The first version of Tor in the media by Jeff.
Andrew Lewman

Andrew Lewman commited on 2008-03-05 03:12:27
Zeige 1 geänderte Dateien mit 793 Einfügungen und 0 Löschungen.

... ...
@@ -0,0 +1,793 @@
1
+## translation metadata
2
+# Revision: $Revision: 0 $
3
+
4
+#include "head.wmi" TITLE="Tor in the media" CHARSET="UTF-8"
5
+
6
+<div class="main-column">
7
+
8
+<h1>
9
+Tor in the media
10
+</h1>
11
+
12
+<h2>
13
+Interviews & Appearances
14
+</h2>
15
+
16
+<p>
17
+Major news organizations including the New York Times, Forbes,
18
+and the CBS Evening News have sought out or quoted Tor Project members
19
+due to their expertise on anonymity, privacy, and Internet censorship issues.
20
+Some samples:
21
+</p>
22
+
23
+
24
+<table border=0 cellpadding=3>
25
+
26
+<tr>
27
+  <td valign="top">
28
+    2008 Feb 01
29
+  </td>
30
+  <td>
31
+    <strong>PC World:</strong>
32
+    <a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
33
+    Hackers Can Expose Masked Surfers, Study Says</a><br>
34
+    A report on
35
+    <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
36
+    Stephen Murdoch's recent PhD thesis</a>. Stephen
37
+    <a href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
38
+    responds on the Tor Blog</a>.
39
+  </td>
40
+</tr>
41
+
42
+<tr>
43
+  <td valign="top" width="100">
44
+    2006 Apr 11
45
+  </td>
46
+  <td>
47
+    <strong>PBS Frontline:</strong>
48
+    <a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">
49
+    Chipping Away at China's Great Firewall</a><br>
50
+  </td>
51
+</tr>
52
+
53
+<tr>
54
+  <td valign="top">
55
+    2006 Feb 28
56
+  </td>
57
+  <td>
58
+    <strong>PC World:</strong>
59
+    <a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
60
+    Outsmarting the Online Privacy Snoops</a><br> 
61
+  </td>
62
+</tr>
63
+
64
+<tr>
65
+  <td valign="top">
66
+    2006 Feb 27
67
+  </td>
68
+  <td>
69
+    <strong>Forbes:</strong>
70
+    <a href="http://members.forbes.com/global/2006/0227/018A_2.html">
71
+    Cracks In the Wall</a><br>
72
+    Discussion of Tor being used for evading censorship by repressive governments. 
73
+  </td>
74
+</tr>
75
+
76
+<tr>
77
+  <td valign="top">
78
+    2006 Feb 20
79
+  </td>
80
+  <td>
81
+    <strong>The Boston Globe:</strong>
82
+    <a href="http://members.forbes.com/global/2006/0227/018A_2.html">
83
+    Beating censorship on the Internet</a><br>
84
+  </td>
85
+</tr>
86
+
87
+<tr>
88
+  <td valign="top">
89
+    2006 Feb 15
90
+  </td>
91
+  <td>
92
+    <strong>CBS Evening News:</strong> 
93
+    <a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
94
+    Cracking The 'Great Firewall Of China'</a><br>
95
+    Roger Dingledine appeared on the show to discuss Tor, starting at 1:04 into the video.
96
+  </td>
97
+</tr>
98
+
99
+<tr>
100
+  <td valign="top">
101
+    2006 Feb 15
102
+  </td>
103
+  <td>
104
+    <strong>CNBC - Closing Bell:</strong>
105
+    TV Appearance by Roger Dingledine at 4:25pm. (no link)<br> 
106
+  </td>
107
+</tr>
108
+
109
+<tr>
110
+  <td valign="top">
111
+    2006 Jan 27
112
+  </td>
113
+  <td>
114
+    <strong>Fox News / eWeek:</strong> 
115
+    <a href="http://www.foxnews.com/story/0,2933,183005,00.html">
116
+    Web Anonymizers Suddenly Get Very Popular</a><br>
117
+  </td>
118
+</tr>
119
+
120
+<tr>
121
+  <td valign="top">
122
+    2006 Jan 25
123
+  </td>
124
+  <td>
125
+    <strong>New York Times:</strong> 
126
+    <a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin">
127
+    Privacy for People Who Don't Show Their Navels</a><br>
128
+  </td>
129
+</tr>
130
+
131
+<tr>
132
+  <td valign="top">
133
+    2005 Aug 6
134
+  </td>
135
+  <td>
136
+    <strong>New Scientist:</strong>
137
+    <a href="URL">
138
+    Why we all need pornography</a><br>
139
+    <a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">
140
+    Full article text</a> also available.
