Andrew Lewman commited on 2014-01-05 02:57:37
Zeige 1 geänderte Dateien mit 288 Einfügungen und 2 Löschungen.
... | ... |
@@ -25,13 +25,249 @@ newest to oldest: </p> |
25 | 25 |
|
26 | 26 |
<table width="100%" cellpadding="3" cellspacing="0"> |
27 | 27 |
|
28 |
-<thead style="background-color: #e5e5e5;"> |
|
28 |
+<thead style=""> |
|
29 | 29 |
<tr> |
30 | 30 |
<th width="15%">Date</th> |
31 | 31 |
<th width="15%">Publication</th> |
32 | 32 |
<th>Topic</th> |
33 | 33 |
</tr> |
34 | 34 |
</thead> |
35 |
+<tr style="background-color: #e5e5e5;"> |
|
36 |
+<td>2013 Dec 16</td> |
|
37 |
+<td>PBS</td> |
|
38 |
+<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a></td> |
|
39 |
+</tr> |
|
40 |
+<tr> |
|
41 |
+<td>2013 Dec 5</td> |
|
42 |
+<td>Nieman Journalisim Lab</td> |
|
43 |
+<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools for journalists</a></td> |
|
44 |
+</td> |
|
45 |
+<tr> |
|
46 |
+<tr style="background-color: #e5e5e5;"> |
|
47 |
+<td>2013 Dec 2</td> |
|
48 |
+<td>EFF</td> |
|
49 |
+<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">An Open Letter Urging Universities To Encourage Conversation About Online Privacy</a></td> |
|
50 |
+</tr> |
|
51 |
+<tr> |
|
52 |
+<td>2013 Nov 26</td> |
|
53 |
+<td>TechRepublic</td> |
|
54 |
+<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">Get a grip on TOR with Vidalia</a></td> |
|
55 |
+</td> |
|
56 |
+<tr> |
|
57 |
+<tr style="background-color: #e5e5e5;"> |
|
58 |
+<td>2013 Nov 20</td> |
|
59 |
+<td>PBS</td> |
|
60 |
+<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td> |
|
61 |
+</tr> |
|
62 |
+<tr> |
|
63 |
+<td>2013 Nov 10</td> |
|
64 |
+<td>Politiken.dk</td> |
|
65 |
+<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td> |
|
66 |
+</td> |
|
67 |
+<tr> |
|
68 |
+<tr style="background-color: #e5e5e5;"> |
|
69 |
+<td>2013 Nov 5</td> |
|
70 |
+<td>The Guardian</td> |
|
71 |
+<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">What is Tor? A beginner's guide to the privacy tool</a></td> |
|
72 |
+</tr> |
|
73 |
+<tr> |
|
74 |
+<td>2013 Oct 25</td> |
|
75 |
+<td>MIT Technology Review</td> |
|
76 |
+<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td> |
|
77 |
+</td> |
|
78 |
+<tr> |
|
79 |
+<tr style="background-color: #e5e5e5;"> |
|
80 |
+<td>2013 Oct 23</td> |
|
81 |
+<td>Tom's Guide</td> |
|
82 |
+<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">What Is Tor? Answers to Frequently Asked Questions</a></td> |
|
83 |
+</tr> |
|
84 |
+<tr> |
|
85 |
+<td>2013 Oct 18</td> |
|
86 |
+<td>Forbes</td> |
|
87 |
+<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td> |
|
88 |
+</td> |
|
89 |
+<tr> |
|
90 |
+<tr style="background-color: #e5e5e5;"> |
|
91 |
+<td>2013 Oct 10</td> |
|
92 |
+<td>VentureBeat</td> |
|
93 |
+<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td> |
|
94 |
+</tr> |
|
95 |
+<tr> |
|
96 |
+<td>2013 Oct 8</td> |
|
97 |
+<td>InformationWeek</td> |
|
98 |
+<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td> |
|
99 |
+</td> |
|
100 |
+<tr> |
|
101 |
+<tr style="background-color: #e5e5e5;"> |
|
102 |
+<td>2013 Oct 8</td> |
|
103 |
+<td>The Next Web</td> |
|
104 |
+<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">What is Tor and why does it matter?</a></td> |
|
105 |
+</tr> |
|
106 |
+<tr> |
|
107 |
+<td>2013 Oct 7</td> |
|
108 |
+<td>Ars Technica</td> |
|
109 |
+<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td> |
|
110 |
+</td> |
|
111 |
+<tr> |
|
112 |
+<tr style="background-color: #e5e5e5;"> |
|
113 |
+<td>2013 Oct 7</td> |
|
114 |
+<td>Infosecurity</td> |
|
115 |
+<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td> |
|
116 |
+</tr> |
|
117 |
+<tr> |
|
118 |
+<td>2013 Oct 4</td> |
|
119 |
+<td>Washington Post</td> |
|
120 |
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">Everything you need to know about the NSA and Tor in one FAQ</a></td> |
