[de] some updates to the german translation
Oliver Knapp

Oliver Knapp commited on 2009-03-27 14:13:17
Zeige 10 geänderte Dateien mit 632 Einfügungen und 572 Löschungen.

... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18613
2
+# Based-On-Revision: 19084
3 3
 # Last-Translator: mail ed oliverknapp.de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Spende!" CHARSET="UTF-8"
... ...
@@ -74,7 +74,7 @@ href="http://paypal.com/">PayPal-Konto</a>):<br />
74 74
 <input type="hidden" name="cmd" value="_xclick-subscriptions" />
75 75
 <input type="hidden" name="business" value="donations@torproject.org" />
76 76
 <input type="hidden" name="item_name" value="Tor Project Membership" />
77
-<input type="hidden" name="return" value="https://www.torproject.org/">
77
+<input type="hidden" name="return" value="https://www.torproject.org/donate#funds">
78 78
 <input type="hidden" name="cancel_return" value="https://www.torproject.org/donate">
79 79
 </p>
80 80
 </form>
... ...
@@ -97,7 +97,7 @@ href="http://paypal.com/">PayPal-Konto</a>):<br />
97 97
 <input type="hidden" name="cmd" value="_xclick" />
98 98
 <input type="hidden" name="business" value="donations@torproject.org" />
99 99
 <input type="hidden" name="item_name" value="Tor" />
100
-<input type="hidden" name="return" value="https://www.torproject.org/">
100
+<input type="hidden" name="return" value="https://www.torproject.org/donate#funds">
101 101
 <input type="hidden" name="cancel_return" value="https://www.torproject.org/donate">
102 102
 </p>
103 103
 </form>
... ...
@@ -166,10 +166,11 @@ die Adresse des Spenders stehen.
166 166
 <h3><a class="anchor" href="#funds">Was passiert mit meiner
167 167
 Spende?</a></h3>
168 168
 
169
-<p>Deine Spende wird in unseren allgemeinen Fond eingezahlt. Du zählst
170
-damit zu den <a href="<page sponsors>">vielen Spendern</a> für die
171
-Zukunft von Tor und der Onlineanonymität. Im Jahr 2008 wurden die
172
-Spenden wie folgt ausgegeben und eingenommen:</p>
169
+<p>Wenn du gerade gespendet hast, vielen Dank für deinen Beitrag!Deine Spende
170
+wird in unseren allgemeinen Fond eingezahlt. Du zählst damit zu den <a
171
+href="<page sponsors>">vielen Spendern</a> für die Zukunft von Tor und der
172
+Onlineanonymität. Im Jahr 2008 wurden die Spenden wie folgt ausgegeben und
173
+eingenommen:</p>
173 174
 
174 175
 <p><img src="images/2008-funding-chart.png" alt="Wer spendet an das Tor-Projekt?"/>
175 176
 <img src="images/2008-expenses-chart.png" alt="Wie werden die Gelder ausgegeben?"/></p>
... ...
@@ -1,8 +1,8 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18918
2
+# Based-On-Revision: 19103
3 3
 # Last-Translator: mail a-t oliverknapp .de
4 4
 
5
-#include "head.wmi" TITLE="Tor: Download" CHARSET="UTF-8"
5
+#include "head.wmi" TITLE="Tor: Download" CHARSET="UTF-8" ANNOUNCE_RSS="yes"
6 6
 
7 7
 <div class="main-column">
8 8
 
... ...
@@ -54,6 +54,21 @@ Wie das geht?</a>):</p>
54 54
     <li><a href="<package-osx-bundle-stable-sig>">Signatur des OS X Installationspakets</a></li>
55 55
   </ul></li>
56 56
 
57
+<p>Um über neueste Sicherheitshinweise und neue stabile Versionen informiert
58
+zu sein, abonniere die <a href="http://archives.seul.org/or/announce/">
59
+or-announce Mailingliste (Engl.)</a> (Du wirst per Mail um eine Bestätigung
60
+gebeten). Du kannst auch den RSS-Feed der Liste <a
61
+href="http://rss.gmane.org/gmane.network.onion-routing.announce">
62
+beobachten</a>. </p>
63
+
64
+<form action="http://freehaven.net/cgi-bin/majordomo.cgi">
65
+<input type="hidden" name="mlist" value="or-announce">
66
+<input type="hidden" name="subscribe" value="1">
67
+<input type="hidden" name="host" value="freehaven.net">
68
+<input name="email" size="15">
69
+<input type="submit" value="or-announce abonnieren">
70
+</form>
71
+
57 72
 <li><p>Du brauchst mehr Auswahl? <a href="<page download>">Hier gibt es unserer
58 73
 Downloadseite für fortgeschrittene Anwender</a>.</p></li>
59 74
 
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18909
2
+# Based-On-Revision: 18972
3 3
 # Last-Translator: mail et oliverknapp INSERT_DOT de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Google Summer of Code 2009" CHARSET="UTF-8"
... ...
@@ -31,14 +31,16 @@ Bewerbung</a> ist der <b>7. April 2008</b> um 17 Uhr Pacific time. </p>-->
31 31
 arbeiten können. Wir haben eine spannende Community von interessierten
32 32
 Entwicklern im IRC und auf Mailinglisten und arbeiten gerne mit dir zusammen,
33 33
 diskutieren mit dir über Designvorschläge und vieles mehr, aber du musst dich
34
-und deine Zeit selbst einteilen können und solltest bereits wissen, wie die
34
+und deine Zeit selbst einteilen können und solltest bereits ungefähr wissen, wie die
35 35
 Entwicklung freier Software über das Internet funktioniert. </p>
36 36
 
37 37
 <p> Es geht aber nicht nur darum, ein bisschen Entwicklungsarbeit für Tor
38 38
 fertig zu bekommen. Google und Tor wollen auch Studenten so in die Entwicklung
39 39
 einbinden, dass sie nach dem Sommer weiter dabei bleiben. Aus diesem Grund
40 40
 bevorzugen wir Studenten die bereits andauerndes Interesse und Bereitschaft
41
-gezeigt haben. </p>
41
+gezeigt haben. Wir fordern von unseren Studenten öffentliche Statusreports für
42
+unsere Community, entweder gebloggt oder per Mail. Wir wollen, dass die
43
+Studenten und die Tor-Gemeinschaft voneinander profitieren können.</p>
42 44
 
43 45
 <p>
44 46
 Die Arbeit an Tor lohnt sich, da:
... ...
@@ -65,7 +67,7 @@ href="http://freehaven.net/anonbib/">anonymen Systeme</a> aufgeworfen.</li>
65 67
 <p>Dieses Jahr haben wir zwei Ideen: Eine Sache wäre es <a href="<page
66 68
 volunteer>#Projects">bei der Entwicklung von Tor zu helfen</a>, die andere
67 69
 Idee ist, bei der Entwicklung des
68
-<a href="http://www.eff.org/testyourisp/switzerland">Switzerland Werkzeugs der
70
+<a href="http://switzerland.wiki.sourceforge.net/Projects">Switzerland Werkzeugs der
69 71
 EFF zu helfen.</a>.</p>
70 72
 
71 73
 <a id="Template"></a>
... ...
@@ -87,7 +89,7 @@ und uns davon überzeugen, dass du planst es fertig zu bekommen.</li>
87 89
 <li>Zeig uns ein Code-Beispiel: Etwas Schickes und Sauberes, damit wir sehen
88 90
 dass du weißt was du so treibst, am Besten von einem bestehenden Projekt.</li>
89 91
 
90
-<li>Warum willst du gerade beim Tor Projekt helfen?</li>
92
+<li>Warum willst du gerade beim Tor Projekt / Switzerland helfen?</li>
91 93
 
92 94
 <li>Erzähl uns von deinen Erfahrungen bei der Entwicklung freier Software. Wir
93 95
 würden auch gerne hören, wie du mit anderen zusammengearbeitet hast und nicht
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18763
2
+# Based-On-Revision: 18968
3 3
 # Last-Translator: mail [a-t] oliverknapp .de, jens @kubieziel.de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Anonymität online" CHARSET="UTF-8"
... ...
@@ -71,31 +71,34 @@ href="<page donate>">spende auch du</a>!</p>
71 71
 <a id="News"></a>
72 72
 <h2><a class="anchor" href="#News">Neues</a></h2>
73 73
 
74
-<ul>
75
-<li>09. Februar 2009:  Tor 0.2.0.34 wurde als neue stabile Version veröffentlicht. Lies die <a
74
+<ul> <li>12. März 2009: Tor startet den Plan und die Kampagne für
75
+Geschwindigkeitsverbesserungen. Lies die <a href="<page
76
+press/2009-03-12-performance-roadmap-press-release>">Pressemitteilung</a> für
77
+weitere Informationen.</li>
78
+<li>09. Februar 2009: Tor 0.2.0.34 wurde als neue
79
+stabile Version veröffentlicht. Lies die <a
76 80
 href="http://archives.seul.org/or/announce/Feb-2009/msg00000.html">Meldung</a>
77 81
 für weitere Informationen. Diese Version behebt ein Sicherheitsproblem!</li>
78 82
 <li>21. Januar 2009: Tor 0.2.0.33 als neue stabile Version veröffentlicht.
79 83
 Schaue dir die <a
80 84
 href="http://archives.seul.org/or/announce/Jan-2009/msg00000.html">Meldung</a>
81
-für Genaueres an.</li>
82
-<li>19. Dezember 2008: Tor veröffentlicht einen Drei-Jahres-Plan für die weitere
83
-Entwicklung. Bitte lies die <a href="<page
85
+für Genaueres an.</li> <li>19. Dezember 2008: Tor veröffentlicht einen
86
+Drei-Jahres-Plan für die weitere Entwicklung. Bitte lies die <a href="<page
84 87
 press/2008-12-19-roadmap-press-release>">Pressemeldung</a> für mehr
85 88
 Informationen.</li>
86 89
 
