Clean up tormedia.
Andrew Lewman

Andrew Lewman commited on 2008-03-09 04:03:21
Zeige 1 geänderte Dateien mit 276 Einfügungen und 294 Löschungen.

... ...
@@ -1,11 +1,11 @@
1 1
 ## translation metadata
2 2
 # Revision: $Revision: 0 $
3 3
 
4
-#include "head.wmi" TITLE="Tor in the media" CHARSET="UTF-8"
4
+#include "head.wmi" TITLE="Media Appearances of The Tor Project" CHARSET="UTF-8"
5 5
 
6 6
 <div class="main-column">
7 7
 
8
-<h1>Tor in the media</h1>
8
+<h1>Media Appearances</h1>
9 9
 
10 10
 <h2>Interviews &amp; Appearances</h2>
11 11
 
... ...
@@ -14,175 +14,172 @@ and the CBS Evening News have sought out or quoted Tor Project members
14 14
 due to their expertise on anonymity, privacy, and Internet censorship issues.
15 15
 Some samples: </p>
16 16
 
17
-<dl>
18
-<dt>2008 Feb 01, PC World</dt>
19
-<dd><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
17
+<table border="0" cellpadding="3" cellspacing="0">
18
+<thead bgcolor="#e5e5e5">
19
+<th>Date</th>
20
+<th>Publication</th>
21
+<th>Topic</th>
22
+</thead>
23
+
24
+<tr>
25
+<td>2008 Feb 01</td>
26
+<td>PC World</td>
27
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
20 28
 Hackers Can Expose Masked Surfers, Study Says</a>
21 29
 A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
22 30
 Steven Murdoch's recent PhD thesis</a>. Steven <a
23 31
 href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
24
-responds on the Tor Blog</a>.</dd>
25
-<dt>2006 Apr 11, PBS Frontline</dt>
26
-<dd><a
32
+responds on the Tor Blog</a>.</td>
33
+</tr>
34
+<tr bgcolor="#e5e5e5">
35
+<td>2006 Apr 11</td>
36
+<td>PBS Frontline</td>
37
+<td><a
27 38
 href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">
28
-Chipping Away at China's Great Firewall</a></dd>
29
-<dt>2006 Feb 28, PC World</dt>
30
-<dd><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
31
-Outsmarting the Online Privacy Snoops</a></dd>
32
-<dt>2006 Feb 27, Forbes</dt>
33
-<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
39
+Chipping Away at China's Great Firewall</a></td>
40
+</tr>
41
+<tr>
42
+<td>2006 Feb 28</td>
43
+<td>PC World</td>
44
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
45
+Outsmarting the Online Privacy Snoops</a></td>
46
+</tr>
47
+<tr bgcolor="#e5e5e5">
48
+<td>2006 Feb 27</td>
49
+<td>Forbes</td>
50
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
34 51
 Cracks In the Wall</a>.  Discussion of Tor being used for evading censorship by repressive
35
-governments. </dd>
36
-<dt>2006 Feb 20, The Boston Globe</dt>
37
-<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
38
-Beating censorship on the Internet</a></dd>
39
-<dt>2006 Feb 15, CBS Evening News</dt>
40
-<dd><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
41
-    Cracking The 'Great Firewall Of China'</a>.
42
-    Roger Dingledine appeared on the show to discuss Tor, starting at
43
-1:04 into the video.</dd>
44
-<dt>2006 Feb 15, CNBC - Closing Bell</dt>
45
-<dd>TV Appearance by Roger Dingledine at 4:25pm. (no link)</dd>
46
-<dt>2006 Jan 27, Fox News/eWeek</dt>
47
-<dd><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
48
-Anonymizers Suddenly Get Very Popular</a></dd>
49
-<dt>2006 Jan 25, New York Times</dt>
50
-<dd><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin">
51
-    Privacy for People Who Don't Show Their Navels</a></dd>
52
-<dt>2005 Aug 6, New Scientist</dt>
53
-<dd><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></dd>
54
-</dl>
52
+governments. </td>
53
+</tr>
54
+<tr>
55
+<td>2006 Feb 20</td>
56
+<td>The Boston Globe</td>
57
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
58
+Beating censorship on the Internet</a></td>
59
+</tr>
60
+<tr bgcolor="#e5e5e5">
61
+<td>2006 Feb 15</td>
62
+<td>CBS Evening News</td>
63
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
64
+Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine appeared on the show to discuss Tor, starting at
65
+1:04 into the video.</td>
66
+</tr>
67
+<tr>
68
+<td>2006 Feb 15</td>
69
+<td>CNBC - Closing Bell</td>
70
+<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
71
+</tr>
72
+<tr bgcolor="#e5e5e5">
73
+<td>2006 Jan 27</td>
74
+<td>Fox News/eWeek</td>
75
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
76
+Anonymizers Suddenly Get Very Popular</a></td>
77
+</tr>
78
+<tr>
79
+<td>2006 Jan 25</td>
80
+<td>New York Times</td>
81
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin">
82
+Privacy for People Who Don't Show Their Navels</a></td>
83
+</tr>
84
+<tr bgcolor="#e5e5e5">
85
+<td>2005 Aug 6</td>
86
+<td>New Scientist</td>
87
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td>
88
+</tr>
89
+</table>
55 90
 
