[tor-commits] [webwml/staging] Revert "this would be #69 in github"

hiro at torproject.org hiro at torproject.org
Wed Jan 16 10:09:59 UTC 2019


commit c8ceba618bbe8b882cbcbe37c979afbec481745c
Author: hiro <hiro at torproject.org>
Date:   Wed Jan 16 11:09:37 2019 +0100

    Revert "this would be #69 in github"
    
    This reverts commit 5137ee72c0d46468f99c57b18196d3e9ee29bd5a, reversing
    changes made to 2148922d45ac188c22c95a24e5a2e13f45bdecb9.
---
 .htaccess                                          |    2 +-
 Makefile                                           |    4 +-
 about/en/board.wml                                 |   24 +-
 about/en/contact.wml                               |    4 +-
 about/en/corepeople.wml                            |   80 +-
 about/en/financials.wml                            |    5 +-
 about/en/jobs-metrics-data-architect.wml           |    6 +-
 about/en/jobs.wml                                  |   12 +-
 about/en/sponsors.wml                              |   16 +-
 ...6-TorProject-combined-Form990_Audit_Results.pdf |  Bin 1140865 -> 0 bytes
 ...rProject-combined-Form990_Audit_Results.pdf.asc |   17 -
 about/findoc/2017-TorProject-Form990.pdf           |  Bin 306001 -> 0 bytes
 about/findoc/2017-TorProject-Form990.pdf.asc       |   16 -
 css/layout.css                                     |   37 +-
 css/layout.min.css                                 |   37 +-
 css/tbbproject.css                                 |    2 +-
 css/tbbproject.min.css                             |    2 +-
 donate/en/donate-options.wml                       |    4 +-
 donate/en/donate.wml                               |    2 +-
 donate/en/donor-faq.wml                            |  457 ++++-
 donate/en/donor-privacy-policy.wml                 |   30 +-
 download/en/download-easy.wml                      |   11 +-
 download/en/download.wml                           |    8 +-
 en/banner.wmi                                      |    2 -
 en/banner2.wmi                                     |    4 +-
 en/index.wml                                       |   43 +-
 es/banner.wmi                                      |    2 -
 es/banner2.wmi                                     |    4 +-
 es/index.wml                                       |   43 +-
 images/people/alsmith.png                          |  Bin 42933 -> 0 bytes
 images/people/hc.png                               |  Bin 38444 -> 0 bytes
 images/people/orig/alsmith.jpg                     |  Bin 267849 -> 0 bytes
 images/people/orig/hc.jpg                          |  Bin 149652 -> 0 bytes
 include/head-index.wmi                             |  116 --
 include/keys.txt                                   |    6 +-
 include/keys.wmi                                   |   32 +-
 include/versions.wmi                               |   20 +-
 keys/alsmith.txt                                   |   50 -
 press/en/press.wml                                 | 1818 ++++++++------------
 press/press.pl                                     |   67 +-
 projects/en/torbrowser.wml                         |  150 +-
 projects/torbrowser/RecommendedTBBVersions         |   16 +-
 42 files changed, 1383 insertions(+), 1766 deletions(-)

diff --git a/.htaccess b/.htaccess
index 02d80f25..c1f0557c 100644
--- a/.htaccess
+++ b/.htaccess
@@ -48,7 +48,7 @@ RewriteRule ^research(.*) https://research.torproject.org/ [R=301,L]
 RewriteRule ^getinvolved/research(.*) https://research.torproject.org/ [R=301,L]
 
 # Support
-RewriteRule ^support(.*) https://support.torproject.org [R=301,L]
+RewriteRule ^support(.*) https://trac.torproject.org/projects/tor/wiki/org/teams/CommunityTeam/Support [R=301,L]
 
 # Newsletter
 RewriteRule ^newsletter(.*) https://newsletter.torproject.org [R=301,L]
diff --git a/Makefile b/Makefile
index 0c050ad4..7bb787d6 100644
--- a/Makefile
+++ b/Makefile
@@ -14,8 +14,8 @@
 # branch to your personal webwml repository, open a trac ticket in the
 # website component, and set it to needs_review.
 
