initial translation of tormedia
Jens Kubieziel

Jens Kubieziel commited on 2008-09-05 17:44:13
Zeige 1 geänderte Dateien mit 775 Einfügungen und 0 Löschungen.

... ...
@@ -0,0 +1,775 @@
1
+## translation metadata
2
+# Based-On-Revision: 16647
3
+# Last-Translator: jens@kubieziel.de
4
+
5
+#include "head.wmi" TITLE="The Tor Project in den Medien" CHARSET="UTF-8"
6
+
7
+<div class="main-column">
8
+
9
+<h1>Erscheinung in den Medien</h1>
10
+
11
+<h2>Interviews &amp; Auftritte</h2>
12
+
13
+<p>Medien wie die New York Times, Forbes und CBS Evening News haben Mitglieder
14
+des Tor-Projektes wegen ihrer Expertise zu Fragen der Anonymität, Privatsphäre
15
+und Zensur im Internet immer wieder befragt oder zitiert. Hier sind einige
16
+Beispiele:</p>
17
+
18
+<table width="100%" border="0" cellpadding="3" cellspacing="0">
19
+<thead style="background-color: #e5e5e5;">
20
+<tr>
21
+<th width="10%">Datum</th>
22
+<th width="15%">Publikation</th>
23
+<th>Thema</th>
24
+</tr>
25
+</thead>
26
+
27
+<tr>
28
+<td>2006-04-11</td>
29
+<td>PBS Frontline</td>
30
+<td><a
31
+href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">
32
+Chipping Away at China's Great Firewall</a></td>
33
+</tr>
34
+
35
+<tr style="background-color: #e5e5e5;">
36
+<td>2006-02-28</td>
37
+<td>PC World</td>
38
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
39
+Outsmarting the Online Privacy Snoops</a></td>
40
+</tr>
41
+
42
+<tr> 
43
+<td>2006-02-27</td>
44
+<td>Forbes</td>
45
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
46
+Cracks In the Wall</a>.  Diskussion über Tor als Werkzeug zur Umgehung von
47
+Zensur</td>
48
+</tr>
49
+
50
+<tr style="background-color: #e5e5e5;">
51
+<td>2006-02-20</td>
52
+<td>The Boston Globe</td>
53
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
54
+Beating censorship on the Internet</a></td>
55
+</tr>
56
+
57
+<tr> 
58
+<td>2006-02-15</td>
59
+<td>CBS Evening News</td>
60
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
61
+Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine erschien in der
62
+Show, um Tor zu diskutieren. Die Sequenz startet bei 1:04 im Video.</td>
63
+</tr>
64
+
65
+<tr style="background-color: #e5e5e5;">
66
+<td>2006-02-15</td>
67
+<td>CNBC - Closing Bell</td>
68
+<td>TV-Auftritt von Roger Dingledine um  16:25. (keine URL)</td>
69
+</tr>
70
+
71
+<tr>
72
+<td>2006-01-27</td>
73
+<td>Fox News/eWeek</td>
74
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
75
+Anonymizers Suddenly Get Very Popular</a></td>
76
+</tr>
77
+
78
+<tr>
79
+<td>2006-01-25</td>
80
+<td>New York Times</td>
81
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&amp;oref=slogin">
82
+Privacy for People Who Don't Show Their Navels</a></td>
83
+</tr>
84
+
85
+<tr style="background-color: #e5e5e5;">
86
+<td>2005-08-06</td>
87
+<td>New Scientist</td>
88
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">Why we all need pornography</a></td>
89
+</tr>
90
+</table>
91
+
92
+<h2>Artikel</h2>
93
+
94
+<p>Tor wird weltweit regelmäßig benutzt und erscheint daher regelmäßig in der
95
+Presse. Diese Liste ist nicht umfangreich, sondern illustriert einige der wichtigeren
96
+Artikel.</p>
97
+
98
+<table width="100%" border="0" cellpadding="3" cellspacing="0">
99
+<thead style="background-color: #e5e5e5;">
100
+<tr>
101
+<th width="10%">Datum</th>
102
+<th width="15%">Publikation</th>
103
+<th>Thema</th>
104
+</tr>
105
+</thead>
106
+
107
+<tr>
108
+<td>2008-08-21</td>
109
+<td>CNN</td>
110
+<td><a
111
+href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts:
112
+Internet filtering and censorship rife</a></td>
113
+</tr>
114
+
115
+<tr style="background-color: #e5e5e5;">
116
+<td>2008-08-22</td>
117
+<td>The Sydney Morning Herald</td>
118
+<td><a
119
+href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The
120
+China Syndrome</a></td>
121
+</tr>
122
+
123
+<tr>
124