56 91
 <p />
57
-<h2>Articles that involve Tor</h2>
92
+<h2>Articles</h2>
58 93
 
59 94
 <p> Since Tor is widely used throughout the world, it is mentioned regularly in the press.
60 95
 This list is not comprehensive, but illustrates some of the significant
61 96
 Tor-related stories that have popped up.  </p>
62 97
 
63
-<table border=0 cellpadding=3>
98
+<table border="0" cellpadding="3" cellspacing="0">
99
+<thead bgcolor="#e5e5e5">
100
+<th>Date</th>
101
+<th>Publication</th>
102
+<th>Topic</th>
103
+</thead>
64 104
 
65 105
 <tr>
66
-  <td valign="top">
67
-    2008 Feb 14
68
-  </td>
69
-  <td>
70
-    <strong>Wired: Compiler Blog:</strong>
71
-    <a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
72
-    How To: Set Up Anonymous Browsing in 30 Seconds or Less</a><br> 
106
+<td>2008 Feb 14</td>
107
+<td>Wired: Compiler Blog</td>
108
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
109
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
73 110
 </td>
74 111
 </tr>
75 112
 
76
-<tr>
77
-  <td valign="top" width=100>
78
-    2007 Sep 21
79
-  </td>
80
-  <td>
81
-    <strong>Wired HowTo Blog:</strong> 
82
-    <a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
83
-    Be a Whistleblower</a><br>
84
-    Wired recommends Tor for whistleblowers who wish to remain anonymous.
113
+<tr bgcolor="#e5e5e5">
114
+<td>2007 Sep 21</td>
115
+<td>Wired HowTo Blog</td>
116
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
117
+Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.
85 118
 </td>
86 119
 </tr>
87 120
 
88 121
 <tr>
89
-  <td valign="top">
90
-    2007 Sep 16
91
-  </td>
92
-  <td>
93
-    <strong>Cnet:</strong> 
94
-    <a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?">
95
-    Tor anonymity server admin arrested</a><br>
96
-    A Tor exit node operator from Germany was arrested and then released once the police realized
97
-    their mistake. Unfortunately, the hassle
98
-    <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html">
99
-    caused this operator to shut down the node</a>.
100
-    We have an
101
-    <a href="<page faq-abuse>">
102
-    Abuse FAQ for Tor Relay Operators</a>,
103
-    as well as a
104
-    <a href="page eff/tor-legal-faq>">
105
-    Legal FAQ for Tor Relay Operators</a>
106
-    with advice on how to handle such issues if you are operating a Tor relay.
122
+<td>2007 Sep 16</td>
123
+<td>Cnet</td>
124
+<td><a href="http://www.cnet.com/surveillance-state/8301-13739_1-9779225-46.html?">
125
+    Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized
126
+    their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>.
127
+    We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="page eff/tor-legal-faq>">
128
+    Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.
107 129
   </td>
108 130
 </tr>
109 131
 
