[tor-commits] [webwml/master] Fix formatting in press clips

hiro at torproject.org hiro at torproject.org
Mon Mar 25 21:29:00 UTC 2019


commit 21993ab6975e228f9c3a78775ba5ac0957b4e7dc
Author: hiro <hiro at torproject.org>
Date:   Mon Mar 25 22:28:55 2019 +0100

    Fix formatting in press clips
---
 press/en/press.wml | 511 ++++++++++++++++++-----------------------------------
 1 file changed, 170 insertions(+), 341 deletions(-)

diff --git a/press/en/press.wml b/press/en/press.wml
index a3476444..e7cb057f 100644
--- a/press/en/press.wml
+++ b/press/en/press.wml
@@ -53,15 +53,13 @@ some of the significant Tor-related stories that have popped up.</p>
 <tr>
 <td>2019 Jan 11</td>
 <td>TechCrunch</td>
-<td><a href='https://techcrunch.com/2019/01/11/tor-lessens-reliance-us-grants/'>
-Tor pulls in record donations as it lessens reliance on US government grants</a></td>
+<td><a href='https://techcrunch.com/2019/01/11/tor-lessens-reliance-us-grants/'>Tor pulls in record donations as it lessens reliance on US government grants</a></td>
 </tr>
 
 <tr>
 <td>2019 Jan 01</td>
 <td>Wired</td>
-<td><a href='https://www.wired.com/story/tor-anonymity-easier-than-ever/'>
-Tor Is Easier Than Ever. Time to Give It a Try</a></td>
+<td><a href='https://www.wired.com/story/tor-anonymity-easier-than-ever/'>Tor Is Easier Than Ever. Time to Give It a Try</a></td>
 </tr>
 
 <tr>
@@ -74,8 +72,7 @@ Charitable Giving Guide 2018</a></td>
 <tr>
 <td>2018 Dec 10</td>
 <td>ZDNet</td>
-<td><a href='https://www.zdnet.com/article/half-of-the-tor-projects-funding-now-comes-from-the-private-sector/'>
-Half of the Tor Project's funding now comes from the private sector</a></td>
+<td><a href='https://www.zdnet.com/article/half-of-the-tor-projects-funding-now-comes-from-the-private-sector/'>Half of the Tor Project's funding now comes from the private sector</a></td>
 </tr>
 
 <tr>
@@ -137,43 +134,37 @@ Anonym Tor Browser er - nÌ_sten - klar til Android</a></td>
 <tr>
 <td>2018 Sep 10</td>
 <td>ThreatPost</td>
-<td><a href="https://threatpost.com/tor-brings-onion-browser-to-android-devices/137325/">
-Tor Brings Browser to Android Devices</a></td>
+<td><a href="https://threatpost.com/tor-brings-onion-browser-to-android-devices/137325/">Tor Brings Browser to Android Devices</a></td>
 </tr>
 
 <tr>
 <td>2018 Sep 08</td>
 <td>Gizmodo</td>
-<td><a href="http://www.gizmodo.co.uk/2018/09/the-tor-web-browser-officially-lands-on-android-in-alpha/">
-The Tor Web Browser Officially Lands on Android in Alpha</a></td>
+<td><a href="http://www.gizmodo.co.uk/2018/09/the-tor-web-browser-officially-lands-on-android-in-alpha/">The Tor Web Browser Officially Lands on Android in Alpha</a></td>
 </tr>
 
 <tr>
 <td>2018 Sep 07</td>
 <td>TechCrunch</td>
-<td><a href='https://techcrunch.com/2018/09/07/tor-project-launches-official-mobile-browser-for-android/'>
-Tor Project launches official mobile browser for Android </a></td>
+<td><a href='https://techcrunch.com/2018/09/07/tor-project-launches-official-mobile-browser-for-android/'>Tor Project launches official mobile browser for Android </a></td>
 </tr>
 
 <tr>
 <td>2018 Sep 07</td>
 <td>CyberScoop</td>
-<td><a href="https://www.cyberscoop.com/adware-doctor-mac-os-china/">
-Tor launches official anonymous Android browser</a></td>
+<td><a href="https://www.cyberscoop.com/adware-doctor-mac-os-china/">Tor launches official anonymous Android browser</a></td>
 </tr>
 
 <tr>
 <td>2018 Sep 07</td>
 <td>VentureBeat</td>
-<td><a href="https://venturebeat.com/2018/09/07/tor-gets-its-first-official-mobile-browser/">
-Tor gets its first official mobile browser</a></td>
+<td><a href="https://venturebeat.com/2018/09/07/tor-gets-its-first-official-mobile-browser/">Tor gets its first official mobile browser</a></td>
 </tr>
 
 <tr>
 <td>2018 Sep 06</td>
 <td>ZDNet</td>
-<td><a href="https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/">
-Tor Browser gets a redesign</a></td>
+<td><a href="https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/">Tor Browser gets a redesign</a></td>
 </tr>
 
 <tr>
@@ -186,8 +177,7 @@ Chrome lost its shine? Five alternative browsers to try</a></td>
 <tr>
 <td>2018 Sep 05</td>
 <td>VentureBeat</td>
-<td><a href="https://venturebeat.com/2018/09/05/tor-browser-8-0-arrives-with-new-user-onboarding-improved-bridge-fetching-and-better-language-support/">
-Tor Browser 8.0 Released: New Onboarding Experience & Optimized Bridge Fetching
+<td><a href="https://venturebeat.com/2018/09/05/tor-browser-8-0-arrives-with-new-user-onboarding-improved-bridge-fetching-and-better-language-support/">Tor Browser 8.0 Released: New Onboarding Experience & Optimized Bridge Fetching
 </a></td>
 </tr>
 
@@ -212,177 +202,151 @@ Tor Browser 8.0 Released: New Onboarding Experience & Optimized Bridge Fetch
 <tr>
 <td>2018 Jul 09</td>
 <td>Tech Republic</td>
-<td><a href="https://www.techrepublic.com/article/5-ways-to-protect-your-privacy/">
-Top 5: Ways to protect your privacy</a></td>
+<td><a href="https://www.techrepublic.com/article/5-ways-to-protect-your-privacy/">Top 5: Ways to protect your privacy</a></td>
 </tr>
 
 <tr>
 <td>2018 Jul 02</td>
 <td>Mada Masr</td>
-<td><a href="https://www.madamasr.com/en/2018/07/02/news/u/report-internet-censorship-has-become-more-pervasive-in-past-year-62-of-blocked-websites-are-media-outlets/">Report:
-Internet censorship has become a "more pervasiveâ" in past year</a></td>
+<td><a href="https://www.madamasr.com/en/2018/07/02/news/u/report-internet-censorship-has-become-more-pervasive-in-past-year-62-of-blocked-websites-are-media-outlets/">Report: Internet censorship has become a "more pervasiveâ" in past year</a></td>
 </tr>
 
 <tr>
 <td>2018 Jun 28</td>
 <td>CNET</td>
-<td><a href="https://www.cnet.com/news/brave-advances-browser-privacy-with-tor-powered-tabs/">Brave
-advances browser privacy with Tor-powered tabs</a></td>
+<td><a href="https://www.cnet.com/news/brave-advances-browser-privacy-with-tor-powered-tabs/">Brave advances browser privacy with Tor-powered tabs</a></td>
 </tr>
 
 <tr>
 <td>2018 Jun 27</td>
 <td>ZDNet</td>
-<td><a href="https://www.zdnet.com/article/venezuela-ramps-up-censorship-with-tor-ban/">Venezuela ramps
-up censorship</a></td>
+<td><a href="https://www.zdnet.com/article/venezuela-ramps-up-censorship-with-tor-ban/">Venezuela ramps up censorship</a></td>
 </tr>
 
 <tr>
 <td>2018 Jun 26</td>
 <td>VICE</td>
-<td><a href="https://news.vice.com/en_us/article/59qvwz/venezuela-maduro-tor-network-censorship">Venezuela just
-took a huge step towards controlling all access to the Internet</a></td>
+<td><a href="https://news.vice.com/en_us/article/59qvwz/venezuela-maduro-tor-network-censorship">Venezuela just took a huge step towards controlling all access to the Internet</a></td>
 </tr>
 
 <tr>
 <td>2018 Jun 18</td>
 <td>FossBytes</td>
-<td><a href="https://fossbytes.com/tor-browser-8-0-released-features-download/">
-Tor Browser 8.0 arrives with new user onboarding,
-</a></td>
+<td><a href="https://fossbytes.com/tor-browser-8-0-released-features-download/">Tor Browser 8.0 arrives with new user onboarding</a></td>
 </tr>
 
 <tr>
 <td>2018 May 30</td>
 <td>ZDNet</td>
-<td><a href="https://www.zdnet.com/article/technology-that-changed-us-the-2000s/">
-Technology that changed us: The 2000s, from iPhone to Twitter</a></td>
+<td><a href="https://www.zdnet.com/article/technology-that-changed-us-the-2000s/">Technology that changed us: The 2000s, from iPhone to Twitter</a></td>
 </tr>
 
