re-order the 'in the media' page to be chronological by newest to oldest.
Andrew Lewman

Andrew Lewman commited on 2011-03-13 02:38:32
Zeige 1 geänderte Dateien mit 369 Einfügungen und 594 Löschungen.

... ...
@@ -14,12 +14,15 @@
14 14
 
15 15
 <h1>Media Appearances</h1>
16 16
 
17
-<h2>Interviews &amp; Appearances</h2>
18
-
19 17
 <p>Major news organizations including the New York Times, Forbes, Al
20
-Jazeera, Washington Post, Le Monde, NPR, and the BBC have sought out or
18
+Jazeera, Washington Post, Le Monde, NPR, BBC, and more have sought out or
21 19
 quoted Tor Project members due to their expertise on anonymity, privacy,
22
-and Internet censorship issues.  Some samples: </p>
20
+and Internet censorship issues.</p>
21
+<p>Since Tor is widely used throughout the world, it is mentioned
22
+regularly in the press.  This list is not comprehensive, but illustrates
23
+some of the significant Tor-related stories that have popped up.</p>
24
+<p>A sample of such media appearances and mentions is below in order of
25
+newest to oldest: </p>
23 26
 
24 27
 <table width="100%" cellpadding="3" cellspacing="0">
25 28
 <thead style="background-color: #e5e5e5;">
... ...
@@ -29,14 +32,14 @@ and Internet censorship issues.  Some samples: </p>
29 32
 <th>Topic</th>
30 33
 </tr>
31 34
 </thead>
32
-<tr>
35
+<tr style="background-color: #e5e5e5;">
33 36
 <td>2011 March 10</td>
34 37
 <td>NyTeknik</td>
35 38
 <td><a
36 39
 href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.ece">Svenska
37 40
 biståndspengar till Facebookrevolutionen</a></td>
38 41
 </tr>
39
-<tr style="background-color: #e5e5e5;">
42
+<tr>
40 43
 <td>2011 March 09</td>
41 44
 <td>Washington Post</td>
42 45
 <td><a
... ...
@@ -44,6 +47,13 @@ href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/AR20110309
44 47
 funding tech firms that help Mideast dissidents evade government
45 48
 censors</a></td>
46 49
 </td>
50
+<tr style="background-color: #e5e5e5;">
51
+<td>2011 February 17</td>
52
+<td>Walpole Times</td>
53
+<td><a
54
+href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-protests">Tor
55
+Project, a Walpole-based company, helps Egyptians avoid Internet censorship during protests</a></td>
56
+</tr>
47 57
 <tr>
48 58
 <td>2011 January 31</td>
49 59
 <td>NPR: WBUR</td>
... ...
@@ -53,188 +63,81 @@ href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">Here
53 63
 Censorship Online</a></td>
54 64
 </tr>
55 65
 <tr style="background-color: #e5e5e5;">
56
-<td>2011 January 30</td>
57
-<td>Fox 25 News - Boston</td>
58
-<td><a
59
-href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give-egyptians-internet-access-20110130">Local
60
-company helps give Egyptians internet access</a></td>
61
-</tr>
62
-<tr>
63
-<td>2011 January 30</td>
64
-<td>New England Cable News</td>
65
-<td><a
66
-href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-onlin/landing.html?blockID=400628&feedID=4213">Mass.
67
-company helps activists avoid online government censorship</a></td>
68
-</tr>
69
-<tr style="background-color: #e5e5e5;">
70
-<td>2010 Sept 17</td>
71
-<td>NPR: On the media</td>
72
-<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
73
-Media: Interview with Jacob Appelbaum</a>.</td>
74
-</tr>
75
-<tr>
76
-<td>2010 Mar 11</td>
77
-<td>ABC Australia</td>
78
-<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense:  The Deep Web</a></td>
79
-</tr>
80
-<tr style="background-color: #e5e5e5;">
81
-<td>2009 Jul 02</td>
82
-<td>NED/CIMA</td>
83
-<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td>
84
-</tr>
85
-<tr>
86
-<td>2009 Apr 06</td>
87
-<td>Al Jazeera</td>
88
-<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
89
-Voices showcases Tor</a></td>
90
-</tr>
91
-<tr style="background-color: #e5e5e5;">
92
-<td>2009 Mar 12</td>
93
-<td>BBC World Service</td>
94
-<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about Tor and Censorship</a></td>
95
-</tr>
96
-<tr>
97
-<td>2009 Feb 13</td>
98
-<td>Hearsay Culture</td>
99
-<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td>
100
-</tr>
101
-<tr style="background-color: #e5e5e5;">
102
-<td>2008 Dec 29</td>
103
-<td>nu.nl</td>
104
-<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td>
105
-</tr>
106
-<tr>
107
-<td>2006 Apr 11</td>
108
-<td>PBS Frontline</td>
109
-<td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">Chipping Away at China's Great Firewall</a></td>
110
-</tr>
111
-<tr style="background-color: #e5e5e5;">
112
-<td>2006 Feb 28</td>
113
-<td>PC World</td>
114
-<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
115
-Outsmarting the Online Privacy Snoops</a></td>
116
-</tr>
117
-<tr>
118
-<td>2006 Feb 27</td>
119
-<td>Forbes</td>
120
-<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
121
-Cracks In the Wall</a>.  Discussion of Tor being used for evading censorship by repressive
122
-governments. </td>
123
-</tr>
124
-<tr style="background-color: #e5e5e5;">
125
-<td>2006 Feb 20</td>
126
-<td>The Boston Globe</td>
127
-<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
128
-Beating censorship on the Internet</a></td>
129
-</tr>
130
-<tr>
131
-<td>2006 Feb 15</td>
132
-<td>CBS Evening News</td>
133
-<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
134
-Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine appeared on the show to discuss Tor, starting at
135
-1:04 into the video.</td>
136
-</tr>
137
-<tr style="background-color: #e5e5e5;">
138
-<td>2006 Feb 15</td>
139
-<td>CNBC - Closing Bell</td>
140
-<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
141
-</tr>
142
-<tr>
143
-<td>2006 Jan 27</td>
144
-<td>Fox News/eWeek</td>
145
-<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
146
-Anonymizers Suddenly Get Very Popular</a></td>
147
-</tr>
148
-<tr>
149
-<td>2006 Jan 25</td>
150
-<td>New York Times</td>
151
-<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&amp;oref=slogin">
152
-Privacy for People Who Don't Show Their Navels</a></td>
153
-</tr>
154
-<tr style="background-color: #e5e5e5;">
155
-<td>2005 Aug 6</td>
156
-<td>New Scientist</td>
157
-<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td>
158
-</tr>
159
-</table>
160
-
161
-<br/>
162
-
163
-<h2>Articles</h2>
164
-
165
-<p> Since Tor is widely used throughout the world, it is mentioned regularly in the press.
166
-This list is not comprehensive, but illustrates some of the significant
167
-Tor-related stories that have popped up.  </p>
168
-
169
-<table width="100%" cellpadding="3" cellspacing="0">
170
-<thead style="background-color: #e5e5e5;">
171
-<tr>
172
-<th width="10%">Date</th>
173
-<th width="15%">Publication</th>
174
-<th>Topic</th>
175
-</tr>
176
-</thead>
177
-<tr>
178
-<td>2011 February 17</td>
179
-<td>Walpole Times</td>
180
-<td><a
181
-href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-protests">Tor
182
-Project, a Walpole-based company, helps Egyptians avoid Internet censorship during protests</a></td>
183
-</tr>
184
-<tr style="background-color: #e5e5e5;">
185 66
 <td>2011 February 01</td>
186 67
 <td>Discovery News</td>
187 68
 <td><a
188
-href="http://news.discovery.com/tech/egypt-internet-online-protesters-110201.html">Egypt's
69
+href="http://news.discovery.com/tech/egypt-internet-online-protesters-110201.
70
+html">Egypt's
189 71
 Internet Block Incomplete But Damaging</a></td>
190 72
 </tr>
191 73
 <tr>
192 74
 <td>2011 January 31</td>
193 75
 <td>IDG Poland</td>
194 76
 <td><a
195
-href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.szukaja.alternatyw.html">Egipt
77
+href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.szukaja.
78
+alternatyw.html">Egipt
196 79
 blokuje Internet, aktywiści szukają alternatyw</a></td>
197 80
 </tr>
198 81
 <tr style="background-color: #e5e5e5;">
199 82
 <td>2011 January 31</td>
200 83
 <td>New Scientist</td>
201 84
 <td><a
202
-href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains-officially-offli.html">How
85
+href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains-
86
+officially-offli.html">How
203 87
 Egypt is getting online</a></td>
204 88
 </tr>
205 89
 <tr>
206 90
 <td>2011 January 31</td>
207 91
 <td>El Pais</td>
208 92
 <td><a
209
-href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe/fax/elpepuint/20110130elpepuint_14/Tes">Sortear
93
+href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe/fax/
94
+elpepuint/20110130elpepuint_14/Tes">Sortear
210 95
 la censura a golpe de fax</a></td>
211 96
 </tr>
212 97
 <tr style="background-color: #e5e5e5;">
213 98
 <td>2011 January 30</td>
99
+<td>Fox 25 News - Boston</td>
100
+<td><a
101
+href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give-egyptians-internet-access-20110130">Local
102
+company helps give Egyptians internet access</a></td>
103
+</tr>
104
+<tr>
105
+<td>2011 January 30</td>
106
+<td>New England Cable News</td>
107
+<td><a
108
+href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-onlin/landing.html?blockID=400628&feedID=4213">Mass.
109
+company helps activists avoid online government censorship</a></td>
110
+</tr>
111
+<tr style="background-color: #e5e5e5;">
112
+<td>2011 January 30</td>
214 113
 <td>Boston Globe</td>
215 114
 <td><a
216
-href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30/mass_groups_software_helps_avoid_censorship/">Foreign
115
+href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30/
116
+mass_groups_software_helps_avoid_censorship/">Foreign
217 117
 activists stay covered online</a></td>
218 118
 </tr>
219 119
 <tr>
220 120
 <td>2011 January 29</td>
221 121
 <td>SvD.se</td>
222 122
 <td><a
223
-href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-natdissidenter_5902693.svd">Tor
123
+href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-
124
+natdissidenter_5902693.svd">Tor
224 125
