Browse code

clean up the press section to make it less duplicative of content.

Andrew Lewman authored on20/09/2010 19:15:20
Showing5 changed files
... ...
@@ -3,40 +3,45 @@
3 3
 # Translation-Priority: 3-low
4 4
 
5 5
 #include "head.wmi" TITLE="Tor Project: Press Page"
6
-<!-- PUT CONTENT AFTER THIS TAG -->
7
-
8
-<h2>Tor Press and Media Information</h2>
9
-<div class="underline"></div>
10
-
11
-<!-- BEGIN SIDEBAR -->
12
-<div class="sidebar">
13
-<h3>Press Contact</h3>
14
-<address>
15
-Andrew Lewman
16
-execdir@torproject.org
17
-+1-781-424-9877
18
-</address>
19
-</div>
20
-<!-- END SIDEBAR -->
21
-
22
-<h3>Press Releases</h3>
23
-<ul>
24
-<li>25 March 2010. Tor and Printfection launch <a href="<page press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</li>
25
-<li>12 March 2009.  Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>">performance roadmap</a> and campaign.</li>
26
-<li>19 December 2008.  Tor announces 3-year <a href="<page
27
-press/2008-12-19-roadmap-press-release>">development roadmap</a>.</li>
28
-</ul>
29
-<br />
30
-<div class="nb">
31
-<h3>Quick links to better understand Tor</h3>
32
-<ol>
33
-<li>How is Tor <a href="<page docs/faq>#Torisdifferent">different than other proxy solutions</a>?</li>
34
-<li><a href="/press/presskit/2009-General-Online-Anonymity-with-Tor.pdf">Why Online Privacy and Anonymity</a>?</li>
35
-<li><a href="/press/presskit/2009-General-Background-on-Tor-Project-Inc.pdf">Who is the Tor Project, Inc.</a>?</li>
36
-<li><a href="https://blog.torproject.org/blog/circumvention-and-anonymity">Why anonymity matters for circumvention</a>.</li>
37
-</ol>
6
+<div id="content" class="clearfix">
7
+  <div id="breadcrumbs">
8
+    <a href="<page index>">Home &raquo; </a>
9
+    <a href="<page press/>">Press</a>
10
+  </div> 
11
+  <div id="maincol">
12
+    <!-- PUT CONTENT AFTER THIS TAG -->
13
+    <h1>Latest Announcements</h1>
14
+    <table class="topforty">
15
+      <tr>
16
+        <td class="beige">
17
+          <div class="name">Title of Press Release</div>
18
+          <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer semper justo mattis.</p>
19
+          <div class="right"><a href="<page projects/tordnsel>">Read more &raquo;</a></div>
20
+        </td>  
21
+      </tr>
22
+      <tr>
23
+        <td>
24
+          <div class="name">Title of Press Release</div>
25
+          <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer semper justo mattis.</p>
26
+          <div class="right"><a href="<page projects/tordnsel>">Read more &raquo;</a></div>
27
+        </td>
28
+      </tr>
29
+      <tr>
30
+        <td class="beige">
31
+          <div class="name">Title of Press Release</div>
32
+          <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer semper justo mattis.</p>
33
+          <div class="right"><a href="<page projects/tordnsel>">Read more &raquo;</a></div>
34
+        </td> 
35
+      </tr>
36
+    </table>
37
+    <h2><div class="left"><a href="<page projects/tordnsel>">&laquo; Archive</a></div></h2>
38
+  </div>
39
+  <!-- END MAINCOL -->
40
+  <div id = "sidecol">
41
+#include "side.wmi"
42
+#include "info.wmi"
43
+  </div>
44
+  <!-- END SIDECOL -->
38 45
 </div>
39
-</div><!-- #main -->
40
-
41
-#include <foot.wmi>
42
-
46
+<!-- END CONTENT -->
47
+#include <foot.wmi> 
... ...
@@ -12,8 +12,979 @@
12 12
   <div id="maincol">
13 13
     <!-- PUT CONTENT AFTER THIS TAG -->
14 14
     
15
-    <h1>Tor in the Media</h1>
16
-  </div>
15
+<h1>Media Appearances</h1>
16
+
17
+<h2>Interviews &amp; Appearances</h2>
18
+
19
+<p> Major news organizations including the New York Times, Forbes,
20
+and the CBS Evening News have sought out or quoted Tor Project members
21
+due to their expertise on anonymity, privacy, and Internet censorship issues.