 <tr>
 <td>2018 May 10</td>
 <td>CBC</td>
-<td><a href="http://www.cbc.ca/news/technology/ooni-tor-information-controls-measurement-censorship-iran-1.4653523">
-When governments censor websites and block messaging apps like Telegram, here's where to turn for proof</a></td>
+<td><a href="http://www.cbc.ca/news/technology/ooni-tor-information-controls-measurement-censorship-iran-1.4653523">When governments censor websites and block messaging apps like Telegram, here's where to turn for proof</a></td>
 </tr>
 
 <tr>
 <td>2018 May 8</td>
 <td>TechLector</td>
-<td><a href="https://techlector.com/tor-project-will-transfer-to-azure-to-continue-offering-domain-fronting/">
-Tor Project will transfer to Azure to continue offering domain fronting</a></td>
+<td><a href="https://techlector.com/tor-project-will-transfer-to-azure-to-continue-offering-domain-fronting/">Tor Project will transfer to Azure to continue offering domain fronting</a></td>
 </tr>
 
 <tr>
 <td>2018 May 7</td>
 <td>TechRadar</td>
-<td><a href="https://www.techradar.com/how-to/how-to-become-anonymous-online">
-How to become anonymous online</a></td>
+<td><a href="https://www.techradar.com/how-to/how-to-become-anonymous-online">How to become anonymous online</a></td>
 </tr>
 
 <tr>
 <td>2018 May 4</td>
 <td>Dark Web news</td>
-<td><a href="https://darkwebnews.com/anonymity-tools/tor/new-tor-executive-director/">
-New Tor Project Executive Director</a></td>
+<td><a href="https://darkwebnews.com/anonymity-tools/tor/new-tor-executive-director/">New Tor Project Executive Director</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 20</td>
 <td>TechDirt</td>
-<td><a href="https://www.techdirt.com/articles/20180419/16184539674/bad-decisions-google-screws-over-tools-evading-internet-censorship-regimes.shtml">
-Tools Evading Internet Censorship Regimes</a></td>
+<td><a href="https://www.techdirt.com/articles/20180419/16184539674/bad-decisions-google-screws-over-tools-evading-internet-censorship-regimes.shtml">Tools Evading Internet Censorship Regimes</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 19</td>
 <td>Version2</td>
-<td><a href="https://www.version2.dk/artikel/dansk-tor-udvikler-saadan-vil-vi-goere-lettere-at-vaere-anonym-paa-mobilen-1084911">
-Dansk Tor-udvikler: SÌ´dan vil vi gÌüre det lettere at vÌ_re anonym pÌ´ mobilen</a></td>
+<td><a href="https://www.version2.dk/artikel/dansk-tor-udvikler-saadan-vil-vi-goere-lettere-at-vaere-anonym-paa-mobilen-1084911">Dansk Tor-udvikler: SÌ´dan vil vi gÌüre det lettere at vÌ_re anonym pÌ´ mobilen</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 13</td>
 <td>Le Mondes</td>
-<td><a href="http://www.lemonde.fr/pixels/article/2018/04/13/comment-facebook-piste-les-internautes-qui-ne-sont-pas-sur-le-reseau-social_5285079_4408996.html">
-Comment Facebook piste les internautes qui ne sont pas sur le reseau sociale</a></td>
+<td><a href="http://www.lemonde.fr/pixels/article/2018/04/13/comment-facebook-piste-les-internautes-qui-ne-sont-pas-sur-le-reseau-social_5285079_4408996.html">Comment Facebook piste les internautes qui ne sont pas sur le reseau sociale</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 2</td>
 <td>Digital Trends</td>
-<td><a href="https://www.digitaltrends.com/home/alexa-voice-charity-donation/">
-Raise your voice for a good cause</a></td>
+<td><a href="https://www.digitaltrends.com/home/alexa-voice-charity-donation/">Raise your voice for a good cause</a></td>
 </tr>
 
 <tr>
 <td>2018 Mar 19</td>
 <td>Mozilla</td>
-<td><a href="https://medium.com/read-write-participate/welcoming-11-new-partners-in-the-quest-for-internet-health-843c8d1b2bf9">
-11 New Partners in Quest for Internet Health</a></td>
+<td><a href="https://medium.com/read-write-participate/welcoming-11-new-partners-in-the-quest-for-internet-health-843c8d1b2bf9">11 New Partners in Quest for Internet Health</a></td>
 </tr>
 
 <tr>
 <td>2018 Mar 15</td>
 <td>Tom's Hardware</td>
-<td><a href="https://www.tomshardware.com/news/turkey-blocks-protonmail-encrypted-email,36675.html">
-Turkey Blocks ProtonMail E2E Encrypted Email Service</a></td>
+<td><a href="https://www.tomshardware.com/news/turkey-blocks-protonmail-encrypted-email,36675.html">Turkey Blocks ProtonMail E2E Encrypted Email Service</a></td>
 </tr>
 
 <tr>
 <td>2018 Mar 13</td>
 <td>The Daily Dot</td>
-<td><a href="https://www.dailydot.com/layer8/internet-shutdowns/">
-The slow creep of internet shutdowns</a></td>
+<td><a href="https://www.dailydot.com/layer8/internet-shutdowns/">The slow creep of internet shutdowns</a></td>
 </tr>
 
 <tr>
 <td>2018 Feb 22</td>
 <td>CyberScoop</td>
-<td><a href="https://www.cyberscoop.com/shari-steele-tor-director-resigns">
-Tor executive director Shari Steele to step down</a></td>
+<td><a href="https://www.cyberscoop.com/shari-steele-tor-director-resigns">Tor executive director Shari Steele to step down</a></td>
 </tr>
 
 <tr>
 <td>2018 Feb 22</td>
 <td>The Verge</td>
-<td><a href="https://www.theverge.com/2018/2/22/17042544/tor-director-shari-steele-steps-down">
-Tor director Shari Steele steps down</a></td>
+<td><a href="https://www.theverge.com/2018/2/22/17042544/tor-director-shari-steele-steps-down">Tor director Shari Steele steps down</a></td>
 </tr>
 
 <tr>
 <td>2018 Feb 3</td>
 <td>WIRED</td>
-<td><a href="http://www.wired.co.uk/article/sex-toy-bluetooth-hacks-security-fix">
-Tor could be the answer to safer connected sex</a></td>
+<td><a href="http://www.wired.co.uk/article/sex-toy-bluetooth-hacks-security-fix">Tor could be the answer to safer connected sex</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 25</td>
 <td>International Business Times</td>
-<td><a href="http://www.ibtimes.com/tor-browser-75-update-released-whats-new-2645166">
-Tor Browser 7.5 Update Released: What's New?</a></td>
+<td><a href="http://www.ibtimes.com/tor-browser-75-update-released-whats-new-2645166">Tor Browser 7.5 Update Released: What's New?</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 24</td>
 <td>Tom's Hardware</td>
-<td><a href="http://www.tomshardware.com/news/tor-7.5-next-gen-onion-services,36397.html">
-Tor Browser 7.5 Launches With Support For Next-Gen Onion Services</a></td>
+<td><a href="http://www.tomshardware.com/news/tor-7.5-next-gen-onion-services,36397.html">Tor Browser 7.5 Launches With Support For Next-Gen Onion Services</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 2</td>
 <td>Sky News</td>
-<td><a href="https://news.sky.com/story/google-faces-calls-to-lift-anti-censorship-blocks-in-iran-11192888">
-The number of Iranians using Tor has surged to over 10,000</a></td>
+<td><a href="https://news.sky.com/story/google-faces-calls-to-lift-anti-censorship-blocks-in-iran-11192888">The number of Iranians using Tor has surged to over 10,000</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 2</td>
 <td>Sky News</td>
-<td><a href="https://news.sky.com/story/iranian-web-crackdown-drives-surge-in-privacy-technology-11191740">
-Iranian web crackdown drives surge in privacy technology</a></td>
+<td><a href="https://news.sky.com/story/iranian-web-crackdown-drives-surge-in-privacy-technology-11191740">Iranian web crackdown drives surge in privacy technology</a></td>
 </tr>
 
 <tr>
@@ -395,8 +359,7 @@ Charitable Giving Guide 2017</a></td>
 <tr>
 <td>2017 Dec 9</td>
 <td>WIRED</td>
-<td><a href="https://www.wired.com/story/the-grand-tor">
-The Grand Tor: How to Go Anonymous Online</a></td>
+<td><a href="https://www.wired.com/story/the-grand-tor">The Grand Tor: How to Go Anonymous Online</a></td>
 </tr>
 
 <tr>
@@ -409,64 +372,55 @@ Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation</a></td
 <tr>
 <td>2017 Nov 15</td>
 <td>Motherboard</td>
-<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">
-The Motherboard Guide to Not Getting Hacked</a></td>
+<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">The Motherboard Guide to Not Getting Hacked</a></td>
 </tr>
 
 <tr>
 <td>2017 Oct 30</td>
 <td>NakedSecurity</td>
-<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">
-Firefox takes a bite out of the canvas 'super cookie'</a></td>
+<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">Firefox takes a bite out of the canvas 'super cookie'</a></td>
 </tr>
 
