Browse code

revamp the press page to put all of our press onto one page for quick viewing. based on feedback from two reporters.

Andrew Lewman authored on27/11/2012 04:35:36
Showing3 changed files
... ...
@@ -265,6 +265,13 @@ Sight.aspx">Hidden in Plain Sight</a></td>
265 265
 <td>Ars Technica</td>
266 266
 <td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself privacy bridge in Amazon cloud</a></td>
267 267
 </tr>
268
+<tr>
269
+<td>2011 Aug 28</td>
270
+<td>The Tor Project</td>
271
+<td>The Tor Project announces a <a
272
+href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of
273
+the Tor software.</td>
274
+</tr>
268 275
 <tr style="background-color: #e5e5e5;">
269 276
 <td>2011 Aug 22</td>
270 277
 <td>VOA News: Asia</td>
... ...
@@ -447,6 +454,13 @@ href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-anonyma-pa-n
447 454
 Media: Interview with Jacob Appelbaum</a>.</td>
448 455
 </tr>
449 456
 <tr>
457
+<td>2010 Sept 16</td>
458
+<td>The Tor Project</td>
459
+<td>Tor announces an article discussing <a href="<page
460
+press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look
461
+for in a Circumvention Tool</a>.</td>
462
+</tr>
463
+<tr>
450 464
 <td>2010 August 01</td>
451 465
 <td>PC Format - Poland</td>
452 466
 <td><a
... ...
@@ -468,6 +482,12 @@ Ground</a></td>
468 482
 href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466">
469 483
 Call to join Tor network to fight censorship</a></td>
470 484
 </tr>
485
+<tr>
486
+<td>2010 Mar 25</td>
487
+<td>The Tor Project</td>
488
+<td>Tor and Printfection launch <a href="<page
489
+press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td>
490
+</tr>
471 491
 <tr style="background-color: #e5e5e5;">
472 492
 <td>2010 Mar 17</td>
473 493
 <td>PC World Poland</td>
... ...
@@ -664,6 +684,13 @@ href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-im
664 684
 href="http://online.wsj.com/article/SB123567809587886053.html">The
665 685
 Kindness of Strangers</a></td>
666 686
 </tr>
687
+<tr>
688
+<td>2009 Mar 12</td>
689
+<td>The Tor Project</td>
690
+<td>Tor launches a <a href="<page
691
+press/2009-03-12-performance-roadmap-press-release>">performance
692
+roadmap</a> and campaign.</td>
693
+</tr>
667 694
 <tr style="background-color: #e5e5e5;">
668 695
 <td>2009 Mar 12</td>
669 696
 <td>BBC World Service</td>
... ...
@@ -692,6 +719,12 @@ href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-
692 719
 <td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td>
693 720
 </tr>
694 721
 <tr>
722
+<tr>
723
+<td>2008 Dec 19</td>
724
+<td>The Tor Project</td>
725
+<td>Tor announces 3-year <a href="<page
726
+press/2008-12-19-roadmap-press-release>">development roadmap</a>.</td>
727
+</tr>
695 728
 <tr style="background-color: #e5e5e5;">
696 729
 <td>2008 Dec 14</td>
697 730
 <td>PC Magazine: Middle &amp; Near East</td>
... ...
@@ -7,29 +7,9 @@
7 7
   <div id="breadcrumbs">
8 8
     <a href="<page index>">Home &raquo; </a>
9 9
     <a href="<page press/press>">Press</a>
10
-  </div> 
11
-  <div id="maincol">
10
+  </div>
11
+<div id="maincol">
12 12
     <!-- PUT CONTENT AFTER THIS TAG -->
13
-<h2>Tor Press and Media Information</h2>
14
-<div class="underline"></div>
15
-
16
-<h3>Press Releases</h3>
17
-<ul>
18
-<li>28 August 2011. The Tor Project announces a <a href="<page
19
-press/2011-08-28-tor-022-stable>">new stable release</a> of the Tor
20
-software.</li>
21
-<li>16 September 2010.  Tor announces an article discussing <a href="<page
22
-press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look
23
-for in a Circumvention Tool</a>.</li>
24
-<li>25 March 2010. Tor and Printfection launch <a href="<page
25
-press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</li>
26
-<li>12 March 2009.  Tor launches a <a href="<page
27
-press/2009-03-12-performance-roadmap-press-release>">performance
28
-roadmap</a> and campaign.</li>
29
-<li>19 December 2008.  Tor announces 3-year <a href="<page
30
-press/2008-12-19-roadmap-press-release>">development roadmap</a>.</li>
31
-</ul>
32
-<br>
33 13
 <div class="nb">
34 14
 <h3>Quick links to better understand Tor</h3>
35 15
 <ol>
... ...
@@ -39,8 +19,1542 @@ press/2008-12-19-roadmap-press-release>">development roadmap</a>.</li>
39 19
 <li><a href="<blog>circumvention-and-anonymity">Why anonymity matters for circumvention</a>.</li>
40 20
 </ol>
41 21
 </div>
22
+<h2>Tor Press and Media Information</h2>
23
+<div class="underline"></div>
24
+<h1>Media Appearances</h1>
25
+
26
+<p>Major news organizations including the New York Times, Forbes, Al
27
+Jazeera, Washington Post, Le Monde, NPR, BBC, and more have sought out
28
+or
29
+quoted Tor Project members due to their expertise on anonymity, privacy,
30
+and Internet censorship issues.</p>
31
+<p>Since Tor is widely used throughout the world, it is mentioned
32
+regularly in the press.  This list is not comprehensive, but illustrates
33
+some of the significant Tor-related stories that have popped up.</p>
34
+<p>A sample of such media appearances and mentions is below in order of
35
+newest to oldest: </p>
36
+
37
+<table width="100%" cellpadding="3" cellspacing="0">
38
+
39
+<thead style="background-color: #e5e5e5;">
40
+<tr>
41
+<th width="10%">Date</th>
42
+<th width="15%">Publication</th>
43
+<th>Topic</th>
44
+</tr>
45
+</thead>
46
+<tr>
47
+<td>2012 Nov 18</td>
48
+<td>WOUB</td>
49
+<td><a
50
+href="http://woub.org/2012/11/18/future-cyber-security">Conversations
51
+from Studio B: The Future of Cybersecurity</a></td>
52
+</tr>
53
+<tr style="background-color: #e5e5e5;">
54
+<td>2012 Oct</td>
55
+<td>Forskning &amp; Framsteg</td>
56
+<td><a
57
+href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-
58
+hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura
59
+nätcensuren</a></td>
60
+</tr>
61
+<tr>
62
+<td>2012 Oct</td>
63
+<td>Delta Airlines Sky Magazine</td>
64
+<td><a
65
+href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-
66
+Sight.aspx">Hidden in Plain Sight</a></td>
67
+</tr>
68
+<tr style="background-color: #e5e5e5;">
69
+<td>2012 Sep 19</td>
70
+<td>infoBAE</td>
71
+<td><a
72
+href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en
73
+-la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la
74
+web 100% anónimas y seguras</a></td>
75
+</td>
76
+<tr>
77
+<td>2012 Aug 24</td>
78
+<td>security.nl</td>
79
+<td><a
80
+href="https://secure.security.nl/artikel/42807/1/
81
+Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar
82
+Facebook ondanks privacyrisico</a></td>
83
+</tr>
84
+<tr style="background-color: #e5e5e5;">
85
+<td>2012 Jul 19</td>
86
+<td>Philadelphia Inquirer</td>
87
+<td><a
88
+href="http://www.philly.com/philly/business/
89
+20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life:
90
+Fostering anonymity online</a></td>
91
+</tr>
92
+<tr>
93
+<td>2012 Jul 13</td>
94
+<td>NATO</td>
95
+<td><a
96
+href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-
97
+during-the-arab-spring/">Social Media and Online Anonymity during the
98
+Arab Spring</a></td>
99
+</tr>
100
+<tr style="background-color: #e5e5e5;">
101
+<td>2012 Jun 19</td>
102
+<td>Nieman Journalism Lab</td>
103
+<td><a
104
+href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists
105
+-and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project
106
+helps journalists and whistleblowers go online without leaving a
107
+trace.</a></td>
108
+</tr>
109
+<tr>
110