22
+Some samples: </p>
23
+
24
+<table width="100%" border="0" cellpadding="3" cellspacing="0">
25
+<thead style="background-color: #e5e5e5;">
26
+<tr>
27
+<th width="10%">Date</th>
28
+<th width="15%">Publication</th>
29
+<th>Topic</th>
30
+</tr>
31
+</thead>
32
+
33
+<tr>
34
+<td>2010 Mar 11</td>
35
+<td>ABC Australia</td>
36
+<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense:  The Deep Web</a></td>
37
+</tr>
38
+<tr style="background-color: #e5e5e5;">
39
+<td>2009 Jul 02</td>
40
+<td>NED/CIMA</td>
41
+<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td>
42
+</tr>
43
+<tr>
44
+<td>2009 Apr 06</td>
45
+<td>Al Jazeera</td>
46
+<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
47
+Voices showcases Tor</a></td>
48
+</tr>
49
+<tr style="background-color: #e5e5e5;">
50
+<td>2009 Mar 12</td>
51
+<td>BBC World Service</td>
52
+<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about Tor and Censorship</a></td>
53
+</tr>
54
+<tr>
55
+<td>2009 Feb 13</td>
56
+<td>Hearsay Culture</td>
57
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td>
58
+</tr>
59
+<tr style="background-color: #e5e5e5;">
60
+<td>2008 Dec 29</td>
61
+<td>nu.nl</td>
62
+<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td>
63
+</tr>
64
+<tr>
65
+<td>2006 Apr 11</td>
66
+<td>PBS Frontline</td>
67
+<td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">Chipping Away at China's Great Firewall</a></td>
68
+</tr>
69
+<tr style="background-color: #e5e5e5;">
70
+<td>2006 Feb 28</td>
71
+<td>PC World</td>
72
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
73
+Outsmarting the Online Privacy Snoops</a></td>
74
+</tr>
75
+<tr>
76
+<td>2006 Feb 27</td>
77
+<td>Forbes</td>
78
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
79
+Cracks In the Wall</a>.  Discussion of Tor being used for evading censorship by repressive
80
+governments. </td>
81
+</tr>
82
+<tr style="background-color: #e5e5e5;">
83
+<td>2006 Feb 20</td>
84
+<td>The Boston Globe</td>
85
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
86
+Beating censorship on the Internet</a></td>
87
+</tr>
88
+<tr>
89
+<td>2006 Feb 15</td>
90
+<td>CBS Evening News</td>
91
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
92
+Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine appeared on the show to discuss Tor, starting at
93
+1:04 into the video.</td>
94
+</tr>
95
+<tr style="background-color: #e5e5e5;">
96
+<td>2006 Feb 15</td>
97
+<td>CNBC - Closing Bell</td>
98
+<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
99
+</tr>
100
+<tr>
101
+<td>2006 Jan 27</td>
102
+<td>Fox News/eWeek</td>
103
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
104
+Anonymizers Suddenly Get Very Popular</a></td>
105
+</tr>
106
+<tr>
107
+<td>2006 Jan 25</td>
108
+<td>New York Times</td>
109
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&amp;oref=slogin">
110
+Privacy for People Who Don't Show Their Navels</a></td>
111
+</tr>
112
+<tr style="background-color: #e5e5e5;">
113
+<td>2005 Aug 6</td>
114
+<td>New Scientist</td>
115
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td>
116
+</tr>
117
+</table>
118
+
119
+<br/>
120
+
121
+<h2>Articles</h2>
122
+
123
+<p> Since Tor is widely used throughout the world, it is mentioned regularly in the press.
124
+This list is not comprehensive, but illustrates some of the significant
125
+Tor-related stories that have popped up.  </p>
126
+
127
+<table width="100%" border="0" cellpadding="3" cellspacing="0">
128
+<thead style="background-color: #e5e5e5;">
129
+<tr>
130
+<th width="10%">Date</th>
131
+<th width="15%">Publication</th>
132
+<th>Topic</th>
133
+</tr>
134
+</thead>
135
+
136
+<tr>
137
+<td>2010 August 01</td>
138
+<td>PC Format - Poland</td>
139
+<td><a
140
+href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
141
+and Facebook are spying on us</a></td>
142
+</tr>
143
+<tr style="background-color: #e5e5e5;">
144
+<td>2010 July 14</td>
145
+<td>China Rights Forum</td>
146
+<td><a
147
+href="http://www.hrichina.org/public/contents/category?cid=175033">China
148
+Rights Forum, No. 2 - “China’s Internet”: Staking Digital
149
+Ground</a></td>
150
+</tr>
151
+<tr>
152
+<td>2010 May 25</td>
153
+<td>The Australian</td>
154
+<td><a
155
+href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466">
156
+Call to join Tor network to fight censorship</a></td>
157
+</tr>
158
+<tr style="background-color: #e5e5e5;">
159
+<td>2010 Mar 17</td>
160
+<td>PC World Poland</td>
161
+<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity in the Web</a></td>
162
+</tr>
163
+<tr>
164
+<td>2010 Mar 09</td>
165
+<td>PC Pro UK</td>
166
+<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">The dark side of the web</a></td>
167
+</tr>
168
+<tr style="background-color: #e5e5e5;">
169
+<td>2009 Dec 29</td>
170
+<td>Times Online</td>
171
+<td><a
172
+href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.ece">When
173
+Iran’s regime falls this will be remembered as the YouTube revolution </a></td>
174
+</tr>
175
+<tr>
176
+<td>2009 Oct 15</td>
177
+<td>Technology Review</td>
178
+<td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down on Tor Anonymity Network</a></td>
179
+</tr>
180
+<tr style="background-color: #e5e5e5;">
181
+<td>2009 Sep 30</td>
182
+<td>BusinessWeek</td>
183
+<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
184
+</tr>
185
+<tr>
186
+<td>2009 Aug 19</td>
187
+<td>Reuters</td>
188
+<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?pageNumber=1&amp;virtualBrandChannel=0&amp;sp=true">Web tools help protect human rights activists</a></td>
189
+</tr>
190
+<tr style="background-color: #e5e5e5;">
191
+<td>2009 Aug 10</td>
192
+<td>Technology Review</td>
193
+<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How to Build Anonymity Into the Internet</a></td>
194
+</tr>
195
+<tr>
196
+<td>2009 Jul 26</td>
197
+<td>Washington Times</td>
198
+<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td>
199
+</tr>
