Andrew Lewman commited on 2008-03-05 03:41:52
Zeige 1 geänderte Dateien mit 49 Einfügungen und 144 Löschungen.
... | ... |
@@ -5,155 +5,60 @@ |
5 | 5 |
|
6 | 6 |
<div class="main-column"> |
7 | 7 |
|
8 |
-<h1> |
|
9 |
-Tor in the media |
|
10 |
-</h1> |
|
8 |
+<h1>Tor in the media</h1> |
|
11 | 9 |
|
12 |
-<h2> |
|
13 |
-Interviews & Appearances |
|
14 |
-</h2> |
|
10 |
+<h2>Interviews & Appearances</h2> |
|
15 | 11 |
|
16 |
-<p> |
|
17 |
-Major news organizations including the New York Times, Forbes, |
|
12 |
+<p> Major news organizations including the New York Times, Forbes, |
|
18 | 13 |
and the CBS Evening News have sought out or quoted Tor Project members |
19 | 14 |
due to their expertise on anonymity, privacy, and Internet censorship issues. |
20 |
-Some samples: |
|
21 |
-</p> |
|
22 |
- |
|
23 |
- |
|
24 |
-<table border=0 cellpadding=3> |
|
25 |
- |
|
26 |
-<tr> |
|
27 |
- <td valign="top"> |
|
28 |
- 2008 Feb 01 |
|
29 |
- </td> |
|
30 |
- <td> |
|
31 |
- <strong>PC World:</strong> |
|
32 |
- <a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
33 |
- Hackers Can Expose Masked Surfers, Study Says</a><br> |
|
34 |
- A report on |
|
35 |
- <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
|
36 |
- Stephen Murdoch's recent PhD thesis</a>. Stephen |
|
37 |
- <a href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
|
38 |
- responds on the Tor Blog</a>. |
|
39 |
- </td> |
|
40 |
-</tr> |
|
41 |
- |
|
42 |
-<tr> |
|
43 |
- <td valign="top" width="100"> |
|
44 |
- 2006 Apr 11 |
|
45 |
- </td> |
|
46 |
- <td> |
|
47 |
- <strong>PBS Frontline:</strong> |
|
48 |
- <a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
|
49 |
- Chipping Away at China's Great Firewall</a><br> |
|
50 |
- </td> |
|
51 |
-</tr> |
|
52 |
- |
|
53 |
-<tr> |
|
54 |
- <td valign="top"> |
|
55 |
- 2006 Feb 28 |
|
56 |
- </td> |
|
57 |
- <td> |
|
58 |
- <strong>PC World:</strong> |
|
59 |
- <a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
60 |
- Outsmarting the Online Privacy Snoops</a><br> |
|
61 |
- </td> |
|
62 |
-</tr> |
|
63 |
- |
|
64 |
-<tr> |
|
65 |
- <td valign="top"> |
|
66 |
- 2006 Feb 27 |
|
67 |
- </td> |
|
68 |
- <td> |
|
69 |
- <strong>Forbes:</strong> |
|
70 |
- <a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
71 |
- Cracks In the Wall</a><br> |
|
72 |
- Discussion of Tor being used for evading censorship by repressive governments. |
|
73 |
- </td> |
|
74 |
-</tr> |
|
75 |
- |
|
76 |
-<tr> |
|
77 |
- <td valign="top"> |
|
78 |
- 2006 Feb 20 |
|
79 |
- </td> |
|
80 |
- <td> |
|
81 |
- <strong>The Boston Globe:</strong> |
|
82 |
- <a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
83 |
- Beating censorship on the Internet</a><br> |
|
84 |
- </td> |
|
85 |
-</tr> |
|
86 |
- |
|
87 |
-<tr> |
|
88 |
- <td valign="top"> |
|
89 |
- 2006 Feb 15 |
|
90 |
- </td> |
|
91 |
- <td> |
|
92 |
- <strong>CBS Evening News:</strong> |
|
93 |
- <a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
94 |
- Cracking The 'Great Firewall Of China'</a><br> |
|
95 |
- Roger Dingledine appeared on the show to discuss Tor, starting at 1:04 into the video. |
|
96 |
- </td> |
|
97 |
-</tr> |
|
98 |
- |
|
99 |
-<tr> |
|
100 |
- <td valign="top"> |
|
101 |
- 2006 Feb 15 |
|
102 |
- </td> |
|
103 |
- <td> |
|
104 |
- <strong>CNBC - Closing Bell:</strong> |
|
105 |
- TV Appearance by Roger Dingledine at 4:25pm. (no link)<br> |
|
106 |
- </td> |
|
107 |
-</tr> |
|
108 |
- |
|
109 |
-<tr> |
|
110 |
- <td valign="top"> |
|
111 |
- 2006 Jan 27 |
|
112 |
- </td> |
|
113 |
- <td> |
|
114 |
- <strong>Fox News / eWeek:</strong> |
|
115 |
- <a href="http://www.foxnews.com/story/0,2933,183005,00.html"> |
|
116 |