87 90
 
88 91
 <li><strong>Wir suchen aktiv nach neuen Sponsoren und Geldgebern.</strong>
89 92
 Wenn deine Organisation ein Interesse an einem schnellen und gut zu
90
-  benutzenden Tor-Netzwerk hat, <a href="<page people>">kontaktiere
91
-  uns</a>. Alle <a href="<page sponsors>">Sponsoren von Tor</a>
92
-  bekommen persönliche Aufmerksamkeit, bessere Unterstützung und
93
-  öffentliche Aufmerksamkeit (wenn sie es wollen). Weiterhin erhalten
94
-  sie auch Einfluss auf die Richtung unserer Forschung und
95
-  Weiterentwicklung! Bitte <a href="<page donate>">spende</a>.</li>
96
-
93
+benutzenden Tor-Netzwerk hat, <a href="<page people>">kontaktiere uns</a>.
94
+Alle <a href="<page sponsors>">Sponsoren von Tor</a> bekommen persönliche
95
+Aufmerksamkeit, bessere Unterstützung und öffentliche Aufmerksamkeit (wenn sie
96
+es wollen). Weiterhin erhalten sie auch Einfluss auf die Richtung unserer
97
+Forschung und Weiterentwicklung! Bitte <a href="<page donate>">spende</a>.</li>
97 98
 </ul>
98
-<p><a href="<page news>">Mehr Neuigkeiten</a></p>
99
-  </div><!-- #main -->
99
+
100
+<p><a href="<page news>">Mehr Neuigkeiten</a>&nbsp;|&nbsp;<a href="<page
101
+press/index>">Veröffentlichungen für die Presse</a>&nbsp;|&nbsp;<a href="<page
102
+tormedia>">Tor in den Nachrichten</a></p> </div><!-- #main -->
100 103
 
101 104
 #include <foot.wmi>
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18547
2
+# Based-On-Revision: 19108
3 3
 # Last-Translator: mail -at- oliverknapp .de, jens @kubieziel.de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Neuigkeiten" CHARSET="UTF-8"
... ...
@@ -12,7 +12,10 @@
12 12
 <h2><a class="anchor" href="#News">Tor: Neuigkeiten</a></h2>
13 13
 <hr />
14 14
 
15
-<ul>
15
+<ul><li>12. März 2009: Tor startet den Plan und die Kampagne für
16
+Geschwindigkeitsverbesserungen. Lies die <a href="<page
17
+press/2009-03-12-performance-roadmap-press-release>">Pressemitteilung</a> für
18
+weitere Informationen.</li>
16 19
 <li>09. Februar 2009:  Tor 0.2.0.34 wurde als neue stabile Version veröffentlicht. Lies die <a
17 20
 href="http://archives.seul.org/or/announce/Feb-2009/msg00000.html">Meldung</a>
18 21
 für weitere Informationen. Diese Version behebt ein Sicherheitsproblem!</li>
... ...
@@ -92,7 +95,7 @@ mit installierst. Schaue dir die englischsprachige
92 95
 href="http://archives.seul.org/or/announce/Oct-2007/msg00000.html">Ankündigung</a>
93 96
 für weitere Details an.</li>
94 97
 
95
-<li>Oct 2007: Wie viele wissen, wurde The Tor Project im Februar eine <a
98
+<li>Okt 2007: Wie viele wissen, wurde The Tor Project im Februar eine <a
96 99
 href="<page people>">unabhängige, offizielle Nonprofit-Organisation</a>. Wir
97 100
 haben das gemacht, um Zuwendungen von Gruppen erhalten zu können, die nur an
98 101
 NGOs spenden. Damit können Spender Spendenquittungen von uns erhalten.
... ...
@@ -106,11 +109,9 @@ Weiterhin haben sie auch unsere Wandlung in eine Nonprofit-Organisation
106 109
 betreut.</a>
107 110
 
108 111
 <li>Sep 2007: Falls du eine E-Mail erhalten hast, die behauptet von Tor zu
109
-stammen, dann war diese nicht von uns.
110
-Die <a href="<page download>">offiziellen Tor-Pakete</a> können über deren
111
-<a
112
-href="http://wiki.noreply.org/noreply/TheOnionRouter/VerifyingSignatures">Signatur
113
-als authentisch</a> bewertet werden.</li>
112
+stammen, dann war diese nicht von uns. Die <a href="<page download>">
113
+offiziellen Tor-Pakete</a> können über deren <a href="<page
114
+verifying-signatures>">Signatur als authentisch</a> bewertet werden.</li>
114 115
 
115 116
 <li>Aug 2007: <strong>Bitte bringe deine Tor-Software auf den aktuellsten
116 117
 Stand!</strong> Die letzten Versionen (stable: 0.1.2.17; development:
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18762
2
+# Based-On-Revision: 19085
3 3
 # Last-Translator: mail (a-t) oliverknapp .de
4 4
 
5 5
 #include "head.wmi" TITLE="The Tor Project in den Medien" CHARSET="UTF-8"
... ...
@@ -24,10 +24,15 @@ Beispiele:</p>
24 24
 </tr>
25 25
 </thead>
26 26
 
27
+<td>12. März 2009</td>
28
+<td>BBC World Service</td>
29
+<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch im Interview über Tor und Zensur</a></td>
30
+</tr>
31
+<tr>
27 32
 <tr>
28 33
 <td>2009 Feb 13</td>
29 34
 <td>Hearsay Culture</td>
30
-<td><a href="http://www.hearsayculture.com/">Hearsay Culture Radio Interview/Podcast</a></td>
35
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td>
31 36
 </tr>
32 37
 <tr style="background-color: #e5e5e5;">
33 38
 <td>2008 Dec 29</td>
... ...
@@ -112,7 +117,17 @@ Artikel.</p>
112 117
 <th>Thema</th>
113 118
 </tr>
114 119
 </thead>
115
-
120
+<tr>
121
+<td>18. März 2009</td>
122
+<td>Marie Claire</td>
123
+<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td>
124
+</tr>
125
+<tr>
126
+<td>13. März 2009</td>
127
+<td>Wall Street Journal</td>
128
+<td><a href="http://online.wsj.com/article/SB123567809587886053.html">The Kindness of Strangers</a>
129
+</tr>
130
+<tr style="background-color: #e5e5e5;">
116 131
 <tr>
117 132
 <td>2009 Mar 03</td>
118 133
 <td>Orf Austria</td>
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18921
2
+# Based-On-Revision: 18944
3 3
 # Last-Translator: mail 11 oliverknapp 22 de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Mithelfen" CHARSET="UTF-8"
... ...
@@ -112,50 +112,82 @@
112 112
   Übersetzungen</a>.</li>
113 113
   </ol>
114 114
 
115
-<a id="Coding"></a>
116
-  <p>Die untenstehenden Angaben wurden in der Originalsprache
117
-  belassen. Da diese sich ausschließlich auf englischsprachige
118
-  Bewerber beziehen.</p>
115
+<a id="Coding"></a> <p>Die untenstehenden Angaben wurden in der
116
+Originalsprache belassen. Da diese sich ausschließlich auf Bewerber beziehen,
117
+die ausreichende Englischkenntnisse besitzen.</p>
119 118
 
120 119
   <a id="Summer"></a>
121 120
 <a id="Projects"></a>
122 121
 <h2><a class="anchor" href="#Projects">Good Coding Projects</a></h2>
123 122
 
124 123
 <p>
125
-Here is a list of ideas that were proposed for the <a href="<page gsoc>">Google Summer of Code 2009</a>
126
-but have not been put into practice. Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a> 
127
-might also be short on developers. If you think you can help out, <a href="<page contact>"> let us know!</a> 
124
+You may find some of these projects to be good <a href="<page
125
+gsoc>">Google Summer of Code 2009</a> ideas. We have labelled each idea
126
+with how useful it would be to the overall Tor project (priority), how
127
+much work we expect it would be (effort level), how much clue you should
128
+start with (skill level), and which of our <a href="<page
129
+people>#Core">core developers</a> would be good mentors.
130
+If one or more of these ideas looks promising to you, please <a
131
+href="<page contact>">contact us</a> to discuss your plans rather than
132
+sending blind applications. You may also want to propose your own project
133
+idea which often results in the best applications.
128 134
 </p>
129 135
 
