[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Dec 24 12:20:08 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/25 ===
===========================================================================

version 37
Author: lunar
Date:   2013-12-24T11:35:12+00:00

   FREEZE

--- version 36
+++ version 37
@@ -1,6 +1,8 @@
 ''26th issue of Tor Weekly News. Covering what's happening from December 17th, 2013 to December 24th, 2013. To be released on December 25th, 2013.''
 
 '''Editor:''' Lunar
+
+'''Status:''' FROZEN! Language and technical fixes welcome. New items should go on [wiki:TorWeeklyNews/2014/1 next week's page].
 
 '''Subject:''' Tor Weekly News — December 25th, 2013
 
@@ -10,96 +12,98 @@
 ========================================================================
 
 Welcome to the 26th issue of Tor Weekly News, the weekly newsletter that
-covers what is happening in the XXX Tor community.
+covers what is happening in the Tor community.
 
 The 3.x series of the Tor Browser Bundle is now stable
 ------------------------------------------------------
 
 After more than a year of work, Mike Perry has officialy blessed the 3.5
-release of the Tor Browser Bundle as the new stable release [XXX].
+release of the Tor Browser Bundle as the new stable release [1].
 Improving on the previous stable series, it features a deterministic
-build system [XXX] for distributed trust [XXX], a new integrated
-interface to interact with Tor [XXX] and all the improvements from Tor
-0.2.4 [XXX]. 
+build system [2] for distributed trust [3], a new integrated interface
+to interact with Tor [4] and all the improvements from Tor 0.2.4 [5]. 
 
 Users of the previous 2.x series might be a little disoriented by the
 user interface changes. David Fifield, Matt Pagan and others have been
-compiling the most frequent questions [XXX] heard after the switch.
-Until the integrated browser interface catches up, new Vidalia bundles
-are now available for those who need them. Erinn Clark is ironing out
-the remaining integration issues.
-
-With the discontinuation of Firefox 17 ESR, the new release
-had to be pushed to users to avoid exposing them to security holes.
-Firefox 24 ESR, on which the Tor Browser is now based, should be
-supported by Mozilla for approximately one year. This will leave our
-browser hackers some time to focus more on user experience improvements,
-test automation, and better resistance to fingerprinting issues.
+compiling the most frequent questions [6] heard after the switch.  Until
+the integrated browser interface catches up, new Vidalia bundles are now
+available [7] for those who need them. Erinn Clark is ironing out the
+remaining integration issues.
+
+With the discontinuation of Firefox 17 ESR, the new release had to be
+pushed to users to avoid exposing them to security holes.  Firefox 24
+ESR, on which the Tor Browser is now based, should be supported by
+Mozilla for approximately one year. This will leave our browser hackers
+some time to focus more on user experience improvements, test
+automation, and better resistance to fingerprinting issues.
 
 Several tutorials, videos, and bits of documentation might now in one
-way or another be out-of-date in many places. Please help report
-them or, even better, write up some updated versions.
+way or another be out-of-date in many places. Please help report them
+or, even better, write up some updated versions.
 
 This release is quite a milestone for the project. Update and enjoy!
 
- [XXX] https://blog.torproject.org/blog/tor-browser-bundle-35-released
- [XXX] https://blog.torproject.org/blog/deterministic-builds-part-two-technical-details
- [XXX] https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
- [XXX] https://gitweb.torproject.org/tor-launcher.git
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031392.html
- [XXX] https://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ
- [XXX] https://people.torproject.org/~erinn/vidalia-standalone-bundles/
+   [1] https://blog.torproject.org/blog/tor-browser-bundle-35-released
+   [2] https://blog.torproject.org/blog/deterministic-builds-part-two-technical-details
+   [3] https://blog.torproject.org/blog/deterministic-builds-part-one-cyberwar-and-global-compromise
+   [4] https://gitweb.torproject.org/tor-launcher.git
+   [5] https://lists.torproject.org/pipermail/tor-talk/2013-December/031392.html
+   [6] https://trac.torproject.org/projects/tor/wiki/doc/TorBrowserBundle3FAQ
+   [7] https://people.torproject.org/~erinn/vidalia-standalone-bundles/
 
 The Tor Project now accepts donation in Bitcoin
 -----------------------------------------------
 
