Andrew Lewman commited on 2008-03-09 04:03:21
Zeige 1 geänderte Dateien mit 276 Einfügungen und 294 Löschungen.
... | ... |
@@ -1,11 +1,11 @@ |
1 | 1 |
## translation metadata |
2 | 2 |
# Revision: $Revision: 0 $ |
3 | 3 |
|
4 |
-#include "head.wmi" TITLE="Tor in the media" CHARSET="UTF-8" |
|
4 |
+#include "head.wmi" TITLE="Media Appearances of The Tor Project" CHARSET="UTF-8" |
|
5 | 5 |
|
6 | 6 |
<div class="main-column"> |
7 | 7 |
|
8 |
-<h1>Tor in the media</h1> |
|
8 |
+<h1>Media Appearances</h1> |
|
9 | 9 |
|
10 | 10 |
<h2>Interviews & Appearances</h2> |
11 | 11 |
|
... | ... |
@@ -14,175 +14,172 @@ and the CBS Evening News have sought out or quoted Tor Project members |
14 | 14 |
due to their expertise on anonymity, privacy, and Internet censorship issues. |
15 | 15 |
Some samples: </p> |
16 | 16 |
|
17 |
-<dl> |
|
18 |
-<dt>2008 Feb 01, PC World</dt> |
|
19 |
-<dd><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
17 |
+<table border="0" cellpadding="3" cellspacing="0"> |
|
18 |
+<thead bgcolor="#e5e5e5"> |
|
19 |
+<th>Date</th> |
|
20 |
+<th>Publication</th> |
|
21 |
+<th>Topic</th> |
|
22 |
+</thead> |
|
23 |
+ |
|
24 |
+<tr> |
|
25 |
+<td>2008 Feb 01</td> |
|
26 |
+<td>PC World</td> |
|
27 |
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
20 | 28 |
Hackers Can Expose Masked Surfers, Study Says</a> |
21 | 29 |
A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
22 | 30 |
Steven Murdoch's recent PhD thesis</a>. Steven <a |
23 | 31 |
href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
24 |
-responds on the Tor Blog</a>.</dd> |
|
25 |
-<dt>2006 Apr 11, PBS Frontline</dt> |
|
26 |
-<dd><a |
|
32 |
+responds on the Tor Blog</a>.</td> |
|
33 |
+</tr> |
|
34 |
+<tr bgcolor="#e5e5e5"> |
|
35 |
+<td>2006 Apr 11</td> |
|
36 |
+<td>PBS Frontline</td> |
|
37 |
+<td><a |
|
27 | 38 |
href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
28 |
-Chipping Away at China's Great Firewall</a></dd> |
|
29 |
-<dt>2006 Feb 28, PC World</dt> |
|
30 |
-<dd><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
31 |
-Outsmarting the Online Privacy Snoops</a></dd> |
|
32 |
-<dt>2006 Feb 27, Forbes</dt> |
|
33 |
-<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
39 |
+Chipping Away at China's Great Firewall</a></td> |
|
40 |
+</tr> |
|
41 |
+<tr> |
|
42 |
+<td>2006 Feb 28</td> |
|
43 |
+<td>PC World</td> |
|
44 |
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
45 |
+Outsmarting the Online Privacy Snoops</a></td> |
|
46 |
+</tr> |
|
47 |
+<tr bgcolor="#e5e5e5"> |
|
48 |
+<td>2006 Feb 27</td> |
|
49 |
+<td>Forbes</td> |
|
50 |
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
34 | 51 |
Cracks In the Wall</a>. Discussion of Tor being used for evading censorship by repressive |
35 |
-governments. </dd> |
|
36 |
-<dt>2006 Feb 20, The Boston Globe</dt> |
|
37 |
-<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
38 |
-Beating censorship on the Internet</a></dd> |
|
39 |
-<dt>2006 Feb 15, CBS Evening News</dt> |
|
40 |
-<dd><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
41 |
- Cracking The 'Great Firewall Of China'</a>. |
|
42 |
- Roger Dingledine appeared on the show to discuss Tor, starting at |
|
43 |
-1:04 into the video.</dd> |
|
44 |
-<dt>2006 Feb 15, CNBC - Closing Bell</dt> |
|
45 |
-<dd>TV Appearance by Roger Dingledine at 4:25pm. (no link)</dd> |
|
46 |
-<dt>2006 Jan 27, Fox News/eWeek</dt> |
|
47 |
-<dd><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
|
48 |
-Anonymizers Suddenly Get Very Popular</a></dd> |
|
49 |
-<dt>2006 Jan 25, New York Times</dt> |
|
50 |
-<dd><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
51 |
- Privacy for People Who Don't Show Their Navels</a></dd> |
|
52 |
-<dt>2005 Aug 6, New Scientist</dt> |
|
53 |
-<dd><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></dd> |
|
54 |
-</dl> |
|
52 |
+governments. </td> |
|
53 |
+</tr> |
|
54 |
+<tr> |
|
55 |
+<td>2006 Feb 20</td> |
|
56 |
+<td>The Boston Globe</td> |
|
57 |
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
58 |
+Beating censorship on the Internet</a></td> |
|
59 |
+</tr> |
|
60 |
+<tr bgcolor="#e5e5e5"> |
|
61 |
+<td>2006 Feb 15</td> |
|
62 |
+<td>CBS Evening News</td> |
|
63 |
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
64 |
+Cracking The 'Great Firewall Of China'</a>. Roger Dingledine appeared on the show to discuss Tor, starting at |
|
65 |
+1:04 into the video.</td> |
|
66 |
+</tr> |
|
67 |
+<tr> |
|
68 |
+<td>2006 Feb 15</td> |
|
69 |
+<td>CNBC - Closing Bell</td> |
