Andrew Lewman commited on 2014-01-05 02:57:37
Zeige 1 geänderte Dateien mit 288 Einfügungen und 2 Löschungen.
| ... | ... |
@@ -25,13 +25,249 @@ newest to oldest: </p> |
| 25 | 25 |
|
| 26 | 26 |
<table width="100%" cellpadding="3" cellspacing="0"> |
| 27 | 27 |
|
| 28 |
-<thead style="background-color: #e5e5e5;"> |
|
| 28 |
+<thead style=""> |
|
| 29 | 29 |
<tr> |
| 30 | 30 |
<th width="15%">Date</th> |
| 31 | 31 |
<th width="15%">Publication</th> |
| 32 | 32 |
<th>Topic</th> |
| 33 | 33 |
</tr> |
| 34 | 34 |
</thead> |
| 35 |
+<tr style="background-color: #e5e5e5;"> |
|
| 36 |
+<td>2013 Dec 16</td> |
|
| 37 |
+<td>PBS</td> |
|
| 38 |
+<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a></td> |
|
| 39 |
+</tr> |
|
| 40 |
+<tr> |
|
| 41 |
+<td>2013 Dec 5</td> |
|
| 42 |
+<td>Nieman Journalisim Lab</td> |
|
| 43 |
+<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools for journalists</a></td> |
|
| 44 |
+</td> |
|
| 45 |
+<tr> |
|
| 46 |
+<tr style="background-color: #e5e5e5;"> |
|
| 47 |
+<td>2013 Dec 2</td> |
|
| 48 |
+<td>EFF</td> |
|
| 49 |
+<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">An Open Letter Urging Universities To Encourage Conversation About Online Privacy</a></td> |
|
| 50 |
+</tr> |
|
| 51 |
+<tr> |
|
| 52 |
+<td>2013 Nov 26</td> |
|
| 53 |
+<td>TechRepublic</td> |
|
| 54 |
+<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">Get a grip on TOR with Vidalia</a></td> |
|
| 55 |
+</td> |
|
| 56 |
+<tr> |
|
| 57 |
+<tr style="background-color: #e5e5e5;"> |
|
| 58 |
+<td>2013 Nov 20</td> |
|
| 59 |
+<td>PBS</td> |
|
| 60 |
+<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td> |
|
| 61 |
+</tr> |
|
| 62 |
+<tr> |
|
| 63 |
+<td>2013 Nov 10</td> |
|
| 64 |
+<td>Politiken.dk</td> |
|
| 65 |
+<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td> |
|
| 66 |
+</td> |
|
| 67 |
+<tr> |
|
| 68 |
+<tr style="background-color: #e5e5e5;"> |
|
| 69 |
+<td>2013 Nov 5</td> |
|
| 70 |
+<td>The Guardian</td> |
|
| 71 |
+<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">What is Tor? A beginner's guide to the privacy tool</a></td> |
|
| 72 |
+</tr> |
|
| 73 |
+<tr> |
|
| 74 |
+<td>2013 Oct 25</td> |
|
| 75 |
+<td>MIT Technology Review</td> |
|
| 76 |
+<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td> |
|
| 77 |
+</td> |
|
| 78 |
+<tr> |
|
| 79 |
+<tr style="background-color: #e5e5e5;"> |
|
| 80 |
+<td>2013 Oct 23</td> |
|
| 81 |
+<td>Tom's Guide</td> |
|
| 82 |
+<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">What Is Tor? Answers to Frequently Asked Questions</a></td> |
|
| 83 |
+</tr> |
|
| 84 |
+<tr> |
|
| 85 |
+<td>2013 Oct 18</td> |
|
| 86 |
+<td>Forbes</td> |
|
| 87 |
+<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td> |
|
| 88 |
+</td> |
|
| 89 |
+<tr> |
|
| 90 |
+<tr style="background-color: #e5e5e5;"> |
|
| 91 |
+<td>2013 Oct 10</td> |
|
| 92 |
+<td>VentureBeat</td> |
|
| 93 |
+<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td> |
|
| 94 |
+</tr> |
|
| 95 |
+<tr> |
|
| 96 |
+<td>2013 Oct 8</td> |
|
| 97 |
+<td>InformationWeek</td> |
|
| 98 |
+<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td> |
|
| 99 |
+</td> |
|
| 100 |
+<tr> |
|
| 101 |
+<tr style="background-color: #e5e5e5;"> |
