git.schokokeks.org
Repositories
Help
Report an Issue
tor-webwml.git
Code
Commits
Branches
Tags
Suche
Strukturansicht:
c18f0dd52
Branches
Tags
bridges
docs-debian
jobs
master
press-clips
tor-webwml.git
branches
original_web
bms
tormedia.wml
Added 19 FAQ entries
Matt Pagan
commited
c18f0dd52
at 2013-08-26 04:06:05
tormedia.wml
Blame
History
Raw
## translation metadata # Revision: $Revision: 23008 $ # Translation-Priority: 4-optional #include "head.wmi" TITLE="Media Appearances of The Tor Project" CHARSET="UTF-8" <div class="main-column"> <h1>Media Appearances</h1> <h2>Interviews & Appearances</h2> <p> ပင္မသတင္းဌာနႀကီးမ်ားျဖစ္သည့္ the New York Times, Forbes ႏွင့္ the CBS Evening News မ်ားသည္ Tor Project အဖဲြ႔ဝင္မ်ားထံမွ anonymity,privacy ႏွင့္ အင္တာနက္ ဆင္ဆာကိစၥမ်ားႏွင့္ပတ္သက္၍ ကိုးကားေျပာဆုိၾကသည္။ ဥပမာအားျဖင့္- </p> <table width="100%" border="0" cellpadding="3" cellspacing="0"> <thead style="background-color: #e5e5e5;"> <tr> <th width="10%">ေန႔စဲြ</th> <th width="15%">ထုတ္ေဝျခင္း</th> <th>ေခါင္းစဥ္</th> </tr> </thead> <tr> <td>၂၀၁၀ မတ္လ ၁၁ ရက္</td> <td>ABC Australia</td> <td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense: The Deep Web</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>၂၀၀၉ ဇူလိုင္လ ၂ ရက္</td> <td>NED/CIMA</td> <td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td> </tr> <tr> <td>၂၀၀၉ ေအပရယ္လ ၆ ရက္</td> <td>Al Jazeera</td> <td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village Voices showcases Tor</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>၂၀၀၉ မတ္လ ၁၂ ရက္</td> <td>BBC World Service</td> <td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch ကို Tor ႏွင့္ဆင္ဆာကိစၥမ်ားအတြက္ အင္တာဗ်ဴးသည္။</a></td> </tr> <tr> <td>2009 Feb 13</td> <td>Hearsay Culture</td> <td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Dec 29</td> <td>nu.nl</td> <td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td> </tr> <tr> <td>2006 Apr 11</td> <td>PBS Frontline</td> <td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">Chipping Away at China's Great Firewall</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006 Feb 28</td> <td>PC World</td> <td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> Outsmarting the Online Privacy Snoops</a></td> </tr> <tr> <td>2006 Feb 27</td> <td>Forbes</td> <td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Cracks In the Wall</a>။ Tor ကို အစိုးရခ်ဳပ္ထိန္းထားေသာ ဆင္ဆာကိစၥမ်ားကို ေရွာင္ေျပးရာတြင္ အသံုးျပဳေနျခင္းအတြက္ ေဆြးေႏြးမႈ။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006 Feb 20</td> <td>The Boston Globe</td> <td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">အင္တာနက္ေပၚရွိ ဆင္ဆာကိစၥမ်ားကိုတုိက္ခိုက္ျခင္း</a></td> </tr> <tr> <td>2006 Feb 15</td> <td>CBS Evening News</td> <td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>. Roger Dingledine သည္ Tor အေၾကာင္းေဆြးေႏြးရန္ ၁း၀၄ နာရီတြင္ ဗီဒီယိုရွိဳးတြင္ပါဝင္လာသည္။</td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006 Feb 15</td> <td>CNBC - Closing Bell</td> <td>Roger Dingledine သည္ ညေန ၄း၂၅ တြင္ တီဗီတြင္ပါသည္။ (လင့္ခ္မရွိ)</td> </tr> <tr> <td>2006 Jan 27</td> <td>Fox News/eWeek</td> <td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web Anonymizers မ်ား ရုတ္တရက္ေက်ာ္ၾကားလာသည္</a></td> </tr> <tr> <td>2006 Jan 25</td> <td>New York Times</td> <td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin">မည္သူမည္ဝါမွန္း မေဖာ္ျပေသာ လူမ်ားအတြက္ လံုၿခံဳေရး</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2005 Aug 6</td> <td>New Scientist</td> <td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">ညစ္ညမ္းဝက္ဆိုက္မ်ားဘာေၾကာင့္လိုတာလဲ</a></td> </tr> </table> <br/> <h2>Articles</h2> <p> Tor