130 136
 <ol>
131
-<!-- Mike is already working on this
137
+
132 138
 <li>
133
-<b>Tor Node Scanner improvements</b>
139
+<b>Tor Browser Bundle for Linux/Mac OS X</b>
134 140
 <br />
135
-Similar to the SoaT exit scanner (or perhaps even during exit scanning),
136
-statistics can be gathered about the reliability of nodes. Nodes that
137
-fail too high a percentage of their circuits should not be given
138
-Guard status. Perhaps they should have their reported bandwidth
139
-penalized by some ratio as well, or just get marked as Invalid. In
140
-addition, nodes that exhibit a very low average stream capacity but
141
-advertise a very high node bandwidth can also be marked as Invalid.
142
-Much of this statistics gathering is already done, it just needs to be
143
-transformed into something that can be reported to the Directory
144
-Authorities to blacklist/penalize nodes in such a way that clients
145
-will listen.
141
+Priority: <i>High</i>
146 142
 <br />
147
-In addition, these same statistics can be gathered about the traffic
148
-through a node. Events can be added to the <a
149
-href="https://svn.torproject.org/svn/torctl/trunk/doc/howto.txt">Tor Control
150
-Protocol</a> to
151
-report if a circuit extend attempt through the node succeeds or fails, and
152
-passive statistics can be gathered on both bandwidth and reliability
153
-of other nodes via a node-based monitor using these events. Such a
154
-scanner would also report information on oddly-behaving nodes to
155
-the Directory Authorities, but a communication channel for this
156
-currently does not exist and would need to be developed as well.
143
+Effort Level: <i>High</i>
144
+<br />
145
+Skill Level: <i>Medium</i>
146
+<br />
147
+Likely Mentors: <i>Steven, Andrew</i>
148
+<br />
149
+The Tor Browser bundle incorporates Tor, Firefox, and the Vidalia user
150
+interface (and optionally Pidgin IM). Components are pre-configured to
151
+operate in a secure way, and it has very few dependencies on the
152
+installed operating system. It has therefore become one of the most
153
+easy to use, and popular, ways to use Tor on Windows.
154
+<br />
155
+However, there is currently no comparable package for Linux and Mac OS
156
+X, so this project would be to implement Tor Browser Bundle for these
157
+platforms. This will involve modifications to Vidalia (C++), possibly
158
+Firefox (C) then creating and testing the launcher on a range of
159
+operating system versions and configurations to verify portability.
160
+<br />
161
+Students should be familiar with application development on one or
162
+preferably both of Linux and Mac OS X, and be comfortable with C/C++
163
+and shell scripting.
164
+<br />
165
+Part of this project could be usability testing of Tor Browser Bundle,
166
+ideally amongst our target demographic.
167
+That would help a lot in knowing what needs to be done in terms of bug
168
+fixes or new features. We get this informally at the moment, but a more
169
+structured process would be better.
170
+</li>
171
+
172
+<li>
173
+<b>Translation wiki for our website</b>
174
+<br />
175
+Priority: <i>High</i>
176
+<br />
177
+Effort Level: <i>Medium</i>
178
+<br />
179
+Skill Level: <i>Medium</i>
180
+<br />
181
+Likely Mentors: <i>Jacob</i>
182
+<br />
183
+The Tor Project has been working over the past year to set up web-based
184
+tools to help volunteers translate our applications into other languages.
185
+We finally hit upon Pootle, and we have a fine web-based translation engine
186
+in place for Vidalia, Torbutton, and Torcheck. However, Pootle only
187
+translates strings that are in the "po" format, and our website uses wml
188
+files. This project is about finding a way to convert our wml files into po
189
+strings and back, so they can be handled by Pootle.
157 190
 </li>
158
- -->
159 191
 
160 192
 <li>
161 193
 <b>Help track the overall Tor Network status</b>
... ...
@@ -166,7 +198,7 @@ Effort Level: <i>Medium</i>
166 198
 <br />
167 199
 Skill Level: <i>Medium</i>
168 200
 <br />
169
-Likely Mentors: <i>Karsten</i>
201
+Likely Mentors: <i>Karsten, Roger</i>
170 202
 <br />
171 203
 It would be great to set up an automated system for tracking network
172 204
 health over time, graphing it, etc. Part of this project would involve
... ...
@@ -177,8 +209,8 @@ in terms of new relays showing up and relays shutting off? Periodically
177 209
 people collect brief snapshots, but where it gets really interesting is
178 210
 when we start tracking data points over time.
179 211
 <br />
180
-Data could be collected from the "Tor Node Scanner" in
181
-<a href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from
212
+Data could be collected from the Tor Network Scanners in <a
213
+href="https://svn.torproject.org/svn/torflow/trunk/README">TorFlow</a>, from
182 214
 the server descriptors that each relay publishes, and from other
183 215
 sources. Results over time could be integrated into one of the <a
184 216
 href="https://torstatus.blutmagie.de/">Tor Status</a> web pages, or be
... ...
@@ -187,62 +219,16 @@ kept separate. Speaking of the Tor Status pages, take a look at Roger's
187 219
 Status wish list</a>.
188 220
 </li>
189 221
 
190
-<!-- Is this still a useful project? If so, move it to another section.
191
-<li>
192
-<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b>
193
-<br />
194
-Vidalia currently doesn't play nicely on Debian and Ubuntu with the
195
-default Tor packages. The current Tor packages automatically start Tor
196
-as a daemon running as the debian-tor user and (sensibly) do not have a
197
-<a href="<svnsandbox>doc/spec/control-spec.txt">ControlPort</a> defined
198
-in the default torrc. Consequently, Vidalia will try
199
-to start its own Tor process since it could not connect to the existing
200
-Tor, and Vidalia's Tor process will then exit with an error message
201
-the user likely doesn't understand since Tor cannot bind its listening
202
-ports &mdash; they're already in use by the original Tor daemon.
203
-<br />
204
-The current solution involves either telling the user to stop the
205
-existing Tor daemon and let Vidalia start its own Tor process, or
206
-explaining to the user how to set a control port and password in their
207
-torrc. A better solution on Debian would be to use Tor's ControlSocket,
208
-which allows Vidalia to talk to Tor via a Unix domain socket, and could
209
-possibly be enabled by default in Tor's Debian packages. Vidalia can
210
-then authenticate to Tor using filesystem-based (cookie) authentication
211
-if the user running Vidalia is also in the debian-tor group.
212
-<br />
213
-This project will first involve adding support for Tor's ControlSocket
214
-to Vidalia. The student will then develop and test Debian and Ubuntu
215
-packages for Vidalia that conform to Debian's packaging standards and
216
-make sure they work well with the existing Tor packages. We can also
217
-set up an apt repository to host the new Vidalia packages.
218
-<br />
219
-The next challenge would be to find an intuitive usable way for Vidalia
220
-to be able to change Tor's configuration (torrc) even though it is
221
-located in <code>/etc/tor/torrc</code> and thus immutable. The best
222
-idea we've come up with so far is to feed Tor a new configuration via
223
-the ControlSocket when Vidalia starts, but that's bad because Tor starts
224
-each boot with a different configuration than the user wants. The second
225
-best idea
226
-we've come up with is for Vidalia to write out a temporary torrc file
227
-and ask the user to manually move it to <code>/etc/tor/torrc</code>,
228
-but that's bad because users shouldn't have to mess with files directly.
229
-<br />
230
-A person undertaking this project should have prior knowledge of
231
-Debian package management and some C++ development experience. Previous
232
-experience with Qt is helpful, but not required.
233
-</li>
234
--->
235
-	 
236 222
 <li>
237 223
 <b>Improving Tor's ability to resist censorship</b>
238 224
 <br />
239
-Priority: <i>High</i>
225
+Priority: <i>Medium to High</i>
240 226
 <br />
241
-Effort Level: <i>High</i>
227
+Effort Level: <i>Medium</i>
242 228
 <br />
243 229
 Skill Level: <i>High</i>
244 230
 <br />
245
-Likely Mentors: <i>Nick</i>
231
+Likely Mentors: <i>Nick, Roger, Steven</i>
246 232
 <br />
247 233
 The Tor 0.2.0.x series makes <a
248 234
 href="<svnsandbox>doc/design-paper/blocking.html">significant
... ...
@@ -268,74 +254,83 @@ resist an adversary even after the adversary knows the design, and
268 254
 then trading off censorship resistance with usability and robustness.
269 255
 </li>
270 256
 
