Wikipedia:Administrators' newsletter/2019/1
News and updates for administrators from the past month (December 2018).
- There are a number of new or changed WP:CSD#G6:
- db-disambig}}; the text is unchanged and candidates may be found in Category:Candidates for speedy deletion as unnecessary disambiguation pages.
- db-redircom}}; the text is unchanged.
- db-blankdraft}}.
- The Wikimedia Foundation two-factor authentication.
- Members of the Bot Approvals Group (BAG) are now subject to an activity requirement. After two years without any bot-related activity (e.g. operating a bot, posting on a bot-related talk page), BAG members will be retired from BAG following a one-week notice.
- There are a number of new or changed
- Starting on December 13, the Wikimedia Foundation security team implemented new password policy and requirements. Privileged accounts (administrators, bureaucrats, checkusers, oversighters, interface administrators, bots, edit filter managers/helpers, template editors, et al.) must have a password at least 10 characters in length. All accounts must have a password:
- At least 8 characters in length
- Not in the 100,000 most popular passwords (defined by the Password Blacklist library)
- Different from their username
- User accounts not meeting these requirements will be prompted to update their password accordingly. More information is available on MediaWiki.org.
- Blocked administrators may now block the administrator that blocked them. This was done to mitigate the possibility that a compromised administrator account would block all other active administrators, complementing the removal of the ability to unblock oneself outside of self-imposed blocks. A request for comment is currently in progress to determine whether the blocking policy should be updated regarding this change.
- {{RevDelcheckboxes already filled in.
- Following the 2018 Arbitration Committee elections, the following editors have been appointed to the Arbitration Committee: AGK, Courcelles, GorillaWarfare, Joe Roe, Mkdw, SilkTork.
- Accounts continue to be compromised on a regular basis. Evidence shows this is entirely due to the accounts having the same password that was used on another website that suffered a data breach. If you have ever used your current password on any other website, you should change it immediately.
- Around 22% of admins have enabled doing so. Regardless of whether you use 2FA, please practice appropriate account security by ensuring your password is secureand unique to Wikimedia.
Archives |
---|
2017: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2018: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2019: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2020: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2021: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2022: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2023: 01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12 |
2024: 01, 02, 03, 04 |