## translation metadata
# Revision: $Revision$
# Translation-Priority: 3-low

#include "head.wmi" TITLE="Tor in the Media"
<div id="content" class="clearfix">
  <div id="breadcrumbs">
    <a href="<page index>">Home &raquo; </a>
    <a href="<page press/press>">Press &raquo; </a>
    <a href="<page press/inthemedia>">Tor in the Media</a>
  </div>
  <div id="maincol">
    <!-- PUT CONTENT AFTER THIS TAG -->

<h1>Media Appearances</h1>

<p>Major news organizations including the New York Times, Forbes, Al
Jazeera, Washington Post, Le Monde, NPR, BBC, and more have sought out or
quoted Tor Project members due to their expertise on anonymity, privacy,
and Internet censorship issues.</p>
<p>Since Tor is widely used throughout the world, it is mentioned
regularly in the press.  This list is not comprehensive, but illustrates
some of the significant Tor-related stories that have popped up.</p>
<p>A sample of such media appearances and mentions is below in order of
newest to oldest: </p>

<table width="100%" cellpadding="3" cellspacing="0">
<thead style="background-color: #e5e5e5;">
<tr>
<th width="10%">Date</th>
<th width="15%">Publication</th>
<th>Topic</th>
</tr>
</thead>
<tr>
<td>2012 Oct</td>
<td>Delta Airlines Sky Magazine</td>
<td><a
href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-
Sight.aspx">Hidden in Plain Sight</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Sep 19</td>
<td>infoBAE</td>
<td><a href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en-la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la web 100% anónimas y seguras</a></td>
</td>
<tr>
<td>2012 Aug 24</td>
<td>security.nl</td>
<td><a href="https://secure.security.nl/artikel/42807/1/Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar Facebook ondanks privacyrisico</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Jul 19</td>
<td>Philadelphia Inquirer</td>
<td><a href="http://www.philly.com/philly/business/20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life: Fostering anonymity online</a></td>
</tr>
<tr>
<td>2012 Jul 13</td>
<td>NATO</td>
<td><a href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-during-the-arab-spring/">Social Media and Online Anonymity during the Arab Spring</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Jun 19</td>
<td>Nieman Journalism Lab</td>
<td><a href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists-and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project helps journalists and whistleblowers go online without leaving a trace.</a></td>
</tr>
<tr>
<td>2012 Jun 18</td>
<td>Poynter</td>
<td><a href="http://www.poynter.org/latest-news/top-stories/177642/news-challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6 projects focused on networks</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Jun 18</td>
<td>Knight Foundation</td>
<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight Foundation funds project to protect journalists and their sources worldwide by providing them with a toolkit to preserve their anonymity online.</td>
</tr>
<tr>
<td>2012 Jun 15</td>
<td>BBC</td>
<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia clamps down on Skype and other internet use on Tor</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Apr 30</td>
<td>Forbes</td>
<td><a href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-projects-new-tool-aims-to-map-out-internet-censorship/">The Tor Project's New Tool Aims To Map Out Internet Censorship</a></td>
</tr>
<tr>
<td>2012 Apr 20</td>
<td>The Guardian</td>
<td><a href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-battle-internet">Hacktivists in the frontline battle for the internet</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Apr 19</td>
<td>The Guardian</td>
<td><a href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-authenticity-anonymity">Online identity: is authenticity or anonymity more important?</td>
</tr>
<tr>
<td>2012 Apr 03</td>
<td>V3</td>
<td><a href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover-key-chinas-tor-blocking">Swedish researchers uncover key to China's Tor-blocking system</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Apr 02</td>
<td>The Guardian</td>
<td><a href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-warn-government-email-surveillance">Internet companies warn over government email surveillance plans</a></td>
</td>
<tr>
<td>2012 Mar 22</td>
<td>Reuters</td>
<td><a href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on citizens</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Mar 08</td>
<td>Boston Globe</td>
<td><a href="http://articles.boston.com/2012-03-08/business/31136655_1_law-enforcement-free-speech-technology">Privacy software. Unintended consequences of Walpole firm's technology.</a></td>
</tr>
<tr>
<td>2012 Mar 02</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">Google's new privacy policy: what has changed and what you can do about it</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Mar 01</td>
<td>Edmonton Journal</td>
<td><a href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-with-tor/">Get your privacy on with Tor</a></td>