ကို တကမာၻလံုးက တြင္က်ယ္စြာအသံုးျပဳေနၾကသျဖင့္ မၾကာခဏ သတင္းမ်ားတြင္ေဖာ္ျပခံရေလ့ရွိပါသည္။ စာရင္းသည္မျပည့္စံုေသာ္လည္း Tor နဲ႔ပက္သတ္သမွ် ေက်ာ္ၾကားေသာ သတင္းမ်ားကိုေတာ့ ေဖာ္ျပေပးႏိုင္ပါသည္။ </p> <table width="100%" border="0" cellpadding="3" cellspacing="0"> <thead style="background-color: #e5e5e5;"> <tr> <th width="10%">ေန႔စဲြ</th> <th width="15%">ထုတ္ေဝျခင္း</th> <th>ေခါင္းစဥ္</th> </tr> </thead> <tr> <td>2010 August 01</td> <td>PC Format - Poland</td> <td><a href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google ႏွင့္ Facebook က ကၽြႏ္ုပ္တို႔ကို လွ်ိဳ႕ဝွက္ေထာက္လွမ္းေနၿပီ</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2010 July 14</td> <td>China Rights Forum</td> <td><a href="http://www.hrichina.org/public/contents/category?cid=175033">China Rights Forum, No. 2 - “China’s Internet”: Staking Digital Ground</a></td> </tr> <tr> <td>2010 May 25</td> <td>The Australian</td> <td><a href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466"> Tor ကို ဆင္ဆာမ်ားအားတိုက္ခိုက္ရန္ ပါဝင္ဖို႔ဖိတ္ေခၚျခင္း</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2010 Mar 17</td> <td>PC World Poland</td> <td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity in the Web</a></td> </tr> <tr> <td>2010 Mar 09</td> <td>PC Pro UK</td> <td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">web ၏ အဆိုးဘက္</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Dec 29</td> <td>Times Online</td> <td><a href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.ece">အီရန္အစိုးရ က်ဆံုးခ်ိန္တြင္ YouTube ေတာ္လွန္ေရးဟု သိရွိသတ္မွတ္ၾကပါသည္</a></td> </tr> <tr> <td>2009 Oct 15</td> <td>Technology Review</td> <td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down on Tor Anonymity Network</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Sep 30</td> <td>BusinessWeek</td> <td><a href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.htm">China's Online Censors Work Overtime</a></td> </tr> <tr> <td>2009 Aug 19</td> <td>Reuters</td> <td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?pageNumber=1&virtualBrandChannel=0&sp=true">လူ႔အခြင့္ေရးလႈပ္ရွားသူမ်ားကို web tool မ်ားက ကူညီကာကြယ္ေပးသည္</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Aug 10</td> <td>Technology Review</td> <td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">အင္တာနက္တြင္ anonymmity ကိုမည္သို႔တည္ေဆာက္ရမလဲ</a></td> </tr> <tr> <td>2009 Jul 26</td> <td>Washington Times</td> <td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Jul 26</td> <td>Boston Globe</td> <td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed at Iranians</a></td> </tr> <tr> <td>2009 Jul 24</td> <td>Associated Press</td> <td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">အီရန္အခြင့္ေရးလႈပ္ရွားသူမ်ားက အင္တာနက္တြင္ အပ်က္စီးကိုေရွာင္ရွားဖို႔ ႀကိဳးစားၾကသည္</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Jul 08</td> <td>Tehran Bureau</td> <td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">ကမာၻအဝွမ္းရွိ geek မ်ားက အြန္လိုင္းရွိ အီရန္မ်ားကိုကူညီၾကသည္</a></td> </tr> <tr> <td>2009 Jun 26</td> <td>Washington Times</td> <td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid censorship with Navy technology</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Jun 29</td> <td>EFF</td> <td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-bridges">Tor bridge သို႔မဟုတ္ Tor Relay ကိုသံုးၿပီး အီရန္မွ တိုက္ခိုက္သူမ်ားကိုကူညီၾက</a></td> </tr> <tr> <td>2009 Jun 24</td> <td>Daily Finance</td> <td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-controversy/">Nokia and Siemens in Iran