Andrew Lewman commited on 2012-10-17 22:10:15
              Zeige 1 geänderte Dateien mit 9 Einfügungen und 1 Löschungen.
            
| ... | ... | 
                      @@ -32,6 +32,13 @@ newest to oldest: </p>  | 
                  
| 32 | 32 | 
                        <th>Topic</th>  | 
                    
| 33 | 33 | 
                        </tr>  | 
                    
| 34 | 34 | 
                        </thead>  | 
                    
| 35 | 
                        +<tr>  | 
                    |
| 36 | 
                        +<td>2012 Oct</td>  | 
                    |
| 37 | 
                        +<td>Delta Airlines Sky Magazine</td>  | 
                    |
| 38 | 
                        +<td><a  | 
                    |
| 39 | 
                        +href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-  | 
                    |
| 40 | 
                        +Sight.aspx">Hidden in Plain Sight</a></td>  | 
                    |
| 41 | 
                        +</tr>  | 
                    |
| 35 | 42 | 
                        <tr style="background-color: #e5e5e5;">  | 
                    
| 36 | 43 | 
                        <td>2012 Sep 19</td>  | 
                    
| 37 | 44 | 
                        <td>infoBAE</td>  | 
                    
| ... | ... | 
                      @@ -795,7 +802,8 @@ responds on the Tor Blog</a>.</td>  | 
                  
| 795 | 802 | 
                        <tr style="background-color: #e5e5e5;">  | 
                    
| 796 | 803 | 
                        <td>2007 Sep 10</td>  | 
                    
| 797 | 804 | 
                        <td>Wired</td>  | 
                    
| 798 | 
                        -<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information. Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption. Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.</td>  | 
                    |
| 805 | 
                        +<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information. Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption. Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#  | 
                    |
| 806 | 
                        +contentSwap2">The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.</td>  | 
                    |
| 799 | 807 | 
                        </tr>  | 
                    
| 800 | 808 | 
                        <tr>  | 
                    
| 801 | 809 | 
                        <td>2007 Jul 27</td>  | 
                    
| 802 | 810 |