[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r9825: link to the wiki gsoc blurb. plus add another pony. (website/trunk/en)



Author: arma
Date: 2007-03-15 07:54:42 -0400 (Thu, 15 Mar 2007)
New Revision: 9825

Modified:
   website/trunk/en/volunteer.wml
Log:
link to the wiki gsoc blurb.
plus add another pony.


Modified: website/trunk/en/volunteer.wml
===================================================================
--- website/trunk/en/volunteer.wml	2007-03-15 07:26:11 UTC (rev 9824)
+++ website/trunk/en/volunteer.wml	2007-03-15 11:54:42 UTC (rev 9825)
@@ -103,16 +103,18 @@
 
 <a id="Coding"></a>
 <h2><a class="anchor" href="#Coding">Coding and Design</a></h2>
-<p>Want to spend your Google Summer of Code working on Tor? Great. More
-details coming soon. In the mean time, see if any of these ideas catch
+<p>Want to spend your <a href="http://code.google.com/soc/";>Google Summer
+of Code</a> working on Tor? Great.
+<a href="http://wiki.noreply.org/noreply/TheOnionRouter/SummerOfCode";>Read
+more about Tor and GSoC</a>, and see if any of the below ideas catch
 your eye.</p>
 <ol>
 <li>Tor servers don't work well on Windows XP. On
-Windows, Tor uses the standard <tt>select</tt> system
+Windows, Tor uses the standard <tt>select()</tt> system
 call, which uses space in the non-page pool. This means
 that a medium sized Tor server will empty the non-page pool, <a
 href="http://wiki.noreply.org/noreply/TheOnionRouter/WindowsBufferProblems";>causing
-havoc and crashes</a>. We should probably be using overlapped IO
+havoc and system crashes</a>. We should probably be using overlapped IO
 instead. One solution would be to teach libevent how to use overlapped IO
 rather than select() on Windows, and then adapt Tor to the new libevent
 interface.</li>
@@ -144,11 +146,14 @@
 lot of the hard part here is deciding what configurations are secure,
 documentating these decisions, and making something that is easy to
 maintain going forward.</li>
+<li>Our preferred graphical front-end for Tor, named
+<a href="http://vidalia-project.net/";>Vidalia</a>, needs all sorts
+of development work.</li>
 <li>We need to actually start building our <a href="<page
 documentation>#DesignDoc">blocking-resistance design</a>. This involves
-fleshing out the design, modifying many different pieces of Tor, working
-on a <a href="http://vidalia-project.net/";>GUI</a> that's intuitive,
-and planning for deployment.</li>
+fleshing out the design, modifying many different pieces of Tor, adapting
+<a href="http://vidalia-project.net/";>Vidalia</a> so it supports the
+new features, and planning for deployment.</li>
 <li>We need a flexible simulator framework for studying end-to-end
 traffic confirmation attacks. Many researchers have whipped up ad hoc
 simulators to support their intuition either that the attacks work
@@ -208,6 +213,8 @@
 <li>We're not that far from having IPv6 support for destination addresses
 (at exit nodes). If you care strongly about IPv6, that's probably the
 first place to start.</li>
+<li><i>Don't see your idea here? We probably need it anyway! Contact
+us and find out.</i></li>
 </ol>
 
 <a id="Research"></a>