controversy</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Jun 18</td> <td>Wall Street Journal</td> <td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td> </tr> <tr> <td>2009 Jun 19</td> <td>O'Reilly Radar</td> <td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">အီရန္မွ tor သံုးစဲြသူအေရအတြက္သည္ အံ့ၾသစရာတိုးပြာလာခဲ့သည္- Tor project ႏွင့္ EFF အင္တာဗ်ဴး</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Jun 18</td> <td>Deutsche Welle</td> <td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">အင္တာနက္ proxy မ်ားက အီရန္မ်ားႏွင့္ အျခားသူမ်ားကို ပိတ္ဆို႔ဝက္ဆိုက္မ်ားကို ေက်ာ္၍ခ်ိတ္ဆက္ေပးသည္</a></td> </tr> <tr> <td>2009 Jun 18</td> <td>Technology Review</td> <td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the Republic of Iran</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Jun 17</td> <td>CNet News</td> <td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Net ဆင္ဆာမ်ားကိုေက်ာ္ျဖတ္ရန္နည္းလမ္းမ်ားကို အီရန္မ်ားႀကိဳးစားေနၾကသည္</a></td> </tr> <tr> <td>2009 Jun 17</td> <td>ComputerWorld</td> <td><a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9134471&intsrc=news_ts_head">Iran's leaders fight Internet; Internet wins (so far)</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 May 29</td> <td>Le Monde</td> <td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td> </tr> <tr> <td>2009 May 15</td> <td>Mass High Tech</td> <td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net privacy</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 May 01</td> <td>New York Times</td> <td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and Others Outwit Net Censors</a></td> </tr> <tr> <td>2009 Apr 23</td> <td>Technology Review</td> <td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made Safer: အင္တာနက္ေပၚမွ လြတ္လပ္စြာေျပာဆိုခြင့္ကို anonymity technology က မည္မွ်အထိ ထိန္းသိမ္းေပးႏိုင္သလဲ</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Apr 22</td> <td>Le Monde</td> <td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</a></td> </tr> <tr> <td>၂၀၀၉ ေအပရယ္လ ၆ ရက္</td> <td>Reader's Digest</td> <td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">အရာရာတိုင္းကို ဘယ္လိုဖံုးကြယ္မလဲ</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Mar 18</td> <td>Marie Claire</td> <td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">သင့္ ဝက္ေျခရာမ်ားကို ဘယ္လိုစီမံမလဲ</a></td> </tr> <tr> <td>2009 Mar 13</td> <td>Wall Street Journal</td> <td><a href="http://online.wsj.com/article/SB123567809587886053.html">The Kindness of Strangers</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2009 Mar 03</td> <td>Orf Austria</td> <td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER column</a></td> </tr> <tr> <td>2009 Feb 18</td> <td>Bangkok Post</td> <td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine">The old fake "404 not found" လမ္းေၾကာင္း</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Dec 14</td> <td>PC Magazine: Middle & Near East</td> <td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">သင့္ အြန္လိုင္းလံုၿခံဳေရးအတြက္ ဘယ္လိုျပင္ဆင္မလဲ</a></td> </tr> <tr> <td>2008 Aug 21</td> <td>CNN</td> <td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts: Internet filtering and censorship rife</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Aug 22</td> <td>The Sydney Morning Herald</td> <td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The China Syndrome</a></td> </tr> <tr> <td>2008 Aug 20</td> <td>Scientific American</td> <td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography: သင့္လွ်ိဳ႕ဝွက္ခ်က္မ်ားကို ဘယ္လိုလံုၿခံဳေအာင္လုပ္မလဲ</a></td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Aug 