271
-<!-- This should be mostly done.
272 257
 <li>
273
-<b>Tor/Polipo/Vidalia Auto-Update Framework</b>
258
+<b>Tuneup Tor!</b>
274 259
 <br />
275
-We're in need of a good authenticated-update framework.
276
-Vidalia already has the ability to notice when the user is running an
277
-outdated or unrecommended version of Tor, using signed statements inside
278
-the Tor directory information. Currently, Vidalia simply pops
279
-up a little message box that lets the user know they should manually
280
-upgrade. The goal of this project would be to extend Vidalia with the
281
-ability to also fetch and install the updated Tor software for the
282
-user. We should do the fetches via Tor when possible, but also fall back
283
-to direct fetches in a smart way. Time permitting, we would also like
284
-to be able to update other
285
-applications included in the bundled installers, such as Polipo and
286
-Vidalia itself.
260
+Priority: <i>Medium to High</i>
287 261
 <br />
288
-To complete this project, the student will first need to first investigate
289
-the existing auto-update frameworks (e.g., Sparkle on OS X) to evaluate
290
-their strengths, weaknesses, security properties, and ability to be
291
-integrated into Vidalia. If none are found to be suitable, the student
292
-will design their own auto-update framework, document the design, and
293
-then discuss the design with other developers to assess any security
294
-issues. The student will then implement their framework (or integrate
295
-an existing one) and test it.
262
+Effort Level: <i>Medium to High</i>
296 263
 <br />
297
-A person undertaking this project should have good C++ development
298
-experience. Previous experience with Qt is helpful, but not required. One
299
-should also have a good understanding of common security
300
-practices, such as package signature verification. Good writing ability
301
-is also important for this project, since a vital step of the project
302
-will be producing a design document to review and discuss
303
-with others prior to implementation.
264
+Skill Level: <i>High</i>
265
+<br />
266
+Likely Mentors: <i>Nick, Roger, Mike, Karsten</i>
267
+<br />
268
+Right now, Tor relays measure and report their own bandwidth, and Tor
269
+clients choose which relays to use in part based on that bandwidth.
270
+This approach is vulnerable to
271
+<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
272
+relays lie about their bandwidth</a>;
273
+to address this, Tor currently caps the maximum bandwidth
274
+it's willing to believe any relay provides.  This is a limited fix, and
275
+a waste of bandwidth capacity to boot.  Instead,
276
+Tor should possibly measure bandwidth in a more distributed way, perhaps
277
+as described in the
278
+<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for
279
+Tor"</a> paper
280
+by Snader and Borisov. One could use current testing code to
281
+double-check this paper's findings and verify the extent to which they
282
+dovetail with Tor as deployed in the wild, and determine good ways to
283
+incorporate them into their suggestions Tor network without adding too
284
+much communications overhead between relays and directory
285
+authorities.
304 286
 </li>
305
--->
306 287
 
307 288
 <li>
308
-<b>An Improved and More Usable Network Map in Vidalia</b>
289
+<b>Improving Polipo on Windows</b>
309 290
 <br />
310
-Priority: <i>Medium</i>
291
+Priority: <i>Medium to High</i>
311 292
 <br />
312 293
 Effort Level: <i>Medium</i>
313 294
 <br />
314 295
 Skill Level: <i>Medium</i>
315 296
 <br />
316
-Likely Mentors: <i>Matt</i>
297
+Likely Mentors: <i>Martin</i>
317 298
 <br />
318
-One of Vidalia's existing features is a network map that shows the user
319
-the approximate geographic location of relays in the Tor network and
320
-plots the paths the user's traffic takes as it is tunneled through the
321
-Tor network. The map is currently not very interactive and has rather
322
-poor graphics. Instead, we implemented KDE's Marble widget such
323
-that it gives us a better quality map and enables improved interactivity,
324
-such as allowing the user to click on individual relays or circuits to
325
-display additional information. We want to add the ability
326
-for users to click on a particular relay or a country containing one or
327
-more Tor exit relays and say, "I want my connections to exit
328
-from here."
299
+Help port <a
300
+href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to
301
+Windows. Example topics to tackle include:
302
+1) the ability to asynchronously
303
+query name servers, find the system nameservers, and manage netbios
304
+and dns queries.
305
+2) manage events and buffers
306
+natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in
307
+Windows it's whatever the config specifies). 3) some sort of GUI config
308
+and reporting tool, bonus if it has a systray icon with right clickable
309
+menu options. Double bonus if it's cross-platform compatible.
310
+4) allow the software to use the Windows Registry and handle proper Windows directory locations, such as "C:\Program Files\Polipo"
311
+</li>
312
+
313
+<li>
314
+<b>Implement a torrent-based scheme for downloading Thandy packages</b>
329 315
 <br />
330
-This project will first involve getting familiar with Vidalia
331
-and the Marble widget's API. One will then integrate the widget
332
-into Vidalia and customize Marble to be better suited for our application,
333
-such as making circuits clickable, storing cached map data in Vidalia's
334
-own data directory, and customizing some of the widget's dialogs.
316
+Priority: <i>Medium to High</i>
335 317
 <br />
336
-A person undertaking this project should have good C++ development
337
-experience. Previous experience with Qt and CMake is helpful, but not
338
-required.
318
+Effort Level: <i>High</i>
319
+<br />
320
+Skill Level: <i>Medium to High</i>
321
+<br />
322
+Likely Mentors: <i>Martin, Nick</i>
323
+<br />
324
+<a
325
+href="http://git.torproject.org/checkout/thandy/master/specs/thandy-spec.txt">Thandy</a>
326
+is a relatively new software to allow assisted updates of Tor and related
327
+software. Currently, there are very few users, but we expect Thandy to be
328
+used by almost every Tor user in the future. To avoid crashing servers on
329
+the day of a Tor update, we need new ways to distribute new packages
330
+efficiently, and using libtorrent seems to be a possible solution. If you
331
+think of other good ideas, great - please do let us know!<br />
332
+We also need to investigate how to include our mirrors better. If possible,
333
+there should be an easy way for them to help distributing the packages.
339 334
 </li>
340 335
 
341 336
 <li>
... ...
@@ -345,7 +340,7 @@ Priority: <i>Medium</i>
345 340
 <br />
346 341
 Effort Level: <i>Medium</i>
347 342
 <br />
348
-Skill Level: <i>Medium</i>
343
+Skill Level: <i>Low to Medium</i>
349 344
 <br />
350 345
 Likely Mentors: <i>Matt</i>
351 346
 <br />
... ...
@@ -381,167 +376,16 @@ be understandable by non-technical users. Bonus points for some graphic
381 376
 design/Photoshop fu, since we might want/need some shiny new icons too.
382 377
 </li>
383 378
 
