[tor-commits] r26522: {website} patch from ticket 10556 for press page. (website/trunk/press/en)

Andrew Lewman andrew at torproject.org
Sun Jan 5 01:57:37 UTC 2014


Author: phobos
Date: 2014-01-05 01:57:37 +0000 (Sun, 05 Jan 2014)
New Revision: 26522

Modified:
   website/trunk/press/en/press.wml
Log:
patch from ticket 10556 for press page.


Modified: website/trunk/press/en/press.wml
===================================================================
--- website/trunk/press/en/press.wml	2014-01-04 17:10:55 UTC (rev 26521)
+++ website/trunk/press/en/press.wml	2014-01-05 01:57:37 UTC (rev 26522)
@@ -25,14 +25,250 @@
 
 <table width="100%" cellpadding="3" cellspacing="0">
 
-<thead style="background-color: #e5e5e5;">
+<thead style="">
 <tr>
 <th width="15%">Date</th>
 <th width="15%">Publication</th>
 <th>Topic</th>
 </tr>
 </thead>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Dec 16</td>
+<td>PBS</td>
+<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a></td>
+</tr>
 <tr>
+<td>2013 Dec 5</td>
+<td>Nieman Journalisim Lab</td>
+<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools for journalists</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Dec 2</td>
+<td>EFF</td>
+<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">An Open Letter Urging Universities To Encourage Conversation About Online Privacy</a></td>
+</tr>
+<tr>
+<td>2013 Nov 26</td>
+<td>TechRepublic</td>
+<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">Get a grip on TOR with Vidalia</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Nov 20</td>
+<td>PBS</td>
+<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td>
+</tr>
+<tr>
+<td>2013 Nov 10</td>
+<td>Politiken.dk</td>
+<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Nov 5</td>
+<td>The Guardian</td>
+<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">What is Tor? A beginner's guide to the privacy tool</a></td>
+</tr>
+<tr>
+<td>2013 Oct 25</td>
+<td>MIT Technology Review</td>
+<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 23</td>
+<td>Tom's Guide</td>
+<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">What Is Tor? Answers to Frequently Asked Questions</a></td>
+</tr>
+<tr>
+<td>2013 Oct 18</td>
+<td>Forbes</td>
+<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 10</td>
+<td>VentureBeat</td>
+<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td>
+</tr>
+<tr>
+<td>2013 Oct 8</td>
+<td>InformationWeek</td>
+<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 8</td>
+<td>The Next Web</td>
+<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">What is Tor and why does it matter?</a></td>
+</tr>
+<tr>
+<td>2013 Oct 7</td>
+<td>Ars Technica</td>
+<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 7</td>
+<td>Infosecurity</td>
+<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td>
+</tr>
+<tr>
+<td>2013 Oct 4</td>
+<td>Washington Post</td>
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">Everything you need to know about the NSA and Tor in one FAQ</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 4</td>
+<td>eWeek</td>
+<td><a href="http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/">Snowden Leaks Show NSA Targets Tor</a></td>
+</tr>
+<tr>
+<td>2013 Oct 4</td>
+<td>The Guardian</td>
+<td><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">Attacking Tor: how the NSA targets users' online anonymity</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 4</td>
+<td>TIME</td>
+<td><a href="http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/">Docs Reveal NSA Campaign Against Anonymous Tor Network</a></td>
+</tr>
+<tr>
+<td>2013 Oct 4</td>
+<td>ITProPortal</td>
+<td><a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/">NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 4</td>
+<td>InfoWorld</td>
+<td><a href="http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244">The Tor teardown, brought to you by goats, giraffes, and Thor's hammer</a></td>
+</tr>
+<tr>
+<td>2013 Oct 4</td>