200
+<tr style="background-color: #e5e5e5;">
201
+<td>2009 Jul 26</td>
202
+<td>Boston Globe</td>
203
+<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed at Iranians</a></td>
204
+</tr>
205
+<tr>
206
+<td>2009 Jul 24</td>
207
+<td>Associated Press</td>
208
+<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude crackdown on Internet</a></td>
209
+</tr>
210
+<tr style="background-color: #e5e5e5;">
211
+<td>2009 Jul 08</td>
212
+<td>Tehran Bureau</td>
213
+<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks Around the Globe Rally to Help Iranians Online</a></td>
214
+</tr>
215
+<tr>
216
+<td>2009 Jun 26</td>
217
+<td>Washington Times</td>
218
+<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid censorship with Navy technology</a></td>
219
+</tr>
220
+<tr style="background-color: #e5e5e5;">
221
+<td>2009 Jun 29</td>
222
+<td>EFF</td>
223
+<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor Relay</a></td>
224
+</tr>
225
+<tr>
226
+<td>2009 Jun 24</td>
227
+<td>Daily Finance</td>
228
+<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-controversy/">Nokia and Siemens in Iran controversy</a></td>
229
+</tr>
230
+<tr style="background-color: #e5e5e5;">
231
+<td>2009 Jun 18</td>
232
+<td>Wall Street Journal</td>
233
+<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
234
+</tr>
235
+<tr>
236
+<td>2009 Jun 19</td>
237
+<td>O'Reilly Radar</td>
238
+<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project and the EFF</a></td>
239
+</tr>
240
+<tr style="background-color: #e5e5e5;">
241
+<td>2009 Jun 18</td>
242
+<td>Deutsche Welle</td>
243
+<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet proxies let Iranians and others connect to blocked Web sites</a></td>
244
+</tr>
245
+<tr>
246
+<td>2009 Jun 18</td>
247
+<td>Technology Review</td>
248
+<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the Republic of Iran</a></td>
249
+</tr>
250
+<tr style="background-color: #e5e5e5;">
251
+<td>2009 Jun 17</td>
252
+<td>CNet News</td>
253
+<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find ways to bypass Net censors</a></td>
254
+</tr>
255
+<tr>
256
+<td>2009 Jun 17</td>
257
+<td>ComputerWorld</td>
258
+<td><a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9134471&amp;intsrc=news_ts_head">Iran's leaders fight Internet; Internet wins (so far)</a></td>
259
+</tr>
260
+<tr style="background-color: #e5e5e5;">
261
+<td>2009 May 29</td>
262
+<td>Le Monde</td>
263
+<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
264
+</tr>
265
+<tr>
266
+<td>2009 May 15</td>
267
+<td>Mass High Tech</td>
268
+<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net privacy</a></td>
269
+</tr>
270
+<tr style="background-color: #e5e5e5;">
271
+<td>2009 May 01</td>
272
+<td>New York Times</td>
273
+<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and Others Outwit Net Censors</a></td>
274
+</tr>
275
+<tr>
276
+<td>2009 Apr 23</td>
277
+<td>Technology Review</td>
278
+<td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made Safer:  How anonymity technology could save free speech on the Internet.</a></td>
279
+</tr>
280
+<tr style="background-color: #e5e5e5;">
281
+<td>2009 Apr 22</td>
282
+<td>Le Monde</td>
283
+<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</a></td>
284
+</tr>
285
+<tr>
286
+<td>2009 Apr 06</td>
287
+<td>Reader's Digest</td>
288
+<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">How to Hide Anything</a></td>
289
+</tr>
290
+<tr style="background-color: #e5e5e5;">
291
+<td>2009 Mar 18</td>
292
+<td>Marie Claire</td>
293
+<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td>
294
+</tr>
295
+<tr>
296
+<td>2009 Mar 13</td>
297
+<td>Wall Street Journal</td>
298
+<td><a
299
+href="http://online.wsj.com/article/SB123567809587886053.html">The
300
+Kindness of Strangers</a></td>
301
+</tr>
302
+<tr style="background-color: #e5e5e5;">
303
+<td>2009 Mar 03</td>
304
+<td>Orf Austria</td>
305
+<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER column</a></td>
306
+</tr>
307
+<tr>
308
+<td>2009 Feb 18</td>
309
+<td>Bangkok Post</td>
310
+<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine">The old fake "404 not found" routine</a></td>
311
+</tr>
312
+<tr style="background-color: #e5e5e5;">
313
+<td>2008 Dec 14</td>
314
+<td>PC Magazine: Middle &amp; Near East</td>
315
+<td><a
316
+href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To
317
+Reclaim Your Online Privacy</a></td>
318
+</tr>
319
+<tr>
320
+<td>2008 Aug 21</td>
321
+<td>CNN</td>
322
+<td><a
323
+href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts:
324
+Internet filtering and censorship rife</a></td>
325
+</tr>
326
+<tr style="background-color: #e5e5e5;">
327
+<td>2008 Aug 22</td>
328
+<td>The Sydney Morning Herald</td>
329
+<td><a
330
+href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The
331
+China Syndrome</a></td>
332
+</tr>
333
+<tr>
334
+<td>2008 Aug 20</td>
335
+<td>Scientific American</td>
336
+<td><a
337
+href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography:
338
+How to Keep Your Secrets Safe</a></td>
339
+</tr>
340
+<tr style="background-color: #e5e5e5;">
341
+<td>2008 Aug 05</td>
342
+<td>Guardian UK</td>
343
+<td><a
344
+href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting
345
+the great firewall</a></td>
346
+</tr>
347
+<tr>
348
+<td>2008 Aug 10</td>
349
+<td>Tech Radar UK</td>
350
+<td><a
351
+href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom
352
+Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a>
353
+</td>
354
+</tr>
355
+<tr style="background-color: #e5e5e5;">
356
+<td>2008 Aug 07</td>
357
+<td>Spiegel</td>
358
+<td><a
359
+href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks
360
+gegen Zensur und Überwachung</a>
361
+</td>
362
+</tr>
363
+<tr>
364
+<td>2008 Aug 07</td>
365
+<td>PC World</td>
366
+<td><a
367
+href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15
368
+Great, Free Privacy Downloads</a>.  Tor is Number 1.