|
70 |
+<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td> |
|
71 |
+</tr> |
|
72 |
+<tr bgcolor="#e5e5e5"> |
|
73 |
+<td>2006 Jan 27</td> |
|
74 |
+<td>Fox News/eWeek</td> |
|
75 |
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
|
76 |
+Anonymizers Suddenly Get Very Popular</a></td> |
|
77 |
+</tr> |
|
78 |
+<tr> |
|
79 |
+<td>2006 Jan 25</td> |
|
80 |
+<td>New York Times</td> |
|
81 |
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
82 |
+Privacy for People Who Don't Show Their Navels</a></td> |
|
83 |
+</tr> |
|
84 |
+<tr bgcolor="#e5e5e5"> |
|
85 |
+<td>2005 Aug 6</td> |
|
86 |
+<td>New Scientist</td> |
|
87 |
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td> |
|
88 |
+</tr> |
|
89 |
+</table> |
|
55 | 90 |
|
56 | 91 |
<p /> |
57 |
-<h2>Articles that involve Tor</h2> |
|
92 |
+<h2>Articles</h2> |
|
58 | 93 |
|
59 | 94 |
<p> Since Tor is widely used throughout the world, it is mentioned regularly in the press. |
60 | 95 |
This list is not comprehensive, but illustrates some of the significant |
61 | 96 |
Tor-related stories that have popped up. </p> |
62 | 97 |
|
63 |
-<table border=0 cellpadding=3> |
|
98 |
+<table border="0" cellpadding="3" cellspacing="0"> |
|
99 |
+<thead bgcolor="#e5e5e5"> |
|
100 |
+<th>Date</th> |
|
101 |
+<th>Publication</th> |
|
102 |
+<th>Topic</th> |
|
103 |
+</thead> |
|
64 | 104 |
|
65 | 105 |
<tr> |
66 |
- <td valign="top"> |
|
67 |
- 2008 Feb 14 |
|
68 |
- </td> |
|
69 |
- <td> |
|
70 |
- <strong>Wired: Compiler Blog:</strong> |
|
71 |
- <a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> |
|
72 |
- How To: Set Up Anonymous Browsing in 30 Seconds or Less</a><br> |
|
106 |
+<td>2008 Feb 14</td> |
|
107 |
+<td>Wired: Compiler Blog</td> |
|
108 |
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> |
|
109 |
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>. |
|
73 | 110 |
</td> |
74 | 111 |
</tr> |
75 | 112 |
|
76 |
-<tr> |
|
77 |
- <td valign="top" width=100> |
|
78 |
- 2007 Sep 21 |
|
79 |
- </td> |
|
80 |
- <td> |
|
81 |
- <strong>Wired HowTo Blog:</strong> |
|
82 |
- <a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work"> |
|
83 |
- Be a Whistleblower</a><br> |
|
84 |
- Wired recommends Tor for whistleblowers who wish to remain anonymous. |
|
113 |
+<tr bgcolor="#e5e5e5"> |
|
114 |
+<td>2007 Sep 21</td> |
|
115 |
+<td>Wired HowTo Blog</td> |
|
116 |
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work"> |
|
117 |
+Be a Whistleblower</a>. Wired recommends Tor for whistleblowers who wish to remain anonymous. |
|
85 | 118 |
</td> |
86 | 119 |
</tr> |
87 | 120 |
|
88 | 121 |
<tr> |
89 |
- <td valign="top"> |
|
90 |
- 2007 Sep 16 |
|
91 |
- </td> |
|
92 |
- <td> |
|
93 |
- <strong>Cnet:</strong> |
|
94 |
- <a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?"> |
|
95 |
- Tor anonymity server admin arrested</a><br> |
|
96 |
- A Tor exit node operator from Germany was arrested and then released once the police realized |
|
97 |
- their mistake. Unfortunately, the hassle |
|
98 |
- <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> |
|
99 |
- caused this operator to shut down the node</a>. |
|
100 |
- We have an |
|
101 |
- <a href="<page faq-abuse>"> |
|
102 |
- Abuse FAQ for Tor Relay Operators</a>, |
|
103 |
- as well as a |
|
104 |
- <a href="page eff/tor-legal-faq>"> |
|
105 |
- Legal FAQ for Tor Relay Operators</a> |
|
106 |
- with advice on how to handle such issues if you are operating a Tor relay. |
|
122 |
+<td>2007 Sep 16</td> |
|
123 |
+<td>Cnet</td> |
|
124 |
+<td><a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?"> |
|
125 |
+ Tor anonymity server admin arrested</a>. A Tor exit node operator from Germany was arrested and then released once the police realized |
|
126 |
+ their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>. |
|
127 |
+ We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="page eff/tor-legal-faq>"> |
|
128 |
+ Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay. |
|
107 | 129 |
</td> |
108 | 130 |
</tr> |
109 | 131 |
|
110 |
-<tr> |
|
111 |
- <td valign="top"> |
|
112 |
- 2007 Sep 10 |
|
113 |
- </td> |
|
114 |
- <td> |
|
115 |
- <strong>Wired:</strong> |
|
116 |
- <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> |
|
132 |
+<tr bgcolor="#e5e5e5"> |
|
133 |
+<td>2007 Sep 10</td> |
|
134 |
+<td>Wired</td> |
|
135 |
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> |
|
117 | 136 |
Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br> |
118 | 137 |
Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node |
119 | 138 |
he was running, then published unencrypted account and password information. |
120 | 139 |
Note that the better articles covering this event correctly indicate that this is not a security |
121 | 140 |
flaw or design problem with Tor - Tor provides anonymity, but does not |
122 |
- encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while |
|
141 |
+encrypt anything going to or from an exit node. You must</strong> use SSL (https) while |
|
123 | 142 |
browsing to ensure end-to-end encryption. |
124 | 143 |
Also covered in |
125 | 144 |
<a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> |
126 |
- The Inquirer</a>, |
|
127 |
- <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> |
|
128 |
- InfoWorld</a>, |
|
129 |
- <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2"> |
|
145 |
+The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> |
|
146 |
+InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2"> |
|
130 | 147 |
The Sydney Morning Herald</a>, |
131 | 148 |
<a href="http://www.securityfocus.com/news/11486"> |
132 |
- Security Focus</a>, |
|
133 |
- <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> |
|
134 |
- ars technica</a>, |
|
135 |
- and many others. It was reported as early as August 31, 2007 on the |
|
149 |
+Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> |
|
150 |
+ars technica</a>, and many others. It was reported as early as August 31, 2007 on the |
|
136 | 151 |
<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> |
137 | 152 |
Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. |
138 | 153 |
In the end, Mr. Egerstad was arrested, which was covered by |
139 | 154 |
<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> |
140 |
- The Register</a>, |
|
141 |
- <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> |
|
142 |
- The Sydney Morning Herald</a>, |
|
143 |
- <a href="http://blogs.zdnet.com/Berlind/?p=900"> |
|
144 |
- ZDNet</a>, and |
|
145 |
- <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> |
|
146 |
- Wired Blog</a>. |
|
155 |
+The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> |
|
156 |
+The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> |
|
157 |
+ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>. |
|
147 | 158 |
</td> |
148 | 159 |
</tr> |
149 | 160 |
|
150 | 161 |
<tr> |
151 |
- <td valign="top"> |
|
152 |
- 2007 Jul 27 |
|
153 |
- </td> |
|
154 |
- <td> |
|
155 |
- <strong>Wired Blog:</strong> |
|
156 |
- <a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> |
|
157 |
- Cyber Jihadists Embrace Tor</a><br> |
|
158 |
- A pointer to a |
|
159 |
- <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> |
|
160 |
- blog</a> |
|
161 |
- that posted screenshots of Arabic instructions on using |
|
162 |
- Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply |
|
162 |
+<td>2007 Jul 27</td> |
|
163 |
+<td>Wired Blog</td> |
|
164 |
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br> |
|
165 |
+A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> |
|
166 |
+blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply |
|
163 | 167 |
at the bottom of the article. |
164 | 168 |
</td> |
165 | 169 |
</tr> |
166 | 170 |
|
167 |
-<tr> |
|
168 |
- <td valign="top"> |
|
169 |
- 2007 Jun 22 |
|
170 |
- </td> |
|
171 |
- <td> |
|
172 |
- <strong>Bangkok Post:</strong> |
|
173 |
- <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> |
|
174 |
- The problems with censorship</a><br> |
|
175 |
- Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship. |
|
171 |
+<tr bgcolor="#e5e5e5"> |
|
172 |
+<td>2007 Jun 22</td> |
|
173 |
+<td>Bangkok Post</td> |
|
174 |
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> |
|
175 |
+The problems with censorship</a>. Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship. |
|
176 | 176 |
</td> |
177 | 177 |
</tr> |
178 | 178 |
|
179 | 179 |
<tr> |
180 |
- <td valign="top"> |
|
181 |
- 2007 Mar 15 |
|
182 |
- </td> |
|
183 |
- <td> |
|
184 |
- <strong>World Changing:</strong> |
|
185 |
- <a href="http://www.worldchanging.com/archives/006309.html"> |
|
180 |
+<td>2007 Mar 15</td> |
|
181 |
+<td>World Changing</td> |
|
182 |
+<td><a href="http://www.worldchanging.com/archives/006309.html"> |
|
186 | 183 |
Blogging Where Speech Isn’t Free</a><br> |
187 | 184 |
Coverage of former Tor Executive Director Shava Nerad's participation at an |
188 | 185 |
<a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124"> |
... | ... |