+<td>Computerworld</td>
+<td><a href="http://www.computerworld.com/s/article/9242992/Report_NSA_has_little_success_cracking_Tor?taxonomyId=13">Report: NSA has little success cracking Tor</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Oct 4</td>
+<td>Ars Technica</td>
+<td><a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show</a></td>
+</tr>
+<tr>
+<td>2013 Oct 4</td>
+<td>CNET</td>
+<td><a href="http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/">NSA sought to unmask users of Net-privacy tool Tor, says report</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Sep 16</td>
+<td>InformationWeek</td>
+<td><a href="http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553">FBI Admits To Tor Server Takeover</a></td>
+</tr>
+<tr>
+<td>2013 Sep 16</td>
+<td>Techworld</td>
+<td><a href="http://news.techworld.com/security/3468988/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa/">Mevade botnet miscalculated effect on Tor network, says Damballa</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Sep 14</td>
+<td>Gizmodo</td>
+<td><a href="http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/">FBI Admits To Hacking Into The Tor Network</a></td>
+</tr>
+<tr>
+<td>2013 Sep 13</td>
+<td>Wired</td>
+<td><a href="http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/">FBI Admits It Controlled Tor Servers Behind Mass Malware Attack</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Sep 11</td>
+<td>Infosecurity</td>
+<td><a href="http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/">Massive Botnet is Behind Tor Usage Spike</a></td>
+</tr>
+<tr>
+<td>2013 Sep 11</td>
+<td>MIT Technology Review</td>
+<td><a href="http://www.technologyreview.com/view/519186/security-flaw-shows-tor-anonymity-network-dominated-by-botnet-command-and-control/">Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Sep 11</td>
+<td>Tom's Guide</td>
+<td><a href="http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html">Is Tor's Anonymous Internet Still Secure?</a></td>
+</tr>
+<tr>
+<td>2013 Sep 9</td>
+<td>TechWeek Europe</td>
+<td><a href="http://www.techweekeurope.co.uk/news/mevade-botnet-tor-network-126497">Tor Network Spike Caused By Botnet</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Sep 5</td>
+<td>Gizmodo</td>
+<td><a href="http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241">The Anonymous Internet Is Under Attack</a></td>
+</tr>
+<tr>
+<td>2013 Sep 4</td>
+<td>Stuff.co.nz</td>
+<td><a href="http://www.stuff.co.nz/technology/digital-living/9120947/Is-Tor-right-for-you">Is Tor right for you?</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Sep 3</td>
+<td>PC Advisor</td>
+<td><a href="http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/">Tor traffic doubles in a week to reach highest ever level</a></td>
+</tr>
+<tr>
+<td>2013 Aug 29</td>
+<td>RT</td>
+<td><a href="http://rt.com/usa/tor-membership-doubled-nsa-137/">Tor anonymity network membership has doubled since NSA leak</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Aug 6</td>
+<td>BBC</td>
+<td><a href="http://www.bbc.co.uk/news/technology-23587620">Users of hidden net advised to ditch Windows</a></td>
+</tr>
+<tr>
+<td>2013 Aug 6</td>
+<td>ZDNet</td>
+<td><a href="http://www.zdnet.com/tor-users-advised-to-switch-away-from-windows-after-malware-attack-7000019047/">Tor users advised to 'switch away from Windows' after malware attack</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Aug 5</td>
+<td>NBC</td>
+<td><a href="http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680">How anonymous? Tor users compromised in child porn takedown</a></td>
+</tr>
+<tr>
+<td>2013 Aug 5</td>
+<td>Wired</td>
+<td><a href="http://www.wired.com/threatlevel/2013/08/freedom-hosting/">Feds Are Suspects in New Malware That Attacks Tor Anonymity</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Aug 5</td>
+<td>Naked Security</td>
+<td><a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a></td>
+</tr>