384
-<!-- Jake already did most of this.
385 379
 <li>
386
-<b>Improvements on our active browser configuration tester</b> -
387
-<a href="https://check.torproject.org/">https://check.torproject.org/</a>
380
+<b>Improve our unit testing process</b>
388 381
 <br />
389
-We currently have a functional web page to detect if Tor is working. It
390
-has a few places where it falls short. It requires improvements with
391
-regard to default languages and functionality. It currently only responds
392
-in English. In addition, it is a hack of a perl script that should have
393
-never seen the light of day. It should probably be rewritten in python
394
-with multi-lingual support in mind. It currently uses the <a
395
-href="http://exitlist.torproject.org/">Tor DNS exit list</a>
396
-and should continue to do so in the future. It currently result in certain
397
-false positives and these should be discovered, documented, and fixed
398
-where possible. Anyone working on this project should be interested in
399
-DNS, basic perl or preferably python programming skills, and will have
400
-to interact minimally with Tor to test their code.
401
-<br />
402
-If you want to make the project more exciting
403
-and involve more design and coding, take a look at <a
404
-href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal
405
-131-verify-tor-usage.txt</a>.
406
-</li>
407
--->
408
-
409
-<!-- If we decide to switch to the exit list in TorStatus, this is obsolete.
410
-<li>
411
-<b>Improvements on our DNS Exit List service</b> -
412
-<a href="http://exitlist.torproject.org/">http://exitlist.torproject.org/</a>
413
-<br />
414
-The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a>
415
-is written by our fabulous anonymous
416
-contributer Tup. It's a DNS server written in Haskell that supports part of our <a
417
-href="<svnsandbox>doc/contrib/torel-design.txt">exitlist
418
-design document</a>. Currently, it is functional and it is used by
419
-check.torproject.org and other users. The issues that are outstanding
420
-are mostly aesthetic. This wonderful service could use a much better
421
-website using the common Tor theme. It would be best served with better
422
-documentation for common services that use an RBL. It could use more
423
-publicity. A person working on this project should be interested in DNS,
424
-basic RBL configuration for popular services, and writing documentation.
425
-The person would require minimal Tor interaction &mdash; testing their
426
-own documentation at the very least. Furthermore, it would be useful
427
-if they were interested in Haskell and wanted to implement more of the
428
-torel-design.txt suggestions.
429
-</li>
430
--->
431
-
432
-<!-- Nobody wanted to keep this.
433
-<li>
434
-<b>Testing integration of Tor with web browsers for our end users</b>
435
-<br />
436
-The Tor project currently lacks a solid test suite to ensure that a
437
-user has a properly and safely configured web browser. It should test for as
438
-many known issues as possible. It should attempt to decloak the
439
-user in any way possible. Two current webpages that track these
440
-kinds of issues are run by Greg Fleischer and HD Moore. Greg keeps a nice <a
441
-href="http://pseudo-flaw.net/tor/torbutton/">list of issues along
442
-with their proof of concept code, bug issues, etc</a>. HD Moore runs
443
-the <a href="http://www.decloak.net/">metasploit
444
-decloak website</a>. A person interested in defending Tor could start
445
-by collecting as many workable and known methods for decloaking a
446
-Tor user. (<a href="https://torcheck.xenobite.eu/">This page</a> may
447
-be helpful as a start.) One should be familiar with the common pitfalls but
448
-possibly have new methods in mind for implementing decloaking issues. The
449
-website should ensure that it tells a user what their problem is. It
450
-should help them to fix the problem or direct them to the proper support
451
-channels. The person should also be closely familiar with using Tor and how
452
-to prevent Tor information leakage.
453
-</li>
454
--->
455
-
456
-<!-- Nick did quite some work here. Is this project still required then?
457
-<li>
458
-<b>Libevent and Tor integration improvements</b>
459
-<br />
460
-Tor should make better use of the more recent features of Niels
461
-Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a>
462
-library.  Tor already uses Libevent for its low-level asynchronous IO
463
-calls, and could also use Libevent's increasingly good implementations
464
-of network buffers and of HTTP.  This wouldn't be simply a matter of
465
-replacing Tor's internal calls with calls to Libevent: instead, we'll
466
-need to refactor Tor to use Libevent calls that do not follow the
467
-same models as Tor's existing backends. Also, we'll need to add
468
-missing functionality to Libevent as needed &mdash; most difficult likely
469
-will be adding OpenSSL support on top of Libevent's buffer abstraction.
470
-Also tricky will be adding rate-limiting to Libevent.
471
-</li>
472
--->
473
-
474
-<li>
475
-<b>Tuneup Tor!</b>
476
-<br />
477
-Priority: <i>Medium</i>
478
-<br />
479
-Effort Level: <i>Medium</i>
480
-<br />
481
-Skill Level: <i>Medium to High</i>
482
-<br />
483
-Likely Mentors: <i>Nick, Roger, Mike</i>
484
-<br />
485
-Right now, Tor relays measure and report their own bandwidth, and Tor
486
-clients choose which relays to use in part based on that bandwidth.
487
-This approach is vulnerable to
488
-<a href="http://freehaven.net/anonbib/#bauer:wpes2007">attacks where
489
-relays lie about their bandwidth</a>;
490
-to address this, Tor currently caps the maximum bandwidth
491
-it's willing to believe any relay provides.  This is a limited fix, and
492
-a waste of bandwidth capacity to boot.  Instead,
493
-Tor should possibly measure bandwidth in a more distributed way, perhaps
494
-as described in the
495
-<a href="http://freehaven.net/anonbib/author.html#snader08">"A Tune-up for
496
-Tor"</a> paper
497
-by Snader and Borisov. One could use current testing code to
498
-double-check this paper's findings and verify the extent to which they
499
-dovetail with Tor as deployed in the wild, and determine good ways to
500
-incorporate them into their suggestions Tor network without adding too
501
-much communications overhead between relays and directory
502
-authorities.
503
-</li>
504
-
505
-<!--
506
-<li>
507
-<b>Improving the Tor QA process: Continuous Integration for Windows builds</b>
508
-<br />
509
-It would be useful to have automated build processes for Windows and
510
-probably other platforms. The purpose of having a continuous integration
511
-build environment is to ensure that Windows isn't left behind for any of
512
-the software projects used in the Tor project or its accompanying.<br />
513
-Buildbot may be a good choice for this as it appears to support all of
514
-the platforms Tor does. See the
515
-<a href="http://en.wikipedia.org/wiki/BuildBot">wikipedia entry for
516
-buildbot</a>.<br />
517
-There may be better options and the person undertaking this task should
518
-evaluate other options. Any person working on this automatic build
519
-process should have experience or be willing to learn how to build all
520
-of the respective Tor related code bases from scratch. Furthermore, the
521
-person should have some experience building software in Windows
522
-environments as this is the target audience we want to ensure we do not
523
-leave behind. It would require close work with the Tor source code but
524
-probably only in the form of building, not authoring.<br />
525
-Additionally, we need to automate our performance testing for all platforms.
526
-We've got buildbot (except on Windows &mdash; as noted above) to automate
527
-our regular integration and compile testing already,
528
-but we need to get our network simulation tests (as built in torflow)
529
-updated for more recent versions of Tor, and designed to launch a test
530
-network either on a single machine, or across several, so we can test
531
-changes in performance on machines in different roles automatically.
532
-</li>
533
--->
534
-
535
-<li>
536
-<b>Improve our unit testing process</b>
537
-<br />
538
-Priority: <i>Medium</i>
382
+Priority: <i>Medium</i>
539 383
 <br />
540 384
 Effort Level: <i>Medium</i>
541 385
 <br />
542 386
 Skill Level: <i>Medium</i>
543 387
 <br />
544
-Likely Mentors: <i>Nick</i>
388
+Likely Mentors: <i>Nick, Roger</i>
545 389
 <br />
546 390
 Tor needs to be far more tested. This is a multi-part effort. To start
547 391
 with, our unit test coverage should rise substantially, especially in
... ...
@@ -590,12 +434,137 @@ to a small degree about design.
590 434
 </li>
591 435
 
592 436
 <li>
593
-<b>Bring moniTor to life</b>
437
+<b>New Torbutton Features</b>
438
+<br />
439
+Priority: <i>Medium</i>
440
+<br />
441
+Effort Level: <i>High</i>
442
+<br />
443
+Skill Level: <i>High</i>
444
+<br />
445
+Likely Mentors: <i>Mike</i>
446
+<br/>
447
+There are several <a
448
+href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5&amp;type=2">good
449
+feature requests</a> on the Torbutton Flyspray section. In particular, <a
450
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=523">Integrating
451
+'New Identity' with Vidalia</a>,
452
+<a href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=940">ways of
453
+managing multiple cookie jars/identities</a>, <a
454
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=637">preserving
455
+specific cookies</a> when cookies are cleared,
456
+<a
457
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=524">better
458
+referrer spoofing</a>, <a
459
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=564">correct
460
+Tor status reporting</a>, and <a
461
+href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=462">"tor://"
462
+and "tors://" urls</a> are all interesting
463
+features that could be added.
464
+<br />
465
+This work would be independent coding in Javascript and the fun world of <a
466
+href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>,
467
+with not too much involvement in the Tor internals.
468
+</li>
469
+
470
+<li>
471
+<b>New Thandy Features</b>
472
+<br />
473
+Priority: <i>Medium</i>
474
+<br />
475
+Effort Level: <i>Medium</i>
476
+<br />
477
+Skill Level: <i>Medium to High</i>
478
+<br />
479
+Likely Mentors: <i>Martin</i>
480
+<br />
481
+Additional capabilities are needed for assisted updates of all the Tor
482
+related software for Windows and other operating systems. Some of the
483
+features to consider include:
484
+1) Integration of the <a
485
+href="http://chandlerproject.org/Projects/MeTooCrypto">MeTooCrypto
486
+Python library</a>
487
+for authenticated HTTPS downloads. 2) Adding a level of indirection
488
+between the timestamp signatures and the package files included in an
489
+update. See the "Thandy attacks / suggestions" thread on or-dev.
490
+3) Support locale specific installation and configuration of assisted
491
+updates based on preference, host, or user account language settings.
492
+Familiarity with Windows codepages, unicode, and other character sets
493
+is helpful in addition to general win32 and posix API experience and
494
+Python proficiency.
495
+</li>
496
+
497
+<li>
498
+<b>Simulator for slow Internet connections</b>
594 499
 <br />
595 500
 Priority: <i>Medium</i>
596 501
 <br />
597 502
 Effort Level: <i>Medium</i>
598 503
 <br />
504
+Skill Level: <i>Medium</i>
505
+<br />
506
+Likely Mentors: <i>Steven</i>
507
+<br />
508
+Many users of Tor have poor-quality Internet connections, giving low
509
+bandwidth, high latency, and high packet loss/re-ordering. User
510
+experience is that Tor reacts badly to these conditions, but it is
511
+difficult to improve the situation without being able to repeat the
512
+problems in the lab.
513
+<br />
514
+This project would be to build a simulation environment which
515
+replicates the poor connectivity so that the effect on Tor performance
516
+can be measured. Other components would be a testing utility to
517
+establish what are the properties of connections available, and to
518
+measure the effect of performance-improving modifications to Tor.
519
+<br />
520
+The tools used would be up to the student, but dummynet (for FreeBSD)
521
+and nistnet (for Linux) are two potential components on which this
522
+project could be built. Students should be experienced with network
523
+programming/debugging and TCP/IP, and preferably familiar with C and a
524
+scripting language.
525
+</li>
526
+
527
+<li>
528
+<b>An Improved and More Usable Network Map in Vidalia</b>
529
+<br />
530
+Priority: <i>Low to Medium</i>
531
+<br />
532
+Effort Level: <i>Medium</i>
533
+<br />
534
+Skill Level: <i>Medium</i>
535
+<br />
536
+Likely Mentors: <i>Matt</i>
537
+<br />
538
+One of Vidalia's existing features is a network map that shows the user
539
+the approximate geographic location of relays in the Tor network and
540
+plots the paths the user's traffic takes as it is tunneled through the
541
+Tor network. The map is currently not very interactive and has rather
542
+poor graphics. Instead, we implemented KDE's Marble widget such
543
+that it gives us a better quality map and enables improved interactivity,
544
+such as allowing the user to click on individual relays or circuits to
545
+display additional information. We want to add the ability
546
+for users to click on a particular relay or a country containing one or
547
+more Tor exit relays and say, "I want my connections to exit
548
+from here."
549
+<br />
550
+This project will first involve getting familiar with Vidalia
551
+and the Marble widget's API. One will then integrate the widget
552
+into Vidalia and customize Marble to be better suited for our application,
553
+such as making circuits clickable, storing cached map data in Vidalia's
554
+own data directory, and customizing some of the widget's dialogs.
555
+<br />
556
+A person undertaking this project should have good C++ development
557
+experience. Previous experience with Qt and CMake is helpful, but not
558
+required.
559
+</li>
560
+
561
+<li>
562
+<b>Bring moniTor to life</b>
563
+<br />
564
+Priority: <i>Low</i>
565
+<br />
566
+Effort Level: <i>Medium</i>
567
+<br />
599 568
 Skill Level: <i>Low to Medium</i>
600 569
 <br />
601 570
 Likely Mentors: <i>Karsten, Jacob</i>
... ...
@@ -616,6 +585,285 @@ project is one part about identifying requirements to such a
616 585
 tool and designing its interface, and one part lots of coding.
617 586
 </li>
618 587
 