 <tr>
 <td>2017 Oct 30</td>
 <td>BleepingComputer</td>
-<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">
-Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
+<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
 </tr>
 
 <tr>
 <td>2017 Oct 27</td>
 <td>NYTimes</td>
-<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">
-The New York Times is Now Available as a Tor Onion Service</a></td>
+<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">The New York Times is Now Available as a Tor Onion Service</a></td>
 </tr>
 
 <tr>
 <td>2017 Sep 7</td>
 <td>Threatpost</td>
-<td><a href="https://threatpost.com/tor-project-brings-security-slider-feature-to-android-app-orfox/127849/">
-Tor Project Brings Security Slider Feature to Android App Orfox</a></td>
+<td><a href="https://threatpost.com/tor-project-brings-security-slider-feature-to-android-app-orfox/127849/">Tor Project Brings Security Slider Feature to Android App Orfox</a></td>
 </tr>
 
 <tr>
 <td>2017 Sep 5</td>
 <td>Extreme Tech</td>
-<td><a href="https://www.extremetech.com/mobile/255057-tor-project-adds-new-features-mobile-browser-support">
-Tor Amps Up its Mobile Browser Support</a></td>
+<td><a href="https://www.extremetech.com/mobile/255057-tor-project-adds-new-features-mobile-browser-support">Tor Amps Up its Mobile Browser Support</a></td>
 </tr>
 
 <tr>
 <td>2017 Aug 30</td>
 <td>Motherboard</td>
-<td><a href="https://motherboard.vice.com/amp/en_us/article/vbbjxm/here-are-the-41-websites-you-cant-access-in-cuba">
-Here Are the 41 Websites You Can't Access in Cuba</a></td>
+<td><a href="https://motherboard.vice.com/amp/en_us/article/vbbjxm/here-are-the-41-websites-you-cant-access-in-cuba">Here Are the 41 Websites You Can't Access in Cuba</a></td>
 </tr>
 
 <tr>
 <td>2017 Aug 18</td>
 <td>Fast Company</td>
-<td><a href="https://www.fastcompany.com/40455652/the-tor-project-wont-censor-the-daily-stormer-heres-why">
-The Tor Project won't censor the Daily Stormer - here's why</a></td>
+<td><a href="https://www.fastcompany.com/40455652/the-tor-project-wont-censor-the-daily-stormer-heres-why">The Tor Project won't censor the Daily Stormer - here's why</a></td>
 </tr>
 
 <tr>
 <td>2017 Aug 17</td>
 <td>CNET</td>
-<td><a href="https://www.cnet.com/g00/news/tor-project-disgusted-by-daily-stormer-defends-software-ethos-nazi-racist">
-Tor Project 'disgusted' by Daily Stormer, defends software ethos</a></td>
+<td><a href="https://www.cnet.com/g00/news/tor-project-disgusted-by-daily-stormer-defends-software-ethos-nazi-racist">Tor Project 'disgusted' by Daily Stormer, defends software ethos</a></td>
 </tr>
 
 <tr>
@@ -479,8 +433,7 @@ Dark web doesn't exist</a></td>
 <tr>
 <td>2017 Jul 20</td>
 <td>Venture Beat</td>
-<td><a href="https://venturebeat.com/2017/07/20/the-tor-project-launches-its-first-public-bug-bounty-program-through-hackerone/">
-Tor Project Opens Bug The Tor Project launches its first public bug bounty program through HackerOne</a></td>
+<td><a href="https://venturebeat.com/2017/07/20/the-tor-project-launches-its-first-public-bug-bounty-program-through-hackerone/">Tor Project Opens Bug The Tor Project launches its first public bug bounty program through HackerOne</a></td>
 </tr>
 
 <tr>
@@ -493,15 +446,13 @@ Best Free Utilities for Your Computer</a></td>
 <tr>
 <td>2017 Apr 25</td>
 <td>TechCrunch</td>
-<td><a href="https://techcrunch.com/2017/04/25/tor-project-funding-3-3-million-2015/">
-Funding for the Tor Project reached a record $3.3 million in 2015</a></td>
+<td><a href="https://techcrunch.com/2017/04/25/tor-project-funding-3-3-million-2015/">Funding for the Tor Project reached a record $3.3 million in 2015</a></td>
 </tr>
 
 <tr>
 <td>2017 Feb 9</td>
 <td>Forbes</td>
-<td><a href="https://www.forbes.com/sites/leemathews/2017/02/09/tor-projects-new-mobile-app-alerts-you-about-surveillance-and-censorship/#1fd08a7553e0">
-Tor Project's New Mobile App Alerts You To Internet Surveillance And Censorship</a></td>
+<td><a href="https://www.forbes.com/sites/leemathews/2017/02/09/tor-projects-new-mobile-app-alerts-you-about-surveillance-and-censorship/#1fd08a7553e0">Tor Project's New Mobile App Alerts You To Internet Surveillance And Censorship</a></td>
 </tr>
 
 <tr>
@@ -514,22 +465,19 @@ Anonymous browsing with Tor reduces exposure</a></td>
 <tr>
 <td>2016 Sep 19</td>
 <td>The Guardian</td>
-<td><a href="https://www.theguardian.com/help/2016/sep/19/how-to-contact-the-guardian-securely">
-How to contact the Guardian securely</a></td>
+<td><a href="https://www.theguardian.com/help/2016/sep/19/how-to-contact-the-guardian-securely">How to contact the Guardian securely</a></td>
 </tr>
 
 <tr>
 <td>2016 Sep 16</td>
 <td>CNN</td>
-<td><a href="http://money.cnn.com/2016/09/16/technology/internet-censorship-blackouts-gabon/">
-This African country is taking an unprecedented step in internet censorship</a></td>
+<td><a href="http://money.cnn.com/2016/09/16/technology/internet-censorship-blackouts-gabon/">This African country is taking an unprecedented step in internet censorship</a></td>
 </tr>
 
 <tr>
 <td>2016 Sep 10</td>
 <td>The Merkle</td>
-<td><a href="http://themerkle.com/tor-developers-are-preparing-for-the-next-generation-of-cyberattacks/">
-Tor Developers Are Preparing For The Next Generation of Cyberattacks</a></td>
+<td><a href="http://themerkle.com/tor-developers-are-preparing-for-the-next-generation-of-cyberattacks/">Tor Developers Are Preparing For The Next Generation of Cyberattacks</a></td>
 </tr>
 
 <tr>
@@ -549,22 +497,19 @@ DOJ’s Ovie Carroll: “Tor Helps Protect Sensitive User Information”</a></td
 <tr>
 <td>2016 Aug 12</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2016/08/12/the-tor-projects-social-cont.html">
-Tor Project Social Contract</a></td>
+<td><a href="http://boingboing.net/2016/08/12/the-tor-projects-social-cont.html">Tor Project Social Contract</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 11</td>
 <td>The Inquirer</td>
-<td><a href="http://www.theinquirer.net/inquirer/news/2467718/tor-creates-social-contract-promising-never-to-harm-users">
-Tor creates 'social contract' promising never to harm users</a></td>
+<td><a href="http://www.theinquirer.net/inquirer/news/2467718/tor-creates-social-contract-promising-never-to-harm-users">Tor creates 'social contract' promising never to harm users</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 10</td>
 <td>TechCrunch</td>
-<td><a href="https://techcrunch.com/2016/08/10/tors-new-social-contract-includes-no-backdoors-pledge/">
-Tor’s new social contract includes ‘no backdoors’ pledge</a></td>
+<td><a href="https://techcrunch.com/2016/08/10/tors-new-social-contract-includes-no-backdoors-pledge/">Tor’s new social contract includes ‘no backdoors’ pledge</a></td>
 </tr>
 
 <tr>
@@ -577,8 +522,7 @@ Department of Justice Official Tells Hundred Federal Judges to Use Tor</a></td>
 <tr>
 <td>2016 Aug 04</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/tor-project-0-2-8-6-improves-client-bootstrapping-performance-linux-security-506961.shtml">
-Tor Project 0.2.8.6 Improves Client Bootstrapping Performance, Linux Security</a></td>
+<td><a href="http://news.softpedia.com/news/tor-project-0-2-8-6-improves-client-bootstrapping-performance-linux-security-506961.shtml">Tor Project 0.2.8.6 Improves Client Bootstrapping Performance, Linux Security</a></td>
 </tr>
 