+<td>2008-08-20</td>
125
+<td>Scientific American</td>
126
+<td><a
127
+href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography:
128
+How to Keep Your Secrets Safe</a></td>
129
+</tr>
130
+
131
+<tr style="background-color: #e5e5e5;">
132
+<td>2008-09-05</td>
133
+<td>Guardian UK</td>
134
+<td><a
135
+href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting
136
+the great firewall</a></td>
137
+</tr>
138
+
139
+<tr>
140
+<td>2008-08-10</td>
141
+<td>Tech Radar UK</td>
142
+<td><a
143
+href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom
144
+Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a>
145
+</td>
146
+</tr>
147
+
148
+<tr style="background-color: #e5e5e5;">
149
+<td>2008-08-07</td>
150
+<td>Spiegel</td>
151
+<td><a
152
+href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks
153
+gegen Zensur und Überwachung</a>
154
+</td>
155
+</tr>
156
+<tr>
157
+<td>2008-08-07</td>
158
+<td>PC World</td>
159
+<td><a
160
+href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15
161
+Great, Free Privacy Downloads</a>.  Tor is Number 1.
162
+</td>
163
+</tr>
164
+<tr style="background-color: #e5e5e5;">
165
+<td>2008-08-07</td>
166
+<td>The Guardian UK</td>
167
+<td><a
168
+href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos
169
+aims to crack China's wall</a>
170
+</td>
171
+</tr>
172
+
173
+<tr>
174
+<td>2008-08-07</td>
175
+<td>The Register UK</td>
176
+<td><a
177
+href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German
178
+hackers poke hole in great firewall of China</a>
179
+</td>
180
+</tr>
181
+
182
+<tr style="background-color: #e5e5e5;">
183
+<td>2008-04-12</td>
184
+<td>SearchSecurity.com</td>
185
+<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">
186
+Tor network 'bridges' help evade blockers</a>.
187
+Covers new Tor features designed to overcome filtering and blocking that prevent access
188
+to the Tor network.
189
+</td>
190
+</tr>
191
+<tr>
192
+<td>2008-02-14</td>
193
+<td>Wired: Compiler Blog</td>
194
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
195
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
196
+</td>
197
+</tr>
198
+<tr style="background-color: #e5e5e5;">
199
+<td>2008-02-01</td>
200
+<td>PC World</td>
201
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
202
+Hackers Can Expose Masked Surfers, Study Says</a>
203
+A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
204
+Steven Murdoch's recent PhD thesis</a>. Steven <a
205
+href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
206
+responds on the Tor Blog</a>.</td>
207
+</tr>
208
+<tr style="background-color: #e5e5e5;">
209
+<td>2007-09-21</td>
210
+<td>Wired HowTo Blog</td>
211
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
212
+Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.
213
+</td>
214
+</tr>
215
+
216
+<tr>
217
+<td>2007-09-16</td>
218
+<td>Cnet</td>
219
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">
220
+    Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized
221
+    their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>.
222
+    We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>">
223
+    Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.
224
+  </td>
225
+</tr>
226
+
227
+<tr style="background-color: #e5e5e5;">
228
+<td>2007-09-10</td>
229
+<td>Wired</td>
230
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
231
+Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br />
232
+Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node
233
+he was running, then published unencrypted account and password information.
234
+Note that the better articles covering this event correctly indicate that this is not a security
235
+flaw or design problem with Tor - Tor provides anonymity, but does not
236
+encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while
237
+browsing to ensure end-to-end encryption.