-export STABLETAG=tor-0.3.5.7
-export DEVTAG=tor-0.3.5.7
+export STABLETAG=tor-0.3.4.9
+export DEVTAG=tor-0.3.5.3-alpha
 
 WMLBASE=.
 SUBDIRS=docs eff projects press about download getinvolved donate docs/torbutton
diff --git a/about/en/board.wml b/about/en/board.wml
index 6bdad4f6..5a981db6 100644
--- a/about/en/board.wml
+++ b/about/en/board.wml
@@ -47,25 +47,6 @@
       </tr>
       <tr>
         <td>
-          <div class="name">Nighat Dad</div>
-          <div class="caps">Director</div>
-          <p>
-            Nighat is the founder and Executive Director of the Digital Rights
-            Foundation, Pakistan. She is an accomplished lawyer and human rights
-            activist. Nighat is a pioneer for access to a safe and open Internet
-            in Pakistan and globally. She was a TED Global Fellow for 2017, was
-            listed as one of TIME magazine's Next Generation Leaders in 2015,
-            and was the recipient of the Atlantic Council Freedom Award and
-            Human Rights Tulip Award. Nighat was also the only Pakistani
-            selected as a Young Global Leader by the World Economic Forum in
-            2018. Recently her organization, the Digital Rights Foundation, was
-            named among the 10 best social entrepreneurs at the United Nations
-            General Assembly 2018 meeting by Forbes magazine.
-          </p>
-        </td>
-      </tr>
-      <tr>
-        <td>
           <div class="name">Megan Price</div>
           <div class="caps">Director</div>
           <p>
@@ -123,7 +104,7 @@
           <div class="name">Ramy Raoof</div>
           <div class="caps">Director</div>
           <p>
-            Ramy is a technologist and privacy and security researcher with a passion for free/open culture. He has provided and developed digital security plans and strategies for NGOs and members of the media, emergency response in cases of physical threats, support on publishing sensitive materials, secure systems for managing sensitive information, and operational plans for human rights emergency response teams, in Egypt and the MENA region. Most recently, Ramy has been volunteering with different NGOs and civil liberty groups in Central & South America, to enhance their privacy and security through means of behavioral change based on understanding surveillance and threat models in their own contexts and environments. Among different hats, Ramy is Senior Research Technologist at the Egyptian Initiative for Personal Rights (EIPR), Research Fellow with Citizen Lab, and currently a volunteer visitor with Fundación Acceso assisting collectives and networks in Central America around
  infosec and activism. He is also an Internet Freedom Festival Fellow on security and privacy best practices. Ramy has received multiple international awards for his important work. Most recently, Ramy received the 2017 Heroes of Human Rights and Communications Surveillance from Access Now.