05</td> <td>Guardian UK</td> <td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting the great firewall</a></td> </tr> <tr> <td>2008 Aug 10</td> <td>Tech Radar UK</td> <td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a> </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Aug 07</td> <td>Spiegel</td> <td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks gegen Zensur und Überwachung</a> </td> </tr> <tr> <td>2008 Aug 07</td> <td>PC World</td> <td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15 Great, Free Privacy Downloads</a>. Tor ကေတာ့ နံပါတ္ ၁ ပါပဲ။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Aug 07</td> <td>The Guardian UK</td> <td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos aims to crack China's wall</a> </td> </tr> <tr> <td>2008 Aug 07</td> <td>The Register UK</td> <td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">ဂ်ာမန္ ဟက္ကာမ်ားက တရုတ္၏အခိုင္မာဆံုးေသာ အတားအဆီးကိုျဖတ္၍ ေဖာက္ထြင္းသည္</a> </td> </tr> <tr> <td>2008 May 24</td> <td>Groupo Estado</td> <td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525">Interview at Computers, Freedom, and Privacy 2008 Conference</a> </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Mar 12</td> <td>SearchSecurity.com</td> <td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html"> tor ကြန္ယက္ 'bridges' က အပိတ္အဆို႔မ်ားကို ေရွာင္ရွားသည္</a>။ Tor ကြန္ယက္ကို သံုးစဲြရန္ စစ္ထုတ္ျခင္းႏွင့္ ပိတ္ဆို႔ျခင္းျပဳလုပ္ထားေသာ Tor ၏အဂၤါရပ္အသစ္မ်ားကို ကာကြယ္ေပးသည္။ </td> </tr> <tr> <td>2008 Feb 14</td> <td>Wired: Compiler Blog</td> <td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> How To: အမည္မသိ browsing ကို စကၠန္႔ ၃၀ အတြင္းဘယ္လုိအသံုးျပဳမလဲ</a> </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2008 Feb 01</td> <td>PC World</td> <td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> Hackers Can Expose Masked Surfers, Study Says</a> A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> Steven Murdoch's recent PhD thesis</a>. Steven <a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> responds on the Tor Blog</a>.</td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007 Sep 21</td> <td>Wired HowTo Blog</td> <td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">Whistleblower ျဖစ္လာရန္</a>။ အမည္ဝွက္လိုေသာ whistleblower မ်ားအတြက္ ထူးျခားေသာညႊန္ၾကားခ်က္မ်ား။ </td> </tr> <tr> <td>2007 Sep 16</td> <td>Cnet</td> <td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html"> Tor anonymity server admin အဖမ္းခံရသည္</a>။ ဂ်ာမနီမွ Tor exit node ေအာ္ပေရတာသည္ ဖမ္းဆီးခံရၿပီးေနာက္ ရဲမ်ား၏အမွားေၾကာင့္ဟုသိကာ ျပန္လႊတ္ေပးခဲ့သည္။ သို႔ေသာ္ <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html">operator ကို node မ်ားျပန္ပိတ္ရန္</a>ေျပာဆိုခဲ့သည္။ အကယ္၍သင္သာ tor ralay မ်ားတြင္ တာဝန္ယူရလွ်င္ ထုိကိစၥမ်ိဳးအတြက္ မည္သို႔ေျဖရွင္းမလဲဆိုသည့္အေၾကာင္းမ်ားကို <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>ႏွင့္ <a href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a>မ်ားတြင္ ေဖာ္ျပထားသည္။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007 Sep 10</td> <td>Wired</td> <td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> ဆီြဒင္လူမ်ိဳး ကြန္ပ်ဴတာလံုၿခံဳေရးဆိုင္ရာ အတိုင္ပင္ခံ Dan Egerstad က သူ သံုးေနေသာ Tor exit node လမ္းေၾကာင္းမ်ားကို ေစာင့္ၾကည့္ေနၿပီး unencrypted account ႏွင့္ password အခ်က္အလက္မ်ားကို ထုတ္ျပန္လိုက္သည္။ Tor ၏တည္ေဆာက္မႈျပႆနာမ်ား သို႔မဟုတ္ လံုၿခံဳေရးအားနည္းခ်က္မ်ားအေၾကာင္း ေဖာ္ျပထားျခင္းေတာ့မဟုတ္ပါ။ Tor က နာမည္ဝွက္ျခင္းမ်ားကို ကူညီေသာ္လည္း exit node မွထြက္သမွ်ကို encrypt လုပ္ေပးျခင္းမဟုတ္ပါ။ <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2"> The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486"> Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>ႏွင့္ အျခားေနရာမ်ားစြာတြင္လည္းၾကည့္ႏိုင္သည္။ Mr. Egerstad က သူ၏ tor exit node မ်ားမွ သတင္းအခ်က္အလက္မ်ားရသည္ဟု မေဖာ္ျပခင္ကတည္းက ၂၀၀၇ ၾသဂုတ္လ ၃၁ တြင္ <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>၌ အေစာဆံုး တင္ျပထားသည္။ အဆံုးတြင္ Mr. Egerstad သည္<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a> တုိ႔ေၾကာင့္ အဖမ္းခံရသည္။ </td> </tr> <tr> <td>2007 Jul 27</td> <td>Wired Blog</td> <td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br/> Tor အသံုးျပဳျခင္းအတြက္ အာေရဗ်ဘာသာျဖင့္ ညႊန္ၾကားခ်က္မ်ားကို တင္ထားေသာ<a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> blog</a>ကိုညႊန္ျပသည္။ ေဆာင္းပါးေအာက္နားရွိ Shava Nerad ၏ ျပန္ၾကားခ်က္ကိုဖတ္ပါ။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2007 Jun 22</td> <td>Bangkok Post</td> <td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> ဆင္ဆာျပႆနာမ်ား</a>။ ထိုင္းႏိုင္ငံတြင္ ဆင္ဆာကိစၥကိုေရွာင္လႊဲရန္ "လူတိုင္း" Tor ကိုသံုးသည္ဟုလည္း ေျပာၾကသည္။ </td> </tr> <tr> <td>2007 Mar 15</td> <td>World Changing</td> <td><a href="http://www.worldchanging.com/archives/006309.html"> ေျပာဆိုခြင့္မလြတ္လပ္ခ်ိန္တြင္ blog ေရးပါ။</a><br/>former Tor Executive Director ျဖစ္ေသာ Shava Nerad ၏ <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124"> SXSW panel</a>တြင္ေျပာထားေသာ Tor က blogger မ်ားကို မည္သို႔ကူညီသည္ဟူသည့္ စကားကိုကိုးကားသည္။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td><a href="http://www.worldchanging.com/archives/006309.html"> ေျပာဆိုခြင့္မလြတ္လပ္ခ်ိန္တြင္ blog ေရးပါ။</a><br/>former Tor Executive Director ျဖစ္ေသာ Shava Nerad ၏ <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124"> SXSW panel</a>တြင္ေျပာထားေသာ Tor က blogger မ်ားကို မည္သို႔ကူညီသည္ဟူသည့္ စကားကိုကိုးကားသည္။ </td> <td>Security Focus</td> <td><a href="http://www.securityfocus.com/news/11447/1"> Tor hack က ရာဝဝတ္မႈမ်ားကို ဖမ္းဆီးဖို႔ရည္ရြယ္သည္</a>။ "Torment" ဟုေခၚေသာ toolset မွ exit node မ်ားကိုေစာင့္ၾကည့္ၿပီး သတင္းေပးပို႔ခ်က္အရ Tor Project သည္ ဤခ်ဥ္းကပ္မႈက ဘာေၾကာင့္မေကာင္းသလဲဆိုတာ တံု႔ျပန္ပံုေဆာင္သည္။ </td> </tr> <tr> <td>2007 Feb 1</td> <td>Dr Dobb's</td> <td><a href="http://www.ddj.com/security/197002414"> Tor Project က အမည္မသိရင္းျမစ္မ်ားကို ကာကြယ္သည္။</a> Tor မိတ္ဆက္တြင္ နည္းပညာပိုင္းႏွင့္ သမိုင္းအခ်က္အလက္မ်ားပါဝင္သည္။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006 Oct 19</td> <td>Wired Threat Level</td> <td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> The Onion Router (TOR) is Leaky (Leeky)</a>။ သင့္အမည္ဝွက္အသံုးျပဳရန္ core Tor code ကိုျဖည့္စြက္ဖို႔ Privoxy ကို ဘာေၾကာင့္လိုအပ္သလဲ ရွင္းျပပါ။ Vidalia bundle ကို သင္သံုးလွ်င္ Proxy ကို အလိုေလ်ာက္သြင္းေပးၿပီး configure လုပ္ေပးပါသည္။ သို႔ေသာ္ ဘာေၾကာင့္လိုအပ္သလဲေတာ့ နားမလည္ပါ။ </td> </tr> <tr> <td>2006 Aug 18</td> <td>NPR</td> <td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Online လံုၿခံဳေရးအတြက္ ကာကြယ္ရန္ နည္းလမ္းမ်ား</a>. EFF ၏ Kevin Bankston က NPR အင္တာဗ်ဴးတြင္ Tor သံုးဖို႔တိုက္တြန္းသြားပါသည္။ Tor ၏သတင္းအခ်က္အလက္မ်ားသည္ program တြင္ ၈း၁၅ တြင္ပါဝင္လာသည္။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td>2006 Jul 5</td> <td>MSNBC</td> <td><a href="http://www.msnbc.msn.com/id/13718446/page/2/">နည္းပညာအဆင့္ျမင့္မားခ်ိန္တြင္ လြတ္လပ္မႈအတြက္ခုခံျခင္း</a>။ Tor ကို သူ၏ significant nonlitigation project တစ္ခုအျဖစ္ EFF ရံပံုေငြက ေဖာ္ျပသည္။ </td> </tr> <tr> <td> 2006 Feb 15 </td> <td> Network Secure</td> <td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909"> Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006 Feb 13 </td> <td> Wall Street Journal</td> <td> <a