238
+Also covered in
239
+<a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
240
+The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
241
+InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
242
+The Sydney Morning Herald</a>,
243
+<a href="http://www.securityfocus.com/news/11486">
244
+Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
245
+ars technica</a>, and many others. It was reported as early as August 31, 2007 on the
246
+<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
247
+Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.
248
+In the end, Mr. Egerstad was arrested, which was covered by
249
+<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
250
+The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
251
+The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900">
252
+ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.
253
+</td>
254
+</tr>
255
+
256
+<tr>
257
+<td>2007-07-27</td>
258
+<td>Wired Blog</td>
259
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html"> Cyber Jihadists Embrace Tor</a><br />
260
+A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
261
+blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
262
+at the bottom of the article.
263
+</td>
264
+</tr>
265
+
266
+<tr style="background-color: #e5e5e5;">
267
+<td>2007-06-22</td>
268
+<td>Bangkok Post</td>
269
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
270
+The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
271
+</td>
272
+</tr>
273
+
274
+<tr>
275
+<td>2007-04-15</td>
276
+<td>World Changing</td>
277
+<td><a href="http://www.worldchanging.com/archives/006309.html">
278
+Blogging Where Speech Isn’t Free</a><br />
279
+Coverage of former Tor Executive Director Shava Nerad's participation at an
280
+<a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&amp;id=IAP060124">
281
+SXSW panel</a>, where she explained how Tor can help bloggers.
282
+</td>
283
+</tr>
284
+
285
+<tr style="background-color: #e5e5e5;">
286
+<td>2007-04-8</td>
287
+<td>Security Focus</td>
288
+<td><a href="http://www.securityfocus.com/news/11447/1">
289
+Tor hack proposed to catch criminals</a>.
290
+Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the
291
+Tor Project illustrating why this approach may not be a good idea.
292
+</td>
293
+</tr>
294
+
295
+<tr>
296
+<td>2007-02-1</td>
297
+<td>Dr Dobb's</td>
298
+<td><a href="http://www.ddj.com/security/197002414">
299
+Tor Project Protects Anonymous Sources</a>.
300
+An introduction to Tor, including technical and historical background.
301
+</td>
302
+</tr>
303
+
304
+<tr style="background-color: #e5e5e5;">
305
+<td>2006 Oct 19</td>
306
+<td>Wired Threat Level</td>
307
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
308
+The Onion Router (TOR) is Leaky (Leeky)</a>.
309
+Explains why you need something like Privoxy
310
+in addition to the core Tor code to ensure your anonymity. If you use the
311
+Vidalia bundle, it installs and configures Privoxy automatically, but it can't
312
+hurt to understand why it is necessary.
313
+</td>
314
+</tr>
315
+
316
+<tr>
317
+<td>2006-08-18</td>
318
+<td>NPR</td>
319
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
320
+Tips for Protecting Privacy Online</a>.
321
+Kevin Bankston of the EFF recommends Tor during an NPR interview.
322
+Tor information begins at 8:15 into the program.
323
+</td>
324
+</tr>
325
+
326
+<tr style="background-color: #e5e5e5;">
327
+<td>2006-07-5</td>
328
+<td>MSNBC</td>
329
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/">
330
+Defending liberties in high-tech world</a>.
331
+Mentions EFF funding for Tor as one of its significant nonlitigation projects.
332
+</td>
333
+</tr>
334
+
335
+<tr>
336
+  <td>
337
+    2006-02-15
338
+  </td>
339
+  <td>
340
+    Network Secure</td>
341
+    <td><a href="http://www.network-secure.de/index.php?option=com_content&amp;task=view&amp;id=3909">
342
+    Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br />
343
+  </td>
344
+</tr>
345
+
346
+<tr style="background-color: #e5e5e5;">
347
+  <td>
348
+    2006-02-13
349
+  </td>
350
+  <td>
351
+    Wall Street Journal</td>
352
+<td>    <a href="http://online.wsj.com/article/SB113979965346572150.html">
353
+    Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br />
354
+    Full article text can also be found
355
+    <a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.