110
-<tr>
111
-  <td valign="top">
112
-    2007 Sep 10
113
-  </td>
114
-  <td>
115
-    <strong>Wired:</strong> 
116
-    <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
132
+<tr bgcolor="#e5e5e5">
133
+<td>2007 Sep 10</td>
134
+<td>Wired</td>
135
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
117 136
 Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br>
118 137
 Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node
119 138
 he was running, then published unencrypted account and password information.
120 139
 Note that the better articles covering this event correctly indicate that this is not a security
121 140
 flaw or design problem with Tor - Tor provides anonymity, but does not
122
-    encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while
141
+encrypt anything going to or from an exit node. You must</strong> use SSL (https) while
123 142
 browsing to ensure end-to-end encryption.
124 143
 Also covered in
125 144
 <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
126
-    The Inquirer</a>,
127
-    <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
128
-    InfoWorld</a>,
129
-    <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
145
+The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
146
+InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
130 147
 The Sydney Morning Herald</a>,
131 148
 <a href="http://www.securityfocus.com/news/11486">
132
-    Security Focus</a>,
133
-    <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
134
-    ars technica</a>,
135
-    and many others. It was reported as early as August 31, 2007 on the
149
+Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
150
+ars technica</a>, and many others. It was reported as early as August 31, 2007 on the
136 151
 <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
137 152
 Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.
138 153
 In the end, Mr. Egerstad was arrested, which was covered by
139 154
 <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
140
-    The Register</a>,
141
-    <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
142
-    The Sydney Morning Herald</a>,
143
-    <a href="http://blogs.zdnet.com/Berlind/?p=900">
144
-    ZDNet</a>, and
145
-    <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html">
146
-    Wired Blog</a>.
155
+The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
156
+The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900">
157
+ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.
147 158
 </td>
148 159
 </tr>
149 160
 
150 161
 <tr>
151
-  <td valign="top">
152
-    2007 Jul 27
153
-  </td>
154
-  <td>
155
-    <strong>Wired Blog:</strong> 
156
-    <a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html">
157
-    Cyber Jihadists Embrace Tor</a><br>
158
-    A pointer to a
159
-    <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
160
-    blog</a>
161
-    that posted screenshots of Arabic instructions on using
162
-    Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
162
+<td>2007 Jul 27</td>
163
+<td>Wired Blog</td>
164
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br>
165
+A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
166
+blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
163 167
 at the bottom of the article.
164 168
 </td>
165 169
 </tr>
166 170
 
167
-<tr>
168
-  <td valign="top">
169
-    2007 Jun 22
170
-  </td>
171
-  <td>
172
-    <strong>Bangkok Post:</strong>
173
-    <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
174
-    The problems with censorship</a><br>
175
-    Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
171
+<tr bgcolor="#e5e5e5">
172
+<td>2007 Jun 22</td>
173
+<td>Bangkok Post</td>
174
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
175
+The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
176 176
 </td>
177 177
 </tr>
178 178
 
179 179
 <tr>
180
-  <td valign="top">
181
-    2007 Mar 15
182
-  </td>
183
-  <td>
184
-    <strong>World Changing:</strong> 
185
-    <a href="http://www.worldchanging.com/archives/006309.html">
180
+<td>2007 Mar 15</td>
181
+<td>World Changing</td>
182
+<td><a href="http://www.worldchanging.com/archives/006309.html">
186 183
 Blogging Where Speech Isn’t Free</a><br>
187 184
 Coverage of former Tor Executive Director Shava Nerad's participation at an
188 185
 <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124">
... ...
@@ -190,39 +187,30 @@ Tor-related stories that have popped up.  </p>
190 187
 </td>
191 188
 </tr>
192 189
 
193
-<tr>
194
-  <td valign="top">
195
-    2007 Mar 8
196
-  </td>
197
-  <td>
198
-    <strong>Security Focus:</strong> 
199
-    <a href="http://www.securityfocus.com/news/11447/1">
200
-    Tor hack proposed to catch criminals</a><br>
190
+<tr bgcolor="#e5e5e5">
191
+<td>2007 Mar 8</td>
192
+<td>Security Focus</td>
193
+<td><a href="http://www.securityfocus.com/news/11447/1">
194
+Tor hack proposed to catch criminals</a>.
201 195
 Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the
202 196
 Tor Project illustrating why this approach may not be a good idea.
203 197
 </td>
204 198
 </tr>
205 199
 
206 200
 <tr>
207
-  <td valign="top">
208
-    2007 Feb 1
209
-  </td>
210
-  <td>
211
-    <strong>Dr Dobb's:</strong> 
212
-    <a href="http://www.ddj.com/security/197002414">
213
-    Tor Project Protects Anonymous Sources</a><br>
201
+<td>2007 Feb 1</td>
202
+<td>Dr Dobb's</td>
203
+<td><a href="http://www.ddj.com/security/197002414">
204
+Tor Project Protects Anonymous Sources</a>.
214 205
 An introduction to Tor, including technical and historical background.
215 206
 </td>
216 207
 </tr>
217 208
 