|
121 |
+</td> |
|
122 |
+<tr> |
|
123 |
+<tr style="background-color: #e5e5e5;"> |
|
124 |
+<td>2013 Oct 4</td> |
|
125 |
+<td>eWeek</td> |
|
126 |
+<td><a href="http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/">Snowden Leaks Show NSA Targets Tor</a></td> |
|
127 |
+</tr> |
|
128 |
+<tr> |
|
129 |
+<td>2013 Oct 4</td> |
|
130 |
+<td>The Guardian</td> |
|
131 |
+<td><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">Attacking Tor: how the NSA targets users' online anonymity</a></td> |
|
132 |
+</td> |
|
133 |
+<tr> |
|
134 |
+<tr style="background-color: #e5e5e5;"> |
|
135 |
+<td>2013 Oct 4</td> |
|
136 |
+<td>TIME</td> |
|
137 |
+<td><a href="http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/">Docs Reveal NSA Campaign Against Anonymous Tor Network</a></td> |
|
138 |
+</tr> |
|
139 |
+<tr> |
|
140 |
+<td>2013 Oct 4</td> |
|
141 |
+<td>ITProPortal</td> |
|
142 |
+<td><a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/">NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal</a></td> |
|
143 |
+</td> |
|
144 |
+<tr> |
|
145 |
+<tr style="background-color: #e5e5e5;"> |
|
146 |
+<td>2013 Oct 4</td> |
|
147 |
+<td>InfoWorld</td> |
|
148 |
+<td><a href="http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244">The Tor teardown, brought to you by goats, giraffes, and Thor's hammer</a></td> |
|
149 |
+</tr> |
|
150 |
+<tr> |
|
151 |
+<td>2013 Oct 4</td> |
|
152 |
+<td>Computerworld</td> |
|
153 |
+<td><a href="http://www.computerworld.com/s/article/9242992/Report_NSA_has_little_success_cracking_Tor?taxonomyId=13">Report: NSA has little success cracking Tor</a></td> |
|
154 |
+</td> |
|
155 |
+<tr> |
|
156 |
+<tr style="background-color: #e5e5e5;"> |
|
157 |
+<td>2013 Oct 4</td> |
|
158 |
+<td>Ars Technica</td> |
|
159 |
+<td><a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show</a></td> |
|
160 |
+</tr> |
|
161 |
+<tr> |
|
162 |
+<td>2013 Oct 4</td> |
|
163 |
+<td>CNET</td> |
|
164 |
+<td><a href="http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/">NSA sought to unmask users of Net-privacy tool Tor, says report</a></td> |
|
165 |
+</td> |
|
166 |
+<tr> |
|
167 |
+<tr style="background-color: #e5e5e5;"> |
|
168 |
+<td>2013 Sep 16</td> |
|
169 |
+<td>InformationWeek</td> |
|
170 |
+<td><a href="http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553">FBI Admits To Tor Server Takeover</a></td> |
|
171 |
+</tr> |
|
172 |
+<tr> |
|
173 |
+<td>2013 Sep 16</td> |
|
174 |
+<td>Techworld</td> |
|
175 |
+<td><a href="http://news.techworld.com/security/3468988/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa/">Mevade botnet miscalculated effect on Tor network, says Damballa</a></td> |
|
176 |
+</td> |
|
177 |
+<tr> |
|
178 |
+<tr style="background-color: #e5e5e5;"> |
|
179 |
+<td>2013 Sep 14</td> |
|
180 |
+<td>Gizmodo</td> |
|
181 |
+<td><a href="http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/">FBI Admits To Hacking Into The Tor Network</a></td> |
|
182 |
+</tr> |
|
183 |
+<tr> |
|
184 |
+<td>2013 Sep 13</td> |
|
185 |
+<td>Wired</td> |
|
186 |
+<td><a href="http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/">FBI Admits It Controlled Tor Servers Behind Mass Malware Attack</a></td> |
|
187 |
+</td> |
|
188 |
+<tr> |
|
189 |
+<tr style="background-color: #e5e5e5;"> |
|
190 |
+<td>2013 Sep 11</td> |
|
191 |
+<td>Infosecurity</td> |
|
192 |
+<td><a href="http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/">Massive Botnet is Behind Tor Usage Spike</a></td> |
|
193 |
+</tr> |
|
194 |
+<tr> |
|
195 |
+<td>2013 Sep 11</td> |
|
196 |
+<td>MIT Technology Review</td> |
|
197 |
+<td><a href="http://www.technologyreview.com/view/519186/security-flaw-shows-tor-anonymity-network-dominated-by-botnet-command-and-control/">Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic</a></td> |
