commit 1a0d1ae06cdd74e9e92510a752d7009d8153d0c7 Author: hiro hiro@torproject.org Date: Mon Mar 25 21:18:13 2019 +0100
Reformat press clips --- press/en/press.wml | 509 +++++++++++++++-------------------------------------- 1 file changed, 138 insertions(+), 371 deletions(-)
diff --git a/press/en/press.wml b/press/en/press.wml index f9989e3f..f7747994 100644 --- a/press/en/press.wml +++ b/press/en/press.wml @@ -2009,16 +2009,13 @@ Thinkers</a>. Number 78: Roger, Nick, and Paul from Tor.</td> <tr> <td>2012 Oct</td> <td>Forskning & Framsteg</td> -<td><a href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper- -hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura -nätcensuren</a></td> +<td><a href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura nätcensuren</a></td> </tr>
<tr> <td>2012 Oct</td> <td>Delta Airlines Sky Magazine</td> -<td><a href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain- -Sight.aspx">Hidden in Plain Sight</a></td> +<td><a href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-Sight.aspx">Hidden in Plain Sight</a></td> </tr>
<tr> @@ -2030,1023 +2027,793 @@ Sight.aspx">Hidden in Plain Sight</a></td> <tr> <td>2012 Sep 19</td> <td>infoBAE</td> -<td><a href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en --la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la -web 100% anónimas y seguras</a></td> +<td><a href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en-la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la web 100% anónimas y seguras</a></td> </td> <tr> <td>2012 Aug 24</td> <td>security.nl</td> -<td><a href="https://secure.security.nl/artikel/42807/1/ -Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar -Facebook ondanks privacyrisico</a></td> +<td><a href="https://secure.security.nl/artikel/42807/1/Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar Facebook ondanks privacyrisico</a></td> </tr>
<tr> <td>2012 Jul 19</td> <td>Philadelphia Inquirer</td> -<td><a href="http://www.philly.com/philly/business/ -20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life: -Fostering anonymity online</a></td> +<td><a href="http://www.philly.com/philly/business/20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life: Fostering anonymity online</a></td> </tr>
<tr> <td>2012 Jul 13</td> <td>NATO</td> -<td><a href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity- -during-the-arab-spring/">Social Media and Online Anonymity during the -Arab Spring</a></td> +<td><a href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-during-the-arab-spring/">Social Media and Online Anonymity during the Arab Spring</a></td> </tr>
<tr> <td>2012 Jun 19</td> <td>Nieman Journalism Lab</td> -<td><a href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists --and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project -helps journalists and whistleblowers go online without leaving a +<td><a href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists-and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project helps journalists and whistleblowers go online without leaving a trace.</a></td> </tr>
<tr> <td>2012 Jun 18</td> <td>Poynter</td> -<td><a href="http://www.poynter.org/latest-news/top-stories/177642/news- -challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6 -projects focused on networks</td> +<td><a href="http://www.poynter.org/latest-news/top-stories/177642/news-challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6 projects focused on networks</td> </tr>
<tr> <td>2012 Jun 18</td> <td>Knight Foundation</td> -<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight -Foundation funds project to protect journalists and their sources -worldwide by providing them with a toolkit to preserve their anonymity +<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight Foundation funds project to protect journalists and their sources worldwide by providing them with a toolkit to preserve their anonymity online.</td> </tr>
<tr> <td>2012 Jun 15</td> <td>BBC</td> -<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia -clamps down on Skype and other internet use on Tor</td> +<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia clamps down on Skype and other internet use on Tor</td> </tr>
<tr> <td>2012 Apr 30</td> <td>Forbes</td> -<td><a href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor- -projects-new-tool-aims-to-map-out-internet-censorship/">The Tor -Project's New Tool Aims To Map Out Internet Censorship</a></td> +<td><a href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-projects-new-tool-aims-to-map-out-internet-censorship/">The Tor Project's New Tool Aims To Map Out Internet Censorship</a></td> </tr>
<tr> <td>2012 Apr 20</td> <td>The Guardian</td> -<td><a href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists- -battle-internet">Hacktivists in the frontline battle for the -internet</td> +<td><a href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-battle-internet">Hacktivists in the frontline battle for the internet</td> </tr>
<tr> <td>2012 Apr 19</td> <td>The Guardian</td> -<td><a href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity- -authenticity-anonymity">Online identity: is authenticity or anonymity -more important?</td> +<td><a href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-authenticity-anonymity">Online identity: is authenticity or anonymity more important?</td> </tr>
<tr> <td>2012 Apr 03</td> <td>V3</td> -<td><a href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover --key-chinas-tor-blocking">Swedish researchers uncover key to China's -Tor-blocking system</a></td> +<td><a href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover-key-chinas-tor-blocking">Swedish researchers uncover key to China's Tor-blocking system</a></td> </tr>