@@ -190,39 +187,30 @@ Tor-related stories that have popped up. </p> |
190 | 187 |
</td> |
191 | 188 |
</tr> |
192 | 189 |
|
193 |
-<tr> |
|
194 |
- <td valign="top"> |
|
195 |
- 2007 Mar 8 |
|
196 |
- </td> |
|
197 |
- <td> |
|
198 |
- <strong>Security Focus:</strong> |
|
199 |
- <a href="http://www.securityfocus.com/news/11447/1"> |
|
200 |
- Tor hack proposed to catch criminals</a><br> |
|
190 |
+<tr bgcolor="#e5e5e5"> |
|
191 |
+<td>2007 Mar 8</td> |
|
192 |
+<td>Security Focus</td> |
|
193 |
+<td><a href="http://www.securityfocus.com/news/11447/1"> |
|
194 |
+Tor hack proposed to catch criminals</a>. |
|
201 | 195 |
Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the |
202 | 196 |
Tor Project illustrating why this approach may not be a good idea. |
203 | 197 |
</td> |
204 | 198 |
</tr> |
205 | 199 |
|
206 | 200 |
<tr> |
207 |
- <td valign="top"> |
|
208 |
- 2007 Feb 1 |
|
209 |
- </td> |
|
210 |
- <td> |
|
211 |
- <strong>Dr Dobb's:</strong> |
|
212 |
- <a href="http://www.ddj.com/security/197002414"> |
|
213 |
- Tor Project Protects Anonymous Sources</a><br> |
|
201 |
+<td>2007 Feb 1</td> |
|
202 |
+<td>Dr Dobb's</td> |
|
203 |
+<td><a href="http://www.ddj.com/security/197002414"> |
|
204 |
+Tor Project Protects Anonymous Sources</a>. |
|
214 | 205 |
An introduction to Tor, including technical and historical background. |
215 | 206 |
</td> |
216 | 207 |
</tr> |
217 | 208 |
|
218 |
-<tr> |
|
219 |
- <td valign="top"> |
|
220 |
- 2006 Oct 19 |
|
221 |
- </td> |
|
222 |
- <td> |
|
223 |
- <strong>Wired Threat Level:</strong> |
|
224 |
- <a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> |
|
225 |
- The Onion Router (TOR) is Leaky (Leeky)</a><br> |
|
209 |
+<tr bgcolor="#e5e5e5"> |
|
210 |
+<td>2006 Oct 19</td> |
|
211 |
+<td>Wired Threat Level</td> |
|
212 |
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> |
|
213 |
+The Onion Router (TOR) is Leaky (Leeky)</a>. |
|
226 | 214 |
Explains why you need something like Privoxy |
227 | 215 |
in addition to the core Tor code to ensure your anonymity. If you use the |
228 | 216 |
Vidalia bundle, it installs and configures Privoxy automatically, but it can't |
... | ... |
@@ -231,48 +219,42 @@ Tor-related stories that have popped up. </p> |
231 | 219 |
</tr> |
232 | 220 |
|
233 | 221 |
<tr> |
234 |
- <td valign="top"> |
|
235 |
- 2006 Aug 18 |
|
236 |
- </td> |
|
237 |
- <td> |
|
238 |
- <strong>NPR:</strong> |
|
239 |
- <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
240 |
- Tips for Protecting Privacy Online</a><br> |
|
222 |
+<td>2006 Aug 18</td> |
|
223 |
+<td>NPR</td> |
|
224 |
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
225 |
+Tips for Protecting Privacy Online</a>. |
|
241 | 226 |
Kevin Bankston of the EFF recommends Tor during an NPR interview. |
242 | 227 |
Tor information begins at 8:15 into the program. |
243 | 228 |
</td> |
244 | 229 |
</tr> |
245 | 230 |
|
246 |
-<tr> |
|
247 |
- <td valign="top"> |
|
248 |
- 2006 Jul 5 |
|
249 |
- </td> |
|
250 |
- <td> |
|
251 |
- <strong>MSNBC:</strong> |
|
252 |
- <a href="http://www.msnbc.msn.com/id/13718446/page/2/"> |
|
253 |
- Defending liberties in high-tech world</a><br> |
|
231 |
+<tr bgcolor="#e5e5e5"> |
|
232 |
+<td>2006 Jul 5</td> |
|
233 |
+<td>MSNBC</td> |
|
234 |
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> |
|
235 |
+Defending liberties in high-tech world</a>. |
|
254 | 236 |
Mentions EFF funding for Tor as one of its significant nonlitigation projects. |
255 | 237 |
</td> |
256 | 238 |
</tr> |
257 | 239 |
|
258 | 240 |
<tr> |
259 |
- <td valign="top"> |
|
241 |
+ <td> |
|
260 | 242 |
2006 Feb 15 |
261 | 243 |
</td> |
262 | 244 |
<td> |
263 |
- <strong>Network Secure:</strong> |
|
264 |
- <a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909"> |
|
245 |
+ Network Secure</td> |
|
246 |
+ <td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909"> |
|
265 | 247 |
Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br> |
266 | 248 |
</td> |
267 | 249 |
</tr> |
268 | 250 |
|
269 |
-<tr> |
|
270 |
- <td valign="top"> |
|
251 |
+<tr bgcolor="#e5e5e5"> |
|
252 |
+ <td> |
|
271 | 253 |
2006 Feb 13 |
272 | 254 |
</td> |
273 | 255 |
<td> |
274 |
- <strong>Wall Street Journal:</strong> |
|
275 |
- <a href="http://online.wsj.com/article/SB113979965346572150.html"> |
|
256 |
+ Wall Street Journal</td> |
|
257 |
+<td> <a href="http://online.wsj.com/article/SB113979965346572150.html"> |
|
276 | 258 |
Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br> |
277 | 259 |