356
+  </td>
357
+</tr>
358
+
359
+<tr>
360
+  <td>
361
+    2006-01-31
362
+  </td>
363
+  <td>
364
+    Technology Review</td>
365
+<td>    <a href="http://www.technologyreview.com/Infotech/16216/page2/">
366
+    Evading the Google Eye</a><br />
367
+  </td>
368
+</tr>
369
+
370
+<tr style="background-color: #e5e5e5;">
371
+  <td>
372
+    2006-01-29
373
+  </td>
374
+  <td>
375
+    New York Times</td>
376
+<td>    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
377
+    How to Outwit the World's Internet Censors</a><br />
378
+  </td>
379
+</tr>
380
+
381
+<tr>
382
+  <td>
383
+    2006-01-23
384
+  </td>
385
+  <td>
386
+    NPR Talk of the Nation</td>
387
+<td>    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
388
+    Search Engines and Privacy Rights on the Web</a><br />
389
+    <a href="http://xeni.net/">Xeni Jardin</a>
390
+    recommends Tor at 33:30 into the program.
391
+  </td>
392
+</tr>
393
+
394
+<tr style="background-color: #e5e5e5;">
395
+  <td>
396
+    2006-02-15
397
+  </td>
398
+  <td>
399
+    Punto Informatico</td>
400
+<td>    <a href="http://punto-informatico.it/p.aspx?i=1430903">
401
+    TOR c'è</a> (Italian)<br />
402
+  </td>
403
+</tr>
404
+
405
+<tr>
406
+  <td>
407
+    2006-01-20
408
+  </td>
409
+  <td>
410
+    Wired</td>
411
+<td>    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
412
+    How to Foil Search Engine Snoops</a><br />
413
+  </td>
414
+</tr>
415
+
416
+<tr style="background-color: #e5e5e5;">
417
+  <td>
418
+    2006-01-20
419
+  </td>
420
+  <td>
421
+    NPR</td>
422
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
423
+    Google Records Subpoena Raises Privacy Fears</a><br />
424
+  </td>
425
+</tr>
426
+
427
+<tr>
428
+  <td>
429
+    2005-09-30
430
+  </td>
431
+  <td>
432
+    Viva o Linux</td>
433
+   <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
434
+    TOR: A Internet sem rastreabilidade</a> (Portuguese)<br />
435
+  </td>
436
+</tr>
437
+
438
+<tr style="background-color: #e5e5e5;">
439
+  <td>
440
+    2005-07-12
441
+  </td>
442
+  <td>
443
+    IEEE Computer Society's Technical Committee on Security and Privacy</td>
444
+<td>    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
445
+    Onion routing application Tor makes PCWorld's top 100</a><br />
446
+  </td>
447
+</tr>
448
+
449
+<tr>
450
+  <td>
451
+    2005-06-22
452
+  </td>
453
+  <td>
454
+    The Unofficial Apple Blog</td>
455
+<td>    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
456
+    Privacy Watch: Tor</a><br />
457
+  </td>
458
+</tr>
459
+
460
+<tr style="background-color: #e5e5e5;">
461
+  <td>
462
+    2005-06-10
463
+  </td>
464
+  <td>
465
+    The New Zealand Herald</td>
466
+<td>    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=10329896">
467
+    China's internet censorship stranglehold can't last</a><br />
468
+  </td>
469
+</tr>
470
+
471
+<tr>
472
+  <td>
473
+    2005-06-8
474
+  </td>
475
+  <td>
476
+    American Public Radio</td>
477
+<td>    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
478
+    An Internet privacy tool called "Tor"</a><br />
479
+  </td>
480
+</tr>
481
+
482
+<tr style="background-color: #e5e5e5;">
483
+  <td>
484
+    2005-06-1
485
+  </td>
486
+  <td>
487
+    PC World</td>
488
+<td>    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
489
+    The 100 Best Products of 2005</a><br />
490
+    Tor is ranked #40 on the list.