+<td>2012 Jun 18</td>
111
+<td>Poynter</td>
112
+<td><a
113
+href="http://www.poynter.org/latest-news/top-stories/177642/news-
114
+challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6
115
+projects focused on networks</td>
116
+</tr>
117
+<tr style="background-color: #e5e5e5;">
118
+<td>2012 Jun 18</td>
119
+<td>Knight Foundation</td>
120
+<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight
121
+Foundation funds project to protect journalists and their sources
122
+worldwide by providing them with a toolkit to preserve their anonymity
123
+online.</td>
124
+</tr>
125
+<tr>
126
+<td>2012 Jun 15</td>
127
+<td>BBC</td>
128
+<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia
129
+clamps down on Skype and other internet use on Tor</td>
130
+</tr>
131
+<tr style="background-color: #e5e5e5;">
132
+<td>2012 Apr 30</td>
133
+<td>Forbes</td>
134
+<td><a
135
+href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-
136
+projects-new-tool-aims-to-map-out-internet-censorship/">The Tor
137
+Project's New Tool Aims To Map Out Internet Censorship</a></td>
138
+</tr>
139
+<tr>
140
+<td>2012 Apr 20</td>
141
+<td>The Guardian</td>
142
+<td><a
143
+href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-
144
+battle-internet">Hacktivists in the frontline battle for the
145
+internet</td>
146
+</tr>
147
+<tr style="background-color: #e5e5e5;">
148
+<td>2012 Apr 19</td>
149
+<td>The Guardian</td>
150
+<td><a
151
+href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-
152
+authenticity-anonymity">Online identity: is authenticity or anonymity
153
+more important?</td>
154
+</tr>
155
+<tr>
156
+<td>2012 Apr 03</td>
157
+<td>V3</td>
158
+<td><a
159
+href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover
160
+-key-chinas-tor-blocking">Swedish researchers uncover key to China's
161
+Tor-blocking system</a></td>
162
+</tr>
163
+<tr style="background-color: #e5e5e5;">
164
+<td>2012 Apr 02</td>
165
+<td>The Guardian</td>
166
+<td><a
167
+href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-
168
+warn-government-email-surveillance">Internet companies warn over
169
+government email surveillance plans</a></td>
170
+</td>
171
+<tr>
172
+<td>2012 Mar 22</td>
173
+<td>Reuters</td>
174
+<td><a
175
+href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-
176
+idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on
177
+citizens</a></td>
178
+</tr>
179
+<tr style="background-color: #e5e5e5;">
180
+<td>2012 Mar 08</td>
181
+<td>Boston Globe</td>
182
+<td><a
183
+href="http://articles.boston.com/2012-03-08/business/31136655_1_law-
184
+enforcement-free-speech-technology">Privacy software. Unintended
185
+consequences of Walpole firm's technology.</a></td>
186
+</tr>
187
+<tr>
188
+<td>2012 Mar 02</td>
189
+<td>Ars Technica</td>
190
+<td><a
191
+href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-
192
+privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">
193
+Google's new privacy policy: what has changed and what you can do about
194
+it</a></td>
195
+</tr>
196
+<tr style="background-color: #e5e5e5;">
197
+<td>2012 Mar 01</td>
198
+<td>Edmonton Journal</td>
199
+<td><a
200
+href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-
201
+with-tor/">Get your privacy on with Tor</a></td>
202
+</tr>
203
+<tr>
204
+<td>2012 Feb 28</td>
205
+<td>PC World</td>
206
+<td><a
207
+href="https://www.pcworld.com/article/250943/
208
+https_everywhere_update_now_reports_website_weaknesses.html">HTTPS
209
+Everywhere Update: Now Reports Website Weaknesses</a></td>
210
+</tr>
211
+<tr style="background-color: #e5e5e5;">
212
+<td>2012 Feb 27</td>
213
+<td>GigaOM</td>
214
+<td><a
215
+href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-
216
+balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td>
217
+</tr>
218
+<tr>
219
+<td>2012 Feb 15</td>
220
+<td>Le Monde</td>
221
+<td><a
222
+href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-
223
+outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un
224
+nouvel outil contre la cybercensure testé en Iran</a></td>
225
+</tr>
226
+<tr style="background-color: #e5e5e5;">
227
+<td>2012 Feb 13</td>
228
+<td>IDG NL webwereld</td>
229
+<td><a
230
+href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-
231
+https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td>
232
+</tr>
233
+<tr>
234
+<td>2012 Feb 13</td>
235
+<td>Ars Technica</td>
236
+<td><a
237
+href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-
238
+project-helps-iran-get-back-online-amidst-internet-censorship-regime.
239
+ars">Tor's latest project helps Iran get back online despite new
240
+Internet censorship regime</a></td>
241
+</tr>
242
+<tr style="background-color: #e5e5e5;">
243
+<td>2012 Feb 13</td>
244
+<td>Radio Farda</td>
245
+<td><a
246
+href="http://www.radiofarda.com/content/
247
+f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">
248
+«تور» با پروژه‌ای جدید به جنگ فیلترینگ در ایران می‌رود "</a></td>
249
+</td>
250
+</tr>
251
+<tr>
252
+<td>2012 Feb 11</td>
253
+<td>ITP</td>
254
+<td><a
255
+href="http://www.itp.net/587901-iran-increases-web-censorship">Iran
256
+increases web censorship</a></td>
257
+</tr>
258
+<tr style="background-color: #e5e5e5;">
259
+<td>2012 Feb 10</td>
260
+<td>CNet News</td>
261
+<td><a
262
+href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-
263
+project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project
264
+looks to help Iranians sidestep Net ban</a></td>
265
+</tr>
266
+<tr>
267
+<td>2012 Feb 10</td>
268
+<td>Linkiesta</td>
269
+<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i
270
+dissidenti in Internet, la guerra in Iran è già iniziata</a></td>
271
+</tr>
272
+<tr style="background-color: #e5e5e5;">
273
+<td>2012 Feb 10</td>
274
+<td>Forbes</td>
275
+<td><a
276
+href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-
277
+cracks-down-online-tor-tests-undetectable-encrypted-connections/">As
278
+Iran Cracks Down Online, Tor Tests Undetectable Encrypted
279
+Connections</a></td>
280
+</tr>
281
+<tr>
282
+<td>2012 Jan 24</td>
283
+<td>PC Pro UK</td>
284
+<td><a
285
+href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of-
286
+tor-censorship">O2 plays down accusations of Tor censorship</a></td>
287
+</tr>
288
+<tr style="background-color: #e5e5e5;">
289
+<td>2012 Jan 24</td>
290
+<td>Broadband Choice UK</td>
291
+<td><a
292
+href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-
293
+providers-are-blocking-tor-801273330/">ORG says mobile broadband
294
+providers are blocking Tor</a></td>
295
+</td>
296
+<tr>
297
+<td>2012 Jan 24</td>
298
+<td>PC Welt</td>
299
+<td><a
300
+href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in
301
+-neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td>
302
+</tr>
303
+<tr style="background-color: #e5e5e5;">
304
+<td>2011 Dec 30</td>
305
+<td>BNR Digital</td>
306
+<td><a
307
+href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-
308
+censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder
309
+Tor wordt gecensureerd</a></td>
310
+</tr>
311
+<tr>
312
+<td>2011 Dec 30</td>
313
+<td>Deutsche Welle</td>
314
+<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit
315
+dem Zensor Katz-und-Maus spielen</a></td>
316
+</tr>
317
+<tr style="background-color: #e5e5e5;">
318
+<td>2011 Dec 29</td>
319
+<td>Boing Boing</td>
320
+<td><a
321
+href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.