+<tr>
+<td>2013 Jul 18</td>
+<td>Huffington Post</td>
+<td><a href="http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html">Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan</a></td>
+</td>
+<tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Jul 18</td>
+<td>Gizmodo</td>
+<td><a href="http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362">The Technology You Need to Protect Against Mass Surveillance</a></td>
+</tr>
+<tr>
 <td>2013 Jul 01</td>
 <td>Slice of MIT</td>
 <td><a href="http://alum.mit.edu/pages/sliceofmit/2013/07/01/after-prism-asking-how-much-is-too-much-anonymity/">After PRISM, Is Too Much Anonymity Possible?</a></td>
@@ -46,24 +282,74 @@
 <tr>
 <td>2013 Jun 26</td>
 <td>Reason.com</td>
-<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Reason Interviews Karen Reilly of The Tor Project Regarding Online Privacy</a></td>
+<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Surf Without Surveillance: Tor's Karen Reilly</a></td>
 </tr>
 <tr style="background-color: #e5e5e5;">
+<td>2013 Jun 22</td>
+<td>TribLIVE</td>
+<td><a href="http://triblive.com/news/allegheny/4191790-74/tor-network-government">Protesters, criminals get around government censors using secret Web network</a></td>
+</tr>
+<tr>
+<td>2013 Jun 22</td>
+<td>TribLIVE</td>
+<td><a href="http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs">Hidden Web Tor helps average users and criminals avoid government snooping</a></td>
+</tr>
+<tr style="background-color: #e5e5e5;">
 <td>2013 Jun 21</td>
 <td>Fast Company</td>
 <td><a href="http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions">NSA cramping your style? Use these easy encryption solutions</a></td>
 </tr>
 <tr>
+<td>2013 Jun 19</td>
+<td>Help Net Security</td>
+<td><a href="http://www.net-security.org/secworld.php?id=15098">Facebook once again accessible via Tor</a></td>
+</tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Jun 18</td>
+<td>The Register</td>
+<td><a href="http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/">Tor users locked out of Facebook after wave of dodgy traffic</a></td>
+</tr>
+<tr>
+<td>2013 Jun 18</td>
+<td>TechWeek Europe</td>
+<td><a href="http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413">Facebook Blocks Tor Users After Heavy Malicious Activity</a></td>
+</tr>
+<tr style="background-color: #e5e5e5;">
 <td>2013 Jun 14</td>
 <td>The Salt Lake Tribune</td>
 <td><a href="http://www.sltrib.com/sltrib/world/56463680-68/privacy-data-nsa-disadvantages.html.csp">Ideas for keeping your data safe from spying</a></td>
 </tr>
+<tr>
+<td>2013 Jun 13</td>
+<td>Boston Globe</td>
+<td><a href="http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.htmlp">How to keep data away from prying eyes</a></td>
+</tr>
 <tr style="background-color: #e5e5e5;">
+<td>2013 Jun 12</td>
+<td>Washington Post</td>
+<td><a href="http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html">Secrecy-focused Web services find a mainstream audience</a></td>
+</tr>
+<tr>
 <td>2013 Jun 11</td>
 <td>Reflex (Czech)</td>
 <td><a href="http://www.reflex.cz/clanek/zpravy/50756/soukromi-na-internetu-uz-neexistuje-ale-porad-je-tu-tor.html">Privacy on the Internet already exists. But there's still Tor</a></td>
 </tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Jun 10</td>
+<td>Washington Post</td>
+<td><a href="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/">Five ways to stop the NSA from spying on you</a></td>
+</tr>
 <tr>
+<td>2013 Jun 8</td>
+<td>ZDNet</td>
+<td><a href="http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/">Ask a hacker: Top four anti-surveillance apps</a></td>
+</tr>
+<tr style="background-color: #e5e5e5;">
+<td>2013 Jun 8</td>
+<td>The Hindu</td>
+<td><a href="http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece">Cryptography as a means to counter Internet censorship</a></td>
+</tr>
+<tr>
 <td>2013 Apr 23</td>
 <td>The Verge</td>
 <td><a



More information about the tor-commits mailing list