Andrew Lewman commited on 2008-03-09 04:03:21
Zeige 1 geänderte Dateien mit 276 Einfügungen und 294 Löschungen.
| ... | ... |
@@ -1,11 +1,11 @@ |
| 1 | 1 |
## translation metadata |
| 2 | 2 |
# Revision: $Revision: 0 $ |
| 3 | 3 |
|
| 4 |
-#include "head.wmi" TITLE="Tor in the media" CHARSET="UTF-8" |
|
| 4 |
+#include "head.wmi" TITLE="Media Appearances of The Tor Project" CHARSET="UTF-8" |
|
| 5 | 5 |
|
| 6 | 6 |
<div class="main-column"> |
| 7 | 7 |
|
| 8 |
-<h1>Tor in the media</h1> |
|
| 8 |
+<h1>Media Appearances</h1> |
|
| 9 | 9 |
|
| 10 | 10 |
<h2>Interviews & Appearances</h2> |
| 11 | 11 |
|
| ... | ... |
@@ -14,175 +14,172 @@ and the CBS Evening News have sought out or quoted Tor Project members |
| 14 | 14 |
due to their expertise on anonymity, privacy, and Internet censorship issues. |
| 15 | 15 |
Some samples: </p> |
| 16 | 16 |
|
| 17 |
-<dl> |
|
| 18 |
-<dt>2008 Feb 01, PC World</dt> |
|
| 19 |
-<dd><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
| 17 |
+<table border="0" cellpadding="3" cellspacing="0"> |
|
| 18 |
+<thead bgcolor="#e5e5e5"> |
|
| 19 |
+<th>Date</th> |
|
| 20 |
+<th>Publication</th> |
|
| 21 |
+<th>Topic</th> |
|
| 22 |
+</thead> |
|
| 23 |
+ |
|
| 24 |
+<tr> |
|
| 25 |
+<td>2008 Feb 01</td> |
|
| 26 |
+<td>PC World</td> |
|
| 27 |
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
| 20 | 28 |
Hackers Can Expose Masked Surfers, Study Says</a> |
| 21 | 29 |
A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
| 22 | 30 |
Steven Murdoch's recent PhD thesis</a>. Steven <a |
| 23 | 31 |
href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
| 24 |
-responds on the Tor Blog</a>.</dd> |
|
| 25 |
-<dt>2006 Apr 11, PBS Frontline</dt> |
|
| 26 |
-<dd><a |
|
| 32 |
+responds on the Tor Blog</a>.</td> |
|
| 33 |
+</tr> |
|
| 34 |
+<tr bgcolor="#e5e5e5"> |
|
| 35 |
+<td>2006 Apr 11</td> |
|
| 36 |
+<td>PBS Frontline</td> |
|
| 37 |
+<td><a |
|
| 27 | 38 |
href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
| 28 |
-Chipping Away at China's Great Firewall</a></dd> |
|
| 29 |
-<dt>2006 Feb 28, PC World</dt> |
|
| 30 |
-<dd><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
| 31 |
-Outsmarting the Online Privacy Snoops</a></dd> |
|
| 32 |
-<dt>2006 Feb 27, Forbes</dt> |
|
| 33 |
-<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 39 |
+Chipping Away at China's Great Firewall</a></td> |
|
| 40 |
+</tr> |
|
| 41 |
+<tr> |
|
| 42 |
+<td>2006 Feb 28</td> |
|
| 43 |
+<td>PC World</td> |
|
| 44 |
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
| 45 |
+Outsmarting the Online Privacy Snoops</a></td> |
|
| 46 |
+</tr> |
|
| 47 |
+<tr bgcolor="#e5e5e5"> |
|
| 48 |
+<td>2006 Feb 27</td> |
|
| 49 |
+<td>Forbes</td> |
|
| 50 |
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 34 | 51 |
Cracks In the Wall</a>. Discussion of Tor being used for evading censorship by repressive |
| 35 |
-governments. </dd> |
|
| 36 |
-<dt>2006 Feb 20, The Boston Globe</dt> |
|
| 37 |
-<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 38 |
-Beating censorship on the Internet</a></dd> |
|
| 39 |
-<dt>2006 Feb 15, CBS Evening News</dt> |
|
| 40 |
-<dd><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
| 41 |
- Cracking The 'Great Firewall Of China'</a>. |
|
| 42 |
- Roger Dingledine appeared on the show to discuss Tor, starting at |
|
| 43 |
-1:04 into the video.</dd> |
|
| 44 |
-<dt>2006 Feb 15, CNBC - Closing Bell</dt> |
|
| 45 |
-<dd>TV Appearance by Roger Dingledine at 4:25pm. (no link)</dd> |
|
| 46 |
-<dt>2006 Jan 27, Fox News/eWeek</dt> |
|
| 47 |
-<dd><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
|
| 48 |
-Anonymizers Suddenly Get Very Popular</a></dd> |
|
| 49 |
-<dt>2006 Jan 25, New York Times</dt> |
|
| 50 |
-<dd><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
| 51 |
- Privacy for People Who Don't Show Their Navels</a></dd> |
|
| 52 |
-<dt>2005 Aug 6, New Scientist</dt> |
|
| 53 |
-<dd><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></dd> |
|
| 54 |
-</dl> |
|
| 52 |
+governments. </td> |
|
| 53 |
+</tr> |
|
| 54 |
+<tr> |
|
| 55 |
+<td>2006 Feb 20</td> |
|
| 56 |
+<td>The Boston Globe</td> |
|
| 57 |
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 58 |
+Beating censorship on the Internet</a></td> |
|
| 59 |
+</tr> |
|
| 60 |
+<tr bgcolor="#e5e5e5"> |
|
| 61 |
+<td>2006 Feb 15</td> |
|
| 62 |
+<td>CBS Evening News</td> |
|
| 63 |
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
| 64 |
+Cracking The 'Great Firewall Of China'</a>. Roger Dingledine appeared on the show to discuss Tor, starting at |
|
| 65 |
+1:04 into the video.</td> |
|
| 66 |
+</tr> |
|
| 67 |
+<tr> |
|
| 68 |
+<td>2006 Feb 15</td> |
|
| 69 |
+<td>CNBC - Closing Bell</td> |
|
| 70 |