322
+html">State of the arms race between repressive governments and
323
+anti-censorship/surveillance Tor technology (and why American companies
324
+are on the repressive governments' side)</a></td>
325
+</tr>
326
+<tr>
327
+<td>2011 Dec 28</td>
328
+<td>ZDNet Asia</td>
329
+<td><a
330
+href="http://www.zdnetasia.com/tor-project-creates-safer-internet-
331
+62303332.htm">Tor Project creates safer Internet</a></td>
332
+</tr>
333
+<tr style="background-color: #e5e5e5;">
334
+<td>2011 Dec 01</td>
335
+<td>itbusiness.ca</td>
336
+<td><a
337
+href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">
338
+Convenience technology threatening personal privacy, experts
339
+say</a></td>
340
+</tr>
341
+<tr>
342
+<td>2011 Nov 21</td>
343
+<td>Spiegel Online</td>
344
+<td><a
345
+href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas
346
+Internet-Zensoren testen neue Filter</a></td>
347
+</tr>
348
+<tr style="background-color: #e5e5e5;">
349
+<td>2011 Nov 20</td>
350
+<td>China Digital Times</td>
351
+<td><a
352
+href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-
353
+tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/"
354
+>Government Blocks Encrypted Tunnels Through Great Firewall; Fang
355
+Binxing Talks Internet Sovereignty</a></td>
356
+</tr>
357
+<tr>
358
+<td>2011 Nov 23</td>
359
+<td>IT Security Belgium</td>
360
+<td><a
361
+href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-
362
+service">Tor Project is tapping Amazon’s EC2 cloud service</a></td>
363
+</tr>
364
+<tr style="background-color: #e5e5e5;">
365
+<td>2011 Nov 22</td>
366
+<td>Boing Boing</td>
367
+<td><a
368
+href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.
369
+html">Tor project asks supporters to set up virtual Tor bridges in
370
+Amazon's cloud</a></td>
371
+</tr>
372
+<tr>
373
+<td>2011 Nov 18</td>
374
+<td>Dagens IT</td>
375
+<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i
376
+den kinesiske internett-muren</a></td>
377
+</tr>
378
+<tr style="background-color: #e5e5e5;">
379
+<td>2011 Nov 16</td>
380
+<td>Forbes</td>
381
+<td><a
382
+href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-
383
+firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great
384
+Firewall Tests Mysterious Scans On Encrypted Connections</a></td>
385
+</tr>
386
+<tr>
387
+<td>2011 Nov 15</td>
388
+<td>Ars Technica</td>
389
+<td><a
390
+href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-
391
+yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself
392
+privacy bridge in Amazon cloud</a></td>
393
+</tr>
394
+<tr>
395
+<td>2011 Aug 28</td>
396
+<td>The Tor Project</td>
397
+<td>The Tor Project announces a <a
398
+href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of
399
+the Tor software.</td>
400
+</tr>
401
+<tr style="background-color: #e5e5e5;">
402
+<td>2011 Aug 22</td>
403
+<td>VOA News: Asia</td>
404
+<td><a
405
+href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-
406
+for-Now-128178623.html">Some
407
+Chinese Surf Freely, for Now</a></td>
408
+</tr>
409
+<tr>
410
+<td>2011 Aug 01</td>
411
+<td>Peace &amp; Conflict Review</td>
412
+<td><a
413
+href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor,
414
+Anonymity, and the Arab Spring: An Interview with Jacob
415
+Appelbaum</a></td>
416
+</tr>
417
+<tr style="background-color: #e5e5e5;">
418
+<td>2011 June 18</td>
419
+<td>CNN: Tech</td>
420
+<td><a
421
+href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.
422
+revolution/index.html">Starting
423
+a revolution with technology</a></td>
424
+</tr>
425
+<tr>
426
+<td>2011 June 12</td>
427
+<td>CNN: Tech</td>
428
+<td><a
429
+href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/
430
+index.html">Wiping
431
+away whistle-blowers' online fingerprints</a></td>
432
+</tr>
433
+<tr style="background-color: #e5e5e5;">
434
+<td>2011 May 14</td>
435
+<td>BBC: Click</td>
436
+<td><a
437
+href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">
438
+Andrew
439
+and Dr. Angela Sasse from UCL were interviewed by the BBC Click program
440
+about why Internet Anonymity is important and valuable in a modern,
441
+networked society.</a></td>
442
+</tr>
443
+<tr>
444
+<td>2011 March 29</td>
445
+<td>CNN: Situation Room</td>
446
+<td><a href="http://edition.cnn.com/CNN/Programs/situation.room/">Tor
447
+featured in a segment about US companies providing censorship to
448
+repressive regimes and those circumventing their products.</a></td>
449
+</tr>
450
+<tr style="background-color: #e5e5e5;">
451
+<td>2011 March 18</td>
452
+<td>Telegraph</td>
453
+<td><a
454
+href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/
455
+Iran-cracks-down-on-web-dissident-technology.html">Iran
456
+cracks down on web dissident technology</a></td>
457
+</tr>
458
+<tr>
459
+<td>2011 March 17</td>
460
+<td>BusinessWeek</td>
461
+<td><a
462
+href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.
463
+htm">Social
464
+Networking: Fighting to Remain Anonymous</a></td>
465
+</tr>
466
+<tr style="background-color: #e5e5e5;">
467
+<td>2011 March 10</td>
468
+<td>NyTeknik</td>
469
+<td><a
470
+href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.
471
+ece">Svenska
472
+biståndspengar till Facebookrevolutionen</a></td>
473
+</tr>
474
+<tr>
475
+<td>2011 March 09</td>
476
+<td>Washington Post</td>
477
+<td><a
478
+href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/
479
+AR2011030905157_pf.html">U.S.
480
+funding tech firms that help Mideast dissidents evade government
481
+censors</a></td>
482
+</tr>
483
+<tr style="background-color: #e5e5e5;">
484
+<td>2011 February 17</td>
485
+<td>Walpole Times</td>
486
+<td><a
487
+href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-
488
+Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-
489
+protests">Tor
490
+Project, a Walpole-based company, helps Egyptians avoid Internet
491
+censorship during protests</a></td>
492
+</tr>
493
+<tr>
494
+<td>2011 January 31</td>
495
+<td>NPR: WBUR</td>
496
+<td><a
497
+href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">
498
+Here
499
+&amp; Now: U.S. Activists Help Egyptian Protesters Elude Government
500
+Censorship Online</a></td>
501
+</tr>
502
+<tr style="background-color: #e5e5e5;">
503
+<td>2011 February 01</td>
504
+<td>Discovery News</td>
505
+<td><a
506
+href="http://news.discovery.com/tech/egypt-internet-online-protesters-
507
+110201.html">Egypt's
508
+Internet Block Incomplete But Damaging</a></td>
509
+</tr>
510
+<tr>
511
+<td>2011 January 31</td>
512
+<td>IDG Poland</td>
513
+<td><a
514
+href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.
515
+szukaja.alternatyw.html">Egipt
516
+blokuje Internet, aktywiści szukają alternatyw</a></td>
517
+</tr>
518
+<tr style="background-color: #e5e5e5;">
519
+<td>2011 January 31</td>
520
+<td>New Scientist</td>
521
+<td><a
522
+href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains
523
+-officially-offli.html">How
524
+Egypt is getting online</a></td>
525
+</tr>
526
+<tr>
527
+<td>2011 January 31</td>
528
+<td>El Pais</td>
529
+<td><a
530
+href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe
531
+/fax/elpepuint/20110130elpepuint_14/Tes">Sortear
532
+la censura a golpe de fax</a></td>
533
+</tr>
534
+<tr style="background-color: #e5e5e5;">
535
+<td>2011 January 30</td>
536
+<td>Fox 25 News - Boston</td>
537
+<td><a
538
+href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give
539
+-egyptians-internet-access-20110130">Local
540
+company helps give Egyptians internet access</a></td>
541
+</tr>
542
+<tr>
543
+<td>2011 January 30</td>
544
+<td>New England Cable News</td>
545
+<td><a
546
+href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-
547
+onlin/landing.html?blockID=400628&feedID=4213">Mass.