Full article text can also be found |
278 | 260 |
<a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>. |
... | ... |
@@ -280,413 +262,413 @@ Tor-related stories that have popped up. </p> |
280 | 262 |
</tr> |
281 | 263 |
|
282 | 264 |
<tr> |
283 |
- <td valign="top"> |
|
265 |
+ <td> |
|
284 | 266 |
2006 Jan 31 |
285 | 267 |
</td> |
286 | 268 |
<td> |
287 |
- <strong>Technology Review:</strong> |
|
288 |
- <a href="http://www.technologyreview.com/Infotech/16216/page2/"> |
|
269 |
+ Technology Review</td> |
|
270 |
+<td> <a href="http://www.technologyreview.com/Infotech/16216/page2/"> |
|
289 | 271 |
Evading the Google Eye</a><br> |
290 | 272 |
</td> |
291 | 273 |
</tr> |
292 | 274 |
|
293 |
-<tr> |
|
294 |
- <td valign="top"> |
|
275 |
+<tr bgcolor="#e5e5e5"> |
|
276 |
+ <td> |
|
295 | 277 |
2006 Jan 29 |
296 | 278 |
</td> |
297 | 279 |
<td> |
298 |
- <strong>New York Times:</strong> |
|
299 |
- <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> |
|
280 |
+ New York Times</td> |
|
281 |
+<td> <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> |
|
300 | 282 |
How to Outwit the World's Internet Censors</a><br> |
301 | 283 |
</td> |
302 | 284 |
</tr> |
303 | 285 |
|
304 | 286 |
<tr> |
305 |
- <td valign="top"> |
|
287 |
+ <td> |
|
306 | 288 |
2006 Jan 23 |
307 | 289 |
</td> |
308 | 290 |
<td> |
309 |
- <strong>NPR Talk of the Nation:</strong> |
|
310 |
- <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
291 |
+ NPR Talk of the Nation</td> |
|
292 |
+<td> <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
311 | 293 |
Search Engines and Privacy Rights on the Web</a><br> |
312 | 294 |
<a href="http://xeni.net/">Xeni Jardin</a> |
313 | 295 |
recommends Tor at 33:30 into the program. |
314 | 296 |
</td> |
315 | 297 |
</tr> |
316 | 298 |
|
317 |
-<tr> |
|
318 |
- <td valign="top"> |
|
299 |
+<tr bgcolor="#e5e5e5"> |
|
300 |
+ <td> |
|
319 | 301 |
2006 Feb 15 |
320 | 302 |
</td> |
321 | 303 |
<td> |
322 |
- <strong>Punto Informatico:</strong> |
|
323 |
- <a href="http://punto-informatico.it/p.aspx?i=1430903"> |
|
304 |
+ Punto Informatico</td> |
|
305 |
+<td> <a href="http://punto-informatico.it/p.aspx?i=1430903"> |
|
324 | 306 |
TOR c'è</a> (Italian)<br> |
325 | 307 |
</td> |
326 | 308 |
</tr> |
327 | 309 |
|
328 | 310 |
<tr> |
329 |
- <td valign="top"> |
|
311 |
+ <td> |
|
330 | 312 |
2006 Jan 20 |
331 | 313 |
</td> |
332 | 314 |
<td> |
333 |
- <strong>Wired:</strong> |
|
334 |
- <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> |
|
315 |
+ Wired</td> |
|
316 |
+<td> <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> |
|
335 | 317 |
How to Foil Search Engine Snoops</a><br> |
336 | 318 |
</td> |
337 | 319 |
</tr> |
338 | 320 |
|
339 |
-<tr> |
|
340 |
- <td valign="top"> |
|
321 |
+<tr bgcolor="#e5e5e5"> |
|
322 |
+ <td> |
|
341 | 323 |
2006 Jan 20 |
342 | 324 |
</td> |
343 | 325 |
<td> |
344 |
- <strong>NPR:</strong> |
|
345 |
- <a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> |
|
326 |
+ NPR</td> |
|
327 |
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> |
|
346 | 328 |
Google Records Subpoena Raises Privacy Fears</a><br> |
347 | 329 |
</td> |
348 | 330 |
</tr> |
349 | 331 |
|
350 | 332 |
<tr> |
351 |
- <td valign="top"> |
|
333 |
+ <td> |
|
352 | 334 |
2005 Sep 30 |
353 | 335 |
</td> |
354 | 336 |
<td> |
355 |
- <strong>Viva o Linux:</strong> |
|
356 |
- <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> |
|
337 |
+ Viva o Linux</td> |
|
338 |
+ <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> |
|
357 | 339 |
TOR: A Internet sem rastreabilidade</a> (Portuguese)<br> |
358 | 340 |
</td> |
359 | 341 |
</tr> |
360 | 342 |
|
361 |
-<tr> |
|
362 |
- <td valign="top"> |
|
343 |
+<tr bgcolor="#e5e5e5"> |
|
344 |
+ <td> |
|
363 | 345 |
2005 Jul 12 |
364 | 346 |
</td> |
365 | 347 |
<td> |
366 |
- <strong>IEEE Computer Society's Technical Committee on Security and Privacy:</strong> |
|
367 |
- <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> |
|
348 |
+ IEEE Computer Society's Technical Committee on Security and Privacy</td> |
|
349 |
+<td> <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> |
|
368 | 350 |
Onion routing application Tor makes PCWorld's top 100</a><br> |
369 | 351 |
</td> |
370 | 352 |
</tr> |
371 | 353 |
|
372 | 354 |
<tr> |
373 |
- <td valign="top"> |
|
355 |
+ <td> |
|
374 | 356 |
2005 Jun 22 |
375 | 357 |
</td> |
376 | 358 |
<td> |
377 |
- <strong>The Unofficial Apple Blog:</strong> |
|
378 |
- <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> |