</tr>
<tr>
<td>2012 Feb 28</td>
<td>PC World</td>
<td><a href="https://www.pcworld.com/article/250943/https_everywhere_update_now_reports_website_weaknesses.html">HTTPS Everywhere Update: Now Reports Website Weaknesses</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Feb 27</td>
<td>GigaOM</td>
<td><a href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td>
</tr>
<tr>
<td>2012 Feb 15</td>
<td>Le Monde</td>
<td><a href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un nouvel outil contre la cybercensure testé en Iran</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Feb 13</td>
<td>IDG NL webwereld</td>
<td><a href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td>
</tr>
<tr>
<td>2012 Feb 13</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-project-helps-iran-get-back-online-amidst-internet-censorship-regime.ars">Tor's latest project helps Iran get back online despite new Internet censorship regime</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Feb 13</td>
<td>Radio Farda</td>
<td><a href="http://www.radiofarda.com/content/f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">«تور» با پروژه‌ای جدید به جنگ فیلترینگ در ایران می‌رود "</a></td>
</td>
</tr>
<tr>
<td>2012 Feb 11</td>
<td>ITP</td>
<td><a href="http://www.itp.net/587901-iran-increases-web-censorship">Iran increases web censorship</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Feb 10</td>
<td>CNet News</td>
<td><a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project looks to help Iranians sidestep Net ban</a></td>
</tr>
<tr>
<td>2012 Feb 10</td>
<td>Linkiesta</td>
<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i dissidenti in Internet, la guerra in Iran è già iniziata</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Feb 10</td>
<td>Forbes</td>
<td><a href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-online-tor-tests-undetectable-encrypted-connections/">As Iran Cracks Down Online, Tor Tests Undetectable Encrypted Connections</a></td>
</tr>
<tr>
<td>2012 Jan 24</td>
<td>PC Pro UK</td>
<td><a href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of-tor-censorship">O2 plays down accusations of Tor censorship</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Jan 24</td>
<td>Broadband Choice UK</td>
<td><a href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-providers-are-blocking-tor-801273330/">ORG says mobile broadband providers are blocking Tor</a></td>
</td>
<tr>
<td>2012 Jan 24</td>
<td>PC Welt</td>
<td><a href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in-neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Dec 30</td>
<td>BNR Digital</td>
<td><a href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder Tor wordt gecensureerd</a></td>
</tr>
<tr>
<td>2011 Dec 30</td>
<td>Deutsche Welle</td>
<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit dem Zensor Katz-und-Maus spielen</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Dec 29</td>
<td>Boing Boing</td>
<td><a href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.html">State of the arms race between repressive governments and anti-censorship/surveillance Tor technology (and why American companies are on the repressive governments' side)</a></td>
</tr>
<tr>
<td>2011 Dec 28</td>
<td>ZDNet Asia</td>
<td><a href="http://www.zdnetasia.com/tor-project-creates-safer-internet-62303332.htm">Tor Project creates safer Internet</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Dec 01</td>
<td>itbusiness.ca</td>
<td><a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">Convenience technology threatening personal privacy, experts say</a></td>
</tr>
<tr>
<td>2011 Nov 21</td>
<td>Spiegel Online</td>
<td><a href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas Internet-Zensoren testen neue Filter</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Nov 20</td>
<td>China Digital Times</td>
<td><a href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/">Government Blocks Encrypted Tunnels Through Great Firewall; Fang Binxing Talks Internet Sovereignty</a></td>
</tr>
<tr>
<td>2011 Nov 23</td>
<td>IT Security Belgium</td>
<td><a href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-service">Tor Project is tapping Amazon’s EC2 cloud service</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Nov 22</td>
<td>Boing Boing</td>
<td><a href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.html">Tor project asks supporters to set up virtual Tor bridges in Amazon's cloud</a></td>
</tr>
<tr>
<td>2011 Nov 18</td>
<td>Dagens IT</td>
<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i den kinesiske internett-muren</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Nov 16</td>
<td>Forbes</td>
<td><a href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great Firewall Tests Mysterious Scans On Encrypted Connections</a></td>
</tr>
<tr>
<td>2011 Nov 15</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself privacy bridge in Amazon cloud</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 Aug 22</td>
<td>VOA News: Asia</td>
<td><a
