Browse code

add patch from ticket 12022.

Andrew Lewman authored on16/05/2014 03:44:13
Showing1 changed files
... ...
@@ -25,13 +25,138 @@ newest to oldest: </p>
25 25
 
26 26
 <table width="100%" cellpadding="3" cellspacing="0">
27 27
 
28
-<thead style="">
28
+<thead style="background-color: #e5e5e5;">
29 29
 <tr>
30 30
 <th width="15%">Date</th>
31 31
 <th width="15%">Publication</th>
32 32
 <th>Topic</th>
33 33
 </tr>
34 34
 </thead>
35
+<tr style="">
36
+<td>2014 May 9</td>
37
+<td>Vice</td>
38
+<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
39
+</tr>
40
+<tr style="background-color: #e5e5e5;">
41
+<td>2014 May 7</td>
42
+<td>BoingBoing</td>
43
+<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">Tor: network security for domestic abuse survivors</a></td>
44
+</tr>
45
+<tr style="">
46
+<td>2014 May 7</td>
47
+<td>BetaBoston</td>
48
+<td><a href="http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/">As domestic abuse goes digital, shelters turn to counter-survellience with Tor</a></td>
49
+</tr>
50
+<tr style="background-color: #e5e5e5;">
51
+<td>2014 May</td>
52
+<td>Boston Magazine</td>
53
+<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">The Power of Ideas</a></td>
54
+</tr>
55
+<tr style="">
56
+<td>2014 Apr 29</td>
57
+<td>ThinkProgress</td>
58
+<td><a href="http://thinkprogress.org/culture/2014/04/29/3432050/can-you-hide-from-big-data/">Meet the Woman Who did Everything in Her Power to Hide Her Pregnancy From Google</a></td>
59
+</tr>
60
+<tr style="background-color: #e5e5e5;">
61
+<td>2014 Mar 26</td>
62
+<td>IT News Africa</td>
63
+<td><a href="http://www.itnewsafrica.com/2014/03/hidden-internet-growing-rapidly/">“Hidden” internet growing rapidly</a></td>
64
+</tr>
65
+<tr style="">
66
+<td>2014 Mar 25</td>
67
+<td>Westmoreland Times</td>
68
+<td><a href="http://westmorelandtimes.com/news/11611/25/how-to-mask-your-location-internet-privacy-tools/">Masking your location on the internet with privacy tools</a></td>
69
+</tr>
70
+<tr style="background-color: #e5e5e5;">
71
+<td>2014 Mar 24</td>
72
+<td>BoingBoing</td>
73
+<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">Turkey orders block of Twitter's IP addresses</a></td>
74
+</tr>
75
+<tr style="">
76
+<td>2014 Mar 24</td>
77
+<td>Telegraph.co.uk</td>
78
+<td><a href="http://blogs.telegraph.co.uk/technology/willardfoxton2/100012913/dozens-of-firms-are-invisibly-tracking-you-online-heres-how-to-hide-from-them/">Dozens of firms are invisibly tracking you online. Here's how to hide from them</a></td>
79
+</tr>
80
+<tr style="background-color: #e5e5e5;">
81
+<td>2014 Mar 24</td>
82
+<td>Washington Post</td>
83
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">The Switchboard: Turkey's Twitter ban gets tougher</a></td>
84
+</tr>
85
+<tr style="">
86
+<td>2014 Mar 23</td>
87
+<td>Ars Technica</td>
88
+<td><a href="http://arstechnica.com/tech-policy/2014/03/after-dns-change-fails-turkish-government-steps-up-twitter-censorship/">After DNS change fails, Turkish government steps up Twitter censorship</a></td>
89
+</tr>
90
+<tr style="background-color: #e5e5e5;">
91
+<td>2014 Mar 23</td>
92
+<td>CSO</td>
93
+<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
94
+</tr>
95
+<tr style="">
96
+<td>2014 Mar 20</td>
97
+<td>Threat Post</td>
98
+<td><a href="http://threatpost.com/malicious-ios-tor-browser-in-apple-app-store/104911">Malicious iOS Tor Browswer in Apple App Store</a></td>
99
+</tr>
100
+<tr style="background-color: #e5e5e5;">
101
+<td>2014 Mar 20</td>
102
+<td>PC World</td>
103
+<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
104
+</tr>
105
+<tr style="">
106
+<td>2014 Mar 10</td>
107
+<td>USA Today</td>
108
+<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">Four questions about Tor</a></td>
109
+</tr>
110
+<tr style="background-color: #e5e5e5;">
111
+<td>2014 Mar 3</td>
112
+<td>Computerworld</td>
113
+<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">The paranoid's survival guide, part 1: How to protect your personal data</a></td>
114
+</tr>
115
+<tr style="">
116
+<td>2014 Feb 21</td>
117
+<td>Lifehacker</td>
118
+<td><a href="http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029">What Is Tor and Should I Use It?</a></td>
119
+</tr>
120
+<tr style="background-color: #e5e5e5;">
121
+<td>2014 Feb 20</td>
122
+<td>Watchdog.org</td>
123
+<td><a href="http://watchdog.org/129349/securedrop-deep-throat/">Are you ready to be Deep Throat?</a></td>
124
+</tr>
125
+<tr style="">
126
+<td>2014 Feb 19</td>
127
+<td>Daily Illini</td>
128
+<td><a href="http://www.dailyillini.com/news/article_407e25da-9909-11e3-8f33-0017a43b2370.html">Security technology to help students in future careers</a></td>
129
+</tr>
130
+<tr style="background-color: #e5e5e5;">
131
+<td>2014 Feb 19</td>
132
+<td>Nature World News</td>
133
+<td><a href="http://www.natureworldnews.com/articles/6098/20140219/wildleaks-new-service-allows-anonymous-whistleblowers-report-wildlife-crime.htm">WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime</a></td>
134
+</tr>
135
+<tr style="">
136
+<td>2014 Feb 6</td>
137
+<td>Help Net Security</td>
138
+<td><a href="http://www.net-security.org/secworld.php?id=16323">HTTPS Everywhere add-on now available for Firefox on Android</a></td>
139
+</tr>
140
+<tr style="background-color: #e5e5e5;">
141
+<td>2014 Feb 5</td>
142
+<td>OEN</td>
143
+<td><a href="http://www.opednews.com/articles/HTTPS-Everywhere-More-se-by-John-Moffett-Communication_Internet_Surveillance-140205-843.html">"HTTPS Everywhere" More secure browsing courtesy of the EFF and Tor</a></td>
144
+</tr>
145
+<tr style="">
146
+<td>2014 Feb 4</td>
147
+<td>Popular Mechanics</td>
148
+<td><a href="http://www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529">7 Ways to Reclaim Your Digital Privacy</a></td>
149
+</tr>
150
+<tr style="background-color: #e5e5e5;">
151
+<td>2014 Feb 3</td>
152
+<td>IBTimes</td>
153
+<td><a href="http://www.ibtimes.co.uk/avoiding-sochi-snoopers-using-tor-common-sense-nail-polish-prevent-russian-authorities-spying-1434938">Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russian Authorities Spying on Journalists</a></td>
154
+</tr>
155
+<tr style="">
156
+<td>2014 Feb</td>
157
+<td>TechTarget</td>
158
+<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">Tor networks: Stop employees from touring the deep web</a></td>
159
+</tr>
35 160
 <tr style="background-color: #e5e5e5;">
36 161
 <td>2014 Jan 23</td>
37 162
 <td>BusinessWeek</td>