548
+company helps activists avoid online government censorship</a></td>
549
+</tr>
550
+<tr style="background-color: #e5e5e5;">
551
+<td>2011 January 30</td>
552
+<td>Boston Globe</td>
553
+<td><a
554
+href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30
555
+/mass_groups_software_helps_avoid_censorship/">Foreign
556
+activists stay covered online</a></td>
557
+</tr>
558
+<tr>
559
+<td>2011 January 29</td>
560
+<td>SvD.se</td>
561
+<td><a
562
+href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-
563
+natdissidenter_5902693.svd">Tor
564
+öppnar dörrar för nätdissidenter</a></td>
565
+</tr>
566
+<tr style="background-color: #e5e5e5;">
567
+<td>2011 January 29</td>
568
+<td>ComputerWorld</td>
569
+<td><a
570
+href="http://www.computerworld.com/s/article/9207058/
571
+Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">
572
+Without
573
+Internet, Egyptians find new ways to get online.</a></td>
574
+</tr>
575
+<tr>
576
+<td>2011 January 28</td>
577
+<td>Globe and Mail</td>
578
+<td><a
579
+href="https://www.theglobeandmail.com/news/technology/in-a-span-of-
580
+minutes-a-country-goes-offline/article1887207/">In
581
+a span of minutes, a country goes offline</a></td>
582
+</tr>
583
+<tr style="background-color: #e5e5e5;">
584
+<td>2010 December 22</td>
585
+<td>Technology Review</td>
586
+<td><a href="http://www.technologyreview.com/web/26981/">Home Internet
587
+with Anonymity Built In</a></td>
588
+</tr>
589
+<tr>
590
+<td>2010 December 17</td>
591
+<td>New York Times Magazine</td>
592
+<td><a
593
+href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">
594
+Granting
595
+Anonymity</a></td>
596
+</tr>
597
+<tr style="background-color: #e5e5e5;">
598
+<td>2010 November 03</td>
599
+<td>metro sverige</td>
600
+<td><a
601
+href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-
602
+anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td>
603
+</tr>
604
+<tr style="background-color: #e5e5e5;">
605
+<td>2010 Sept 17</td>
606
+<td>NPR: On the media</td>
607
+<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
608
+Media: Interview with Jacob Appelbaum</a>.</td>
609
+</tr>
610
+<tr>
611
+<td>2010 Sept 16</td>
612
+<td>The Tor Project</td>
613
+<td>Tor announces an article discussing <a href="<page
614
+press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look
615
+for in a Circumvention Tool</a>.</td>
616
+</tr>
617
+<tr>
618
+<td>2010 August 01</td>
619
+<td>PC Format - Poland</td>
620
+<td><a
621
+href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-
622
+facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
623
+and Facebook are spying on us</a></td>
624
+</tr>
625
+<tr style="background-color: #e5e5e5;">
626
+<td>2010 July 14</td>
627
+<td>China Rights Forum</td>
628
+<td><a
629
+href="http://www.hrichina.org/public/contents/category?cid=175033">China
630
+Rights Forum, No. 2 - “China’s Internet”: Staking Digital
631
+Ground</a></td>
632
+</tr>
633
+<tr>
634
+<td>2010 May 25</td>
635
+<td>The Australian</td>
636
+<td><a
637
+href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-
638
+network-to-fight-censorship/story-e6frgakx-1225870756466">
639
+Call to join Tor network to fight censorship</a></td>
640
+</tr>
641
+<tr>
642
+<td>2010 Mar 25</td>
643
+<td>The Tor Project</td>
644
+<td>Tor and Printfection launch <a href="<page
645
+press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td>
646
+</tr>
647
+<tr style="background-color: #e5e5e5;">
648
+<td>2010 Mar 17</td>
649
+<td>PC World Poland</td>
650
+<td><a
651
+href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity
652
+in the Web</a></td>
653
+</tr>
654
+<tr>
655
+<td>2010 Mar 11</td>
656
+<td>ABC Australia</td>
657
+<td><a
658
+href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">
659
+Future Tense:  The Deep Web</a></td>
660
+</tr>
661
+<tr>
662
+<td>2010 Mar 09</td>
663
+<td>PC Pro UK</td>
664
+<td><a
665
+href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">
666
+The dark
667
+side of the web</a></td>
668
+</tr>
669
+<tr style="background-color: #e5e5e5;">
670
+<td>2009 Dec 29</td>
671
+<td>Times Online</td>
672
+<td><a
673
+href="http://www.timesonline.co.uk/tol/news/world/middle_east/
674
+article6969958.ece">When
675
+Iran’s regime falls this will be remembered as the YouTube revolution
676
+</a></td>
677
+</tr>
678
+<tr>
679
+<td>2009 Oct 15</td>
680
+<td>Technology Review</td>
681
+<td><a href="http://www.technologyreview.com/web/23736/?a=f">China
682
+Cracks Down
683
+on Tor Anonymity Network</a></td>
684
+</tr>
685
+<tr style="background-color: #e5e5e5;">
686
+<td>2009 Sep 30</td>
687
+<td>BusinessWeek</td>
688
+<td><a
689
+href="http://www.businessweek.com/globalbiz/content/sep2009/
690
+gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
691
+</tr>
692
+<tr>
693
+<td>2009 Aug 19</td>
694
+<td>Reuters</td>
695
+<td><a
696
+href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?
697
+pageNumber=1&amp;virtualBrandChannel=0&amp;sp=true">Web tools help
698
+protect human
699
+rights activists</a></td>
700
+</tr>
701
+<tr style="background-color: #e5e5e5;">
702
+<td>2009 Aug 10</td>
703
+<td>Technology Review</td>
704
+<td><a
705
+href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How
706
+to Build Anonymity Into the Internet</a></td>
707
+</tr>
708
+<tr>
709
+<td>2009 Jul 26</td>
710
+<td>Washington Times</td>
711
+<td><a
712
+href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-
713
+dodge-internet-censorship/">Senate OKs funds to thwart Iran Web
714
+censors</a></td>
715
+</tr>
716
+<tr style="background-color: #e5e5e5;">
717
+<td>2009 Jul 26</td>
718
+<td>Boston Globe</td>
719
+<td><a
720
+href="http://www.boston.com/news/nation/washington/articles/2009/07/26/
721
+us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike
722
+aid aimed
723
+at Iranians</a></td>
724
+</tr>
725
+<tr>
726
+<td>2009 Jul 24</td>
727
+<td>Associated Press</td>
728
+<td><a
729
+href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-
730
+p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude
731
+crackdown on
732
+Internet</a></td>
733
+</tr>
734
+<tr style="background-color: #e5e5e5;">
735
+<td>2009 Jul 08</td>
736
+<td>Tehran Bureau</td>
737
+<td><a
738
+href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
739
+Around the Globe Rally to Help Iranians Online</a></td>
740
+</tr>
741
+<tr style="background-color: #e5e5e5;">
742
+<td>2009 Jul 02</td>
743
+<td>NED/CIMA</td>
744
+<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role
745
+of New Media in the Iranian Elections</a></td>
746
+</tr>
747
+<tr>
748
+<td>2009 Jun 26</td>
749
+<td>Washington Times</td>
750
+<td><a
751
+href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-
752
+navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian
753
+protesters avoid
754
+censorship with Navy technology</a></td>
755
+</tr>
756
+<tr style="background-color: #e5e5e5;">
757
+<td>2009 Jun 29</td>
758
+<td>EFF</td>
759
+<td><a
760
+href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-
761
+relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor
762
+Relay</a></td>
763
+</tr>
764
+<tr>
765
+<td>2009 Jun 24</td>
766
+<td>Daily Finance</td>
767
+<td><a
768
+href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-
769
+controversy/">Nokia and Siemens in Iran controversy</a></td>
770
+</tr>
771
+<tr style="background-color: #e5e5e5;">
772
+<td>2009 Jun 18</td>
773
+<td>Wall Street Journal</td>
774
+<td><a
775
+href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-
776
+anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
777
+</tr>
778
+<tr>
779
+<td>2009 Jun 19</td>
780
+<td>O'Reilly Radar</td>
781
+<td><a
782
+href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.