|
359 |
+ The Unofficial Apple Blog</td> |
|
360 |
+<td> <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> |
|
379 | 361 |
Privacy Watch: Tor</a><br> |
380 | 362 |
</td> |
381 | 363 |
</tr> |
382 | 364 |
|
383 |
-<tr> |
|
384 |
- <td valign="top"> |
|
365 |
+<tr bgcolor="#e5e5e5"> |
|
366 |
+ <td> |
|
385 | 367 |
2005 Jun 10 |
386 | 368 |
</td> |
387 | 369 |
<td> |
388 |
- <strong>The New Zealand Herald:</strong> |
|
389 |
- <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896"> |
|
370 |
+ The New Zealand Herald</td> |
|
371 |
+<td> <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896"> |
|
390 | 372 |
China's internet censorship stranglehold can't last</a><br> |
391 | 373 |
</td> |
392 | 374 |
</tr> |
393 | 375 |
|
394 | 376 |
<tr> |
395 |
- <td valign="top"> |
|
377 |
+ <td> |
|
396 | 378 |
2005 Jun 8 |
397 | 379 |
</td> |
398 | 380 |
<td> |
399 |
- <strong>American Public Radio:</strong> |
|
400 |
- <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> |
|
381 |
+ American Public Radio</td> |
|
382 |
+<td> <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> |
|
401 | 383 |
An Internet privacy tool called "Tor"</a><br> |
402 | 384 |
</td> |
403 | 385 |
</tr> |
404 | 386 |
|
405 |
-<tr> |
|
406 |
- <td valign="top"> |
|
387 |
+<tr bgcolor="#e5e5e5"> |
|
388 |
+ <td> |
|
407 | 389 |
2005 Jun 1 |
408 | 390 |
</td> |
409 | 391 |
<td> |
410 |
- <strong>PC World:</strong> |
|
411 |
- <a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> |
|
392 |
+ PC World</td> |
|
393 |
+<td> <a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> |
|
412 | 394 |
The 100 Best Products of 2005</a><br> |
413 | 395 |
Tor is ranked #40 on the list. |
414 | 396 |
</td> |
415 | 397 |
</tr> |
416 | 398 |
|
417 | 399 |
<tr> |
418 |
- <td valign="top"> |
|
400 |
+ <td> |
|
419 | 401 |
2005 Jun 1 |
420 | 402 |
</td> |
421 | 403 |
<td> |
422 |
- <strong>Linux Weekly News:</strong> |
|
423 |
- <a href="http://lwn.net/Articles/138242/"> |
|
404 |
+ Linux Weekly News</td> |
|
405 |
+<td> <a href="http://lwn.net/Articles/138242/"> |
|
424 | 406 |
A Look at The Onion Router (Tor)</a><br> |
425 | 407 |
</td> |
426 | 408 |
</tr> |
427 | 409 |
|
428 |
-<tr> |
|
429 |
- <td valign="top"> |
|
410 |
+<tr bgcolor="#e5e5e5"> |
|
411 |
+ <td> |
|
430 | 412 |
2005 May 22 |
431 | 413 |
</td> |
432 | 414 |
<td> |
433 |
- <strong>Slashdot:</strong> |
|
434 |
- <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> |
|
415 |
+ Slashdot</td> |
|
416 |
+<td> <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> |
|
435 | 417 |
Tor Anonymity Network Reaches 100 Verified Nodes</a><br> |
436 | 418 |
</td> |
437 | 419 |
</tr> |
438 | 420 |
|
439 | 421 |
<tr> |
440 |
- <td valign="top"> |
|
422 |
+ <td> |
|
441 | 423 |
2005 May 20 |
442 | 424 |
</td> |
443 | 425 |
<td> |
444 |
- <strong>Security.uz:</strong> |
|
445 |
- <a href="http://security.uz/news/default.asp?id=10541"> |
|
426 |
+ Security.uz</td> |
|
427 |
+<td> <a href="http://security.uz/news/default.asp?id=10541"> |
|
446 | 428 |
Tor - мощный анонимайзер для всех ОС</a> (Russian)<br> |
447 | 429 |
</td> |
448 | 430 |
</tr> |
449 | 431 |
|
450 |
-<tr> |
|
451 |
- <td valign="top"> |
|
432 |
+<tr bgcolor="#e5e5e5"> |
|
433 |
+ <td> |
|
452 | 434 |
2005 May 19 |
453 | 435 |
</td> |
454 | 436 |
<td> |
455 |
- <strong>WebPlanet:</strong> |
|
456 |
- <a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> |
|
437 |
+ WebPlanet</td> |
|
438 |
+<td> <a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> |
|
457 | 439 |
Tor: распределенная система анонимного серфинга</a> (Russian)<br> |
458 | 440 |
</td> |
459 | 441 |
</tr> |
460 | 442 |
|
461 | 443 |
<tr> |
462 |
- <td valign="top"> |
|
444 |
+ <td> |
|
463 | 445 |
2005 May 17 |
464 | 446 |
</td> |
465 | 447 |
<td> |
466 |
- <strong>Wired:</strong> |
|
467 |
- <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> |
|
448 |
+ Wired</td> |
|
449 |
+<td> <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> |
|
468 | 450 |
Tor Torches Online Tracking</a><br> |
469 | 451 |
Also available in |
470 | 452 |
<a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>. |
471 | 453 |
</td> |
472 | 454 |
</tr> |
473 | 455 |
|
474 |
-<tr> |
|
475 |
- <td valign="top"> |
|
456 |
+<tr bgcolor="#e5e5e5"> |
|
457 |
+ <td> |
|
476 | 458 |
2005 May 17 |
477 | 459 |
</td> |
478 | 460 |
<td> |
479 |
- <strong>XBiz:</strong> |
|
480 |
- <a href="http://xbiz.com/news/8761"> |
|
461 |
+ XBiz</td> |
|
462 |
+<td> <a href="http://xbiz.com/news/8761"> |
|
