[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Sep 30 19:20:06 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/13 ===
===========================================================================

version 31
Author: harmony
Date:   2013-09-30T18:45:05+00:00

   add GNU event item

--- version 30
+++ version 31
@@ -37,6 +37,19 @@
   [XXX] https://blog.torproject.org/blog/tor-browser-bundle-30alpha4-released
   [XXX] https://bridges.torproject.org/
   [XXX] https://gitweb.torproject.org/builders/tor-browser-bundle.git/blob/HEAD:/gitian/README.build
+
+Tor mini-hackathon at GNU 30th anniversary
+------------------------------------------
+
+The Tor mini-hackathon at the GNU 30th anniversary event [XXX] took place over the weekend,
+and Nick Mathewson sent out a brief report [XXX] into how things went. As well as working
+on proposal 220, which involves improvements to Tor server identity keys, Nick merged some
+small patches into the Tor mainline branch, and collected promises of a few more to come.
+He also directed a few enquiring minds towards Tor's online community, saying “I hope we'll
+be seeing more of some of the folks I talked to on our mailing lists and IRC channels soon”.
+
+ [XXX] https://lists.torproject.org/pipermail/tor-talk/2013-September/030238.html
+ [XXX] https://www.gnu.org/gnu30/
 
 Tor Stack Exchange page in private beta
 ---------------------------------------
@@ -181,4 +194,3 @@
 Possible items :
 
  * result of the EPIC FOIA https://epic.org/2013/09/epic-foia-request-reveals-no-e.html
- * a report of the GNU 30th anniversary hackaton https://www.gnu.org/gnu30/ ;  http://libreplanet.org/wiki/GNU30/Tor ; https://lists.torproject.org/pipermail/tor-talk/2013-September/030238.html

version 30
Author: harmony
Date:   2013-09-30T18:21:45+00:00

   move liballium item up one

--- version 29
+++ version 30
@@ -66,6 +66,23 @@
  [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005519.html
  [XXX] http://area51.stackexchange.com/proposals/56447/tor-online-anonymity-privacy-and-security
 
+liballium: Pluggable Transports utility library in C
+----------------------------------------------------
+
+Yawning Angel announced a new library to ease the task of writing pluggable
+transports [XXX]. liballium is a “simple library that handles the Tor Pluggable
+Transport Configuration protocol. The idea is for this library to be the C/C++
+equivalent to pyptlib [XXX] (and maybe more, depending on how much time I have
+to work on it).”
+
+The code is available for review [XXX] featuring “a reasonably well commented example.”
+
+Feel free to follow up with “questions, comments, feedback”!
+
+  [XXX] https://www.torproject.org/docs/pluggable-transports.html
+  [XXX] https://gitweb.torproject.org/pluggable-transports/pyptlib.git
+  [XXX] https://github.com/Yawning/liballium
+
 New GPG key for Mike Perry
 --------------------------
 
@@ -95,23 +112,6 @@
 [XXX]: https://www.torproject.org/docs/tor-hidden-service.html.en
 [XXX]: https://www.torproject.org/docs/hidden-services.html.en
 [XXX]: https://gitweb.torproject.org/torspec.git?a=blob_plain;hb=HEAD;f=rend-spec.txt
-
-liballium: Pluggable Transports utility library in C
-----------------------------------------------------
-
-Yawning Angel announced a new library to ease the task of writing pluggable
-transports [XXX]. liballium is a “simple library that handles the Tor Pluggable
-Transport Configuration protocol. The idea is for this library to be the C/C++
-equivalent to pyptlib [XXX] (and maybe more, depending on how much time I have
-to work on it).”
-
-The code is available for review [XXX] featuring “a reasonably well commented example.”
-
-Feel free to follow up with “questions, comments, feedback”!
-
-  [XXX] https://www.torproject.org/docs/pluggable-transports.html
-  [XXX] https://gitweb.torproject.org/pluggable-transports/pyptlib.git
-  [XXX] https://github.com/Yawning/liballium
 
 Monthly status reports for September 2013
 -----------------------------------------

version 29
Author: harmony
Date:   2013-09-30T18:18:59+00:00

   my mistake

--- version 28
+++ version 29
@@ -12,11 +12,11 @@
 Welcome to the fourteenth issue of Tor Weekly News, the weekly newsletter that
 covers what is happening in the great Tor community.
 