588
+<li>
589
+<b>Torbutton equivalent for Thunderbird</b>
590
+<br />
591
+Priority: <i>Low</i>
592
+<br />
593
+Effort Level: <i>High</i>
594
+<br />
595
+Skill Level: <i>High</i>
596
+<br />
597
+Likely Mentors: <i>Mike</i>
598
+<br />
599
+We're hearing from an increasing number of users that they want to use
600
+Thunderbird with Tor. However, there are plenty of application-level
601
+concerns, for example, by default Thunderbird will put your hostname in
602
+the outgoing mail that it sends. At some point we should start a new
603
+push to build a Thunderbird extension similar to Torbutton.
604
+</li>
605
+
606
+<li>
607
+<b>Intermediate Level Network Device Driver</b>
608
+<br />
609
+Priority: <i>Low</i>
610
+<br />
611
+Effort Level: <i>High</i>
612
+<br />
613
+Skill Level: <i>High</i>
614
+<br />
615
+Likely Mentors: <i>Martin</i>
616
+<br />
617
+The WinPCAP device driver used by Tor VM for bridged networking does
618
+not support a number of wireless and non-Ethernet network adapters.
619
+Implementation of a intermediate level network device driver for win32
620
+and 64bit would provide a way to intercept and route traffic over such
621
+networks. This project will require knowledge of and experience with
622
+Windows kernel device driver development and testing. Familiarity with
623
+Winsock and Qemu would also be helpful.
624
+</li>
625
+
626
+<li>
627
+<b>Bring up new ideas!</b>
628
+<br />
629
+Don't like any of these? Look at the <a
630
+href="<svnsandbox>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development
631
+roadmap</a> for more ideas.
632
+Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a>
633
+might also be short on developers.
634
+</li>
635
+
636
+<!-- Mike is already working on this.
637
+<li>
638
+<b>Tor Node Scanner improvements</b>
639
+<br />
640
+Similar to the SoaT exit scanner (or perhaps even during exit scanning),
641
+statistics can be gathered about the reliability of nodes. Nodes that
642
+fail too high a percentage of their circuits should not be given
643
+Guard status. Perhaps they should have their reported bandwidth
644
+penalized by some ratio as well, or just get marked as Invalid. In
645
+addition, nodes that exhibit a very low average stream capacity but
646
+advertise a very high node bandwidth can also be marked as Invalid.
647
+Much of this statistics gathering is already done, it just needs to be
648
+transformed into something that can be reported to the Directory
649
+Authorities to blacklist/penalize nodes in such a way that clients
650
+will listen.
651
+<br />
652
+In addition, these same statistics can be gathered about the traffic
653
+through a node. Events can be added to the <a
654
+href="https://svn.torproject.org/svn/torctl/trunk/doc/howto.txt">Tor Control
655
+Protocol</a> to
656
+report if a circuit extend attempt through the node succeeds or fails, and
657
+passive statistics can be gathered on both bandwidth and reliability
658
+of other nodes via a node-based monitor using these events. Such a
659
+scanner would also report information on oddly-behaving nodes to
660
+the Directory Authorities, but a communication channel for this
661
+currently does not exist and would need to be developed as well.
662
+</li>
663
+-->
664
+
665
+<!-- Is this still a useful project? If so, move it to another section.
666
+<li>
667
+<b>Better Debian/Ubuntu Packaging for Tor+Vidalia</b>
668
+<br />
669
+Vidalia currently doesn't play nicely on Debian and Ubuntu with the
670
+default Tor packages. The current Tor packages automatically start Tor
671
+as a daemon running as the debian-tor user and (sensibly) do not have a
672
+<a href="<svnsandbox>doc/spec/control-spec.txt">ControlPort</a> defined
673
+in the default torrc. Consequently, Vidalia will try
674
+to start its own Tor process since it could not connect to the existing
675
+Tor, and Vidalia's Tor process will then exit with an error message
676
+the user likely doesn't understand since Tor cannot bind its listening
677
+ports &mdash; they're already in use by the original Tor daemon.
678
+<br />
679
+The current solution involves either telling the user to stop the
680
+existing Tor daemon and let Vidalia start its own Tor process, or
681
+explaining to the user how to set a control port and password in their
682
+torrc. A better solution on Debian would be to use Tor's ControlSocket,
683
+which allows Vidalia to talk to Tor via a Unix domain socket, and could
684
+possibly be enabled by default in Tor's Debian packages. Vidalia can
685
+then authenticate to Tor using filesystem-based (cookie) authentication
686
+if the user running Vidalia is also in the debian-tor group.
687
+<br />
688
+This project will first involve adding support for Tor's ControlSocket
689
+to Vidalia. The student will then develop and test Debian and Ubuntu
690
+packages for Vidalia that conform to Debian's packaging standards and
691
+make sure they work well with the existing Tor packages. We can also
692
+set up an apt repository to host the new Vidalia packages.
693
+<br />
694
+The next challenge would be to find an intuitive usable way for Vidalia
695
+to be able to change Tor's configuration (torrc) even though it is
696
+located in <code>/etc/tor/torrc</code> and thus immutable. The best
697
+idea we've come up with so far is to feed Tor a new configuration via
698
+the ControlSocket when Vidalia starts, but that's bad because Tor starts
699
+each boot with a different configuration than the user wants. The second
700
+best idea
701
+we've come up with is for Vidalia to write out a temporary torrc file
702
+and ask the user to manually move it to <code>/etc/tor/torrc</code>,
703
+but that's bad because users shouldn't have to mess with files directly.
704
+<br />
705
+A person undertaking this project should have prior knowledge of
706
+Debian package management and some C++ development experience. Previous
707
+experience with Qt is helpful, but not required.
708
+</li>
709
+-->
710
+
711
+<!-- This should be mostly done.
712
+<li>
713
+<b>Tor/Polipo/Vidalia Auto-Update Framework</b>
714
+<br />
715
+We're in need of a good authenticated-update framework.
716
+Vidalia already has the ability to notice when the user is running an
717
+outdated or unrecommended version of Tor, using signed statements inside
718
+the Tor directory information. Currently, Vidalia simply pops
719
+up a little message box that lets the user know they should manually
720
+upgrade. The goal of this project would be to extend Vidalia with the
721
+ability to also fetch and install the updated Tor software for the
722
+user. We should do the fetches via Tor when possible, but also fall back
723
+to direct fetches in a smart way. Time permitting, we would also like
724
+to be able to update other
725
+applications included in the bundled installers, such as Polipo and
726
+Vidalia itself.
727
+<br />
728
+To complete this project, the student will first need to first investigate
729
+the existing auto-update frameworks (e.g., Sparkle on OS X) to evaluate
730
+their strengths, weaknesses, security properties, and ability to be
731
+integrated into Vidalia. If none are found to be suitable, the student
732
+will design their own auto-update framework, document the design, and
733
+then discuss the design with other developers to assess any security
734
+issues. The student will then implement their framework (or integrate
735
+an existing one) and test it.
736
+<br />
737
+A person undertaking this project should have good C++ development
738
+experience. Previous experience with Qt is helpful, but not required. One
739
+should also have a good understanding of common security
740
+practices, such as package signature verification. Good writing ability
741
+is also important for this project, since a vital step of the project
742
+will be producing a design document to review and discuss
743
+with others prior to implementation.
744
+</li>
745
+-->
746
+
747
+<!-- Jake already did most of this.
748
+<li>
749
+<b>Improvements on our active browser configuration tester</b> -
750
+<a href="https://check.torproject.org/">https://check.torproject.org/</a>
751
+<br />
752
+We currently have a functional web page to detect if Tor is working. It
753
+has a few places where it falls short. It requires improvements with
754
+regard to default languages and functionality. It currently only responds
755
+in English. In addition, it is a hack of a perl script that should have
756
+never seen the light of day. It should probably be rewritten in python
757
+with multi-lingual support in mind. It currently uses the <a
758
+href="http://exitlist.torproject.org/">Tor DNS exit list</a>
759
+and should continue to do so in the future. It currently result in certain
760
+false positives and these should be discovered, documented, and fixed
761
+where possible. Anyone working on this project should be interested in
762
+DNS, basic perl or preferably python programming skills, and will have
763
+to interact minimally with Tor to test their code.
764
+<br />
765
+If you want to make the project more exciting
766
+and involve more design and coding, take a look at <a
767
+href="<svnsandbox>doc/spec/proposals/131-verify-tor-usage.txt">proposal
768
+131-verify-tor-usage.txt</a>.
769
+</li>
770
+-->
771
+
772
+<!-- If we decide to switch to the exit list in TorStatus, this is obsolete.
773
+<li>
774
+<b>Improvements on our DNS Exit List service</b> -
775
+<a href="http://exitlist.torproject.org/">http://exitlist.torproject.org/</a>
776
+<br />
777
+The <a href="http://p56soo2ibjkx23xo.onion/">exitlist software</a>
778
+is written by our fabulous anonymous
779
+contributer Tup. It's a DNS server written in Haskell that supports part of our <a
780
+href="<svnsandbox>doc/contrib/torel-design.txt">exitlist
781
+design document</a>. Currently, it is functional and it is used by
782
+check.torproject.org and other users. The issues that are outstanding
783
+are mostly aesthetic. This wonderful service could use a much better
784
+website using the common Tor theme. It would be best served with better
785
+documentation for common services that use an RBL. It could use more
786
+publicity. A person working on this project should be interested in DNS,
787
+basic RBL configuration for popular services, and writing documentation.
788
+The person would require minimal Tor interaction &mdash; testing their
789
+own documentation at the very least. Furthermore, it would be useful
790
+if they were interested in Haskell and wanted to implement more of the
791
+torel-design.txt suggestions.
792
+</li>
793
+-->
794
+
795
+<!-- Nobody wanted to keep this.
796
+<li>
797
+<b>Testing integration of Tor with web browsers for our end users</b>
798
+<br />
799
+The Tor project currently lacks a solid test suite to ensure that a
800
+user has a properly and safely configured web browser. It should test for as
801
+many known issues as possible. It should attempt to decloak the
802
+user in any way possible. Two current webpages that track these
803
+kinds of issues are run by Greg Fleischer and HD Moore. Greg keeps a nice <a
804
+href="http://pseudo-flaw.net/tor/torbutton/">list of issues along
805
+with their proof of concept code, bug issues, etc</a>. HD Moore runs
806
+the <a href="http://www.decloak.net/">metasploit
807
+decloak website</a>. A person interested in defending Tor could start
808
+by collecting as many workable and known methods for decloaking a
809
+Tor user. (<a href="https://torcheck.xenobite.eu/">This page</a> may
810
+be helpful as a start.) One should be familiar with the common pitfalls but
811
+possibly have new methods in mind for implementing decloaking issues. The
812
+website should ensure that it tells a user what their problem is. It
813
+should help them to fix the problem or direct them to the proper support
814
+channels. The person should also be closely familiar with using Tor and how
815
+to prevent Tor information leakage.
816
+</li>
817
+-->
818
+
819
+<!-- Nick did quite some work here. Is this project still required then?
820
+<li>
821
+<b>Libevent and Tor integration improvements</b>
822
+<br />
823
+Tor should make better use of the more recent features of Niels
824
+Provos's <a href="http://monkey.org/~provos/libevent/">Libevent</a>
825
+library.  Tor already uses Libevent for its low-level asynchronous IO
826
+calls, and could also use Libevent's increasingly good implementations
827
+of network buffers and of HTTP.  This wouldn't be simply a matter of
828
+replacing Tor's internal calls with calls to Libevent: instead, we'll
829
+need to refactor Tor to use Libevent calls that do not follow the
830
+same models as Tor's existing backends. Also, we'll need to add
831
+missing functionality to Libevent as needed &mdash; most difficult likely
832
+will be adding OpenSSL support on top of Libevent's buffer abstraction.
833
+Also tricky will be adding rate-limiting to Libevent.
834
+</li>
835
+-->
836
+
837
+<!--
838
+<li>
839
+<b>Improving the Tor QA process: Continuous Integration for Windows builds</b>
840
+<br />
841
+It would be useful to have automated build processes for Windows and
842
+probably other platforms. The purpose of having a continuous integration
843
+build environment is to ensure that Windows isn't left behind for any of
844
+the software projects used in the Tor project or its accompanying.<br />
845
+Buildbot may be a good choice for this as it appears to support all of
846
+the platforms Tor does. See the
847
+<a href="http://en.wikipedia.org/wiki/BuildBot">wikipedia entry for
848
+buildbot</a>.<br />
849
+There may be better options and the person undertaking this task should
850
+evaluate other options. Any person working on this automatic build
851
+process should have experience or be willing to learn how to build all
852
+of the respective Tor related code bases from scratch. Furthermore, the
853
+person should have some experience building software in Windows
854
+environments as this is the target audience we want to ensure we do not
855
+leave behind. It would require close work with the Tor source code but
856
+probably only in the form of building, not authoring.<br />
857
+Additionally, we need to automate our performance testing for all platforms.
858
+We've got buildbot (except on Windows &mdash; as noted above) to automate
859
+our regular integration and compile testing already,
860
+but we need to get our network simulation tests (as built in torflow)
861
+updated for more recent versions of Tor, and designed to launch a test
862
+network either on a single machine, or across several, so we can test
863
+changes in performance on machines in different roles automatically.
864
+</li>
865
+-->
866
+
619 867
 <!-- Removed, unless Mike still wants this to be in.
620 868
 <li>
621 869
 <b>Torbutton improvements</b>
... ...
@@ -637,31 +885,6 @@ with not too much involvement in the Tor internals.
637 885
 </li>
638 886
 -->
639 887
 
