[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Tue Jul 22 22:40:06 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/29 ===
===========================================================================
version 51
Author: arma
Date: 2014-07-22T21:56:48+00:00
whitespace fixes
--- version 50
+++ version 51
@@ -31,8 +31,8 @@
One of the most keenly-awaited features of this new version is the
support for UEFI firmware. Mac users now have only to press the Alt
key [3] while booting their computer to start Tails from a DVD or USB
-stick. The same goes for owners of computers displaying “Windows 8”
-stickers. And, talking of Windows 8, the camouflage mode [4] has been
+stick. The same goes for owners of computers displaying “Windows 8”
+stickers. And, talking of Windows 8, the camouflage mode [4] has been
updated to look more like it, instead of the now discontinued XP.
This new release also contains security fixes [5], and minor tweaks over
@@ -40,7 +40,7 @@
Because of the newly-introduced support for UEFI and the amount of
upgraded software, incremental upgrades will not be offered for
-Tails 1.1. A full upgrade is needed through the Tails Installer. The
+Tails 1.1. A full upgrade is needed through the Tails Installer. The
safest method for upgrading Tails sticks is to go through a freshly
burned DVD. Be sure to have a look at the list of known issues [6] to
learn about other oddities that might happen in the process.
@@ -151,7 +151,7 @@
able to give out bridge addresses through email. This feature was
recently extended to make the email autoresponder support more bridge
types, which required introducing new keywords that must used in the
-initial request. Matthew Finkel is looking for feedback [28] on the
+initial request. Matthew Finkel is looking for feedback [28] on the
current set of commands and how they could be improved.
[27]: https://gitweb.torproject.org/bridgedb.git
@@ -206,9 +206,9 @@
to install Tor Browser from their operating system’s software
repositories. Tor Browser should only be installed from the Tor
Project’s website, and never from a software repository. In other words,
-using apt-get or yum to install Tor Browser is discouraged. Downloading
+using apt-get or yum to install Tor Browser is discouraged. Downloading
and verifying Tor Browser from the Tor Project website allows users to
-keep up with important security updates as they are released.
+keep up with important security updates as they are released.
News from Tor StackExchange
---------------------------
@@ -216,14 +216,14 @@
user3224 wants to log in to its Google, Microsoft etc. accounts and
wonders if they will know the real name and other personal
information [43]. Roya and mirimir explained that if someone logs into
-an already personalized account Tor can’t anonymize this user. Instead
+an already personalized account Tor can’t anonymize this user. Instead
it might be wise to use Tor to register a pseudonym and also use an
anonymous operating system like Tails or Whonix.
[43]: https://tor.stackexchange.com/q/3603/88
escapologybb has set up a Raspberry Pi. It serves as SOCKS proxy for the
-internal network. While everyone can use it, escapologybb asks what the
+internal network. While everyone can use it, escapologybb asks what the
security implications are and if this lowers the overall anonymity [44].
If you know a good answer please share your knowledge with the users of
Tor StackExchange.
@@ -233,7 +233,7 @@
Upcoming events
---------------
- Aug. 3 19:00 UTC | Tails contributors meeting
+ Aug. 3 19:00 UTC | Tails contributors meeting
| #tails-dev @ irc.indymedia.org / h7gf2ha3hefoj5ls.onion
| https://mailman.boum.org/pipermail/tails-project/2014-July/000000.html
version 50
Author: arma
Date: 2014-07-22T21:54:45+00:00
mention foci too
--- version 49
+++ version 50
@@ -236,6 +236,10 @@
Aug. 3 19:00 UTC | Tails contributors meeting
| #tails-dev @ irc.indymedia.org / h7gf2ha3hefoj5ls.onion
| https://mailman.boum.org/pipermail/tails-project/2014-July/000000.html
+
+ August 18 | Roger @ FOCI ’14
+ | San Diego, California, USA
+ | https://www.usenix.org/conference/foci14
|
August 20-22 | Roger @ USENIX Security Symposium ’14
| San Diego, California, USA
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list