218
-<tr>
219
-  <td valign="top">
220
-    2006 Oct 19
221
-  </td>
222
-  <td>
223
-    <strong>Wired Threat Level:</strong> 
224
-    <a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
225
-    The Onion Router (TOR) is Leaky (Leeky)</a><br>
209
+<tr bgcolor="#e5e5e5">
210
+<td>2006 Oct 19</td>
211
+<td>Wired Threat Level</td>
212
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
213
+The Onion Router (TOR) is Leaky (Leeky)</a>.
226 214
 Explains why you need something like Privoxy
227 215
 in addition to the core Tor code to ensure your anonymity. If you use the
228 216
 Vidalia bundle, it installs and configures Privoxy automatically, but it can't
... ...
@@ -231,48 +219,42 @@ Tor-related stories that have popped up.  </p>
231 219
 </tr>
232 220
 
233 221
 <tr>
234
-  <td valign="top">
235
-    2006 Aug 18
236
-  </td>
237
-  <td>
238
-    <strong>NPR:</strong> 
239
-    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
240
-    Tips for Protecting Privacy Online</a><br>
222
+<td>2006 Aug 18</td>
223
+<td>NPR</td>
224
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
225
+Tips for Protecting Privacy Online</a>.
241 226
 Kevin Bankston of the EFF recommends Tor during an NPR interview.
242 227
 Tor information begins at 8:15 into the program.
243 228
 </td>
244 229
 </tr>
245 230
 
246
-<tr>
247
-  <td valign="top">
248
-    2006 Jul 5
249
-  </td>
250
-  <td>
251
-    <strong>MSNBC:</strong> 
252
-    <a href="http://www.msnbc.msn.com/id/13718446/page/2/">
253
-    Defending liberties in high-tech world</a><br>
231
+<tr bgcolor="#e5e5e5">
232
+<td>2006 Jul 5</td>
233
+<td>MSNBC</td>
234
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/">
235
+Defending liberties in high-tech world</a>.
254 236
 Mentions EFF funding for Tor as one of its significant nonlitigation projects.
255 237
 </td>
256 238
 </tr>
257 239
 
258 240
 <tr>
259
-  <td valign="top">
241
+  <td>
260 242
     2006 Feb 15
261 243
   </td>
262 244
   <td>
263
-    <strong>Network Secure:</strong>
264
-    <a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909">
245
+    Network Secure</td>
246
+    <td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909">
265 247
     Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br> 
266 248
   </td>
267 249
 </tr>
268 250
 
269
-<tr>
270
-  <td valign="top">
251
+<tr bgcolor="#e5e5e5">
252
+  <td>
271 253
     2006 Feb 13
272 254
   </td>
273 255
   <td>
274
-    <strong>Wall Street Journal:</strong> 
275
-    <a href="http://online.wsj.com/article/SB113979965346572150.html">
256
+    Wall Street Journal</td> 
257
+<td>    <a href="http://online.wsj.com/article/SB113979965346572150.html">
276 258
     Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br>
277 259
     Full article text can also be found
278 260
     <a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.
... ...
@@ -280,413 +262,413 @@ Tor-related stories that have popped up.  </p>
280 262
 </tr>
281 263
 
282 264
 <tr>
283
-  <td valign="top">
265
+  <td>
284 266
     2006 Jan 31
285 267
   </td>
286 268
   <td>
287
-    <strong>Technology Review:</strong> 
288
-    <a href="http://www.technologyreview.com/Infotech/16216/page2/">
269
+    Technology Review</td> 
270
+<td>    <a href="http://www.technologyreview.com/Infotech/16216/page2/">
289 271
     Evading the Google Eye</a><br>
290 272
   </td>
291 273
 </tr>
292 274
 
293
-<tr>
294
-  <td valign="top">
275
+<tr bgcolor="#e5e5e5">
276
+  <td>
295 277
     2006 Jan 29
296 278
   </td>
297 279
   <td>
298
-    <strong>New York Times:</strong> 
299
-    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
280
+    New York Times</td> 
281
+<td>    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
300 282
     How to Outwit the World's Internet Censors</a><br>
301 283
   </td>
302 284
 </tr>
303 285
 