640
-<li>
641
-<b>Improving Polipo on Windows</b>
642
-<br />
643
-Priority: <i>Medium</i>
644
-<br />
645
-Effort Level: <i>Low</i>
646
-<br />
647
-Skill Level: <i>Medium</i>
648
-<br />
649
-Likely Mentors: <i>Martin</i>
650
-<br />
651
-Help port <a
652
-href="http://www.pps.jussieu.fr/~jch/software/polipo/">Polipo</a> to
653
-Windows. Example topics to tackle include:
654
-1) the ability to asynchronously
655
-query name servers, find the system nameservers, and manage netbios
656
-and dns queries.
657
-2) manage events and buffers
658
-natively (i.e. in Unix-like OSes, Polipo defaults to 25% of ram, in
659
-Windows it's whatever the config specifies). 3) some sort of GUI config
660
-and reporting tool, bonus if it has a systray icon with right clickable
661
-menu options. Double bonus if it's cross-platform compatible.
662
-3) allow the software to use the Windows Registry and handle proper Windows directory locations, such as "C:\Program Files\Polipo"
663
-</li>
664
-
665 888
 <!-- Is Blossom development still happening?
666 889
 <li>
667 890
 <b>Rework and extend Blossom</b>
... ...
@@ -713,81 +936,7 @@ the core of the Blossom effort.
713 936
 </li>
714 937
 -->
715 938
 
