced [18].
+
+  [18] https://lists.torproject.org/pipermail/tor-dev/2013-December/005948.html
+
+Lunar sent reports from the Tor help desk for October [19] and
+November [20].
+
+  [19] https://lists.torproject.org/pipermail/tor-reports/2013-December/000404.html
+  [20] https://lists.torproject.org/pipermail/tor-reports/2013-December/000405.html
+
+Jacob Appelbaum recapped his work over the last few months - from June
+to December - in a slew of reports [21, 22, 23, 24, 25, 26, 27].
+
+  [21] https://lists.torproject.org/pipermail/tor-reports/2013-December/000407.html
+  [22] https://lists.torproject.org/pipermail/tor-reports/2013-December/000408.html
+  [23] https://lists.torproject.org/pipermail/tor-reports/2013-December/000409.html
+  [24] https://lists.torproject.org/pipermail/tor-reports/2013-December/000410.html
+  [25] https://lists.torproject.org/pipermail/tor-reports/2013-December/000411.html
+  [26] https://lists.torproject.org/pipermail/tor-reports/2013-December/000412.html
+  [27] https://lists.torproject.org/pipermail/tor-reports/2013-December/000413.html
 
 Tor help desk roundup
 ---------------------
 
-Occasionally users who need the Pluggable Transports Tor Browser Bundle will 
-download the Vidalia Bridge Bundle instead, which is less useful for users
-trying to circumvent state censorship. The Vidalia Bridge Bundle is only 
-available for Windows and is configured by default to turn the client machine 
-into a bridge. None of the Vidalia Bundles are designed to use Pluggable 
-Transports.
+Occasionally users who need the Pluggable Transports Tor Browser Bundle
+will download the Vidalia Bridge Bundle instead, which is less useful
+for users trying to circumvent state censorship. The Vidalia Bridge
+Bundle is only available for Windows and is configured by default to
+turn the client machine into a bridge. None of the Vidalia Bundles are
+designed to use Pluggable Transports.
 
 Upcoming events
 ---------------
@@ -183,12 +188,12 @@
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [28], write down your
+name and subscribe to the team mailing list [29] if you want to
 get involved!
 
-  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+  [28] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [29] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
 }}}
 
 Possible items:


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/25 ===
===========================================================================

version 1
Author: harmony
Date:   2013-12-17T13:53:59+00:00

   create page

--- 
+++ version 1
@@ -0,0 +1,84 @@
+''26th issue of Tor Weekly News. Covering what's happening from December 17th, 2013 to December 24th, 2013. To be released on December 25th, 2013.''
+
+'''Editor:''' 
+
+'''Subject:''' Tor Weekly News — December 25th, 2013
+
+{{{
+========================================================================
+Tor Weekly News                                      December 25th, 2013
+========================================================================
+
+Welcome to the 26th issue of Tor Weekly News, the weekly newsletter that
+covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]
+
+Monthly status reports for XXX month 2013
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+ [XXX]
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+
+Tor help desk roundup
+---------------------
+
+Summary of some questions sent to the Tor help desk. 
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX] vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list