+<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td> |
|
| 71 |
+</tr> |
|
| 72 |
+<tr bgcolor="#e5e5e5"> |
|
| 73 |
+<td>2006 Jan 27</td> |
|
| 74 |
+<td>Fox News/eWeek</td> |
|
| 75 |
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
|
| 76 |
+Anonymizers Suddenly Get Very Popular</a></td> |
|
| 77 |
+</tr> |
|
| 78 |
+<tr> |
|
| 79 |
+<td>2006 Jan 25</td> |
|
| 80 |
+<td>New York Times</td> |
|
| 81 |
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
| 82 |
+Privacy for People Who Don't Show Their Navels</a></td> |
|
| 83 |
+</tr> |
|
| 84 |
+<tr bgcolor="#e5e5e5"> |
|
| 85 |
+<td>2005 Aug 6</td> |
|
| 86 |
+<td>New Scientist</td> |
|
| 87 |
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td> |
|
| 88 |
+</tr> |
|
| 89 |
+</table> |
|
| 55 | 90 |
|
| 56 | 91 |
<p /> |
| 57 |
-<h2>Articles that involve Tor</h2> |
|
| 92 |
+<h2>Articles</h2> |
|
| 58 | 93 |
|
| 59 | 94 |
<p> Since Tor is widely used throughout the world, it is mentioned regularly in the press. |
| 60 | 95 |
This list is not comprehensive, but illustrates some of the significant |
| 61 | 96 |
Tor-related stories that have popped up. </p> |
| 62 | 97 |
|
| 63 |
-<table border=0 cellpadding=3> |
|
| 98 |
+<table border="0" cellpadding="3" cellspacing="0"> |
|
| 99 |
+<thead bgcolor="#e5e5e5"> |
|
| 100 |
+<th>Date</th> |
|
| 101 |
+<th>Publication</th> |
|
| 102 |
+<th>Topic</th> |
|
| 103 |
+</thead> |
|
| 64 | 104 |
|
| 65 | 105 |
<tr> |
| 66 |
- <td valign="top"> |
|
| 67 |
- 2008 Feb 14 |
|
| 68 |
- </td> |
|
| 69 |
- <td> |
|
| 70 |
- <strong>Wired: Compiler Blog:</strong> |
|
| 71 |
- <a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> |
|
| 72 |
- How To: Set Up Anonymous Browsing in 30 Seconds or Less</a><br> |
|
| 106 |
+<td>2008 Feb 14</td> |
|
| 107 |
+<td>Wired: Compiler Blog</td> |
|
| 108 |
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> |
|
| 109 |
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>. |
|
| 73 | 110 |
</td> |
| 74 | 111 |
</tr> |
| 75 | 112 |
|
| 76 |
-<tr> |
|
| 77 |
- <td valign="top" width=100> |
|
| 78 |
- 2007 Sep 21 |
|
| 79 |
- </td> |
|
| 80 |
- <td> |
|
| 81 |
- <strong>Wired HowTo Blog:</strong> |
|
| 82 |
- <a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work"> |
|
| 83 |
- Be a Whistleblower</a><br> |
|
| 84 |
- Wired recommends Tor for whistleblowers who wish to remain anonymous. |
|
| 113 |
+<tr bgcolor="#e5e5e5"> |
|
| 114 |
+<td>2007 Sep 21</td> |
|
| 115 |
+<td>Wired HowTo Blog</td> |
|
| 116 |
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work"> |
|
| 117 |
+Be a Whistleblower</a>. Wired recommends Tor for whistleblowers who wish to remain anonymous. |
|
| 85 | 118 |
</td> |
| 86 | 119 |
</tr> |
| 87 | 120 |
|
| 88 | 121 |
<tr> |
| 89 |
- <td valign="top"> |
|
| 90 |
- 2007 Sep 16 |
|
| 91 |
- </td> |
|
| 92 |
- <td> |
|
| 93 |
- <strong>Cnet:</strong> |
|
| 94 |
- <a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?"> |
|
| 95 |
- Tor anonymity server admin arrested</a><br> |
|
| 96 |
- A Tor exit node operator from Germany was arrested and then released once the police realized |
|
| 97 |
- their mistake. Unfortunately, the hassle |
|
| 98 |
- <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> |
|
| 99 |
- caused this operator to shut down the node</a>. |
|
| 100 |
- We have an |
|
| 101 |
- <a href="<page faq-abuse>"> |
|
| 102 |
- Abuse FAQ for Tor Relay Operators</a>, |
|
| 103 |
- as well as a |
|
| 104 |
- <a href="page eff/tor-legal-faq>"> |
|
| 105 |
- Legal FAQ for Tor Relay Operators</a> |
|
| 106 |
- with advice on how to handle such issues if you are operating a Tor relay. |
|
| 122 |
+<td>2007 Sep 16</td> |
|
| 123 |
+<td>Cnet</td> |
|
| 124 |
+<td><a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?"> |
|
| 125 |
+ Tor anonymity server admin arrested</a>. A Tor exit node operator from Germany was arrested and then released once the police realized |
|
| 126 |
+ their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>. |
|
| 127 |
+ We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="page eff/tor-legal-faq>"> |
|
| 128 |
+ Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay. |
|
| 107 | 129 |
</td> |
| 108 | 130 |
</tr> |
| 109 | 131 |
|
| 110 |
-<tr> |
|
| 111 |
- <td valign="top"> |
|
| 112 |
- 2007 Sep 10 |
|
| 113 |
- </td> |
|
| 114 |
- <td> |
|
| 115 |
- <strong>Wired:</strong> |
|
| 116 |
- <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> |
|
| 132 |
+<tr bgcolor="#e5e5e5"> |
|
| 133 |
+<td>2007 Sep 10</td> |
|
| 134 |
+<td>Wired</td> |
|
| 135 |
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> |
|
| 117 | 136 |
Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br> |
| 118 | 137 |
Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node |
| 119 | 138 |