783
+html">
784
+Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor
785
+Project
786
+and the EFF</a></td>
787
+</tr>
788
+<tr style="background-color: #e5e5e5;">
789
+<td>2009 Jun 18</td>
790
+<td>Deutsche Welle</td>
791
+<td><a
792
+href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet
793
+proxies let Iranians and others connect to blocked Web sites</a></td>
794
+</tr>
795
+<tr>
796
+<td>2009 Jun 18</td>
797
+<td>Technology Review</td>
798
+<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the
799
+Republic of Iran</a></td>
800
+</tr>
801
+<tr style="background-color: #e5e5e5;">
802
+<td>2009 Jun 17</td>
803
+<td>CNet News</td>
804
+<td><a
805
+href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find
806
+ways to bypass Net censors</a></td>
807
+</tr>
808
+<tr>
809
+<td>2009 Jun 17</td>
810
+<td>ComputerWorld</td>
811
+<td><a
812
+href="http://www.computerworld.com/action/article.do?command=
813
+viewArticleBasic&amp;articleId=9134471&amp;intsrc=news_ts_head">Iran's
814
+leaders fight Internet;
815
+Internet wins (so far)</a></td>
816
+</tr>
817
+<tr style="background-color: #e5e5e5;">
818
+<td>2009 May 29</td>
819
+<td>Le Monde</td>
820
+<td><a
821
+href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-
822
+censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
823
+</tr>
824
+<tr>
825
+<td>2009 May 15</td>
826
+<td>Mass High Tech</td>
827
+<td><a
828
+href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-
829
+tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net
830
+privacy</a></td>
831
+</tr>
832
+<tr style="background-color: #e5e5e5;">
833
+<td>2009 May 01</td>
834
+<td>New York Times</td>
835
+<td><a
836
+href="http://www.nytimes.com/2009/05/01/technology/01filter.html">
837
+Iranians and
838
+Others Outwit Net Censors</a></td>
839
+</tr>
840
+<tr>
841
+<td>2009 Apr 23</td>
842
+<td>Technology Review</td>
843
+<td><a
844
+href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made
845
+Safer:  How anonymity technology could save free speech on the
846
+Internet.</a></td>
847
+</tr>
848
+<tr style="background-color: #e5e5e5;">
849
+<td>2009 Apr 22</td>
850
+<td>Le Monde</td>
851
+<td><a
852
+href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la
853
+-cybersurveillance/">How to circumvent cybersurveillance</a></td>
854
+</tr>
855
+<tr>
856
+<td>2009 Apr 06</td>
857
+<td>Reader's Digest</td>
858
+<td><a
859
+href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/
860
+article122219.html">How to Hide Anything</a></td>
861
+</tr>
862
+<tr>
863
+<td>2009 Apr 06</td>
864
+<td>Al Jazeera</td>
865
+<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
866
+Voices showcases Tor</a></td>
867
+</tr>
868
+<tr style="background-color: #e5e5e5;">
869
+<td>2009 Mar 18</td>
870
+<td>Marie Claire</td>
871
+<td><a
872
+href="http://www.marieclaire.com/career-money/career-coach/manage-online
873
+--web-image">How to Manage Your Web Footprint</a></td>
874
+</tr>
875
+<tr>
876
+<td>2009 Mar 13</td>
877
+<td>Wall Street Journal</td>
878
+<td><a
879
+href="http://online.wsj.com/article/SB123567809587886053.html">The
880
+Kindness of Strangers</a></td>
881
+</tr>
882
+<tr>
883
+<td>2009 Mar 12</td>
884
+<td>The Tor Project</td>
885
+<td>Tor launches a <a href="<page
886
+press/2009-03-12-performance-roadmap-press-release>">performance
887
+roadmap</a> and campaign.</td>
888
+</tr>
889
+<tr style="background-color: #e5e5e5;">
890
+<td>2009 Mar 12</td>
891
+<td>BBC World Service</td>
892
+<td><a
893
+href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-
894
+world-day-against-cyber-censorship/">Steven J Murdoch interviewed about
895
+Tor and Censorship</a></td>
896
+</tr>
897
+<tr style="background-color: #e5e5e5;">
898
+<td>2009 Mar 03</td>
899
+<td>Orf Austria</td>
900
+<td><a
901
+href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER
902
+column</a></td>
903
+</tr>
904
+<tr>
905
+<td>2009 Feb 18</td>
906
+<td>Bangkok Post</td>
907
+<td><a
908
+href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-
909
+not-found-routine">The old fake "404 not found" routine</a></td>
910
+</tr>
911
+<tr>
912
+<td>2009 Feb 13</td>
913
+<td>Hearsay Culture</td>
914
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio
915
+Interview/Podcast</a></td>
916
+</tr>
917
+<tr style="background-color: #e5e5e5;">
918
+<td>2008 Dec 29</td>
919
+<td>nu.nl</td>
920
+<td><a
921
+href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-
922
+maak.html">Anoniem browsen voor gsm in de maak</a></td>
923
+</tr>
924
+<tr>
925
+<tr>
926
+<td>2008 Dec 19</td>
927
+<td>The Tor Project</td>
928
+<td>Tor announces 3-year <a href="<page
929
+press/2008-12-19-roadmap-press-release>">development roadmap</a>.</td>
930
+</tr>
931
+<tr style="background-color: #e5e5e5;">
932
+<td>2008 Dec 14</td>
933
+<td>PC Magazine: Middle &amp; Near East</td>
934
+<td><a
935
+href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To
936
+Reclaim Your Online Privacy</a></td>
937
+</tr>
938
+<tr>
939
+<td>2008 Aug 21</td>
940
+<td>CNN</td>
941
+<td><a
942
+href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">
943
+Experts:
944
+Internet filtering and censorship rife</a></td>
945
+</tr>
946
+<tr style="background-color: #e5e5e5;">
947
+<td>2008 Aug 22</td>
948
+<td>The Sydney Morning Herald</td>
949
+<td><a
950
+href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/
951
+1218911800889.html">The
952
+China Syndrome</a></td>
953
+</tr>
954
+<tr>
955
+<td>2008 Aug 20</td>
956
+<td>Scientific American</td>
957
+<td><a
958
+href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-
959
+secrets-safe">Cryptography:
960
+How to Keep Your Secrets Safe</a></td>
961
+</tr>
962
+<tr style="background-color: #e5e5e5;">
963
+<td>2008 Aug 05</td>
964
+<td>Guardian UK</td>
965
+<td><a
966
+href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.
967
+censorship">
968
+Vaulting
969
+the great firewall</a></td>
970
+</tr>
971
+<tr>
972
+<td>2008 Aug 10</td>
973
+<td>Tech Radar UK</td>
974
+<td><a
975
+href="http://www.techradar.com/news/internet/web/freedom-stick-
976
+highlights-chinese-net-censorship-449233">Freedom
977
+Stick highlights Chinese 'net censorship: USB drive promises anonymous
978
+surfing
979
+for the paranoid</a>
980
+</td>
981
+</tr>
982
+<tr style="background-color: #e5e5e5;">
983
+<td>2008 Aug 07</td>
984
+<td>Spiegel</td>
985
+<td><a
986
+href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks
987
+gegen Zensur und Überwachung</a>
988
+</td>
989
+</tr>
990
+<tr>
991
+<td>2008 Aug 07</td>
992
+<td>PC World</td>
993
+<td><a
994
+href="http://www.pcworld.com/article/149399-3/
995
+15_great_free_privacy_downloads.html">15
996
+Great, Free Privacy Downloads</a>.  Tor is Number 1.