href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-for-Now-128178623.html">Some
Chinese Surf Freely, for Now</a></td>
</tr>
<tr>
<td>2011 Aug 01</td>
<td>Peace &amp; Conflict Review</td>
<td><a
href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor,
Anonymity, and the Arab Spring: An Interview with Jacob
Appelbaum</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 June 18</td>
<td>CNN: Tech</td>
<td><a
href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.revolution/index.html">Starting
a revolution with technology</a></td>
</tr>
<tr>
<td>2011 June 12</td>
<td>CNN: Tech</td>
<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/index.html">Wiping
away whistle-blowers' online fingerprints</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 May 14</td>
<td>BBC: Click</td>
<td><a href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">Andrew
and Dr. Angela Sasse from UCL were interviewed by the BBC Click program
about why Internet Anonymity is important and valuable in a modern,
networked society.</a></td>
</tr>
<tr>
<td>2011 March 29</td>
<td>CNN: Situation Room</td>
<td><a href="http://edition.cnn.com/CNN/Programs/situation.room/">Tor
featured in a segment about US companies providing censorship to
repressive regimes and those circumventing their products.</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 March 18</td>
<td>Telegraph</td>
<td><a
href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/Iran-cracks-down-on-web-dissident-technology.html">Iran
cracks down on web dissident technology</a></td>
</tr>
<tr>
<td>2011 March 17</td>
<td>BusinessWeek</td>
<td><a
href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.htm">Social
Networking: Fighting to Remain Anonymous</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 March 10</td>
<td>NyTeknik</td>
<td><a
href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.ece">Svenska
biståndspengar till Facebookrevolutionen</a></td>
</tr>
<tr>
<td>2011 March 09</td>
<td>Washington Post</td>
<td><a
href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/AR2011030905157_pf.html">U.S.
funding tech firms that help Mideast dissidents evade government
censors</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 February 17</td>
<td>Walpole Times</td>
<td><a
href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-protests">Tor
Project, a Walpole-based company, helps Egyptians avoid Internet censorship during protests</a></td>
</tr>
<tr>
<td>2011 January 31</td>
<td>NPR: WBUR</td>
<td><a
href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">Here
&amp; Now: U.S. Activists Help Egyptian Protesters Elude Government
Censorship Online</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 February 01</td>
<td>Discovery News</td>
<td><a href="http://news.discovery.com/tech/egypt-internet-online-protesters-110201.html">Egypt's
Internet Block Incomplete But Damaging</a></td>
</tr>
<tr>
<td>2011 January 31</td>
<td>IDG Poland</td>
<td><a
href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.szukaja.alternatyw.html">Egipt
blokuje Internet, aktywiści szukają alternatyw</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 January 31</td>
<td>New Scientist</td>
<td><a
href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains-officially-offli.html">How
Egypt is getting online</a></td>
</tr>
<tr>
<td>2011 January 31</td>
<td>El Pais</td>
<td><a
href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe/fax/elpepuint/20110130elpepuint_14/Tes">Sortear
la censura a golpe de fax</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 January 30</td>
<td>Fox 25 News - Boston</td>
<td><a
href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give-egyptians-internet-access-20110130">Local
company helps give Egyptians internet access</a></td>
</tr>
<tr>
<td>2011 January 30</td>
<td>New England Cable News</td>
<td><a
href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-onlin/landing.html?blockID=400628&feedID=4213">Mass.
company helps activists avoid online government censorship</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 January 30</td>
<td>Boston Globe</td>
<td><a
href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30/mass_groups_software_helps_avoid_censorship/">Foreign
activists stay covered online</a></td>
</tr>
<tr>
<td>2011 January 29</td>
<td>SvD.se</td>
<td><a
href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-natdissidenter_5902693.svd">Tor
öppnar dörrar för nätdissidenter</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2011 January 29</td>
<td>ComputerWorld</td>
<td><a
href="http://www.computerworld.com/s/article/9207058/Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">Without
Internet, Egyptians find new ways to get online.</a></td>
</tr>
<tr>
<td>2011 January 28</td>
<td>Globe and Mail</td>
<td><a
href="https://www.theglobeandmail.com/news/technology/in-a-span-of-minutes-a-country-goes-offline/article1887207/">In
a span of minutes, a country goes offline</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2010 December 22</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/web/26981/">Home Internet
with Anonymity Built In</a></td>
