[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Jul 22 22:40:06 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/29 ===
===========================================================================

version 51
Author: arma
Date:   2014-07-22T21:56:48+00:00

   whitespace fixes

--- version 50
+++ version 51
@@ -31,8 +31,8 @@
 One of the most keenly-awaited features of this new version is the
 support for UEFI firmware. Mac users now have only to press the Alt
 key [3] while booting their computer to start Tails from a DVD or USB
-stick.  The same goes for owners of computers displaying “Windows 8”
-stickers.  And, talking of Windows 8, the camouflage mode [4] has been
+stick. The same goes for owners of computers displaying “Windows 8”
+stickers. And, talking of Windows 8, the camouflage mode [4] has been
 updated to look more like it, instead of the now discontinued XP. 
 
 This new release also contains security fixes [5], and minor tweaks over
@@ -40,7 +40,7 @@
 
 Because of the newly-introduced support for UEFI and the amount of
 upgraded software, incremental upgrades will not be offered for
-Tails 1.1. A full upgrade is needed through the Tails Installer.  The
+Tails 1.1. A full upgrade is needed through the Tails Installer. The
 safest method for upgrading Tails sticks is to go through a freshly
 burned DVD. Be sure to have a look at the list of known issues [6] to
 learn about other oddities that might happen in the process.
@@ -151,7 +151,7 @@
 able to give out bridge addresses through email. This feature was
 recently extended to make the email autoresponder support more bridge
 types, which required introducing new keywords that must used in the
-initial request.  Matthew Finkel is looking for feedback [28] on the
+initial request. Matthew Finkel is looking for feedback [28] on the
 current set of commands and how they could be improved.
 
   [27]: https://gitweb.torproject.org/bridgedb.git
@@ -206,9 +206,9 @@
 to install Tor Browser from their operating system’s software
 repositories. Tor Browser should only be installed from the Tor
 Project’s website, and never from a software repository. In other words,
-using apt-get or yum to install Tor Browser is discouraged.  Downloading
+using apt-get or yum to install Tor Browser is discouraged. Downloading
 and verifying Tor Browser from the Tor Project website allows users to
-keep up with important security updates as they are released. 
+keep up with important security updates as they are released.
 
 News from Tor StackExchange
 ---------------------------
@@ -216,14 +216,14 @@
 user3224 wants to log in to its Google, Microsoft etc. accounts and
 wonders if they will know the real name and other personal
 information [43]. Roya and mirimir explained that if someone logs into
-an already personalized account Tor can’t anonymize this user.  Instead
+an already personalized account Tor can’t anonymize this user. Instead
 it might be wise to use Tor to register a pseudonym and also use an
 anonymous operating system like Tails or Whonix.
 
   [43]: https://tor.stackexchange.com/q/3603/88
 
 escapologybb has set up a Raspberry Pi. It serves as SOCKS proxy for the
-internal network.  While everyone can use it, escapologybb asks what the
+internal network. While everyone can use it, escapologybb asks what the
 security implications are and if this lowers the overall anonymity [44].
 If you know a good answer please share your knowledge with the users of
 Tor StackExchange.
@@ -233,7 +233,7 @@
 Upcoming events
 ---------------
 
- Aug.  3 19:00 UTC | Tails contributors meeting
+ Aug. 3 19:00 UTC  | Tails contributors meeting
                    | #tails-dev @ irc.indymedia.org / h7gf2ha3hefoj5ls.onion
                    | https://mailman.boum.org/pipermail/tails-project/2014-July/000000.html
 

version 50
Author: arma
Date:   2014-07-22T21:54:45+00:00

   mention foci too

--- version 49
+++ version 50
@@ -236,6 +236,10 @@
  Aug.  3 19:00 UTC | Tails contributors meeting
                    | #tails-dev @ irc.indymedia.org / h7gf2ha3hefoj5ls.onion
                    | https://mailman.boum.org/pipermail/tails-project/2014-July/000000.html
+
+ August 18         | Roger @ FOCI ’14
+                   | San Diego, California, USA
+                   | https://www.usenix.org/conference/foci14
                    |
  August 20-22      | Roger @ USENIX Security Symposium ’14
                    | San Diego, California, USA



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list