 öppnar dörrar för nätdissidenter</a></td>
225 126
 </tr>
226 127
 <tr style="background-color: #e5e5e5;">
227 128
 <td>2011 January 29</td>
228 129
 <td>ComputerWorld</td>
229 130
 <td><a
230
-href="http://www.computerworld.com/s/article/9207058/Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">Without
131
+href="http://www.computerworld.com/s/article/9207058/
132
+Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">Without
231 133
 Internet, Egyptians find new ways to get online.</a></td>
232 134
 </tr>
233 135
 <tr>
234 136
 <td>2011 January 28</td>
235 137
 <td>Globe and Mail</td>
236 138
 <td><a
237
-href="https://www.theglobeandmail.com/news/technology/in-a-span-of-minutes-a-country-goes-offline/article1887207/">In
139
+href="https://www.theglobeandmail.com/news/technology/in-a-span-of-minutes-a-
140
+country-goes-offline/article1887207/">In
238 141
 a span of minutes, a country goes offline</a></td>
239 142
 </tr>
240 143
 <tr style="background-color: #e5e5e5;">
... ...
@@ -254,14 +157,21 @@ Anonymity</a></td>
254 157
 <td>2010 November 03</td>
255 158
 <td>metro sverige</td>
256 159
 <td><a
257
-href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-anonyma-pa-n/">Sida
258
-hjälper utsatta bli anonyma på nätet</a></td>
160
+href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-anonyma-pa-n
161
+/">Sida hjälper utsatta bli anonyma på nätet</a></td>
162
+</tr>
163
+<tr style="background-color: #e5e5e5;">
164
+<td>2010 Sept 17</td>
165
+<td>NPR: On the media</td>
166
+<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
167
+Media: Interview with Jacob Appelbaum</a>.</td>
259 168
 </tr>
260 169
 <tr>
261 170
 <td>2010 August 01</td>
262 171
 <td>PC Format - Poland</td>
263 172
 <td><a
264
-href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
173
+href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-
174
+szpieguj-jak-chroni-prywatno-w-sieci">Google
265 175
 and Facebook are spying on us</a></td>
266 176
 </tr>
267 177
 <tr style="background-color: #e5e5e5;">
... ...
@@ -276,145 +186,214 @@ Ground</a></td>
276 186
 <td>2010 May 25</td>
277 187
 <td>The Australian</td>
278 188
 <td><a
279
-href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466">
189
+href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-
190
+fight-censorship/story-e6frgakx-1225870756466">
280 191
 Call to join Tor network to fight censorship</a></td>
281 192
 </tr>
282 193
 <tr style="background-color: #e5e5e5;">
283 194
 <td>2010 Mar 17</td>
284 195
 <td>PC World Poland</td>
285
-<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity in the Web</a></td>
196
+<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity
197
+in the Web</a></td>
198
+</tr>
199
+<tr>
200
+<td>2010 Mar 11</td>
201
+<td>ABC Australia</td>
202
+<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense:  The Deep Web</a></td>
286 203
 </tr>
287 204
 <tr>
288 205
 <td>2010 Mar 09</td>
289 206
 <td>PC Pro UK</td>
290
-<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">The dark side of the web</a></td>
207
+<td><a
208
+href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">The dark
209
+side of the web</a></td>
291 210
 </tr>
292 211
 <tr style="background-color: #e5e5e5;">
293 212
 <td>2009 Dec 29</td>
294 213
 <td>Times Online</td>
295 214
 <td><a
296
-href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.ece">When
215
+href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.
216
+ece">When
297 217
 Iran’s regime falls this will be remembered as the YouTube revolution </a></td>
298 218
 </tr>
299 219
 <tr>
300 220
 <td>2009 Oct 15</td>
301 221
 <td>Technology Review</td>
302
-<td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down on Tor Anonymity Network</a></td>
222
+<td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down
223
+on Tor Anonymity Network</a></td>
303 224
 </tr>
304 225
 <tr style="background-color: #e5e5e5;">
305 226
 <td>2009 Sep 30</td>
306 227
 <td>BusinessWeek</td>
307
-<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
228
+<td><a
229
+href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.
230
+htm">China's Online Censors Work Overtime</a></td>
308 231
 </tr>
309 232
 <tr>
310 233
 <td>2009 Aug 19</td>
311 234
 <td>Reuters</td>
312
-<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?pageNumber=1&amp;virtualBrandChannel=0&amp;sp=true">Web tools help protect human rights activists</a></td>
235
+<td><a
236
+href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?
237
+pageNumber=1&amp;virtualBrandChannel=0&amp;sp=true">Web tools help protect human
238
+rights activists</a></td>
313 239
 </tr>
314 240
 <tr style="background-color: #e5e5e5;">
315 241
 <td>2009 Aug 10</td>
316 242
 <td>Technology Review</td>
317
-<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How to Build Anonymity Into the Internet</a></td>
243
+<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How
244
+to Build Anonymity Into the Internet</a></td>
318 245
 </tr>
319 246
 <tr>
320 247
 <td>2009 Jul 26</td>
321 248
 <td>Washington Times</td>
322
-<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td>
249
+<td><a
250
+href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-
251
+internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td>
323 252
 </tr>
324 253
 <tr style="background-color: #e5e5e5;">
325 254
 <td>2009 Jul 26</td>
326 255
 <td>Boston Globe</td>
327
-<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed at Iranians</a></td>
256
+<td><a
257
+href="http://www.boston.com/news/nation/washington/articles/2009/07/26/
258
+us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed
259
+at Iranians</a></td>
328 260
 </tr>
329 261
 <tr>
330 262
 <td>2009 Jul 24</td>
331 263
 <td>Associated Press</td>
332
-<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude crackdown on Internet</a></td>
264
+<td><a
265
+href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-
266
+p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude crackdown on
267
+Internet</a></td>
333 268
 </tr>
334 269
 <tr style="background-color: #e5e5e5;">
335 270
 <td>2009 Jul 08</td>
336 271
 <td>Tehran Bureau</td>
337
-<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks Around the Globe Rally to Help Iranians Online</a></td>
272
+<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
273
+Around the Globe Rally to Help Iranians Online</a></td>
274
+</tr>
275
+<tr style="background-color: #e5e5e5;">
276
+<td>2009 Jul 02</td>
277
+<td>NED/CIMA</td>
278
+<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td>
338 279
 </tr>
339 280
 <tr>
340 281
 <td>2009 Jun 26</td>
341 282
 <td>Washington Times</td>
342
-<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid censorship with Navy technology</a></td>
283
+<td><a
284
+href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-
285
+technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid
286
+censorship with Navy technology</a></td>
343 287
 </tr>
344 288
 <tr style="background-color: #e5e5e5;">
345 289
 <td>2009 Jun 29</td>
346 290
 <td>EFF</td>
347
-<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor Relay</a></td>
291
+<td><a
292
+href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-
293
+bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor Relay</a></td>
348 294
 </tr>
349 295
 <tr>
350 296
 <td>2009 Jun 24</td>
351 297
 <td>Daily Finance</td>
352
-<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-controversy/">Nokia and Siemens in Iran controversy</a></td>
298
+<td><a
299
+href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-
300
+controversy/">Nokia and Siemens in Iran controversy</a></td>
353 301
 </tr>
354 302
 <tr style="background-color: #e5e5e5;">
355 303
 <td>2009 Jun 18</td>
356 304
 <td>Wall Street Journal</td>
357
-<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
305
+<td><a
306
+href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web
307
+-use/">Iranians Using Tor to Anonymize Web Use</a></td>
358 308
 </tr>
359 309
 <tr>
360 310
 <td>2009 Jun 19</td>
361 311
 <td>O'Reilly Radar</td>
362
-<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project and the EFF</a></td>
312
+<td><a
313
+href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">
314
+Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project
315
+and the EFF</a></td>
363 316
 </tr>
364 317
 <tr style="background-color: #e5e5e5;">
365 318
 <td>2009 Jun 18</td>
366 319
 <td>Deutsche Welle</td>
367
-<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet proxies let Iranians and others connect to blocked Web sites</a></td>
320
+<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet
321
+proxies let Iranians and others connect to blocked Web sites</a></td>
368 322
 </tr>
369 323
 <tr>
370 324
 <td>2009 Jun 18</td>
371 325
 <td>Technology Review</td>
372
-<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the Republic of Iran</a></td>
326
+<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the
327
+Republic of Iran</a></td>
373 328
 </tr>
374 329
 <tr style="background-color: #e5e5e5;">
375 330
 <td>2009 Jun 17</td>
376 331
 <td>CNet News</td>
377
-<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find ways to bypass Net censors</a></td>
332
+<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find
333
+ways to bypass Net censors</a></td>
378 334
 </tr>
379 335
 <tr>
380 336
 <td>2009 Jun 17</td>
381 337
 <td>ComputerWorld</td>
382
-<td><a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9134471&amp;intsrc=news_ts_head">Iran's leaders fight Internet; Internet wins (so far)</a></td>
338
+<td><a
339
+href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&
340
+amp;articleId=9134471&amp;intsrc=news_ts_head">Iran's leaders fight Internet;
341
+Internet wins (so far)</a></td>
383 342