<tr> <td>2012 Apr 02</td> <td>The Guardian</td> -<td><a href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies- -warn-government-email-surveillance">Internet companies warn over -government email surveillance plans</a></td> +<td><a href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-warn-government-email-surveillance">Internet companies warn over government email surveillance plans</a></td> </td> <tr> <td>2012 Mar 22</td> <td>Reuters</td> -<td><a href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms- -idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on -citizens</a></td> +<td><a href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on citizens</a></td> </tr>
<tr> <td>2012 Mar 08</td> <td>Boston Globe</td> -<td><a href="http://articles.boston.com/2012-03-08/business/31136655_1_law- -enforcement-free-speech-technology">Privacy software. Unintended -consequences of Walpole firm's technology.</a></td> +<td><a href="http://articles.boston.com/2012-03-08/business/31136655_1_law-enforcement-free-speech-technology">Privacy software. Unintended consequences of Walpole firm's technology.</a></td> </tr>
<tr> <td>2012 Mar 02</td> <td>Ars Technica</td> -<td><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new- -privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars"> -Google's new privacy policy: what has changed and what you can do about +<td><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">Google's new privacy policy: what has changed and what you can do about it</a></td> </tr>
<tr> <td>2012 Mar 01</td> <td>Edmonton Journal</td> -<td><a href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on- -with-tor/">Get your privacy on with Tor</a></td> +<td><a href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-with-tor/">Get your privacy on with Tor</a></td> </tr>
<tr> <td>2012 Feb 28</td> <td>PC World</td> -<td><a href="https://www.pcworld.com/article/250943/ -https_everywhere_update_now_reports_website_weaknesses.html">HTTPS -Everywhere Update: Now Reports Website Weaknesses</a></td> +<td><a href="https://www.pcworld.com/article/250943/https_everywhere_update_now_reports_website_weaknesses.html">HTTPS Everywhere Update: Now Reports Website Weaknesses</a></td> </tr>
<tr> <td>2012 Feb 27</td> <td>GigaOM</td> -<td><a href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor- -balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td> +<td><a href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td> </tr>
<tr> <td>2012 Feb 15</td> <td>Le Monde</td> -<td><a href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel- -outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un -nouvel outil contre la cybercensure testé en Iran</a></td> +<td><a href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un nouvel outil contre la cybercensure testé en Iran</a></td> </tr>
<tr> <td>2012 Feb 13</td> <td>IDG NL webwereld</td> -<td><a href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert- -https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td> +<td><a href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td> </tr>
<tr> <td>2012 Feb 13</td> <td>Ars Technica</td> -<td><a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest- -project-helps-iran-get-back-online-amidst-internet-censorship-regime. -ars">Tor's latest project helps Iran get back online despite new -Internet censorship regime</a></td> +<td><a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-project-helps-iran-get-back-online-amidst-internet-censorship-regime.ars">Tor's latest project helps Iran get back online despite new Internet censorship regime</a></td> </tr>
<tr> <td>2012 Feb 13</td> <td>Radio Farda</td> -<td><a href="http://www.radiofarda.com/content/ -f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html"> -«تور» با پروژهای جدید به جنگ فیلترینگ در ایران میرود "</a></td> +<td><a href="http://www.radiofarda.com/content/f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">«تور» با پروژهای جدید به جنگ فیلترینگ در ایران میرود "</a></td> </td> </tr>
<tr> <td>2012 Feb 11</td> <td>ITP</td> -<td><a href="http://www.itp.net/587901-iran-increases-web-censorship">Iran -increases web censorship</a></td> +<td><a href="http://www.itp.net/587901-iran-increases-web-censorship">Iran increases web censorship</a></td> </tr>
<tr> <td>2012 Feb 10</td> <td>CNet News</td> -<td><a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity- -project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project -looks to help Iranians sidestep Net ban</a></td> +<td><a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project looks to help Iranians sidestep Net ban</a></td> </tr>
<tr> <td>2012 Feb 10</td> <td>Linkiesta</td> -<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i -dissidenti in Internet, la guerra in Iran è già iniziata</a></td> +<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i dissidenti in Internet, la guerra in Iran è già iniziata</a></td> </tr>
<tr> <td>2012 Feb 10</td> <td>Forbes</td> -<td><a href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran- -cracks-down-online-tor-tests-undetectable-encrypted-connections/">As -Iran Cracks Down Online, Tor Tests Undetectable Encrypted -Connections</a></td> +<td><a href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-online-tor-tests-undetectable-encrypted-connections/">As Iran Cracks Down Online, Tor Tests Undetectable Encrypted Connections</a></td> </tr>