+            Ramy is a technologist and privacy and security researcher with a passion for free/open culture. He has provided and developed digital security plans and strategies for NGOs and members of the media, emergency response in cases of physical threats, support on publishing sensitive materials, secure systems for managing sensitive information, and operational plans for human rights emergency response teams, in Egypt and the MENA region. Most recently, Ramy has been volunteering with different NGOs and civil liberty groups in Central & South America, to enhance their privacy and security through means of behavioral change based on understanding surveillance and threat models in their own contexts and environments. Among different hats, Ramy is Senior Research Technologist at the Egyptian Initiative for Personal Rights (EIPR), Research Fellow with Citizen Lab, and currently a volunteer visitor with Fundación Acceso assisting collectives and networks in Central America around
  infosec and activism. He is also an Internet Freedom Festival Fellow on security and privacy best practices. Ramy has received multiple international awards for his important work. Most recently, Ramy received the 2017 Heroes of Human Rights and Communications Surveillance from Access Now. 
           </p>
         </td>
       </tr>
@@ -132,7 +113,7 @@
           <div class="name">Julius Mittenzwei</div>
           <div class="caps">Director</div>
           <p>
-            Julius is a lawyer and internet activist with 19 years of leadership experience as an Executive Director and entrepreneur in the publishing industry. He is a longtime Tor advocate with a background in the Free Software movement and member of the Chaos Computer Club (CCC), one of the oldest hacker collectives in the world. Along with CCC, he has been running Tor nodes since 2005. As a lawyer, he has represented several Tor exit node operators accused of abuse. He holds a PhD in Copyright Law from LMU Munich.
+            Julius is a lawyer and internet activist with 19 years of leadership experience as an Executive Director and entrepreneur in the publishing industry. He is a longtime Tor advocate with a background in the Free Software movement and member of the Chaos Computer Club (CCC), one of the oldest hacker collectives in the world. Along with CCC, he has been running Tor nodes since 2005. As a lawyer, he has represented several Tor exit node operators accused of abuse. He holds a PhD in Copyright Law from LMU Munich. 
           </p>
         </td>
       </tr>
@@ -148,3 +129,4 @@
 </div>
 <!-- END CONTENT -->
 #include <foot.wmi>
+
diff --git a/about/en/contact.wml b/about/en/contact.wml
index 27613698..47f2c41d 100644
--- a/about/en/contact.wml
+++ b/about/en/contact.wml
@@ -157,8 +157,8 @@ sub   4096R/C00942E4 2017-03-13
     <h3><a class="anchor" href="#mail">Mailing Address</a></h3>
     <p>Should you need to reach us via old-fashioned mail, our mailing
     address is:</p>
-<address>The Tor Project, Inc.<br>
-217 First Ave South #4903<br>
+<address>The Tor Project<br>
+217 1st Ave South #4903<br>
 Seattle, WA 98194 USA<br><br>
 </address>
 
