patch from ticket 10556 for press page.
Andrew Lewman

Andrew Lewman commited on 2014-01-05 02:57:37
Zeige 1 geänderte Dateien mit 288 Einfügungen und 2 Löschungen.

... ...
@@ -25,13 +25,249 @@ newest to oldest: </p>
25 25
 
26 26
 <table width="100%" cellpadding="3" cellspacing="0">
27 27
 
28
-<thead style="background-color: #e5e5e5;">
28
+<thead style="">
29 29
 <tr>
30 30
 <th width="15%">Date</th>
31 31
 <th width="15%">Publication</th>
32 32
 <th>Topic</th>
33 33
 </tr>
34 34
 </thead>
35
+<tr style="background-color: #e5e5e5;">
36
+<td>2013 Dec 16</td>
37
+<td>PBS</td>
38
+<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a></td>
39
+</tr>
40
+<tr>
41
+<td>2013 Dec 5</td>
42
+<td>Nieman Journalisim Lab</td>
43
+<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools for journalists</a></td>
44
+</td>
45
+<tr>
46
+<tr style="background-color: #e5e5e5;">
47
+<td>2013 Dec 2</td>
48
+<td>EFF</td>
49
+<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">An Open Letter Urging Universities To Encourage Conversation About Online Privacy</a></td>
50
+</tr>
51
+<tr>
52
+<td>2013 Nov 26</td>
53
+<td>TechRepublic</td>
54
+<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">Get a grip on TOR with Vidalia</a></td>
55
+</td>
56
+<tr>
57
+<tr style="background-color: #e5e5e5;">
58
+<td>2013 Nov 20</td>
59
+<td>PBS</td>
60
+<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td>
61
+</tr>
62
+<tr>
63
+<td>2013 Nov 10</td>
64
+<td>Politiken.dk</td>
65
+<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td>
66
+</td>
67
+<tr>
68
+<tr style="background-color: #e5e5e5;">
69
+<td>2013 Nov 5</td>
70
+<td>The Guardian</td>
71
+<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">What is Tor? A beginner's guide to the privacy tool</a></td>
72
+</tr>
73
+<tr>
74
+<td>2013 Oct 25</td>
75
+<td>MIT Technology Review</td>
76
+<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td>
77
+</td>
78
+<tr>
79
+<tr style="background-color: #e5e5e5;">
80
+<td>2013 Oct 23</td>
81
+<td>Tom's Guide</td>
82
+<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">What Is Tor? Answers to Frequently Asked Questions</a></td>
83
+</tr>
84
+<tr>
85
+<td>2013 Oct 18</td>
86
+<td>Forbes</td>
87
+<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
88
+</td>
89
+<tr>
90
+<tr style="background-color: #e5e5e5;">
91
+<td>2013 Oct 10</td>
92
+<td>VentureBeat</td>
93
+<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td>
94
+</tr>
95
+<tr>
96
+<td>2013 Oct 8</td>
97
+<td>InformationWeek</td>
98
+<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td>
99
+</td>
100
+<tr>
101
+<tr style="background-color: #e5e5e5;">
102
+<td>2013 Oct 8</td>
103
+<td>The Next Web</td>
104
+<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">What is Tor and why does it matter?</a></td>
105
+</tr>
106
+<tr>
107
+<td>2013 Oct 7</td>
108
+<td>Ars Technica</td>
109
+<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
110
+</td>
111
+<tr>
112
+<tr style="background-color: #e5e5e5;">
113
+<td>2013 Oct 7</td>
114
+<td>Infosecurity</td>
115
+<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td>
116
+</tr>
117
+<tr>
118
+<td>2013 Oct 4</td>
119
+<td>Washington Post</td>
120
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">Everything you need to know about the NSA and Tor in one FAQ</a></td>
121
+</td>
122
+<tr>
123
+<tr style="background-color: #e5e5e5;">
124
+<td>2013 Oct 4</td>
125
+<td>eWeek</td>
126
+<td><a href="http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/">Snowden Leaks Show NSA Targets Tor</a></td>
127
+</tr>
128
+<tr>
129
+<td>2013 Oct 4</td>
130
+<td>The Guardian</td>
131
+<td><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">Attacking Tor: how the NSA targets users' online anonymity</a></td>
132
+</td>
133
+<tr>
134
+<tr style="background-color: #e5e5e5;">
135
+<td>2013 Oct 4</td>
136
+<td>TIME</td>
137
+<td><a href="http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/">Docs Reveal NSA Campaign Against Anonymous Tor Network</a></td>
138
+</tr>
139
+<tr>
140
+<td>2013 Oct 4</td>
141
+<td>ITProPortal</td>
142
+<td><a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/">NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal</a></td>
143
+</td>
144
+<tr>
145
+<tr style="background-color: #e5e5e5;">
146
+<td>2013 Oct 4</td>
147
+<td>InfoWorld</td>
148
+<td><a href="http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244">The Tor teardown, brought to you by goats, giraffes, and Thor's hammer</a></td>
149
+</tr>
150
+<tr>
151
+<td>2013 Oct 4</td>
152
+<td>Computerworld</td>
153
+<td><a href="http://www.computerworld.com/s/article/9242992/Report_NSA_has_little_success_cracking_Tor?taxonomyId=13">Report: NSA has little success cracking Tor</a></td>
154
+</td>
155
+<tr>
156
+<tr style="background-color: #e5e5e5;">
157
+<td>2013 Oct 4</td>
158
+<td>Ars Technica</td>
159