<tr> <td>2012 Jan 24</td> <td>PC Pro UK</td> -<td><a href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of- -tor-censorship">O2 plays down accusations of Tor censorship</a></td> +<td><a href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of- tor-censorship">O2 plays down accusations of Tor censorship</a></td> </tr>
<tr> <td>2012 Jan 24</td> <td>Broadband Choice UK</td> -<td><a href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband- -providers-are-blocking-tor-801273330/">ORG says mobile broadband -providers are blocking Tor</a></td> -</td> +<td><a href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-providers-are-blocking-tor-801273330/">ORG says mobile broadband providers are blocking Tor</a></td> +</tr> + <tr> <td>2012 Jan 24</td> <td>PC Welt</td> -<td><a href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in --neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td> +<td><a href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in-neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td> </tr>
<tr> <td>2011 Dec 30</td> <td>BNR Digital</td> -<td><a href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe- -censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder -Tor wordt gecensureerd</a></td> +<td><a href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder Tor wordt gecensureerd</a></td> </tr>
<tr> <td>2011 Dec 30</td> <td>Deutsche Welle</td> -<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit -dem Zensor Katz-und-Maus spielen</a></td> +<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit dem Zensor Katz-und-Maus spielen</a></td> </tr>
<tr> <td>2011 Dec 29</td> <td>Boing Boing</td> -<td><a href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between. -html">State of the arms race between repressive governments and -anti-censorship/surveillance Tor technology (and why American companies -are on the repressive governments' side)</a></td> +<td><a href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.html">State of the arms race between repressive governments and anti-censorship/surveillance Tor technology (and why American companies are on the repressive governments' side)</a></td> </tr>
<tr> <td>2011 Dec 28</td> <td>ZDNet Asia</td> -<td><a href="http://www.zdnetasia.com/tor-project-creates-safer-internet- -62303332.htm">Tor Project creates safer Internet</a></td> +<td><a href="http://www.zdnetasia.com/tor-project-creates-safer-internet-62303332.htm">Tor Project creates safer Internet</a></td> </tr>
<tr> <td>2011 Dec 01</td> <td>itbusiness.ca</td> -<td><a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170"> -Convenience technology threatening personal privacy, experts -say</a></td> +<td><a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">Convenience technology threatening personal privacy, experts say</a></td> </tr>
<tr> <td>2011 Nov 21</td> <td>Spiegel Online</td> -<td><a href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas -Internet-Zensoren testen neue Filter</a></td> +<td><a href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas Internet-Zensoren testen neue Filter</a></td> </tr>
<tr> <td>2011 Nov 20</td> <td>China Digital Times</td> -<td><a href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted- -tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/" ->Government Blocks Encrypted Tunnels Through Great Firewall; Fang -Binxing Talks Internet Sovereignty</a></td> +<td><a href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/">Government Blocks Encrypted Tunnels Through Great Firewall; Fang Binxing Talks Internet Sovereignty</a></td> </tr>
<tr> <td>2011 Nov 23</td> <td>IT Security Belgium</td> -<td><a href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud- -service">Tor Project is tapping Amazon’s EC2 cloud service</a></td> +<td><a href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-service">Tor Project is tapping Amazon’s EC2 cloud service</a></td> </tr>
<tr> <td>2011 Nov 22</td> <td>Boing Boing</td> -<td><a href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to. -html">Tor project asks supporters to set up virtual Tor bridges in -Amazon's cloud</a></td> +<td><a href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.html">Tor project asks supporters to set up virtual Tor bridges in Amazon's cloud</a></td> </tr>
<tr> <td>2011 Nov 18</td> <td>Dagens IT</td> -<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i -den kinesiske internett-muren</a></td> +<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i den kinesiske internett-muren</a></td> </tr>
<tr> <td>2011 Nov 16</td> <td>Forbes</td> -<td><a href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great- -firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great -Firewall Tests Mysterious Scans On Encrypted Connections</a></td> +<td><a href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great Firewall Tests Mysterious Scans On Encrypted Connections</a></td> </tr>
<tr> <td>2011 Nov 15</td> <td>Ars Technica</td> -<td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it- -yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself -privacy bridge in Amazon cloud</a></td> +<td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself privacy bridge in Amazon cloud</a></td> </tr>
<tr> <td>2011 Aug 28</td> <td>The Tor Project</td> -<td>The Tor Project announces a <a href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of -the Tor software.</td> +<td>The Tor Project announces a <a href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of the Tor software.</td> </tr>
<tr> <td>2011 Aug 22</td> <td>VOA News: Asia</td> -<td><a href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely- -for-Now-128178623.html">Some -Chinese Surf Freely, for Now</a></td> +<td><a href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-for-Now-128178623.html">Some Chinese Surf Freely, for Now</a></td> </tr>
