[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Mon Sep 30 21:40:08 UTC 2013


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2013/13 ===
===========================================================================

version 37
Author: harmony
Date:   2013-09-30T20:54:57+00:00

   add clarification in 1st para

--- version 36
+++ version 37
@@ -18,7 +18,8 @@
 On September 28th, Mike Perry released alpha 4 of
 the new Tor Browser Bundle 3.0 series [XXX]. The main highlights
 of this series are the important usability improvements that integrate
-Tor configuration and control into the browser itself.
+Tor configuration and control into the browser itself, rather than relying
+on the unmaintained Vidalia interface.
 
 The latest iteration is based on Firefox 10.0.9esr, which brings with it
 a lot of important security fixes. It also fixes a fingerprinting issue by

version 36
Author: harmony
Date:   2013-09-30T20:53:00+00:00

   small language fix

--- version 35
+++ version 36
@@ -20,8 +20,8 @@
 of this series are the important usability improvements that integrate
 Tor configuration and control into the browser itself.
 
-The latest iteration is based on Firefox 10.0.9esr, which brings a lot
-of important security fixes. It also fixes a fingerprinting issue by
+The latest iteration is based on Firefox 10.0.9esr, which brings with it
+a lot of important security fixes. It also fixes a fingerprinting issue by
 randomizing the timestamp sent when establishing an HTTPS connection.
 
 Two small but important usability improvements in the new Tor Launcher

version 35
Author: harmony
Date:   2013-09-30T20:52:06+00:00

   fix unlovely repetition

--- version 34
+++ version 35
@@ -44,7 +44,7 @@
 The Tor mini-hackathon at the GNU 30th anniversary event [XXX] took place over the weekend,
 and Nick Mathewson sent out a brief report [XXX] into how things went. As well as working
 on proposal 220, which involves improvements to Tor server identity keys, Nick merged some
-small patches into the Tor mainline branch, and collected promises of a few more to come.
+small patches into the Tor mainline branch, and collected promises of several more to come.
 He also directed a few enquiring minds towards Tor's online community, saying “I hope we'll
 be seeing more of some of the folks I talked to on our mailing lists and IRC channels soon”.
 

version 34
Author: harmony
Date:   2013-09-30T20:50:54+00:00

   small language fix

--- version 33
+++ version 34
@@ -29,7 +29,7 @@
 from the bridge database [XXX], while clock-skews that would prevent Tor from
 functioning properly are now reported to users.
 
-Download your copy, test it, and report any problems you find. If you feel
+Download your copy, test it, and report any problems you find. If you're feeling
 adventurous, you can also try out the new crucial security process
 by independently reproducing the binaries from the publicly
 reviewable source code [XXX].

version 33
Author: harmony
Date:   2013-09-30T20:50:12+00:00

   add roger's pt checklist

--- version 32
+++ version 33
@@ -143,6 +143,12 @@
 
   [XXX] https://mailman.boum.org/pipermail/tails-dev/2013-September/003719.html
 
+Roger Dingledine sent out “a list of criteria to consider when evaluating
+pluggable transports for readiness of deployment to users”, asking for
+comments on his initial draft [XXX].
+
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005528.html
+
 If you have the necessary hardware and want to help Tails out, please test two
 upcoming features: persistent printer settings [XXX] and support for more SD
 card readers (the “sdio” type) [XXX].

version 32
Author: harmony
Date:   2013-09-30T20:45:16+00:00

   demote gpg key item

--- version 31
+++ version 32
@@ -96,22 +96,6 @@
   [XXX] https://gitweb.torproject.org/pluggable-transports/pyptlib.git
   [XXX] https://github.com/Yawning/liballium
 
-New GPG key for Mike Perry
---------------------------
-
-After seven years, and an apparent threat of drastic action from Isis
-Lovecruft [XXX], Mike Perry created and published his new GPG public
-key [XXX], beefing up its security considerably in the process — from 1024
-bits to an imposing 8192 bits. Mike wrote that “this new key will be used
-to sign email from me going forward, and will be used to sign software
-releases until such time as I get around to creating a second set of keys
-on a hardware token for that purpose.” He added that the old key will not
-immediately be revoked, as “my plan is to cross-certify these two sets of
-new keys, and also sign both with my old key.”
-
- [XXX] https://twitter.com/isislovecruft/status/383404810369638400
- [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005518.html
-
 Tor Help Desk Roundup
 ---------------------
 
@@ -141,7 +125,14 @@
 Miscellaneous news
 ------------------
 
-David Fifield also updated the Pluggable Transports bundles using the latest
+Mike Perry published his new GPG public key, adding: “this new key will
+be used to sign email from me going forward, and will be used to sign
+software releases until such time as I get around to creating a second
+set of keys on a hardware token for that purpose” [XXX].
+
+ [XXX] https://lists.torproject.org/pipermail/tor-dev/2013-September/005518.html
+
+David Fifield updated the Pluggable Transports bundles using the latest
 Tor Browser Bundle [XXX]. In order to benefit from the improvements and
 security fixes, please update!
 



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list