Re: [Wikitech-l] Sane versioning for core (was: Re: Fwd: No more Architecture Committee?)

2015-01-25 Thread Zack Weinberg
On Sun, Jan 25, 2015 at 1:27 PM, Legoktm legoktm.wikipe...@gmail.com wrote: On 01/15/2015 08:26 PM, Chad wrote: I've been saying for over a year now we should just drop the 1. from the 1.x.y release versions. So the next release would be 25.0, 26.0, etc etc. -1 from me, for what little that's

Re: [Wikitech-l] Feature request.

2014-11-16 Thread Zack Weinberg
On Sun, Nov 16, 2014 at 7:27 PM, svetlana svetl...@fastmail.com.au wrote: On the second edit conflict, I read the message at the page top. It says: Someone else has changed this page since you started editing it. The upper text area contains the page text as it currently exists. **Your

Re: [Wikitech-l] Changing edit token length

2014-10-20 Thread Zack Weinberg
On Mon, Oct 20, 2014 at 1:38 PM, Chris Steipp cste...@wikimedia.org wrote: * Tokens can be time limited. By default they won't be, but this puts the plumbing in place if it makes sense to do that on any token checks in the future. * The tokens returned in a request will change on each request.

Re: [Wikitech-l] Changing edit token length

2014-10-20 Thread Zack Weinberg
On Mon, Oct 20, 2014 at 3:34 PM, Chris Steipp cste...@wikimedia.org wrote: On Mon, Oct 20, 2014 at 11:00 AM, Zack Weinberg za...@cmu.edu wrote: 1) Since this is changing anyway, it would be a good time to make the token size and structure independent of whether the user is logged

Re: [Wikitech-l] Making a plain MW core git clone not be installable

2014-06-11 Thread Zack Weinberg
On Wed, Jun 11, 2014 at 10:58 AM, Tyler Romeo tylerro...@gmail.com wrote: On Wed, Jun 11, 2014 at 10:56 AM, Brad Jorsch (Anomie) bjor...@wikimedia.org wrote: ... That's just awful. How so? Well, it makes *me* wince because you're directing people to pull code over the network and feed it

Re: [Wikitech-l] Making a plain MW core git clone not be installable

2014-06-11 Thread Zack Weinberg
On Wed, Jun 11, 2014 at 11:21 AM, Tyler Romeo tylerro...@gmail.com wrote: It's over HTTPS. As long as you trust that getcomposer.org is the domain you are looking for, this is really no different than installing via a package manager. Nothing stops you from installing it over insecure HTTP.

[Wikitech-l] Hardening WP/WM against traffic analysis (take two)

2014-06-05 Thread Zack Weinberg
I'd like to restart the conversation about hardening Wikipedia (or possibly Wikimedia in general) against traffic analysis. I brought this up ... last November, I think, give or take a month? but it got lost in a larger discussion about HTTPS. For background, the type of attack that it would be

Re: [Wikitech-l] Forget mailing lists and on-wiki discussions; Twitter's the place!

2014-04-06 Thread Zack Weinberg
On Sun, Apr 6, 2014 at 8:39 PM, Steven Walling steven.wall...@gmail.com wrote: I too was surprised at how many users are A) on XP with ClearType off, which is the default there or B) turn font smoothing off intentionally. I have no comment on any of the rest of this, but with my Firefox dev

Re: [Wikitech-l] Jake requests enabling access and edit access to Wikipedia via TOR

2014-01-13 Thread Zack Weinberg
On Sun, Jan 12, 2014 at 11:46 PM, Gryllida gryll...@fastmail.fm wrote: On Mon, 13 Jan 2014, at 15:29, Gregory Maxwell wrote: What freenode does is not functionally useful for Tor users. In my first hand experience it manages to enable abusive activity while simultaneously eliminating Tor's

Re: [Wikitech-l] Jake requests enabling access and edit access to Wikipedia via TOR

2014-01-13 Thread Zack Weinberg
On Mon, Jan 13, 2014 at 11:43 AM, Marc A. Pelletier m...@uberbox.org wrote: On 01/13/2014 11:32 AM, Zack Weinberg wrote: Assume a person under continual surveillance. If they have to reveal their true IP address to Wikipedia in order to register their editor account, the adversary will learn

Re: [Wikitech-l] Jake requests enabling access and edit access to Wikipedia via TOR

2014-01-13 Thread Zack Weinberg
On Mon, Jan 13, 2014 at 2:51 PM, Gryllida gryll...@fastmail.fm wrote: On Tue, 14 Jan 2014, at 3:32, Zack Weinberg wrote: I rather think it does. Assume a person under continual surveillance. If they have to reveal their true IP address to Wikipedia in order to register their editor account

Re: [Wikitech-l] $wgRedactedFunctionArguments

2013-10-29 Thread Zack Weinberg
On Tue, Oct 29, 2013 at 9:55 AM, Dan Andreescu dandree...@wikimedia.org wrote: I think Ori's original point stands though. Configuration could be used to redact fully / not redact at all for local debugging purposes. But a black list for what to redact is bad for all the reasons black lists

[Wikitech-l] Wikimedia's anti-surveillance plans

2013-08-18 Thread Zack Weinberg
Hi, I'm a grad student at CMU studying network security in general and censorship / surveillance resistance in particular. I also used to work for Mozilla, some of you may remember me in that capacity. My friend Sumana Harihareswara asked me to comment on Wikimedia's plans for hardening the

Re: [Wikitech-l] Wikimedia's anti-surveillance plans

2013-08-18 Thread Zack Weinberg
On 2013-08-18 1:04 PM, Bjoern Hoehrmann wrote: an elision mark that does not explain itself. Makes you come across as hit send too early. My email client appears to have decided to post an early draft of the messages I sent on Friday. Sorry about that. Please ignore. For the record, I

[Wikitech-l] Wikimedia's anti-surveillance plans: site hardening

2013-08-16 Thread Zack Weinberg
Hi, I'm a grad student at CMU studying network security in general and censorship / surveillance resistance in particular. I also used to work for Mozilla, some of you may remember me in that capacity. My friend Sumana Harihareswara asked me to comment on Wikimedia's plans for hardening the

[Wikitech-l] Wikimedia's anti-surveillance plans: traffic analysis resistance

2013-08-16 Thread Zack Weinberg
(Please see the thread titled Wikimedia's anti-surveillance plans: site hardening for who I am and some general context.) Once Wikipedia is up to snuff with all the site-hardening I recommended in the other thread, there remain two significant information leaks (and probably others, but these