<tr> <td>2011 Aug 01</td> <td>Peace & Conflict Review</td> -<td><a href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor, -Anonymity, and the Arab Spring: An Interview with Jacob -Appelbaum</a></td> +<td><a href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor, Anonymity, and the Arab Spring: An Interview with Jacob Appelbaum</a></td> </tr>
<tr> <td>2011 June 18</td> <td>CNN: Tech</td> -<td><a href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology. -revolution/index.html">Starting -a revolution with technology</a></td> +<td><a href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.revolution/index.html">Starting a revolution with technology</a></td> </tr>
<tr> <td>2011 June 12</td> <td>CNN: Tech</td> -<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/ -index.html">Wiping -away whistle-blowers' online fingerprints</a></td> +<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/index.html">Wiping away whistle-blowers' online fingerprints</a></td> </tr>
<tr> <td>2011 May 14</td> <td>BBC: Click</td> -<td><a href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm"> -Andrew -and Dr. Angela Sasse from UCL were interviewed by the BBC Click program -about why Internet Anonymity is important and valuable in a modern, -networked society.</a></td> +<td><a href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">Andrew and Dr. Angela Sasse from UCL were interviewed by the BBC Click program about why Internet Anonymity is important and valuable in a modern, networked society.</a></td> </tr>
<tr> <td>2011 March 29</td> <td>CNN: Situation Room</td> -<td><a href="http://edition.cnn.com/CNN/Programs/situation.room/">Tor -featured in a segment about US companies providing censorship to -repressive regimes and those circumventing their products.</a></td> +<td><a href="http://edition.cnn.com/CNN/Programs/situation.room/">Tor featured in a segment about US companies providing censorship to repressive regimes and those circumventing their products.</a></td> </tr>
<tr> <td>2011 March 18</td> <td>Telegraph</td> -<td><a href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/ -Iran-cracks-down-on-web-dissident-technology.html">Iran -cracks down on web dissident technology</a></td> +<td><a href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/Iran-cracks-down-on-web-dissident-technology.html">Iran cracks down on web dissident technology</a></td> </tr>
<tr> <td>2011 March 17</td> <td>BusinessWeek</td> -<td><a href="http://www.businessweek.com/magazine/content/11_13/b4221043353206. -htm">Social -Networking: Fighting to Remain Anonymous</a></td> +<td><a href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.htm">Social Networking: Fighting to Remain Anonymous</a></td> </tr>
<tr> <td>2011 March 10</td> <td>NyTeknik</td> -<td><a href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594. -ece">Svenska -biståndspengar till Facebookrevolutionen</a></td> +<td><a href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.ece">Svenska biståndspengar till Facebookrevolutionen</a></td> </tr>
<tr> <td>2011 March 09</td> <td>Washington Post</td> -<td><a href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/ -AR2011030905157_pf.html">U.S. -funding tech firms that help Mideast dissidents evade government -censors</a></td> +<td><a href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/AR2011030905157_pf.html">U.S. funding tech firms that help Mideast dissidents evade government censors</a></td> </tr>
<tr> <td>2011 February 17</td> <td>Walpole Times</td> -<td><a href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a- -Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during- -protests">Tor -Project, a Walpole-based company, helps Egyptians avoid Internet +<td><a href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-protests">Tor Project, a Walpole-based company, helps Egyptians avoid Internet censorship during protests</a></td> </tr>
<tr> <td>2011 January 31</td> <td>NPR: WBUR</td> -<td><a href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government"> -Here -& Now: U.S. Activists Help Egyptian Protesters Elude Government -Censorship Online</a></td> +<td><a href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">Here & Now: U.S. Activists Help Egyptian Protesters Elude Government Censorship Online</a></td> </tr>
<tr> <td>2011 February 01</td> <td>Discovery News</td> -<td><a href="http://news.discovery.com/tech/egypt-internet-online-protesters- -110201.html">Egypt's -Internet Block Incomplete But Damaging</a></td> +<td><a href="http://news.discovery.com/tech/egypt-internet-online-protesters-110201.html">Egypt's Internet Block Incomplete But Damaging</a></td> </tr>
<tr> <td>2011 January 31</td> <td>IDG Poland</td> -<td><a href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci. -szukaja.alternatyw.html">Egipt -blokuje Internet, aktywiści szukają alternatyw</a></td> +<td><a href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.szukaja.alternatyw.html">Egipt blokuje Internet, aktywiści szukają alternatyw</a></td> </tr>
<tr> <td>2011 January 31</td> <td>New Scientist</td> -<td><a href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains --officially-offli.html">How -Egypt is getting online</a></td> +<td><a href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains-officially-offli.html">How Egypt is getting online</a></td> </tr>
<tr> <td>2011 January 31</td> <td>El Pais</td> -<td><a href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe -/fax/elpepuint/20110130elpepuint_14/Tes">Sortear -la censura a golpe de fax</a></td> +<td><a href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe/fax/elpepuint/20110130elpepuint_14/Tes">Sortear la censura a golpe de fax</a></td> </tr>