491
+  </td>
492
+</tr>
493
+
494
+<tr>
495
+  <td>
496
+    2005-06-1
497
+  </td>
498
+  <td>
499
+    Linux Weekly News</td>
500
+<td>    <a href="http://lwn.net/Articles/138242/">
501
+    A Look at The Onion Router (Tor)</a><br />
502
+  </td>
503
+</tr>
504
+
505
+<tr style="background-color: #e5e5e5;">
506
+  <td>
507
+    2005-05-22
508
+  </td>
509
+  <td>
510
+    Slashdot</td>
511
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
512
+     Tor Anonymity Network Reaches 100 Verified Nodes</a><br />
513
+  </td>
514
+</tr>
515
+
516
+<tr>
517
+  <td>
518
+    2005-05-20
519
+  </td>
520
+  <td>
521
+    Security.uz</td>
522
+<td>    <a href="http://security.uz/news/default.asp?id=10541">
523
+    Tor - мощный анонимайзер для всех ОС</a> (Russian)<br />
524
+  </td>
525
+</tr>
526
+
527
+<tr style="background-color: #e5e5e5;">
528
+  <td>
529
+    2005-05-19
530
+  </td>
531
+  <td>
532
+    WebPlanet</td>
533
+<td>    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
534
+    Tor: распределенная система анонимного серфинга</a> (Russian)<br />
535
+  </td>
536
+</tr>
537
+
538
+<tr>
539
+  <td>
540
+    2005-05-17
541
+  </td>
542
+  <td>
543
+    Wired</td>
544
+<td>    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
545
+    Tor Torches Online Tracking</a><br />
546
+    Also available in
547
+    <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.
548
+  </td>
549
+</tr>
550
+
551
+<tr style="background-color: #e5e5e5;">
552
+  <td>
553
+    2005-05-17
554
+  </td>
555
+  <td>
556
+    XBiz</td>
557
+<td>    <a href="http://xbiz.com/news/8761">
558
+    Navy Project Allows Anonymous Browsing</a><br />
559
+  </td>
560
+</tr>
561
+
562
+<tr>
563
+  <td>
564
+    2005-04-13
565
+  </td>
566
+  <td>
567
+    Heise online</td>
568
+<td>    <a href="http://www.heise.de/newsticker/meldung/58506">
569
+    CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br />
570
+  </td>
571
+</tr>
572
+
573
+<tr style="background-color: #e5e5e5;">
574
+  <td>
575
+    2005-04-5
576
+  </td>
577
+  <td>
578
+    Libero</td>
579
+<td>    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
580
+    Anonimato on line, ecco Tor</a> (Italian)<br />
581
+  </td>
582
+</tr>
583
+
584
+<tr>
585
+  <td>
586
+    2005-01-4
587
+  </td>
588
+  <td>
589
+    Internetnews</td>
590
+<td>    <a href="http://www.internetnews.com/dev-news/article.php/3454521">
591
+    EFF Throws Support to 'Anonymous' Internet Project</a><br />
592
+  </td>
593
+</tr>
594
+
595
+<tr style="background-color: #e5e5e5;">
596
+  <td>
597
+    2005-04-31
598
+  </td>
599
+  <td>
600
+    Linux.com</td>
601
+<td>    <a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78">
602
+    Securing your online privacy with Tor</a><br />
603
+  </td>
604
+</tr>
605
+
606
+<tr>
607
+  <td>
608
+    2004-12-27
609
+  </td>
610
+  <td>
611
+    BoingBoing</td>
612
+<td>    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
613
+    EFF helping produce anonymizing software</a><br />
614
+  </td>
615
+</tr>
616
+
617
+<tr style="background-color: #e5e5e5;">
618
+  <td>
619
+    2004-12-25
620
+  </td>
621
+  <td>
622
+    Kansas City infozine</td>
623
+<td>    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
624
+    EFF Joins Forces with Tor Software Project</a><br />
625
+  </td>
626
+</tr>
627
+
628
+<tr>
629
+  <td>
630
+    2004-12-23
631
+  </td>
632