-New release of the Tor Browse Bundle 3.0 alpha branch
------------------------------------------------------
+Tor Browser Bundle 3.0alpha4 released
+-------------------------------------
 
 On September 28th, Mike Perry released alpha 4 of
-the new Tor Browser Bundle 3.0 series [XXX]. The main highlight
+the new Tor Browser Bundle 3.0 series [XXX]. The main highlights
 of this series are the important usability improvements that integrate
 Tor configuration and control into the browser itself.
 

version 28
Author: harmony
Date:   2013-09-30T18:17:48+00:00

   language fixes

--- version 27
+++ version 28
@@ -17,20 +17,20 @@
 
 On September 28th, Mike Perry released alpha 4 of
 the new Tor Browser Bundle 3.0 series [XXX]. The main highlight
-of this series is important usability improvements by integrating
+of this series are the important usability improvements that integrate
 Tor configuration and control into the browser itself.
 
-The latest iteration is based on Firefox 10.0.9esr which brings its lot
+The latest iteration is based on Firefox 10.0.9esr, which brings a lot
 of important security fixes. It also fixes a fingerprinting issue by
 randomizing the timestamp sent when establishing an HTTPS connection.
 
 Two small but important usability improvements in the new Tor Launcher
-component were made: users can now directly copy and paste “bridges” lines
-from the bridge database [XXX] and clock-skews that would prevent proper
-functioning of Tor are now reported to users.
+component were made: users can now directly copy and paste “bridge” lines
+from the bridge database [XXX], while clock-skews that would prevent Tor from
+functioning properly are now reported to users.
 
-Download your copy, test and report any problems you find. If you feel
-adventurous, you can also practice the new crucial security process
+Download your copy, test it, and report any problems you find. If you feel
+adventurous, you can also try out the new crucial security process
 by independently reproducing the binaries from the publicly
 reviewable source code [XXX].
 
@@ -50,11 +50,11 @@
 beta, the more certain it is that our page will move on to the next stage (i.e.
 the public beta).”
 
-Fruitful discussions are already fostering: Karsten Loesing relayed to the wider
-community about the problem of what to do about contact information for bridge
-operators. [XXX]
+Fruitful discussions are already taking place: Karsten Loesing wrote to the wider
+community on the question of what to do about contact information for bridge
+operators after it was posed on Stack Exchange. [XXX]
 
-Roger Dingledine called [XXX] Tor developers and anonymity
+Roger Dingledine put out a call [XXX] for Tor developers and anonymity
 researchers to participate in answering questions on the site, adding “Steven,
 Philipp, Jens, and I can't do it by ourselves.” If you have expert knowledge to
 contribute, please contact Roger for the necessary details, or visit the proposal
@@ -85,7 +85,7 @@
 Tor Help Desk Roundup
 ---------------------
 
-Multiple users wrote the help desk asking for guidance setting up hidden 
+Multiple users wrote to the help desk asking for guidance setting up hidden 
 service sites. The most straightforward documentation for hidden services is 
 in the torrc file itself [XXX]. A more in-depth guide can be found on the Tor 
 Project website [XXX]. The website also documents how hidden services work [XXX]. 
@@ -100,12 +100,12 @@
 ----------------------------------------------------
 
 Yawning Angel announced a new library to ease the task of writing pluggable
-transports [XXX]. liballium is “simple library that handles the Tor Pluggable
+transports [XXX]. liballium is a “simple library that handles the Tor Pluggable
 Transport Configuration protocol. The idea is for this library to be the C/C++
 equivalent to pyptlib [XXX] (and maybe more, depending on how much time I have
 to work on it).”
 
-The code is available [XXX] featuring “a reasonably well commented example.”
+The code is available for review [XXX] featuring “a reasonably well commented example.”
 
 Feel free to follow up with “questions, comments, feedback”!
 
@@ -117,7 +117,7 @@
 -----------------------------------------
 
 The wave of regular monthly reports from Tor project members for the
-month of September has begun. Runa released her report first [XXX], followed
+month of September has begun. Runa Sandvik released her report first [XXX], followed
 by reports from Damian Johnson [XXX], name 3 [XXX], and name 4 [XXX].
 
  [XXX] https://lists.torproject.org/pipermail/tor-reports/2013-September/000341.html
@@ -134,12 +134,12 @@
 
   [XXX] https://blog.torproject.org/blog/pluggable-transports-bundles-2417-beta-2-pt3-firefox-1709esr
 
-intrigeri sent a release schedule for Tails 0.21. [XXX] First release candidate
+intrigeri sent a release schedule for Tails 0.21 [XXX]. The first release candidate
 should be out on October 20th.
 
   [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003719.html
 
-If you have the necessary hardware and want to help out Tails, please test two
+If you have the necessary hardware and want to help Tails out, please test two
 upcoming features: persistent printer settings [XXX] and support for more SD
 card readers (the “sdio” type) [XXX].
 



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list