 <tr>
@@ -633,85 +577,73 @@ What do Tor, Tails and Caddy have in common? Mozilla bucks</a></td>
 <tr>
 <td>2016 Jun 22</td>
 <td>Tech Eye</td>
-<td><a href="http://www.techeye.net/news/human-rights-groups-furious-about-new-us-warrant-law">
-Human Rights groups furious about new US warrant law</a></td>
+<td><a href="http://www.techeye.net/news/human-rights-groups-furious-about-new-us-warrant-law">Human Rights groups furious about new US warrant law</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 22</td>
 <td>ZDNet</td>
-<td><a href="http://www.zdnet.com/article/tor-project-teams-up-with-researchers-to-toughen-up-tor-browser/">
-Tor Project teams up with researchers to toughen up Tor browser</a></td>
+<td><a href="http://www.zdnet.com/article/tor-project-teams-up-with-researchers-to-toughen-up-tor-browser/">Tor Project teams up with researchers to toughen up Tor browser</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 21</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/rule-41-online-protest/">
-Internet­rights groups launch protest over expanded FBI hacking powers</a></td>
+<td><a href="http://www.dailydot.com/layer8/rule-41-online-protest/">Internet­rights groups launch protest over expanded FBI hacking powers</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 16</td>
 <td>BBC­Persia</td>
-<td><a href="https://blog.torproject.org/blog/statement-tor-project-software-integrity-and-apple">
-Tor developer discusses privacy tools with BBC­Persia</a></td>
+<td><a href="https://blog.torproject.org/blog/statement-tor-project-software-integrity-and-apple">Tor developer discusses privacy tools with BBC­Persia</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 02</td>
 <td>dna</td>
-<td><a href="http://www.dnaindia.com/scitech/report-tor-browser-update-adds-improved-html5-support-and-duckduckgo-search-engine-2219121">
-Tor Browser update adds improved HTML5 support and DuckDuckGo search engine</a></td>
+<td><a href="http://www.dnaindia.com/scitech/report-tor-browser-update-adds-improved-html5-support-and-duckduckgo-search-engine-2219121">Tor Browser update adds improved HTML5 support and DuckDuckGo search engine</a></td>
 </tr>
 
 <tr>
 <td>2016 May 31</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/tor-browser-6-0-based-on-firefox-45-esr-released-with-updated-security-features-504668.shtml">
-Tor Browser 6.0 Based on Firefox 45­ESR Released with Updated Security Features</a></td>
+<td><a href="http://news.softpedia.com/news/tor-browser-6-0-based-on-firefox-45-esr-released-with-updated-security-features-504668.shtml">Tor Browser 6.0 Based on Firefox 45­ESR Released with Updated Security Features</a></td>
 </tr>
 
 <tr>
 <td>2016 May 25</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/tor-to-use-never-seen-before-distributed-rng-to-generate-truly-random-numbers-504461.shtml">
-Tor to Use Never­Before­Seen Distributed RNG to Generate Truly Random Numbers</a></td>
+<td><a href="http://news.softpedia.com/news/tor-to-use-never-seen-before-distributed-rng-to-generate-truly-random-numbers-504461.shtml">Tor to Use Never­Before­Seen Distributed RNG to Generate Truly Random Numbers</a></td>
 </tr>
 
 <tr>
 <td>2016 May 19</td>
 <td>The Merkle</td>
-<td><a href="http://themerkle.com/tor-technology-can-bring-much-needed-encryption-to-healthcare/">
-Tor Technology Can Bring Much Needed Encryption To Healthcare</a></td>
+<td><a href="http://themerkle.com/tor-technology-can-bring-much-needed-encryption-to-healthcare/">Tor Technology Can Bring Much Needed Encryption To Healthcare</a></td>
 </tr>
 
 <tr>
 <td>2016 May 12</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/uganda-censorship-circumvention-how-to/">
-How Ugandans can beat government censorship</a></td>
+<td><a href="http://www.dailydot.com/layer8/uganda-censorship-circumvention-how-to/">How Ugandans can beat government censorship</a></td>
 </tr>
 
 <tr>
 <td>2016 May 12</td>
 <td>The Huffington Post</td>
-<td><a href="http://www.huffingtonpost.com/entry/paul-syverson-tor-interview_us_5734a06ae4b060aa78197df2">
-Tor Founder: Your Medical Records Are The Next Big Target For Hackers</a></td>
+<td><a href="http://www.huffingtonpost.com/entry/paul-syverson-tor-interview_us_5734a06ae4b060aa78197df2">Tor Founder: Your Medical Records Are The Next Big Target For Hackers</a></td>
 </tr>
 
 <tr>
 <td>2016 May 12</td>
 <td>Committee to Protect Journalists</td>
-<td><a href="https://cpj.org/blog/2016/05/how-securedrop-helps-cpj-protect-journalists.php">
-How SecureDrop helps CPJ protect journalists</a></td>
+<td><a href="https://cpj.org/blog/2016/05/how-securedrop-helps-cpj-protect-journalists.php">How SecureDrop helps CPJ protect journalists</a></td>
 </tr>
 
 <tr>
 <td>2016 May 04</td>
 <td>The Mac Observer</td>
-<td><a href="https://www.macobserver.com/tmo/article/fbis-tor-vpn-targeted-warrants-amount-to-court-sanctioned-surveillance">
-FBI’s TOR, VPN­targeted Warrants Amount to Court Sanctioned Mass Surveillance</a></td>
+<td><a href="https://www.macobserver.com/tmo/article/fbis-tor-vpn-targeted-warrants-amount-to-court-sanctioned-surveillance">FBI’s TOR, VPN­targeted Warrants Amount to Court Sanctioned Mass Surveillance</a></td>
 </tr>
 
 <tr>
@@ -745,15 +677,13 @@ Countries that Use Tor Most Are Either Highly Repressive or Highly Liberal</a></
 <tr>
 <td>2016 Mar 22</td>
 <td>ComputerWorld</td>
-<td><a href="http://www.csoonline.com/article/3046505/security/tor-project-says-it-can-quickly-catch-spying-code.html">
-Tor Project says it can quickly catch spying code</a></td>
+<td><a href="http://www.csoonline.com/article/3046505/security/tor-project-says-it-can-quickly-catch-spying-code.html">Tor Project says it can quickly catch spying code</a></td>
 </tr>
 
 <tr>
 <td>2016 Mar 22</td>
 <td>The Register</td>
-<td><a href="http://www.theregister.co.uk/2016/03/22/tor_project_fbi_apple/">
-Tor Project works on anti­FBI defenses amid iOS row with Apple</a></td>
+<td><a href="http://www.theregister.co.uk/2016/03/22/tor_project_fbi_apple/">Tor Project works on anti­FBI defenses amid iOS row with Apple</a></td>
 </tr>
 
 <tr>
@@ -766,29 +696,25 @@ Like Apple, Tor Devs Would Quit Their Jobs If Ordered to Backdoor Their Software
 <tr>
 <td>2016 Feb 16</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/shari-steele-tor-project-eff/">
-The woman who aims to take Tor mainstream</a></td>
+<td><a href="http://www.dailydot.com/layer8/shari-steele-tor-project-eff/">The woman who aims to take Tor mainstream</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 22</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/business/2016/01/tor-project-raises-over-200000-in-attempt-to-diversify-its-funding/">
-Tor Project raises over $200,000 in attempt to “diversify” its funding</a></td>
+<td><a href="http://arstechnica.com/business/2016/01/tor-project-raises-over-200000-in-attempt-to-diversify-its-funding/">Tor Project raises over $200,000 in attempt to “diversify” its funding</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 20</td>
 <td>China Digital Times</td>
-<td><a href="http://money.cnn.com/2016/01/20/technology/facebook-android-tor/">
-Facebook Makes App that Can Bypass China's Censors</a></td>
+<td><a href="http://money.cnn.com/2016/01/20/technology/facebook-android-tor/">Facebook Makes App that Can Bypass China's Censors</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 20</td>
 <td>The Verge</td>
-<td><a href="http://www.theverge.com/2016/1/20/10796872/facebook-android-app-tor-support">
-Facebook's Android app now lets you flip a switch to browse over Tor</a></td>
+<td><a href="http://www.theverge.com/2016/1/20/10796872/facebook-android-app-tor-support">Facebook's Android app now lets you flip a switch to browse over Tor</a></td>
 </tr>
 
 <tr>
@@ -808,8 +734,7 @@ You can now connect to Facebook on your phone without leaving a digital trail</a
 <tr>
 <td>2016 Jan 18</td>
 <td>Sky News</td>
-<td><a href="http://news.sky.com/story/tor-map-reveals-networks-use-across-europe-10135419">
-Tor Map Reveals Network's Use Across Europe</a></td>
+<td><a href="http://news.sky.com/story/tor-map-reveals-networks-use-across-europe-10135419">Tor Map Reveals Network's Use Across Europe</a></td>
 </tr>
 
 <tr>
@@ -822,8 +747,7 @@ ProPublica launches world's first major news site for dark web</a></td>
 <tr>
 <td>2016 Jan 08</td>
 <td>Salon</td>
-<td><a href="http://www.salon.com/2016/01/08/this_is_the_web_browser_you_should_be_using_if_you_care_at_all_about_security_partner/">
-This is the web browser you should be using if you at all about security</a></td>
+<td><a href="http://www.salon.com/2016/01/08/this_is_the_web_browser_you_should_be_using_if_you_care_at_all_about_security_partner/">This is the web browser you should be using if you at all about security</a></td>
 </tr>
 