369
+</td>
370
+</tr>
371
+<tr style="background-color: #e5e5e5;">
372
+<td>2008 Aug 07</td>
373
+<td>The Guardian UK</td>
374
+<td><a
375
+href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos
376
+aims to crack China's wall</a>
377
+</td>
378
+</tr>
379
+<tr>
380
+<td>2008 Aug 07</td>
381
+<td>The Register UK</td>
382
+<td><a
383
+href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German
384
+hackers poke hole in great firewall of China</a>
385
+</td>
386
+</tr>
387
+<tr>
388
+<td>2008 May 24</td>
389
+<td>Groupo Estado</td>
390
+<td><a
391
+href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&amp;more=1&amp;c=1&amp;tb=1&amp;pb=1&amp;cat=525">Interview
392
+at Computers, Freedom, and Privacy 2008 Conference</a>
393
+</td>
394
+</tr>
395
+<tr style="background-color: #e5e5e5;">
396
+<td>2008 Mar 12</td>
397
+<td>SearchSecurity.com</td>
398
+<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">
399
+Tor network 'bridges' help evade blockers</a>.
400
+Covers new Tor features designed to overcome filtering and blocking that prevent access
401
+to the Tor network.
402
+</td>
403
+</tr>
404
+<tr>
405
+<td>2008 Feb 14</td>
406
+<td>Wired: Compiler Blog</td>
407
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
408
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
409
+</td>
410
+</tr>
411
+<tr style="background-color: #e5e5e5;">
412
+<td>2008 Feb 01</td>
413
+<td>PC World</td>
414
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
415
+Hackers Can Expose Masked Surfers, Study Says</a>
416
+A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
417
+Steven Murdoch's recent PhD thesis</a>. Steven <a
418
+href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
419
+responds on the Tor Blog</a>.</td>
420
+</tr>
421
+<tr style="background-color: #e5e5e5;">
422
+<td>2007 Sep 21</td>
423
+<td>Wired HowTo Blog</td>
424
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
425
+Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.
426
+</td>
427
+</tr>
428
+
429
+<tr>
430
+<td>2007 Sep 16</td>
431
+<td>Cnet</td>
432
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">
433
+    Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized
434
+    their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>.
435
+    We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>">
436
+    Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.
437
+  </td>
438
+</tr>
439
+
440
+<tr style="background-color: #e5e5e5;">
441
+<td>2007 Sep 10</td>
442
+<td>Wired</td>
443
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
444
+Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/>
445
+Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node
446
+he was running, then published unencrypted account and password information.
447
+Note that the better articles covering this event correctly indicate that this is not a security
448
+flaw or design problem with Tor - Tor provides anonymity, but does not
449
+encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while
450
+browsing to ensure end-to-end encryption.
451
+Also covered in
452
+<a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
453
+The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
454
+InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
455
+The Sydney Morning Herald</a>,
456
+<a href="http://www.securityfocus.com/news/11486">
457
+Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
458
+ars technica</a>, and many others. It was reported as early as August 31, 2007 on the
459
+<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
460
+Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.
461
+In the end, Mr. Egerstad was arrested, which was covered by
462
+<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
463
+The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
464
+The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900">
465
+ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.
466
+</td>
467
+</tr>
468
+
469
+<tr>
470
+<td>2007 Jul 27</td>
471
+<td>Wired Blog</td>
472
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br/>
473
+A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
474
+blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
475
+at the bottom of the article.
476
+</td>
477
+</tr>
478
+
479
+<tr style="background-color: #e5e5e5;">
480
+<td>2007 Jun 22</td>
481
+<td>Bangkok Post</td>
482
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
483
+The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
484
+</td>
485
+</tr>
486
+
487
+<tr>
488
+<td>2007 Mar 15</td>
489
+<td>World Changing</td>
490
+<td><a href="http://www.worldchanging.com/archives/006309.html">
491
+Blogging Where Speech Isn’t Free</a><br/>
492
+Coverage of former Tor Executive Director Shava Nerad's participation at an
493
+<a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&amp;id=IAP060124">
494
+SXSW panel</a>, where she explained how Tor can help bloggers.