997
+</td>
998
+</tr>
999
+<tr style="background-color: #e5e5e5;">
1000
+<td>2008 Aug 07</td>
1001
+<td>The Guardian UK</td>
1002
+<td><a
1003
+href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.
1004
+hacking">Chaos
1005
+aims to crack China's wall</a>
1006
+</td>
1007
+</tr>
1008
+<tr>
1009
+<td>2008 Aug 07</td>
1010
+<td>The Register UK</td>
1011
+<td><a
1012
+href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">
1013
+German
1014
+hackers poke hole in great firewall of China</a>
1015
+</td>
1016
+</tr>
1017
+<tr>
1018
+<td>2008 May 24</td>
1019
+<td>Groupo Estado</td>
1020
+<td><a
1021
+href="http://blog.estadao.com.br/blog/cruz/?title=
1022
+cfp08_navegacao_anonima_na_rede&amp;more=1&amp;c=1&amp;tb=1&amp;pb=1&amp
1023
+;cat=525">Interview
1024
+at Computers, Freedom, and Privacy 2008 Conference</a>
1025
+</td>
1026
+</tr>
1027
+<tr style="background-color: #e5e5e5;">
1028
+<td>2008 Mar 12</td>
1029
+<td>SearchSecurity.com</td>
1030
+<td><a
1031
+href="http://searchsecurity.techtarget.com/news/article/0,289142,
1032
+sid14_gci1305120,00.html">
1033
+Tor network 'bridges' help evade blockers</a>.
1034
+Covers new Tor features designed to overcome filtering and blocking that
1035
+prevent
1036
+access
1037
+to the Tor network.
1038
+</td>
1039
+</tr>
1040
+<tr>
1041
+<td>2008 Feb 14</td>
1042
+<td>Wired: Compiler Blog</td>
1043
+<td><a
1044
+href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
1045
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
1046
+</td>
1047
+</tr>
1048
+<tr style="background-color: #e5e5e5;">
1049
+<td>2008 Feb 01</td>
1050
+<td>PC World</td>
1051
+<td><a
1052
+href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
1053
+Hackers Can Expose Masked Surfers, Study Says</a>
1054
+A report on <a
1055
+href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-
1056
+vulnerabilities-in-anonymity-systems/">
1057
+Steven Murdoch's recent PhD thesis</a>. Steven <a
1058
+href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-
1059
+anonymity-systems%2526quot%3B">
1060
+responds on the Tor Blog</a>.</td>
1061
+</tr>
1062
+<tr style="background-color: #e5e5e5;">
1063
+<td>2007 Sep 21</td>
1064
+<td>Wired HowTo Blog</td>
1065
+<td><a
1066
+href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=
1067
+be_a_whistle_blower;action=display;category=Work">Be a
1068
+Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to
1069
+remain anonymous.</td>
1070
+</tr>
1071
+<tr>
1072
+<td>2007 Sep 16</td>
1073
+<td>Cnet</td>
1074
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor
1075
+anonymity server admin arrested</a>.  A Tor exit node operator from
1076
+Germany was arrested and then released once the police realized their
1077
+mistake. Unfortunately, the hassle <a
1078
+href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-
1079
+after-run-in-with-police-i-cant-do-this-any-more.html"> caused this
1080
+operator to shut down the node</a>.  We have an <a href="<page
1081
+docs/faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a
1082
+href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a>
1083
+with advice on how to handle such issues if you are operating a Tor
1084
+relay.</td>
1085
+</tr>
1086
+<tr style="background-color: #e5e5e5;">
1087
+<td>2007 Sep 10</td>
1088
+<td>Wired</td>
1089
+<td> <a
1090
+href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"
1091
+> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/>
1092
+Swedish computer security consultant Dan Egerstad monitored the traffic
1093
+going through a Tor exit node he was running, then published unencrypted
1094
+account and password information.  Note that the better articles
1095
+covering this event correctly indicate that this is not a security flaw
1096
+or design problem with Tor - Tor provides anonymity, but does not
1097
+encrypt anything going to or from an exit node. You
1098
+<strong>must</strong> use SSL (https) while browsing to ensure
1099
+end-to-end encryption.  Also covered in <a
1100
+href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network
1101
+-exposes-sensitive-information"> The Inquirer</a>, <a
1102
+href="http://www.infoworld.com/article/07/09/10/Security-researcher-
1103
+intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
1104
+InfoWorld</a>, <a
1105
+href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=
1106
+fullpage#
1107
+contentSwap2">The Sydney Morning Herald</a>, <a
1108
+href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a
1109
+href="http://arstechnica.com/news.ars/post/20070910-security-expert-used
1110
+-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and
1111
+many others. It was reported as early as August 31, 2007 on the <a
1112
+href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
1113
+Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the
1114
+information via his Tor exit node.  In the end, Mr. Egerstad was
1115
+arrested, which was covered by <a
1116
+href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The
1117
+Register</a>, <a
1118
+href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-
1119
+year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The
1120
+Sydney Morning Herald</a>, <a
1121
+href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a
1122
+href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html">
1123
+Wired Blog</a>.</td>
1124
+</tr>
1125
+<tr>
1126
+<td>2007 Jul 27</td>
1127
+<td>Wired Blog</td>
1128
+<td><a
1129
+href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html">
1130
+Cyber Jihadists Embrace Tor</a><br/> A pointer to a <a
1131
+href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"
1132
+> blog</a> that posted screenshots of Arabic instructions on using Tor,
1133
+ostensibly for jihadists. Make sure to read Shava Nerad's reply at the
1134
+bottom of the article.</td>
1135
+</tr>
1136
+<tr style="background-color: #e5e5e5;">
1137
+<td>2007 Jun 22</td>
1138
+<td>Bangkok Post</td>
1139
+<td> <a
1140
+href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=
1141
+72388"> The problems with censorship</a>.  Mentions anecdotes that
1142
+"everyone" has Tor installed in Thailand to avoid censorship.</td>
1143
+</tr>
1144
+<tr>
1145
+<td>2007 Mar 15</td>
1146
+<td>World Changing</td>
1147
+<td><a href="http://www.worldchanging.com/archives/006309.html">
1148
+Blogging Where Speech Isn’t Free</a><br/> Coverage of former Tor
1149
+Executive Director Shava Nerad's participation at an <a
1150
+href="http://2007.sxsw.com/interactive/programming/panels/?action=show&
1151
+amp;id=IAP060124"> SXSW panel</a>, where she explained how Tor can help
1152
+bloggers.</td>
1153
+</tr>
1154
+<tr style="background-color: #e5e5e5;">
1155
+<td>2007 Mar 8</td>
1156
+<td>Security Focus</td>
1157
+<td><a href="http://www.securityfocus.com/news/11447/1"> Tor hack
1158
+proposed to catch criminals</a>.  Coverage of a toolset called "Torment"
1159
+for monitoring exit nodes, and responses from the Tor Project
1160
+illustrating why this approach may not be a good idea.</td>
1161
+</tr>
1162
+<tr>
1163
+<td>2007 Feb 1</td>
1164
+<td>Dr Dobb's</td>
1165
+<td><a href="http://www.ddj.com/security/197002414"> Tor Project
1166
+Protects Anonymous Sources</a>.  An introduction to Tor, including
1167
+technical and historical background. </td>
1168
+</tr>
1169
+<tr style="background-color: #e5e5e5;">
1170
+<td>2006 Oct 19</td>
1171
+<td>Wired Threat Level</td>
1172
+<td><a
1173
+href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
1174
+The Onion Router (TOR) is Leaky (Leeky)</a>.  Explains why you need
1175
+something like Privoxy in addition to the core Tor code to ensure your
1176
+anonymity. If you use the Vidalia bundle, it installs and configures
1177
+Privoxy automatically, but it can't hurt to understand why it is
1178
+necessary.</td>
1179
+</tr>
1180
+<tr>
1181
+<td>2006 Aug 18</td>
1182
+<td>NPR</td>
1183
+<td><a
1184
+href="http://www.npr.org/templates/story/story.php?storyId=5168456">
1185
+Tips for Protecting Privacy Online</a>.  Kevin Bankston of the EFF
1186
+recommends Tor during an NPR interview.  Tor information begins at 8:15
1187
+into the program.</td>
1188
+</tr>
1189
+<tr style="background-color: #e5e5e5;">
1190
+<td>2006 Jul 5</td>
1191
+<td>MSNBC</td>
1192
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> Defending
1193
+liberties in high-tech world</a>.  Mentions EFF funding for Tor as one
1194
+of its significant nonlitigation projects.</td>
1195
+</tr>
1196
+<td>2006 Apr 11</td>
1197
+<td>PBS Frontline</td>
1198
+<td><a
1199
+href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"
1200
+>Chipping Away at China's Great Firewall</a></td>
1201
+</tr>
1202
+<tr style="background-color: #e5e5e5;">
1203
+<td>2006 Feb 28</td>
1204
+<td>PC World</td>
1205
+<td><a
1206
+href="http://www.pcworld.com/article/id,124891-page,1/article.html">
1207
+Outsmarting the Online Privacy Snoops</a></td>
1208
+</tr>
1209
+<tr>
1210
+<td>2006 Feb 27</td>
1211
+<td>Forbes</td>
1212
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
1213
+Cracks In the Wall</a>.  Discussion of Tor being used for evading
1214
+censorship by repressive governments.</td>
1215
+</tr>
1216
+<tr style="background-color: #e5e5e5;">
1217
+<td>2006 Feb 20</td>
1218
+<td>The Boston Globe</td>
1219
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
1220
+Beating censorship on the Internet</a></td>
1221
+</tr>
1222
+<tr>
1223
+<td>2006 Feb 15</td>
1224
+<td>CBS Evening News</td>
1225
+<td><a
1226
+href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.