</tr>
<tr>
<td>2010 December 17</td>
<td>New York Times Magazine</td>
<td><a
href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">Granting
Anonymity</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2010 November 03</td>
<td>metro sverige</td>
<td><a
href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2010 Sept 17</td>
<td>NPR: On the media</td>
<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
Media: Interview with Jacob Appelbaum</a>.</td>
</tr>
<tr>
<td>2010 August 01</td>
<td>PC Format - Poland</td>
<td><a
href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
and Facebook are spying on us</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2010 July 14</td>
<td>China Rights Forum</td>
<td><a
href="http://www.hrichina.org/public/contents/category?cid=175033">China
Rights Forum, No. 2 - “China’s Internet”: Staking Digital
Ground</a></td>
</tr>
<tr>
<td>2010 May 25</td>
<td>The Australian</td>
<td><a
href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466">
Call to join Tor network to fight censorship</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2010 Mar 17</td>
<td>PC World Poland</td>
<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity
in the Web</a></td>
</tr>
<tr>
<td>2010 Mar 11</td>
<td>ABC Australia</td>
<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense:  The Deep Web</a></td>
</tr>
<tr>
<td>2010 Mar 09</td>
<td>PC Pro UK</td>
<td><a
href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">The dark
side of the web</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Dec 29</td>
<td>Times Online</td>
<td><a
href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.ece">When
Iran’s regime falls this will be remembered as the YouTube revolution </a></td>
</tr>
<tr>
<td>2009 Oct 15</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down
on Tor Anonymity Network</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Sep 30</td>
<td>BusinessWeek</td>
<td><a
href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
</tr>
<tr>
<td>2009 Aug 19</td>
<td>Reuters</td>
<td><a
href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?pageNumber=1&amp;virtualBrandChannel=0&amp;sp=true">Web tools help protect human
rights activists</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Aug 10</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How
to Build Anonymity Into the Internet</a></td>
</tr>
<tr>
<td>2009 Jul 26</td>
<td>Washington Times</td>
<td><a
href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jul 26</td>
<td>Boston Globe</td>
<td><a
href="http://www.boston.com/news/nation/washington/articles/2009/07/26/us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed
at Iranians</a></td>
</tr>
<tr>
<td>2009 Jul 24</td>
<td>Associated Press</td>
<td><a
href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude crackdown on
Internet</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jul 08</td>
<td>Tehran Bureau</td>
<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
Around the Globe Rally to Help Iranians Online</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jul 02</td>
<td>NED/CIMA</td>
<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td>
</tr>
<tr>
<td>2009 Jun 26</td>
<td>Washington Times</td>
<td><a
href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid
censorship with Navy technology</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jun 29</td>
<td>EFF</td>
<td><a
href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor Relay</a></td>
</tr>
<tr>
<td>2009 Jun 24</td>
<td>Daily Finance</td>
<td><a
href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-controversy/">Nokia and Siemens in Iran controversy</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jun 18</td>
<td>Wall Street Journal</td>
<td><a
href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
</tr>
<tr>
<td>2009 Jun 19</td>
<td>O'Reilly Radar</td>
<td><a
href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">
Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project
and the EFF</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jun 18</td>
<td>Deutsche Welle</td>
<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet
proxies let Iranians and others connect to blocked Web sites</a></td>
</tr>
<tr>
<td>2009 Jun 18</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the
Republic of Iran</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Jun 17</td>
<td>CNet News</td>
<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find
ways to bypass Net censors</a></td>
</tr>
<tr>
<td>2009 Jun 17</td>
<td>ComputerWorld</td>
<td><a
href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9134471&amp;intsrc=news_ts_head">Iran's leaders fight Internet;
Internet wins (so far)</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 May 29</td>
<td>Le Monde</td>
<td><a
href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
</tr>
<tr>
<td>2009 May 15</td>
<td>Mass High Tech</td>
<td><a
href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net privacy</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 May 01</td>
<td>New York Times</td>