141
+  </td>
142
+</tr>
143
+
144
+</table>
145
+
146
+
147
+
148
+<h2>
149
+Articles that involve Tor
150
+</h2>
151
+
152
+<p>
153
+Since Tor is widely used throughout the world, it is mentioned regularly in the press.
154
+This list is not comprehensive, but illustrates some of the significant
155
+Tor-related stories that have popped up.
156
+</p>
157
+
158
+<table border=0 cellpadding=3>
159
+
160
+<tr>
161
+  <td valign="top">
162
+    2008 Feb 14
163
+  </td>
164
+  <td>
165
+    <strong>Wired: Compiler Blog:</strong>
166
+    <a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
167
+    How To: Set Up Anonymous Browsing in 30 Seconds or Less</a><br> 
168
+  </td>
169
+</tr>
170
+
171
+<tr>
172
+  <td valign="top" width=100>
173
+    2007 Sep 21
174
+  </td>
175
+  <td>
176
+    <strong>Wired HowTo Blog:</strong> 
177
+    <a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
178
+    Be a Whistleblower</a><br>
179
+    Wired recommends Tor for whistleblowers who wish to remain anonymous.
180
+  </td>
181
+</tr>
182
+
183
+<tr>
184
+  <td valign="top">
185
+    2007 Sep 16
186
+  </td>
187
+  <td>
188
+    <strong>Cnet:</strong> 
189
+    <a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?">
190
+    Tor anonymity server admin arrested</a><br>
191
+    A Tor exit node operator from Germany was arrested and then released once the police realized
192
+    their mistake. Unfortunately, the hassle
193
+    <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html">
194
+    caused this operator to shut down the node</a>.
195
+    We have an
196
+    <a href="<page faq-abuse>">
197
+    Abuse FAQ for Tor Relay Operators</a>,
198
+    as well as a
199
+    <a href="page eff/tor-legal-faq>">
200
+    Legal FAQ for Tor Relay Operators</a>
201
+    with advice on how to handle such issues if you are operating a Tor relay.
202
+  </td>
203
+</tr>
204
+
205
+<tr>
206
+  <td valign="top">
207
+    2007 Sep 10
208
+  </td>
209
+  <td>
210
+    <strong>Wired:</strong> 
211
+    <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
212
+    Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br>
213
+    Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node
214
+    he was running, then published unencrypted account and password information.
215
+    Note that the better articles covering this event correctly indicate that this is not a security
216
+    flaw or design problem with Tor - Tor provides anonymity, but does not
217
+    encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while
218
+    browsing to ensure end-to-end encryption.
219
+    Also covered in
220
+    <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
221
+    The Inquirer</a>,
222
+    <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
223
+    InfoWorld</a>,
224
+    <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
225
+    The Sydney Morning Herald</a>,
226
+    <a href="http://www.securityfocus.com/news/11486">
227
+    Security Focus</a>,
228
+    <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
229
+    ars technica</a>,
230
+    and many others. It was reported as early as August 31, 2007 on the
231
+    <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
232
+    Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.
233
+    In the end, Mr. Egerstad was arrested, which was covered by
234
+    <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
235
+    The Register</a>,
236
+    <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
237
+    The Sydney Morning Herald</a>,
238
+    <a href="http://blogs.zdnet.com/Berlind/?p=900">
239
+    ZDNet</a>, and
240
+    <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html">
241
+    Wired Blog</a>.
242
+  </td>
243
+</tr>
244
+
245
+<tr>
246
+  <td valign="top">
247
+    2007 Jul 27
248
+  </td>
249
+  <td>
250
+    <strong>Wired Blog:</strong> 
251
+    <a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html">
252
+    Cyber Jihadists Embrace Tor</a><br>
253
+    A pointer to a
254
+    <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
255
+    blog</a>
256
+    that posted screenshots of Arabic instructions on using
257
+    Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
258
+    at the bottom of the article.
