Andrew Lewman commited on 2014-07-17 03:47:25
Zeige 1 geänderte Dateien mit 46 Einfügungen und 1 Löschungen.
... | ... |
@@ -25,13 +25,58 @@ newest to oldest: </p> |
25 | 25 |
|
26 | 26 |
<table width="100%" cellpadding="3" cellspacing="0"> |
27 | 27 |
|
28 |
-<thead style="background-color: #e5e5e5;"> |
|
28 |
+<thead style=""> |
|
29 | 29 |
<tr> |
30 | 30 |
<th width="15%">Date</th> |
31 | 31 |
<th width="15%">Publication</th> |
32 | 32 |
<th>Topic</th> |
33 | 33 |
</tr> |
34 | 34 |
</thead> |
35 |
+<tr style="background-color: #e5e5e5;"> |
|
36 |
+<td>2014 Jul 8</td> |
|
37 |
+<td>Cambridge Community Television</td> |
|
38 |
+<td><a href="http://www.cctvcambridge.org/NSATor">NSA Surveillance Targets Cambridge - based TOR Project</a></td> |
|
39 |
+</tr> |
|
40 |
+<tr style=""> |
|
41 |
+<td>2014 Jul 8</td> |
|
42 |
+<td>Tech Times</td> |
|
43 |
+<td><a href="http://www.techtimes.com/articles/9779/20140708/nsa-might-tag-you-as-extremist-when-you-use-tor-other-privacy-online-services.htm">NSA might tag you as extremist when you use Tor, other privacy online services</a></td> |
|
44 |
+</tr> |
|
45 |
+<tr style="background-color: #e5e5e5;"> |
|
46 |
+<td>2014 Jul 7</td> |
|
47 |
+<td>Computerworld</td> |
|
48 |
+<td><a href="http://blogs.computerworld.com/privacy/24102/if-you-care-about-online-privacy-then-nsa-cares-about-targeting-you">If you can about online privacy, then the NSA cares about targeting you</a></td> |
|
49 |
+</tr> |
|
50 |
+<tr style=""> |
|
51 |
+<td>2014 Jul 3</td> |
|
52 |
+<td>DasErste.de</td> |
|
53 |
+<td><a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">NSA targets the privacy-conscious</a></td> |
|
54 |
+</tr> |
|
55 |
+<tr style="background-color: #e5e5e5;"> |
|
56 |
+<td>2014 Jun 17</td> |
|
57 |
+<td>IT News Online</td> |
|
58 |
+<td><a href="http://www.itnewsonline.com/realwire/How-to-be-anonymous-on-the-Internet-AppSec-presents-the-latest-developments-of-The-Tor-Project-for-anonymous-communications/13530">How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications</a></td> |
|
59 |
+</tr> |
|
60 |
+<tr style=""> |
|
61 |
+<td>2014 Jun 15</td> |
|
62 |
+<td>International Business Times</td> |
|
63 |
+<td><a href="http://www.ibtimes.co.uk/iraq-crisis-gvoernment-blocks-access-tor-project-following-isis-insurgency-1452879">Iraq Crisis: Government Blocks Access to Tor Project Following Isis Insurgency </a></td> |
|
64 |
+</tr> |
|
65 |
+<tr style="background-color: #e5e5e5;"> |
|
66 |
+<td>2014 Jun 15</td> |
|
67 |
+<td>Gizmodo</td> |
|
68 |
+<td><a href="http://gizmodo.com/tor-is-for-everyone-why-you-should-use-tor-1591191905">Tor is for Everyone: Why Should You Use Tor </a></td> |
|
69 |
+</tr> |
|
70 |
+<tr style=""> |
|
71 |
+<td>2014 May 25</td> |
|
72 |
+<td>NPR</td> |
|
73 |
+<td><a href="http://www.npr.org/blogs/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet">Going Dark: The Internet Behind The Internet</a></td> |
|
74 |
+</tr> |
|
75 |
+<tr style="background-color: #e5e5e5;"> |
|
76 |
+<td>2014 May 13</td> |
|
77 |
+<td>ABC News</td> |
|
78 |
+<td><a href="http://abc7news.com/technology/i-team-investigates-underworld-marketplaces-of-the-darknet/56262/">I-Team: Understanding TOR and the dark net</a></td> |
|
79 |
+</tr> |
|
35 | 80 |
<tr style=""> |
36 | 81 |
<td>2014 May 9</td> |
37 | 82 |
<td>Vice</td> |
38 | 83 |