|
| 102 |
+<td>2013 Oct 8</td> |
|
| 103 |
+<td>The Next Web</td> |
|
| 104 |
+<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">What is Tor and why does it matter?</a></td> |
|
| 105 |
+</tr> |
|
| 106 |
+<tr> |
|
| 107 |
+<td>2013 Oct 7</td> |
|
| 108 |
+<td>Ars Technica</td> |
|
| 109 |
+<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td> |
|
| 110 |
+</td> |
|
| 111 |
+<tr> |
|
| 112 |
+<tr style="background-color: #e5e5e5;"> |
|
| 113 |
+<td>2013 Oct 7</td> |
|
| 114 |
+<td>Infosecurity</td> |
|
| 115 |
+<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td> |
|
| 116 |
+</tr> |
|
| 117 |
+<tr> |
|
| 118 |
+<td>2013 Oct 4</td> |
|
| 119 |
+<td>Washington Post</td> |
|
| 120 |
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">Everything you need to know about the NSA and Tor in one FAQ</a></td> |
|
| 121 |
+</td> |
|
| 122 |
+<tr> |
|
| 123 |
+<tr style="background-color: #e5e5e5;"> |
|
| 124 |
+<td>2013 Oct 4</td> |
|
| 125 |
+<td>eWeek</td> |
|
| 126 |
+<td><a href="http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/">Snowden Leaks Show NSA Targets Tor</a></td> |
|
| 127 |
+</tr> |
|
| 128 |
+<tr> |
|
| 129 |
+<td>2013 Oct 4</td> |
|
| 130 |
+<td>The Guardian</td> |
|
| 131 |
+<td><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">Attacking Tor: how the NSA targets users' online anonymity</a></td> |
|
| 132 |
+</td> |
|
| 133 |
+<tr> |
|
| 134 |
+<tr style="background-color: #e5e5e5;"> |
|
| 135 |
+<td>2013 Oct 4</td> |
|
| 136 |
+<td>TIME</td> |
|
| 137 |
+<td><a href="http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/">Docs Reveal NSA Campaign Against Anonymous Tor Network</a></td> |
|
| 138 |
+</tr> |
|
| 139 |
+<tr> |
|
| 140 |
+<td>2013 Oct 4</td> |
|
| 141 |
+<td>ITProPortal</td> |
|
| 142 |
+<td><a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/">NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal</a></td> |
|
| 143 |
+</td> |
|
| 144 |
+<tr> |
|
| 145 |
+<tr style="background-color: #e5e5e5;"> |
|
| 146 |
+<td>2013 Oct 4</td> |
|
| 147 |
+<td>InfoWorld</td> |
|
| 148 |
+<td><a href="http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244">The Tor teardown, brought to you by goats, giraffes, and Thor's hammer</a></td> |
|
| 149 |
+</tr> |
|
| 150 |
+<tr> |
|
| 151 |
+<td>2013 Oct 4</td> |
|
| 152 |
+<td>Computerworld</td> |
|
| 153 |
+<td><a href="http://www.computerworld.com/s/article/9242992/Report_NSA_has_little_success_cracking_Tor?taxonomyId=13">Report: NSA has little success cracking Tor</a></td> |
|
| 154 |
+</td> |
|
| 155 |
+<tr> |
|
| 156 |
+<tr style="background-color: #e5e5e5;"> |
|
| 157 |
+<td>2013 Oct 4</td> |
|
| 158 |
+<td>Ars Technica</td> |
|
| 159 |
+<td><a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show</a></td> |
|
| 160 |
+</tr> |
|
| 161 |
+<tr> |
|
| 162 |
+<td>2013 Oct 4</td> |
|
| 163 |
+<td>CNET</td> |
|
| 164 |
+<td><a href="http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/">NSA sought to unmask users of Net-privacy tool Tor, says report</a></td> |
|
| 165 |
+</td> |
|
| 166 |
+<tr> |
|
| 167 |
+<tr style="background-color: #e5e5e5;"> |
|
| 168 |
+<td>2013 Sep 16</td> |
|
| 169 |
+<td>InformationWeek</td> |