-As is often pointed out in the press, the majority of the Tor
-Project's financial support comes from US government-linked
-organizations. In the ongoing effort to offer as many possible ways
-for individuals and organizations to give help to the project, Bitcoin
-donations are now being accepted [XXX].
-
-As Roger Dingledine wrote in a subsequent comment: “We really need to get some
-funding for core Tor development, and especially for improving Tor's anonymity,
-because none of our current funders care enough about the anonymity side of
-Tor. Outreach and blocking-resistance are great topics, but we can't let the
-anonymity part rot.”
-
-Head over to the donations page [XXX] to learn more about how to chip in with
-Bitcoins or other currencies.
-
- [XXX] https://blog.torproject.org/blog/announcement-tor-project-now-accepting-bitcoin-donations
- [XXX] https://www.torproject.org/donate/donate#bitcoin
+As is often pointed out in the press, the majority of the Tor Project’s
+financial support comes from US government-linked organizations. In the
+ongoing effort to offer as many possible ways for individuals and
+organizations to give help to the project, Bitcoin donations are now
+being accepted [8].
+
+As Roger Dingledine wrote in a subsequent comment: “We really need to
+get some funding for core Tor development, and especially for improving
+Tor’s anonymity, because none of our current funders care enough about
+the anonymity side of Tor. Outreach and blocking-resistance are great
+topics, but we can’t let the anonymity part rot.”
+
+Head over to the donations page [9] to learn more about how to chip in
+with Bitcoins or other currencies.
+
+   [8] https://blog.torproject.org/blog/announcement-tor-project-now-accepting-bitcoin-donations
+   [9] https://www.torproject.org/donate/donate#bitcoin
 
 Tor 0.2.4.20 is out
 -------------------
 
-The first update to the new stable branch of Tor has been released [XXX] on
-December 23rd. It fixes an issue that would create more preemptive circuits
-than actually need, and a security issue related to poor random number generation.
-
-The latter affects “users who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their torrc
-file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors, and 4) have no state file
-in their DataDirectory (as would happen on
-first start). Users who generated relay or hidden service identity
-keys in such a situation should discard them and generate new ones.”
-
-The source code is already available [XXX]. Update packages and bundles
-should be ready soon.
-
- [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html
+The first update to the new stable branch of Tor has been released [10]
+on December 23rd. It fixes an issue that would create more preemptive
+circuits than actually need, and a security issue related to poor random
+number generation.
+
+The latter affects “users who 1) use OpenSSL 1.0.0 or later, 2) set
+‘HardwareAccel 1’ in their torrc file, 3) have ‘Sandy Bridge’ or ‘Ivy
+Bridge’ Intel processors, and 4) have no state file in their
+DataDirectory (as would happen on first start). Users who generated
+relay or hidden service identity keys in such a situation should discard
+them and generate new ones.”
+
+The source code is already available from the usual location [11].
+Update packages and bundles should be ready soon.
+
+  [10] https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html
+  [11] https://www.torproject.org/dist/
 
 Tor events at the 30th Chaos Communication Congress
 ---------------------------------------------------
 
-The Chaos Computer Club will be holding its 30th Congress [XXX] in
+The Chaos Computer Club will be holding its 30th Congress [12] in
 Hamburg between the 27th and the 30th of December, and as usual there
 are a number of Tor-related talks and events scheduled.
 
-Following their session on the Tor ecosystem at 29c3 [XXX], Tor Project
+Following their session on the Tor ecosystem at 29c3 [13], Tor Project
 members Roger Dingledine and Jacob Appelbaum will be giving a talk
-entitled “The Tor Network: We're living in interesting times” [XXX], in
-which they discuss the Project's work over the last few years, with
+entitled “The Tor Network: We’re living in interesting times” [14], in
+which they discuss the Project’s work over the last few years, with
 special reference to “major cryptographic upgrades in the Tor network,
 interesting academic papers in attacking the Tor network, major high
 profile users breaking news about the network itself, discussions about
@@ -107,90 +111,93 @@
 on the Tor network, and other important topics”.
 
 Their talk will be followed by a discussion involving everyone
-interested in helping Tor [XXX] at the NoisySquare assembly. The Tor
+interested in helping Tor [15] at the NoisySquare assembly. The Tor
 ecosystem is now made up of more than forty different projects, and
 there are sure to be ways you can help. Bring your skills and your
 energy!
 