+  <td>
633
+    golem.de</td>
634
+<td>    <a href="http://www.golem.de/0412/35340.html">
635
+    EFF unterstützt Anonymisierer Tor</a> (German)<br />
636
+  </td>
637
+</tr>
638
+
639
+<tr style="background-color: #e5e5e5;">
640
+  <td>
641
+    2004-12-23
642
+  </td>
643
+  <td>
644
+    SuicideGirls</td>
645
+<td>    <a href="http://suicidegirls.com/news/technology/6150/">
646
+    New Routing Software Allows Anonymous Internet Use</a><br />
647
+  </td>
648
+</tr>
649
+
650
+<tr>
651
+  <td>
652
+    2004-12-18
653
+  </td>
654
+  <td>
655
+    P2Pnet</td>
656
+<td>    <a href="http://p2pnet.net/story/3357">
657
+    EFF to sponsor Tor</a><br />
658
+  </td>
659
+</tr>
660
+
661
+<tr style="background-color: #e5e5e5;">
662
+  <td>
663
+    2004-12-22
664
+  </td>
665
+  <td>
666
+    Slashdot</td>
667
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95&amp;tid=158&amp;tid=153&amp;tid=17">
668
+     EFF Promotes Freenet-like System Tor</a><br />
669
+  </td>
670
+</tr>
671
+
672
+<tr>
673
+  <td>
674
+    2004-11-16
675
+  </td>
676
+  <td>
677
+    AlterNet</td>
678
+<td>    <a href="http://www.alternet.org/columnists/story/20523/">
679
+    Heavy Traffic</a><br />
680
+  </td>
681
+</tr>
682
+
683
+<tr style="background-color: #e5e5e5;">
684
+  <td>
685
+    2004-08-30
686
+  </td>
687
+  <td>
688
+    Newsweek</td>
689
+<td>    Technology: Instant Security (no link)<br />
690
+  </td>
691
+</tr>
692
+
693
+<tr>
694
+  <td>
695
+    2004-08-16
696
+  </td>
697
+  <td>
698
+    Eweek</td>
699
+<td>    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
700
+    Don't Fear Internet Anonymity Tools</a><br />
701
+  </td>
702
+</tr>
703
+
704
+<tr style="background-color: #e5e5e5;">
705
+  <td>
706
+    2004-08-6
707
+  </td>
708
+  <td>
709
+    HCC magazine</td>
710
+<td>    <a href="http://www.hcc.nl/eCache/DEF/21/083.html">
711
+    Anoniem surfen met hulp van marine VS</a> (Dutch)<br />
712
+  </td>
713
+</tr>
714
+
715
+<tr>
716
+  <td>
717
+    2004-08-6
718
+  </td>
719
+  <td>
720
+    Golem</td>
721
+<td>    <a href="http://www.golem.de/0408/32835.html">
722
+    Tor: Anonymisierer nutzt Onion-Routing</a><br />
723
+  </td>
724
+</tr>
725
+
726
+<tr style="background-color: #e5e5e5;">
727
+  <td>
728
+    2004-08-5
729
+  </td>
730
+  <td>
731
+    Network World Security</td>
732
+<td>    <a href="http://www.networkworld.com/details/7088.html">
733
+    Onion routing</a><br />
734
+  </td>
735
+</tr>
736
+
737
+<tr>
738
+  <td>
739
+    2004-05-8
740
+  </td>
741
+  <td>
742
+    Wired</td>
743
+<td>    <a href="http://www.wired.com/politics/security/news/2004/08/64464">
744
+    Onion Routing Averts Prying Eyes</a><br />
745
+    Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">Japanese</a>.
746
+  </td>
747
+</tr>
748
+
749
+<tr style="background-color: #e5e5e5;">
750
+  <td>
751
+    2004-04-08
752
+  </td>
753
+  <td>
754
+    CNET Japan blog</td>
755
+<td>    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
756
+    Yearning of hackers and insecurity</a> (Japanese)<br />
757
+  </td>
758
+</tr>
759
+
760
+<tr>
761
+  <td>
762
+    1999-04-13
763
+  </td>
764
+  <td>
765
+    Wired</td>
766
+<td>    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
767
+    Anonymous Web Surfing? Uh-Uh</a><br />
768
+  </td>
769
+</tr>
770
+
771
+</table>
772
+
773
+</div>
774
+
775
+#include <foot.wmi>
0 776