259
+  </td>
260
+</tr>
261
+
262
+<tr>
263
+  <td valign="top">
264
+    2007 Jun 22
265
+  </td>
266
+  <td>
267
+    <strong>Bangkok Post:</strong>
268
+    <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
269
+    The problems with censorship</a><br>
270
+    Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
271
+  </td>
272
+</tr>
273
+
274
+<tr>
275
+  <td valign="top">
276
+    2007 Mar 15
277
+  </td>
278
+  <td>
279
+    <strong>World Changing:</strong> 
280
+    <a href="http://www.worldchanging.com/archives/006309.html">
281
+    Blogging Where Speech Isn’t Free</a><br>
282
+    Coverage of Tor Executive Director Shava Nerad's participation at an
283
+    <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124">
284
+    SXSW panel</a>, where she explained how Tor can help bloggers.
285
+  </td>
286
+</tr>
287
+
288
+<tr>
289
+  <td valign="top">
290
+    2007 Mar 8
291
+  </td>
292
+  <td>
293
+    <strong>Security Focus:</strong> 
294
+    <a href="http://www.securityfocus.com/news/11447/1">
295
+    Tor hack proposed to catch criminals</a><br>
296
+    Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the
297
+    Tor Project illustrating why this approach may not be a good idea.
298
+  </td>
299
+</tr>
300
+
301
+<tr>
302
+  <td valign="top">
303
+    2007 Feb 1
304
+  </td>
305
+  <td>
306
+    <strong>Dr Dobb's:</strong> 
307
+    <a href="http://www.ddj.com/security/197002414">
308
+    Tor Project Protects Anonymous Sources</a><br>
309
+    An introduction to Tor, including technical and historical background.
310
+  </td>
311
+</tr>
312
+
313
+<tr>
314
+  <td valign="top">
315
+    2006 Oct 19
316
+  </td>
317
+  <td>
318
+    <strong>Wired Threat Level:</strong> 
319
+    <a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
320
+    The Onion Router (TOR) is Leaky (Leeky)</a><br>
321
+    Explains why you need something like Privoxy
322
+    in addition to the core Tor code to ensure your anonymity. If you use the
323
+    Vidalia bundle, it installs and configures Privoxy automatically, but it can't
324
+    hurt to understand why it is necessary.
325
+  </td>
326
+</tr>
327
+
328
+<tr>
329
+  <td valign="top">
330
+    2006 Aug 18
331
+  </td>
332
+  <td>
333
+    <strong>NPR:</strong> 
334
+    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
335
+    Tips for Protecting Privacy Online</a><br>
336
+    Kevin Bankston of the EFF recommends Tor during an NPR interview.
337
+    Tor information begins at 8:15 into the program.
338
+  </td>
339
+</tr>
340
+
341
+<tr>
342
+  <td valign="top">
343
+    2006 Jul 5
344
+  </td>
345
+  <td>
346
+    <strong>MSNBC:</strong> 
347
+    <a href="http://www.msnbc.msn.com/id/13718446/page/2/">
348
+    Defending liberties in high-tech world</a><br>
349
+    Mentions EFF funding for Tor as one of its significant nonlitigation projects.
350
+  </td>
351
+</tr>
352
+
353
+<tr>
354
+  <td valign="top">
355
+    2006 Feb 15
356
+  </td>
357
+  <td>
358
+    <strong>Network Secure:</strong>
359
+    <a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909">
360
+    Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br> 
361
+  </td>
362
+</tr>
363
+
364
+<tr>
365
+  <td valign="top">
366
+    2006 Feb 13
367
+  </td>
368
+  <td>
369
+    <strong>Wall Street Journal:</strong> 
370
+    <a href="http://online.wsj.com/article/SB113979965346572150.html">
371
+    Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br>
372
+    Full article text can also be found
373
+    <a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.