 Torservers.net will be holding a meeting of Tor relay operators and
-organizations [XXX], featuring “quick presentations on recent and future
+organizations [16], featuring “quick presentations on recent and future
 activities around Torservers.net”, to be followed by the official
-members' meeting of the German Torservers.net partner organization,
+members’ meeting of the German Torservers.net partner organization,
 Zwiebelfreunde e.V.
 
-#youbroketheinternet will hold a session on the future of crypto
-routing backends [XXX]: “Even the IETF is now considering that Onion
-Routing should be a fundamental capability of the Internet. How would
-that look in practice?”
-
-If you are attending the Congress, feel free to come along and participate
-in these sessions; if not, you should be able to catch up with the talks
-online.
-
- [XXX] https://www.ccc.de/en/updates/2013/30c3
- [XXX] https://media.torproject.org/video/29c3-5306-en-the_tor_software_ecosystem_h264.mp4
- [XXX] https://events.ccc.de/congress/2013/Fahrplan/events/5423.html
- [XXX] https://events.ccc.de/congress/2013/wiki/Session:How_to_help_Tor%3F
- [XXX] https://events.ccc.de/congress/2013/Fahrplan/events/5397.html
- [XXX] https://events.ccc.de/congress/2013/Fahrplan/events/5439.html
- [XXX] https://events.ccc.de/congress/2013/wiki/Session:Tor_Relay_Operators_Meetup
- [XXX] https://events.ccc.de/congress/2013/wiki/Session:YBTI_Cryptographic_Routing
+#youbroketheinternet will hold a session on the future of crypto routing
+backends [17]: “Even the IETF is now considering that Onion Routing
+should be a fundamental capability of the Internet. How would that look
+in practice?”
+
+If you are attending the Congress, feel free to come along and
+participate in these sessions; if not, you should be able to catch up
+with the talks online.
+
+  [12] https://www.ccc.de/en/updates/2013/30c3
+  [13] https://media.torproject.org/video/29c3-5306-en-the_tor_software_ecosystem_h264.mp4
+  [14] https://events.ccc.de/congress/2013/Fahrplan/events/5423.html
+  [15] https://events.ccc.de/congress/2013/wiki/Session:How_to_help_Tor%3F
+  [16] https://events.ccc.de/congress/2013/wiki/Session:Tor_Relay_Operators_Meetup
+  [17] https://events.ccc.de/congress/2013/wiki/Session:YBTI_Cryptographic_Routing
 
 Miscellaneous news
 ------------------
 
-Anthony G. Basile released version 20131216 [XXX] of Tor-ramdisk, a “uClibc-based micro
-Linux distribution whose only purpose is to host a Tor server in an 
-environment that maximizes security and privacy.” This new release is the first to
-ship the 0.2.4 branch of Tor.
-
- [XXX] http://opensource.dyc.edu/pipermail/tor-ramdisk/2013-December/000107.html 
-
-For those who like hazardous experiments, intrigeri sent a call for testing [XXX]
-an experimental Tails image with preliminary UEFI support — users of Apple
-hardware should be particularly interested. anonym also announced that test
-images from the MAC spoofing branch were available.
-
- [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-December/004538.html
- [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-December/004547.html
-
-Nick Mathewson has sent his now monthly review of Tor proposal status [XXX]. Karsten
-Loesing followed-up by commenting on several proposals related to the directory
-protocol. Have a look, you might also be able to move things forward!
-
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-December/005957.html
-
-Many thanks to John Sweeney of otivpn.com [XXX], Jeremy J. Olson of
-EPRCI [XXX], and les.net for running mirrors of the Tor Project website.
-
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000403.html
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000411.html
- [XXX] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000415.html
-
-Karsten Loesing has been experimenting with replacements [XXX] for the “fast exits”
+Anthony G. Basile released version 20131216 [18] of Tor-ramdisk, a
+“uClibc-based micro Linux distribution whose only purpose is to host a
+Tor server in an environment that maximizes security and privacy.” This
+new release is the first to ship the 0.2.4 branch of Tor.
+
+  [18] http://opensource.dyc.edu/pipermail/tor-ramdisk/2013-December/000107.html 
+
+For those who like hazardous experiments, intrigeri sent a call for
+testing [19] an experimental Tails image with preliminary UEFI support —
+users of Apple hardware should be particularly interested. anonym also
+announced [20] that test images from the MAC spoofing branch were
+available.
+
+  [19] https://mailman.boum.org/pipermail/tails-dev/2013-December/004538.html
+  [20] https://mailman.boum.org/pipermail/tails-dev/2013-December/004547.html
+
+Nick Mathewson has sent his now monthly review of Tor proposal
+status [21]. Karsten Loesing followed-up by commenting on several
+proposals related to the directory protocol. Have a look, you might also
+be able to move things forward!
+
+  [21] https://lists.torproject.org/pipermail/tor-dev/2013-December/005957.html
+
+Many thanks to John Sweeney of otivpn.com [22], Jeremy J. Olson of
+EPRCI [23], and les.net [24] for running mirrors of the Tor Project
+website.
+
+  [22] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000403.html
+  [23] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000411.html
+  [24] https://lists.torproject.org/pipermail/tor-mirrors/2013-December/000415.html
+
+Karsten Loesing has been experimenting with replacements [25] for the “fast exits”
 graphs that would convey a better feeling of the network growth. He also deployed
-visualization for the fraction of connections used uni-/bidirectionally.
-
- [XXX] https://trac.torproject.org/projects/tor/ticket/10460
- [XXX] https://metrics.torproject.org/performance.html#connbidirect
+a new visualization for the fraction of connections used uni-/bidirectionally [26].
+
+  [25] https://trac.torproject.org/projects/tor/ticket/10460
+  [26] https://metrics.torproject.org/performance.html#connbidirect
 