 <tr>
@@ -843,22 +767,19 @@ ProPublica Launches the Dark Web’s First Major News Site</a></td>
 <tr>
 <td>2016 Jan 05</td>
 <td>The Register</td>
-<td><a href="http://www.theregister.co.uk/2016/01/05/tor_launches_inviteonly_exploit_bug_bounty/">
-Tor launches invite­only exploit bug bounty</a></td>
+<td><a href="http://www.theregister.co.uk/2016/01/05/tor_launches_inviteonly_exploit_bug_bounty/">Tor launches invite­only exploit bug bounty</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 29</td>
 <td>MotherBoard</td>
-<td><a href="http://motherboard.vice.com/read/the-tor-project-is-starting-a-bug-bounty-program">
-The Tor Project Is Starting a Bug Bounty Program</a></td>
+<td><a href="http://motherboard.vice.com/read/the-tor-project-is-starting-a-bug-bounty-program">The Tor Project Is Starting a Bug Bounty Program</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 14</td>
 <td>ZDNET</td>
-<td><a href="http://www.zdnet.com/article/twitter-says-why-not-try-tor-after-issuing-first-state-backed-hack-alert/">
-Twitter says 'Why not try Tor?' after issuing first state­backed hack alert</a></td>
+<td><a href="http://www.zdnet.com/article/twitter-says-why-not-try-tor-after-issuing-first-state-backed-hack-alert/">Twitter says 'Why not try Tor?' after issuing first state­backed hack alert</a></td>
 </tr>
 
 <tr>
@@ -871,78 +792,67 @@ Silicon Valley's Congresswoman comes to the defense of Tor</a></td>
 <tr>
 <td>2015 Dec 11</td>
 <td>WIRED</td>
-<td><a href="https://www.wired.com/2015/12/tor-hires-a-new-leader-to-help-it-combat-the-war-on-privacy/">
-Tor Hires a New Leader to Help It Combat the War on Privacy</a></td>
+<td><a href="https://www.wired.com/2015/12/tor-hires-a-new-leader-to-help-it-combat-the-war-on-privacy/">Tor Hires a New Leader to Help It Combat the War on Privacy</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 11</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2015/12/11/the-tor-project-has-a-new-exec.html">
-The Tor Project has a new executive director: former EFF director Shari Steele!</a></td>
+<td><a href="http://boingboing.net/2015/12/11/the-tor-project-has-a-new-exec.html">The Tor Project has a new executive director: former EFF director Shari Steele!</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 10</td>
 <td>MotherBoard</td>
-<td><a href="http://motherboard.vice.com/read/tor-and-public-wi-fi-safe-in-france-prime-minister-says">
-Tor and Public Wi­Fi Safe in France, Prime Minister Says</a></td>
+<td><a href="http://motherboard.vice.com/read/tor-and-public-wi-fi-safe-in-france-prime-minister-says">Tor and Public Wi­Fi Safe in France, Prime Minister Says</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 07</td>
 <td>ZDNET</td>
-<td><a href="http://www.zdnet.com/article/france-considers-public-wi-fi-tor-network-ban-in-wake-of-terror-attacks/">
-France considers public Wi­Fi, Tor network ban in wake of terror attacks</a></td>
+<td><a href="http://www.zdnet.com/article/france-considers-public-wi-fi-tor-network-ban-in-wake-of-terror-attacks/">France considers public Wi­Fi, Tor network ban in wake of terror attacks</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 04</td>
 <td>SC Magazine</td>
-<td><a href="https://www.scmagazine.com/top-6-influential-security-thinkers/article/534087/">
-Top 6 influential security thinkers</a></td>
+<td><a href="https://www.scmagazine.com/top-6-influential-security-thinkers/article/534087/">Top 6 influential security thinkers</a></td>
 </tr>
 
 <tr>
 <td>2015 Nov 30</td>
 <td>Fusion</td>
-<td><a href="http://fusion.net/story/238742/tor-carnegie-mellon-attack/">
-The attack that broke the Dark Web—and how Tor plans to fix it.</a></td>
+<td><a href="http://fusion.net/story/238742/tor-carnegie-mellon-attack/">The attack that broke the Dark Web—and how Tor plans to fix it.</a></td>
 </tr>
 
 <tr>
 <td>2015 Nov 25</td>
 <td>The Register (UK)</td>
-<td><a href="http://www.theregister.co.uk/2015/11/25/tor_project_donations/">
-Tor Project: Anonymity ain't free, folks. Pony up</a></td>
+<td><a href="http://www.theregister.co.uk/2015/11/25/tor_project_donations/">Tor Project: Anonymity ain't free, folks. Pony up</a></td>
 </tr>
 
 <tr>
 <td>2015 Nov 16</td>
 <td>International Journalists Network (IJNet)</td>
-<td><a href="https://ijnet.org/en/blog/five-tools-journalists%E2%80%99-online-safety-privacy-highlighted-during-aaron-swartz-day-event-0">
-Five tools for journalists’ online safety, privacy highlighted during Aaron Swartz Day event</a></td>
+<td><a href="https://ijnet.org/en/blog/five-tools-journalists%E2%80%99-online-safety-privacy-highlighted-during-aaron-swartz-day-event-0">Five tools for journalists’ online safety, privacy highlighted during Aaron Swartz Day event</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 30</td>
 <td>BBC</td>
-<td><a href="http://www.bbc.com/news/technology-34677323">
-Tor launches anti­censorship Messenger service</a></td>
+<td><a href="http://www.bbc.com/news/technology-34677323">Tor launches anti­censorship Messenger service</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 30</td>
 <td>ZDNET</td>
-<td><a href="http://www.zdnet.com/article/tor-project-launches-encrypted-anonymous-chat-app-to-the-public/">
-Tor Project launches encrypted anonymous chat app to the public</a></td>
+<td><a href="http://www.zdnet.com/article/tor-project-launches-encrypted-anonymous-chat-app-to-the-public/">Tor Project launches encrypted anonymous chat app to the public</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 29</td>
 <td>WIRED</td>
-<td><a href="https://www.wired.com/2015/10/tor-just-launched-the-easiest-app-yet-for-anonymous-encrypted-im/">
-Tor Just Launched the Easiest App Yet for Anonymous, Encrypted IM</a></td>
+<td><a href="https://www.wired.com/2015/10/tor-just-launched-the-easiest-app-yet-for-anonymous-encrypted-im/">Tor Just Launched the Easiest App Yet for Anonymous, Encrypted IM</a></td>
 </tr>
 
 <tr>
@@ -955,15 +865,13 @@ With Facebook's Support, Tor Project's .Onion Domains Remain Hidden</a></td>
 <tr>
 <td>2015 Oct 28</td>
 <td>The Verge</td>
-<td><a href="http://www.theverge.com/2015/10/28/9631006/tor-hidden-addresses-recognition">
-Facebook helps Tor’s hidden sites get official recognition</a></td>
+<td><a href="http://www.theverge.com/2015/10/28/9631006/tor-hidden-addresses-recognition">Facebook helps Tor’s hidden sites get official recognition</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 14</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/tor-app-ios-orfox-tor-browser-ios-9-apple/">
-Tor is getting major upgrades on iOS 9</a></td>
+<td><a href="http://www.dailydot.com/layer8/tor-app-ios-orfox-tor-browser-ios-9-apple/">Tor is getting major upgrades on iOS 9</a></td>
 </tr>
 
 <tr>
@@ -976,8 +884,7 @@ More Indians are logging on anonymously using browsers like Tor, Freenet, I2P an
 <tr>
 <td>2015 Sep 16</td>
 <td>NPR</td>
-<td><a href="http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor">
-N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor</a></td>
+<td><a href="http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor">N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor</a></td>
 </tr>
 
 <tr>
@@ -997,43 +904,37 @@ Mapping How Tor’s Anonymity Network Spread Around the World</a></td>
 <tr>
 <td>2015 Sep 12</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/2015/09/security-news-week-russia-us-homeland-security-agree-something/">
-Russia Tried and Failed to Hack the Tor Browser</a></td>
+<td><a href="http://www.wired.com/2015/09/security-news-week-russia-us-homeland-security-agree-something/">Russia Tried and Failed to Hack the Tor Browser</a></td>
 </tr>
 
 <tr>
 <td>2015 Sep 11</td>
 <td>Motherboard</td>
-<td><a href="http://motherboard.vice.com/en_ca/read/the-us-government-pressured-a-small-local-library-to-turn-off-its-tor-server">
-The US Government Pressured a Small Local Library to Turn Off Its Tor Server</a></td>
+<td><a href="http://motherboard.vice.com/en_ca/read/the-us-government-pressured-a-small-local-library-to-turn-off-its-tor-server">The US Government Pressured a Small Local Library to Turn Off Its Tor Server</a></td>
 </tr>
 
 <tr>
 <td>2015 Sep 10</td>
 <td>Web Host Industry Review</td>
-<td><a href="http://www.thewhir.com/web-hosting-news/iana-designates-onion-as-special-use-domain-to-boost-security">
-IANA Designates .Onion as Special Use Domain to Boost Security</a></td>
+<td><a href="http://www.thewhir.com/web-hosting-news/iana-designates-onion-as-special-use-domain-to-boost-security">IANA Designates .Onion as Special Use Domain to Boost Security</a></td>
 </tr>
 