<tr> <td>2011 January 30</td> <td>Fox 25 News - Boston</td> -<td><a href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give --egyptians-internet-access-20110130">Local -company helps give Egyptians internet access</a></td> +<td><a href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give-egyptians-internet-access-20110130">Local company helps give Egyptians internet access</a></td> </tr>
<tr> <td>2011 January 30</td> <td>New England Cable News</td> -<td><a href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid- -onlin/landing.html?blockID=400628&feedID=4213">Mass. -company helps activists avoid online government censorship</a></td> +<td><a href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-onlin/landing.html?blockID=400628&feedID=4213">Mass. company helps activists avoid online government censorship</a></td> </tr>
<tr> <td>2011 January 30</td> <td>Boston Globe</td> -<td><a href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30 -/mass_groups_software_helps_avoid_censorship/">Foreign -activists stay covered online</a></td> +<td><a href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30/mass_groups_software_helps_avoid_censorship/">Foreign activists stay covered online</a></td> </tr>
<tr> <td>2011 January 29</td> <td>SvD.se</td> -<td><a href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for- -natdissidenter_5902693.svd">Tor -öppnar dörrar för nätdissidenter</a></td> +<td><a href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-natdissidenter_5902693.svd">Tor öppnar dörrar för nätdissidenter</a></td> </tr>
<tr> <td>2011 January 29</td> <td>ComputerWorld</td> -<td><a href="http://www.computerworld.com/s/article/9207058/ -Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16"> -Without -Internet, Egyptians find new ways to get online.</a></td> +<td><a href="http://www.computerworld.com/s/article/9207058/Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">Without Internet, Egyptians find new ways to get online.</a></td> </tr>
<tr> <td>2011 January 28</td> <td>Globe and Mail</td> -<td><a href="https://www.theglobeandmail.com/news/technology/in-a-span-of- -minutes-a-country-goes-offline/article1887207/">In -a span of minutes, a country goes offline</a></td> +<td><a href="https://www.theglobeandmail.com/news/technology/in-a-span-of-minutes-a-country-goes-offline/article1887207/">In a span of minutes, a country goes offline</a></td> </tr>
<tr> <td>2010 December 22</td> <td>Technology Review</td> -<td><a href="http://www.technologyreview.com/web/26981/">Home Internet -with Anonymity Built In</a></td> +<td><a href="http://www.technologyreview.com/web/26981/">Home Internet with Anonymity Built In</a></td> </tr>
<tr> <td>2010 December 17</td> <td>New York Times Magazine</td> -<td><a href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html"> -Granting -Anonymity</a></td> +<td><a href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">Granting Anonymity</a></td> </tr>
<tr> <td>2010 November 03</td> <td>metro sverige</td> -<td><a href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli- -anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td> +<td><a href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td> </tr>
<tr> <td>2010 Sept 17</td> <td>NPR: On the media</td> -<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the -Media: Interview with Jacob Appelbaum</a>.</td> +<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the Media: Interview with Jacob Appelbaum</a>.</td> </tr>
<tr> <td>2010 Sept 16</td> <td>The Tor Project</td> -<td>Tor announces an article discussing <a href="<page -press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look -for in a Circumvention Tool</a>.</td> +<td>Tor announces an article discussing <a href="<page press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look for in a Circumvention Tool</a>.</td> </tr>
<tr> <td>2010 August 01</td> <td>PC Format - Poland</td> -<td><a href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google- -facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google -and Facebook are spying on us</a></td> +<td><a href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google and Facebook are spying on us</a></td> </tr>
<tr> <td>2010 July 14</td> <td>China Rights Forum</td> -<td><a href="http://www.hrichina.org/public/contents/category?cid=175033">China -Rights Forum, No. 2 - “China’s Internet”: Staking Digital -Ground</a></td> +<td><a href="http://www.hrichina.org/public/contents/category?cid=175033">China Rights Forum, No. 2 - “China’s Internet”: Staking Digital Ground</a></td> </tr>
<tr> <td>2010 May 25</td> <td>The Australian</td> -<td><a href="http://www.theaustralian.com.au/australian-it/call-to-join-tor- -network-to-fight-censorship/story-e6frgakx-1225870756466"> -Call to join Tor network to fight censorship</a></td> +<td><a href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466">Call to join Tor network to fight censorship</a></td> </tr>
<tr> <td>2010 Mar 25</td> <td>The Tor Project</td> -<td>Tor and Printfection launch <a href="<page -press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td> +<td>Tor and Printfection launch <a href="<page press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td> </tr>
<tr> <td>2010 Mar 17</td> <td>PC World Poland</td> -<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity -in the Web</a></td> +<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity in the Web</a></td> </tr>