304 286
 <tr>
305
-  <td valign="top">
287
+  <td>
306 288
     2006 Jan 23
307 289
   </td>
308 290
   <td>
309
-    <strong>NPR Talk of the Nation:</strong> 
310
-    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
291
+    NPR Talk of the Nation</td> 
292
+<td>    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
311 293
     Search Engines and Privacy Rights on the Web</a><br>
312 294
     <a href="http://xeni.net/">Xeni Jardin</a>
313 295
     recommends Tor at 33:30 into the program.
314 296
   </td>
315 297
 </tr>
316 298
 
317
-<tr>
318
-  <td valign="top">
299
+<tr bgcolor="#e5e5e5">
300
+  <td>
319 301
     2006 Feb 15
320 302
   </td>
321 303
   <td>
322
-    <strong>Punto Informatico:</strong>
323
-    <a href="http://punto-informatico.it/p.aspx?i=1430903">
304
+    Punto Informatico</td>
305
+<td>    <a href="http://punto-informatico.it/p.aspx?i=1430903">
324 306
     TOR c'è</a> (Italian)<br> 
325 307
   </td>
326 308
 </tr>
327 309
 
328 310
 <tr>
329
-  <td valign="top">
311
+  <td>
330 312
     2006 Jan 20
331 313
   </td>
332 314
   <td>
333
-    <strong>Wired:</strong>
334
-    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
315
+    Wired</td>
316
+<td>    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
335 317
     How to Foil Search Engine Snoops</a><br> 
336 318
   </td>
337 319
 </tr>
338 320
 
339
-<tr>
340
-  <td valign="top">
321
+<tr bgcolor="#e5e5e5">
322
+  <td>
341 323
     2006 Jan 20
342 324
   </td>
343 325
   <td>
344
-    <strong>NPR:</strong> 
345
-    <a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
326
+    NPR</td> 
327
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
346 328
     Google Records Subpoena Raises Privacy Fears</a><br>
347 329
   </td>
348 330
 </tr>
349 331
 
350 332
 <tr>
351
-  <td valign="top">
333
+  <td>
352 334
     2005 Sep 30
353 335
   </td>
354 336
   <td>
355
-    <strong>Viva o Linux:</strong>
356
-    <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
337
+    Viva o Linux</td>
338
+   <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
357 339
     TOR: A Internet sem rastreabilidade</a> (Portuguese)<br> 
358 340
   </td>
359 341
 </tr>
360 342
 
361
-<tr>
362
-  <td valign="top">
343
+<tr bgcolor="#e5e5e5">
344
+  <td>
363 345
     2005 Jul 12
364 346
   </td>
365 347
   <td>
366
-    <strong>IEEE Computer Society's Technical Committee on Security and Privacy:</strong>
367
-    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
348
+    IEEE Computer Society's Technical Committee on Security and Privacy</td>
349
+<td>    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
368 350
     Onion routing application Tor makes PCWorld's top 100</a><br> 
369 351
   </td>
370 352
 </tr>
371 353
 
372 354
 <tr>
373
-  <td valign="top">
355
+  <td>
374 356
     2005 Jun 22
375 357
   </td>
376 358
   <td>
377
-    <strong>The Unofficial Apple Blog:</strong>
378
-    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
359
+    The Unofficial Apple Blog</td>
360
+<td>    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
379 361
     Privacy Watch: Tor</a><br> 
380 362
   </td>
381 363
 </tr>
382 364
 
383
-<tr>
384
-  <td valign="top">
365
+<tr bgcolor="#e5e5e5">
366
+  <td>
385 367
     2005 Jun 10
386 368
   </td>
387 369
   <td>
388
-    <strong>The New Zealand Herald:</strong>
389
-    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896">
370
+    The New Zealand Herald</td>
371
+<td>    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=10329896">
390 372
     China's internet censorship stranglehold can't last</a><br> 
391 373
   </td>
392 374
 </tr>
393 375
 
394 376
 <tr>
395
-  <td valign="top">
377
+  <td>
396 378
     2005 Jun 8
397 379
   </td>
398 380
   <td>
399
-    <strong>American Public Radio:</strong>
400
-    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
381
+    American Public Radio</td>
382
+<td>    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
401 383
     An Internet privacy tool called "Tor"</a><br> 
402 384
   </td>
403 385
 </tr>
404 386
 