href="http://online.wsj.com/article/SB113979965346572150.html"> Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br/> ေဆာင္းပါးအျပည့္အစံုကို <a href="http://yaleglobal.yale.edu/display.article?id=6981">ဒီမွာ</a>ဖတ္ပါ။ </td> </tr> <tr> <td> 2006 Jan 31 </td> <td> Technology Review</td> <td> <a href="http://www.technologyreview.com/Infotech/16216/page2/"> Google Eye ကိုေရွာင္ရွားျခင္း</a></br> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006 Jan 29 </td> <td> New York Times</td> <td> <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> How to Outwit the World's Internet Censors</a><br/> </td> </tr> <tr> <td> 2006 Jan 23 </td> <td> NPR Talk of the Nation</td> <td> <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Search Engines ႏွင့္ web ေပၚရွိ လံုၿခံဳမႈအခြင့္အေရး</a><br/> <a href="http://xeni.net/">Xeni Jardin</a>က Tor ကို ၃၃း၃၀ တြင္ညႊန္းဆိုထားပါသည္။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006 Feb 15 </td> <td> Punto Informatico</td> <td> <a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a> (Italian)<br/> </td> </tr> <tr> <td> 2006 Jan 20 </td> <td> Wired</td> <td> <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> How to Foil Search Engine Snoops</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2006 Jan 20 </td> <td> NPR</td> <td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> Google Records Subpoena Raises Privacy Fears</a><br/> </td> </tr> <tr> <td> 2005 Sep 30 </td> <td> Viva o Linux</td> <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> TOR: A Internet sem rastreabilidade</a> (Portuguese)<br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 Jul 12 </td> <td> IEEE Computer Society ၏ ကိုယ္ေရးကိုယ္တာလံုၿခံဳေရးအတြက္ နည္းပညာေကာ္မတီ</td> <td> <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> Onion routing application Tor makes PCWorld's top 100</a><br/> </td> </tr> <tr> <td> 2005 Jun 22 </td> <td> The Unofficial Apple Blog</td> <td> <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> Privacy Watch: Tor</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 Jun 10 </td> <td> The New Zealand Herald</td> <td> <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896"> China's internet censorship stranglehold can't last</a><br/> </td> </tr> <tr> <td> 2005 Jun 8 </td> <td> American Public Radio</td> <td> <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> "Tor" ဟုေခၚေသာ အင္တာနက္လုံၿခံဳေရး tool</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 Jun 1 </td> <td> PC World</td> <td> <a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The 100 Best Products of 2005</a><br/> Tor က အဆင့္ ၄၀ ျဖစ္သည္။ </td> </tr> <tr> <td> 2005 Jun 1 </td> <td> Linux Weekly News</td> <td> <a href="http://lwn.net/Articles/138242/"> A Look at The Onion Router (Tor)</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 May 22 </td> <td> Slashdot</td> <td> <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> Tor Anonymity Network Reaches 100 Verified Nodes</a><br/> </td> </tr> <tr> <td> 2005 May 20 </td> <td> Security.uz</td> <td> <a href="http://security.uz/news/default.asp?id=10541"> Tor - мощный анонимайзер для всех ОС</a> (Russian)<br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 May 19 </td> <td> WebPlanet</td> <td> <a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor: распределенная система анонимного серфинга</a> (Russian)<br/> </td> </tr> <tr> <td> 2005 May 17 </td> <td> Wired</td> <td> <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> Tor Torches Online Tracking</a><br/> <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>ျဖင့္လည္းရသည္။ </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 