<tr> <td>2010 Mar 11</td> <td>ABC Australia</td> -<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm"> -Future Tense: The Deep Web</a></td> +<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense: The Deep Web</a></td> </tr>
<tr> <td>2010 Mar 09</td> <td>PC Pro UK</td> -<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web"> -The dark -side of the web</a></td> +<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">The dark side of the web</a></td> </tr>
<tr> <td>2009 Dec 29</td> <td>Times Online</td> -<td><a href="http://www.timesonline.co.uk/tol/news/world/middle_east/ -article6969958.ece">When -Iran’s regime falls this will be remembered as the YouTube revolution -</a></td> +<td><a href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.ece">When Iran’s regime falls this will be remembered as the YouTube revolution</a></td> </tr>
<tr> <td>2009 Oct 15</td> <td>Technology Review</td> -<td><a href="http://www.technologyreview.com/web/23736/?a=f">China -Cracks Down -on Tor Anonymity Network</a></td> +<td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down on Tor Anonymity Network</a></td> </tr>
<tr> <td>2009 Sep 30</td> <td>BusinessWeek</td> -<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/ -gb20090930_620354.htm">China's Online Censors Work Overtime</a></td> +<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.htm">China's Online Censors Work Overtime</a></td> </tr>
<tr> <td>2009 Aug 19</td> <td>Reuters</td> -<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819? -pageNumber=1&virtualBrandChannel=0&sp=true">Web tools help -protect human -rights activists</a></td> +<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?pageNumber=1&virtualBrandChannel=0&sp=true">Web tools help protect human rights activists</a></td> </tr>
<tr> <td>2009 Aug 10</td> <td>Technology Review</td> -<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How -to Build Anonymity Into the Internet</a></td> +<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How to Build Anonymity Into the Internet</a></td> </tr>
<tr> <td>2009 Jul 26</td> <td>Washington Times</td> -<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran- -dodge-internet-censorship/">Senate OKs funds to thwart Iran Web -censors</a></td> +<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td> </tr>
<tr> <td>2009 Jul 26</td> <td>Boston Globe</td> -<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/ -us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike -aid aimed -at Iranians</a></td> +<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed at Iranians</a></td> </tr>
<tr> <td>2009 Jul 24</td> <td>Associated Press</td> -<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf- -p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude -crackdown on -Internet</a></td> +<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude crackdown on Internet</a></td> </tr>
<tr> <td>2009 Jul 08</td> <td>Tehran Bureau</td> -<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks -Around the Globe Rally to Help Iranians Online</a></td> +<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks Around the Globe Rally to Help Iranians Online</a></td> </tr>
<tr> <td>2009 Jul 02</td> <td>NED/CIMA</td> -<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role -of New Media in the Iranian Elections</a></td> +<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td> </tr>
<tr> <td>2009 Jun 26</td> <td>Washington Times</td> -<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use- -navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian -protesters avoid censorship with Navy technology</a></td> +<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid censorship with Navy technology</a></td> </tr>
<tr> <td>2009 Jun 29</td> <td>EFF</td> -<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor- -relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor -Relay</a></td> +<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor Relay</a></td> </tr>
<tr> <td>2009 Jun 24</td> <td>Daily Finance</td> -<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran- -controversy/">Nokia and Siemens in Iran controversy</a></td> +<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-controversy/">Nokia and Siemens in Iran controversy</a></td> </tr>
<tr> <td>2009 Jun 18</td> <td>Wall Street Journal</td> -<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to- -anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td> +<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td> </tr>
<tr> <td>2009 Jun 19</td> <td>O'Reilly Radar</td> -<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html"> -Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor -Project and the EFF</a></td> +<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project and the EFF</a></td> </tr>
<tr> <td>2009 Jun 18</td> <td>Deutsche Welle</td> -<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html"> -Internet proxies let Iranians and others connect to blocked Web sites</a></td> +<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet proxies let Iranians and others connect to blocked Web sites</a></td> </tr>
<tr> <td>2009 Jun 18</td> <td>Technology Review</td> -<td><a href="http://www.technologyreview.com/web/22893/"> -The Web vs. the Republic of Iran</a></td> +<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the Republic of Iran</a></td> </tr>
<tr> <td>2009 Jun 17</td> <td>CNet News</td> -<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html"> -Iranians find ways to bypass Net censors</a></td> +<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find ways to bypass Net censors</a></td> </tr>
