Sebastian Hahn commited on 2015-09-03 21:11:33
Zeige 1 geänderte Dateien mit 16 Einfügungen und 16 Löschungen.
| ... | ... |
@@ -50,77 +50,77 @@ some of the significant Tor-related stories that have popped up.</p> |
| 50 | 50 |
</tr> |
| 51 | 51 |
</thead> |
| 52 | 52 |
<tr style=""> |
| 53 |
-<td>August 31, 2015</td> |
|
| 53 |
+<td>2015 Aug 31</td> |
|
| 54 | 54 |
<td>Statesman</td> |
| 55 | 55 |
<td><a href="http://www.statesman.com/news/technology/tor-is-software-for-keeping-things-online-anonymou/nnR7z/">‘Tor’ is software for keeping things online anonymous</a></td> |
| 56 | 56 |
</tr> |
| 57 | 57 |
<tr style="background-color: #e5e5e5;"> |
| 58 |
-<td>August 29,2015</td> |
|
| 58 |
+<td>2015 Aug 29</td> |
|
| 59 | 59 |
<td>Saturday Paper</td> |
| 60 | 60 |
<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">Tor and the Deep Web Going Mainstream</a></td> |
| 61 | 61 |
</tr> |
| 62 | 62 |
<tr style=""> |
| 63 |
-<td>August 28, 2015</td> |
|
| 63 |
+<td>2015 Aug 28</td> |
|
| 64 | 64 |
<td>SC MAGAZINE</td> |
| 65 | 65 |
<td><a href="http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/">Dark website Agora closes over Tor vulnerability suspicions</a></td> |
| 66 | 66 |
</tr> |
| 67 | 67 |
<tr style="background-color: #e5e5e5;"> |
| 68 |
-<td>July 31, 2015</td> |
|
| 68 |
+<td>2015 Jul 31</td> |
|
| 69 | 69 |
<td>SC Magazine</td> |
| 70 | 70 |
<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td> |
| 71 | 71 |
</tr> |
| 72 | 72 |
<tr style=""> |
| 73 |
-<td>July 24, 2015</td> |
|
| 73 |
+<td>2015 Jul 24</td> |
|
| 74 | 74 |
<td>WHYY Radio</td> |
| 75 | 75 |
<td><a href="https://technical.ly/philly/2015/07/24/kate-krauss-radio-times/">Security and Privacy on the Internet, with Julia Angwen and Tor Project’s Kate Krauss (starts at 13:30)</a></td> |
| 76 | 76 |
</tr> |
| 77 | 77 |
<tr style="background-color: #e5e5e5;"> |
| 78 |
-<td>July 16, 2015</td> |
|
| 78 |
+<td>2015 Jul 16</td> |
|
| 79 | 79 |
<td>Technically Philly</td> |
| 80 | 80 |
<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">How this West Philly activist became Tor’s first director of communications</a></td> |
| 81 | 81 |
</tr> |
| 82 | 82 |
<tr style=""> |
| 83 |
-<td>July 8, 2015</td> |
|
| 83 |
+<td>2015 Jul 8</td> |
|
| 84 | 84 |
<td>Technically Philly</td> |
| 85 | 85 |
<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">Inside Philly’s Growing Internet Privacy Community</a></td> |
| 86 | 86 |
</tr> |
| 87 | 87 |
<tr style="background-color: #e5e5e5;"> |
| 88 |
-<td>June 13, 2015</td> |
|
| 88 |
+<td>2015 Jun 13</td> |
|
| 89 | 89 |
<td>CNN</td> |
| 90 | 90 |
<td><a href="http://money.cnn.com/2014/06/13/technology/security/dont-get-hacked/index.html">Simple tips to avoid getting hacked</a></td> |
| 91 | 91 |
</tr> |
| 92 | 92 |
<tr style=""> |
| 93 |
-<td>June 30, 2015</td> |
|
| 93 |
+<td>2015 Jun 30</td> |
|
| 94 | 94 |
<td>Ars Technica</td> |
| 95 | 95 |
<td><a href="http://arstechnica.com/tech-policy/2015/07/crypto-activists-announce-vision-for-tor-exit-relay-in-every-library/">Crypto activists announce vision for Tor exit relay in every library "Librarians see the value as soon as you say ‘privacy protecting technology.'" </a></td> |
| 96 | 96 |
</tr> |
| 97 | 97 |
<tr style="background-color: #e5e5e5;"> |
| 98 |
-<td>June 18, 2015</td> |
|
| 98 |
+<td>2015 Jun 18</td> |
|
| 99 | 99 |
<td>WIRED</td> |
| 100 | 100 |
<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">The Dark Web as You Know It Is a Myth</a></td> |
| 101 | 101 |
</tr> |
| 102 | 102 |
<tr style=""> |
| 103 |
-<td>June 18, 2015</td> |
|
| 103 |
+<td>2015 Jun 18</td> |
|
| 104 | 104 |
<td>Liberation</td> |
| 105 | 105 |
<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">Tor: "The emancipatory use of technology"</a></td> |
| 106 | 106 |
</tr> |
| 107 | 107 |
<tr style="background-color: #e5e5e5;"> |
| 108 |
-<td>2015 April 9</td> |
|
| 108 |
+<td>2015 Apr 9</td> |
|
| 109 | 109 |
<td>Silicon Republic</td> |
| 110 | 110 |
<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">Interview with Runa Sandvik</a></td> |
| 111 | 111 |
</tr> |
| 112 | 112 |
<tr style=""> |
| 113 |
-<td>2015 April 4</td> |
|
| 113 |
+<td>2015 Apr 4</td> |
|
| 114 | 114 |
<td>El Pais</td> |
| 115 | 115 |
<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td> |
| 116 | 116 |
</tr> |
| 117 | 117 |
<tr style="background-color: #e5e5e5;"> |
| 118 |
-<td>2015 April 2</td> |
|
| 118 |
+<td>2015 Apr 2</td> |
|
| 119 | 119 |
<td>Motherboard </td> |
| 120 | 120 |
<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">Tor wants to know how to make the darknet mainstream</a></td> |
| 121 | 121 |
</tr> |
| 122 | 122 |
<tr style=""> |
| 123 |
-<td>2015 March 26</td> |
|
| 123 |
+<td>2015 Mar 26</td> |
|
| 124 | 124 |
<td>Daily Dot</td> |
| 125 | 125 |
<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">Tor's great rebranding</a></td> |
| 126 | 126 |
</tr> |
| ... | ... |
@@ -172,7 +172,7 @@ href="http://insidebitcoins.com/news/developers-say-privacy-network-tor-was-not- |
| 172 | 172 |
Say Privacy Network Tor Was Not Compromised During Silk Road Takedown</a></td> |
| 173 | 173 |
</tr> |
| 174 | 174 |
<tr style="background-color: #e5e5e5;"> |
| 175 |
-<td>January 29, 2015</td> |
|
| 175 |
+<td>2015 Jan 29</td> |
|
| 176 | 176 |
<td>The Inquirer</td> |
| 177 | 177 |
<td><a |
| 178 | 178 |
href="http://www.theinquirer.net/inquirer/news/2392703/mozilla-treats-tor-network-to-a-hardware-helping-hand">Mozilla treats Tor Network to a hardware helping hand |
| 179 | 179 |