Andrew Lewman commited on 2008-03-05 03:41:52
Zeige 1 geänderte Dateien mit 49 Einfügungen und 144 Löschungen.
| ... | ... |
@@ -5,155 +5,60 @@ |
| 5 | 5 |
|
| 6 | 6 |
<div class="main-column"> |
| 7 | 7 |
|
| 8 |
-<h1> |
|
| 9 |
-Tor in the media |
|
| 10 |
-</h1> |
|
| 8 |
+<h1>Tor in the media</h1> |
|
| 11 | 9 |
|
| 12 |
-<h2> |
|
| 13 |
-Interviews & Appearances |
|
| 14 |
-</h2> |
|
| 10 |
+<h2>Interviews & Appearances</h2> |
|
| 15 | 11 |
|
| 16 |
-<p> |
|
| 17 |
-Major news organizations including the New York Times, Forbes, |
|
| 12 |
+<p> Major news organizations including the New York Times, Forbes, |
|
| 18 | 13 |
and the CBS Evening News have sought out or quoted Tor Project members |
| 19 | 14 |
due to their expertise on anonymity, privacy, and Internet censorship issues. |
| 20 |
-Some samples: |
|
| 21 |
-</p> |
|
| 22 |
- |
|
| 23 |
- |
|
| 24 |
-<table border=0 cellpadding=3> |
|
| 25 |
- |
|
| 26 |
-<tr> |
|
| 27 |
- <td valign="top"> |
|
| 28 |
- 2008 Feb 01 |
|
| 29 |
- </td> |
|
| 30 |
- <td> |
|
| 31 |
- <strong>PC World:</strong> |
|
| 32 |
- <a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
| 33 |
- Hackers Can Expose Masked Surfers, Study Says</a><br> |
|
| 34 |
- A report on |
|
| 35 |
- <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
|
| 36 |
- Stephen Murdoch's recent PhD thesis</a>. Stephen |
|
| 37 |
- <a href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
|
| 38 |
- responds on the Tor Blog</a>. |
|
| 39 |
- </td> |
|
| 40 |
-</tr> |
|
| 41 |
- |
|
| 42 |
-<tr> |
|
| 43 |
- <td valign="top" width="100"> |
|
| 44 |
- 2006 Apr 11 |
|
| 45 |
- </td> |
|
| 46 |
- <td> |
|
| 47 |
- <strong>PBS Frontline:</strong> |
|
| 48 |
- <a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
|
| 49 |
- Chipping Away at China's Great Firewall</a><br> |
|
| 50 |
- </td> |
|
| 51 |
-</tr> |
|
| 52 |
- |
|
| 53 |
-<tr> |
|
| 54 |
- <td valign="top"> |
|
| 55 |
- 2006 Feb 28 |
|
| 56 |
- </td> |
|
| 57 |
- <td> |
|
| 58 |
- <strong>PC World:</strong> |
|
| 59 |
- <a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
| 60 |
- Outsmarting the Online Privacy Snoops</a><br> |
|
| 61 |
- </td> |
|
| 62 |
-</tr> |
|
| 63 |
- |
|
| 64 |
-<tr> |
|
| 65 |
- <td valign="top"> |
|
| 66 |
- 2006 Feb 27 |
|
| 67 |
- </td> |
|
| 68 |
- <td> |
|
| 69 |
- <strong>Forbes:</strong> |
|
| 70 |
- <a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 71 |
- Cracks In the Wall</a><br> |
|
| 72 |
- Discussion of Tor being used for evading censorship by repressive governments. |
|
| 73 |
- </td> |
|
| 74 |
-</tr> |
|
| 75 |
- |
|
| 76 |
-<tr> |
|
| 77 |
- <td valign="top"> |
|
| 78 |
- 2006 Feb 20 |
|
| 79 |
- </td> |
|
| 80 |
- <td> |
|
| 81 |
- <strong>The Boston Globe:</strong> |
|
| 82 |
- <a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 83 |
- Beating censorship on the Internet</a><br> |
|
| 84 |
- </td> |
|
| 85 |
-</tr> |
|
| 86 |
- |
|
| 87 |
-<tr> |
|
| 88 |
- <td valign="top"> |
|
| 89 |
- 2006 Feb 15 |
|
| 90 |
- </td> |
|
| 91 |
- <td> |
|
| 92 |
- <strong>CBS Evening News:</strong> |
|
| 93 |
- <a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
| 94 |
- Cracking The 'Great Firewall Of China'</a><br> |
|
| 95 |
- Roger Dingledine appeared on the show to discuss Tor, starting at 1:04 into the video. |
|
| 96 |
- </td> |
|
| 97 |
-</tr> |
|
| 98 |
- |
|
| 99 |
-<tr> |
|
| 100 |
- <td valign="top"> |
|
| 101 |
- 2006 Feb 15 |
|
| 102 |
- </td> |
|
| 103 |
- <td> |
|
| 104 |
- <strong>CNBC - Closing Bell:</strong> |
|
| 105 |
- TV Appearance by Roger Dingledine at 4:25pm. (no link)<br> |
|
| 106 |
- </td> |
|
| 107 |
-</tr> |
|
| 108 |
- |
|
| 109 |
-<tr> |
|
| 110 |
- <td valign="top"> |
|
| 111 |
- 2006 Jan 27 |
|
| 112 |
- </td> |
|
| 113 |
- <td> |
|
| 114 |
- <strong>Fox News / eWeek:</strong> |
|
| 115 |
- <a href="http://www.foxnews.com/story/0,2933,183005,00.html"> |