<td><a
href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and
Others Outwit Net Censors</a></td>
</tr>
<tr>
<td>2009 Apr 23</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made
Safer:  How anonymity technology could save free speech on the
Internet.</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Apr 22</td>
<td>Le Monde</td>
<td><a
href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</a></td>
</tr>
<tr>
<td>2009 Apr 06</td>
<td>Reader's Digest</td>
<td><a
href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">How to Hide Anything</a></td>
</tr>
<tr>
<td>2009 Apr 06</td>
<td>Al Jazeera</td>
<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
Voices showcases Tor</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Mar 18</td>
<td>Marie Claire</td>
<td><a
href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td>
</tr>
<tr>
<td>2009 Mar 13</td>
<td>Wall Street Journal</td>
<td><a
href="http://online.wsj.com/article/SB123567809587886053.html">The
Kindness of Strangers</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Mar 12</td>
<td>BBC World Service</td>
<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about Tor and Censorship</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2009 Mar 03</td>
<td>Orf Austria</td>
<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER
column</a></td>
</tr>
<tr>
<td>2009 Feb 18</td>
<td>Bangkok Post</td>
<td><a
href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine">The old fake "404 not found" routine</a></td>
</tr>
<tr>
<td>2009 Feb 13</td>
<td>Hearsay Culture</td>
<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Dec 29</td>
<td>nu.nl</td>
<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td>
</tr>
<tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Dec 14</td>
<td>PC Magazine: Middle &amp; Near East</td>
<td><a
href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To
Reclaim Your Online Privacy</a></td>
</tr>
<tr>
<td>2008 Aug 21</td>
<td>CNN</td>
<td><a
href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts:
Internet filtering and censorship rife</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Aug 22</td>
<td>The Sydney Morning Herald</td>
<td><a
href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The
China Syndrome</a></td>
</tr>
<tr>
<td>2008 Aug 20</td>
<td>Scientific American</td>
<td><a
href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography:
How to Keep Your Secrets Safe</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Aug 05</td>
<td>Guardian UK</td>
<td><a
href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">
Vaulting
the great firewall</a></td>
</tr>
<tr>
<td>2008 Aug 10</td>
<td>Tech Radar UK</td>
<td><a
href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom
Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing
for the paranoid</a>
</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Aug 07</td>
<td>Spiegel</td>
<td><a
href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks
gegen Zensur und Überwachung</a>
</td>
</tr>
<tr>
<td>2008 Aug 07</td>
<td>PC World</td>
<td><a
href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15
Great, Free Privacy Downloads</a>.  Tor is Number 1.
</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Aug 07</td>
<td>The Guardian UK</td>
<td><a
href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos
aims to crack China's wall</a>
</td>
</tr>
<tr>
<td>2008 Aug 07</td>
<td>The Register UK</td>
<td><a
href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German
hackers poke hole in great firewall of China</a>
</td>
</tr>
<tr>
<td>2008 May 24</td>
<td>Groupo Estado</td>
<td><a
href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&amp;more=1&amp;c=1&amp;tb=1&amp;pb=1&amp;cat=525">Interview
at Computers, Freedom, and Privacy 2008 Conference</a>
</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Mar 12</td>
<td>SearchSecurity.com</td>
<td><a
href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">
Tor network 'bridges' help evade blockers</a>.
Covers new Tor features designed to overcome filtering and blocking that prevent
access
to the Tor network.
</td>
</tr>
<tr>
<td>2008 Feb 14</td>
<td>Wired: Compiler Blog</td>
<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2008 Feb 01</td>
<td>PC World</td>
<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
Hackers Can Expose Masked Surfers, Study Says</a>
A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
Steven Murdoch's recent PhD thesis</a>. Steven <a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
responds on the Tor Blog</a>.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2007 Sep 21</td>
<td>Wired HowTo Blog</td>
<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.</td>
</tr>
<tr>
<td>2007 Sep 16</td>
<td>Cnet</td>
<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>.  We have an <a href="<page docs/faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2007 Sep 10</td>
<td>Wired</td>
<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information.  Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption.  Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#