he was running, then published unencrypted account and password information. |
| 120 | 139 |
Note that the better articles covering this event correctly indicate that this is not a security |
| 121 | 140 |
flaw or design problem with Tor - Tor provides anonymity, but does not |
| 122 |
- encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while |
|
| 141 |
+encrypt anything going to or from an exit node. You must</strong> use SSL (https) while |
|
| 123 | 142 |
browsing to ensure end-to-end encryption. |
| 124 | 143 |
Also covered in |
| 125 | 144 |
<a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> |
| 126 |
- The Inquirer</a>, |
|
| 127 |
- <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> |
|
| 128 |
- InfoWorld</a>, |
|
| 129 |
- <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2"> |
|
| 145 |
+The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> |
|
| 146 |
+InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2"> |
|
| 130 | 147 |
The Sydney Morning Herald</a>, |
| 131 | 148 |
<a href="http://www.securityfocus.com/news/11486"> |
| 132 |
- Security Focus</a>, |
|
| 133 |
- <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> |
|
| 134 |
- ars technica</a>, |
|
| 135 |
- and many others. It was reported as early as August 31, 2007 on the |
|
| 149 |
+Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> |
|
| 150 |
+ars technica</a>, and many others. It was reported as early as August 31, 2007 on the |
|
| 136 | 151 |
<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> |
| 137 | 152 |
Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. |
| 138 | 153 |
In the end, Mr. Egerstad was arrested, which was covered by |
| 139 | 154 |
<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> |
| 140 |
- The Register</a>, |
|
| 141 |
- <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> |
|
| 142 |
- The Sydney Morning Herald</a>, |
|
| 143 |
- <a href="http://blogs.zdnet.com/Berlind/?p=900"> |
|
| 144 |
- ZDNet</a>, and |
|
| 145 |
- <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> |
|
| 146 |
- Wired Blog</a>. |
|
| 155 |
+The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> |
|
| 156 |
+The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> |
|
| 157 |
+ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>. |
|
| 147 | 158 |
</td> |
| 148 | 159 |
</tr> |
| 149 | 160 |
|
| 150 | 161 |
<tr> |
| 151 |
- <td valign="top"> |
|
| 152 |
- 2007 Jul 27 |
|
| 153 |
- </td> |
|
| 154 |
- <td> |
|
| 155 |
- <strong>Wired Blog:</strong> |
|
| 156 |
- <a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> |
|
| 157 |
- Cyber Jihadists Embrace Tor</a><br> |
|
| 158 |
- A pointer to a |
|
| 159 |
- <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> |
|
| 160 |
- blog</a> |
|
| 161 |
- that posted screenshots of Arabic instructions on using |
|
| 162 |
- Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply |
|
| 162 |
+<td>2007 Jul 27</td> |
|
| 163 |
+<td>Wired Blog</td> |
|
| 164 |
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br> |
|
| 165 |
+A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> |
|
| 166 |
+blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply |
|
| 163 | 167 |
at the bottom of the article. |
| 164 | 168 |
</td> |
| 165 | 169 |
</tr> |
| 166 | 170 |
|
| 167 |
-<tr> |
|
| 168 |
- <td valign="top"> |
|
| 169 |
- 2007 Jun 22 |
|
| 170 |
- </td> |
|
| 171 |
- <td> |
|
| 172 |
- <strong>Bangkok Post:</strong> |
|
| 173 |
- <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> |
|
| 174 |
- The problems with censorship</a><br> |
|
| 175 |
- Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship. |
|
| 171 |
+<tr bgcolor="#e5e5e5"> |
|
| 172 |
+<td>2007 Jun 22</td> |
|
| 173 |
+<td>Bangkok Post</td> |
|
| 174 |
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> |
|
| 175 |
+The problems with censorship</a>. Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship. |
|
| 176 | 176 |
</td> |
| 177 | 177 |
</tr> |
| 178 | 178 |
|
| 179 | 179 |
<tr> |
| 180 |
- <td valign="top"> |
|
| 181 |
- 2007 Mar 15 |
|
| 182 |
- </td> |
|
| 183 |
- <td> |
|
| 184 |
- <strong>World Changing:</strong> |
|
| 185 |
- <a href="http://www.worldchanging.com/archives/006309.html"> |
|
| 180 |
+<td>2007 Mar 15</td> |
|
| 181 |
+<td>World Changing</td> |
|
| 182 |
+<td><a href="http://www.worldchanging.com/archives/006309.html"> |
|
| 186 | 183 |
Blogging Where Speech Isn’t Free</a><br> |
| 187 | 184 |
Coverage of former Tor Executive Director Shava Nerad's participation at an |
| 188 | 185 |
<a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124"> |
| ... | ... |
@@ -190,39 +187,30 @@ Tor-related stories that have popped up. </p> |
| 190 | 187 |
</td> |
| 191 | 188 |
</tr> |
| 192 | 189 |
|