 </tr>
384 343
 <tr style="background-color: #e5e5e5;">
385 344
 <td>2009 May 29</td>
386 345
 <td>Le Monde</td>
387
-<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
346
+<td><a
347
+href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-
348
+net_1199993_3236.html">Les censeurs du Net</a></td>
388 349
 </tr>
389 350
 <tr>
390 351
 <td>2009 May 15</td>
391 352
 <td>Mass High Tech</td>
392
-<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net privacy</a></td>
353
+<td><a
354
+href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net
355
+-privacy-game-makers-flock-to-Hub.html">Tor tackles Net privacy</a></td>
393 356
 </tr>
394 357
 <tr style="background-color: #e5e5e5;">
395 358
 <td>2009 May 01</td>
396 359
 <td>New York Times</td>
397
-<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and Others Outwit Net Censors</a></td>
360
+<td><a
361
+href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and
362
+Others Outwit Net Censors</a></td>
398 363
 </tr>
399 364
 <tr>
400 365
 <td>2009 Apr 23</td>
401 366
 <td>Technology Review</td>
402
-<td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made Safer:  How anonymity technology could save free speech on the Internet.</a></td>
367
+<td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made
368
+Safer:  How anonymity technology could save free speech on the
369
+Internet.</a></td>
403 370
 </tr>
404 371
 <tr style="background-color: #e5e5e5;">
405 372
 <td>2009 Apr 22</td>
406 373
 <td>Le Monde</td>
407
-<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</a></td>
374
+<td><a
375
+href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-
376
+cybersurveillance/">How to circumvent cybersurveillance</a></td>
408 377
 </tr>
409 378
 <tr>
410 379
 <td>2009 Apr 06</td>
411 380
 <td>Reader's Digest</td>
412
-<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">How to Hide Anything</a></td>
381
+<td><a
382
+href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.
383
+html">How to Hide Anything</a></td>
384
+</tr>
385
+<tr>
386
+<td>2009 Apr 06</td>
387
+<td>Al Jazeera</td>
388
+<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
389
+Voices showcases Tor</a></td>
413 390
 </tr>
414 391
 <tr style="background-color: #e5e5e5;">
415 392
 <td>2009 Mar 18</td>
416 393
 <td>Marie Claire</td>
417
-<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td>
394
+<td><a
395
+href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-
396
+image">How to Manage Your Web Footprint</a></td>
418 397
 </tr>
419 398
 <tr>
420 399
 <td>2009 Mar 13</td>
... ...
@@ -424,16 +403,35 @@ href="http://online.wsj.com/article/SB123567809587886053.html">The
424 403
 Kindness of Strangers</a></td>
425 404
 </tr>
426 405
 <tr style="background-color: #e5e5e5;">
406
+<td>2009 Mar 12</td>
407
+<td>BBC World Service</td>
408
+<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about Tor and Censorship</a></td>
409
+</tr>
410
+<tr style="background-color: #e5e5e5;">
427 411
 <td>2009 Mar 03</td>
428 412
 <td>Orf Austria</td>
429
-<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER column</a></td>
413
+<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER
414
+column</a></td>
430 415
 </tr>
431 416
 <tr>
432 417
 <td>2009 Feb 18</td>
433 418
 <td>Bangkok Post</td>
434
-<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine">The old fake "404 not found" routine</a></td>
419
+<td><a
420
+href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-
421
+routine">The old fake "404 not found" routine</a></td>
422
+</tr>
423
+<tr>
424
+<td>2009 Feb 13</td>
425
+<td>Hearsay Culture</td>
426
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td>
435 427
 </tr>
436 428
 <tr style="background-color: #e5e5e5;">
429
+<td>2008 Dec 29</td>
430
+<td>nu.nl</td>
431
+<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td>
432
+</tr>
433
+<tr>
434
+<tr style="background-color: #e5e5e5;">
437 435
 <td>2008 Dec 14</td>
438 436
 <td>PC Magazine: Middle &amp; Near East</td>
439 437
 <td><a
... ...
@@ -451,29 +449,34 @@ Internet filtering and censorship rife</a></td>
451 449
 <td>2008 Aug 22</td>
452 450
 <td>The Sydney Morning Herald</td>
453 451
 <td><a
454
-href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The
452
+href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889
453
+.html">The
455 454
 China Syndrome</a></td>
456 455
 </tr>
457 456
 <tr>
458 457
 <td>2008 Aug 20</td>
459 458
 <td>Scientific American</td>
460 459
 <td><a
461
-href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography:
460
+href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-
461
+safe">Cryptography:
462 462
 How to Keep Your Secrets Safe</a></td>
463 463
 </tr>
464 464
 <tr style="background-color: #e5e5e5;">
465 465
 <td>2008 Aug 05</td>
466 466
 <td>Guardian UK</td>
467 467
 <td><a
468
-href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting
468
+href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">
469
+Vaulting
469 470
 the great firewall</a></td>
470 471
 </tr>
471 472
 <tr>
472 473
 <td>2008 Aug 10</td>
473 474
 <td>Tech Radar UK</td>
474 475
 <td><a
475
-href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom
476
-Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a>
476
+href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-
477
+chinese-net-censorship-449233">Freedom
478
+Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing
479
+for the paranoid</a>
477 480
 </td>
478 481
 </tr>
479 482
 <tr style="background-color: #e5e5e5;">
... ...
@@ -488,7 +491,8 @@ gegen Zensur und Überwachung</a>
488 491
 <td>2008 Aug 07</td>
489 492
 <td>PC World</td>
490 493
 <td><a
491
-href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15
494
+href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.
495
+html">15
492 496
 Great, Free Privacy Downloads</a>.  Tor is Number 1.
493 497
 </td>
494 498
 </tr>
... ...
@@ -512,16 +516,21 @@ hackers poke hole in great firewall of China</a>
512 516
 <td>2008 May 24</td>
513 517
 <td>Groupo Estado</td>
514 518
 <td><a
515
-href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&amp;more=1&amp;c=1&amp;tb=1&amp;pb=1&amp;cat=525">Interview
519
+href="http://blog.estadao.com.br/blog/cruz/?title=
520
+cfp08_navegacao_anonima_na_rede&amp;more=1&amp;c=1&amp;tb=1&amp;pb=1&amp;cat=
521
+525">Interview
516 522
 at Computers, Freedom, and Privacy 2008 Conference</a>
517 523
 </td>
518 524
 </tr>
519 525
 <tr style="background-color: #e5e5e5;">
520 526
 <td>2008 Mar 12</td>
521 527
 <td>SearchSecurity.com</td>
522
-<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">
528
+<td><a
529
+href="http://searchsecurity.techtarget.com/news/article/0,289142,
530
+sid14_gci1305120,00.html">
523 531
 Tor network 'bridges' help evade blockers</a>.
524
-Covers new Tor features designed to overcome filtering and blocking that prevent access
532
+Covers new Tor features designed to overcome filtering and blocking that prevent
533
+access
525 534
 to the Tor network.
526 535
 </td>
527 536
 </tr>
... ...
@@ -538,571 +547,337 @@ How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
538 547
 <td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
539 548
 Hackers Can Expose Masked Surfers, Study Says</a>
540 549
 A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
541
-Steven Murdoch's recent PhD thesis</a>. Steven <a
542
-href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
550
+Steven Murdoch's recent PhD thesis</a>. Steven <a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
543 551
 responds on the Tor Blog</a>.</td>
544 552
 </tr>
545 553
 <tr style="background-color: #e5e5e5;">
546 554
 <td>2007 Sep 21</td>
547 555
 <td>Wired HowTo Blog</td>
548
-<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
549
-Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.
550
-</td>
556
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.</td>
551 557
 </tr>
552
-
553 558
 <tr>
554 559
 <td>2007 Sep 16</td>
555 560
 <td>Cnet</td>
556
-<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">
557
-    Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized
558
-    their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>.
559
-    We have an <a href="<page docs/faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>">
560
-    Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.
561
-  </td>
561
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>.  We have an <a href="<page docs/faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.</td>
562 562
 </tr>
563
-
564 563
 <tr style="background-color: #e5e5e5;">
565 564
 <td>2007 Sep 10</td>
566 565
 <td>Wired</td>
567
-<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
568
-Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/>
569
-Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node
570
-he was running, then published unencrypted account and password information.
571
-Note that the better articles covering this event correctly indicate that this is not a security
572
-flaw or design problem with Tor - Tor provides anonymity, but does not
573
-encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while
574
-browsing to ensure end-to-end encryption.
575
-Also covered in
576
-<a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
577
-The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
578
-InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
579
-The Sydney Morning Herald</a>,
580
-<a href="http://www.securityfocus.com/news/11486">
581
-Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
582
-ars technica</a>, and many others. It was reported as early as August 31, 2007 on the
583
-<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
584
-Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.