 Tor help desk roundup
 ---------------------
 
-Multiple users have now emailed the help desk regarding a particular type of 
-“ransomware” [XXX] that encrypts the hard drive of Windows computers and won't give users 
-the decryption key until a payment is made. Victims of this malware have emailed 
-the help desk because the ransomware message includes a link to a tor hidden service 
-site. Malware victims wanted to know how to install the Tor Browser, or thought the 
+Multiple users have now emailed the help desk regarding a particular
+type of “ransomware” [27] that encrypts the hard drive of Windows
+computers and won’t give users the decryption key until a payment is
+made. Victims of this malware have emailed the help desk because the
+ransomware message includes a link to a tor hidden service site. Malware
+victims wanted to know how to install the Tor Browser, or thought the
 Tor Project was the source of the malware. 
 
-The Tor Project does not make malware; in the past Tor developers have worked with 
-anti-virus developers to help stop other types of malware. Users affected might find
-useful information in this guide [XXX]. If you have not been affected, the story
-might be a good reminder to think about your backups.
-
- [XXX] https://en.wikipedia.org/wiki/Ransomware_%28malware%29
- [XXX] http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
+The Tor Project does not make malware; in the past Tor developers have
+worked with anti-virus developers to help stop other types of malware.
+Users affected might find useful information in this guide [28]. If you
+have not been affected, the story might be a good reminder to think
+about your backups.
+
+  [27] https://en.wikipedia.org/wiki/Ransomware_%28malware%29
+  [28] http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
 
 Upcoming events
 ---------------
@@ -204,15 +211,15 @@
           | https://realworldcrypto.wordpress.com/
 
 
-This issue of Tor Weekly News has been assembled by XXX, XXX, and
-XXX.
+This issue of Tor Weekly News has been assembled by Lunar, harmony,
+Matt Pagan and dope457.
 
 Want to continue reading TWN? Please help us create this newsletter.
 We still need more volunteers to watch the Tor community and report
-important news. Please see the project page [XXX], write down your
-name and subscribe to the team mailing list [XXX] if you want to
+important news. Please see the project page [29], write down your
+name and subscribe to the team mailing list [30] if you want to
 get involved!
 
-  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
-  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}+  [29] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [30] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}

version 36
Author: lunar
Date:   2013-12-24T11:24:27+00:00

   some rewording on the malware thing

--- version 35
+++ version 36
@@ -178,17 +178,19 @@
 ---------------------
 
 Multiple users have now emailed the help desk regarding a particular type of 
-ransomware that encrypts the hard drive of Windows computers and won't give users 
+“ransomware” [XXX] that encrypts the hard drive of Windows computers and won't give users 
 the decryption key until a payment is made. Victims of this malware have emailed 
 the help desk because the ransomware message includes a link to a tor hidden service 
 site. Malware victims wanted to know how to install the Tor Browser, or thought the 
 Tor Project was the source of the malware. 
 