|
198 |
+</td> |
|
199 |
+<tr> |
|
200 |
+<tr style="background-color: #e5e5e5;"> |
|
201 |
+<td>2013 Sep 11</td> |
|
202 |
+<td>Tom's Guide</td> |
|
203 |
+<td><a href="http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html">Is Tor's Anonymous Internet Still Secure?</a></td> |
|
204 |
+</tr> |
|
205 |
+<tr> |
|
206 |
+<td>2013 Sep 9</td> |
|
207 |
+<td>TechWeek Europe</td> |
|
208 |
+<td><a href="http://www.techweekeurope.co.uk/news/mevade-botnet-tor-network-126497">Tor Network Spike Caused By Botnet</a></td> |
|
209 |
+</td> |
|
210 |
+<tr> |
|
211 |
+<tr style="background-color: #e5e5e5;"> |
|
212 |
+<td>2013 Sep 5</td> |
|
213 |
+<td>Gizmodo</td> |
|
214 |
+<td><a href="http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241">The Anonymous Internet Is Under Attack</a></td> |
|
215 |
+</tr> |
|
216 |
+<tr> |
|
217 |
+<td>2013 Sep 4</td> |
|
218 |
+<td>Stuff.co.nz</td> |
|
219 |
+<td><a href="http://www.stuff.co.nz/technology/digital-living/9120947/Is-Tor-right-for-you">Is Tor right for you?</a></td> |
|
220 |
+</td> |
|
221 |
+<tr> |
|
222 |
+<tr style="background-color: #e5e5e5;"> |
|
223 |
+<td>2013 Sep 3</td> |
|
224 |
+<td>PC Advisor</td> |
|
225 |
+<td><a href="http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/">Tor traffic doubles in a week to reach highest ever level</a></td> |
|
226 |
+</tr> |
|
227 |
+<tr> |
|
228 |
+<td>2013 Aug 29</td> |
|
229 |
+<td>RT</td> |
|
230 |
+<td><a href="http://rt.com/usa/tor-membership-doubled-nsa-137/">Tor anonymity network membership has doubled since NSA leak</a></td> |
|
231 |
+</td> |
|
232 |
+<tr> |
|
233 |
+<tr style="background-color: #e5e5e5;"> |
|
234 |
+<td>2013 Aug 6</td> |
|
235 |
+<td>BBC</td> |
|
236 |
+<td><a href="http://www.bbc.co.uk/news/technology-23587620">Users of hidden net advised to ditch Windows</a></td> |
|
237 |
+</tr> |
|
238 |
+<tr> |
|
239 |
+<td>2013 Aug 6</td> |
|
240 |
+<td>ZDNet</td> |
|
241 |
+<td><a href="http://www.zdnet.com/tor-users-advised-to-switch-away-from-windows-after-malware-attack-7000019047/">Tor users advised to 'switch away from Windows' after malware attack</a></td> |
|
242 |
+</td> |
|
243 |
+<tr> |
|
244 |
+<tr style="background-color: #e5e5e5;"> |
|
245 |
+<td>2013 Aug 5</td> |
|
246 |
+<td>NBC</td> |
|
247 |
+<td><a href="http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680">How anonymous? Tor users compromised in child porn takedown</a></td> |
|
248 |
+</tr> |
|
249 |
+<tr> |
|
250 |
+<td>2013 Aug 5</td> |
|
251 |
+<td>Wired</td> |
|
252 |
+<td><a href="http://www.wired.com/threatlevel/2013/08/freedom-hosting/">Feds Are Suspects in New Malware That Attacks Tor Anonymity</a></td> |
|
253 |
+</td> |
|
254 |
+<tr> |
|
255 |
+<tr style="background-color: #e5e5e5;"> |
|
256 |
+<td>2013 Aug 5</td> |
|
257 |
+<td>Naked Security</td> |
|
258 |
+<td><a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a></td> |
|
259 |
+</tr> |
|
260 |
+<tr> |
|
261 |
+<td>2013 Jul 18</td> |
|
262 |
+<td>Huffington Post</td> |
|
263 |
+<td><a href="http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html">Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan</a></td> |
|
264 |
+</td> |
|
265 |
+<tr> |
|
266 |
+<tr style="background-color: #e5e5e5;"> |
|
267 |
+<td>2013 Jul 18</td> |
|
268 |
+<td>Gizmodo</td> |
|
269 |
+<td><a href="http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362">The Technology You Need to Protect Against Mass Surveillance</a></td> |
|
270 |
+</tr> |
|
35 | 271 |
<tr> |
36 | 272 |
<td>2013 Jul 01</td> |
37 | 273 |
<td>Slice of MIT</td> |
... | ... |
@@ -46,7 +282,17 @@ newest to oldest: </p> |
46 | 282 |
<tr> |
47 | 283 |
<td>2013 Jun 26</td> |
48 | 284 |
<td>Reason.com</td> |
49 |
-<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Reason Interviews Karen Reilly of The Tor Project Regarding Online Privacy</a></td> |