diff --git a/about/en/corepeople.wml b/about/en/corepeople.wml
index a473f561..b35e614b 100644
--- a/about/en/corepeople.wml
+++ b/about/en/corepeople.wml
@@ -25,18 +25,6 @@
     </td>
 
     <td>
-      <a id="alsmith"></a>
-      <div class="photo"><img src="$(IMGROOT)/people/alsmith.png" alt="alsmith" /></div>
-      <div class="icon"><a href="../keys/alsmith.txt"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
-      <div class="name"><a href="#alsmith">Al Smith</a></div>
-      <div class="field"><b>IRC:</b> alsmith</div>
-      <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/they">they</a></div>
-      <div class="description">Writes grants and fundraising proposals.</div>
-    </td>
-  </tr>
-
-  <tr>
-    <td>
       <a id="ahf"></a>
       <div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
       <div class="icon"><a href="https://twitter.com/ahfaeroey"><img src="$(IMGROOT)/twitter-small.png" alt="twitter" /></a></div>
@@ -46,7 +34,9 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/he">he</a></div>
       <div class="description">Works on core Tor development.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="flexlibris"></a>
       <div class="photo"><img src="$(IMGROOT)/people/flexlibris.png" alt="flexlibris" title="Photo taken by Nima Fatemi" /></div>
@@ -57,9 +47,7 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/she">she</a></div>
       <div class="description">Leads the <a href="https://trac.torproject.org/projects/tor/wiki/org/teams/CommunityTeam">Community Team</a> and <a href="https://libraryfreedomproject.org">Library Freedom Project</a>. Works on support, outreach, and training.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="gunner"></a>
       <div class="photo"><img src="$(IMGROOT)/people/gunner.png" alt="gunner" /></div>
@@ -69,7 +57,9 @@
       <div class="field"><b>IRC:</b> gunner</div>
       <div class="description"><a href="https://aspirationtech.org/about/people/gunner">Executive Director of Aspiration</a>, where he works with NGOs, activists, and human rights groups. Meeting facilitator and member of Tor's Community Council.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="amoghbl1"></a>
       <div class="photo"><img src="$(IMGROOT)/people/amoghbl1.png" alt="amoghbl1" /></div>
@@ -78,9 +68,7 @@
       <div class="field"><b>IRC:</b> amoghbl1</div>
       <div class="description"><a href="http://amoghbl1.com/">Lead developer</a> of Orfox and contributor to Orbot.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="andreas"></a>
       <div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@@ -88,7 +76,9 @@
       <div class="name"><a href="#andreas">Andreas Lehner</a></div>
       <div class="description">Works at the intersection of security, privacy, data integrity and anonymity both in politics and technology.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="antonela"></a>
       <div class="photo"><img src="$(IMGROOT)/people/antonela.png" alt="antonela" /></div>
@@ -98,9 +88,7 @@
       <div class="field"><b>IRC:</b> antonela</div>
       <div class="description">Designer working with the UX team. Making Tor usable for everyone.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="arlolra"></a>
       <div class="photo"><img src="$(IMGROOT)/people/arlolra.png" alt="arlolra" /></div>
@@ -110,7 +98,9 @@
       <div class="field"><b>IRC:</b> arlolra</div>
       <div class="description">Developer for Snowflake, Tor Messenger, and Check.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="arthuredelstein"></a>
       <div class="photo"><img src="$(IMGROOT)/people/arthuredelstein.png" alt="arthuredelstein" /></div>
@@ -119,9 +109,7 @@
       <div class="field"><b>IRC:</b> arthuredelstein</div>
       <div class="description">Works on Tor Browser.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="hellais"></a>
       <div class="photo"><img src="$(IMGROOT)/people/hellais.png" alt="hellais" /></div>
@@ -131,7 +119,9 @@
       <div class="field"><b>IRC:</b> hellais</div>
       <div class="description">Project leader for <a href="https://ooni.torproject.org/">OONI</a>, has helped with <a href="http://tor2web.org/">tor2web</a>, wrote Atlas which later became <a href="https://metrics.torproject.org/rs.html">Relay Search</a>, and helps improve security.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="bdavila"></a>
       <div class="photo"><img src="$(IMGROOT)/people/bdavila.png" alt="bdavila" /></div>
@@ -140,9 +130,7 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/she">she</a></div>
       <div class="description">Grants Manager.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="brade"></a>
       <div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@@ -151,7 +139,9 @@
       <div class="field"><b>IRC:</b> brade</div>
       <div class="description">Developer on the Tor Browser team.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="komlo"></a>
       <div class="photo"><img src="$(IMGROOT)/people/komlo.png" alt="komlo" /></div>
@@ -161,9 +151,7 @@
