[TWN team] Recent changes to the wiki pages

Lunar lunar at torproject.org
Wed Jul 30 14:00:09 UTC 2014


===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/30 ===
===========================================================================

version 46
Author: harmony
Date:   2014-07-30T13:21:28+00:00

   review

--- version 45
+++ version 46
@@ -45,10 +45,10 @@
 2500.”
 
 The complementary change to moving the number of entry guards down to
-one [7] are two new consensus parameters introduced. NumEntryGuards
-and NumDirectoryGuards will respectively set the number of entry guards
-and directory guards that clients will use. The default for
-NumEntryGuards is currently three, but this will allow a reversable
+one [7] is the introduction of two new consensus parameters.
+NumEntryGuards and NumDirectoryGuards will respectively set the number
+of entry guards and directory guards that clients will use. The default
+for NumEntryGuards is currently three, but this will allow a reversible
 switch to one in a near future.
 
 Several important fixes have been backported to the stable branch in the
@@ -67,7 +67,7 @@
 Security issue in Tails 1.1 and earlier
 ---------------------------------------
 
-Several vulnerabilities has been discovered in I2P [13] which is
+Several vulnerabilities have been discovered in I2P [13] which is
 shipped in Tails 1.1 and earlier [14]. I2P [15] is an anonymous
 overlay network with many similarities to Tor. There was quite some
 confusion around the disclosure process of this vulnerability. Readers
@@ -99,16 +99,16 @@
 while. Getting them out of everyone’s circuits is thus important.
 
 Damian Johnson and Philipp Winter have been working on improving and
-documenting [19] the process to report bad relays. “While we do
+documenting [19] the process of reporting bad relays. “While we do
 regularly scan the network for bad relays, we are also dependent on the
 wider community to help us spot relays which don’t act as they should”
 wrote [20] Philipp.
 
 When observing unusual behaviors, one way to learn about the current
 exit relay before reporting it is to use the Check [21] service. This
-method can be inaccurate and tend to be a little bit cumbersome. The
+method can be inaccurate and tends to be a little bit cumbersome. The
 good news is that Arthur Edelstein is busy integrating [22] more
-feedback on Tor circuits being used directly in the Tor Browser.
+feedback on Tor circuits being used directly into the Tor Browser.
 
   [18]: https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays
   [19]: https://blog.torproject.org/blog/how-report-bad-relays
@@ -141,7 +141,7 @@
 
 The Thali project [29] aims to use hidden services to host web content.
 As part of the effort, they have written a cross-platform Java
-library [30].  “The code handles running the binary, configuring it,
+library [30]. “The code handles running the binary, configuring it,
 managing it, starting a hidden service, etc.” wrote [31] Yaron Goland.
 
   [28]: http://www.thaliproject.org/
@@ -166,7 +166,7 @@
   [34]: https://gitweb.torproject.org/bridgedb.git/blob/2a6d5463:/CHANGELOG
   [35]: https://bugs.torproject.org/11139#comment:15
 
-Orbot 14.0.5 first release candidate has been released. “This update
+The first candidate for Orbot 14.0.5 has been released. “This update
 includes improved management of the background processes, the ability to
 easily change the local SOCKS port (to avoid conflicts on some Samsung
 Galaxy and Note devices), and the fancy new notification dialog, showing
@@ -177,14 +177,14 @@
 While working on guard nodes, George Kadianakis realized that “the data
 structures and methods of the guard nodes code are not very robust”.
 Nick Mathewson and George have been busy trying to come up with better
-abstractions [37]. More brains on the problem would be welcome!
+abstractions [37]. More brains working on the problem would be welcome!
 
   [37]: https://bugs.torproject.org/12595
 
 Mike Perry posted [38] “a summary of the primitives that Marc Juarez
 aims to implement for his Google Summer of Code project on prototyping
 defenses for Website Traffic Fingerprinting and follow-on research”. Be
-sure to have a look if you want to help preventing website fingerprint
+sure to have a look if you want to help prevent website fingerprint
 attacks.
 
   [38]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007246.html
@@ -201,8 +201,8 @@
 
   [39]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007247.html
 
-Noah Rahman reported [40] on the progress on their Google Summer of
-Code on Stegotorus.
+Noah Rahman reported [40] on the progress of the Stegotorus Google Summer of
+Code project.
 
   [40]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007248.html
 
@@ -213,7 +213,7 @@
 of the box in Iran, and the Tor Metrics portal shows a corresponding
 drop in the number of directly-connecting users there [41]. Collin
 Anderson investigated the situation and reported that the
-Telecommunications Company of Iran had begun blocking the Tor network by
+Telecommunication Company of Iran had begun blocking the Tor network by
 blacklisting connections to Tor’s directory authorities [42]. Tor users
 can circumvent this block by getting bridges from BridgeDB [43] and
 entering the bridge addresses they receive into their Tor Browser.



-- 
Your friendly TWN monitoring script

      In case of malfunction, please reach out for lunar at torproject.org
          or for the worst cases, tell weasel at torproject.org to kill me.


More information about the news-team mailing list