1227
+shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>.
1228
+Roger Dingledine appeared on the show to discuss Tor, starting at 1:04
1229
+into the video.</td>
1230
+</tr>
1231
+<tr style="background-color: #e5e5e5;">
1232
+<td>2006 Feb 15</td>
1233
+<td>CNBC - Closing Bell</td>
1234
+<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
1235
+</tr>
1236
+<tr>
1237
+<td>2006 Feb 15</td>
1238
+<td>Network Secure</td>
1239
+<td><a
1240
+href="http://www.network-secure.de/index.php?option=com_content&amp;task
1241
+=view&amp;id=3909">Tor: Anonymisierungswerkzeug entwickelt</a>
1242
+(German)</td>
1243
+</tr>
1244
+<tr style="background-color: #e5e5e5;">
1245
+<td>2006 Feb 13</td>
1246
+<td>Wall Street Journal</td>
1247
+<td><a href="http://online.wsj.com/article/SB113979965346572150.html">
1248
+Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a>Full article
1249
+text can also be found
1250
+<a
1251
+href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.</td>
1252
+</tr>
1253
+<tr>
1254
+<td>2006 Jan 31</td>
1255
+<td>Technology Review</td>
1256
+<td><a
1257
+href="http://www.technologyreview.com/Infotech/16216/page2/">Evading the
1258
+Google Eye</a></td>
1259
+</tr>
1260
+<tr style="background-color: #e5e5e5;">
1261
+<td>2006 Jan 29</td>
1262
+<td>New York Times</td>
1263
+<td><a
1264
+href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> How
1265
+to Outwit the World's Internet Censors</a></td>
1266
+</tr>
1267
+<tr>
1268
+<td>2006 Jan 27</td>
1269
+<td>Fox News/eWeek</td>
1270
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
1271
+Anonymizers Suddenly Get Very Popular</a></td>
1272
+</tr>
1273
+<tr>
1274
+<td>2006 Jan 25</td>
1275
+<td>New York Times</td>
1276
+<td><a
1277
+href="http://www.nytimes.com/2006/01/25/technology/techspecial2/
1278
+25privacy.html?_r=1&amp;oref=slogin"> Privacy for People Who Don't Show
1279
+Their Navels</a></td>
1280
+</tr>
1281
+<tr>
1282
+<td>2006 Jan 23</td>
1283
+<td>NPR Talk of the Nation</td>
1284
+<td><a
1285
+href="http://www.npr.org/templates/story/story.php?storyId=5168456">
1286
+Search Engines and Privacy Rights on the Web</a><br/> <a
1287
+href="http://xeni.net/">Xeni Jardin</a> recommends Tor at 33:30 into the
1288
+program.</td>
1289
+</tr>
1290
+
1291
+<tr style="background-color: #e5e5e5;">
1292
+<td>2006 Feb 15</td>
1293
+<td>Punto Informatico</td>
1294
+<td><a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a>
1295
+(Italian)</td>
1296
+</tr>
1297
+
1298
+<tr>
1299
+<td>2006 Jan 20</td>
1300
+<td>Wired</td>
1301
+<td><a
1302
+href="http://www.wired.com/science/discoveries/news/2006/01/70051?
1303
+currentPage=2"> How to Foil Search Engine Snoops</a></td>
1304
+</tr>
1305
+
1306
+<tr style="background-color: #e5e5e5;">
1307
+<td>2006 Jan 20</td>
1308
+<td>NPR</td>
1309
+<td><a
1310
+href="http://www.npr.org/templates/story/story.php?storyId=5165854">
1311
+Google Records Subpoena Raises Privacy Fears</a></td>
1312
+</tr>
1313
+
1314
+<tr>
1315
+<td>2005 Sep 30</td>
1316
+<td>Viva o Linux</td>
1317
+<td><a
1318
+href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
1319
+TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
1320
+</tr>
1321
+<tr style="background-color: #e5e5e5;">
1322
+<td>2005 Aug 6</td>
1323
+<td>New Scientist</td>
1324
+<td><a
1325
+href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">
1326
+Why we all need pornography</a></td>
1327
+</tr>
1328
+<tr style="background-color: #e5e5e5;">
1329
+<td>2005 Jul 12</td>
1330
+<td>IEEE Computer Society's Technical Committee on Security and
1331
+Privacy</td>
1332
+<td><a
1333
+href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.
1334
+html#TOR"> Onion routing application Tor makes PCWorld's top
1335
+100</a></td>
1336
+</tr>
1337
+
1338
+<tr>
1339
+<td>2005 Jun 22</td>
1340
+<td>The Unofficial Apple Blog</td>
1341
+<td><a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> Privacy
1342
+Watch: Tor</a></td>
1343
+</tr>
1344
+
1345
+<tr style="background-color: #e5e5e5;">
1346
+<td>2005 Jun 10</td>
1347
+<td>The New Zealand Herald</td>
1348
+<td><a
1349
+href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=
1350
+10329896"> China's internet censorship stranglehold can't last</a></td>
1351
+</tr>
1352
+
1353
+<tr>
1354
+<td>2005 Jun 8</td>
1355
+<td>American Public Radio</td>
1356
+<td><a
1357
+href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
1358
+An Internet privacy tool called "Tor"</a></td>
1359
+</tr>
1360
+
1361
+<tr style="background-color: #e5e5e5;">
1362
+<td>2005 Jun 1</td>
1363
+<td>PC World</td>
1364
+<td><a
1365
+href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The
1366
+100 Best Products of 2005</a><br/> Tor is ranked #40 on the list. </td>
1367
+</tr>
1368
+
1369
+<tr>
1370
+<td>2005 Jun 1</td>
1371
+<td>Linux Weekly News</td>
1372
+<td><a href="http://lwn.net/Articles/138242/"> A Look at The Onion
1373
+Router (Tor)</a></td>
1374
+</tr>
1375
+
1376
+<tr style="background-color: #e5e5e5;">
1377
+<td>2005 May 22</td>
1378
+<td>Slashdot</td>
1379
+<td><a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
1380
+Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
1381
+</tr>
1382
+
1383
+<tr>
1384
+<td>2005 May 20</td>
1385
+<td>Security.uz</td>
1386
+<td><a href="http://security.uz/news/default.asp?id=10541"> Tor - мощный
1387
+анонимайзер для всех ОС</a> (Russian)</td>
1388
+</tr>
42 1389
 
1390
+<tr style="background-color: #e5e5e5;">
1391
+<td>2005 May 19</td>
1392
+<td>WebPlanet</td>
1393
+<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor:
1394
+распределенная система анонимного серфинга</a> (Russian)</td>
1395
+</tr>
1396
+
1397
+<tr>
1398
+<td>2005 May 17</td>
1399
+<td>Wired</td>
1400
+<td><a
1401
+href="http://www.wired.com/politics/security/news/2005/05/67542?