| 193 |
-<tr> |
|
| 194 |
- <td valign="top"> |
|
| 195 |
- 2007 Mar 8 |
|
| 196 |
- </td> |
|
| 197 |
- <td> |
|
| 198 |
- <strong>Security Focus:</strong> |
|
| 199 |
- <a href="http://www.securityfocus.com/news/11447/1"> |
|
| 200 |
- Tor hack proposed to catch criminals</a><br> |
|
| 190 |
+<tr bgcolor="#e5e5e5"> |
|
| 191 |
+<td>2007 Mar 8</td> |
|
| 192 |
+<td>Security Focus</td> |
|
| 193 |
+<td><a href="http://www.securityfocus.com/news/11447/1"> |
|
| 194 |
+Tor hack proposed to catch criminals</a>. |
|
| 201 | 195 |
Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the |
| 202 | 196 |
Tor Project illustrating why this approach may not be a good idea. |
| 203 | 197 |
</td> |
| 204 | 198 |
</tr> |
| 205 | 199 |
|
| 206 | 200 |
<tr> |
| 207 |
- <td valign="top"> |
|
| 208 |
- 2007 Feb 1 |
|
| 209 |
- </td> |
|
| 210 |
- <td> |
|
| 211 |
- <strong>Dr Dobb's:</strong> |
|
| 212 |
- <a href="http://www.ddj.com/security/197002414"> |
|
| 213 |
- Tor Project Protects Anonymous Sources</a><br> |
|
| 201 |
+<td>2007 Feb 1</td> |
|
| 202 |
+<td>Dr Dobb's</td> |
|
| 203 |
+<td><a href="http://www.ddj.com/security/197002414"> |
|
| 204 |
+Tor Project Protects Anonymous Sources</a>. |
|
| 214 | 205 |
An introduction to Tor, including technical and historical background. |
| 215 | 206 |
</td> |
| 216 | 207 |
</tr> |
| 217 | 208 |
|
| 218 |
-<tr> |
|
| 219 |
- <td valign="top"> |
|
| 220 |
- 2006 Oct 19 |
|
| 221 |
- </td> |
|
| 222 |
- <td> |
|
| 223 |
- <strong>Wired Threat Level:</strong> |
|
| 224 |
- <a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> |
|
| 225 |
- The Onion Router (TOR) is Leaky (Leeky)</a><br> |
|
| 209 |
+<tr bgcolor="#e5e5e5"> |
|
| 210 |
+<td>2006 Oct 19</td> |
|
| 211 |
+<td>Wired Threat Level</td> |
|
| 212 |
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> |
|
| 213 |
+The Onion Router (TOR) is Leaky (Leeky)</a>. |
|
| 226 | 214 |
Explains why you need something like Privoxy |
| 227 | 215 |
in addition to the core Tor code to ensure your anonymity. If you use the |
| 228 | 216 |
Vidalia bundle, it installs and configures Privoxy automatically, but it can't |
| ... | ... |
@@ -231,48 +219,42 @@ Tor-related stories that have popped up. </p> |
| 231 | 219 |
</tr> |
| 232 | 220 |
|
| 233 | 221 |
<tr> |
| 234 |
- <td valign="top"> |
|
| 235 |
- 2006 Aug 18 |
|
| 236 |
- </td> |
|
| 237 |
- <td> |
|
| 238 |
- <strong>NPR:</strong> |
|
| 239 |
- <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
| 240 |
- Tips for Protecting Privacy Online</a><br> |
|
| 222 |
+<td>2006 Aug 18</td> |
|
| 223 |
+<td>NPR</td> |
|
| 224 |
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
| 225 |
+Tips for Protecting Privacy Online</a>. |
|
| 241 | 226 |
Kevin Bankston of the EFF recommends Tor during an NPR interview. |
| 242 | 227 |
Tor information begins at 8:15 into the program. |
| 243 | 228 |
</td> |
| 244 | 229 |
</tr> |
| 245 | 230 |
|
| 246 |
-<tr> |
|
| 247 |
- <td valign="top"> |
|
| 248 |
- 2006 Jul 5 |
|
| 249 |
- </td> |
|
| 250 |
- <td> |
|
| 251 |
- <strong>MSNBC:</strong> |
|
| 252 |
- <a href="http://www.msnbc.msn.com/id/13718446/page/2/"> |
|
| 253 |
- Defending liberties in high-tech world</a><br> |
|
| 231 |
+<tr bgcolor="#e5e5e5"> |
|
| 232 |
+<td>2006 Jul 5</td> |
|
| 233 |
+<td>MSNBC</td> |
|
| 234 |
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> |
|
| 235 |
+Defending liberties in high-tech world</a>. |
|
| 254 | 236 |
Mentions EFF funding for Tor as one of its significant nonlitigation projects. |
| 255 | 237 |
</td> |
| 256 | 238 |
</tr> |
| 257 | 239 |
|
| 258 | 240 |
<tr> |
| 259 |
- <td valign="top"> |
|
| 241 |
+ <td> |
|
| 260 | 242 |
2006 Feb 15 |
| 261 | 243 |
</td> |
| 262 | 244 |
<td> |
| 263 |
- <strong>Network Secure:</strong> |
|
| 264 |
- <a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909"> |
|
| 245 |
+ Network Secure</td> |
|
| 246 |
+ <td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909"> |
|
| 265 | 247 |
Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br> |
| 266 | 248 |
</td> |
| 267 | 249 |
</tr> |
| 268 | 250 |
|
| 269 |
-<tr> |
|
| 270 |
- <td valign="top"> |
|
| 251 |
+<tr bgcolor="#e5e5e5"> |
|
| 252 |
+ <td> |
|
| 271 | 253 |
2006 Feb 13 |
| 272 | 254 |
</td> |
| 273 | 255 |
<td> |
| 274 |
- <strong>Wall Street Journal:</strong> |
|
| 275 |
- <a href="http://online.wsj.com/article/SB113979965346572150.html"> |
|
| 256 |
+ Wall Street Journal</td> |
|
| 257 |
+<td> <a href="http://online.wsj.com/article/SB113979965346572150.html"> |
|
| 276 | 258 |
Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br> |
| 277 | 259 |
Full article text can also be found |
| 278 | 260 |
<a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>. |
| ... | ... |