374
+  </td>
375
+</tr>
376
+
377
+<tr>
378
+  <td valign="top">
379
+    2006 Jan 31
380
+  </td>
381
+  <td>
382
+    <strong>Technology Review:</strong> 
383
+    <a href="http://www.technologyreview.com/Infotech/16216/page2/">
384
+    Evading the Google Eye</a><br>
385
+  </td>
386
+</tr>
387
+
388
+<tr>
389
+  <td valign="top">
390
+    2006 Jan 29
391
+  </td>
392
+  <td>
393
+    <strong>New York Times:</strong> 
394
+    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
395
+    How to Outwit the World's Internet Censors</a><br>
396
+  </td>
397
+</tr>
398
+
399
+<tr>
400
+  <td valign="top">
401
+    2006 Jan 23
402
+  </td>
403
+  <td>
404
+    <strong>NPR Talk of the Nation:</strong> 
405
+    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
406
+    Search Engines and Privacy Rights on the Web</a><br>
407
+    <a href="http://xeni.net/">Xeni Jardin</a>
408
+    recommends Tor at 33:30 into the program.
409
+  </td>
410
+</tr>
411
+
412
+<tr>
413
+  <td valign="top">
414
+    2006 Feb 15
415
+  </td>
416
+  <td>
417
+    <strong>Punto Informatico:</strong>
418
+    <a href="http://punto-informatico.it/p.aspx?i=1430903">
419
+    TOR c'è</a> (Italian)<br> 
420
+  </td>
421
+</tr>
422
+
423
+<tr>
424
+  <td valign="top">
425
+    2006 Jan 20
426
+  </td>
427
+  <td>
428
+    <strong>Wired:</strong>
429
+    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
430
+    How to Foil Search Engine Snoops</a><br> 
431
+  </td>
432
+</tr>
433
+
434
+<tr>
435
+  <td valign="top">
436
+    2006 Jan 20
437
+  </td>
438
+  <td>
439
+    <strong>NPR:</strong> 
440
+    <a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
441
+    Google Records Subpoena Raises Privacy Fears</a><br>
442
+  </td>
443
+</tr>
444
+
445
+<tr>
446
+  <td valign="top">
447
+    2005 Sep 30
448
+  </td>
449
+  <td>
450
+    <strong>Viva o Linux:</strong>
451
+    <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
452
+    TOR: A Internet sem rastreabilidade</a> (Portuguese)<br> 
453
+  </td>
454
+</tr>
455
+
456
+<tr>
457
+  <td valign="top">
458
+    2005 Jul 12
459
+  </td>
460
+  <td>
461
+    <strong>IEEE Computer Society's Technical Committee on Security and Privacy:</strong>
462
+    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
463
+    Onion routing application Tor makes PCWorld's top 100</a><br> 
464
+  </td>
465
+</tr>
466
+
467
+<tr>
468
+  <td valign="top">
469
+    2005 Jun 22
470
+  </td>
471
+  <td>
472
+    <strong>The Unofficial Apple Blog:</strong>
473
+    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
474
+    Privacy Watch: Tor</a><br> 
475
+  </td>
476
+</tr>
477
+
478
+<tr>
479
+  <td valign="top">
480
+    2005 Jun 10
481
+  </td>
482
+  <td>
483
+    <strong>The New Zealand Herald:</strong>
484
+    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896">
485
+    China's internet censorship stranglehold can't last</a><br> 
486
+  </td>
487
+</tr>
488
+
489
+<tr>
490
+  <td valign="top">
491
+    2005 Jun 8
492
+  </td>
493
+  <td>
494
+    <strong>American Public Radio:</strong>
495
+    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
496
+    An Internet privacy tool called "Tor"</a><br> 
497
+  </td>
498
+</tr>
499
+
500
+<tr>
501
+  <td valign="top">
502
+    2005 Jun 1
503
+  </td>
504
+  <td>
505
+    <strong>PC World:</strong>
506
+    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
507
+    The 100 Best Products of 2005</a><br>
508
+    Tor is ranked #40 on the list. 