<tr> <td>2009 Jun 17</td> <td>ComputerWorld</td> -<td><a href="http://www.computerworld.com/action/article.do?command= -viewArticleBasic&articleId=9134471&intsrc=news_ts_head"> -Iran's leaders fight Internet; Internet wins (so far)</a></td> +<td><a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9134471&intsrc=news_ts_head">Iran's leaders fight Internet; Internet wins (so far)</a></td> </tr>
<tr> <td>2009 May 29</td> <td>Le Monde</td> -<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les- -censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td> +<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td> </tr>
<tr> <td>2009 May 15</td> <td>Mass High Tech</td> -<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor- -tackles-Net-privacy-game-makers-flock-to-Hub.html"> +<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html"> Tor tackles Net privacy</a></td> </tr>
<tr> <td>2009 May 01</td> <td>New York Times</td> -<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html"> -Iranians and Others Outwit Net Censors</a></td> +<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and Others Outwit Net Censors</a></td> </tr>
<tr> <td>2009 Apr 23</td> <td>Technology Review</td> -<td><a href="http://www.technologyreview.com/computing/22427/?a=f"> -Dissent Made Safer: How anonymity technology could save free speech on the -Internet.</a></td> +<td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made Safer: How anonymity technology could save free speech on the Internet.</a></td> </tr>
<tr> <td>2009 Apr 22</td> <td>Le Monde</td> -<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la --cybersurveillance/">How to circumvent cybersurveillance</a></td> +<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</a></td> </tr>
<tr> <td>2009 Apr 06</td> <td>Reader's Digest</td> -<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/ -article122219.html">How to Hide Anything</a></td> +<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">How to Hide Anything</a></td> </tr>
<tr> <td>2009 Apr 06</td> <td>Al Jazeera</td> -<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ"> -Global Village Voices showcases Tor</a></td> +<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village Voices showcases Tor</a></td> </tr>
<tr> <td>2009 Mar 18</td> <td>Marie Claire</td> -<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image"> -How to Manage Your Web Footprint</a></td> +<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td> </tr>
<tr> <td>2009 Mar 13</td> <td>Wall Street Journal</td> -<td><a href="http://online.wsj.com/article/SB123567809587886053.html"> -The Kindness of Strangers</a></td> +<td><a href="http://online.wsj.com/article/SB123567809587886053.html">The Kindness of Strangers</a></td> </tr>
<tr> <td>2009 Mar 12</td> <td>The Tor Project</td> -<td>Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>"> -performance roadmap</a> and campaign.</td> +<td>Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>">performance roadmap</a> and campaign.</td> </tr>
<tr> <td>2009 Mar 12</td> <td>BBC World Service</td> -<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march- -world-day-against-cyber-censorship/">Steven J Murdoch interviewed about -Tor and Censorship</a></td> +<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about Tor and Censorship</a></td> </tr>
<tr> <td>2009 Mar 03</td> <td>Orf Austria</td> -<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER -column</a></td> +<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER column</a></td> </tr>
<tr> <td>2009 Feb 18</td> <td>Bangkok Post</td> -<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404- -not-found-routine">The old fake "404 not found" routine</a></td> +<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine">The old fake "404 not found" routine</a></td> </tr>
<tr> <td>2009 Feb 13</td> <td>Hearsay Culture</td> -<td><a href="http://www.hearsayculture.com/?p=307"> -Hearsay Culture Radio Interview/Podcast</a></td> +<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td> </tr>
<tr> <td>2008 Dec 29</td> <td>nu.nl</td> -<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html"> -Anoniem browsen voor gsm in de maak</a></td> +<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td> </tr>
<tr> <tr> <td>2008 Dec 19</td> <td>The Tor Project</td> -<td>Tor announces 3-year <a href="<page press/2008-12-19-roadmap-press-release>"> -development roadmap</a>.</td> +<td>Tor announces 3-year <a href="<page press/2008-12-19-roadmap-press-release>">development roadmap</a>.</td> </tr>
<tr> <td>2008 Dec 14</td> <td>PC Magazine: Middle & Near East</td> -<td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039"> -How To Reclaim Your Online Privacy</a></td> +<td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To Reclaim Your Online Privacy</a></td> </tr>
<tr> <td>2008 Aug 21</td> <td>CNN</td> -<td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html"> -Experts: Internet filtering and censorship rife</a></td> +<td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts: Internet filtering and censorship rife</a></td> </tr>
<tr> <td>2008 Aug 22</td> <td>The Sydney Morning Herald</td> -<td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/ -1218911800889.html">The +<td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The China Syndrome</a></td> </tr>
<tr> <td>2008 Aug 20</td> <td>Scientific American</td> -<td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe"> -Cryptography: How to Keep Your Secrets Safe</a></td> +<td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography: How to Keep Your Secrets Safe</a></td> </tr>