|
285 |
+<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Surf Without Surveillance: Tor's Karen Reilly</a></td> |
|
286 |
+</tr> |
|
287 |
+<tr style="background-color: #e5e5e5;"> |
|
288 |
+<td>2013 Jun 22</td> |
|
289 |
+<td>TribLIVE</td> |
|
290 |
+<td><a href="http://triblive.com/news/allegheny/4191790-74/tor-network-government">Protesters, criminals get around government censors using secret Web network</a></td> |
|
291 |
+</tr> |
|
292 |
+<tr> |
|
293 |
+<td>2013 Jun 22</td> |
|
294 |
+<td>TribLIVE</td> |
|
295 |
+<td><a href="http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs">Hidden Web Tor helps average users and criminals avoid government snooping</a></td> |
|
50 | 296 |
</tr> |
51 | 297 |
<tr style="background-color: #e5e5e5;"> |
52 | 298 |
<td>2013 Jun 21</td> |
... | ... |
@@ -54,15 +300,55 @@ newest to oldest: </p> |
54 | 300 |
<td><a href="http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions">NSA cramping your style? Use these easy encryption solutions</a></td> |
55 | 301 |
</tr> |
56 | 302 |
<tr> |
303 |
+<td>2013 Jun 19</td> |
|
304 |
+<td>Help Net Security</td> |
|
305 |
+<td><a href="http://www.net-security.org/secworld.php?id=15098">Facebook once again accessible via Tor</a></td> |
|
306 |
+</tr> |
|
307 |
+<tr style="background-color: #e5e5e5;"> |
|
308 |
+<td>2013 Jun 18</td> |
|
309 |
+<td>The Register</td> |
|
310 |
+<td><a href="http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/">Tor users locked out of Facebook after wave of dodgy traffic</a></td> |
|
311 |
+</tr> |
|
312 |
+<tr> |
|
313 |
+<td>2013 Jun 18</td> |
|
314 |
+<td>TechWeek Europe</td> |
|
315 |
+<td><a href="http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413">Facebook Blocks Tor Users After Heavy Malicious Activity</a></td> |
|
316 |
+</tr> |
|
317 |
+<tr style="background-color: #e5e5e5;"> |
|
57 | 318 |
<td>2013 Jun 14</td> |
58 | 319 |
<td>The Salt Lake Tribune</td> |
59 | 320 |
<td><a href="http://www.sltrib.com/sltrib/world/56463680-68/privacy-data-nsa-disadvantages.html.csp">Ideas for keeping your data safe from spying</a></td> |
60 | 321 |
</tr> |
322 |
+<tr> |
|
323 |
+<td>2013 Jun 13</td> |
|
324 |
+<td>Boston Globe</td> |
|
325 |
+<td><a href="http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.htmlp">How to keep data away from prying eyes</a></td> |
|
326 |
+</tr> |
|
61 | 327 |
<tr style="background-color: #e5e5e5;"> |
328 |
+<td>2013 Jun 12</td> |
|
329 |
+<td>Washington Post</td> |
|
330 |
+<td><a href="http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html">Secrecy-focused Web services find a mainstream audience</a></td> |
|
331 |
+</tr> |
|
332 |
+<tr> |
|
62 | 333 |
<td>2013 Jun 11</td> |
63 | 334 |
<td>Reflex (Czech)</td> |
64 | 335 |
<td><a href="http://www.reflex.cz/clanek/zpravy/50756/soukromi-na-internetu-uz-neexistuje-ale-porad-je-tu-tor.html">Privacy on the Internet already exists. But there's still Tor</a></td> |
65 | 336 |
</tr> |
337 |
+<tr style="background-color: #e5e5e5;"> |
|
338 |
+<td>2013 Jun 10</td> |
|
339 |
+<td>Washington Post</td> |
|
340 |
+<td><a href="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/">Five ways to stop the NSA from spying on you</a></td> |
|
341 |
+</tr> |
|
342 |
+<tr> |
|
343 |
+<td>2013 Jun 8</td> |
|
344 |
+<td>ZDNet</td> |
|
345 |
+<td><a href="http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/">Ask a hacker: Top four anti-surveillance apps</a></td> |
|
346 |
+</tr> |
|
347 |
+<tr style="background-color: #e5e5e5;"> |
|
348 |
+<td>2013 Jun 8</td> |
|
349 |
+<td>The Hindu</td> |
|
350 |
+<td><a href="http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece">Cryptography as a means to counter Internet censorship</a></td> |
|
351 |
+</tr> |
|
66 | 352 |
<tr> |
67 | 353 |
<td>2013 Apr 23</td> |
68 | 354 |
<td>The Verge</td> |
69 | 355 |