+<td><a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show</a></td>
160
+</tr>
161
+<tr>
162
+<td>2013 Oct 4</td>
163
+<td>CNET</td>
164
+<td><a href="http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/">NSA sought to unmask users of Net-privacy tool Tor, says report</a></td>
165
+</td>
166
+<tr>
167
+<tr style="background-color: #e5e5e5;">
168
+<td>2013 Sep 16</td>
169
+<td>InformationWeek</td>
170
+<td><a href="http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553">FBI Admits To Tor Server Takeover</a></td>
171
+</tr>
172
+<tr>
173
+<td>2013 Sep 16</td>
174
+<td>Techworld</td>
175
+<td><a href="http://news.techworld.com/security/3468988/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa/">Mevade botnet miscalculated effect on Tor network, says Damballa</a></td>
176
+</td>
177
+<tr>
178
+<tr style="background-color: #e5e5e5;">
179
+<td>2013 Sep 14</td>
180
+<td>Gizmodo</td>
181
+<td><a href="http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/">FBI Admits To Hacking Into The Tor Network</a></td>
182
+</tr>
183
+<tr>
184
+<td>2013 Sep 13</td>
185
+<td>Wired</td>
186
+<td><a href="http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/">FBI Admits It Controlled Tor Servers Behind Mass Malware Attack</a></td>
187
+</td>
188
+<tr>
189
+<tr style="background-color: #e5e5e5;">
190
+<td>2013 Sep 11</td>
191
+<td>Infosecurity</td>
192
+<td><a href="http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/">Massive Botnet is Behind Tor Usage Spike</a></td>
193
+</tr>
194
+<tr>
195
+<td>2013 Sep 11</td>
196
+<td>MIT Technology Review</td>
197
+<td><a href="http://www.technologyreview.com/view/519186/security-flaw-shows-tor-anonymity-network-dominated-by-botnet-command-and-control/">Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic</a></td>
198
+</td>
199
+<tr>
200
+<tr style="background-color: #e5e5e5;">
201
+<td>2013 Sep 11</td>
202
+<td>Tom's Guide</td>
203
+<td><a href="http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html">Is Tor's Anonymous Internet Still Secure?</a></td>
204
+</tr>
205
+<tr>
206
+<td>2013 Sep 9</td>
207
+<td>TechWeek Europe</td>
208
+<td><a href="http://www.techweekeurope.co.uk/news/mevade-botnet-tor-network-126497">Tor Network Spike Caused By Botnet</a></td>
209
+</td>
210
+<tr>
211
+<tr style="background-color: #e5e5e5;">
212
+<td>2013 Sep 5</td>
213
+<td>Gizmodo</td>
214
+<td><a href="http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241">The Anonymous Internet Is Under Attack</a></td>
215
+</tr>
216
+<tr>
217
+<td>2013 Sep 4</td>
218
+<td>Stuff.co.nz</td>
219
+<td><a href="http://www.stuff.co.nz/technology/digital-living/9120947/Is-Tor-right-for-you">Is Tor right for you?</a></td>
220
+</td>
221
+<tr>
222
+<tr style="background-color: #e5e5e5;">
223
+<td>2013 Sep 3</td>
224
+<td>PC Advisor</td>
225
+<td><a href="http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/">Tor traffic doubles in a week to reach highest ever level</a></td>
226
+</tr>
227
+<tr>
228
+<td>2013 Aug 29</td>
229
+<td>RT</td>
230
+<td><a href="http://rt.com/usa/tor-membership-doubled-nsa-137/">Tor anonymity network membership has doubled since NSA leak</a></td>
231
+</td>
232
+<tr>
233
+<tr style="background-color: #e5e5e5;">
234
+<td>2013 Aug 6</td>
235
+<td>BBC</td>
236
+<td><a href="http://www.bbc.co.uk/news/technology-23587620">Users of hidden net advised to ditch Windows</a></td>
237
+</tr>
238
+<tr>
239
+<td>2013 Aug 6</td>
240
+<td>ZDNet</td>
241
+<td><a href="http://www.zdnet.com/tor-users-advised-to-switch-away-from-windows-after-malware-attack-7000019047/">Tor users advised to 'switch away from Windows' after malware attack</a></td>
242
+</td>
243
+<tr>
244
+<tr style="background-color: #e5e5e5;">
245
+<td>2013 Aug 5</td>
246
+<td>NBC</td>
247
+<td><a href="http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680">How anonymous? Tor users compromised in child porn takedown</a></td>
248
+</tr>
249
+<tr>
250
+<td>2013 Aug 5</td>
251
+<td>Wired</td>
252
+<td><a href="http://www.wired.com/threatlevel/2013/08/freedom-hosting/">Feds Are Suspects in New Malware That Attacks Tor Anonymity</a></td>
253
+</td>
254
+<tr>
255
+<tr style="background-color: #e5e5e5;">
256
+<td>2013 Aug 5</td>
257
+<td>Naked Security</td>
258
+<td><a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a></td>
259
+</tr>
260
+<tr>
261
+<td>2013 Jul 18</td>
262
+<td>Huffington Post</td>
263
+<td><a href="http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html">Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan</a></td>
264
+</td>
265
+<tr>
266
+<tr style="background-color: #e5e5e5;">
267
+<td>2013 Jul 18</td>
268
+<td>Gizmodo</td>
269
+<td><a href="http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362">The Technology You Need to Protect Against Mass Surveillance</a></td>
270
+</tr>
35 271
 <tr>
36 272
 <td>2013 Jul 01</td>
37 273
 <td>Slice of MIT</td>
... ...