@@ -280,413 +262,413 @@ Tor-related stories that have popped up. </p> |
| 280 | 262 |
</tr> |
| 281 | 263 |
|
| 282 | 264 |
<tr> |
| 283 |
- <td valign="top"> |
|
| 265 |
+ <td> |
|
| 284 | 266 |
2006 Jan 31 |
| 285 | 267 |
</td> |
| 286 | 268 |
<td> |
| 287 |
- <strong>Technology Review:</strong> |
|
| 288 |
- <a href="http://www.technologyreview.com/Infotech/16216/page2/"> |
|
| 269 |
+ Technology Review</td> |
|
| 270 |
+<td> <a href="http://www.technologyreview.com/Infotech/16216/page2/"> |
|
| 289 | 271 |
Evading the Google Eye</a><br> |
| 290 | 272 |
</td> |
| 291 | 273 |
</tr> |
| 292 | 274 |
|
| 293 |
-<tr> |
|
| 294 |
- <td valign="top"> |
|
| 275 |
+<tr bgcolor="#e5e5e5"> |
|
| 276 |
+ <td> |
|
| 295 | 277 |
2006 Jan 29 |
| 296 | 278 |
</td> |
| 297 | 279 |
<td> |
| 298 |
- <strong>New York Times:</strong> |
|
| 299 |
- <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> |
|
| 280 |
+ New York Times</td> |
|
| 281 |
+<td> <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> |
|
| 300 | 282 |
How to Outwit the World's Internet Censors</a><br> |
| 301 | 283 |
</td> |
| 302 | 284 |
</tr> |
| 303 | 285 |
|
| 304 | 286 |
<tr> |
| 305 |
- <td valign="top"> |
|
| 287 |
+ <td> |
|
| 306 | 288 |
2006 Jan 23 |
| 307 | 289 |
</td> |
| 308 | 290 |
<td> |
| 309 |
- <strong>NPR Talk of the Nation:</strong> |
|
| 310 |
- <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
| 291 |
+ NPR Talk of the Nation</td> |
|
| 292 |
+<td> <a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> |
|
| 311 | 293 |
Search Engines and Privacy Rights on the Web</a><br> |
| 312 | 294 |
<a href="http://xeni.net/">Xeni Jardin</a> |
| 313 | 295 |
recommends Tor at 33:30 into the program. |
| 314 | 296 |
</td> |
| 315 | 297 |
</tr> |
| 316 | 298 |
|
| 317 |
-<tr> |
|
| 318 |
- <td valign="top"> |
|
| 299 |
+<tr bgcolor="#e5e5e5"> |
|
| 300 |
+ <td> |
|
| 319 | 301 |
2006 Feb 15 |
| 320 | 302 |
</td> |
| 321 | 303 |
<td> |
| 322 |
- <strong>Punto Informatico:</strong> |
|
| 323 |
- <a href="http://punto-informatico.it/p.aspx?i=1430903"> |
|
| 304 |
+ Punto Informatico</td> |
|
| 305 |
+<td> <a href="http://punto-informatico.it/p.aspx?i=1430903"> |
|
| 324 | 306 |
TOR c'è</a> (Italian)<br> |
| 325 | 307 |
</td> |
| 326 | 308 |
</tr> |
| 327 | 309 |
|
| 328 | 310 |
<tr> |
| 329 |
- <td valign="top"> |
|
| 311 |
+ <td> |
|
| 330 | 312 |
2006 Jan 20 |
| 331 | 313 |
</td> |
| 332 | 314 |
<td> |
| 333 |
- <strong>Wired:</strong> |
|
| 334 |
- <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> |
|
| 315 |
+ Wired</td> |
|
| 316 |
+<td> <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> |
|
| 335 | 317 |
How to Foil Search Engine Snoops</a><br> |
| 336 | 318 |
</td> |
| 337 | 319 |
</tr> |
| 338 | 320 |
|
| 339 |
-<tr> |
|
| 340 |
- <td valign="top"> |
|
| 321 |
+<tr bgcolor="#e5e5e5"> |
|
| 322 |
+ <td> |
|
| 341 | 323 |
2006 Jan 20 |
| 342 | 324 |
</td> |
| 343 | 325 |
<td> |
| 344 |
- <strong>NPR:</strong> |
|
| 345 |
- <a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> |
|
| 326 |
+ NPR</td> |
|
| 327 |
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> |
|
| 346 | 328 |
Google Records Subpoena Raises Privacy Fears</a><br> |
| 347 | 329 |
</td> |
| 348 | 330 |
</tr> |
| 349 | 331 |
|
| 350 | 332 |
<tr> |
| 351 |
- <td valign="top"> |
|
| 333 |
+ <td> |
|
| 352 | 334 |
2005 Sep 30 |
| 353 | 335 |
</td> |
| 354 | 336 |
<td> |
| 355 |
- <strong>Viva o Linux:</strong> |
|
| 356 |
- <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> |
|
| 337 |
+ Viva o Linux</td> |
|
| 338 |
+ <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> |
|
| 357 | 339 |
TOR: A Internet sem rastreabilidade</a> (Portuguese)<br> |
| 358 | 340 |
</td> |
| 359 | 341 |
</tr> |
| 360 | 342 |
|
| 361 |
-<tr> |
|
| 362 |
- <td valign="top"> |
|
| 343 |
+<tr bgcolor="#e5e5e5"> |
|
| 344 |
+ <td> |
|
| 363 | 345 |
2005 Jul 12 |
| 364 | 346 |
</td> |
| 365 | 347 |
<td> |
| 366 |
- <strong>IEEE Computer Society's Technical Committee on Security and Privacy:</strong> |
|
| 367 |
- <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> |
|
| 348 |
+ IEEE Computer Society's Technical Committee on Security and Privacy</td> |
|
| 349 |
+<td> <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> |
|
| 368 | 350 |
Onion routing application Tor makes PCWorld's top 100</a><br> |
| 369 | 351 |
</td> |
| 370 | 352 |
</tr> |
| 371 | 353 |
|
| 372 | 354 |
<tr> |
| 373 |
- <td valign="top"> |
|
| 355 |
+ <td> |
|
| 374 | 356 |
2005 Jun 22 |
| 375 | 357 |
</td> |
| 376 | 358 |
<td> |
| 377 |
- <strong>The Unofficial Apple Blog:</strong> |
|
| 378 |
- <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> |
|
| 359 |
+ The Unofficial Apple Blog</td> |
|
| 360 |
+<td> <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> |
