[tor-commits] r25849: {website} add delta airlines mag article. (website/trunk/press/en)
Andrew Lewman
andrew at torproject.org
Wed Oct 17 20:10:15 UTC 2012
Author: phobos
Date: 2012-10-17 20:10:15 +0000 (Wed, 17 Oct 2012)
New Revision: 25849
Modified:
website/trunk/press/en/inthemedia.wml
Log:
add delta airlines mag article.
Modified: website/trunk/press/en/inthemedia.wml
===================================================================
--- website/trunk/press/en/inthemedia.wml 2012-10-16 20:22:38 UTC (rev 25848)
+++ website/trunk/press/en/inthemedia.wml 2012-10-17 20:10:15 UTC (rev 25849)
@@ -32,6 +32,13 @@
<th>Topic</th>
</tr>
</thead>
+<tr>
+<td>2012 Oct</td>
+<td>Delta Airlines Sky Magazine</td>
+<td><a
+href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-
+Sight.aspx">Hidden in Plain Sight</a></td>
+</tr>
<tr style="background-color: #e5e5e5;">
<td>2012 Sep 19</td>
<td>infoBAE</td>
@@ -265,7 +272,7 @@
href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.revolution/index.html">Starting
a revolution with technology</a></td>
</tr>
-<tr>
+<tr>
<td>2011 June 12</td>
<td>CNN: Tech</td>
<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/index.html">Wiping
@@ -795,7 +802,8 @@
<tr style="background-color: #e5e5e5;">
<td>2007 Sep 10</td>
<td>Wired</td>
-<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information. Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption. Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589
522.html?page=fullpage#contentSwap2">The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired
Blog</a>.</td>
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node he was running, then published unencrypted account and password information. Note that the better articles covering this event correctly indicate that this is not a security flaw or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure end-to-end encryption. Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information"> The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY"> InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589
522.html?page=fullpage#
+contentSwap2">The Sydney Morning Herald</a>, <a href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and many others. It was reported as early as August 31, 2007 on the <a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html"> Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node. In the end, Mr. Egerstad was arrested, which was covered by <a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html"> Wired Blog</a>.</td>
</tr>
<tr>
<td>2007 Jul 27</td>
More information about the tor-commits
mailing list