495
+</td>
496
+</tr>
497
+
498
+<tr style="background-color: #e5e5e5;">
499
+<td>2007 Mar 8</td>
500
+<td>Security Focus</td>
501
+<td><a href="http://www.securityfocus.com/news/11447/1">
502
+Tor hack proposed to catch criminals</a>.
503
+Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the
504
+Tor Project illustrating why this approach may not be a good idea.
505
+</td>
506
+</tr>
507
+
508
+<tr>
509
+<td>2007 Feb 1</td>
510
+<td>Dr Dobb's</td>
511
+<td><a href="http://www.ddj.com/security/197002414">
512
+Tor Project Protects Anonymous Sources</a>.
513
+An introduction to Tor, including technical and historical background.
514
+</td>
515
+</tr>
516
+
517
+<tr style="background-color: #e5e5e5;">
518
+<td>2006 Oct 19</td>
519
+<td>Wired Threat Level</td>
520
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
521
+The Onion Router (TOR) is Leaky (Leeky)</a>.
522
+Explains why you need something like Privoxy
523
+in addition to the core Tor code to ensure your anonymity. If you use the
524
+Vidalia bundle, it installs and configures Privoxy automatically, but it can't
525
+hurt to understand why it is necessary.
526
+</td>
527
+</tr>
528
+
529
+<tr>
530
+<td>2006 Aug 18</td>
531
+<td>NPR</td>
532
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
533
+Tips for Protecting Privacy Online</a>.
534
+Kevin Bankston of the EFF recommends Tor during an NPR interview.
535
+Tor information begins at 8:15 into the program.
536
+</td>
537
+</tr>
538
+
539
+<tr style="background-color: #e5e5e5;">
540
+<td>2006 Jul 5</td>
541
+<td>MSNBC</td>
542
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/">
543
+Defending liberties in high-tech world</a>.
544
+Mentions EFF funding for Tor as one of its significant nonlitigation projects.
545
+</td>
546
+</tr>
547
+
548
+<tr>
549
+  <td>
550
+    2006 Feb 15
551
+  </td>
552
+  <td>
553
+    Network Secure</td>
554
+    <td><a href="http://www.network-secure.de/index.php?option=com_content&amp;task=view&amp;id=3909">
555
+    Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br/>
556
+  </td>
557
+</tr>
558
+
559
+<tr style="background-color: #e5e5e5;">
560
+  <td>
561
+    2006 Feb 13
562
+  </td>
563
+  <td>
564
+    Wall Street Journal</td>
565
+<td>    <a href="http://online.wsj.com/article/SB113979965346572150.html">
566
+    Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br/>
567
+    Full article text can also be found
568
+    <a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.
569
+  </td>
570
+</tr>
571
+
572
+<tr>
573
+  <td>
574
+    2006 Jan 31
575
+  </td>
576
+  <td>
577
+    Technology Review</td>
578
+<td>    <a href="http://www.technologyreview.com/Infotech/16216/page2/">
579
+    Evading the Google Eye</a><br/>
580
+  </td>
581
+</tr>
582
+
583
+<tr style="background-color: #e5e5e5;">
584
+  <td>
585
+    2006 Jan 29
586
+  </td>
587
+  <td>
588
+    New York Times</td>
589
+<td>    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
590
+    How to Outwit the World's Internet Censors</a><br/>
591
+  </td>
592
+</tr>
593
+
594
+<tr>
595
+  <td>
596
+    2006 Jan 23
597
+  </td>
598
+  <td>
599
+    NPR Talk of the Nation</td>
600
+<td>    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
601
+    Search Engines and Privacy Rights on the Web</a><br/>
602
+    <a href="http://xeni.net/">Xeni Jardin</a>
603
+    recommends Tor at 33:30 into the program.