585
-In the end, Mr. Egerstad was arrested, which was covered by
586
-<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
587
-The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
588
-The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900">
589
-ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.
590
-</td>
566
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information.  Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption.  Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.  In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.</td>
591 567
 </tr>
592
-
593 568
 <tr>
594 569
 <td>2007 Jul 27</td>
595 570
 <td>Wired Blog</td>
596
-<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br/>
597
-A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
598
-blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
599
-at the bottom of the article.
600
-</td>
571
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br/> A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"> blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply at the bottom of the article.</td>
601 572
 </tr>
602
-
603 573
 <tr style="background-color: #e5e5e5;">
604 574
 <td>2007 Jun 22</td>
605 575
 <td>Bangkok Post</td>
606
-<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
607
-The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
608
-</td>
576
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388"> The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.</td>
609 577
 </tr>
610
-
611 578
 <tr>
612 579
 <td>2007 Mar 15</td>
613 580
 <td>World Changing</td>
614
-<td><a href="http://www.worldchanging.com/archives/006309.html">
615
-Blogging Where Speech Isn’t Free</a><br/>
616
-Coverage of former Tor Executive Director Shava Nerad's participation at an
617
-<a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&amp;id=IAP060124">
618
-SXSW panel</a>, where she explained how Tor can help bloggers.
619
-</td>
581
+<td><a href="http://www.worldchanging.com/archives/006309.html"> Blogging Where Speech Isn’t Free</a><br/> Coverage of former Tor Executive Director Shava Nerad's participation at an <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&amp;id=IAP060124"> SXSW panel</a>, where she explained how Tor can help bloggers.</td>
620 582
 </tr>
621
-
622 583
 <tr style="background-color: #e5e5e5;">
623 584
 <td>2007 Mar 8</td>
624 585
 <td>Security Focus</td>
625
-<td><a href="http://www.securityfocus.com/news/11447/1">
626
-Tor hack proposed to catch criminals</a>.
627
-Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the
628
-Tor Project illustrating why this approach may not be a good idea.
629
-</td>
586
+<td><a href="http://www.securityfocus.com/news/11447/1"> Tor hack proposed to catch criminals</a>.  Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the Tor Project illustrating why this approach may not be a good idea.</td>
630 587
 </tr>
631
-
632 588
 <tr>
633 589
 <td>2007 Feb 1</td>
634 590
 <td>Dr Dobb's</td>
635
-<td><a href="http://www.ddj.com/security/197002414">
636
-Tor Project Protects Anonymous Sources</a>.
637
-An introduction to Tor, including technical and historical background.
638
-</td>
591
+<td><a href="http://www.ddj.com/security/197002414"> Tor Project Protects Anonymous Sources</a>.  An introduction to Tor, including technical and historical background. </td>
639 592
 </tr>
640
-
641 593
 <tr style="background-color: #e5e5e5;">
642 594
 <td>2006 Oct 19</td>
643 595
 <td>Wired Threat Level</td>
644
-<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
645
-The Onion Router (TOR) is Leaky (Leeky)</a>.
646
-Explains why you need something like Privoxy
647
-in addition to the core Tor code to ensure your anonymity. If you use the
648
-Vidalia bundle, it installs and configures Privoxy automatically, but it can't
649
-hurt to understand why it is necessary.
650
-</td>
596
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html"> The Onion Router (TOR) is Leaky (Leeky)</a>.  Explains why you need something like Privoxy in addition to the core Tor code to ensure your anonymity. If you use the Vidalia bundle, it installs and configures Privoxy automatically, but it can't hurt to understand why it is necessary.</td>
651 597
 </tr>
652
-
653 598
 <tr>
654 599
 <td>2006 Aug 18</td>
655 600
 <td>NPR</td>
656
-<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
657
-Tips for Protecting Privacy Online</a>.
658
-Kevin Bankston of the EFF recommends Tor during an NPR interview.
659
-Tor information begins at 8:15 into the program.
660
-</td>
601
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Tips for Protecting Privacy Online</a>.  Kevin Bankston of the EFF recommends Tor during an NPR interview.  Tor information begins at 8:15 into the program.</td>
661 602
 </tr>
662
-
663 603
 <tr style="background-color: #e5e5e5;">
664 604
 <td>2006 Jul 5</td>
665 605
 <td>MSNBC</td>
666
-<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/">
667
-Defending liberties in high-tech world</a>.
668
-Mentions EFF funding for Tor as one of its significant nonlitigation projects.
669
-</td>
606
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> Defending liberties in high-tech world</a>.  Mentions EFF funding for Tor as one of its significant nonlitigation projects.</td>
607
+</tr>
608
+<td>2006 Apr 11</td>
609
+<td>PBS Frontline</td>
610
+<td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">Chipping Away at China's Great Firewall</a></td>
611
+</tr>
612
+<tr style="background-color: #e5e5e5;">
613
+<td>2006 Feb 28</td>
614
+<td>PC World</td>
615
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">Outsmarting the Online Privacy Snoops</a></td>
670 616
 </tr>
671
-
672 617
 <tr>
673
-  <td>
674
-    2006 Feb 15
675
-  </td>
676
-  <td>
677
-    Network Secure</td>
678
-    <td><a href="http://www.network-secure.de/index.php?option=com_content&amp;task=view&amp;id=3909">
679
-    Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br/>
680
-  </td>
618
+<td>2006 Feb 27</td>
619
+<td>Forbes</td>
620
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Cracks In the Wall</a>.  Discussion of Tor being used for evading censorship by repressive governments.</td>
681 621
 </tr>
682
-
683 622
 <tr style="background-color: #e5e5e5;">
684
-  <td>
685
-    2006 Feb 13
686
-  </td>
687
-  <td>
688
-    Wall Street Journal</td>
689
-<td>    <a href="http://online.wsj.com/article/SB113979965346572150.html">
690
-    Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br/>
691
-    Full article text can also be found
692
-    <a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.
693
-  </td>
623
+<td>2006 Feb 20</td>
624
+<td>The Boston Globe</td>
625
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> Beating censorship on the Internet</a></td>
694 626
 </tr>
695
-
696 627
 <tr>
697
-  <td>
698
-    2006 Jan 31
699
-  </td>
700
-  <td>
701
-    Technology Review</td>
702
-<td>    <a href="http://www.technologyreview.com/Infotech/16216/page2/">
703
-    Evading the Google Eye</a><br/>
704
-  </td>
628
+<td>2006 Feb 15</td>
629
+<td>CBS Evening News</td>
630
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine appeared on the show to discuss Tor, starting at 1:04 into the video.</td>
705 631
 </tr>
706
-
707 632
 <tr style="background-color: #e5e5e5;">
708
-  <td>
709
-    2006 Jan 29
710
-  </td>
711
-  <td>
712
-    New York Times</td>
713
-<td>    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
714
-    How to Outwit the World's Internet Censors</a><br/>
715
-  </td>
633
+<td>2006 Feb 15</td>
634
+<td>CNBC - Closing Bell</td>
635
+<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
716 636
 </tr>
717
-
718 637
 <tr>
719
-  <td>
720
-    2006 Jan 23
721
-  </td>
722
-  <td>
723
-    NPR Talk of the Nation</td>
724
-<td>    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
725
-    Search Engines and Privacy Rights on the Web</a><br/>
726
-    <a href="http://xeni.net/">Xeni Jardin</a>
727
-    recommends Tor at 33:30 into the program.
728
-  </td>
638
+<td>2006 Feb 15</td>
639
+<td>Network Secure</td>
640
+<td><a href="http://www.network-secure.de/index.php?option=com_content&amp;task=view&amp;id=3909">Tor: Anonymisierungswerkzeug entwickelt</a> (German)</td>
641
+</tr>
642
+<tr style="background-color: #e5e5e5;">
643
+<td>2006 Feb 13</td>
644
+<td>Wall Street Journal</td>
645
+<td><a href="http://online.wsj.com/article/SB113979965346572150.html"> Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a>Full article text can also be found
646
+<a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.</td>
647
+</tr>
648
+<tr>
649
+<td>2006 Jan 31</td>
650
+<td>Technology Review</td>
651
+<td><a href="http://www.technologyreview.com/Infotech/16216/page2/">Evading the Google Eye</a></td>
652
+</tr>
653
+<tr style="background-color: #e5e5e5;">
654
+<td>2006 Jan 29</td>
655
+<td>New York Times</td>
656
+<td><a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> How to Outwit the World's Internet Censors</a></td>
657
+</tr>
658
+<tr>
659
+<td>2006 Jan 27</td>
660
+<td>Fox News/eWeek</td>
661
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web Anonymizers Suddenly Get Very Popular</a></td>
662
+</tr>
663
+<tr>
664
+<td>2006 Jan 25</td>
665
+<td>New York Times</td>
666
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&amp;oref=slogin"> Privacy for People Who Don't Show Their Navels</a></td>
667
+</tr>
668
+<tr>
669
+<td>2006 Jan 23</td>
670
+<td>NPR Talk of the Nation</td>
671
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456"> Search Engines and Privacy Rights on the Web</a><br/> <a href="http://xeni.net/">Xeni Jardin</a> recommends Tor at 33:30 into the program.</td>
729 672
 </tr>
730 673
 