contentSwap2">The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.  In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.</td>
</tr>
<tr>
<td>2007 Jul 27</td>
<td>Wired Blog</td>
<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br/> A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply at the bottom of the article.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2007 Jun 22</td>
<td>Bangkok Post</td>
<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.</td>
</tr>
<tr>
<td>2007 Mar 15</td>
<td>World Changing</td>
<td><a href="http://www.worldchanging.com/archives/006309.html"> Blogging Where Speech Isn’t Free</a><br/> Coverage of former Tor Executive Director Shava Nerad's participation at an <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&amp;id=IAP060124"> SXSW panel</a>, where she explained how Tor can help bloggers.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2007 Mar 8</td>
<td>Security Focus</td>
<td><a href="http://www.securityfocus.com/news/11447/1"> Tor hack proposed to catch criminals</a>.  Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the Tor Project illustrating why this approach may not be a good idea.</td>
</tr>
<tr>
<td>2007 Feb 1</td>
<td>Dr Dobb's</td>
<td><a href="http://www.ddj.com/security/197002414"> Tor Project Protects Anonymous Sources</a>.  An introduction to Tor, including technical and historical background. </td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Oct 19</td>
<td>Wired Threat Level</td>
<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> The Onion Router (TOR) is Leaky (Leeky)</a>.  Explains why you need something like Privoxy in addition to the core Tor code to ensure your anonymity. If you use the Vidalia bundle, it installs and configures Privoxy automatically, but it can't hurt to understand why it is necessary.</td>
</tr>
<tr>
<td>2006 Aug 18</td>
<td>NPR</td>
<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Tips for Protecting Privacy Online</a>.  Kevin Bankston of the EFF recommends Tor during an NPR interview.  Tor information begins at 8:15 into the program.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Jul 5</td>
<td>MSNBC</td>
<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> Defending liberties in high-tech world</a>.  Mentions EFF funding for Tor as one of its significant nonlitigation projects.</td>
</tr>
<td>2006 Apr 11</td>
<td>PBS Frontline</td>
<td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">Chipping Away at China's Great Firewall</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Feb 28</td>
<td>PC World</td>
<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">Outsmarting the Online Privacy Snoops</a></td>
</tr>
<tr>
<td>2006 Feb 27</td>
<td>Forbes</td>
<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Cracks In the Wall</a>.  Discussion of Tor being used for evading censorship by repressive governments.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Feb 20</td>
<td>The Boston Globe</td>
<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Beating censorship on the Internet</a></td>
</tr>
<tr>
<td>2006 Feb 15</td>
<td>CBS Evening News</td>
<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine appeared on the show to discuss Tor, starting at 1:04 into the video.</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Feb 15</td>
<td>CNBC - Closing Bell</td>
<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
</tr>
<tr>
<td>2006 Feb 15</td>
<td>Network Secure</td>
<td><a href="http://www.network-secure.de/index.php?option=com_content&amp;task=view&amp;id=3909">Tor: Anonymisierungswerkzeug entwickelt</a> (German)</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Feb 13</td>
<td>Wall Street Journal</td>
<td><a href="http://online.wsj.com/article/SB113979965346572150.html"> Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a>Full article text can also be found
<a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.</td>
</tr>
<tr>
<td>2006 Jan 31</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/Infotech/16216/page2/">Evading the Google Eye</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2006 Jan 29</td>
<td>New York Times</td>
<td><a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> How to Outwit the World's Internet Censors</a></td>
</tr>
<tr>
<td>2006 Jan 27</td>
<td>Fox News/eWeek</td>
<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web Anonymizers Suddenly Get Very Popular</a></td>
</tr>
<tr>
<td>2006 Jan 25</td>
<td>New York Times</td>
<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&amp;oref=slogin"> Privacy for People Who Don't Show Their Navels</a></td>
</tr>
<tr>
<td>2006 Jan 23</td>
<td>NPR Talk of the Nation</td>
<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Search Engines and Privacy Rights on the Web</a><br/> <a href="http://xeni.net/">Xeni Jardin</a> recommends Tor at 33:30 into the program.</td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2006 Feb 15</td>
<td>Punto Informatico</td>
<td><a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a> (Italian)</td>
</tr>