716
-<li>
717
-<b>Implement a torrent-based scheme for downloading Thandy packages</b>
718
-<br />
719
-Priority: <i>Medium</i>
720
-<br />
721
-Effort Level: <i>High</i>
722
-<br />
723
-Skill Level: <i>Medium to High</i>
724
-<br />
725
-Likely Mentors: <i>Martin, Nick</i>
726
-<br />
727
-<a
728
-href="http://git.torproject.org/checkout/thandy/master/specs/thandy-spec.txt">Thandy</a>
729
-is a relatively new software to allow assisted updates of Tor and related
730
-software. Currently, there are very few users, but we expect Thandy to be
731
-used by almost every Tor user in the future. To avoid crashing servers on
732
-the day of a Tor update, we need new ways to distribute new packages
733
-efficiently, and using libtorrent seems to be a possible solution. If you
734
-think of other good ideas, great - please do let us know!<br />
735
-We also need to investigate how to include our mirrors better. If possible,
736
-there should be an easy way for them to help distributing the packages.
737
-</li>
738
-
739
-<li>
740
-<b>Torbutton equivalent for Thunderbird</b>
741
-<br />
742
-Priority: <i>Medium</i>
743
-<br />
744
-Effort Level: <i>High</i>
745
-<br />
746
-Skill Level: <i>High</i>
747
-<br />
748
-Likely Mentors: <i>Mike</i>
749
-<br />
750
-We're hearing from an increasing number of users that they want to use
751
-Thunderbird with Tor. However, there are plenty of application-level
752
-concerns, for example, by default Thunderbird will put your hostname in
753
-the outgoing mail that it sends. At some point we should start a new
754
-push to build a Thunderbird extension similar to Torbutton.
755
-</li>
756
-
757
-<li>
758
-<b>New Torbutton Features</b>
759
-<br />
760
-Priority: <i>Medium</i>
761
-<br />
762
-Effort Level: <i>High</i>
763
-<br />
764
-Skill Level: <i>High</i>
765
-<br />
766
-Likely Mentors: <i>Mike</i>
767
-<br/>
768
-There are several <a
769
-href="https://bugs.torproject.org/flyspray/index.php?tasks=all&amp;project=5&amp;type=2">good
770
-feature requests</a> on the Torbutton Flyspray section. In particular, <a
771
-href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=523">Integrating
772
-'New Identity' with Vidalia</a>,
773
-<a href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=940">ways of
774
-managing multiple cookie jars/identities</a>, <a
775
-href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=637">preserving
776
-specific cookies</a> when cookies are cleared,
777
-<a
778
-href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=524">better
779
-referrer spoofing</a>, <a
780
-href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=564">correct
781
-Tor status reporting</a>, and <a
782
-href="https://bugs.torproject.org/flyspray/index.php?do=details&amp;id=462">"tor://"
783
-and "tors://" urls</a> are all interesting
784
-features that could be added.
785
-<br />
786
-This work would be independent coding in Javascript and the fun world of <a
787
-href="http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul">XUL</a>,
788
-with not too much involvement in the Tor internals.
789
-</li>
790
-
939
+<!-- not really suited for GSoC; integrated into TBB for Linux/Mac OS X
791 940
 <li>
792 941
 <b>Usability testing of Tor</b>
793 942
 <br />
... ...
@@ -804,141 +953,7 @@ That would help a lot in knowing what needs to be done in terms of bug
804 953
 fixes or new features. We get this informally at the moment, but a more
805 954
 structured process would be better.
806 955
 </li>
807
-
808
-<li>
809
-<b>Translation wiki for our website</b>
810
-<br />
811
-Priority: <i>High</i>
812
-<br />
813
-Effort Level: <i>Medium</i>
814
-<br />
815
-Skill Level: <i>Medium</i>
816
-<br />
817
-Likely Mentors: <i>Jacob</i>
818
-<br />
819
-The Tor Project has been working over the past year to set up web-based
820
-tools to help volunteers translate our applications into other languages.
821
-We finally hit upon Pootle, and we have a fine web-based translation engine
822
-in place for Vidalia, Torbutton, and Torcheck. However, Pootle only
823
-translates strings that are in the "po" format, and our website uses wml
824
-files. This project is about finding a way to convert our wml files into po
825
-strings and back, so they can be handled by Pootle.
826
-</li>
827
-
828
-<li>
829
-<b>New Thandy Features</b>
830
-<br />
831
-Priority: <i>Medium</i>
832
-<br />
833
-Effort Level: <i>Medium</i>
834
-<br />
835
-Skill Level: <i>Medium to High</i>
836
-<br />
837
-Likely Mentors: <i>Martin</i>
838
-<br />
839
-Additional capabilities are needed for assisted updates of all the Tor
840
-related software for Windows and other operating systems. Some of the
841
-features to consider include:
842
-1) Integration of the <a
843
-href="http://chandlerproject.org/Projects/MeTooCrypto">MeTooCrypto
844
-Python library</a>
845
-for authenticated HTTPS downloads. 2) Adding a level of indirection
846
-between the timestamp signatures and the package files included in an
847
-update. See the "Thandy attacks / suggestions" thread on or-dev.
848
-3) Support locale specific installation and configuration of assisted
849
-updates based on preference, host, or user account language settings.
850
-Familiarity with Windows codepages, unicode, and other character sets
851
-is helpful in addition to general win32 and posix API experience and
852
-Python proficiency.
853
-</li>
854
-
855
-<li>
856
-<b>Intermediate Level Network Device Driver</b>
857
-<br />
858
-Priority: <i>Low</i>
859
-<br />
860
-Effort Level: <i>High</i>
861
-<br />
862
-Skill Level: <i>High</i>
863
-<br />
864
-Likely Mentors: <i>Martin</i>
865
-<br />
866
-The WinPCAP device driver used by Tor VM for bridged networking does
867
-not support a number of wireless and non-Ethernet network adapters.
868
-Implementation of a intermediate level network device driver for win32
869
-and 64bit would provide a way to intercept and route traffic over such
870
-networks. This project will require knowledge of and experience with
871
-Windows kernel device driver development and testing. Familiarity with
872
-Winsock and Qemu would also be helpful.
873
-</li>
874
-
875
-<li>
876
-<b>Tor Browser Bundle for Linux/Mac OS X</b>
877
-<br />
878
-Priority: <i>High</i>
879
-<br />
880
-Effort Level: <i>High</i>
881
-<br />
882
-Skill Level: <i>Medium</i>
883
-<br />
884
-Likely Mentors: <i>Steven</i>
885
-<br />
886
-The Tor Browser bundle incorporates Tor, Firefox, and the Vidalia user
887
-interface (and optionally Pidgin IM). Components are pre-configured to
888
-operate in a secure way, and it has very few dependencies on the
889
-installed operating system. It has therefore become one of the most
890
-easy to use, and popular, ways to use Tor on Windows.
891
-<br />
892
-However, there is currently no comparable package for Linux and Mac OS
893
-X, so this project would be to implement Tor Browser Bundle for these
894
-platforms. This will involve modifications to Vidalia (C++), possibly
895
-Firefox (C) then creating and testing the launcher on a range of
896
-operating system versions and configurations to verify portability.
897
-<br />
898
-Students should be familiar with application development on one or
899
-preferably both of Linux and Mac OS X, and be comfortable with C/C++
900
-and shell scripting.
901
-</li>
902
-
903
-<li>
904
-<b>Simulator for slow Internet connections</b>
905
-<br />
906
-Priority: <i>Medium</i>
907
-<br />
908
-Effort Level: <i>Medium</i>
909
-<br />
910
-Skill Level: <i>Medium</i>
911
-<br />
912
-Likely Mentors: <i>Steven</i>
913
-<br />
914
-Many users of Tor have poor-quality Internet connections, giving low
915
-bandwidth, high latency, and high packet loss/re-ordering. User
916
-experience is that Tor reacts badly to these conditions, but it is
917
-difficult to improve the situation without being able to repeat the
918
-problems in the lab.
919
-<br />
920
-This project would be to build a simulation environment which
921
-replicates the poor connectivity so that the effect on Tor performance
922
-can be measured. Other components would be a testing utility to
923
-establish what are the properties of connections available, and to
924
-measure the effect of performance-improving modifications to Tor.
925
-<br />
926
-The tools used would be up to the student, but dummynet (for FreeBSD)
927
-and nistnet (for Linux) are two potential components on which this
928
-project could be built. Students should be experienced with network
929
-programming/debugging and TCP/IP, and preferably familiar with C and a
930
-scripting language.
931
-</li>
932
-
933
-<li>
934
-<b>Bring up new ideas!</b>
935
-<br />
936
-Don't like any of these? Look at the <a
937
-href="<svnsandbox>doc/roadmaps/2008-12-19-roadmap-full.pdf">Tor development
938
-roadmap</a> for more ideas.
939
-Some of the <a href="<svnsandbox>doc/spec/proposals/">current proposals</a>
940
-might also be short on developers.
941
-</li>
956
+-->
942 957
 
943 958
 </ol>
944 959
 
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18524
2
+# Based-On-Revision: 19005
3 3
 # Last-Translator: mail (a.t) oliverknapp. de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Pressemitteilungen" CHARSET="UTF-8"
... ...
@@ -15,7 +15,7 @@
15 15
 
16 16
 <p><strong>DEDHAM,
17 17
  MA, USA</strong> - Das Tor Projekt hat seinen 3-Jahres Entwicklungsplan <a
18
-href="https://svn.torproject.org/svn/tor/trunk/doc/roadmaps/2008-12-19-roadmap-full.pdf">
18
+href="/press/presskit/2008-12-19-roadmap-full.pdf">
19 19
  3-Jahres Entwicklungsplan</a> veröffentlicht, welcher den Fokus insbesondere
20 20
 auf die Verbreitung von Anti-Zensur Werkzeugen und Diensten für die Stärkung
21 21
 der Freiheit des Internets in geschlossenen Gesellschaften richtet.</p>
... ...
@@ -1,5 +1,5 @@
1 1
 ## translation metadata
2
-# Based-On-Revision: 18245
2
+# Based-On-Revision: 19005
3 3
 # Last-Translator: mail (a.t) oliverknapp. de
4 4
 
5 5
 #include "head.wmi" TITLE="Tor: Presseinformationen" CHARSET="UTF-8"
... ...
@@ -19,11 +19,18 @@
19 19
   	 execdir@torproject.org
20 20
   	 +1-781-424-9877
21 21
   	 </address>
22
+  	 <hr />
23
+  	 <h3>Presse-Kit</h3>
24
+  	 <a href="/press/presskit/2009-General-Background-on-Tor-Project-Inc.pdf">Wer ist Tor? (Engl.)</a><br />
25
+  	 <a href="/press/presskit/2009-General-Online-Anonymity-with-Tor.pdf">Warum Anonymität im Internet? (Engl.)</a>
22 26
   	 </div>
23 27
 <!-- END SIDEBAR -->
24 28
 
25 29
 <ul>
26
-<li>19 Dezember 2008.  Tor veröffentlicht einen <a href="<page
30
+<li>12. März 2009. Tor startet den <a href="<page
31
+press/2009-03-12-performance-roadmap-press-release>">Plan und die Kampagne für
32
+Geschwindigkeitsverbesserungen</a>.</li>
33
+<li>19. Dezember 2008.  Tor veröffentlicht einen <a href="<page
27 34
 press/2008-12-19-roadmap-press-release>">3-Jahres-Entwicklungsplan</a>.</li>
28 35
 </ul>
29 36
 
... ...
@@ -1,6 +1,6 @@
1 1
 ## translation metadata
2 2
 # Based-On-Revision: 15880
3
-#Last-Translator: jens@kubieziel.de
3
+#Last-Translator: jens§kubieziel.de, mail?oliverknapp.de
4 4
 
5 5
 #include "head.wmi" TITLE="Projektseite von Tor" CHARSET="UTF-8"
6 6
 
... ...
@@ -16,6 +16,7 @@
16 16
   versteckten Dienste</a></li>
17 17
 <li>NLnet <a href="<page projects/lowbandwidth>">Tor für Programme mit niedriger Bandbreite</a></li>
18 18
 <li>Google <a href="<page projects/google>">Auto-update für Tor</a></li>
19
+<li><a href="<page projects/metrics>">Das Projekt zum Finden von Maßstäben: Ausmessen des Tor Netzwerks</a></li>
19 20
 </ul>
20 21
 
21 22
 </div><!-- #main -->
22 23