 The Tor Project does not make malware; in the past Tor developers have worked with 
-anti-virus developers to help stop other types of malware. Users affected by this 
-malware might find useful information in this guide [XXX].
-
-[XXX]: http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
+anti-virus developers to help stop other types of malware. Users affected might find
+useful information in this guide [XXX]. If you have not been affected, the story
+might be a good reminder to think about your backups.
+
+ [XXX] https://en.wikipedia.org/wiki/Ransomware_%28malware%29
+ [XXX] http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
 
 Upcoming events
 ---------------

version 35
Author: lunar
Date:   2013-12-24T11:11:49+00:00

   write about Tor 0.2.4.20

--- version 34
+++ version 35
@@ -70,6 +70,24 @@
 
  [XXX] https://blog.torproject.org/blog/announcement-tor-project-now-accepting-bitcoin-donations
  [XXX] https://www.torproject.org/donate/donate#bitcoin
+
+Tor 0.2.4.20 is out
+-------------------
+
+The first update to the new stable branch of Tor has been released [XXX] on
+December 23rd. It fixes an issue that would create more preemptive circuits
+than actually need, and a security issue related to poor random number generation.
+
+The latter affects “users who 1) use OpenSSL 1.0.0 or later, 2) set "HardwareAccel 1" in their torrc
+file, 3) have "Sandy Bridge" or "Ivy Bridge" Intel processors, and 4) have no state file
+in their DataDirectory (as would happen on
+first start). Users who generated relay or hidden service identity
+keys in such a situation should discard them and generate new ones.”
+
+The source code is already available [XXX]. Update packages and bundles
+should be ready soon.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html
 
 Tor events at the 30th Chaos Communication Congress
 ---------------------------------------------------
@@ -156,8 +174,6 @@
  [XXX] https://trac.torproject.org/projects/tor/ticket/10460
  [XXX] https://metrics.torproject.org/performance.html#connbidirect
 
-
-
 Tor help desk roundup
 ---------------------
 
@@ -197,8 +213,4 @@
 
   [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
   [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
-}}}
-
-Possible items:
-
-* Tor 0.2.4.20 is released https://lists.torproject.org/pipermail/tor-talk/2013-December/031483.html+}}}

===========================================================================
==== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/1 ====
===========================================================================

version 1
Author: lunar
Date:   2013-12-24T11:37:22+00:00

   import template

--- 
+++ version 1
@@ -0,0 +1,84 @@
+''27th issue of Tor Weekly News. Covering what's happening from December 24th, 2013 to December 31th, 2013. To be released on January 1st, 2014.''
+
+'''Editor:''' 
+
+'''Subject:''' Tor Weekly News — January 1st, 2013
+
+{{{
+========================================================================
+Tor Weekly News                                        January 1st, 2013
+========================================================================
+
+Welcome to the first issue for the year 2014 of Tor Weekly News, the
+weekly newsletter that covers what is happening in the XXX Tor community.
+
+New Release of XXX
+------------------
+
+XXX: cite specific release date, numbers, and developers responsible
+
+XXX: details about release
+
+ [XXX]
+
+Monthly status reports for XXX month 2013
+-----------------------------------------
+
+The wave of regular monthly reports from Tor project members for the
+month of XXX has begun. XXX released his report first [XXX], followed
+by reports from name 2 [XXX], name 3 [XXX], and name 4 [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+ [XXX]
+
+Miscellaneous news
+------------------
+
+Item 1 with cited source [XXX].
+
+Item 2 with cited source [XXX].
+
+Item 3 with cited source [XXX].
+
+ [XXX]
+ [XXX]
+ [XXX]
+
+Tor help desk roundup
+---------------------
+
+Summary of some questions sent to the Tor help desk. 
+
+Vulnerabilities
+---------------
+
+XXX: Reported vulnerabilities [XXX].
+
+ [XXX] vulnerability report source
+
+Upcoming events
+---------------
+
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+          |
+Jul XX-XX | Event XXX brief description
+          | Event City, Event Country
+          | Event website URL
+
+
+This issue of Tor Weekly News has been assembled by XXX, XXX, and
+XXX.
+
+Want to continue reading TWN? Please help us create this newsletter.
+We still need more volunteers to watch the Tor community and report
+important news. Please see the project page [XXX], write down your
+name and subscribe to the team mailing list [XXX] if you want to
+get involved!
+
+  [XXX] https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews
+  [XXX] https://lists.torproject.org/cgi-bin/mailman/listinfo/news-team
+}}}


-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list