|
| 379 | 361 |
Privacy Watch: Tor</a><br> |
| 380 | 362 |
</td> |
| 381 | 363 |
</tr> |
| 382 | 364 |
|
| 383 |
-<tr> |
|
| 384 |
- <td valign="top"> |
|
| 365 |
+<tr bgcolor="#e5e5e5"> |
|
| 366 |
+ <td> |
|
| 385 | 367 |
2005 Jun 10 |
| 386 | 368 |
</td> |
| 387 | 369 |
<td> |
| 388 |
- <strong>The New Zealand Herald:</strong> |
|
| 389 |
- <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896"> |
|
| 370 |
+ The New Zealand Herald</td> |
|
| 371 |
+<td> <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896"> |
|
| 390 | 372 |
China's internet censorship stranglehold can't last</a><br> |
| 391 | 373 |
</td> |
| 392 | 374 |
</tr> |
| 393 | 375 |
|
| 394 | 376 |
<tr> |
| 395 |
- <td valign="top"> |
|
| 377 |
+ <td> |
|
| 396 | 378 |
2005 Jun 8 |
| 397 | 379 |
</td> |
| 398 | 380 |
<td> |
| 399 |
- <strong>American Public Radio:</strong> |
|
| 400 |
- <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> |
|
| 381 |
+ American Public Radio</td> |
|
| 382 |
+<td> <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> |
|
| 401 | 383 |
An Internet privacy tool called "Tor"</a><br> |
| 402 | 384 |
</td> |
| 403 | 385 |
</tr> |
| 404 | 386 |
|
| 405 |
-<tr> |
|
| 406 |
- <td valign="top"> |
|
| 387 |
+<tr bgcolor="#e5e5e5"> |
|
| 388 |
+ <td> |
|
| 407 | 389 |
2005 Jun 1 |
| 408 | 390 |
</td> |
| 409 | 391 |
<td> |
| 410 |
- <strong>PC World:</strong> |
|
| 411 |
- <a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> |
|
| 392 |
+ PC World</td> |
|
| 393 |
+<td> <a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> |
|
| 412 | 394 |
The 100 Best Products of 2005</a><br> |
| 413 | 395 |
Tor is ranked #40 on the list. |
| 414 | 396 |
</td> |
| 415 | 397 |
</tr> |
| 416 | 398 |
|
| 417 | 399 |
<tr> |
| 418 |
- <td valign="top"> |
|
| 400 |
+ <td> |
|
| 419 | 401 |
2005 Jun 1 |
| 420 | 402 |
</td> |
| 421 | 403 |
<td> |
| 422 |
- <strong>Linux Weekly News:</strong> |
|
| 423 |
- <a href="http://lwn.net/Articles/138242/"> |
|
| 404 |
+ Linux Weekly News</td> |
|
| 405 |
+<td> <a href="http://lwn.net/Articles/138242/"> |
|
| 424 | 406 |
A Look at The Onion Router (Tor)</a><br> |
| 425 | 407 |
</td> |
| 426 | 408 |
</tr> |
| 427 | 409 |
|
| 428 |
-<tr> |
|
| 429 |
- <td valign="top"> |
|
| 410 |
+<tr bgcolor="#e5e5e5"> |
|
| 411 |
+ <td> |
|
| 430 | 412 |
2005 May 22 |
| 431 | 413 |
</td> |
| 432 | 414 |
<td> |
| 433 |
- <strong>Slashdot:</strong> |
|
| 434 |
- <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> |
|
| 415 |
+ Slashdot</td> |
|
| 416 |
+<td> <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> |
|
| 435 | 417 |
Tor Anonymity Network Reaches 100 Verified Nodes</a><br> |
| 436 | 418 |
</td> |
| 437 | 419 |
</tr> |
| 438 | 420 |
|
| 439 | 421 |
<tr> |
| 440 |
- <td valign="top"> |
|
| 422 |
+ <td> |
|
| 441 | 423 |
2005 May 20 |
| 442 | 424 |
</td> |
| 443 | 425 |
<td> |
| 444 |
- <strong>Security.uz:</strong> |
|
| 445 |
- <a href="http://security.uz/news/default.asp?id=10541"> |
|
| 426 |
+ Security.uz</td> |
|
| 427 |
+<td> <a href="http://security.uz/news/default.asp?id=10541"> |
|
| 446 | 428 |
Tor - мощный анонимайзер для всех ОС</a> (Russian)<br> |
| 447 | 429 |
</td> |
| 448 | 430 |
</tr> |
| 449 | 431 |
|
| 450 |
-<tr> |
|
| 451 |
- <td valign="top"> |
|
| 432 |
+<tr bgcolor="#e5e5e5"> |
|
| 433 |
+ <td> |
|
| 452 | 434 |
2005 May 19 |
| 453 | 435 |
</td> |
| 454 | 436 |
<td> |
| 455 |
- <strong>WebPlanet:</strong> |
|
| 456 |
- <a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> |
|
| 437 |
+ WebPlanet</td> |
|
| 438 |
+<td> <a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> |
|
| 457 | 439 |
Tor: распределенная система анонимного серфинга</a> (Russian)<br> |
| 458 | 440 |
</td> |
| 459 | 441 |
</tr> |
| 460 | 442 |
|
| 461 | 443 |
<tr> |
| 462 |
- <td valign="top"> |
|
| 444 |
+ <td> |
|
| 463 | 445 |
2005 May 17 |
| 464 | 446 |
</td> |
| 465 | 447 |
<td> |
| 466 |
- <strong>Wired:</strong> |
|
| 467 |
- <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> |
|
| 448 |
+ Wired</td> |
|
| 449 |
+<td> <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> |
|
| 468 | 450 |
Tor Torches Online Tracking</a><br> |
| 469 | 451 |
Also available in |
| 470 | 452 |
<a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>. |
| 471 | 453 |
</td> |
| 472 | 454 |
</tr> |
| 473 | 455 |
|
| 474 |
-<tr> |
|
| 475 |
- <td valign="top"> |
|
| 456 |
+<tr bgcolor="#e5e5e5"> |
|
| 457 |
+ <td> |
|
| 476 | 458 |
2005 May 17 |
| 477 | 459 |
</td> |
| 478 | 460 |
<td> |
| 479 |
- <strong>XBiz:</strong> |
|
| 480 |
- <a href="http://xbiz.com/news/8761"> |
|
| 461 |
+ XBiz</td> |
|
| 462 |
+<td> <a href="http://xbiz.com/news/8761"> |
|
| 481 | 463 |
Navy Project Allows Anonymous Browsing</a><br> |
| 482 | 464 |
