[TWN team] Recent changes to the wiki pages
Lunar
lunar at torproject.org
Wed Jul 30 14:00:09 UTC 2014
===========================================================================
=== https://trac.torproject.org/projects/tor/wiki/TorWeeklyNews/2014/30 ===
===========================================================================
version 46
Author: harmony
Date: 2014-07-30T13:21:28+00:00
review
--- version 45
+++ version 46
@@ -45,10 +45,10 @@
2500.”
The complementary change to moving the number of entry guards down to
-one [7] are two new consensus parameters introduced. NumEntryGuards
-and NumDirectoryGuards will respectively set the number of entry guards
-and directory guards that clients will use. The default for
-NumEntryGuards is currently three, but this will allow a reversable
+one [7] is the introduction of two new consensus parameters.
+NumEntryGuards and NumDirectoryGuards will respectively set the number
+of entry guards and directory guards that clients will use. The default
+for NumEntryGuards is currently three, but this will allow a reversible
switch to one in a near future.
Several important fixes have been backported to the stable branch in the
@@ -67,7 +67,7 @@
Security issue in Tails 1.1 and earlier
---------------------------------------
-Several vulnerabilities has been discovered in I2P [13] which is
+Several vulnerabilities have been discovered in I2P [13] which is
shipped in Tails 1.1 and earlier [14]. I2P [15] is an anonymous
overlay network with many similarities to Tor. There was quite some
confusion around the disclosure process of this vulnerability. Readers
@@ -99,16 +99,16 @@
while. Getting them out of everyone’s circuits is thus important.
Damian Johnson and Philipp Winter have been working on improving and
-documenting [19] the process to report bad relays. “While we do
+documenting [19] the process of reporting bad relays. “While we do
regularly scan the network for bad relays, we are also dependent on the
wider community to help us spot relays which don’t act as they should”
wrote [20] Philipp.
When observing unusual behaviors, one way to learn about the current
exit relay before reporting it is to use the Check [21] service. This
-method can be inaccurate and tend to be a little bit cumbersome. The
+method can be inaccurate and tends to be a little bit cumbersome. The
good news is that Arthur Edelstein is busy integrating [22] more
-feedback on Tor circuits being used directly in the Tor Browser.
+feedback on Tor circuits being used directly into the Tor Browser.
[18]: https://trac.torproject.org/projects/tor/wiki/doc/ReportingBadRelays
[19]: https://blog.torproject.org/blog/how-report-bad-relays
@@ -141,7 +141,7 @@
The Thali project [29] aims to use hidden services to host web content.
As part of the effort, they have written a cross-platform Java
-library [30]. “The code handles running the binary, configuring it,
+library [30]. “The code handles running the binary, configuring it,
managing it, starting a hidden service, etc.” wrote [31] Yaron Goland.
[28]: http://www.thaliproject.org/
@@ -166,7 +166,7 @@
[34]: https://gitweb.torproject.org/bridgedb.git/blob/2a6d5463:/CHANGELOG
[35]: https://bugs.torproject.org/11139#comment:15
-Orbot 14.0.5 first release candidate has been released. “This update
+The first candidate for Orbot 14.0.5 has been released. “This update
includes improved management of the background processes, the ability to
easily change the local SOCKS port (to avoid conflicts on some Samsung
Galaxy and Note devices), and the fancy new notification dialog, showing
@@ -177,14 +177,14 @@
While working on guard nodes, George Kadianakis realized that “the data
structures and methods of the guard nodes code are not very robust”.
Nick Mathewson and George have been busy trying to come up with better
-abstractions [37]. More brains on the problem would be welcome!
+abstractions [37]. More brains working on the problem would be welcome!
[37]: https://bugs.torproject.org/12595
Mike Perry posted [38] “a summary of the primitives that Marc Juarez
aims to implement for his Google Summer of Code project on prototyping
defenses for Website Traffic Fingerprinting and follow-on research”. Be
-sure to have a look if you want to help preventing website fingerprint
+sure to have a look if you want to help prevent website fingerprint
attacks.
[38]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007246.html
@@ -201,8 +201,8 @@
[39]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007247.html
-Noah Rahman reported [40] on the progress on their Google Summer of
-Code on Stegotorus.
+Noah Rahman reported [40] on the progress of the Stegotorus Google Summer of
+Code project.
[40]: https://lists.torproject.org/pipermail/tor-dev/2014-July/007248.html
@@ -213,7 +213,7 @@
of the box in Iran, and the Tor Metrics portal shows a corresponding
drop in the number of directly-connecting users there [41]. Collin
Anderson investigated the situation and reported that the
-Telecommunications Company of Iran had begun blocking the Tor network by
+Telecommunication Company of Iran had begun blocking the Tor network by
blacklisting connections to Tor’s directory authorities [42]. Tor users
can circumvent this block by getting bridges from BridgeDB [43] and
entering the bridge addresses they receive into their Tor Browser.
--
Your friendly TWN monitoring script
In case of malfunction, please reach out for lunar at torproject.org
or for the worst cases, tell weasel at torproject.org to kill me.
More information about the news-team
mailing list