481 | 463 |
Navy Project Allows Anonymous Browsing</a><br> |
482 | 464 |
</td> |
483 | 465 |
</tr> |
484 | 466 |
|
485 | 467 |
<tr> |
486 |
- <td valign="top"> |
|
468 |
+ <td> |
|
487 | 469 |
2005 Apr 13 |
488 | 470 |
</td> |
489 | 471 |
<td> |
490 |
- <strong>Heise online:</strong> |
|
491 |
- <a href="http://www.heise.de/newsticker/meldung/58506"> |
|
472 |
+ Heise online</td> |
|
473 |
+<td> <a href="http://www.heise.de/newsticker/meldung/58506"> |
|
492 | 474 |
CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br> |
493 | 475 |
</td> |
494 | 476 |
</tr> |
495 | 477 |
|
496 |
-<tr> |
|
497 |
- <td valign="top"> |
|
478 |
+<tr bgcolor="#e5e5e5"> |
|
479 |
+ <td> |
|
498 | 480 |
2005 Apr 5 |
499 | 481 |
</td> |
500 | 482 |
<td> |
501 |
- <strong>Libero:</strong> |
|
502 |
- <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> |
|
483 |
+ Libero</td> |
|
484 |
+<td> <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> |
|
503 | 485 |
Anonimato on line, ecco Tor</a> (Italian)<br> |
504 | 486 |
</td> |
505 | 487 |
</tr> |
506 | 488 |
|
507 | 489 |
<tr> |
508 |
- <td valign="top"> |
|
490 |
+ <td> |
|
509 | 491 |
2005 Jan 4 |
510 | 492 |
</td> |
511 | 493 |
<td> |
512 |
- <strong>Internetnews:</strong> |
|
513 |
- <a href="http://www.internetnews.com/dev-news/article.php/3454521"> |
|
494 |
+ Internetnews</td> |
|
495 |
+<td> <a href="http://www.internetnews.com/dev-news/article.php/3454521"> |
|
514 | 496 |
EFF Throws Support to 'Anonymous' Internet Project</a><br> |
515 | 497 |
</td> |
516 | 498 |
</tr> |
517 | 499 |
|
518 |
-<tr> |
|
519 |
- <td valign="top"> |
|
500 |
+<tr bgcolor="#e5e5e5"> |
|
501 |
+ <td> |
|
520 | 502 |
2005 Mar 31 |
521 | 503 |
</td> |
522 | 504 |
<td> |
523 |
- <strong>Linux.com:</strong> |
|
524 |
- <a href="http://www.linux.com/articles/43713?tid=19&tid=78"> |
|
505 |
+ Linux.com</td> |
|
506 |
+<td> <a href="http://www.linux.com/articles/43713?tid=19&tid=78"> |
|
525 | 507 |
Securing your online privacy with Tor</a><br> |
526 | 508 |
</td> |
527 | 509 |
</tr> |
528 | 510 |
|
529 | 511 |
<tr> |
530 |
- <td valign="top"> |
|
512 |
+ <td> |
|
531 | 513 |
2004 Dec 27 |
532 | 514 |
</td> |
533 | 515 |
<td> |
534 |
- <strong>BoingBoing:</strong> |
|
535 |
- <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> |
|
516 |
+ BoingBoing</td> |
|
517 |
+<td> <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> |
|
536 | 518 |
EFF helping produce anonymizing software</a><br> |
537 | 519 |
</td> |
538 | 520 |
</tr> |
539 | 521 |
|
540 |
-<tr> |
|
541 |
- <td valign="top"> |
|
522 |
+<tr bgcolor="#e5e5e5"> |
|
523 |
+ <td> |
|
542 | 524 |
2004 Dec 25 |
543 | 525 |
</td> |
544 | 526 |
<td> |
545 |
- <strong>Kansas City infozine:</strong> |
|
546 |
- <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> |
|
527 |
+ Kansas City infozine</td> |
|
528 |
+<td> <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> |
|
547 | 529 |
EFF Joins Forces with Tor Software Project</a><br> |
548 | 530 |
</td> |
549 | 531 |
</tr> |
550 | 532 |
|
551 | 533 |
<tr> |
552 |
- <td valign="top"> |
|
534 |
+ <td> |
|
553 | 535 |
2004 Dec 23 |
554 | 536 |
</td> |
555 | 537 |
<td> |
556 |
- <strong>golem.de:</strong> |
|
557 |
- <a href="http://www.golem.de/0412/35340.html"> |
|
538 |
+ golem.de</td> |
|
539 |
+<td> <a href="http://www.golem.de/0412/35340.html"> |
|
558 | 540 |
EFF unterstützt Anonymisierer Tor</a> (German)<br> |
559 | 541 |
</td> |
560 | 542 |
</tr> |
561 | 543 |
|
562 |
-<tr> |
|
563 |
- <td valign="top"> |
|
544 |
+<tr bgcolor="#e5e5e5"> |
|
545 |
+ <td> |
|
564 | 546 |
2004 Dec 23 |
565 | 547 |
</td> |
566 | 548 |
<td> |
567 |
- <strong>SuicideGirls:</strong> |
|
568 |
- <a href="http://suicidegirls.com/news/technology/6150/"> |
|
549 |
+ SuicideGirls</td> |
|
550 |
+<td> <a href="http://suicidegirls.com/news/technology/6150/"> |
|
569 | 551 |
New Routing Software Allows Anonymous Internet Use</a><br> |
570 | 552 |
</td> |
571 | 553 |
</tr> |
572 | 554 |
|
573 | 555 |
<tr> |
574 |
- <td valign="top"> |
|
556 |
+ <td> |
|
575 | 557 |
2004 Dec 18 |
576 | 558 |
</td> |
577 | 559 |
<td> |
578 |
- <strong>P2Pnet:</strong> |
|
579 |
- <a href="http://p2pnet.net/story/3357"> |
|
560 |
+ P2Pnet</td> |
|
561 |
+<td> <a href="http://p2pnet.net/story/3357"> |
|
580 | 562 |
EFF to sponsor Tor</a><br> |
581 | 563 |
</td> |
582 | 564 |
</tr> |
583 | 565 |
|
584 |
-<tr> |
|
585 |
- <td valign="top"> |
|
566 |
+<tr bgcolor="#e5e5e5"> |
|
567 |
+ <td> |
|
586 | 568 |
2004 Dec 22 |
587 | 569 |
</td> |