604
+  </td>
605
+</tr>
606
+
607
+<tr style="background-color: #e5e5e5;">
608
+  <td>
609
+    2006 Feb 15
610
+  </td>
611
+  <td>
612
+    Punto Informatico</td>
613
+<td>    <a href="http://punto-informatico.it/p.aspx?i=1430903">
614
+    TOR c'è</a> (Italian)<br/>
615
+  </td>
616
+</tr>
617
+
618
+<tr>
619
+  <td>
620
+    2006 Jan 20
621
+  </td>
622
+  <td>
623
+    Wired</td>
624
+<td>    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
625
+    How to Foil Search Engine Snoops</a><br/>
626
+  </td>
627
+</tr>
628
+
629
+<tr style="background-color: #e5e5e5;">
630
+  <td>
631
+    2006 Jan 20
632
+  </td>
633
+  <td>
634
+    NPR</td>
635
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
636
+    Google Records Subpoena Raises Privacy Fears</a><br/>
637
+  </td>
638
+</tr>
639
+
640
+<tr>
641
+  <td>
642
+    2005 Sep 30
643
+  </td>
644
+  <td>
645
+    Viva o Linux</td>
646
+   <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
647
+    TOR: A Internet sem rastreabilidade</a> (Portuguese)<br/>
648
+  </td>
649
+</tr>
650
+
651
+<tr style="background-color: #e5e5e5;">
652
+  <td>
653
+    2005 Jul 12
654
+  </td>
655
+  <td>
656
+    IEEE Computer Society's Technical Committee on Security and Privacy</td>
657
+<td>    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
658
+    Onion routing application Tor makes PCWorld's top 100</a><br/>
659
+  </td>
660
+</tr>
661
+
662
+<tr>
663
+  <td>
664
+    2005 Jun 22
665
+  </td>
666
+  <td>
667
+    The Unofficial Apple Blog</td>
668
+<td>    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
669
+    Privacy Watch: Tor</a><br/>
670
+  </td>
671
+</tr>
672
+
673
+<tr style="background-color: #e5e5e5;">
674
+  <td>
675
+    2005 Jun 10
676
+  </td>
677
+  <td>
678
+    The New Zealand Herald</td>
679
+<td>    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=10329896">
680
+    China's internet censorship stranglehold can't last</a><br/>
681
+  </td>
682
+</tr>
683
+
684
+<tr>
685
+  <td>
686
+    2005 Jun 8
687
+  </td>
688
+  <td>
689
+    American Public Radio</td>
690
+<td>    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
691
+    An Internet privacy tool called "Tor"</a><br/>
692
+  </td>
693
+</tr>
694
+
695
+<tr style="background-color: #e5e5e5;">
696
+  <td>
697
+    2005 Jun 1
698
+  </td>
699
+  <td>
700
+    PC World</td>
701
+<td>    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
702
+    The 100 Best Products of 2005</a><br/>
703
+    Tor is ranked #40 on the list.
704
+  </td>
705
+</tr>
706
+
707
+<tr>
708
+  <td>
709
+    2005 Jun 1
710
+  </td>
711
+  <td>
712
+    Linux Weekly News</td>
713
+<td>    <a href="http://lwn.net/Articles/138242/">
714
+    A Look at The Onion Router (Tor)</a><br/>
715
+  </td>
716
+</tr>
717
+
718
+<tr style="background-color: #e5e5e5;">
719
+  <td>
720
+    2005 May 22
721
+  </td>
722
+  <td>
723
+    Slashdot</td>
724
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
725
+     Tor Anonymity Network Reaches 100 Verified Nodes</a><br/>
726
+  </td>
727
+</tr>
728
+
729
+<tr>
730
+  <td>
731
+    2005 May 20
732
+  </td>
733
+  <td>
734
+    Security.uz</td>
735
+<td>    <a href="http://security.uz/news/default.asp?id=10541">
736
+    Tor - мощный анонимайзер для всех ОС</a> (Russian)<br/>
737
+  </td>
738
+</tr>
739
+
740
+<tr style="background-color: #e5e5e5;">
741
+  <td>
742
+    2005 May 19
743
+  </td>
744
+  <td>
745
+    WebPlanet</td>
746
+<td>    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
747
+    Tor: распределенная система анонимного серфинга</a> (Russian)<br/>
748
+  </td>
749
+</tr>
750
+
751
+<tr>
752
+  <td>
753
+    2005 May 17
754
+  </td>
755
+  <td>
756
+    Wired</td>
757
+<td>    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
758
+    Tor Torches Online Tracking</a><br/>
759
+    Also available in
760
+    <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.
761
+  </td>
762
+</tr>
763
+
764
+<tr style="background-color: #e5e5e5;">
765
+  <td>
766
+    2005 May 17
767
+  </td>
768
+  <td>
769
+    XBiz</td>
770
+<td>    <a href="http://xbiz.com/news/8761">
771
+    Navy Project Allows Anonymous Browsing</a><br/>
772
+  </td>
773
+</tr>
774
+
775
+<tr>
776
+  <td>
777
+    2005 Apr 13
778
+  </td>
779
+  <td>
780
+    Heise online</td>
781
+<td>    <a href="http://www.heise.de/newsticker/meldung/58506">
782
+    CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br/>
783
+  </td>
784
+</tr>
785
+
786
+<tr style="background-color: #e5e5e5;">
787
+  <td>
788
+    2005 Apr 5
789
+  </td>
790
+  <td>
791
+    Libero</td>
792
+<td>    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
793
+    Anonimato on line, ecco Tor</a> (Italian)<br/>