1402
+currentPage=all"> Tor Torches Online Tracking</a>. Also available in <a
1403
+href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a
1404
+>.</td>
1405
+</tr>
1406
+
1407
+<tr style="background-color: #e5e5e5;">
1408
+<td>2005 May 17</td>
1409
+<td>XBiz</td>
1410
+<td><a href="http://xbiz.com/news/8761"> Navy Project Allows Anonymous
1411
+Browsing</a></td>
1412
+</tr>
1413
+
1414
+<tr>
1415
+<td>2005 Apr 13</td>
1416
+<td>Heise online</td>
1417
+<td><a href="http://www.heise.de/newsticker/meldung/58506"> CFP: Vom
1418
+kafkaesken Schwinden der Anonymität</a> (German)</td>
1419
+</tr>
1420
+
1421
+<tr style="background-color: #e5e5e5;">
1422
+<td>2005 Apr 5</td>
1423
+<td>Libero</td>
1424
+<td><a
1425
+href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
1426
+Anonimato on line, ecco Tor</a> (Italian)</td>
1427
+</tr>
1428
+
1429
+<tr>
1430
+<td>2005 Jan 4</td>
1431
+<td>Internetnews</td>
1432
+<td><a href="http://www.internetnews.com/dev-news/article.php/3454521">
1433
+EFF Throws Support to 'Anonymous' Internet Project</a></td>
1434
+</tr>
1435
+
1436
+<tr style="background-color: #e5e5e5;">
1437
+<td>2005 Mar 31</td>
1438
+<td>Linux.com</td>
1439
+<td><a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78">
1440
+Securing your online privacy with Tor</a></td>
1441
+</tr>
1442
+
1443
+<tr>
1444
+<td>2004 Dec 27</td>
1445
+<td>BoingBoing</td>
1446
+<td><a
1447
+href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
1448
+EFF helping produce anonymizing software</a></td>
1449
+</tr>
1450
+
1451
+<tr style="background-color: #e5e5e5;">
1452
+<td>2004 Dec 25</td>
1453
+<td>Kansas City infozine</td>
1454
+<td><a
1455
+href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
1456
+EFF Joins Forces with Tor Software Project</a></td>
1457
+</tr>
1458
+
1459
+<tr>
1460
+<td>2004 Dec 23</td>
1461
+<td>golem.de</td>
1462
+<td><a href="http://www.golem.de/0412/35340.html"> EFF unterstützt
1463
+Anonymisierer Tor</a> (German)</td>
1464
+</tr>
1465
+
1466
+<tr style="background-color: #e5e5e5;">
1467
+<td>2004 Dec 23</td>
1468
+<td>SuicideGirls</td>
1469
+<td><a href="http://suicidegirls.com/news/technology/6150/"> New Routing
1470
+Software Allows Anonymous Internet Use</a></td>
1471
+</tr>
1472
+
1473
+<tr>
1474
+<td>2004 Dec 18</td>
1475
+<td>P2Pnet</td>
1476
+<td><a href="http://p2pnet.net/story/3357"> EFF to sponsor Tor</a></td>
1477
+</tr>
1478
+
1479
+<tr style="background-color: #e5e5e5;">
1480
+<td>2004 Dec 22</td>
1481
+<td>Slashdot</td>
1482
+<td><a
1483
+href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95
1484
+&amp;tid=158&amp;tid=153&amp;tid=17"> EFF Promotes Freenet-like System
1485
+Tor</a></td>
1486
+</tr>
1487
+
1488
+<tr>
1489
+<td>2004 Nov 16</td>
1490
+<td>AlterNet</td>
1491
+<td><a href="http://www.alternet.org/columnists/story/20523/"> Heavy
1492
+Traffic</a></td>
1493
+</tr>
1494
+
1495
+<tr style="background-color: #e5e5e5;">
1496
+<td>2004 Aug 30</td>
1497
+<td>Newsweek</td>
1498
+<td>Technology: Instant Security (no link)</td>
1499
+</tr>
1500
+
1501
+<tr>
1502
+<td>2004 Aug 16</td>
1503
+<td>Eweek</td>
1504
+<td><a
1505
+href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-
1506
+Tools/"> Don't Fear Internet Anonymity Tools</a></td>
1507
+</tr>
1508
+
1509
+<tr style="background-color: #e5e5e5;">
1510
+<td>2004 Aug 6</td>
1511
+<td>HCC magazine</td>
1512
+<td><a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen
1513
+met hulp van marine VS</a> (Dutch)</td>
1514
+</tr>
1515
+
1516
+<tr>
1517
+<td>2004 Aug 6</td>
1518
+<td>Golem</td>
1519
+<td><a href="http://www.golem.de/0408/32835.html"> Tor: Anonymisierer
1520
+nutzt Onion-Routing</a></td>
1521
+</tr>
1522
+
1523
+<tr style="background-color: #e5e5e5;">
1524
+<td>2004 Aug 5</td>
1525
+<td>Network World Security</td>
1526
+<td><a href="http://www.networkworld.com/details/7088.html"> Onion
1527
+routing</a></td>
1528
+</tr>
1529
+
1530
+<tr>
1531
+<td>2004 May 8</td>
1532
+<td>Wired</td>
1533
+<td><a href="http://www.wired.com/politics/security/news/2004/08/64464">
1534
+Onion Routing Averts Prying Eyes</a>. Also in <a
1535
+href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.
1536
+html">Japanese</a>.</td>
1537
+</tr>
1538
+
1539
+<tr style="background-color: #e5e5e5;">
1540
+<td>2004 Mar 8</td>
1541
+<td>CNET Japan blog</td>
1542
+<td><a
1543
+href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
1544
+Yearning of hackers and insecurity</a> (Japanese)</td>
1545
+</tr>
1546
+
1547
+<tr>
1548
+<td>1999 Apr 13</td>
1549
+<td>Wired</td>
1550
+<td><a
1551
+href="http://www.wired.com/science/discoveries/news/1999/04/19091">
1552
+Anonymous Web Surfing? Uh-Uh</a></td>
1553
+</tr>
1554
+
1555
+</table>
43 1556
   </div>
1557
+</div>
44 1558
   <!-- END MAINCOL -->
45 1559
   <div id = "sidecol">
46 1560
 #include "side.wmi"
... ...
@@ -49,4 +1563,4 @@ press/2008-12-19-roadmap-press-release>">development roadmap</a>.</li>
49 1563
   <!-- END SIDECOL -->
50 1564
 </div>
51 1565
 <!-- END CONTENT -->
52
-#include <foot.wmi> 
1566
+#include <foot.wmi>
... ...
@@ -20,10 +20,7 @@
20 20
   my $sidenav;
21 21
   $sidenav = [
22 22
       {'url'  => 'press/press',
23
-       'txt'  => 'Press Releases',
24
-      }, 
25
-      {'url'  => 'press/inthemedia',
26
-       'txt'  => 'Tor in the Media',
23
+       'txt'  => 'Tor Media and Press',
27 24
       }, 
28 25
       {'url'  => 'https://blog.torproject.org/',
29 26
        'txt'  => 'Tor Blog',