[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Tue Jul 29 13:20:05 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/30 ===
===========================================================================

version 35
Author: harmony
Date:   2014-07-29T12:39:04+00:00

   small fixes

--- version 34
+++ version 35
@@ -33,21 +33,21 @@
 ---------------------------------------
 
 Several vulnerabilities has been discovered in I2P [XXX] which is shipped
-in Tails 1.1 and earlier [XXX]. I2P [XXX] is an anymous overlay network
+in Tails 1.1 and earlier [XXX]. I2P [XXX] is an anonymous overlay network
 with many similarities to Tor. There was quite some confusion around the
 disclosure process of this vulnerability. Readers are encouraged to read
 what the Tails team has written about it [XXX].
 
-Starting I2P in Tails normally require a click in the relevant menu
-entry. Once started, the security issues can lead to deanonymization of
-a Tails user that would visit a malicious web page. As a matter of
+Starting I2P in Tails normally requires a click on the relevant menu
+entry. Once started, the security issues can lead to the deanonymization of
+a Tails user who visits a malicious web page. As a matter of
 precaution, the Tails team recommends removing the “i2p” package each
 time Tails is started.
 
 I2P has fixed the issue in version 0.9.14 [XXX]. It is likely to be
 included in the next Tails release, but the team is also
 discussing [XXX] implementing more in-depth protections that would
-be required to keep I2P in Tails.
+be required in order to keep I2P in Tails.
 
  [XXX]: https://tails.boum.org/security/Security_hole_in_I2P_0.9.13/
  [XXX]: https://geti2p.net/
@@ -61,16 +61,16 @@
 “Bad” relays are malicious, misconfigured, or otherwise broken Tor
 relays. As anyone is free to volunteer bandwidth and processing power
 to spin up a new relay, users can encounter such bad relays once in
-a while. Getting them out of everyone's circuits is thus important.
+a while. Getting them out of everyone’s circuits is thus important.
 
 Damian Johnson and Philipp Winter have been working on improving and
 documenting [XXX] the process to report bad relays. “While we do
 regularly scan the network for bad relays, we are also dependent on the
-wider community to help us spot relays which don't act as they should”
+wider community to help us spot relays which don’t act as they should”
 wrote [XXX] Philipp.
 
 When observing unusual behaviors, one way to learn about the
-current exit relay before reporting it is to use the check [XXX]
+current exit relay before reporting it is to use the Check [XXX]
 service. This method can be inaccurate and tend to be a little bit
 cumbersome. The good news is that Arthur Edelstein is busy
 integrating [XXX] more feedback on Tor circuits being used directly in
@@ -84,8 +84,8 @@
 Miscellaneous news
 ------------------
 
-The Tor Project, Inc. has completed its standard financial audit for year
-2013 [XXX]. IRS Form 990 [XXX], The Massachusetts Form PC [XXX], and the
+The Tor Project, Inc. has completed its standard financial audit for the year
+2013 [XXX]. IRS Form 990 [XXX], Massachusetts Form PC [XXX], and the
 Financial Statements [XXX] are now available for anyone to review. Andrew
 Lewman explained: “we publish all of our related tax documents because we
 believe in transparency. All US non-profit organizations are required by law to
@@ -106,7 +106,7 @@
  [XXX]: https://torrific.ch/
 
 The Thali project [XXX] aims to use hidden services to host web content. As
-part of the effort, they have written cross-platform Java library [XXX].
+part of the effort, they have written a cross-platform Java library [XXX].
 “The code handles running the binary, configuring it, managing it, starting a
 hidden service, etc.” wrote [XXX] Yaron Goland.
 
@@ -114,11 +114,11 @@
  [XXX]: https://github.com/thaliproject/Tor_Onion_Proxy_Library
  [XXX]: https://lists.torproject.org/pipermail/tor-talk/2014-July/034046.html
 
-Gareth Owen has released [XXX] a Java based Tor research framework [XXX]. The
+Gareth Owen has released [XXX] a Java-based Tor research framework [XXX]. The
 goal is to enable researchers to try things out without having to deal with the
 full tor source. “At present, it is a fully functional client with a number of
 examples for hidden services and SOCKS. You can build arbitrary circuits, build
-streams, send junk cells, etc.” describes Gareth.
+streams, send junk cells, etc.” wrote Gareth.
 
  [XXX]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007232.html
  [XXX]: https://github.com/drgowen/tor-research-framework

version 34
Author: harmony
Date:   2014-07-29T12:30:00+00:00

   add iran graph

--- version 33
+++ version 34
@@ -134,15 +134,17 @@
 ---------------------
 
 A number of Iranian Tor users have reported that Tor no longer works
-out of the box in Iran. Collin Anderson investigated the situation 
-and reported that the Telecommunications Company of Iran had 
-begun blocking the Tor network by blacklisting connections to Tor's 
-directory authorities [XXX]. Tor users can circumvent this block by 
-getting bridges from BridgeDB [XXX] and entering the bridge addresses 
-they receive into their Tor Browser.
-
-[XXX]: https://bugs.torproject.org/12727
-[XXX]: https://bridges.torproject.org/
+out of the box in Iran, and the Tor Metrics portal shows a corresponding
+drop in the number of directly-connecting users there [XXX]. Collin Anderson
+investigated the situation and reported that the Telecommunications
+Company of Iran had begun blocking the Tor network by blacklisting
+connections to Tor’s directory authorities [XXX]. Tor users can circumvent
+this block by getting bridges from BridgeDB [XXX] and entering the bridge
+addresses they receive into their Tor Browser.
+
+ [XXX]: https://metrics.torproject.org/users.html?graph=userstats-relay-country&start=2014-04-30&end=2014-07-28&country=ir&events=on#userstats-relay-country
+ [XXX]: https://bugs.torproject.org/12727
+ [XXX]: https://bridges.torproject.org/
 
 News from Tor StackExchange
 ---------------------------



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list