 <tr>
 <td>2015 Sep 10</td>
 <td>Softpedia News</td>
-<td><a href="http://news.softpedia.com/news/tor-gets-its-own-tld-special-use-domain-at-onion-491473.shtml">
-Tor Gets Its Own TLD Special-Use Domain at .onion</a></td>
+<td><a href="http://news.softpedia.com/news/tor-gets-its-own-tld-special-use-domain-at-onion-491473.shtml">Tor Gets Its Own TLD Special-Use Domain at .onion</a></td>
 </tr>
 
 <tr>
 <td>2015 Sep 10</td>
 <td>SiliconANGLE</td>
-<td><a href="http://siliconangle.com/blog/2015/09/10/tor-anonymity-network-benefits-from-onion-added-as-special-use-domain-name/">
-Tor anonymity network benefits from .onion added as special-use domain name</a></td>
+<td><a href="http://siliconangle.com/blog/2015/09/10/tor-anonymity-network-benefits-from-onion-added-as-special-use-domain-name/">Tor anonymity network benefits from .onion added as special-use domain name</a></td>
 </tr>
 
 <tr>
 <td>2015 Sep 10</td>
 <td>Propublica</td>
-<td><a href="https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email">
-First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email</a></td>
+<td><a href="https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email">First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email</a></td>
 </tr>
 
 <tr>
@@ -1060,8 +961,7 @@ Privacy by design, thanks to Tor's Jacob Appelbaum and Facebook's Alec Muffett</
 <tr>
 <td>2015 Aug 29</td>
 <td>Saturday Paper</td>
-<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">
-Tor and the Deep Web Going Mainstream</a></td>
+<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">Tor and the Deep Web Going Mainstream</a></td>
 </tr>
 
 <tr>
@@ -1074,8 +974,7 @@ Dark website Agora closes over Tor vulnerability suspicions</a></td>
 <tr>
 <td>2015 Jul 31</td>
 <td>SC Magazine</td>
-<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">
-Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td>
+<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td>
 </tr>
 
 <tr>
@@ -1088,15 +987,13 @@ Security and Privacy on the Internet, with Julia Angwen and Tor Project’s Kate
 <tr>
 <td>2015 Jul 16</td>
 <td>Technically Philly</td>
-<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">
-How this West Philly activist became Tor’s first director of communications</a></td>
+<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">How this West Philly activist became Tor’s first director of communications</a></td>
 </tr>
 
 <tr>
 <td>2015 Jul 8</td>
 <td>Technically Philly</td>
-<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">
-Inside Philly’s Growing Internet Privacy Community</a></td>
+<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">Inside Philly’s Growing Internet Privacy Community</a></td>
 </tr>
 
 <tr>
@@ -1116,43 +1013,37 @@ Crypto activists announce vision for Tor exit relay in every library "Librarians
 <tr>
 <td>2015 Jun 18</td>
 <td>WIRED</td>
-<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">
-The Dark Web as You Know It Is a Myth</a></td>
+<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">The Dark Web as You Know It Is a Myth</a></td>
 </tr>
 
 <tr>
 <td>2015 Jun 18</td>
 <td>Liberation</td>
-<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">
-Tor: "The emancipatory use of technology"</a></td>
+<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">Tor: "The emancipatory use of technology"</a></td>
 </tr>
 
 <tr>
 <td>2015 Apr 9</td>
 <td>Silicon Republic</td>
-<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">
-Interview with Runa Sandvik</a></td>
+<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">Interview with Runa Sandvik</a></td>
 </tr>
 
 <tr>
 <td>2015 Apr 4</td>
 <td>El Pais</td>
-<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">
-Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td>
+<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td>
 </tr>
 
 <tr>
 <td>2015 Apr 2</td>
 <td>Motherboard </td>
-<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">
-Tor wants to know how to make the darknet mainstream</a></td>
+<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">Tor wants to know how to make the darknet mainstream</a></td>
 </tr>
 
 <tr>
 <td>2015 Mar 26</td>
 <td>Daily Dot</td>
-<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">
-Tor's great rebranding</a></td>
+<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">Tor's great rebranding</a></td>
 </tr>
 
 <tr>
@@ -1165,8 +1056,7 @@ Silicon Valley Spars with Obama over Backdoor Surveillance</a></td>
 <tr>
 <td>2015 Mar 18</td>
 <td>Boston Globe</td>
-<td><a href="http://www.betaboston.com/news/2015/03/18/in-an-effort-to-educate-users-tor-animates-online-privacy/">
-In an effort to educate users, Tor animates online privacy</a></td>
+<td><a href="http://www.betaboston.com/news/2015/03/18/in-an-effort-to-educate-users-tor-animates-online-privacy/">In an effort to educate users, Tor animates online privacy</a></td>
 </tr>
 
 <tr>
@@ -1179,8 +1069,7 @@ U.S. Cloud Providers Face Backlash From China’s Censors</a></td>
 <tr>
 <td>2015 Mar 11</td>
 <td>The Guardian</td>
-<td><a href="http://www.theguardian.com/technology/2015/mar/11/tor-should-not-be-banned-in-britain">
-Tor Should Not be Banned in Britain</a></td>
+<td><a href="http://www.theguardian.com/technology/2015/mar/11/tor-should-not-be-banned-in-britain">Tor Should Not be Banned in Britain</a></td>
 </tr>
 
 <tr>
@@ -1200,8 +1089,7 @@ Banning Tor unwise and infeasible, MPs told</a></td>
 <tr>
 <td>2015 Mar 10</td>
 <td>El Diario</td>
-<td><a href="http://www.eldiario.es/turing/vigilancia_y_privacidad/Proyecto-Tor-comunidad-alrededor-NSA_0_365014509.html">
-Tor helps resist the NSA</a></td>
+<td><a href="http://www.eldiario.es/turing/vigilancia_y_privacidad/Proyecto-Tor-comunidad-alrededor-NSA_0_365014509.html">Tor helps resist the NSA</a></td>
 </tr>
 
 <tr>
@@ -1244,8 +1132,7 @@ Band of hackers manages to take down Sony--but not Tor</a></td>
 <tr>
 <td>2014 Dec 19</td>
 <td>The Guardian</td>
-<td><a href="http://www.theguardian.com/technology/2014/dec/05/how-faceboook-tor-service-encourage-open-web">
-How Facebook's Tor service could encourage a more open web</a></td>
+<td><a href="http://www.theguardian.com/technology/2014/dec/05/how-faceboook-tor-service-encourage-open-web">How Facebook's Tor service could encourage a more open web</a></td>
 </tr>
 
 <tr>
@@ -1265,16 +1152,14 @@ OpEd</a> on hidden services and censorship</td>
 <tr>
 <td>2014 Dec 12</td>
 <td>Boing Boing</td>
-<td><a href="https://boingboing.net/2014/12/12/tor-project-declares-solidarit.html">
-Tor Project declares solidarity with harassed colleague
+<td><a href="https://boingboing.net/2014/12/12/tor-project-declares-solidarit.html">Tor Project declares solidarity with harassed colleague
 </a></td>
 </tr>
 
 <tr>
 <td>2014 Dec 11</td>
 <td>DCInno</td>
-<td><a href="http://dcinno.streetwise.co/2014/11/11/mozilla-firefox-anonymous-internet-tor/">
-Firefox is Building an Anonymous Internet Browser With Tor</a> via @DC_Inno</td>
+<td><a href="http://dcinno.streetwise.co/2014/11/11/mozilla-firefox-anonymous-internet-tor/">Firefox is Building an Anonymous Internet Browser With Tor</a> via @DC_Inno</td>
 </tr>
 
 <tr>
@@ -1294,57 +1179,49 @@ Don't panic, Tor is still safe and Here’s Why</a></td>
 <tr>
 <td>2014 Oct 31</td>
 <td>The Next Web</td>
-<td><a href="http://thenextweb.com/facebook/2014/10/31/facebook-now-available-tor-network/">
-Facebook is now available on Tor for more secure browsing</a></td>
+<td><a href="http://thenextweb.com/facebook/2014/10/31/facebook-now-available-tor-network/">Facebook is now available on Tor for more secure browsing</a></td>
 </tr>
 
 <tr>
 <td>2014 Jul 8</td>
 <td>Cambridge Community Television</td>
-<td><a href="http://www.cctvcambridge.org/NSATor">
-NSA Surveillance Targets Cambridge - based TOR Project</a></td>
+<td><a href="http://www.cctvcambridge.org/NSATor">NSA Surveillance Targets Cambridge - based TOR Project</a></td>
 </tr>
 
 <tr>
 <td>2014 Jul 8</td>
 <td>Tech Times</td>
-<td><a href="http://www.techtimes.com/articles/9779/20140708/nsa-might-tag-you-as-extremist-when-you-use-tor-other-privacy-online-services.htm">
-NSA might tag you as extremist when you use Tor, other privacy online services</a></td>
+<td><a href="http://www.techtimes.com/articles/9779/20140708/nsa-might-tag-you-as-extremist-when-you-use-tor-other-privacy-online-services.htm">NSA might tag you as extremist when you use Tor, other privacy online services</a></td>
 </tr>
 