731 674
 <tr style="background-color: #e5e5e5;">
732
-  <td>
733
-    2006 Feb 15
734
-  </td>
735
-  <td>
736
-    Punto Informatico</td>
737
-<td>    <a href="http://punto-informatico.it/p.aspx?i=1430903">
738
-    TOR c'è</a> (Italian)<br/>
739
-  </td>
675
+<td>2006 Feb 15</td>
676
+<td>Punto Informatico</td>
677
+<td><a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a> (Italian)</td>
740 678
 </tr>
741 679
 
742 680
 <tr>
743
-  <td>
744
-    2006 Jan 20
745
-  </td>
746
-  <td>
747
-    Wired</td>
748
-<td>    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
749
-    How to Foil Search Engine Snoops</a><br/>
750
-  </td>
681
+<td>2006 Jan 20</td>
682
+<td>Wired</td>
683
+<td><a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2"> How to Foil Search Engine Snoops</a></td>
751 684
 </tr>
752 685
 
753 686
 <tr style="background-color: #e5e5e5;">
754
-  <td>
755
-    2006 Jan 20
756
-  </td>
757
-  <td>
758
-    NPR</td>
759
-<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
760
-    Google Records Subpoena Raises Privacy Fears</a><br/>
761
-  </td>
687
+<td>2006 Jan 20</td>
688
+<td>NPR</td>
689
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854"> Google Records Subpoena Raises Privacy Fears</a></td>
762 690
 </tr>
763 691
 
