git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
0d46497d6
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
de
tormedia.wml
German translation update, some minor changes
Oliver Knapp
commited
0d46497d6
at 2009-05-06 10:40:01
tormedia.wml
Blame
History
Raw
## translation metadata # Based-On-Revision: 19408 # Last-Translator: mail (a-t) oliverknapp .de #include "head.wmi" TITLE="The Tor Project in den Medien" CHARSET="UTF-8" <div class="main-column"> <h1>Erscheinung in den Medien</h1> <h2>Interviews & Auftritte</h2> <p>Medien wie die New York Times, Forbes und CBS Evening News haben Mitglieder des Tor-Projektes wegen ihrer Expertise zu Fragen der Anonymität, Privatsphäre und Zensur im Internet immer wieder befragt oder zitiert. Hier sind einige Beispiele:</p> <table width="100%" border="0" cellpadding="3" cellspacing="0"> <thead style="background-color: #e5e5e5;"> <tr> <th width="10%">Datum</th> <th width="15%">Publikation</th> <th>Thema</th> </tr> </thead> <tr> <td>06. April 2009</td> <td>Al Jazeera</td> <td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village Voices berichtet über Tor</a></td> </tr> <tr> <td>12. März 2009</td> <td>BBC World Service</td> <td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch im Interview über Tor und Zensur</a></td> </tr> <tr> <td>2009 Feb 13</td> <td>Hearsay Culture</td> <td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Dec 29</td> <td>nu.nl</td> <td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td> </tr> <tr> <td>2006-04-11</td> <td>PBS Frontline</td> <td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> Chipping Away at China's Great Firewall</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006-02-28</td> <td>PC World</td> <td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> Outsmarting the Online Privacy Snoops</a></td> </tr> <tr> <td>2006-02-27</td> <td>Forbes</td> <td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Cracks In the Wall</a>. Diskussion über Tor als Werkzeug zur Umgehung von Zensur</td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006-02-20</td> <td>The Boston Globe</td> <td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Beating censorship on the Internet</a></td> </tr> <tr> <td>2006-02-15</td> <td>CBS Evening News</td> <td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>. Roger Dingledine erschien in der Show, um Tor zu diskutieren. Die Sequenz startet bei 1:04 im Video.</td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006-02-15</td> <td>CNBC - Closing Bell</td> <td>TV-Auftritt von Roger Dingledine um 16:25. (keine URL)</td> </tr> <tr> <td>2006-01-27</td> <td>Fox News/eWeek</td> <td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web Anonymizers Suddenly Get Very Popular</a></td> </tr> <tr> <td>2006-01-25</td> <td>New York Times</td> <td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> Privacy for People Who Don't Show Their Navels</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2005-08-06</td> <td>New Scientist</td> <td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td> </tr> </table> <h2>Artikel</h2> <p>Tor wird weltweit regelmäßig benutzt und erscheint daher regelmäßig in der Presse. Diese Liste ist nicht umfangreich, sondern illustriert einige der wichtigeren Artikel.</p> <table width="100%" border="0" cellpadding="3" cellspacing="0"> <thead style="background-color: #e5e5e5;"> <tr> <th width="10%">Datum</th> <th width="15%">Publikation</th> <th>Thema</th> </tr> </thead> <tr> <td>01. Mai 2009</td> <td>New York Times</td> <td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and Others Outwit Net Censors</a></td> </tr> <tr> <td>23. April 2009</td> <td>Technology Review</td> <td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made Safer: How anonymity technology could save free speech on the Internet.</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>22. April 2009</td> <td>Le Monde</td> <td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</td> </tr> <tr> <td>06. April 2009</td> <td>Reader's Digest</td> <td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">How to Hide Anything</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>18. März 2009</td> <td>Marie Claire</td> <td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td> </tr> <tr> <td>13. März 2009</td> <td>Wall Street Journal</td> <td><a href="http://online.wsj.com/article/SB123567809587886053.html">The Kindness of Strangers</a> </tr> <tr style="background-color: #e5e5e5;"> <tr> <td>2009 Mar 03</td> <td>Orf Austria</td> <td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER column</a></td> </tr> <tr> <td>2009 Feb 18</td> <td>Bangkok Post</td> <td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine"> The old fake "404 not found" routine</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Dec 14</td> <td>PC Magazine: Middle & Near East</td> <td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To Reclaim Your Online Privacy</a></td> </tr> <tr> <td>2008-08-21</td> <td>CNN</td> <td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts: Internet filtering and censorship rife</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008-08-22</td> <td>The Sydney Morning Herald</td> <td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The China Syndrome</a></td> </tr> <tr> <td>2008-08-20</td> <td>Scientific American</td> <td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography: How to Keep Your Secrets Safe</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008-09-05</td> <td>Guardian UK</td> <td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting the great firewall</a></td> </tr> <tr> <td>2008-08-10</td> <td>Tech Radar UK</td> <td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a> </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008-08-07</td> <td>Spiegel</td> <td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks gegen Zensur und Überwachung</a> </td> </tr> <tr> <td>2008-08-07</td> <td>PC World</td> <td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15 Great, Free Privacy Downloads</a>. Tor is Number 1. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008-08-07</td> <td>The Guardian UK</td> <td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos aims to crack China's wall</a> </td> </tr> <tr> <td>2008-08-07</td> <td>The Register UK</td> <td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German hackers poke hole in great firewall of China</a> </td> </tr> <tr> <td>2008 May 24</td> <td>Groupo Estado</td> <td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525">Interview at Computers, Freedom, and Privacy 2008 Conference</a> </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008-04-12</td> <td>SearchSecurity.com</td> <td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html"> Tor network 'bridges' help evade blockers</a>. Covers new Tor features designed to overcome filtering and blocking that prevent access to the Tor network. </td> </tr> <tr> <td>2008-02-14</td> <td>Wired: Compiler Blog</td> <td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008-02-01</td> <td>PC World</td> <td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> Hackers Can Expose Masked Surfers, Study Says</a> A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> Steven Murdoch's recent PhD thesis</a>. Steven <a href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> responds on the Tor Blog</a>.</td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007-09-21</td> <td>Wired HowTo Blog</td> <td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work"> Be a Whistleblower</a>. Wired recommends Tor for whistleblowers who wish to remain anonymous. </td> </tr> <tr> <td>2007-09-16</td> <td>Cnet</td> <td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html"> Tor anonymity server admin arrested</a>. A Tor exit node operator from Germany was arrested and then released once the police realized their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>. We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007-09-10</td> <td>Wired</td> <td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br /> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information. Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption. Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2"> The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486"> Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>. </td> </tr> <tr> <td>2007-07-27</td> <td>Wired Blog</td> <td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br /> A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply at the bottom of the article. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007-06-22</td> <td>Bangkok Post</td> <td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> The problems with censorship</a>. Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship. </td> </tr> <tr> <td>2007-04-15</td> <td>World Changing</td> <td><a href="http://www.worldchanging.com/archives/006309.html"> Blogging Where Speech Isn’t Free</a><br /> Coverage of former Tor Executive Director Shava Nerad's participation at an <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124"> SXSW panel</a>, where she explained how Tor can help bloggers. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007-04-8</td> <td>Security Focus</td> <td><a href="http://www.securityfocus.com/news/11447/1"> Tor hack proposed to catch criminals</a>. Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the Tor Project illustrating why this approach may not be a good idea. </td> </tr> <tr> <td>2007-02-1</td> <td>Dr Dobb's</td> <td><a href="http://www.ddj.com/security/197002414"> Tor Project Protects Anonymous Sources</a>. An introduction to Tor, including technical and historical background. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006 Oct 19</td> <td>Wired Threat Level</td> <td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> The Onion Router (TOR) is Leaky (Leeky)</a>. Explains why you need something like Privoxy in addition to the core Tor code to ensure your anonymity. If you use the Vidalia bundle, it installs and configures Privoxy automatically, but it can't hurt to understand why it is necessary. </td> </tr> <tr> <td>2006-08-18</td> <td>NPR</td> <td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Tips for Protecting Privacy Online</a>. Kevin Bankston of the EFF recommends Tor during an NPR interview. Tor information begins at 8:15 into the program. </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006-07-5</td> <td>MSNBC</td> <td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> Defending liberties in high-tech world</a>. Mentions EFF funding for Tor as one of its significant nonlitigation projects. </td> </tr> <tr> <td> 2006-02-15 </td> <td> Network Secure</td> <td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909"> Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006-02-13 </td> <td> Wall Street Journal</td> <td> <a href="http://online.wsj.com/article/SB113979965346572150.html"> Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br /> Full article text can also be found <a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>. </td> </tr> <tr> <td> 2006-01-31 </td> <td> Technology Review</td> <td> <a href="http://www.technologyreview.com/Infotech/16216/page2/"> Evading the Google Eye</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006-01-29 </td> <td> New York Times</td> <td> <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> How to Outwit the World's Internet Censors</a><br /> </td> </tr> <tr> <td> 2006-01-23 </td> <td> NPR Talk of the Nation</td> <td> <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Search Engines and Privacy Rights on the Web</a><br /> <a href="http://xeni.net/">Xeni Jardin</a> recommends Tor at 33:30 into the program. </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006-02-15 </td> <td> Punto Informatico</td> <td> <a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a> (Italian)<br /> </td> </tr> <tr> <td> 2006-01-20 </td> <td> Wired</td> <td> <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> How to Foil Search Engine Snoops</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006-01-20 </td> <td> NPR</td> <td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> Google Records Subpoena Raises Privacy Fears</a><br /> </td> </tr> <tr> <td> 2005-09-30 </td> <td> Viva o Linux</td> <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> TOR: A Internet sem rastreabilidade</a> (Portuguese)<br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-07-12 </td> <td> IEEE Computer Society's Technical Committee on Security and Privacy</td> <td> <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> Onion routing application Tor makes PCWorld's top 100</a><br /> </td> </tr> <tr> <td> 2005-06-22 </td> <td> The Unofficial Apple Blog</td> <td> <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> Privacy Watch: Tor</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-06-10 </td> <td> The New Zealand Herald</td> <td> <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896"> China's internet censorship stranglehold can't last</a><br /> </td> </tr> <tr> <td> 2005-06-8 </td> <td> American Public Radio</td> <td> <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> An Internet privacy tool called "Tor"</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-06-1 </td> <td> PC World</td> <td> <a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The 100 Best Products of 2005</a><br /> Tor is ranked #40 on the list. </td> </tr> <tr> <td> 2005-06-1 </td> <td> Linux Weekly News</td> <td> <a href="http://lwn.net/Articles/138242/"> A Look at The Onion Router (Tor)</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-05-22 </td> <td> Slashdot</td> <td> <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> Tor Anonymity Network Reaches 100 Verified Nodes</a><br /> </td> </tr> <tr> <td> 2005-05-20 </td> <td> Security.uz</td> <td> <a href="http://security.uz/news/default.asp?id=10541"> Tor - мощный анонимайзер для всех ОС</a> (Russian)<br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-05-19 </td> <td> WebPlanet</td> <td> <a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor: распределенная система анонимного серфинга</a> (Russian)<br /> </td> </tr> <tr> <td> 2005-05-17 </td> <td> Wired</td> <td> <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> Tor Torches Online Tracking</a><br /> Also available in <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>. </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-05-17 </td> <td> XBiz</td> <td> <a href="http://xbiz.com/news/8761"> Navy Project Allows Anonymous Browsing</a><br /> </td> </tr> <tr> <td> 2005-04-13 </td> <td> Heise online</td> <td> <a href="http://www.heise.de/newsticker/meldung/58506"> CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-04-5 </td> <td> Libero</td> <td> <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> Anonimato on line, ecco Tor</a> (Italian)<br /> </td> </tr> <tr> <td> 2005-01-4 </td> <td> Internetnews</td> <td> <a href="http://www.internetnews.com/dev-news/article.php/3454521"> EFF Throws Support to 'Anonymous' Internet Project</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005-04-31 </td> <td> Linux.com</td> <td> <a href="http://www.linux.com/articles/43713?tid=19&tid=78"> Securing your online privacy with Tor</a><br /> </td> </tr> <tr> <td> 2004-12-27 </td> <td> BoingBoing</td> <td> <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> EFF helping produce anonymizing software</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-12-25 </td> <td> Kansas City infozine</td> <td> <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> EFF Joins Forces with Tor Software Project</a><br /> </td> </tr> <tr> <td> 2004-12-23 </td> <td> golem.de</td> <td> <a href="http://www.golem.de/0412/35340.html"> EFF unterstützt Anonymisierer Tor</a> (German)<br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-12-23 </td> <td> SuicideGirls</td> <td> <a href="http://suicidegirls.com/news/technology/6150/"> New Routing Software Allows Anonymous Internet Use</a><br /> </td> </tr> <tr> <td> 2004-12-18 </td> <td> P2Pnet</td> <td> <a href="http://p2pnet.net/story/3357"> EFF to sponsor Tor</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-12-22 </td> <td> Slashdot</td> <td> <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17"> EFF Promotes Freenet-like System Tor</a><br /> </td> </tr> <tr> <td> 2004-11-16 </td> <td> AlterNet</td> <td> <a href="http://www.alternet.org/columnists/story/20523/"> Heavy Traffic</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-08-30 </td> <td> Newsweek</td> <td> Technology: Instant Security (no link)<br /> </td> </tr> <tr> <td> 2004-08-16 </td> <td> Eweek</td> <td> <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> Don't Fear Internet Anonymity Tools</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-08-6 </td> <td> HCC magazine</td> <td> <a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen met hulp van marine VS</a> (Dutch)<br /> </td> </tr> <tr> <td> 2004-08-6 </td> <td> Golem</td> <td> <a href="http://www.golem.de/0408/32835.html"> Tor: Anonymisierer nutzt Onion-Routing</a><br /> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-08-5 </td> <td> Network World Security</td> <td> <a href="http://www.networkworld.com/details/7088.html"> Onion routing</a><br /> </td> </tr> <tr> <td> 2004-05-8 </td> <td> Wired</td> <td> <a href="http://www.wired.com/politics/security/news/2004/08/64464"> Onion Routing Averts Prying Eyes</a><br /> Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>. </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004-04-08 </td> <td> CNET Japan blog</td> <td> <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> Yearning of hackers and insecurity</a> (Japanese)<br /> </td> </tr> <tr> <td> 1999-04-13 </td> <td> Wired</td> <td> <a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> Anonymous Web Surfing? Uh-Uh</a><br /> </td> </tr> </table> </div> #include <foot.wmi>