588 | 570 |
<td> |
589 |
- <strong>Slashdot:</strong> |
|
590 |
- <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17"> |
|
571 |
+ Slashdot</td> |
|
572 |
+<td> <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17"> |
|
591 | 573 |
EFF Promotes Freenet-like System Tor</a><br> |
592 | 574 |
</td> |
593 | 575 |
</tr> |
594 | 576 |
|
595 | 577 |
<tr> |
596 |
- <td valign="top"> |
|
578 |
+ <td> |
|
597 | 579 |
2004 Nov 16 |
598 | 580 |
</td> |
599 | 581 |
<td> |
600 |
- <strong>AlterNet:</strong> |
|
601 |
- <a href="http://www.alternet.org/columnists/story/20523/"> |
|
582 |
+ AlterNet</td> |
|
583 |
+<td> <a href="http://www.alternet.org/columnists/story/20523/"> |
|
602 | 584 |
Heavy Traffic</a><br> |
603 | 585 |
</td> |
604 | 586 |
</tr> |
605 | 587 |
|
606 |
-<tr> |
|
607 |
- <td valign="top"> |
|
588 |
+<tr bgcolor="#e5e5e5"> |
|
589 |
+ <td> |
|
608 | 590 |
2004 Aug 30 |
609 | 591 |
</td> |
610 | 592 |
<td> |
611 |
- <strong>Newsweek:</strong> |
|
612 |
- Technology: Instant Security (no link)<br> |
|
593 |
+ Newsweek</td> |
|
594 |
+<td> Technology: Instant Security (no link)<br> |
|
613 | 595 |
</td> |
614 | 596 |
</tr> |
615 | 597 |
|
616 | 598 |
<tr> |
617 |
- <td valign="top"> |
|
599 |
+ <td> |
|
618 | 600 |
2004 Aug 16 |
619 | 601 |
</td> |
620 | 602 |
<td> |
621 |
- <strong>Eweek:</strong> |
|
622 |
- <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> |
|
603 |
+ Eweek</td> |
|
604 |
+<td> <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> |
|
623 | 605 |
Don't Fear Internet Anonymity Tools</a><br> |
624 | 606 |
</td> |
625 | 607 |
</tr> |
626 | 608 |
|
627 |
-<tr> |
|
628 |
- <td valign="top"> |
|
609 |
+<tr bgcolor="#e5e5e5"> |
|
610 |
+ <td> |
|
629 | 611 |
2004 Aug 6 |
630 | 612 |
</td> |
631 | 613 |
<td> |
632 |
- <strong>HCC magazine:</strong> |
|
633 |
- <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063"> |
|
614 |
+ HCC magazine</td> |
|
615 |
+<td> <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063"> |
|
634 | 616 |
Anoniem surfen met hulp van marine VS</a> (Dutch)<br> |
635 | 617 |
</td> |
636 | 618 |
</tr> |
637 | 619 |
|
638 | 620 |
<tr> |
639 |
- <td valign="top"> |
|
621 |
+ <td> |
|
640 | 622 |
2004 Aug 6 |
641 | 623 |
</td> |
642 | 624 |
<td> |
643 |
- <strong>Golem:</strong> |
|
644 |
- <a href="http://www.golem.de/0408/32835.html"> |
|
625 |
+ Golem</td> |
|
626 |
+<td> <a href="http://www.golem.de/0408/32835.html"> |
|
645 | 627 |
Tor: Anonymisierer nutzt Onion-Routing</a><br> |
646 | 628 |
</td> |
647 | 629 |
</tr> |
648 | 630 |
|
649 |
-<tr> |
|
650 |
- <td valign="top"> |
|
631 |
+<tr bgcolor="#e5e5e5"> |
|
632 |
+ <td> |
|
651 | 633 |
2004 Aug 5 |
652 | 634 |
</td> |
653 | 635 |
<td> |
654 |
- <strong>Network World Security:</strong> |
|
655 |
- <a href="http://www.networkworld.com/details/7088.html"> |
|
636 |
+ Network World Security</td> |
|
637 |
+<td> <a href="http://www.networkworld.com/details/7088.html"> |
|
656 | 638 |
Onion routing</a><br> |
657 | 639 |
</td> |
658 | 640 |
</tr> |
659 | 641 |
|
660 | 642 |
<tr> |
661 |
- <td valign="top"> |
|
643 |
+ <td> |
|
662 | 644 |
2004 May 8 |
663 | 645 |
</td> |
664 | 646 |
<td> |
665 |
- <strong>Wired:</strong> |
|
666 |
- <a href="http://www.wired.com/politics/security/news/2004/08/64464"> |
|
647 |
+ Wired</td> |
|
648 |
+<td> <a href="http://www.wired.com/politics/security/news/2004/08/64464"> |
|
667 | 649 |
Onion Routing Averts Prying Eyes</a><br> |
668 | 650 |
Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>. |
669 | 651 |
</td> |
670 | 652 |
</tr> |
671 | 653 |
|
672 |
-<tr> |
|
673 |
- <td valign="top"> |
|
654 |
+<tr bgcolor="#e5e5e5"> |
|
655 |
+ <td> |
|
674 | 656 |
2004 Mar 8 |
675 | 657 |
</td> |
676 | 658 |
<td> |
677 |
- <strong>CNET Japan blog:</strong> |
|
678 |
- <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> |
|
659 |
+ CNET Japan blog</td> |
|
660 |
+<td> <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> |
|
679 | 661 |
Yearning of hackers and insecurity</a> (Japanese)<br> |
680 | 662 |
</td> |
681 | 663 |
</tr> |
682 | 664 |
|
683 | 665 |
<tr> |
684 |
- <td valign="top"> |
|
666 |
+ <td> |
|
685 | 667 |
1999 Apr 13 |
686 | 668 |
</td> |
687 | 669 |
<td> |
688 |
- <strong>Wired:</strong> |
|
689 |
- <a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> |
|
670 |
+ Wired</td> |
|
671 |
+<td> <a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> |
|
690 | 672 |
Anonymous Web Surfing? Uh-Uh</a><br> |
691 | 673 |
</td> |
692 | 674 |
</tr> |
693 | 675 |