764 692
 <tr>
765
-  <td>
766
-    2005 Sep 30
767
-  </td>
768
-  <td>
769
-    Viva o Linux</td>
770
-   <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
771
-    TOR: A Internet sem rastreabilidade</a> (Portuguese)<br/>
772
-  </td>
693
+<td>2005 Sep 30</td>
694
+<td>Viva o Linux</td>
695
+<td><a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759"> TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
773 696
 </tr>
774
-
775 697
 <tr style="background-color: #e5e5e5;">
776
-  <td>
777
-    2005 Jul 12
778
-  </td>
779
-  <td>
780
-    IEEE Computer Society's Technical Committee on Security and Privacy</td>
781
-<td>    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
782
-    Onion routing application Tor makes PCWorld's top 100</a><br/>
783
-  </td>
698
+<td>2005 Aug 6</td>
699
+<td>New Scientist</td>
700
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td>
701
+</tr>
702
+<tr style="background-color: #e5e5e5;">
703
+<td>2005 Jul 12</td>
704
+<td>IEEE Computer Society's Technical Committee on Security and Privacy</td>
705
+<td><a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR"> Onion routing application Tor makes PCWorld's top 100</a></td>
784 706
 </tr>
785 707
 
786 708
 <tr>
787
-  <td>
788
-    2005 Jun 22
789
-  </td>
790
-  <td>
791
-    The Unofficial Apple Blog</td>
792
-<td>    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
793
-    Privacy Watch: Tor</a><br/>
794
-  </td>
709
+<td>2005 Jun 22</td>
710
+<td>The Unofficial Apple Blog</td>
711
+<td><a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> Privacy Watch: Tor</a></td>
795 712
 </tr>
796 713
 
797 714
 <tr style="background-color: #e5e5e5;">
798
-  <td>
799
-    2005 Jun 10
800
-  </td>
801
-  <td>
802
-    The New Zealand Herald</td>
803
-<td>    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=10329896">
804
-    China's internet censorship stranglehold can't last</a><br/>
805
-  </td>
715
+<td>2005 Jun 10</td>
716
+<td>The New Zealand Herald</td>
717
+<td><a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=10329896"> China's internet censorship stranglehold can't last</a></td>
806 718
 </tr>
807 719
 
808 720
 <tr>
809
-  <td>
810
-    2005 Jun 8
811
-  </td>
812
-  <td>
813
-    American Public Radio</td>
814
-<td>    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
815
-    An Internet privacy tool called "Tor"</a><br/>
816
-  </td>
721
+<td>2005 Jun 8</td>
722
+<td>American Public Radio</td>
723
+<td><a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml"> An Internet privacy tool called "Tor"</a></td>
817 724
 </tr>
818 725
 