 <tr>
 <td>2014 Jul 7</td>
 <td>Computerworld</td>
-<td><a href="http://blogs.computerworld.com/privacy/24102/if-you-care-about-online-privacy-then-nsa-cares-about-targeting-you">
-If you can about online privacy, then the NSA cares about targeting you</a></td>
+<td><a href="http://blogs.computerworld.com/privacy/24102/if-you-care-about-online-privacy-then-nsa-cares-about-targeting-you">If you can about online privacy, then the NSA cares about targeting you</a></td>
 </tr>
 
 <tr>
 <td>2014 Jul 3</td>
 <td>DasErste.de</td>
-<td><a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">
-NSA targets the privacy-conscious</a></td>
+<td><a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">NSA targets the privacy-conscious</a></td>
 </tr>
 
 <tr>
 <td>2014 Jun 17</td>
 <td>IT News Online</td>
-<td><a href="http://www.itnewsonline.com/realwire/How-to-be-anonymous-on-the-Internet-AppSec-presents-the-latest-developments-of-The-Tor-Project-for-anonymous-communications/13530">
-How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications</a></td>
+<td><a href="http://www.itnewsonline.com/realwire/How-to-be-anonymous-on-the-Internet-AppSec-presents-the-latest-developments-of-The-Tor-Project-for-anonymous-communications/13530">How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications</a></td>
 </tr>
 
 <tr>
 <td>2014 Jun 15</td>
 <td>International Business Times</td>
-<td><a href="http://www.ibtimes.co.uk/iraq-crisis-gvoernment-blocks-access-tor-project-following-isis-insurgency-1452879">
-Iraq Crisis: Government Blocks Access to Tor Project Following Isis Insurgency </a></td>
+<td><a href="http://www.ibtimes.co.uk/iraq-crisis-gvoernment-blocks-access-tor-project-following-isis-insurgency-1452879">Iraq Crisis: Government Blocks Access to Tor Project Following Isis Insurgency </a></td>
 </tr>
 
 <tr>
 <td>2014 Jun 15</td>
 <td>Gizmodo</td>
-<td><a href="http://gizmodo.com/tor-is-for-everyone-why-you-should-use-tor-1591191905">
-Tor is for Everyone: Why Should You Use Tor </a></td>
+<td><a href="http://gizmodo.com/tor-is-for-everyone-why-you-should-use-tor-1591191905">Tor is for Everyone: Why Should You Use Tor </a></td>
 </tr>
 
 <tr>
@@ -1357,22 +1234,19 @@ Going Dark: The Internet Behind The Internet</a></td>
 <tr>
 <td>2014 May 13</td>
 <td>ABC News</td>
-<td><a href="http://abc7news.com/technology/i-team-investigates-underworld-marketplaces-of-the-darknet/56262/">
-I-Team: Understanding TOR and the dark net</a></td>
+<td><a href="http://abc7news.com/technology/i-team-investigates-underworld-marketplaces-of-the-darknet/56262/">I-Team: Understanding TOR and the dark net</a></td>
 </tr>
 
 <tr>
 <td>2014 May 9</td>
 <td>Vice</td>
-<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">
-Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
+<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
 </tr>
 
 <tr>
 <td>2014 May 7</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">
-Tor: network security for domestic abuse survivors</a></td>
+<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">Tor: network security for domestic abuse survivors</a></td>
 </tr>
 
 <tr>
@@ -1385,8 +1259,7 @@ As domestic abuse goes digital, shelters turn to counter-survellience with Tor</
 <tr>
 <td>2014 Apr 29</td>
 <td>Boston Magazine</td>
-<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">
-The Power of Ideas</a></td>
+<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">The Power of Ideas</a></td>
 </tr>
 
 <tr>
@@ -1413,8 +1286,7 @@ Masking your location on the internet with privacy tools</a></td>
 <tr>
 <td>2014 Mar 24</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">
-Turkey orders block of Twitter's IP addresses</a></td>
+<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">Turkey orders block of Twitter's IP addresses</a></td>
 </tr>
 
 <tr>
@@ -1427,8 +1299,7 @@ Dozens of firms are invisibly tracking you online. Here's how to hide from them<
 <tr>
 <td>2014 Mar 24</td>
 <td>Washington Post</td>
-<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">
-The Switchboard: Turkey's Twitter ban gets tougher</a></td>
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">The Switchboard: Turkey's Twitter ban gets tougher</a></td>
 </tr>
 
 <tr>
@@ -1441,8 +1312,7 @@ After DNS change fails, Turkish government steps up Twitter censorship</a></td>
 <tr>
 <td>2014 Mar 23</td>
 <td>CSO</td>
-<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">
-Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
+<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
 </tr>
 
 <tr>
@@ -1455,22 +1325,19 @@ Malicious iOS Tor Browswer in Apple App Store</a></td>
 <tr>
 <td>2014 Mar 20</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">
-Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
+<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
 </tr>
 
 <tr>
 <td>2014 Mar 10</td>
 <td>USA Today</td>
-<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">
-Four questions about Tor</a></td>
+<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">Four questions about Tor</a></td>
 </tr>
 
 <tr>
 <td>2014 Mar 3</td>
 <td>Computerworld</td>
-<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">
-The paranoid's survival guide, part 1: How to protect your personal data</a></td>
+<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">The paranoid's survival guide, part 1: How to protect your personal data</a></td>
 </tr>
 
 <tr>
@@ -1504,8 +1371,7 @@ WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime<
 <tr>
 <td>2014 Feb 6</td>
 <td>Help Net Security</td>
-<td><a href="http://www.net-security.org/secworld.php?id=16323">
-HTTPS Everywhere add-on now available for Firefox on Android</a></td>
+<td><a href="http://www.net-security.org/secworld.php?id=16323">HTTPS Everywhere add-on now available for Firefox on Android</a></td>
 </tr>
 
 <tr>
@@ -1532,29 +1398,25 @@ Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russ
 <tr>
 <td>2014 Feb 01</td>
 <td>TechTarget</td>
-<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">
-Tor networks: Stop employees from touring the deep web</a></td>
+<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">Tor networks: Stop employees from touring the deep web</a></td>
 </tr>
 
 <tr>
 <td>2014 Jan 23</td>
 <td>BusinessWeek</td>
-<td><a href="http://www.businessweek.com/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency">
-The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built</a></td>
+<td><a href="http://www.businessweek.com/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency">The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built</a></td>
 </tr>
 
 <tr>
 <td>2014 Jan 21</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/threatlevel/2014/01/russia-tor-attack/">
-Russian Spy Notes Caught Snooping on Facebook Users</a></td>
+<td><a href="http://www.wired.com/threatlevel/2014/01/russia-tor-attack/">Russian Spy Notes Caught Snooping on Facebook Users</a></td>
 </td>
 <tr>
 <tr>
 <td>2014 Jan 17</td>
 <td>ZDNet</td>
-<td><a href="http://www.zdnet.com/if-microsoft-thinks-old-tor-clients-are-risky-why-not-windows-xp-7000025283/">
-If Microsoft thinks old Tor clients are risky, why not Windows XP?</a></td>
+<td><a href="http://www.zdnet.com/if-microsoft-thinks-old-tor-clients-are-risky-why-not-windows-xp-7000025283/">If Microsoft thinks old Tor clients are risky, why not Windows XP?</a></td>
 </tr>
 
 <tr>
@@ -1574,15 +1436,13 @@ Anonymous: The Parallel Internet?</a></td>
 <tr>
 <td>2013 Dec 30</td>
 <td>Think Digit</td>
-<td><a href="http://www.thinkdigit.com/Software/Top-free-PC-Security-Tools_19171.html">
-Top free PC Security Tools</a></td>
+<td><a href="http://www.thinkdigit.com/Software/Top-free-PC-Security-Tools_19171.html">Top free PC Security Tools</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Dec 28</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/threatlevel/2013/12/tor-publicity-mixed-blessing/">
-For Tor, Publicity a Mixed Blessing</a></td>
+<td><a href="http://www.wired.com/threatlevel/2013/12/tor-publicity-mixed-blessing/">For Tor, Publicity a Mixed Blessing</a></td>
 </tr>
 
 <tr>
@@ -1596,8 +1456,7 @@ authority warning about BTC, Tor Project thumbs-up Bitcoin donations</a></td>
 <tr>
 <td>2013 Dec 18</td>
 <td>PC Pro UK</td>
-<td><a href="http://www.pcpro.co.uk/news/386149/tor-accepts-donations-in-bitcoin">
-Tor accepts donations in Bitcoin</a></td>
+<td><a href="http://www.pcpro.co.uk/news/386149/tor-accepts-donations-in-bitcoin">Tor accepts donations in Bitcoin</a></td>
 </tr>
 
 <tr>
@@ -1610,16 +1469,14 @@ Lovers of Tor can now sprinkle Bitcoins on its developers as thanks</a></td>
 <tr>
 <td>2013 Dec 16</td>
 <td>PBS</td>
-<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">
-Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a>
+<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a>
 </td>
 </tr>
 