<tr>
<td>2006 Jan 20</td>
<td>Wired</td>
<td><a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> How to Foil Search Engine Snoops</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2006 Jan 20</td>
<td>NPR</td>
<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> Google Records Subpoena Raises Privacy Fears</a></td>
</tr>

<tr>
<td>2005 Sep 30</td>
<td>Viva o Linux</td>
<td><a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2005 Aug 6</td>
<td>New Scientist</td>
<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td>
</tr>
<tr style="background-color: #e5e5e5;">
<td>2005 Jul 12</td>
<td>IEEE Computer Society's Technical Committee on Security and Privacy</td>
<td><a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> Onion routing application Tor makes PCWorld's top 100</a></td>
</tr>

<tr>
<td>2005 Jun 22</td>
<td>The Unofficial Apple Blog</td>
<td><a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> Privacy Watch: Tor</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 Jun 10</td>
<td>The New Zealand Herald</td>
<td><a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=10329896"> China's internet censorship stranglehold can't last</a></td>
</tr>

<tr>
<td>2005 Jun 8</td>
<td>American Public Radio</td>
<td><a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> An Internet privacy tool called "Tor"</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 Jun 1</td>
<td>PC World</td>
<td><a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The 100 Best Products of 2005</a><br/> Tor is ranked #40 on the list. </td>
</tr>