819 726
 <tr style="background-color: #e5e5e5;">
820
-  <td>
821
-    2005 Jun 1
822
-  </td>
823
-  <td>
824
-    PC World</td>
825
-<td>    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
826
-    The 100 Best Products of 2005</a><br/>
827
-    Tor is ranked #40 on the list.
828
-  </td>
727
+<td>2005 Jun 1</td>
728
+<td>PC World</td>
729
+<td><a href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The 100 Best Products of 2005</a><br/> Tor is ranked #40 on the list. </td>
829 730
 </tr>
830 731
 
831 732
 <tr>
832
-  <td>
833
-    2005 Jun 1
834
-  </td>
835
-  <td>
836
-    Linux Weekly News</td>
837
-<td>    <a href="http://lwn.net/Articles/138242/">
838
-    A Look at The Onion Router (Tor)</a><br/>
839
-  </td>
733
+<td>2005 Jun 1</td>
734
+<td>Linux Weekly News</td>
735
+<td><a href="http://lwn.net/Articles/138242/"> A Look at The Onion Router (Tor)</a></td>
840 736
 </tr>
841 737
 
842 738
 <tr style="background-color: #e5e5e5;">
843
-  <td>
844
-    2005 May 22
845
-  </td>
846
-  <td>
847
-    Slashdot</td>
848
-<td>    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
849
-     Tor Anonymity Network Reaches 100 Verified Nodes</a><br/>
850
-  </td>
739
+<td>2005 May 22</td>
740
+<td>Slashdot</td>
741
+<td><a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244"> Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
851 742
 </tr>
852 743
 
853 744
 <tr>
854
-  <td>
855
-    2005 May 20
856
-  </td>
857
-  <td>
858
-    Security.uz</td>
859
-<td>    <a href="http://security.uz/news/default.asp?id=10541">
860
-    Tor - мощный анонимайзер для всех ОС</a> (Russian)<br/>
861
-  </td>
745
+<td>2005 May 20</td>
746
+<td>Security.uz</td>
747
+<td><a href="http://security.uz/news/default.asp?id=10541"> Tor - мощный анонимайзер для всех ОС</a> (Russian)</td>
862 748
 </tr>
863 749
 
864 750
 <tr style="background-color: #e5e5e5;">
865
-  <td>
866
-    2005 May 19
867
-  </td>
868
-  <td>
869
-    WebPlanet</td>
870
-<td>    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
871
-    Tor: распределенная система анонимного серфинга</a> (Russian)<br/>
872
-  </td>
751
+<td>2005 May 19</td>
752
+<td>WebPlanet</td>
753
+<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor: распределенная система анонимного серфинга</a> (Russian)</td>
873 754
 </tr>
874 755
 
875 756
 <tr>
876
-  <td>
877
-    2005 May 17
878
-  </td>
879
-  <td>
880
-    Wired</td>
881
-<td>    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
882
-    Tor Torches Online Tracking</a><br/>
883
-    Also available in
884
-    <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.
885
-  </td>
757
+<td>2005 May 17</td>
758
+<td>Wired</td>
759
+<td><a
760
+href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all"> Tor Torches Online Tracking</a>. Also available in <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.</td>
886 761
 </tr>
887 762
 
888 763
 <tr style="background-color: #e5e5e5;">
889
-  <td>
890
-    2005 May 17
891
-  </td>
892
-  <td>
893
-    XBiz</td>
894
-<td>    <a href="http://xbiz.com/news/8761">
895
-    Navy Project Allows Anonymous Browsing</a><br/>
896
-  </td>
764
+<td>2005 May 17</td>
765
+<td>XBiz</td>
766
+<td><a href="http://xbiz.com/news/8761"> Navy Project Allows Anonymous Browsing</a></td>
897 767
 </tr>
898 768
 
899 769
 <tr>
900
-  <td>
901
-    2005 Apr 13
902
-  </td>
903
-  <td>
904
-    Heise online</td>
905
-<td>    <a href="http://www.heise.de/newsticker/meldung/58506">
906
-    CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br/>
907
-  </td>
770
+<td>2005 Apr 13</td>
771
+<td>Heise online</td>
772
+<td><a href="http://www.heise.de/newsticker/meldung/58506"> CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)</td>
908 773
 </tr>
909 774
 
910 775
 <tr style="background-color: #e5e5e5;">
911
-  <td>
912
-    2005 Apr 5
913
-  </td>
914
-  <td>
915
-    Libero</td>
916
-<td>    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
917
-    Anonimato on line, ecco Tor</a> (Italian)<br/>
918
-  </td>
776
+<td>2005 Apr 5</td>
777
+<td>Libero</td>
778
+<td><a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml"> Anonimato on line, ecco Tor</a> (Italian)</td>
919 779
 </tr>
920 780
 
921 781
 <tr>
922
-  <td>
923
-    2005 Jan 4
924
-  </td>
925
-  <td>
926
-    Internetnews</td>
927
-<td>    <a href="http://www.internetnews.com/dev-news/article.php/3454521">
928
-    EFF Throws Support to 'Anonymous' Internet Project</a><br/>
929
-  </td>
782
+<td>2005 Jan 4</td>
783
+<td>Internetnews</td>
784
+<td><a href="http://www.internetnews.com/dev-news/article.php/3454521"> EFF Throws Support to 'Anonymous' Internet Project</a></td>
930 785
 </tr>
931 786
 
932 787
 <tr style="background-color: #e5e5e5;">
933
-  <td>
934
-    2005 Mar 31
935
-  </td>
936
-  <td>
937
-    Linux.com</td>
938
-<td>    <a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78">
939
-    Securing your online privacy with Tor</a><br/>
940
-  </td>
788
+<td>2005 Mar 31</td>
789
+<td>Linux.com</td>
790
+<td><a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78"> Securing your online privacy with Tor</a></td>
941 791
 </tr>
942 792
 
943 793
 <tr>
944
-  <td>
945
-    2004 Dec 27
946
-  </td>
947
-  <td>
948
-    BoingBoing</td>
949
-<td>    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
950
-    EFF helping produce anonymizing software</a><br/>
951
-  </td>
794
+<td>2004 Dec 27</td>
795
+<td>BoingBoing</td>
796
+<td><a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html"> EFF helping produce anonymizing software</a></td>
952 797
 </tr>
953 798
 
954 799
 <tr style="background-color: #e5e5e5;">
955
-  <td>
956
-    2004 Dec 25
957
-  </td>
958
-  <td>
959
-    Kansas City infozine</td>
960
-<td>    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
961
-    EFF Joins Forces with Tor Software Project</a><br/>
962
-  </td>
800
+<td>2004 Dec 25</td>
801
+<td>Kansas City infozine</td>
802
+<td><a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/"> EFF Joins Forces with Tor Software Project</a></td>
963 803
 </tr>
964 804
 
965 805
 <tr>
966
-  <td>
967
-    2004 Dec 23
968
-  </td>
969
-  <td>
970
-    golem.de</td>
971
-<td>    <a href="http://www.golem.de/0412/35340.html">
972
-    EFF unterstützt Anonymisierer Tor</a> (German)<br/>
973
-  </td>
806
+<td>2004 Dec 23</td>
807
+<td>golem.de</td>
808
+<td><a href="http://www.golem.de/0412/35340.html"> EFF unterstützt Anonymisierer Tor</a> (German)</td>
974 809
 </tr>
975 810
 