405
-<tr>
406
-  <td valign="top">
387
+<tr bgcolor="#e5e5e5">
388
+  <td>
407 389
     2005 Jun 1
408 390
   </td>
409 391
   <td>
410
-    <strong>PC World:</strong>
411
-    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
392
+    PC World</td>
393
+<td>    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
412 394
     The 100 Best Products of 2005</a><br>
413 395
     Tor is ranked #40 on the list. 
414 396
   </td>
415 397
 </tr>
416 398
 
417 399
 <tr>
418
-  <td valign="top">
400
+  <td>
419 401
     2005 Jun 1
420 402
   </td>
421 403
   <td>
422
-    <strong>Linux Weekly News:</strong>
423
-    <a href="http://lwn.net/Articles/138242/">
404
+    Linux Weekly News</td>
405
+<td>    <a href="http://lwn.net/Articles/138242/">
424 406
     A Look at The Onion Router (Tor)</a><br> 
425 407
   </td>
426 408
 </tr>
427 409
 
428
-<tr>
429
-  <td valign="top">
410
+<tr bgcolor="#e5e5e5">
411
+  <td>
430 412
     2005 May 22
431 413
   </td>
432 414
   <td>
433
-    <strong>Slashdot:</strong>
434
-    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
415
+    Slashdot</td>
416
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
435 417
      Tor Anonymity Network Reaches 100 Verified Nodes</a><br> 
436 418
   </td>
437 419
 </tr>
438 420
 
439 421
 <tr>
440
-  <td valign="top">
422
+  <td>
441 423
     2005 May 20
442 424
   </td>
443 425
   <td>
444
-    <strong>Security.uz:</strong>
445
-    <a href="http://security.uz/news/default.asp?id=10541">
426
+    Security.uz</td>
427
+<td>    <a href="http://security.uz/news/default.asp?id=10541">
446 428
     Tor - мощный анонимайзер для всех ОС</a> (Russian)<br> 
447 429
   </td>
448 430
 </tr>
449 431
 
450
-<tr>
451
-  <td valign="top">
432
+<tr bgcolor="#e5e5e5">
433
+  <td>
452 434
     2005 May 19
453 435
   </td>
454 436
   <td>
455
-    <strong>WebPlanet:</strong>
456
-    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
437
+    WebPlanet</td>
438
+<td>    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
457 439
     Tor: распределенная система анонимного серфинга</a> (Russian)<br> 
458 440
   </td>
459 441
 </tr>
460 442
 
461 443
 <tr>
462
-  <td valign="top">
444
+  <td>
463 445
     2005 May 17
464 446
   </td>
465 447
   <td>
466
-    <strong>Wired:</strong> 
467
-    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
448
+    Wired</td> 
449
+<td>    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
468 450
     Tor Torches Online Tracking</a><br>
469 451
     Also available in
470 452
     <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.
471 453
   </td>
472 454
 </tr>
473 455
 
474
-<tr>
475
-  <td valign="top">
456
+<tr bgcolor="#e5e5e5">
457
+  <td>
476 458
     2005 May 17
477 459
   </td>
478 460
   <td>
479
-    <strong>XBiz:</strong>
480
-    <a href="http://xbiz.com/news/8761">
461
+    XBiz</td>
462
+<td>    <a href="http://xbiz.com/news/8761">
481 463
     Navy Project Allows Anonymous Browsing</a><br> 
482 464
   </td>
483 465
 </tr>
484 466
 
485 467
 <tr>
486
-  <td valign="top">
468
+  <td>
487 469
     2005 Apr 13
488 470
   </td>
489 471
   <td>
490
-    <strong>Heise online:</strong>
491
-    <a href="http://www.heise.de/newsticker/meldung/58506">
472
+    Heise online</td>
473
+<td>    <a href="http://www.heise.de/newsticker/meldung/58506">
492 474
     CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br> 
493 475
   </td>
494 476
 </tr>
495 477
 
496
-<tr>
497
-  <td valign="top">
478
+<tr bgcolor="#e5e5e5">
479
+  <td>
498 480
     2005 Apr 5
499 481
   </td>
500 482
   <td>
501
-    <strong>Libero:</strong>
502
-    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
483
+    Libero</td>
484
+<td>    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
503 485
     Anonimato on line, ecco Tor</a> (Italian)<br> 
504 486
   </td>
505 487
 </tr>
506 488
 