|
| 170 |
+<td><a href="http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553">FBI Admits To Tor Server Takeover</a></td> |
|
| 171 |
+</tr> |
|
| 172 |
+<tr> |
|
| 173 |
+<td>2013 Sep 16</td> |
|
| 174 |
+<td>Techworld</td> |
|
| 175 |
+<td><a href="http://news.techworld.com/security/3468988/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa/">Mevade botnet miscalculated effect on Tor network, says Damballa</a></td> |
|
| 176 |
+</td> |
|
| 177 |
+<tr> |
|
| 178 |
+<tr style="background-color: #e5e5e5;"> |
|
| 179 |
+<td>2013 Sep 14</td> |
|
| 180 |
+<td>Gizmodo</td> |
|
| 181 |
+<td><a href="http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/">FBI Admits To Hacking Into The Tor Network</a></td> |
|
| 182 |
+</tr> |
|
| 183 |
+<tr> |
|
| 184 |
+<td>2013 Sep 13</td> |
|
| 185 |
+<td>Wired</td> |
|
| 186 |
+<td><a href="http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/">FBI Admits It Controlled Tor Servers Behind Mass Malware Attack</a></td> |
|
| 187 |
+</td> |
|
| 188 |
+<tr> |
|
| 189 |
+<tr style="background-color: #e5e5e5;"> |
|
| 190 |
+<td>2013 Sep 11</td> |
|
| 191 |
+<td>Infosecurity</td> |
|
| 192 |
+<td><a href="http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/">Massive Botnet is Behind Tor Usage Spike</a></td> |
|
| 193 |
+</tr> |
|
| 194 |
+<tr> |
|
| 195 |
+<td>2013 Sep 11</td> |
|
| 196 |
+<td>MIT Technology Review</td> |
|
| 197 |
+<td><a href="http://www.technologyreview.com/view/519186/security-flaw-shows-tor-anonymity-network-dominated-by-botnet-command-and-control/">Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic</a></td> |
|
| 198 |
+</td> |
|
| 199 |
+<tr> |
|
| 200 |
+<tr style="background-color: #e5e5e5;"> |
|
| 201 |
+<td>2013 Sep 11</td> |
|
| 202 |
+<td>Tom's Guide</td> |
|
| 203 |
+<td><a href="http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html">Is Tor's Anonymous Internet Still Secure?</a></td> |
|
| 204 |
+</tr> |
|
| 205 |
+<tr> |
|
| 206 |
+<td>2013 Sep 9</td> |
|
| 207 |
+<td>TechWeek Europe</td> |
|
| 208 |
+<td><a href="http://www.techweekeurope.co.uk/news/mevade-botnet-tor-network-126497">Tor Network Spike Caused By Botnet</a></td> |
|
| 209 |
+</td> |
|
| 210 |
+<tr> |
|
| 211 |
+<tr style="background-color: #e5e5e5;"> |
|
| 212 |
+<td>2013 Sep 5</td> |
|
| 213 |
+<td>Gizmodo</td> |
|
| 214 |
+<td><a href="http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241">The Anonymous Internet Is Under Attack</a></td> |
|
| 215 |
+</tr> |
|
| 216 |
+<tr> |
|
| 217 |
+<td>2013 Sep 4</td> |
|
| 218 |
+<td>Stuff.co.nz</td> |
|
| 219 |
+<td><a href="http://www.stuff.co.nz/technology/digital-living/9120947/Is-Tor-right-for-you">Is Tor right for you?</a></td> |
|
| 220 |
+</td> |
|
| 221 |
+<tr> |
|
| 222 |
+<tr style="background-color: #e5e5e5;"> |
|
| 223 |
+<td>2013 Sep 3</td> |
|
| 224 |
+<td>PC Advisor</td> |
|
| 225 |
+<td><a href="http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/">Tor traffic doubles in a week to reach highest ever level</a></td> |
|
| 226 |
+</tr> |
|
| 227 |
+<tr> |
|
| 228 |
+<td>2013 Aug 29</td> |
|
| 229 |
+<td>RT</td> |
|
| 230 |
+<td><a href="http://rt.com/usa/tor-membership-doubled-nsa-137/">Tor anonymity network membership has doubled since NSA leak</a></td> |