</td> |
| 483 | 465 |
</tr> |
| 484 | 466 |
|
| 485 | 467 |
<tr> |
| 486 |
- <td valign="top"> |
|
| 468 |
+ <td> |
|
| 487 | 469 |
2005 Apr 13 |
| 488 | 470 |
</td> |
| 489 | 471 |
<td> |
| 490 |
- <strong>Heise online:</strong> |
|
| 491 |
- <a href="http://www.heise.de/newsticker/meldung/58506"> |
|
| 472 |
+ Heise online</td> |
|
| 473 |
+<td> <a href="http://www.heise.de/newsticker/meldung/58506"> |
|
| 492 | 474 |
CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br> |
| 493 | 475 |
</td> |
| 494 | 476 |
</tr> |
| 495 | 477 |
|
| 496 |
-<tr> |
|
| 497 |
- <td valign="top"> |
|
| 478 |
+<tr bgcolor="#e5e5e5"> |
|
| 479 |
+ <td> |
|
| 498 | 480 |
2005 Apr 5 |
| 499 | 481 |
</td> |
| 500 | 482 |
<td> |
| 501 |
- <strong>Libero:</strong> |
|
| 502 |
- <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> |
|
| 483 |
+ Libero</td> |
|
| 484 |
+<td> <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> |
|
| 503 | 485 |
Anonimato on line, ecco Tor</a> (Italian)<br> |
| 504 | 486 |
</td> |
| 505 | 487 |
</tr> |
| 506 | 488 |
|
| 507 | 489 |
<tr> |
| 508 |
- <td valign="top"> |
|
| 490 |
+ <td> |
|
| 509 | 491 |
2005 Jan 4 |
| 510 | 492 |
</td> |
| 511 | 493 |
<td> |
| 512 |
- <strong>Internetnews:</strong> |
|
| 513 |
- <a href="http://www.internetnews.com/dev-news/article.php/3454521"> |
|
| 494 |
+ Internetnews</td> |
|
| 495 |
+<td> <a href="http://www.internetnews.com/dev-news/article.php/3454521"> |
|
| 514 | 496 |
EFF Throws Support to 'Anonymous' Internet Project</a><br> |
| 515 | 497 |
</td> |
| 516 | 498 |
</tr> |
| 517 | 499 |
|
| 518 |
-<tr> |
|
| 519 |
- <td valign="top"> |
|
| 500 |
+<tr bgcolor="#e5e5e5"> |
|
| 501 |
+ <td> |
|
| 520 | 502 |
2005 Mar 31 |
| 521 | 503 |
</td> |
| 522 | 504 |
<td> |
| 523 |
- <strong>Linux.com:</strong> |
|
| 524 |
- <a href="http://www.linux.com/articles/43713?tid=19&tid=78"> |
|
| 505 |
+ Linux.com</td> |
|
| 506 |
+<td> <a href="http://www.linux.com/articles/43713?tid=19&tid=78"> |
|
| 525 | 507 |
Securing your online privacy with Tor</a><br> |
| 526 | 508 |
</td> |
| 527 | 509 |
</tr> |
| 528 | 510 |
|
| 529 | 511 |
<tr> |
| 530 |
- <td valign="top"> |
|
| 512 |
+ <td> |
|
| 531 | 513 |
2004 Dec 27 |
| 532 | 514 |
</td> |
| 533 | 515 |
<td> |
| 534 |
- <strong>BoingBoing:</strong> |
|
| 535 |
- <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> |
|
| 516 |
+ BoingBoing</td> |
|
| 517 |
+<td> <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> |
|
| 536 | 518 |
EFF helping produce anonymizing software</a><br> |
| 537 | 519 |
</td> |
| 538 | 520 |
</tr> |
| 539 | 521 |
|
| 540 |
-<tr> |
|
| 541 |
- <td valign="top"> |
|
| 522 |
+<tr bgcolor="#e5e5e5"> |
|
| 523 |
+ <td> |
|
| 542 | 524 |
2004 Dec 25 |
| 543 | 525 |
</td> |
| 544 | 526 |
<td> |
| 545 |
- <strong>Kansas City infozine:</strong> |
|
| 546 |
- <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> |
|
| 527 |
+ Kansas City infozine</td> |
|
| 528 |
+<td> <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> |
|
| 547 | 529 |
EFF Joins Forces with Tor Software Project</a><br> |
| 548 | 530 |
</td> |
| 549 | 531 |
</tr> |
| 550 | 532 |
|
| 551 | 533 |
<tr> |
| 552 |
- <td valign="top"> |
|
| 534 |
+ <td> |
|
| 553 | 535 |
2004 Dec 23 |
| 554 | 536 |
</td> |
| 555 | 537 |
<td> |
| 556 |
- <strong>golem.de:</strong> |
|
| 557 |
- <a href="http://www.golem.de/0412/35340.html"> |
|
| 538 |
+ golem.de</td> |
|
| 539 |
+<td> <a href="http://www.golem.de/0412/35340.html"> |
|
| 558 | 540 |
EFF unterstützt Anonymisierer Tor</a> (German)<br> |
| 559 | 541 |
</td> |
| 560 | 542 |
</tr> |
| 561 | 543 |
|
| 562 |
-<tr> |
|
| 563 |
- <td valign="top"> |
|
| 544 |
+<tr bgcolor="#e5e5e5"> |
|
| 545 |
+ <td> |
|
| 564 | 546 |
2004 Dec 23 |
| 565 | 547 |
</td> |
| 566 | 548 |
<td> |
| 567 |
- <strong>SuicideGirls:</strong> |
|
| 568 |
- <a href="http://suicidegirls.com/news/technology/6150/"> |
|
| 549 |
+ SuicideGirls</td> |
|
| 550 |
+<td> <a href="http://suicidegirls.com/news/technology/6150/"> |
|
| 569 | 551 |
New Routing Software Allows Anonymous Internet Use</a><br> |
| 570 | 552 |
</td> |
| 571 | 553 |
</tr> |
| 572 | 554 |
|
| 573 | 555 |
<tr> |
| 574 |
- <td valign="top"> |
|
| 556 |
+ <td> |
|
| 575 | 557 |
2004 Dec 18 |
| 576 | 558 |
</td> |
| 577 | 559 |
<td> |
| 578 |
- <strong>P2Pnet:</strong> |
|
| 579 |
- <a href="http://p2pnet.net/story/3357"> |
|
| 560 |
+ P2Pnet</td> |
|
| 561 |
+<td> <a href="http://p2pnet.net/story/3357"> |
|
| 580 | 562 |
EFF to sponsor Tor</a><br> |
| 581 | 563 |
</td> |
| 582 | 564 |
</tr> |
| 583 | 565 |
|
| 584 |
-<tr> |
|
| 585 |
- <td valign="top"> |
|
| 566 |
+<tr bgcolor="#e5e5e5"> |
|
| 567 |
+ <td> |
|
| 586 | 568 |
2004 Dec 22 |
| 587 | 569 |
</td> |
| 588 | 570 |
<td> |
| 589 |
