Andrew Lewman commited on 2008-08-12 02:58:55
Zeige 1 geänderte Dateien mit 56 Einfügungen und 58 Löschungen.
... | ... |
@@ -24,95 +24,44 @@ Some samples: </p> |
24 | 24 |
</thead> |
25 | 25 |
|
26 | 26 |
<tr> |
27 |
-<td>2008 Aug 10</td> |
|
28 |
-<td>Tech Radar UK</td> |
|
29 |
-<td><a |
|
30 |
-href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom |
|
31 |
-Stick highlights Chinese 'net censorship: USB drive promises anonymous |
|
32 |
-surfing for the paranoid</a> |
|
33 |
-</td> |
|
34 |
-</tr> |
|
35 |
-<tr> |
|
36 |
-<td>2008 Aug 07</td> |
|
37 |
-<td>Spiegel</td> |
|
38 |
-<td><a |
|
39 |
-href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks |
|
40 |
-gegen Zensur und Überwachung</a> |
|
41 |
-</td> |
|
42 |
-</tr> |
|
43 |
-<tr> |
|
44 |
-<td>2008 Aug 07</td> |
|
45 |
-<td>PC World</td> |
|
46 |
-<td><a |
|
47 |
-href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15 |
|
48 |
-Great, Free Privacy Downloads</a>. Tor is Number 1. |
|
49 |
-</td> |
|
50 |
-</tr> |
|
51 |
-<tr> |
|
52 |
-<td>2008 Aug 07</td> |
|
53 |
-<td>The Guardian UK</td> |
|
54 |
-<td><a |
|
55 |
-href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos |
|
56 |
-aims to crack China's wall</a> |
|
57 |
-</td> |
|
58 |
-</tr> |
|
59 |
-<tr> |
|
60 |
-<td>2008 Aug 07</td> |
|
61 |
-<td>The Register UK</td> |
|
62 |
-<td><a |
|
63 |
-href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German |
|
64 |
-hackers poke hole in great firewall of China</a> |
|
65 |
-</td> |
|
66 |
-</tr> |
|
67 |
-<tr> |
|
68 |
-<td>2008 Feb 01</td> |
|
69 |
-<td>PC World</td> |
|
70 |
-<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
71 |
-Hackers Can Expose Masked Surfers, Study Says</a> |
|
72 |
-A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
|
73 |
-Steven Murdoch's recent PhD thesis</a>. Steven <a |
|
74 |
-href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
|
75 |
-responds on the Tor Blog</a>.</td> |
|
76 |
-</tr> |
|
77 |
-<tr style="background-color: #e5e5e5;"> |
|
78 | 27 |
<td>2006 Apr 11</td> |
79 | 28 |
<td>PBS Frontline</td> |
80 | 29 |
<td><a |
81 | 30 |
href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"> |
82 | 31 |
Chipping Away at China's Great Firewall</a></td> |
83 | 32 |
</tr> |
84 |
-<tr> |
|
33 |
+<tr style="background-color: #e5e5e5;"> |
|
85 | 34 |
<td>2006 Feb 28</td> |
86 | 35 |
<td>PC World</td> |
87 | 36 |
<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html"> |
88 | 37 |
Outsmarting the Online Privacy Snoops</a></td> |
89 | 38 |
</tr> |
90 |
-<tr style="background-color: #e5e5e5;"> |
|
39 |
+<tr> |
|
91 | 40 |
<td>2006 Feb 27</td> |
92 | 41 |
<td>Forbes</td> |
93 | 42 |
<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
94 | 43 |
Cracks In the Wall</a>. Discussion of Tor being used for evading censorship by repressive |
95 | 44 |
governments. </td> |
96 | 45 |
</tr> |
97 |
-<tr> |
|
46 |
+<tr style="background-color: #e5e5e5;"> |
|
98 | 47 |
<td>2006 Feb 20</td> |
99 | 48 |
<td>The Boston Globe</td> |
100 | 49 |
<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html"> |
101 | 50 |
Beating censorship on the Internet</a></td> |
102 | 51 |
</tr> |
103 |
-<tr style="background-color: #e5e5e5;"> |
|
52 |
+<tr> |
|