@@ -46,7 +282,17 @@ newest to oldest: </p>
46 282
 <tr>
47 283
 <td>2013 Jun 26</td>
48 284
 <td>Reason.com</td>
49
-<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Reason Interviews Karen Reilly of The Tor Project Regarding Online Privacy</a></td>
285
+<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Surf Without Surveillance: Tor's Karen Reilly</a></td>
286
+</tr>
287
+<tr style="background-color: #e5e5e5;">
288
+<td>2013 Jun 22</td>
289
+<td>TribLIVE</td>
290
+<td><a href="http://triblive.com/news/allegheny/4191790-74/tor-network-government">Protesters, criminals get around government censors using secret Web network</a></td>
291
+</tr>
292
+<tr>
293
+<td>2013 Jun 22</td>
294
+<td>TribLIVE</td>
295
+<td><a href="http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs">Hidden Web Tor helps average users and criminals avoid government snooping</a></td>
50 296
 </tr>
51 297
 <tr style="background-color: #e5e5e5;">
52 298
 <td>2013 Jun 21</td>
... ...
@@ -54,15 +300,55 @@ newest to oldest: </p>
54 300
 <td><a href="http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions">NSA cramping your style? Use these easy encryption solutions</a></td>
55 301
 </tr>
56 302
 <tr>
303
+<td>2013 Jun 19</td>
304
+<td>Help Net Security</td>
305
+<td><a href="http://www.net-security.org/secworld.php?id=15098">Facebook once again accessible via Tor</a></td>
306
+</tr>
307
+<tr style="background-color: #e5e5e5;">
308
+<td>2013 Jun 18</td>
309
+<td>The Register</td>
310
+<td><a href="http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/">Tor users locked out of Facebook after wave of dodgy traffic</a></td>
311
+</tr>
312
+<tr>
313
+<td>2013 Jun 18</td>
314
+<td>TechWeek Europe</td>
315
+<td><a href="http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413">Facebook Blocks Tor Users After Heavy Malicious Activity</a></td>
316
+</tr>
317
+<tr style="background-color: #e5e5e5;">
57 318
 <td>2013 Jun 14</td>
58 319
 <td>The Salt Lake Tribune</td>
59 320
 <td><a href="http://www.sltrib.com/sltrib/world/56463680-68/privacy-data-nsa-disadvantages.html.csp">Ideas for keeping your data safe from spying</a></td>
60 321
 </tr>
322
+<tr>
323
+<td>2013 Jun 13</td>
324
+<td>Boston Globe</td>
325
+<td><a href="http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.htmlp">How to keep data away from prying eyes</a></td>
326
+</tr>
61 327
 <tr style="background-color: #e5e5e5;">
328
+<td>2013 Jun 12</td>
329
+<td>Washington Post</td>
330
+<td><a href="http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html">Secrecy-focused Web services find a mainstream audience</a></td>
331
+</tr>
332
+<tr>
62 333
 <td>2013 Jun 11</td>
63 334
 <td>Reflex (Czech)</td>
64 335
 <td><a href="http://www.reflex.cz/clanek/zpravy/50756/soukromi-na-internetu-uz-neexistuje-ale-porad-je-tu-tor.html">Privacy on the Internet already exists. But there's still Tor</a></td>
65 336
 </tr>
337
+<tr style="background-color: #e5e5e5;">
338
+<td>2013 Jun 10</td>
339
+<td>Washington Post</td>
340
+<td><a href="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/">Five ways to stop the NSA from spying on you</a></td>
341
+</tr>
342
+<tr>
343
+<td>2013 Jun 8</td>
344
+<td>ZDNet</td>
345
+<td><a href="http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/">Ask a hacker: Top four anti-surveillance apps</a></td>
346
+</tr>
347
+<tr style="background-color: #e5e5e5;">
348
+<td>2013 Jun 8</td>
349
+<td>The Hindu</td>
350
+<td><a href="http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece">Cryptography as a means to counter Internet censorship</a></td>
351
+</tr>
66 352
 <tr>
67 353
 <td>2013 Apr 23</td>
68 354
 <td>The Verge</td>
69 355