- <strong>Slashdot:</strong> |
|
| 590 |
- <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17"> |
|
| 571 |
+ Slashdot</td> |
|
| 572 |
+<td> <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17"> |
|
| 591 | 573 |
EFF Promotes Freenet-like System Tor</a><br> |
| 592 | 574 |
</td> |
| 593 | 575 |
</tr> |
| 594 | 576 |
|
| 595 | 577 |
<tr> |
| 596 |
- <td valign="top"> |
|
| 578 |
+ <td> |
|
| 597 | 579 |
2004 Nov 16 |
| 598 | 580 |
</td> |
| 599 | 581 |
<td> |
| 600 |
- <strong>AlterNet:</strong> |
|
| 601 |
- <a href="http://www.alternet.org/columnists/story/20523/"> |
|
| 582 |
+ AlterNet</td> |
|
| 583 |
+<td> <a href="http://www.alternet.org/columnists/story/20523/"> |
|
| 602 | 584 |
Heavy Traffic</a><br> |
| 603 | 585 |
</td> |
| 604 | 586 |
</tr> |
| 605 | 587 |
|
| 606 |
-<tr> |
|
| 607 |
- <td valign="top"> |
|
| 588 |
+<tr bgcolor="#e5e5e5"> |
|
| 589 |
+ <td> |
|
| 608 | 590 |
2004 Aug 30 |
| 609 | 591 |
</td> |
| 610 | 592 |
<td> |
| 611 |
- <strong>Newsweek:</strong> |
|
| 612 |
- Technology: Instant Security (no link)<br> |
|
| 593 |
+ Newsweek</td> |
|
| 594 |
+<td> Technology: Instant Security (no link)<br> |
|
| 613 | 595 |
</td> |
| 614 | 596 |
</tr> |
| 615 | 597 |
|
| 616 | 598 |
<tr> |
| 617 |
- <td valign="top"> |
|
| 599 |
+ <td> |
|
| 618 | 600 |
2004 Aug 16 |
| 619 | 601 |
</td> |
| 620 | 602 |
<td> |
| 621 |
- <strong>Eweek:</strong> |
|
| 622 |
- <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> |
|
| 603 |
+ Eweek</td> |
|
| 604 |
+<td> <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> |
|
| 623 | 605 |
Don't Fear Internet Anonymity Tools</a><br> |
| 624 | 606 |
</td> |
| 625 | 607 |
</tr> |
| 626 | 608 |
|
| 627 |
-<tr> |
|
| 628 |
- <td valign="top"> |
|
| 609 |
+<tr bgcolor="#e5e5e5"> |
|
| 610 |
+ <td> |
|
| 629 | 611 |
2004 Aug 6 |
| 630 | 612 |
</td> |
| 631 | 613 |
<td> |
| 632 |
- <strong>HCC magazine:</strong> |
|
| 633 |
- <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063"> |
|
| 614 |
+ HCC magazine</td> |
|
| 615 |
+<td> <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063"> |
|
| 634 | 616 |
Anoniem surfen met hulp van marine VS</a> (Dutch)<br> |
| 635 | 617 |
</td> |
| 636 | 618 |
</tr> |
| 637 | 619 |
|
| 638 | 620 |
<tr> |
| 639 |
- <td valign="top"> |
|
| 621 |
+ <td> |
|
| 640 | 622 |
2004 Aug 6 |
| 641 | 623 |
</td> |
| 642 | 624 |
<td> |
| 643 |
- <strong>Golem:</strong> |
|
| 644 |
- <a href="http://www.golem.de/0408/32835.html"> |
|
| 625 |
+ Golem</td> |
|
| 626 |
+<td> <a href="http://www.golem.de/0408/32835.html"> |
|
| 645 | 627 |
Tor: Anonymisierer nutzt Onion-Routing</a><br> |
| 646 | 628 |
</td> |
| 647 | 629 |
</tr> |
| 648 | 630 |
|
| 649 |
-<tr> |
|
| 650 |
- <td valign="top"> |
|
| 631 |
+<tr bgcolor="#e5e5e5"> |
|
| 632 |
+ <td> |
|
| 651 | 633 |
2004 Aug 5 |
| 652 | 634 |
</td> |
| 653 | 635 |
<td> |
| 654 |
- <strong>Network World Security:</strong> |
|
| 655 |
- <a href="http://www.networkworld.com/details/7088.html"> |
|
| 636 |
+ Network World Security</td> |
|
| 637 |
+<td> <a href="http://www.networkworld.com/details/7088.html"> |
|
| 656 | 638 |
Onion routing</a><br> |
| 657 | 639 |
</td> |
| 658 | 640 |
</tr> |
| 659 | 641 |
|
| 660 | 642 |
<tr> |
| 661 |
- <td valign="top"> |
|
| 643 |
+ <td> |
|
| 662 | 644 |
2004 May 8 |
| 663 | 645 |
</td> |
| 664 | 646 |
<td> |
| 665 |
- <strong>Wired:</strong> |
|
| 666 |
- <a href="http://www.wired.com/politics/security/news/2004/08/64464"> |
|
| 647 |
+ Wired</td> |
|
| 648 |
+<td> <a href="http://www.wired.com/politics/security/news/2004/08/64464"> |
|
| 667 | 649 |
Onion Routing Averts Prying Eyes</a><br> |
| 668 | 650 |
Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>. |
| 669 | 651 |
</td> |
| 670 | 652 |
</tr> |
| 671 | 653 |
|
| 672 |
-<tr> |
|
| 673 |
- <td valign="top"> |
|
| 654 |
+<tr bgcolor="#e5e5e5"> |
|
| 655 |
+ <td> |
|
| 674 | 656 |
2004 Mar 8 |
| 675 | 657 |
</td> |
| 676 | 658 |
<td> |
| 677 |
- <strong>CNET Japan blog:</strong> |
|
| 678 |
- <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> |
|
| 659 |
+ CNET Japan blog</td> |
|
| 660 |
+<td> <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> |
|
| 679 | 661 |
Yearning of hackers and insecurity</a> (Japanese)<br> |
| 680 | 662 |
</td> |
| 681 | 663 |
</tr> |
| 682 | 664 |
|
| 683 | 665 |
<tr> |
| 684 |
- <td valign="top"> |
|
| 666 |
+ <td> |
|
| 685 | 667 |
1999 Apr 13 |
| 686 | 668 |
</td> |
| 687 | 669 |
<td> |
| 688 |
- <strong>Wired:</strong> |
|
| 689 |
- <a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> |
|
| 670 |
+ Wired</td> |
|
| 671 |
+<td> <a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> |
|
| 690 | 672 |
Anonymous Web Surfing? Uh-Uh</a><br> |
| 691 | 673 |
</td> |
| 692 | 674 |
</tr> |
| 693 | 675 |