May 17 </td> <td> XBiz</td> <td> <a href="http://xbiz.com/news/8761"> Navy Project Allows Anonymous Browsing</a><br/> </td> </tr> <tr> <td> 2005 Apr 13 </td> <td> Heise online</td> <td> <a href="http://www.heise.de/newsticker/meldung/58506"> CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 Apr 5 </td> <td> Libero</td> <td> <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> Anonimato on line, ecco Tor</a> (Italian)<br/> </td> </tr> <tr> <td> 2005 Jan 4 </td> <td> Internetnews</td> <td> <a href="http://www.internetnews.com/dev-news/article.php/3454521"> EFF Throws Support to 'Anonymous' Internet Project</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2005 Mar 31 </td> <td> Linux.com</td> <td> <a href="http://www.linux.com/articles/43713?tid=19&tid=78">Tor ျဖင့္ သင့္အြန္လိုင္းလံုၿခံဳေရးကို ကာကြယ္ၾကပါ</a><br/> </td> </tr> <tr> <td> 2004 Dec 27 </td> <td> BoingBoing</td> <td> <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> EFF helping produce anonymizing software</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Dec 25 </td> <td> Kansas City infozine</td> <td> <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> EFF Joins Forces with Tor Software Project</a><br/> </td> </tr> <tr> <td> 2004 Dec 23 </td> <td> golem.de</td> <td> <a href="http://www.golem.de/0412/35340.html"> EFF unterstützt Anonymisierer Tor</a> (German)<br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Dec 23 </td> <td> SuicideGirls</td> <td> <a href="http://suicidegirls.com/news/technology/6150/"> Routing အသစ္မွ software က အမည္မသိအင္တာနက္အသံုးျပဳသူမ်ားကို ခြင့္ျပဳေပးေနသည္</a><br/> </td> </tr> <tr> <td> 2004 Dec 18 </td> <td> P2Pnet</td> <td> <a href="http://p2pnet.net/story/3357"> EFF to sponsor Tor</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Dec 22 </td> <td> Slashdot</td> <td> <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17"> EFF Promotes Freenet-like System Tor</a><br/> </td> </tr> <tr> <td> 2004 Nov 16 </td> <td> AlterNet</td> <td> <a href="http://www.alternet.org/columnists/story/20523/"> Heavy Traffic</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Aug 30 </td> <td> Newsweek</td> <td> Technology: Instant Security (no link)<br/> </td> </tr> <tr> <td> 2004 Aug 16 </td> <td> Eweek</td> <td> <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">အင္တာနက္ Anonymity tool မ်ားကို မေၾကာက္ပါနဲ႔</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Aug 6 </td> <td> HCC magazine</td> <td> <a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen met hulp van marine VS</a> (Dutch)<br/> </td> </tr> <tr> <td> 2004 Aug 6 </td> <td> Golem</td> <td> <a href="http://www.golem.de/0408/32835.html"> Tor: Anonymisierer nutzt Onion-Routing</a><br/> </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Aug 5 </td> <td> Network World Security</td> <td> <a href="http://www.networkworld.com/details/7088.html"> Onion routing</a><br/> </td> </tr> <tr> <td> 2004 May 8 </td> <td> Wired</td> <td> <a href="http://www.wired.com/politics/security/news/2004/08/64464"> Onion Routing Averts Prying Eyes</a><br/> Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>. </td> </tr> <tr style="background-color: #e5e5e5;"> <td> 2004 Mar 8 </td> <td> CNET Japan blog</td> <td> <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">ဟက္ကာမ်ားႏွင့္ မလံုၿခံဳျခင္းမ်ားကို လြမ္းဆြတ္ျခင္း</a> (Japanese)<br/> </td> </tr> <tr> <td> 1999 Apr 13 </td> <td> Wired</td> <td> <a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> အမည္ေဖ်ာက္အင္တာနက္အသံုးျပဳမလား</a><br/> </td> </tr> </table> </div> #include <foot.wmi>