794
+  </td>
795
+</tr>
796
+
797
+<tr>
798
+  <td>
799
+    2005 Jan 4
800
+  </td>
801
+  <td>
802
+    Internetnews</td>
803
+<td>    <a href="http://www.internetnews.com/dev-news/article.php/3454521">
804
+    EFF Throws Support to 'Anonymous' Internet Project</a><br/>
805
+  </td>
806
+</tr>
807
+
808
+<tr style="background-color: #e5e5e5;">
809
+  <td>
810
+    2005 Mar 31
811
+  </td>
812
+  <td>
813
+    Linux.com</td>
814
+<td>    <a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78">
815
+    Securing your online privacy with Tor</a><br/>
816
+  </td>
817
+</tr>
818
+
819
+<tr>
820
+  <td>
821
+    2004 Dec 27
822
+  </td>
823
+  <td>
824
+    BoingBoing</td>
825
+<td>    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
826
+    EFF helping produce anonymizing software</a><br/>
827
+  </td>
828
+</tr>
829
+
830
+<tr style="background-color: #e5e5e5;">
831
+  <td>
832
+    2004 Dec 25
833
+  </td>
834
+  <td>
835
+    Kansas City infozine</td>
836
+<td>    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
837
+    EFF Joins Forces with Tor Software Project</a><br/>
838
+  </td>
839
+</tr>
840
+
841
+<tr>
842
+  <td>
843
+    2004 Dec 23
844
+  </td>
845
+  <td>
846
+    golem.de</td>
847
+<td>    <a href="http://www.golem.de/0412/35340.html">
848
+    EFF unterstützt Anonymisierer Tor</a> (German)<br/>
849
+  </td>
850
+</tr>
851
+
852
+<tr style="background-color: #e5e5e5;">
853
+  <td>
854
+    2004 Dec 23
855
+  </td>
856
+  <td>
857
+    SuicideGirls</td>
858
+<td>    <a href="http://suicidegirls.com/news/technology/6150/">
859
+    New Routing Software Allows Anonymous Internet Use</a><br/>
860
+  </td>
861
+</tr>
862
+
863
+<tr>
864
+  <td>
865
+    2004 Dec 18
866
+  </td>
867
+  <td>
868
+    P2Pnet</td>
869
+<td>    <a href="http://p2pnet.net/story/3357">
870
+    EFF to sponsor Tor</a><br/>
871
+  </td>
872
+</tr>
873
+
874
+<tr style="background-color: #e5e5e5;">
875
+  <td>
876
+    2004 Dec 22
877
+  </td>
878
+  <td>
879
+    Slashdot</td>
880
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95&amp;tid=158&amp;tid=153&amp;tid=17">
881
+     EFF Promotes Freenet-like System Tor</a><br/>
882
+  </td>
883
+</tr>
884
+
885
+<tr>
886
+  <td>
887
+    2004 Nov 16
888
+  </td>
889
+  <td>
890
+    AlterNet</td>
891
+<td>    <a href="http://www.alternet.org/columnists/story/20523/">
892
+    Heavy Traffic</a><br/>
893
+  </td>
894
+</tr>
895
+
896
+<tr style="background-color: #e5e5e5;">
897
+  <td>
898
+    2004 Aug 30
899
+  </td>
900
+  <td>
901
+    Newsweek</td>
902
+<td>    Technology: Instant Security (no link)<br/>
903
+  </td>
904
+</tr>
905
+
906
+<tr>
907
+  <td>
908
+    2004 Aug 16
909
+  </td>
910
+  <td>
911
+    Eweek</td>
912
+<td>    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
913
+    Don't Fear Internet Anonymity Tools</a><br/>
914
+  </td>
915
+</tr>
916
+
917
+<tr style="background-color: #e5e5e5;">
918
+  <td>
919
+    2004 Aug 6
920
+  </td>
921
+  <td>
922
+    HCC magazine</td>
923
+<td>    <a href="http://www.hcc.nl/eCache/DEF/21/083.html">
924
+    Anoniem surfen met hulp van marine VS</a> (Dutch)<br/>
925
+  </td>
926
+</tr>
927
+
928
+<tr>
929
+  <td>
930
+    2004 Aug 6
931
+  </td>
932
+  <td>
933
+    Golem</td>
934
+<td>    <a href="http://www.golem.de/0408/32835.html">
935
+    Tor: Anonymisierer nutzt Onion-Routing</a><br/>
936
+  </td>
937
+</tr>
938
+
939
+<tr style="background-color: #e5e5e5;">
940
+  <td>
941
+    2004 Aug 5
942
+  </td>
943
+  <td>
944
+    Network World Security</td>
945
+<td>    <a href="http://www.networkworld.com/details/7088.html">
946
+    Onion routing</a><br/>
947
+  </td>
948
+</tr>
949
+
950
+<tr>
951
+  <td>
952
+    2004 May 8
953
+  </td>
954
+  <td>
955
+    Wired</td>
956
+<td>    <a href="http://www.wired.com/politics/security/news/2004/08/64464">
957
+    Onion Routing Averts Prying Eyes</a><br/>
958
+    Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.
959
+  </td>
960
+</tr>
961
+
962
+<tr style="background-color: #e5e5e5;">
963
+  <td>
964
+    2004 Mar 8
965
+  </td>
966
+  <td>
967
+    CNET Japan blog</td>
968
+<td>    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
969
+    Yearning of hackers and insecurity</a> (Japanese)<br/>
970
+  </td>
971
+</tr>
972
+
973
+<tr>
974
+  <td>
975
+    1999 Apr 13
976
+  </td>
977
+  <td>
978
+    Wired</td>
979
+<td>    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
980
+    Anonymous Web Surfing? Uh-Uh</a><br/>
981
+  </td>
982
+</tr>
983
+
984
+</table>
985
+
986
+</div>
987
+
17 988
   <!-- END MAINCOL -->
18 989
   <div id = "sidecol">
19 990
 #include "side.wmi"
20 991
deleted file mode 100644
... ...
