Andrew Lewman commited on 2014-05-16 03:44:13
Zeige 1 geänderte Dateien mit 126 Einfügungen und 1 Löschungen.
| ... | ... |
@@ -25,13 +25,138 @@ newest to oldest: </p> |
| 25 | 25 |
|
| 26 | 26 |
<table width="100%" cellpadding="3" cellspacing="0"> |
| 27 | 27 |
|
| 28 |
-<thead style=""> |
|
| 28 |
+<thead style="background-color: #e5e5e5;"> |
|
| 29 | 29 |
<tr> |
| 30 | 30 |
<th width="15%">Date</th> |
| 31 | 31 |
<th width="15%">Publication</th> |
| 32 | 32 |
<th>Topic</th> |
| 33 | 33 |
</tr> |
| 34 | 34 |
</thead> |
| 35 |
+<tr style=""> |
|
| 36 |
+<td>2014 May 9</td> |
|
| 37 |
+<td>Vice</td> |
|
| 38 |
+<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td> |
|
| 39 |
+</tr> |
|
| 40 |
+<tr style="background-color: #e5e5e5;"> |
|
| 41 |
+<td>2014 May 7</td> |
|
| 42 |
+<td>BoingBoing</td> |
|
| 43 |
+<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">Tor: network security for domestic abuse survivors</a></td> |
|
| 44 |
+</tr> |
|
| 45 |
+<tr style=""> |
|
| 46 |
+<td>2014 May 7</td> |
|
| 47 |
+<td>BetaBoston</td> |
|
| 48 |
+<td><a href="http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/">As domestic abuse goes digital, shelters turn to counter-survellience with Tor</a></td> |
|
| 49 |
+</tr> |
|
| 50 |
+<tr style="background-color: #e5e5e5;"> |
|
| 51 |
+<td>2014 May</td> |
|
| 52 |
+<td>Boston Magazine</td> |
|
| 53 |
+<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">The Power of Ideas</a></td> |
|
| 54 |
+</tr> |
|
| 55 |
+<tr style=""> |
|
| 56 |
+<td>2014 Apr 29</td> |
|
| 57 |
+<td>ThinkProgress</td> |
|
| 58 |
+<td><a href="http://thinkprogress.org/culture/2014/04/29/3432050/can-you-hide-from-big-data/">Meet the Woman Who did Everything in Her Power to Hide Her Pregnancy From Google</a></td> |
|
| 59 |
+</tr> |
|
| 60 |
+<tr style="background-color: #e5e5e5;"> |
|
| 61 |
+<td>2014 Mar 26</td> |
|
| 62 |
+<td>IT News Africa</td> |
|
| 63 |
+<td><a href="http://www.itnewsafrica.com/2014/03/hidden-internet-growing-rapidly/">“Hidden” internet growing rapidly</a></td> |
|
| 64 |
+</tr> |
|
| 65 |
+<tr style=""> |
|
| 66 |
+<td>2014 Mar 25</td> |
|
| 67 |
+<td>Westmoreland Times</td> |
|
| 68 |
+<td><a href="http://westmorelandtimes.com/news/11611/25/how-to-mask-your-location-internet-privacy-tools/">Masking your location on the internet with privacy tools</a></td> |
|
| 69 |
+</tr> |
|
| 70 |
+<tr style="background-color: #e5e5e5;"> |
|
| 71 |
+<td>2014 Mar 24</td> |
|
| 72 |
+<td>BoingBoing</td> |
|
| 73 |
+<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">Turkey orders block of Twitter's IP addresses</a></td> |
|
| 74 |
+</tr> |
|
| 75 |
+<tr style=""> |
|
| 76 |
+<td>2014 Mar 24</td> |
|
| 77 |
+<td>Telegraph.co.uk</td> |
|
| 78 |
+<td><a href="http://blogs.telegraph.co.uk/technology/willardfoxton2/100012913/dozens-of-firms-are-invisibly-tracking-you-online-heres-how-to-hide-from-them/">Dozens of firms are invisibly tracking you online. Here's how to hide from them</a></td> |
|
| 79 |
+</tr> |
|
| 80 |
+<tr style="background-color: #e5e5e5;"> |
|
| 81 |
+<td>2014 Mar 24</td> |
|
| 82 |
+<td>Washington Post</td> |
|
| 83 |
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">The Switchboard: Turkey's Twitter ban gets tougher</a></td> |
|
| 84 |
+</tr> |
|
| 85 |
+<tr style=""> |
|
| 86 |
+<td>2014 Mar 23</td> |
|
| 87 |
+<td>Ars Technica</td> |
|
| 88 |
+<td><a href="http://arstechnica.com/tech-policy/2014/03/after-dns-change-fails-turkish-government-steps-up-twitter-censorship/">After DNS change fails, Turkish government steps up Twitter censorship</a></td> |
|
| 89 |
+</tr> |
|
| 90 |
+<tr style="background-color: #e5e5e5;"> |
|
| 91 |
+<td>2014 Mar 23</td> |
|
| 92 |
+<td>CSO</td> |
|
| 93 |
+<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">Turkey, Twitter & Censorship: VPN, Tor and more</a></td> |
|