- Web Anonymizers Suddenly Get Very Popular</a><br> |
|
117 |
- </td> |
|
118 |
-</tr> |
|
119 |
- |
|
120 |
-<tr> |
|
121 |
- <td valign="top"> |
|
122 |
- 2006 Jan 25 |
|
123 |
- </td> |
|
124 |
- <td> |
|
125 |
- <strong>New York Times:</strong> |
|
126 |
- <a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
127 |
- Privacy for People Who Don't Show Their Navels</a><br> |
|
128 |
- </td> |
|
129 |
-</tr> |
|
130 |
- |
|
131 |
-<tr> |
|
132 |
- <td valign="top"> |
|
133 |
- 2005 Aug 6 |
|
134 |
- </td> |
|
135 |
- <td> |
|
136 |
- <strong>New Scientist:</strong> |
|
137 |
- <a href="URL"> |
|
138 |
- Why we all need pornography</a><br> |
|
139 |
- <a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php"> |
|
140 |
- Full article text</a> also available. |
|
141 |
- </td> |
|
142 |
-</tr> |
|
143 |
- |
|
144 |
-</table> |
|
145 |
- |
|
146 |
- |
|
147 |
- |
|
148 |
-<h2> |
|
149 |
-Articles that involve Tor |
|
150 |
-</h2> |
|
151 |
- |
|
152 |
-<p> |
|
153 |
-Since Tor is widely used throughout the world, it is mentioned regularly in the press. |
|
15 |
+Some samples: </p> |
|
16 |
+ |
|
17 |
+<dl> |
|
18 |
+<dt>2008 Feb 01, PC World</dt> |
|
19 |
+<dd><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
20 |
+Hackers Can Expose Masked Surfers, Study Says</a> |
|
21 |
+A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
|
22 |
+Stephen Murdoch's recent PhD thesis</a>. Stephen <a |
|
23 |
+href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
|
24 |
+responds on the Tor Blog</a>.</dd> |
|
25 |
+<dt>2006 Apr 11, PBS Frontline</dt> |
|
26 |
+<dd><a |
|
27 |
+href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
|
28 |
+Chipping Away at China's Great Firewall</a></dd> |
|
29 |
+<dt>2006 Feb 28, PC World</dt> |
|
30 |
+<dd><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
|
31 |
+Outsmarting the Online Privacy Snoops</a></dd> |
|
32 |
+<dt>2006 Feb 27, Forbes</dt> |
|
33 |
+<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
34 |
+ Cracks In the Wall</a>. Discussion of Tor being used for evading censorship by repressive |
|
35 |
+governments. </dd> |
|
36 |
+<dt>2006 Feb 20, The Boston Globe</dt> |
|
37 |
+<dd><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
|
38 |
+Beating censorship on the Internet</a></dd> |
|
39 |
+<dt>2006 Feb 15, CBS Evening News</dt> |
|
40 |
+<dd><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
|
41 |
+ Cracking The 'Great Firewall Of China'</a>. |
|
42 |
+ Roger Dingledine appeared on the show to discuss Tor, starting at |
|
43 |
+1:04 into the video.</dd> |
|
44 |
+<dt>2006 Feb 15, CNBC - Closing Bell</dt> |
|
45 |
+<dd>TV Appearance by Roger Dingledine at 4:25pm. (no link)</dd> |
|
46 |
+<dt>2006 Jan 27, Fox News/eWeek</dt> |
|
47 |
+<dd><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
|
48 |
+Anonymizers Suddenly Get Very Popular</a></dd> |
|
49 |
+<dt>2006 Jan 25, New York Times</dt> |
|
50 |
+<dd><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&oref=slogin"> |
|
51 |
+ Privacy for People Who Don't Show Their Navels</a></dd> |
|
52 |
+<dt>2005 Aug 6, New Scientist</dt> |
|
53 |
+<dd><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></dd> |
|
54 |
+</dl> |
|
55 |
+ |
|
56 |
+<p /> |
|
57 |
+<h2>Articles that involve Tor</h2> |
|
58 |
+ |
|
59 |
+<p> Since Tor is widely used throughout the world, it is mentioned regularly in the press. |
|
154 | 60 |
This list is not comprehensive, but illustrates some of the significant |
155 |
-Tor-related stories that have popped up. |
|
156 |
-</p> |
|
61 |
+Tor-related stories that have popped up. </p> |
|
157 | 62 |
|
158 | 63 |
<table border=0 cellpadding=3> |
159 | 64 |
|
160 | 65 |