       <div class="field"><b>IRC:</b> komlo</div>
       <div class="description">Chelsea is a software/security engineer and contributes to core tor.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="cindy"></a>
       <div class="photo"><img src="$(IMGROOT)/people/cindy.png" alt="cindy" /></div>
@@ -172,7 +160,9 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/she">she</a></div>
       <div class="description">Tor Board member and <a href="https://www.eff.org/about/staff/cindy-cohn">Executive Director of the EFF</a>. Lawyer by training, <a href="https://blog.torproject.org/blog/tor-heart-notes-board-member">her focus</a> is on making sure Tor stays available and that Tor users stay safe.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="Phoul"></a>
       <div class="photo"><img src="$(IMGROOT)/people/phoul.png" alt="phoul" /></div>
@@ -182,9 +172,7 @@
       <div class="field"><b>IRC:</b> Phoul</div>
       <div class="description">Relay advocate, Outreachy mentor, and a member of the community team. He is also a director of the Canadian Torservers.net partner <a href="https://www.coldhak.ca/">Coldhak</a>.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="atagar"></a>
       <div class="photo"><img src="$(IMGROOT)/people/atagar.png" alt="atagar" /></div>
@@ -194,7 +182,9 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/he">he</a></div>
       <div class="description">Author of the <a href="https://stem.torproject.org/">Stem</a> python controller library and <a href="https://nyx.torproject.org/">Nyx</a> relay monitor.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="dgoulet"></a>
       <div class="photo"><img src="$(IMGROOT)/people/dgoulet.png" alt="dgoulet" /></div>
@@ -203,9 +193,7 @@
       <div class="field"><b>IRC:</b> dgoulet</div>
       <div class="description">Tor development team focusing on onion services and our torsocks maintainer.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="dawuud"></a>
       <div class="photo"><img src="$(IMGROOT)/people/dawuud.png" alt="dawuud" /></div>
@@ -215,7 +203,9 @@
       <div class="field"><b>IRC:</b> dawuud</div>
       <div class="description"><a href="https://github.com/david415/">Author of roflcoptor and honeybadger</a>. Researches mixnets and contributes to txtorcon.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="DonnchaC"></a>
       <div class="photo"><img src="$(IMGROOT)/people/donnchac.png" alt="donnchac" /></div>
@@ -225,9 +215,7 @@
       <div class="field"><b>IRC:</b> DonnchaC</div>
       <div class="description">Onion services developer, OnionBalance developer, hunter of bad relays.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="emmapeel"></a>
       <div class="photo"><img src="$(IMGROOT)/people/emmapeel.png" alt="emmapeel" /></div>
@@ -237,7 +225,9 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/she">she</a></div>
       <div class="description">emmapeel coordinates the localization (translations) of the different Tor software.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="ewyatt"></a>
       <div class="photo"><img src="$(IMGROOT)/people/ewyatt.png" alt="ewyatt" /></div>
@@ -246,9 +236,7 @@
       <div class="field"><b>IRC:</b> ewyatt</div>
       <div class="description">Non-technical switchboard for people-related things: recruiting, onboarding, benefits, contracts, TPI policy questions, and baked goods.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="gaba"></a>
       <div class="photo"><img src="$(IMGROOT)/people/gaba.png" alt="gaba" /></div>
@@ -258,7 +246,9 @@
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/she">she</a></div>
       <div class="description">Coordinates Network, Metrics and Anti-censorship teams.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="biella"></a>
       <div class="photo"><img src="$(IMGROOT)/people/biella.png" alt="biella" /></div>
@@ -268,9 +258,7 @@
       <div class="field"><b>IRC:</b> biella</div>
       <div class="description"><a href="http://gabriellacoleman.org/">Anthropologist</a> and Wolfe Chair in Scientific and Technological Literacy at McGill University.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="gman999"></a>
       <div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@@ -278,7 +266,9 @@
       <div class="field"><b>IRC:</b> gman999</div>
       <div class="description">Tor BSD Diversity Project member, long-time relay operator, trainer.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="GeKo"></a>
       <div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@@ -287,9 +277,7 @@
       <div class="field"><b>IRC:</b> GeKo</div>
       <div class="description">Currently lead of the Tor Browser team.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="asn"></a>
       <div class="photo"><img src="$(IMGROOT)/people/asn.png" alt="asn" /></div>
@@ -298,7 +286,9 @@
       <div class="field"><b>IRC:</b> asn</div>
       <div class="description">Onion services. Security analysis. Used to obfsproxy. Follower of the onion.</div>
     </td>
+  </tr>
 