507 489
 <tr>
508
-  <td valign="top">
490
+  <td>
509 491
     2005 Jan 4
510 492
   </td>
511 493
   <td>
512
-    <strong>Internetnews:</strong>
513
-    <a href="http://www.internetnews.com/dev-news/article.php/3454521">
494
+    Internetnews</td>
495
+<td>    <a href="http://www.internetnews.com/dev-news/article.php/3454521">
514 496
     EFF Throws Support to 'Anonymous' Internet Project</a><br> 
515 497
   </td>
516 498
 </tr>
517 499
 
518
-<tr>
519
-  <td valign="top">
500
+<tr bgcolor="#e5e5e5">
501
+  <td>
520 502
     2005 Mar 31
521 503
   </td>
522 504
   <td>
523
-    <strong>Linux.com:</strong>
524
-    <a href="http://www.linux.com/articles/43713?tid=19&tid=78">
505
+    Linux.com</td>
506
+<td>    <a href="http://www.linux.com/articles/43713?tid=19&tid=78">
525 507
     Securing your online privacy with Tor</a><br> 
526 508
   </td>
527 509
 </tr>
528 510
 
529 511
 <tr>
530
-  <td valign="top">
512
+  <td>
531 513
     2004 Dec 27
532 514
   </td>
533 515
   <td>
534
-    <strong>BoingBoing:</strong>
535
-    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
516
+    BoingBoing</td>
517
+<td>    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
536 518
     EFF helping produce anonymizing software</a><br> 
537 519
   </td>
538 520
 </tr>
539 521
 
540
-<tr>
541
-  <td valign="top">
522
+<tr bgcolor="#e5e5e5">
523
+  <td>
542 524
     2004 Dec 25
543 525
   </td>
544 526
   <td>
545
-    <strong>Kansas City infozine:</strong>
546
-    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
527
+    Kansas City infozine</td>
528
+<td>    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
547 529
     EFF Joins Forces with Tor Software Project</a><br> 
548 530
   </td>
549 531
 </tr>
550 532
 
551 533
 <tr>
552
-  <td valign="top">
534
+  <td>
553 535
     2004 Dec 23
554 536
   </td>
555 537
   <td>
556
-    <strong>golem.de:</strong>
557
-    <a href="http://www.golem.de/0412/35340.html">
538
+    golem.de</td>
539
+<td>    <a href="http://www.golem.de/0412/35340.html">
558 540
     EFF unterstützt Anonymisierer Tor</a> (German)<br> 
559 541
   </td>
560 542
 </tr>
561 543
 
562
-<tr>
563
-  <td valign="top">
544
+<tr bgcolor="#e5e5e5">
545
+  <td>
564 546
     2004 Dec 23
565 547
   </td>
566 548
   <td>
567
-    <strong>SuicideGirls:</strong>
568
-    <a href="http://suicidegirls.com/news/technology/6150/">
549
+    SuicideGirls</td>
550
+<td>    <a href="http://suicidegirls.com/news/technology/6150/">
569 551
     New Routing Software Allows Anonymous Internet Use</a><br> 
570 552
   </td>
571 553
 </tr>
572 554
 
573 555
 <tr>
574
-  <td valign="top">
556
+  <td>
575 557
     2004 Dec 18
576 558
   </td>
577 559
   <td>
578
-    <strong>P2Pnet:</strong>
579
-    <a href="http://p2pnet.net/story/3357">
560
+    P2Pnet</td>
561
+<td>    <a href="http://p2pnet.net/story/3357">
580 562
     EFF to sponsor Tor</a><br> 
581 563
   </td>
582 564
 </tr>
583 565
 
584
-<tr>
585
-  <td valign="top">
566
+<tr bgcolor="#e5e5e5">
567
+  <td>
586 568
     2004 Dec 22
587 569
   </td>
588 570
   <td>
589
-    <strong>Slashdot:</strong>
590
-    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17">
571
+    Slashdot</td>
572
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95&tid=158&tid=153&tid=17">
591 573
      EFF Promotes Freenet-like System Tor</a><br> 
592 574
   </td>
593 575
 </tr>
594 576
 