|
| 116 |
- Web Anonymizers Suddenly Get Very Popular</a><br> |
|
| 117 |
- </td> |
|
| 118 |
-</tr> |
|
| 119 |
- |
|
| 120 |
-<tr> |
|
| 121 |
- <td valign="top"> |
|
| 122 |
- 2006 Jan 25 |
|
| 123 |
- </td> |
|
| 124 |
- <td> |
|
| 125 |
- <strong>New York Times:</strong> |
|
| 126 |
- <a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
| 127 |
- Privacy for People Who Don't Show Their Navels</a><br> |
|
| 128 |
- </td> |
|
| 129 |
-</tr> |
|
| 130 |
- |
|
| 131 |
-<tr> |
|
| 132 |
- <td valign="top"> |
|
| 133 |
- 2005 Aug 6 |
|
| 134 |
- </td> |
|
| 135 |
- <td> |
|
| 136 |
- <strong>New Scientist:</strong> |
|
| 137 |
- <a href="URL"> |
|
| 138 |
- Why we all need pornography</a><br> |
|
| 139 |
- <a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php"> |
|
| 140 |
- Full article text</a> also available. |
|
| 141 |
- </td> |
|
| 142 |
-</tr> |
|
| 143 |
- |
|
| 144 |
-</table> |
|
| 145 |
- |
|
| 146 |
- |
|
| 147 |
- |
|
| 148 |
-<h2> |
|
| 149 |
-Articles that involve Tor |
|
| 150 |
-</h2> |
|
| 151 |
- |
|
| 152 |
-<p> |
|
| 153 |
-Since Tor is widely used throughout the world, it is mentioned regularly in the press. |
|
| 15 |
+Some samples: </p> |
|
| 16 |
+ |
|
| 17 |
+<dl> |
|
| 18 |
+<dt>2008 Feb 01, PC World</dt> |
|
| 19 |
+<dd><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
| 20 |
+Hackers Can Expose Masked Surfers, Study Says</a> |
|
| 21 |
+A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
|
| 22 |
+Stephen Murdoch's recent PhD thesis</a>. Stephen <a |
|
| 23 |
+href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
|
| 24 |
+responds on the Tor Blog</a>.</dd> |
|
| 25 |
+<dt>2006 Apr 11, PBS Frontline</dt> |
|
| 26 |
+<dd><a |
|
| 27 |
+href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
|
| 28 |
+Chipping Away at China's Great Firewall</a></dd> |
|
| 29 |
+<dt>2006 Feb 28, PC World</dt> |
|
| 30 |
+<dd><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
| 31 |
+Outsmarting the Online Privacy Snoops</a></dd> |
|
| 32 |
+<dt>2006 Feb 27, Forbes</dt> |
|
| 33 |
+<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 34 |
+ Cracks In the Wall</a>. Discussion of Tor being used for evading censorship by repressive |
|
| 35 |
+governments. </dd> |
|
| 36 |
+<dt>2006 Feb 20, The Boston Globe</dt> |
|
| 37 |
+<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
| 38 |
+Beating censorship on the Internet</a></dd> |
|
| 39 |
+<dt>2006 Feb 15, CBS Evening News</dt> |
|
| 40 |
+<dd><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
| 41 |
+ Cracking The 'Great Firewall Of China'</a>. |
|
| 42 |
+ Roger Dingledine appeared on the show to discuss Tor, starting at |
|
| 43 |
+1:04 into the video.</dd> |
|
| 44 |
+<dt>2006 Feb 15, CNBC - Closing Bell</dt> |
|
| 45 |
+<dd>TV Appearance by Roger Dingledine at 4:25pm. (no link)</dd> |
|
| 46 |
+<dt>2006 Jan 27, Fox News/eWeek</dt> |
|
| 47 |
+<dd><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
|
| 48 |
+Anonymizers Suddenly Get Very Popular</a></dd> |
|
| 49 |
+<dt>2006 Jan 25, New York Times</dt> |
|
| 50 |
+<dd><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
| 51 |
+ Privacy for People Who Don't Show Their Navels</a></dd> |
|
| 52 |
+<dt>2005 Aug 6, New Scientist</dt> |
|
| 53 |
+<dd><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></dd> |
|
| 54 |
+</dl> |
|
| 55 |
+ |
|
| 56 |
+<p /> |
|
| 57 |
+<h2>Articles that involve Tor</h2> |
|
| 58 |
+ |
|
| 59 |
+<p> Since Tor is widely used throughout the world, it is mentioned regularly in the press. |
|
| 154 | 60 |
This list is not comprehensive, but illustrates some of the significant |
| 155 |
-Tor-related stories that have popped up. |
|
| 156 |
-</p> |
|
| 61 |
+Tor-related stories that have popped up. </p> |
|
| 157 | 62 |
|
| 158 | 63 |
<table border=0 cellpadding=3> |
| 159 | 64 |
|
| 160 | 65 |