509
+  </td>
510
+</tr>
511
+
512
+<tr>
513
+  <td valign="top">
514
+    2005 Jun 1
515
+  </td>
516
+  <td>
517
+    <strong>Linux Weekly News:</strong>
518
+    <a href="http://lwn.net/Articles/138242/">
519
+    A Look at The Onion Router (Tor)</a><br> 
520
+  </td>
521
+</tr>
522
+
523
+<tr>
524
+  <td valign="top">
525
+    2005 May 22
526
+  </td>
527
+  <td>
528
+    <strong>Slashdot:</strong>
529
+    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
530
+     Tor Anonymity Network Reaches 100 Verified Nodes</a><br> 
531
+  </td>
532
+</tr>
533
+
534
+<tr>
535
+  <td valign="top">
536
+    2005 May 20
537
+  </td>
538
+  <td>
539
+    <strong>Security.uz:</strong>
540
+    <a href="http://security.uz/news/default.asp?id=10541">
541
+    Tor - мощный анонимайзер для всех ОС</a> (Russian)<br> 
542
+  </td>
543
+</tr>
544
+
545
+<tr>
546
+  <td valign="top">
547
+    2005 May 19
548
+  </td>
549
+  <td>
550
+    <strong>WebPlanet:</strong>
551
+    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
552
+    Tor: распределенная система анонимного серфинга</a> (Russian)<br> 
553
+  </td>
554
+</tr>
555
+
556
+<tr>
557
+  <td valign="top">
558
+    2005 May 17
559
+  </td>
560
+  <td>
561
+    <strong>Wired:</strong> 
562
+    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
563
+    Tor Torches Online Tracking</a><br>
564
+    Also available in
565
+    <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.
566
+  </td>
567
+</tr>
568
+
569
+<tr>
570
+  <td valign="top">
571
+    2005 May 17
572
+  </td>
573
+  <td>
574
+    <strong>XBiz:</strong>
575
+    <a href="http://xbiz.com/news/8761">
576
+    Navy Project Allows Anonymous Browsing</a><br> 
577
+  </td>
578
+</tr>
579
+
580
+<tr>
581
+  <td valign="top">
582
+    2005 Apr 13
583
+  </td>
584
+  <td>
585
+    <strong>Heise online:</strong>
586
+    <a href="http://www.heise.de/newsticker/meldung/58506">
587
+    CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br> 
588
+  </td>
589
+</tr>
590
+
591
+<tr>
592
+  <td valign="top">
593
+    2005 Apr 5
594
+  </td>
595
+  <td>
596
+    <strong>Libero:</strong>
597
+    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
598
+    Anonimato on line, ecco Tor</a> (Italian)<br> 
599
+  </td>
600
+</tr>
601
+
602
+<tr>
603
+  <td valign="top">
604
+    2005 Jan 4
605
+  </td>
606
+  <td>
607
+    <strong>Internetnews:</strong>
608
+    <a href="http://www.internetnews.com/dev-news/article.php/3454521">
609
+    EFF Throws Support to 'Anonymous' Internet Project</a><br> 
610
+  </td>
611
+</tr>
612
+
613
+<tr>
614
+  <td valign="top">
615
+    2005 Mar 31
616
+  </td>
617
+  <td>
618
+    <strong>Linux.com:</strong>
619
+    <a href="http://www.linux.com/articles/43713?tid=19&tid=78">
620
+    Securing your online privacy with Tor</a><br> 
621
+  </td>
622
+</tr>
623
+
624
+<tr>
625
+  <td valign="top">
626
+    2004 Dec 27
627
+  </td>
628
+  <td>
629
+    <strong>BoingBoing:</strong>
630
+    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
631
+    EFF helping produce anonymizing software</a><br> 
632
+  </td>
633
+</tr>
634
+
635
+<tr>
636
+  <td valign="top">
637
+    2004 Dec 25
638
+  </td>
639
+  <td>
640
+    <strong>Kansas City infozine:</strong>
641
+    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
642
+    EFF Joins Forces with Tor Software Project</a><br> 
643
+  </td>
644
+</tr>
645
+
646
+<tr>
647
+  <td valign="top">
648
+    2004 Dec 23