|
| 231 |
+</td> |
|
| 232 |
+<tr> |
|
| 233 |
+<tr style="background-color: #e5e5e5;"> |
|
| 234 |
+<td>2013 Aug 6</td> |
|
| 235 |
+<td>BBC</td> |
|
| 236 |
+<td><a href="http://www.bbc.co.uk/news/technology-23587620">Users of hidden net advised to ditch Windows</a></td> |
|
| 237 |
+</tr> |
|
| 238 |
+<tr> |
|
| 239 |
+<td>2013 Aug 6</td> |
|
| 240 |
+<td>ZDNet</td> |
|
| 241 |
+<td><a href="http://www.zdnet.com/tor-users-advised-to-switch-away-from-windows-after-malware-attack-7000019047/">Tor users advised to 'switch away from Windows' after malware attack</a></td> |
|
| 242 |
+</td> |
|
| 243 |
+<tr> |
|
| 244 |
+<tr style="background-color: #e5e5e5;"> |
|
| 245 |
+<td>2013 Aug 5</td> |
|
| 246 |
+<td>NBC</td> |
|
| 247 |
+<td><a href="http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680">How anonymous? Tor users compromised in child porn takedown</a></td> |
|
| 248 |
+</tr> |
|
| 249 |
+<tr> |
|
| 250 |
+<td>2013 Aug 5</td> |
|
| 251 |
+<td>Wired</td> |
|
| 252 |
+<td><a href="http://www.wired.com/threatlevel/2013/08/freedom-hosting/">Feds Are Suspects in New Malware That Attacks Tor Anonymity</a></td> |
|
| 253 |
+</td> |
|
| 254 |
+<tr> |
|
| 255 |
+<tr style="background-color: #e5e5e5;"> |
|
| 256 |
+<td>2013 Aug 5</td> |
|
| 257 |
+<td>Naked Security</td> |
|
| 258 |
+<td><a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a></td> |
|
| 259 |
+</tr> |
|
| 260 |
+<tr> |
|
| 261 |
+<td>2013 Jul 18</td> |
|
| 262 |
+<td>Huffington Post</td> |
|
| 263 |
+<td><a href="http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html">Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan</a></td> |
|
| 264 |
+</td> |
|
| 265 |
+<tr> |
|
| 266 |
+<tr style="background-color: #e5e5e5;"> |
|
| 267 |
+<td>2013 Jul 18</td> |
|
| 268 |
+<td>Gizmodo</td> |
|
| 269 |
+<td><a href="http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362">The Technology You Need to Protect Against Mass Surveillance</a></td> |
|
| 270 |
+</tr> |
|
| 35 | 271 |
<tr> |
| 36 | 272 |
<td>2013 Jul 01</td> |
| 37 | 273 |
<td>Slice of MIT</td> |
| ... | ... |
@@ -46,7 +282,17 @@ newest to oldest: </p> |
| 46 | 282 |
<tr> |
| 47 | 283 |
<td>2013 Jun 26</td> |
| 48 | 284 |
<td>Reason.com</td> |
| 49 |
-<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Reason Interviews Karen Reilly of The Tor Project Regarding Online Privacy</a></td> |
|
| 285 |
+<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Surf Without Surveillance: Tor's Karen Reilly</a></td> |
|
| 286 |
+</tr> |
|
| 287 |
+<tr style="background-color: #e5e5e5;"> |
|
| 288 |
+<td>2013 Jun 22</td> |
|
| 289 |
+<td>TribLIVE</td> |
|
| 290 |
+<td><a href="http://triblive.com/news/allegheny/4191790-74/tor-network-government">Protesters, criminals get around government censors using secret Web network</a></td> |
|
| 291 |
+</tr> |
|
| 292 |
+<tr> |
|
| 293 |
+<td>2013 Jun 22</td> |
|
| 294 |
+<td>TribLIVE</td> |
|
| 295 |
+<td><a href="http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs">Hidden Web Tor helps average users and criminals avoid government snooping</a></td> |
|
| 50 | 296 |
</tr> |
| 51 | 297 |
<tr style="background-color: #e5e5e5;"> |