 <tr>
 <td>2013 Dec 5</td>
 <td>Nieman Journalisim Lab</td>
-<td><a href="http://www.niemanlab.org/2013/12/91274/">
-Freedom of the Press Foundation wants to help build secure communication tools
+<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools
 for journalists</a></td>
 </td>
 <tr>
@@ -1648,8 +1505,7 @@ Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td>
 <tr>
 <td>2013 Nov 10</td>
 <td>Politiken.dk</td>
-<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">
-FAKTA: The Tor Project</a></td>
+<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td>
 </td>
 <tr>
 <tr>
@@ -1676,22 +1532,19 @@ What Is Tor? Answers to Frequently Asked Questions</a></td>
 <tr>
 <td>2013 Oct 18</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">
-Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
+<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
 </tr>
 
 <tr>
 <td>2013 Oct 10</td>
 <td>VentureBeat</td>
-<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">
-TorSearch launches to be the Google of the hidden Internet</a></td>
+<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td>
 </tr>
 
 <tr>
 <td>2013 Oct 8</td>
 <td>InformationWeek</td>
-<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">
-NSA Battles Tor: 9 Facts</a></td>
+<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td>
 </tr>
 
 <tr>
@@ -1704,15 +1557,13 @@ What is Tor and why does it matter?</a></td>
 <tr>
 <td>2013 Oct 7</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">
-How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
+<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
 </tr>
 
 <tr>
 <td>2013 Oct 7</td>
 <td>Infosecurity</td>
-<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">
-How Does Law Enforcement 'Subvert' Tor?</a></td>
+<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td>
 </tr>
 
 <tr>
@@ -2612,8 +2463,7 @@ censorship during protests</a></td>
 <tr>
 <td>2009 May 15</td>
 <td>Mass High Tech</td>
-<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">
-Tor tackles Net privacy</a></td>
+<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net privacy</a></td>
 </tr>
 
 <tr>
@@ -2814,12 +2664,9 @@ mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post
 <td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic
 going through a Tor exit node he was running, then published unencrypted account and password information.  Note that the better articles covering this event correctly indicate that this is not a security flaw
 or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure
-end-to-end encryption.  Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
-The Inquirer</a>,
-<a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
-InfoWorld</a>,
-<a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
-The Sydney Morning Herald</a>,
+end-to-end encryption.  Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">The Inquirer</a>,
+<a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">InfoWorld</a>,
+<a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">The Sydney Morning Herald</a>,
 <a href="http://www.securityfocus.com/news/11486">Security Focus</a>,
 <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
 ars technica</a>,
@@ -2828,10 +2675,8 @@ and many others. It was reported as early as August 31, 2007 on the
 Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the
 information via his Tor exit node.  In the end, Mr. Egerstad was
 arrested, which was covered by
-<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
-The Register</a>,
-<a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
-The Sydney Morning Herald</a>,
+<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">The Register</a>,
+<a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">The Sydney Morning Herald</a>,
 <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and
 <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html">
 Wired Blog</a>.</td>
@@ -2851,8 +2696,7 @@ bottom of the article.</td>
 <tr>
 <td>2007 Jun 22</td>
 <td>Bangkok Post</td>
-<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
-The problems with censorship</a>.  Mentions anecdotes that
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">The problems with censorship</a>.  Mentions anecdotes that
 "everyone" has Tor installed in Thailand to avoid censorship.</td>
 </tr>
 
@@ -2885,8 +2729,7 @@ technical and historical background. </td>
 <tr>
 <td>2006 Oct 19</td>
 <td>Wired Threat Level</td>
-<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
-The Onion Router (TOR) is Leaky (Leeky)</a>.  Explains why you need
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">The Onion Router (TOR) is Leaky (Leeky)</a>.  Explains why you need
 something like Privoxy in addition to the core Tor code to ensure your
 anonymity. If you use the Vidalia bundle, it installs and configures
 Privoxy automatically, but it can't hurt to understand why it is
@@ -2896,8 +2739,7 @@ necessary.</td>
 <tr>
 <td>2006 Aug 18</td>
 <td>NPR</td>
-<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
-Tips for Protecting Privacy Online</a>.  Kevin Bankston of the EFF
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">Tips for Protecting Privacy Online</a>.  Kevin Bankston of the EFF
 recommends Tor during an NPR interview.  Tor information begins at 8:15
 into the program.</td>
 </tr>
@@ -2957,8 +2799,7 @@ into the video.</td>
 <tr>
 <td>2006 Feb 15</td>
 <td>Network Secure</td>
-<td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909">
-Tor: Anonymisierungswerkzeug entwickelt</a>
+<td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909">Tor: Anonymisierungswerkzeug entwickelt</a>
 (German)</td>
 </tr>
 
@@ -2981,8 +2822,7 @@ Evading the Google Eye</a></td>
 <tr>
 <td>2006 Jan 29</td>
 <td>New York Times</td>
-<td><a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
-How to Outwit the World's Internet Censors</a></td>
+<td><a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">How to Outwit the World's Internet Censors</a></td>
 </tr>
 
 <tr>
@@ -3012,15 +2852,13 @@ recommends Tor at 33:30 into the program.</td>
 <tr>
 <td>2006 Feb 15</td>
 <td>Punto Informatico</td>
-<td><a href="http://punto-informatico.it/p.aspx?i=1430903">
-TOR c'è</a> (Italian)</td>
+<td><a href="http://punto-informatico.it/p.aspx?i=1430903">TOR c'è</a> (Italian)</td>
 </tr>
 
 <tr>
 <td>2006 Jan 20</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
-How to Foil Search Engine Snoops</a></td>
+<td><a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">How to Foil Search Engine Snoops</a></td>
 </tr>
 
 <tr>
@@ -3033,8 +2871,7 @@ Google Records Subpoena Raises Privacy Fears</a></td>
 <tr>
 <td>2005 Sep 30</td>
 <td>Viva o Linux</td>
-<td><a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
-TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
+<td><a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
 </tr>
 
 <tr>
@@ -3076,8 +2913,7 @@ An Internet privacy tool called "Tor"</a></td>
 <tr>
 <td>2005 Jun 1</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
-The 100 Best Products of 2005</a><br/> Tor is ranked #40 on the list.</td>
+<td><a href="http://www.pcworld.com/article/id,120763-page,4/article.html">The 100 Best Products of 2005</a><br/> Tor is ranked #40 on the list.</td>
 </tr>
 
 <tr>
@@ -3090,29 +2926,25 @@ Router (Tor)</a></td>
 <tr>
 <td>2005 May 22</td>
 <td>Slashdot</td>
-<td><a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
-Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
+<td><a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
 </tr>
 
 <tr>
 <td>2005 May 20</td>
 <td>Security.uz</td>
-<td><a href="http://security.uz/news/default.asp?id=10541">
-Tor - мощный анонимайзер для всех ОС</a> (Russian)</td>
+<td><a href="http://security.uz/news/default.asp?id=10541">Tor - мощный анонимайзер для всех ОС</a> (Russian)</td>
 </tr>
 
 <tr>
 <td>2005 May 19</td>
 <td>WebPlanet</td>
-<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
-Tor: распределенная система анонимного серфинга</a> (Russian)</td>
+<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html">Tor: распределенная система анонимного серфинга</a> (Russian)</td>
 </tr>
 
 <tr>
 <td>2005 May 17</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
-Tor Torches Online Tracking</a>. Also available in
+<td><a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">Tor Torches Online Tracking</a>. Also available in
 <a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.</td>
 </tr>
 
@@ -3175,8 +3007,7 @@ EFF unterstützt Anonymisierer Tor</a> (German)</td>
 <tr>
 <td>2004 Dec 23</td>
 <td>SuicideGirls</td>
-<td><a href="http://suicidegirls.com/news/technology/6150/">
-New Routing Software Allows Anonymous Internet Use</a></td>
+<td><a href="http://suicidegirls.com/news/technology/6150/">New Routing Software Allows Anonymous Internet Use</a></td>
 </tr>
 
 <tr>
@@ -3202,8 +3033,7 @@ Traffic</a></td>
 <tr>
 <td>2004 Aug 30</td>
 <td>Newsweek</td>
-<td><a href="http://www.newsweek.com/technology-instant-security-126733">
-Technology: Instant Security</a></td>
+<td><a href="http://www.newsweek.com/technology-instant-security-126733">Technology: Instant Security</a></td>
 </tr>
 
 <tr>
@@ -3223,8 +3053,7 @@ Anoniem surfen met hulp van marine VS</a> (Dutch)</td>
 <tr>
 <td>2004 Aug 6</td>
 <td>Golem</td>
-<td><a href="http://www.golem.de/0408/32835.html">
-Tor: Anonymisierer nutzt Onion-Routing</a></td>
+<td><a href="http://www.golem.de/0408/32835.html">Tor: Anonymisierer nutzt Onion-Routing</a></td>
 </tr>
 
 <tr>



More information about the tor-commits mailing list