649
+  </td>
650
+  <td>
651
+    <strong>golem.de:</strong>
652
+    <a href="http://www.golem.de/0412/35340.html">
653
+    EFF unterstützt Anonymisierer Tor</a> (German)<br> 
654
+  </td>
655
+</tr>
656
+
657
+<tr>
658
+  <td valign="top">
659
+    2004 Dec 23
660
+  </td>
661
+  <td>
662
+    <strong>SuicideGirls:</strong>
663
+    <a href="http://suicidegirls.com/news/technology/6150/">
664
+    New Routing Software Allows Anonymous Internet Use</a><br> 
665
+  </td>
666
+</tr>
667
+
668
+<tr>
669
+  <td valign="top">
670
+    2004 Dec 18
671
+  </td>
672
+  <td>
673
+    <strong>P2Pnet:</strong>
674
+    <a href="http://p2pnet.net/story/3357">
675
+    EFF to sponsor Tor</a><br> 
676
+  </td>
677
+</tr>
678
+
679
+<tr>
680
+  <td valign="top">
681
+    2004 Dec 22
682
+  </td>
683
+  <td>
684
+    <strong>Slashdot:</strong>
685
+    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17">
686
+     EFF Promotes Freenet-like System Tor</a><br> 
687
+  </td>
688
+</tr>
689
+
690
+<tr>
691
+  <td valign="top">
692
+    2004 Nov 16
693
+  </td>
694
+  <td>
695
+    <strong>AlterNet:</strong>
696
+    <a href="http://www.alternet.org/columnists/story/20523/">
697
+    Heavy Traffic</a><br> 
698
+  </td>
699
+</tr>
700
+
701
+<tr>
702
+  <td valign="top">
703
+    2004 Aug 30
704
+  </td>
705
+  <td>
706
+    <strong>Newsweek:</strong>
707
+    Technology: Instant Security (no link)<br> 
708
+  </td>
709
+</tr>
710
+
711
+<tr>
712
+  <td valign="top">
713
+    2004 Aug 16
714
+  </td>
715
+  <td>
716
+    <strong>Eweek:</strong>
717
+    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
718
+    Don't Fear Internet Anonymity Tools</a><br> 
719
+  </td>
720
+</tr>
721
+
722
+<tr>
723
+  <td valign="top">
724
+    2004 Aug 6
725
+  </td>
726
+  <td>
727
+    <strong>HCC magazine:</strong>
728
+    <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063">
729
+    Anoniem surfen met hulp van marine VS</a> (Dutch)<br> 
730
+  </td>
731
+</tr>
732
+
733
+<tr>
734
+  <td valign="top">
735
+    2004 Aug 6
736
+  </td>
737
+  <td>
738
+    <strong>Golem:</strong>
739
+    <a href="http://www.golem.de/0408/32835.html">
740
+    Tor: Anonymisierer nutzt Onion-Routing</a><br> 
741
+  </td>
742
+</tr>
743
+
744
+<tr>
745
+  <td valign="top">
746
+    2004 Aug 5
747
+  </td>
748
+  <td>
749
+    <strong>Network World Security:</strong>
750
+    <a href="http://www.networkworld.com/details/7088.html">
751
+    Onion routing</a><br> 
752
+  </td>
753
+</tr>
754
+
755
+<tr>
756
+  <td valign="top">
757
+    2004 May 8
758
+  </td>
759
+  <td>
760
+    <strong>Wired:</strong>
761
+    <a href="http://www.wired.com/politics/security/news/2004/08/64464">
762
+    Onion Routing Averts Prying Eyes</a><br>
763
+    Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.
764
+  </td>
765
+</tr>
766
+
767
+<tr>
768
+  <td valign="top">
769
+    2004 Mar 8
770
+  </td>
771
+  <td>
772
+    <strong>CNET Japan blog:</strong>
773
+    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
774
+    Yearning of hackers and insecurity</a> (Japanese)<br> 
775
+  </td>
776
+</tr>
777
+
778
+<tr>
779
+  <td valign="top">
780
+    1999 Apr 13
781
+  </td>
782
+  <td>
783
+    <strong>Wired:</strong>
784
+    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
785
+    Anonymous Web Surfing? Uh-Uh</a><br> 
786
+  </td>
787
+</tr>
788
+
789
+</table>
790
+
791
+</div>
792
+
793
+#include <foot.wmi>
0 794