+  <tr>
     <td>
       <a id="saint"></a>
       <div class="photo"><img src="$(IMGROOT)/people/saint.png" alt="saint" /></div>
@@ -308,9 +298,7 @@
       <div class="field"><b>IRC:</b> saint</div>
       <div class="description">Tamper-resistant software distribution, censorship detection, <a href="https://github.com/glamrock/cupcake">Cupcake</a>, and security training of activists and domestic violence survivors.</div>
     </td>
-  </tr>
 
-  <tr>
     <td>
       <a id="ggus"></a>
       <div class="photo"><img src="$(IMGROOT)/people/no_photo.png" alt="no photo" /></div>
@@ -319,16 +307,6 @@
       <div class="field"><b>IRC:</b> ggus</div>
       <div class="description">Works as Community Liaison in Global South. Trainer, relay operator and Tor advocate. CryptoRave organizer.</div>
     </td>
-
-    <td>
-      <a id="hc"></a>
-      <div class="photo"><img src="$(IMGROOT)/people/hc.png" alt="hc" /></div>
-      <div class="icon"><a href="https://twitter.com/hansstatus"><img src="$(IMGROOT)/twitter-small.png" alt="twitter" /></a></div>
-      <div class="icon"><a href="https://pgp.mit.edu/pks/lookup?op=vindex&search=0xE9E28DEA00AA5556"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
-      <div class="name"><a href="#hc">Hans-Christoph Steiner</a></div>
-      <div class="field"><b>IRC:</b> _hc</div>
-      <div class="description">Works on Orbot, NetCipher, and integrating Tor everywhere possible, especially in Debian and Android.  Also deeply mixed into Guardian Project.</div>
-    </td>
   </tr>
 
   <tr>
@@ -391,7 +369,7 @@
       <div class="icon"><a href="https://db.torproject.org/fetchkey.cgi?fingerprint=8F2AF9B6D4A14D03FDF1B2983224499415064C7B"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
       <div class="name"><a href="#isabela">Isabela Bagueros</a></div>
       <div class="field"><b>IRC:</b> isabela</div>
-      <div class="description">Executive Director of the Tor Project.</div>
+      <div class="description">Coordinates Tor's development teams and roadmaps. Keeps track of priorities, and ensures Tor always thinks of the "user first".</div>
     </td>
   </tr>
 
@@ -591,7 +569,7 @@
       <div class="icon"><a href="https://db.torproject.org/fetchkey.cgi?fingerprint=CE1782624600EE98764C6D9CCB8FC772D1AA1D30"><img src="$(IMGROOT)/pgp-key.png" alt="pgp key" /></a></div>
       <div class="name"><a href="#sysrqb">Matthew Finkel</a></div>
       <div class="field"><b>IRC:</b> sysrqb</div>
-      <div class="description">Works on tor, torsocks, and many other projects. Helps maintain and develop BridgeDB.</div>
+      <div class="description">Worked on tor, torsocks, and many other projects. Helped maintain and develop BridgeDB.</div>
     </td>
 
     <td>
@@ -850,7 +828,7 @@
       <div class="name"><a href="#ssteele">Shari Steele</a></div>
       <div class="field"><b>IRC:</b> ssteele</div>
       <div class="field"><b>Pronoun:</b> <a href="http://pronoun.is/she">she</a></div>
-      <div class="description">Shari Steele is on the board of directors for the Tor Project.</div>
+      <div class="description">Executive Director of the Tor Project, Inc.</div>
     </td>
   </tr>
 
diff --git a/about/en/financials.wml b/about/en/financials.wml
index fe8cb4f6..412e599c 100644
--- a/about/en/financials.wml
+++ b/about/en/financials.wml
@@ -16,12 +16,9 @@
 	<dt>Founding Documents</dt>
 	<dd><a href="https://gitweb.torproject.org/company/policies.git/plain/corpdocs/index.html">Form 1023, Articles of Organization, IRS Determination Letter, and more</a></dd>
 
-	<dt>Fiscal Year 2017</dt>
-        <dd><a href="findoc/2017-TorProject-Form990.pdf">2017 IRS Form 990</a></dd>
-
 	<dt>Fiscal Year 2016</dt>
 	<dd><a href="findoc/2016-TorProject-Bylaws.pdf">2016-12-05 Tor Project Bylaws</a></dd>
-        <dd><a href="findoc/2016-TorProject-combined-Form990_Audit_Results.pdf">2016 IRS Form 990 and Independent Audit Results</a></dd>
+	<dd>2016 IRS Form 990 and other forms expected like usual in late 2017</dd>
 