104 | 53 |
<td>2006 Feb 15</td> |
105 | 54 |
<td>CBS Evening News</td> |
106 | 55 |
<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story"> |
107 | 56 |
Cracking The 'Great Firewall Of China'</a>. Roger Dingledine appeared on the show to discuss Tor, starting at |
108 | 57 |
1:04 into the video.</td> |
109 | 58 |
</tr> |
110 |
-<tr> |
|
59 |
+<tr style="background-color: #e5e5e5;"> |
|
111 | 60 |
<td>2006 Feb 15</td> |
112 | 61 |
<td>CNBC - Closing Bell</td> |
113 | 62 |
<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td> |
114 | 63 |
</tr> |
115 |
-<tr style="background-color: #e5e5e5;"> |
|
64 |
+<tr> |
|
116 | 65 |
<td>2006 Jan 27</td> |
117 | 66 |
<td>Fox News/eWeek</td> |
118 | 67 |
<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web |
... | ... |
@@ -147,6 +96,46 @@ Tor-related stories that have popped up. </p> |
147 | 96 |
</tr> |
148 | 97 |
</thead> |
149 | 98 |
|
99 |
+<tr> |
|
100 |
+<td>2008 Aug 10</td> |
|
101 |
+<td>Tech Radar UK</td> |
|
102 |
+<td><a |
|
103 |
+href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom |
|
104 |
+Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a> |
|
105 |
+</td> |
|
106 |
+</tr> |
|
107 |
+<tr style="background-color: #e5e5e5;"> |
|
108 |
+<td>2008 Aug 07</td> |
|
109 |
+<td>Spiegel</td> |
|
110 |
+<td><a |
|
111 |
+href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks |
|
112 |
+gegen Zensur und Überwachung</a> |
|
113 |
+</td> |
|
114 |
+</tr> |
|
115 |
+<tr> |
|
116 |
+<td>2008 Aug 07</td> |
|
117 |
+<td>PC World</td> |
|
118 |
+<td><a |
|
119 |
+href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15 |
|
120 |
+Great, Free Privacy Downloads</a>. Tor is Number 1. |
|
121 |
+</td> |
|
122 |
+</tr> |
|
123 |
+<tr style="background-color: #e5e5e5;"> |
|
124 |
+<td>2008 Aug 07</td> |
|
125 |
+<td>The Guardian UK</td> |
|
126 |
+<td><a |
|
127 |
+href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos |
|
128 |
+aims to crack China's wall</a> |
|
129 |
+</td> |
|
130 |
+</tr> |
|
131 |
+<tr> |
|
132 |
+<td>2008 Aug 07</td> |
|
133 |
+<td>The Register UK</td> |
|
134 |
+<td><a |
|
135 |
+href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German |
|
136 |
+hackers poke hole in great firewall of China</a> |
|
137 |
+</td> |
|
138 |
+</tr> |
|
150 | 139 |
<tr style="background-color: #e5e5e5;"> |
151 | 140 |
<td>2008 Mar 12</td> |
152 | 141 |
<td>SearchSecurity.com</td> |
... | ... |
@@ -164,7 +152,16 @@ to the Tor network. |
164 | 152 |
How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>. |
165 | 153 |
</td> |
166 | 154 |
</tr> |
167 |
- |
|
155 |
+<tr style="background-color: #e5e5e5;"> |
|
156 |
+<td>2008 Feb 01</td> |
|
157 |
+<td>PC World</td> |
|
158 |
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> |
|
159 |
+Hackers Can Expose Masked Surfers, Study Says</a> |
|
160 |
+A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> |
|
161 |
+Steven Murdoch's recent PhD thesis</a>. Steven <a |
|
162 |
+href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> |
|
163 |
+responds on the Tor Blog</a>.</td> |
|
164 |
+</tr> |
|
168 | 165 |
<tr style="background-color: #e5e5e5;"> |
169 | 166 |
<td>2007 Sep 21</td> |
170 | 167 |
<td>Wired HowTo Blog</td> |
171 | 168 |