| 94 |
+</tr> |
|
| 95 |
+<tr style=""> |
|
| 96 |
+<td>2014 Mar 20</td> |
|
| 97 |
+<td>Threat Post</td> |
|
| 98 |
+<td><a href="http://threatpost.com/malicious-ios-tor-browser-in-apple-app-store/104911">Malicious iOS Tor Browswer in Apple App Store</a></td> |
|
| 99 |
+</tr> |
|
| 100 |
+<tr style="background-color: #e5e5e5;"> |
|
| 101 |
+<td>2014 Mar 20</td> |
|
| 102 |
+<td>PC World</td> |
|
| 103 |
+<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td> |
|
| 104 |
+</tr> |
|
| 105 |
+<tr style=""> |
|
| 106 |
+<td>2014 Mar 10</td> |
|
| 107 |
+<td>USA Today</td> |
|
| 108 |
+<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">Four questions about Tor</a></td> |
|
| 109 |
+</tr> |
|
| 110 |
+<tr style="background-color: #e5e5e5;"> |
|
| 111 |
+<td>2014 Mar 3</td> |
|
| 112 |
+<td>Computerworld</td> |
|
| 113 |
+<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">The paranoid's survival guide, part 1: How to protect your personal data</a></td> |
|
| 114 |
+</tr> |
|
| 115 |
+<tr style=""> |
|
| 116 |
+<td>2014 Feb 21</td> |
|
| 117 |
+<td>Lifehacker</td> |
|
| 118 |
+<td><a href="http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029">What Is Tor and Should I Use It?</a></td> |
|
| 119 |
+</tr> |
|
| 120 |
+<tr style="background-color: #e5e5e5;"> |
|
| 121 |
+<td>2014 Feb 20</td> |
|
| 122 |
+<td>Watchdog.org</td> |
|
| 123 |
+<td><a href="http://watchdog.org/129349/securedrop-deep-throat/">Are you ready to be Deep Throat?</a></td> |
|
| 124 |
+</tr> |
|
| 125 |
+<tr style=""> |
|
| 126 |
+<td>2014 Feb 19</td> |
|
| 127 |
+<td>Daily Illini</td> |
|
| 128 |
+<td><a href="http://www.dailyillini.com/news/article_407e25da-9909-11e3-8f33-0017a43b2370.html">Security technology to help students in future careers</a></td> |
|
| 129 |
+</tr> |
|
| 130 |
+<tr style="background-color: #e5e5e5;"> |
|
| 131 |
+<td>2014 Feb 19</td> |
|
| 132 |
+<td>Nature World News</td> |
|
| 133 |
+<td><a href="http://www.natureworldnews.com/articles/6098/20140219/wildleaks-new-service-allows-anonymous-whistleblowers-report-wildlife-crime.htm">WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime</a></td> |
|
| 134 |
+</tr> |
|
| 135 |
+<tr style=""> |
|
| 136 |
+<td>2014 Feb 6</td> |
|
| 137 |
+<td>Help Net Security</td> |
|
| 138 |
+<td><a href="http://www.net-security.org/secworld.php?id=16323">HTTPS Everywhere add-on now available for Firefox on Android</a></td> |
|
| 139 |
+</tr> |
|
| 140 |
+<tr style="background-color: #e5e5e5;"> |
|
| 141 |
+<td>2014 Feb 5</td> |
|
| 142 |
+<td>OEN</td> |
|
| 143 |
+<td><a href="http://www.opednews.com/articles/HTTPS-Everywhere-More-se-by-John-Moffett-Communication_Internet_Surveillance-140205-843.html">"HTTPS Everywhere" More secure browsing courtesy of the EFF and Tor</a></td> |
|
| 144 |
+</tr> |
|
| 145 |
+<tr style=""> |
|
| 146 |
+<td>2014 Feb 4</td> |
|
| 147 |
+<td>Popular Mechanics</td> |
|
| 148 |
+<td><a href="http://www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529">7 Ways to Reclaim Your Digital Privacy</a></td> |
|
| 149 |
+</tr> |
|
| 150 |
+<tr style="background-color: #e5e5e5;"> |
|
| 151 |
+<td>2014 Feb 3</td> |
|
| 152 |
+<td>IBTimes</td> |
|
| 153 |
+<td><a href="http://www.ibtimes.co.uk/avoiding-sochi-snoopers-using-tor-common-sense-nail-polish-prevent-russian-authorities-spying-1434938">Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russian Authorities Spying on Journalists</a></td> |
|
| 154 |
+</tr> |
|
| 155 |
+<tr style=""> |
|
| 156 |
+<td>2014 Feb</td> |
|
| 157 |
+<td>TechTarget</td> |
|
| 158 |
+<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">Tor networks: Stop employees from touring the deep web</a></td> |
|
| 159 |
+</tr> |
|
| 35 | 160 |
<tr style="background-color: #e5e5e5;"> |
| 36 | 161 |
<td>2014 Jan 23</td> |
| 37 | 162 |
<td>BusinessWeek</td> |
| 38 | 163 |