 	<dt>Fiscal Year 2015</dt>
         <dd><a href="findoc/2015-TorProject-combined-Form990_PC_Audit_Results.pdf">2015 IRS Form 990, State of MA Form PC, and Independent Audit Results</a></dd>
diff --git a/about/en/jobs-metrics-data-architect.wml b/about/en/jobs-metrics-data-architect.wml
index 59307f0d..b9b2c38a 100644
--- a/about/en/jobs-metrics-data-architect.wml
+++ b/about/en/jobs-metrics-data-architect.wml
@@ -1,4 +1,4 @@
-#include "head.wmi" TITLE="Tor Project: Jobs (metrics data architect)" CHARSET="UTF-8"
+#include "head.wmi" TITLE="Tor Project: Jobs (software developer)" CHARSET="UTF-8"
 <div id="content" class="clearfix">
   <div id="breadcrumbs">
     <a href="<page index>">Home » </a>
@@ -88,13 +88,13 @@
       <li>You support Internet Freedom!
     </ul>
     <p>
-    This is a full-time position that can be done remotely/internationally or in our office in Seattle, WA. <b>To apply, send a cover letter that includes a statement about why you want to work at the Tor Project, your CV/resume (including three professional references), and a link to a code sample or some non-trivial software project you have significantly contributed to. All documents should be in PDF format labeled with your name. Please send to job-metrics at torproject dot org with “Metrics Data Architect” in the subject line.</b> No phone calls please!
+    This is a full-time position that can be done remotely/internationally or in our office in Seattle, WA. To apply, send a cover letter that includes a statement about why you want to work at the Tor Project, your CV/resume (including three professional references), and a link to a code sample or some non-trivial software project you have significantly contributed to. All documents should be in PDF format labeled with your name. Please send to job-metrics at torproject dot org with “Metrics Data Architect” in the subject line. No phone calls please!
     </p>
     <p>
     Flexible salary, depending on experience. The Tor Project has a highly competitive benefits package, including a generous PTO policy; paid holidays (including the week between Christmas and New Year's, when the office is closed); health, vision, dental, disability, and life insurance paid in full for employee; 401(k); and flexible work schedule. (Please note that benefits package specifics can vary slightly from country to country, but we aim to treat everyone equally.)
     </p>
     <p>
-    The Tor Project's workforce is smart and committed. The Tor Project currently has a paid and contract staff of around 47 developers and operational support staff, plus many thousands of volunteers who contribute to our work. The Tor Project is funded in part by government research and development grants, and in part by individual, foundation and corporate donations. If you’re new to the Tor Project scene, are curious what our workplace culture is like, or just want to read about how fun our semi-annual meetings are, hear what our new Development Director had to say about all of it: <a href="https://blog.torproject.org/reflections-tor-meeting-newbie">https://blog.torproject.org/reflections-tor-meeting-newbie</a>.
+    The Tor Project's workforce is smart and committed. The Tor Project currently has a paid and contract staff of around 47 developers and operational support staff, plus many thousands of volunteers who contribute to our work. The Tor Project is funded in part by government research and development grants, and in part by individual, foundation and corporate donations. If you’re new to the Tor Project scene, are curious what our workplace culture is like, or just want to read about how fun our semi-annual meetings are, hear what our new Development Director had to say about all of it: https://blog.torproject.org/reflections-tor-meeting-newbie
     </p>
     <p>
     The Tor Project, Inc., is an equal opportunity, affirmative action employer.
diff --git a/about/en/jobs.wml b/about/en/jobs.wml
index 9084843b..583ece67 100644
--- a/about/en/jobs.wml
+++ b/about/en/jobs.wml
@@ -12,14 +12,15 @@
   <div id="maincol">
     <h1>The Tor Project is always looking for more great people to join our team!</h1>
 
-      <p>At the moment, we don't have any official open positions. Please check back soon, though! In the meantime, you may want to glance at our
-      <a href="<page getinvolved/volunteer>">volunteers</a> page.</p>
+    # <p>At the moment, we don't have any official open positions. Please check back soon, though! In the meantime, you may want to glance at our
+    # <a href="<page getinvolved/volunteer>">volunteers</a> page.</p>
 
