Sebastian Hahn commited on 2015-09-03 21:11:33
Zeige 1 geänderte Dateien mit 16 Einfügungen und 16 Löschungen.
... | ... |
@@ -50,77 +50,77 @@ some of the significant Tor-related stories that have popped up.</p> |
50 | 50 |
</tr> |
51 | 51 |
</thead> |
52 | 52 |
<tr style=""> |
53 |
-<td>August 31, 2015</td> |
|
53 |
+<td>2015 Aug 31</td> |
|
54 | 54 |
<td>Statesman</td> |
55 | 55 |
<td><a href="http://www.statesman.com/news/technology/tor-is-software-for-keeping-things-online-anonymou/nnR7z/">‘Tor’ is software for keeping things online anonymous</a></td> |
56 | 56 |
</tr> |
57 | 57 |
<tr style="background-color: #e5e5e5;"> |
58 |
-<td>August 29,2015</td> |
|
58 |
+<td>2015 Aug 29</td> |
|
59 | 59 |
<td>Saturday Paper</td> |
60 | 60 |
<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">Tor and the Deep Web Going Mainstream</a></td> |
61 | 61 |
</tr> |
62 | 62 |
<tr style=""> |
63 |
-<td>August 28, 2015</td> |
|
63 |
+<td>2015 Aug 28</td> |
|
64 | 64 |
<td>SC MAGAZINE</td> |
65 | 65 |
<td><a href="http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/">Dark website Agora closes over Tor vulnerability suspicions</a></td> |
66 | 66 |
</tr> |
67 | 67 |
<tr style="background-color: #e5e5e5;"> |
68 |
-<td>July 31, 2015</td> |
|
68 |
+<td>2015 Jul 31</td> |
|
69 | 69 |
<td>SC Magazine</td> |
70 | 70 |
<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td> |
71 | 71 |
</tr> |
72 | 72 |
<tr style=""> |
73 |
-<td>July 24, 2015</td> |
|
73 |
+<td>2015 Jul 24</td> |
|
74 | 74 |
<td>WHYY Radio</td> |
75 | 75 |
<td><a href="https://technical.ly/philly/2015/07/24/kate-krauss-radio-times/">Security and Privacy on the Internet, with Julia Angwen and Tor Project’s Kate Krauss (starts at 13:30)</a></td> |
76 | 76 |
</tr> |
77 | 77 |
<tr style="background-color: #e5e5e5;"> |
78 |
-<td>July 16, 2015</td> |
|
78 |
+<td>2015 Jul 16</td> |
|
79 | 79 |
<td>Technically Philly</td> |
80 | 80 |
<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">How this West Philly activist became Tor’s first director of communications</a></td> |
81 | 81 |
</tr> |
82 | 82 |
<tr style=""> |
83 |
-<td>July 8, 2015</td> |
|
83 |
+<td>2015 Jul 8</td> |
|
84 | 84 |
<td>Technically Philly</td> |
85 | 85 |
<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">Inside Philly’s Growing Internet Privacy Community</a></td> |
86 | 86 |
</tr> |
87 | 87 |
<tr style="background-color: #e5e5e5;"> |
88 |
-<td>June 13, 2015</td> |
|
88 |
+<td>2015 Jun 13</td> |
|
89 | 89 |
<td>CNN</td> |
90 | 90 |
<td><a href="http://money.cnn.com/2014/06/13/technology/security/dont-get-hacked/index.html">Simple tips to avoid getting hacked</a></td> |
91 | 91 |
</tr> |
92 | 92 |
<tr style=""> |
93 |
-<td>June 30, 2015</td> |
|
93 |
+<td>2015 Jun 30</td> |
|
94 | 94 |
<td>Ars Technica</td> |
95 | 95 |
<td><a href="http://arstechnica.com/tech-policy/2015/07/crypto-activists-announce-vision-for-tor-exit-relay-in-every-library/">Crypto activists announce vision for Tor exit relay in every library "Librarians see the value as soon as you say ‘privacy protecting technology.'" </a></td> |
96 | 96 |
</tr> |
97 | 97 |
<tr style="background-color: #e5e5e5;"> |
98 |
-<td>June 18, 2015</td> |
|
98 |
+<td>2015 Jun 18</td> |
|
99 | 99 |
<td>WIRED</td> |
100 | 100 |
<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">The Dark Web as You Know It Is a Myth</a></td> |
101 | 101 |
</tr> |
102 | 102 |
<tr style=""> |
103 |
-<td>June 18, 2015</td> |
|
103 |
+<td>2015 Jun 18</td> |
|
104 | 104 |
<td>Liberation</td> |
105 | 105 |
<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">Tor: "The emancipatory use of technology"</a></td> |
106 | 106 |
</tr> |
107 | 107 |
<tr style="background-color: #e5e5e5;"> |
108 |
-<td>2015 April 9</td> |
|
108 |
+<td>2015 Apr 9</td> |
|
109 | 109 |
<td>Silicon Republic</td> |
110 | 110 |
<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">Interview with Runa Sandvik</a></td> |
111 | 111 |
</tr> |
112 | 112 |
<tr style=""> |
113 |
-<td>2015 April 4</td> |
|
113 |
+<td>2015 Apr 4</td> |
|
114 | 114 |
<td>El Pais</td> |
115 | 115 |
<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td> |
116 | 116 |
</tr> |
117 | 117 |
<tr style="background-color: #e5e5e5;"> |
118 |
-<td>2015 April 2</td> |
|
118 |
+<td>2015 Apr 2</td> |
|
119 | 119 |
<td>Motherboard </td> |
120 | 120 |
<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">Tor wants to know how to make the darknet mainstream</a></td> |
121 | 121 |
</tr> |
122 | 122 |
<tr style=""> |
123 |
-<td>2015 March 26</td> |
|
123 |
+<td>2015 Mar 26</td> |
|
124 | 124 |
<td>Daily Dot</td> |
125 | 125 |
<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">Tor's great rebranding</a></td> |
126 | 126 |
</tr> |
... | ... |
@@ -172,7 +172,7 @@ href="http://insidebitcoins.com/news/developers-say-privacy-network-tor-was-not- |
172 | 172 |
Say Privacy Network Tor Was Not Compromised During Silk Road Takedown</a></td> |
173 | 173 |
</tr> |
174 | 174 |
<tr style="background-color: #e5e5e5;"> |
175 |
-<td>January 29, 2015</td> |
|
175 |
+<td>2015 Jan 29</td> |
|
176 | 176 |
<td>The Inquirer</td> |
177 | 177 |
<td><a |
178 | 178 |
href="http://www.theinquirer.net/inquirer/news/2392703/mozilla-treats-tor-network-to-a-hardware-helping-hand">Mozilla treats Tor Network to a hardware helping hand |
179 | 179 |