| 52 | 298 |
<td>2013 Jun 21</td> |
| ... | ... |
@@ -54,15 +300,55 @@ newest to oldest: </p> |
| 54 | 300 |
<td><a href="http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions">NSA cramping your style? Use these easy encryption solutions</a></td> |
| 55 | 301 |
</tr> |
| 56 | 302 |
<tr> |
| 303 |
+<td>2013 Jun 19</td> |
|
| 304 |
+<td>Help Net Security</td> |
|
| 305 |
+<td><a href="http://www.net-security.org/secworld.php?id=15098">Facebook once again accessible via Tor</a></td> |
|
| 306 |
+</tr> |
|
| 307 |
+<tr style="background-color: #e5e5e5;"> |
|
| 308 |
+<td>2013 Jun 18</td> |
|
| 309 |
+<td>The Register</td> |
|
| 310 |
+<td><a href="http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/">Tor users locked out of Facebook after wave of dodgy traffic</a></td> |
|
| 311 |
+</tr> |
|
| 312 |
+<tr> |
|
| 313 |
+<td>2013 Jun 18</td> |
|
| 314 |
+<td>TechWeek Europe</td> |
|
| 315 |
+<td><a href="http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413">Facebook Blocks Tor Users After Heavy Malicious Activity</a></td> |
|
| 316 |
+</tr> |
|
| 317 |
+<tr style="background-color: #e5e5e5;"> |
|
| 57 | 318 |
<td>2013 Jun 14</td> |
| 58 | 319 |
<td>The Salt Lake Tribune</td> |
| 59 | 320 |
<td><a href="http://www.sltrib.com/sltrib/world/56463680-68/privacy-data-nsa-disadvantages.html.csp">Ideas for keeping your data safe from spying</a></td> |
| 60 | 321 |
</tr> |
| 322 |
+<tr> |
|
| 323 |
+<td>2013 Jun 13</td> |
|
| 324 |
+<td>Boston Globe</td> |
|
| 325 |
+<td><a href="http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.htmlp">How to keep data away from prying eyes</a></td> |
|
| 326 |
+</tr> |
|
| 61 | 327 |
<tr style="background-color: #e5e5e5;"> |
| 328 |
+<td>2013 Jun 12</td> |
|
| 329 |
+<td>Washington Post</td> |
|
| 330 |
+<td><a href="http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html">Secrecy-focused Web services find a mainstream audience</a></td> |
|
| 331 |
+</tr> |
|
| 332 |
+<tr> |
|
| 62 | 333 |
<td>2013 Jun 11</td> |
| 63 | 334 |
<td>Reflex (Czech)</td> |
| 64 | 335 |
<td><a href="http://www.reflex.cz/clanek/zpravy/50756/soukromi-na-internetu-uz-neexistuje-ale-porad-je-tu-tor.html">Privacy on the Internet already exists. But there's still Tor</a></td> |
| 65 | 336 |
</tr> |
| 337 |
+<tr style="background-color: #e5e5e5;"> |
|
| 338 |
+<td>2013 Jun 10</td> |
|
| 339 |
+<td>Washington Post</td> |
|
| 340 |
+<td><a href="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/">Five ways to stop the NSA from spying on you</a></td> |
|
| 341 |
+</tr> |
|
| 342 |
+<tr> |
|
| 343 |
+<td>2013 Jun 8</td> |
|
| 344 |
+<td>ZDNet</td> |
|
| 345 |
+<td><a href="http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/">Ask a hacker: Top four anti-surveillance apps</a></td> |
|
| 346 |
+</tr> |
|
| 347 |
+<tr style="background-color: #e5e5e5;"> |
|
| 348 |
+<td>2013 Jun 8</td> |
|
| 349 |
+<td>The Hindu</td> |
|
| 350 |
+<td><a href="http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece">Cryptography as a means to counter Internet censorship</a></td> |
|
| 351 |
+</tr> |
|
| 66 | 352 |
<tr> |
| 67 | 353 |
<td>2013 Apr 23</td> |
| 68 | 354 |
<td>The Verge</td> |
| 69 | 355 |