Yes, if the “category” and “last edited” parts can be removed or hidden too, that would be a bonus. That information is always available in the special:special pages area anyhow (from memory) and I believe the “page history” button on each individual page.
“Daniel Alverson” has attempted to add himself as a past contributor again. Probably a legitimate person, so before you reject it, maybe you should make a forum post asking that person to contact or post in the forums re: their (previous) handle to confirm they actually made these contrbutions.
We don’t want to fail to acknowledge people’s contributions if they did actually undertake those activities.
On a side issue - I wonder how Google Project Zero decides what to audit - their FAQ does focus on common software libraries, browsers etc, but their recent focus on Tor (which found 3 CVEs), makes me wonder if they’d ever look at little ole Whonix if a friendly email was dropped their way.
If anyone was to find major flaws, it would be that team. They have ripped apart M’soft, iOS, various browsers, Xen, the Linux kernel and various software apps in their history. I think they found 1,700+ bugs to date.
Since Whonix has never had a formal audit, experienced eyes over sdwdate and other Whonix packages would be very welcome. If Whonix is a high profile target (possible), you can be guaranteed any serious adversaries would have likely found flaws despite it’s relatively “simple” design/status.
It’s not completely out of the question; the team members get 20% of their paid time to work on pet topics/issues of their choice. Maybe one of them has an anonymity software bent.
Formed in 2014, Project Zero is a team of security researchers at Google who study zero-day vulnerabilities in the hardware and software systems that are depended upon by users around the world. Our mission is to make the discovery and exploitation of security vulnerabilities more difficult, and to significantly improve the safety and security of the Internet for everyone.
I added that - not time-consuming IMO. Just needs keeping up with Tor blog posts (which I do already) when they mention it again in the future.
It also answers questions from anybody who talks about not being able to access Tor without bridges - the reason is their location is using active probing (probably), whch means their only hope is using obfs4 or other protocols.
To not delay further the publishing of your material, having looked at pages that have Creative Common-licensed material on the Internet, I believe all you have to do is the following:
Add this as a footer on relevant pages on your website: Creative Commons 4.0 Attribution International License.
Would I have to put it in all pages or could I just add some text in the about section of the home page to say that everything on the site is licensed under it? My website doesn’t really have a footer and I don’t want it to look out of place.
Also, I’ve overhauled most of my articles now, primarily the Linux and Firefox ones.
A non-default, opt-in is copyrighted and licensed under […].
So yeah, it needs to be on every page. [1]
That’s why Linux uses the SPDX license identifier for every source file.
[1] You could also add the licensing as a [HTML] comment (SPDX?) on top of every source file?
[1] Quote GPLv2 license:
(File /usr/share/common-licenses/GPL-2 on Debian systems.)
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
convey the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.