<tr>
<td>2005 Jun 1</td>
<td>Linux Weekly News</td>
<td><a href="http://lwn.net/Articles/138242/"> A Look at The Onion Router (Tor)</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 May 22</td>
<td>Slashdot</td>
<td><a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
</tr>

<tr>
<td>2005 May 20</td>
<td>Security.uz</td>
<td><a href="http://security.uz/news/default.asp?id=10541"> Tor - мощный анонимайзер для всех ОС</a> (Russian)</td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 May 19</td>
<td>WebPlanet</td>
<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor: распределенная система анонимного серфинга</a> (Russian)</td>
</tr>

<tr>
<td>2005 May 17</td>
<td>Wired</td>
<td><a
href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> Tor Torches Online Tracking</a>. Also available in <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.</td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 May 17</td>
<td>XBiz</td>
<td><a href="http://xbiz.com/news/8761"> Navy Project Allows Anonymous Browsing</a></td>
</tr>

<tr>
<td>2005 Apr 13</td>
<td>Heise online</td>
<td><a href="http://www.heise.de/newsticker/meldung/58506"> CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)</td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 Apr 5</td>
<td>Libero</td>
<td><a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> Anonimato on line, ecco Tor</a> (Italian)</td>
</tr>

<tr>
<td>2005 Jan 4</td>
<td>Internetnews</td>
<td><a href="http://www.internetnews.com/dev-news/article.php/3454521"> EFF Throws Support to 'Anonymous' Internet Project</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2005 Mar 31</td>
<td>Linux.com</td>
<td><a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78"> Securing your online privacy with Tor</a></td>
</tr>

<tr>
<td>2004 Dec 27</td>
<td>BoingBoing</td>
<td><a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> EFF helping produce anonymizing software</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Dec 25</td>
<td>Kansas City infozine</td>
<td><a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> EFF Joins Forces with Tor Software Project</a></td>
</tr>

<tr>
<td>2004 Dec 23</td>
<td>golem.de</td>
<td><a href="http://www.golem.de/0412/35340.html"> EFF unterstützt Anonymisierer Tor</a> (German)</td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Dec 23</td>
<td>SuicideGirls</td>
<td><a href="http://suicidegirls.com/news/technology/6150/"> New Routing Software Allows Anonymous Internet Use</a></td>
</tr>

<tr>
<td>2004 Dec 18</td>
<td>P2Pnet</td>
<td><a href="http://p2pnet.net/story/3357"> EFF to sponsor Tor</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Dec 22</td>
<td>Slashdot</td>
<td><a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95&amp;tid=158&amp;tid=153&amp;tid=17"> EFF Promotes Freenet-like System Tor</a></td>
</tr>

<tr>
<td>2004 Nov 16</td>
<td>AlterNet</td>
<td><a href="http://www.alternet.org/columnists/story/20523/"> Heavy Traffic</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Aug 30</td>
<td>Newsweek</td>
<td>Technology: Instant Security (no link)</td>
</tr>

<tr>
<td>2004 Aug 16</td>
<td>Eweek</td>
<td><a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> Don't Fear Internet Anonymity Tools</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Aug 6</td>
<td>HCC magazine</td>
<td><a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen met hulp van marine VS</a> (Dutch)</td>
</tr>

<tr>
<td>2004 Aug 6</td>
<td>Golem</td>
<td><a href="http://www.golem.de/0408/32835.html"> Tor: Anonymisierer nutzt Onion-Routing</a></td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Aug 5</td>
<td>Network World Security</td>
<td><a href="http://www.networkworld.com/details/7088.html"> Onion routing</a></td>
</tr>

<tr>
<td>2004 May 8</td>
<td>Wired</td>
<td><a href="http://www.wired.com/politics/security/news/2004/08/64464"> Onion Routing Averts Prying Eyes</a>. Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.</td>
</tr>

<tr style="background-color: #e5e5e5;">
<td>2004 Mar 8</td>
<td>CNET Japan blog</td>
<td><a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> Yearning of hackers and insecurity</a> (Japanese)</td>
</tr>

<tr>
<td>1999 Apr 13</td>
<td>Wired</td>
<td><a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> Anonymous Web Surfing? Uh-Uh</a></td>
</tr>

</table>

</div>

  <!-- END MAINCOL -->
  <div id = "sidecol">
#include "side.wmi"
#include "info.wmi"
  </div>
  <!-- END SIDECOL -->
</div>
<!-- END CONTENT -->
#include <foot.wmi>