<tr> <td>2008 Aug 05</td> <td>Guardian UK</td> -<td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship"> -Vaulting the great firewall</a></td> +<td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting the great firewall</a></td> </tr>
<tr> <td>2008 Aug 10</td> <td>Tech Radar UK</td> -<td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233"> -Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous -surfing for the paranoid</a> +<td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a> </td> </tr>
<tr> <td>2008 Aug 07</td> <td>Spiegel</td> -<td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html"> -Tricks gegen Zensur und Überwachung</a> +<td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks gegen Zensur und Überwachung</a> </td> </tr>
<tr> <td>2008 Aug 07</td> <td>PC World</td> -<td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html"> -15 Great, Free Privacy Downloads</a>. Tor is Number 1.</td> +<td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15 Great, Free Privacy Downloads</a>. Tor is Number 1.</td> </tr>
<tr> <td>2008 Aug 07</td> <td>The Guardian UK</td> -<td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking"> -Chaos aims to crack China's wall</a> +<td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos aims to crack China's wall</a> </td> </tr>
<tr> <td>2008 Aug 07</td> <td>The Register UK</td> -<td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/"> -German hackers poke hole in great firewall of China</a> +<td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German hackers poke hole in great firewall of China</a> </td> </tr>
<tr> <td>2008 May 24</td> <td>Groupo Estado</td> -<td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525"> -Interview at Computers, Freedom, and Privacy 2008 Conference</a> +<td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525">Interview at Computers, Freedom, and Privacy 2008 Conference</a> </td> </tr>
<tr> <td>2008 Mar 12</td> <td>SearchSecurity.com</td> -<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html"> -Tor network 'bridges' help evade blockers</a>. -Covers new Tor features designed to overcome filtering and blocking that -prevent -access -to the Tor network. +<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">Tor network 'bridges' help evade blockers</a>.Covers new Tor features designed to overcome filtering and blocking that prevent access to the Tor network. </td> </tr>
<tr> <td>2008 Feb 14</td> <td>Wired: Compiler Blog</td> -<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html"> -How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>. +<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>. </td> </tr>
<tr> <td>2008 Feb 01</td> <td>PC World</td> -<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html"> -Hackers Can Expose Masked Surfers, Study Says</a> -A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> -Steven Murdoch's recent PhD thesis</a>. Steven -<a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> -responds on the Tor Blog</a>.</td> +<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">Hackers Can Expose Masked Surfers, Study Says</a>A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/"> +Steven Murdoch's recent PhD thesis</a>. Steven <a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> responds on the Tor Blog</a>.</td> </tr>
<tr> <td>2007 Sep 21</td> <td>Wired HowTo Blog</td> -<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work"> -Be a Whistleblower</a>. Wired recommends Tor for whistleblowers who wish to -remain anonymous.</td> +<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">Be a Whistleblower</a>. Wired recommends Tor for whistleblowers who wish to remain anonymous.</td> </tr>
<tr> <td>2007 Sep 16</td> <td>Cnet</td> -<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor -anonymity server admin arrested</a>. A Tor exit node operator from -Germany was arrested and then released once the police realized their -mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> -caused this operator to shut down the node</a>. We have an -<a href="<page docs/faq-abuse>">Abuse FAQ for Tor Relay Operators</a>, -as well as a -<a href="<page eff/tor-legal-faq>">Legal FAQ for Tor Relay Operators</a> -with advice on how to handle such issues if you are operating a Tor relay.</td> +<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor anonymity server admin arrested</a>. A Tor exit node operator from Germany was arrested and then released once the police realized their +mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>. We have an +<a href="<page docs/faq-abuse>">Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>">Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.</td> </tr>
<tr> <td>2007 Sep 10</td> <td>Wired</td> -<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> -Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> -Swedish computer security consultant Dan Egerstad monitored the traffic -going through a Tor exit node he was running, then published unencrypted -account and password information. Note that the better articles -covering this event correctly indicate that this is not a security flaw -or design problem with Tor - Tor provides anonymity, but does not -encrypt anything going to or from an exit node. You -<strong>must</strong> use SSL (https) while browsing to ensure +<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic +going through a Tor exit node he was running, then published unencrypted account and password information. Note that the better articles covering this event correctly indicate that this is not a security flaw +or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption. Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">