@@ -1,47 +0,0 @@
1
-## translation metadata
2
-# Revision: $Revision: 22070 $
3
-# Translation-Priority: 3-low
4
-
5
-#include "head.wmi" TITLE="Tor Project: Press Page"
6
-<div id="content" class="clearfix">
7
-  <div id="breadcrumbs">
8
-    <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page press/press>">Press</a>
10
-  </div> 
11
-  <div id="maincol">
12
-    <!-- PUT CONTENT AFTER THIS TAG -->
13
-    <h1>Latest Announcements</h1>
14
-    <table class="topforty">
15
-      <tr>
16
-        <td class="beige">
17
-          <div class="name">Title of Press Release</div>
18
-          <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer semper justo mattis.</p>
19
-          <div class="right"><a href="<page projects/tordnsel>">Read more &raquo;</a></div>
20
-        </td>  
21
-      </tr>
22
-      <tr>
23
-        <td>
24
-          <div class="name">Title of Press Release</div>
25
-          <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer semper justo mattis.</p>
26
-          <div class="right"><a href="<page projects/tordnsel>">Read more &raquo;</a></div>
27
-        </td>
28
-      </tr>
29
-      <tr>
30
-        <td class="beige">
31
-          <div class="name">Title of Press Release</div>
32
-          <p>Lorem ipsum dolor sit amet, consectetur adipiscing elit. Integer semper justo mattis.</p>
33
-          <div class="right"><a href="<page projects/tordnsel>">Read more &raquo;</a></div>
34
-        </td> 
35
-      </tr>
36
-    </table>
37
-    <h2><div class="left"><a href="<page projects/tordnsel>">&laquo; Archive</a></div></h2>
38
-  </div>
39
-  <!-- END MAINCOL -->
40
-  <div id = "sidecol">
41
-#include "side.wmi"
42
-#include "info.wmi"
43
-  </div>
44
-  <!-- END SIDECOL -->
45
-</div>
46
-<!-- END CONTENT -->
47
-#include <foot.wmi> 
48 0
deleted file mode 100644
... ...
@@ -1,55 +0,0 @@
1
-## translation metadata
2
-# Revision: $Revision: 22070 $
3
-# Translation-Priority: 3-low
4
-
5
-#include "head.wmi" TITLE="Tor Project: Press Releases"
6
-<div id="content" class="clearfix">
7
-  <div id="breadcrumbs">
8
-    <a href="<page index>">Home &raquo; </a>
9
-    <a href="<page press/press>">Press &raquo; </a>
10
-    <a href="<page press/pressreleases>">Press Releases</a>
11
-  </div>
12
-  <div id="maincol">
13
-    <!-- PUT CONTENT AFTER THIS TAG -->
14
-    
15
-    <h1>Press Releases</h1>
16
-    <table class="topforty">
17
-    <tr>
18
-    <td class="beige">
19
-    <div class="name">Tor and Printfection launch</div>
20
-    <p>
21
-    WALPOLE, MA The Tor Project and Printfection launch The Tor Store for all your Tor fan needs. The Tor Store offers a range of t-shirts for men and women, mugs, and sweatshirts emblazed with everyones favorite techno-onion logo. 
22
-    </p>
23
-    <div class="right"><a href="<page press/2010-03-25-tor-store-press-release>">Read more &raquo;</a></div>
24
-    </td>  
25
-    </tr>
26
-    <tr>
27
-    <td>
28
-    <div class="name">Tor launches a performance roadmap and campaign</div>
29
-    <p>
30
-    DEDHAM, MA -The Tor Project has launched a roadmap for dramatically improving the performance of the public Tor network over the next year. A combination of existing funding and a needed $1 million over the next 12 months will ensure success
31
-    </p>
32
-    <div class="right"><a href="<page press/2009-03-12-performance-roadmap-press-release>">Read more &raquo;</a></div>
33
-    </td>
34
-    </tr>
35
-    <tr>
36
-    <td class="beige">
37
-    <div class="name">Tor announces 3-year development roadmap</div>
38
-    <p>
39
-    DEDHAM, MA - The Tor Project has published its three year development roadmap, focused on providing anti-censorship tools and services for the advancement of Internet freedom in closed societies.
40
-    </p>
41
-    <div class="right"><a href="<page press/2008-12-19-roadmap-press-release>">Read more &raquo;</a></div>
42
-    </td> 
43
-    </tr>
44
-    </table>
45
-    <h2><div class="left"><a href="<page press/pressreleases>">&laquo; Archive</a></div></h2> 
46
-  </div>
47
-  <!-- END MAINCOL -->
48
-  <div id = "sidecol">
49
-#include "side.wmi"
50
-#include "info.wmi"
51
-  </div>
52
-  <!-- END SIDECOL -->
53
-</div>
54
-<!-- END CONTENT -->
55
-#include <foot.wmi>    
... ...
@@ -19,16 +19,13 @@
19 19
 <:
20 20
   my $sidenav;
21 21
   $sidenav = [
22
-      {'url'  => 'press/press',
23
-       'txt'  => 'Announcements',
24
-      },
25
-      {'url'  => 'press/pressreleases',
22
+      {'url'  => 'press/',
26 23
        'txt'  => 'Press Releases',
27 24
       }, 
28 25
       {'url'  => 'press/inthemedia',
29 26
        'txt'  => 'Tor in the Media',
30 27
       }, 
31
-      {'url'  => 'https://blog.torproject.org',
28
+      {'url'  => 'https://blog.torproject.org/',
32 29
        'txt'  => 'Tor Blog',
33 30
       }, 
34 31
   ];