595 577
 <tr>
596
-  <td valign="top">
578
+  <td>
597 579
     2004 Nov 16
598 580
   </td>
599 581
   <td>
600
-    <strong>AlterNet:</strong>
601
-    <a href="http://www.alternet.org/columnists/story/20523/">
582
+    AlterNet</td>
583
+<td>    <a href="http://www.alternet.org/columnists/story/20523/">
602 584
     Heavy Traffic</a><br> 
603 585
   </td>
604 586
 </tr>
605 587
 
606
-<tr>
607
-  <td valign="top">
588
+<tr bgcolor="#e5e5e5">
589
+  <td>
608 590
     2004 Aug 30
609 591
   </td>
610 592
   <td>
611
-    <strong>Newsweek:</strong>
612
-    Technology: Instant Security (no link)<br> 
593
+    Newsweek</td>
594
+<td>    Technology: Instant Security (no link)<br> 
613 595
   </td>
614 596
 </tr>
615 597
 
616 598
 <tr>
617
-  <td valign="top">
599
+  <td>
618 600
     2004 Aug 16
619 601
   </td>
620 602
   <td>
621
-    <strong>Eweek:</strong>
622
-    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
603
+    Eweek</td>
604
+<td>    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
623 605
     Don't Fear Internet Anonymity Tools</a><br> 
624 606
   </td>
625 607
 </tr>
626 608
 
627
-<tr>
628
-  <td valign="top">
609
+<tr bgcolor="#e5e5e5">
610
+  <td>
629 611
     2004 Aug 6
630 612
   </td>
631 613
   <td>
632
-    <strong>HCC magazine:</strong>
633
-    <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063">
614
+    HCC magazine</td>
615
+<td>    <a href="http://www.hccmagazine.nl/index.cfm?fuseaction=home.showNieuws&id=44063">
634 616
     Anoniem surfen met hulp van marine VS</a> (Dutch)<br> 
635 617
   </td>
636 618
 </tr>
637 619
 
638 620
 <tr>
639
-  <td valign="top">
621
+  <td>
640 622
     2004 Aug 6
641 623
   </td>
642 624
   <td>
643
-    <strong>Golem:</strong>
644
-    <a href="http://www.golem.de/0408/32835.html">
625
+    Golem</td>
626
+<td>    <a href="http://www.golem.de/0408/32835.html">
645 627
     Tor: Anonymisierer nutzt Onion-Routing</a><br> 
646 628
   </td>
647 629
 </tr>
648 630
 
649
-<tr>
650
-  <td valign="top">
631
+<tr bgcolor="#e5e5e5">
632
+  <td>
651 633
     2004 Aug 5
652 634
   </td>
653 635
   <td>
654
-    <strong>Network World Security:</strong>
655
-    <a href="http://www.networkworld.com/details/7088.html">
636
+    Network World Security</td>
637
+<td>    <a href="http://www.networkworld.com/details/7088.html">
656 638
     Onion routing</a><br> 
657 639
   </td>
658 640
 </tr>
659 641
 
660 642
 <tr>
661
-  <td valign="top">
643
+  <td>
662 644
     2004 May 8
663 645
   </td>
664 646
   <td>
665
-    <strong>Wired:</strong>
666
-    <a href="http://www.wired.com/politics/security/news/2004/08/64464">
647
+    Wired</td>
648
+<td>    <a href="http://www.wired.com/politics/security/news/2004/08/64464">
667 649
     Onion Routing Averts Prying Eyes</a><br>
668 650
     Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.
669 651
   </td>
670 652
 </tr>
671 653
 
672
-<tr>
673
-  <td valign="top">
654
+<tr bgcolor="#e5e5e5">
655
+  <td>
674 656
     2004 Mar 8
675 657
   </td>
676 658
   <td>
677
-    <strong>CNET Japan blog:</strong>
678
-    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
659
+    CNET Japan blog</td>
660
+<td>    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
679 661
     Yearning of hackers and insecurity</a> (Japanese)<br> 
680 662
   </td>
681 663
 </tr>
682 664
 
683 665
 <tr>
684
-  <td valign="top">
666
+  <td>
685 667
     1999 Apr 13
686 668
   </td>
687 669
   <td>
688
-    <strong>Wired:</strong>
689
-    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
670
+    Wired</td>
671
+<td>    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
690 672
     Anonymous Web Surfing? Uh-Uh</a><br> 
691 673
   </td>
692 674
 </tr>
693 675