976 811
 <tr style="background-color: #e5e5e5;">
977
-  <td>
978
-    2004 Dec 23
979
-  </td>
980
-  <td>
981
-    SuicideGirls</td>
982
-<td>    <a href="http://suicidegirls.com/news/technology/6150/">
983
-    New Routing Software Allows Anonymous Internet Use</a><br/>
984
-  </td>
812
+<td>2004 Dec 23</td>
813
+<td>SuicideGirls</td>
814
+<td><a href="http://suicidegirls.com/news/technology/6150/"> New Routing Software Allows Anonymous Internet Use</a></td>
985 815
 </tr>
986 816
 
987 817
 <tr>
988
-  <td>
989
-    2004 Dec 18
990
-  </td>
991
-  <td>
992
-    P2Pnet</td>
993
-<td>    <a href="http://p2pnet.net/story/3357">
994
-    EFF to sponsor Tor</a><br/>
995
-  </td>
818
+<td>2004 Dec 18</td>
819
+<td>P2Pnet</td>
820
+<td><a href="http://p2pnet.net/story/3357"> EFF to sponsor Tor</a></td>
996 821
 </tr>
997 822
 
998 823
 <tr style="background-color: #e5e5e5;">
999
-  <td>
1000
-    2004 Dec 22
1001
-  </td>
1002
-  <td>
1003
-    Slashdot</td>
1004
-<td>    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95&amp;tid=158&amp;tid=153&amp;tid=17">
1005
-     EFF Promotes Freenet-like System Tor</a><br/>
1006
-  </td>
824
+<td>2004 Dec 22</td>
825
+<td>Slashdot</td>
826
+<td><a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95&amp;tid=158&amp;tid=153&amp;tid=17"> EFF Promotes Freenet-like System Tor</a></td>
1007 827
 </tr>
1008 828
 
1009 829
 <tr>
1010
-  <td>
1011
-    2004 Nov 16
1012
-  </td>
1013
-  <td>
1014
-    AlterNet</td>
1015
-<td>    <a href="http://www.alternet.org/columnists/story/20523/">
1016
-    Heavy Traffic</a><br/>
1017
-  </td>
830
+<td>2004 Nov 16</td>
831
+<td>AlterNet</td>
832
+<td><a href="http://www.alternet.org/columnists/story/20523/"> Heavy Traffic</a></td>
1018 833
 </tr>
1019 834
 
1020 835
 <tr style="background-color: #e5e5e5;">
1021
-  <td>
1022
-    2004 Aug 30
1023
-  </td>
1024
-  <td>
1025
-    Newsweek</td>
1026
-<td>    Technology: Instant Security (no link)<br/>
1027
-  </td>
836
+<td>2004 Aug 30</td>
837
+<td>Newsweek</td>
838
+<td>Technology: Instant Security (no link)</td>
1028 839
 </tr>
1029 840
 
1030 841
 <tr>
1031
-  <td>
1032
-    2004 Aug 16
1033
-  </td>
1034
-  <td>
1035
-    Eweek</td>
1036
-<td>    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
1037
-    Don't Fear Internet Anonymity Tools</a><br/>
1038
-  </td>
842
+<td>2004 Aug 16</td>
843
+<td>Eweek</td>
844
+<td><a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/"> Don't Fear Internet Anonymity Tools</a></td>
1039 845
 </tr>
1040 846
 
1041 847
 <tr style="background-color: #e5e5e5;">
1042
-  <td>
1043
-    2004 Aug 6
1044
-  </td>
1045
-  <td>
1046
-    HCC magazine</td>
1047
-<td>    <a href="http://www.hcc.nl/eCache/DEF/21/083.html">
1048
-    Anoniem surfen met hulp van marine VS</a> (Dutch)<br/>
1049
-  </td>
848
+<td>2004 Aug 6</td>
849
+<td>HCC magazine</td>
850
+<td><a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen met hulp van marine VS</a> (Dutch)</td>
1050 851
 </tr>
1051 852
 
1052 853
 <tr>
1053
-  <td>
1054
-    2004 Aug 6
1055
-  </td>
1056
-  <td>
1057
-    Golem</td>
1058
-<td>    <a href="http://www.golem.de/0408/32835.html">
1059
-    Tor: Anonymisierer nutzt Onion-Routing</a><br/>
1060
-  </td>
854
+<td>2004 Aug 6</td>
855
+<td>Golem</td>
856
+<td><a href="http://www.golem.de/0408/32835.html"> Tor: Anonymisierer nutzt Onion-Routing</a></td>
1061 857
 </tr>
1062 858
 
1063 859
 <tr style="background-color: #e5e5e5;">
1064
-  <td>
1065
-    2004 Aug 5
1066
-  </td>
1067
-  <td>
1068
-    Network World Security</td>
1069
-<td>    <a href="http://www.networkworld.com/details/7088.html">
1070
-    Onion routing</a><br/>
1071
-  </td>
860
+<td>2004 Aug 5</td>
861
+<td>Network World Security</td>
862
+<td><a href="http://www.networkworld.com/details/7088.html"> Onion routing</a></td>
1072 863
 </tr>
1073 864
 
1074 865
 <tr>
1075
-  <td>
1076
-    2004 May 8
1077
-  </td>
1078
-  <td>
1079
-    Wired</td>
1080
-<td>    <a href="http://www.wired.com/politics/security/news/2004/08/64464">
1081
-    Onion Routing Averts Prying Eyes</a><br/>
1082
-    Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.
1083
-  </td>
866
+<td>2004 May 8</td>
867
+<td>Wired</td>
868
+<td><a href="http://www.wired.com/politics/security/news/2004/08/64464"> Onion Routing Averts Prying Eyes</a>. Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.</td>
1084 869
 </tr>
1085 870
 
1086 871
 <tr style="background-color: #e5e5e5;">
1087
-  <td>
1088
-    2004 Mar 8
1089
-  </td>
1090
-  <td>
1091
-    CNET Japan blog</td>
1092
-<td>    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
1093
-    Yearning of hackers and insecurity</a> (Japanese)<br/>
1094
-  </td>
872
+<td>2004 Mar 8</td>
873
+<td>CNET Japan blog</td>
874
+<td><a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/"> Yearning of hackers and insecurity</a> (Japanese)</td>
1095 875
 </tr>
1096 876
 
1097 877
 <tr>
1098
-  <td>
1099
-    1999 Apr 13
1100
-  </td>
1101
-  <td>
1102
-    Wired</td>
1103
-<td>    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
1104
-    Anonymous Web Surfing? Uh-Uh</a><br/>
1105
-  </td>
878
+<td>1999 Apr 13</td>
879
+<td>Wired</td>
880
+<td><a href="http://www.wired.com/science/discoveries/news/1999/04/19091"> Anonymous Web Surfing? Uh-Uh</a></td>
1106 881
 </tr>
1107 882
 
1108 883
 </table>
1109 884