-    <!--
     <p>Specifically, we're looking for the following people currently:</p>
     <ul>
+      <li><a href="<page about/jobs-sysadmin>">Senior Systems Administrator</a></li>
+      <li><a href="<page about/jobs-developer-anti-censorship>">Software Developer</a></li>
+      <li><a href="<page about/jobs-metrics-data-architect>">Metrics data architect</a></li>
     </ul>
-    -->
 
     <p>In the past, we looked for the following people:</p>
 
@@ -45,9 +46,6 @@
       <li>Bookkeeper/Payroll Specialist</li>
       <li>Grants Manager</li>
       <li>Grant Writer</li>
-      <li>Metrics data architect</li>
-      <li>Senior Systems Administrator</li>
-      <li>Software Developer</li>
     </ul>
 
     <p>About the company:<br>
diff --git a/about/en/sponsors.wml b/about/en/sponsors.wml
index 7ae19ecb..7a9af36a 100644
--- a/about/en/sponsors.wml
+++ b/about/en/sponsors.wml
@@ -26,22 +26,17 @@
     <h3>Active Sponsors in 2018:</h3>
       <ul>
 	  <li><a href="<page donate/donate>">Tens of thousands of personal donations from individuals like you</a> (2006-present)</li>
-	  <li><a href="https://rosefdn.org/">Rose Foundation for Communities and the Environment</a> (2017-2019)</li>
+	  <li><a href="https://rosefdn.org/">Rose Foundation for Communities and the Environment</a> (2017-2018)</li>
 	  <li><a href="https://www.mozilla.org/en-US/moss/">Mozilla</a> (2016-2018)</li>
-	  <li><a href="https://www.opentech.fund/">Open Technology Fund</a> (2012-2019)</li>
-          <li><a href="https://www.sida.se/English/">Sida - Swedish International Development Cooperation Agency</a> (2010-2013, 2017-2020)</li>
-          <li><a href="http://mediademocracyfund.org/">Media Democracy Fund</a> (2016-2018)</li>
-	  <li><a href="https://handshake.org/">The Handshake Foundation</a> (2018)</li>
+	  <li><a href="https://www.opentech.fund/">Open Technology Fund</a> (2012-2018)</li>
+	  <li><a href="http://mediademocracyfund.org/">Media Democracy Fund</a> (2016-2018)</li>
 	  <li><a href="https://nsf.gov/">National Science Foundation</a> joint with Princeton University (2012-2018)</li>
 	  <li><a href="https://nsf.gov/">National Science Foundation</a> via University of Minnesota (2013-2018)</li>
 	  <li><a href="https://nsf.gov/">National Science Foundation</a> joint with Georgetown (2015-2019)</li>
 	  <li><a href="https://nsf.gov/">National Science Foundation</a> joint with Rochester Institute of Technology (2016-2019)</li>
 	  <li><a href="https://nsf.gov/">National Science Foundation</a> joint with University of Illinois at Chicago (2016-2018)</li>
 	  <li><a href="https://www.fastly.com/">Fastly</a> (2016-2018)</li>
-	  <li><a href="https://www.state.gov/j/drl/">US Department of State Bureau of Democracy, Human Rights, and Labor</a> (2013-2019)</li>
-	  <li><a href="https://www.state.gov/j/drl/">US Department of State Bureau of Democracy, Human Rights, and Labor</a> via Harvard (2017-2019)</li>
-	  <li><a href="https://www.darpa.mil/program/extreme-ddos-defense">DARPA</a> via University of Pennsylvania (2018-2019)</li>
-	  <li><a href="https://www.imls.gov/">Institute of Museum and Library Services</a> via New York University (2017-2020)</li>
+	  <li><a href="https://www.state.gov/j/drl/">US Department of State Bureau of Democracy, Human Rights, and Labor</a> (2013-2018)</li>
 	  <li><a href="https://www.team-cymru.org/">Team Cymru</a> (2009-present)</li>
       </ul>
 
@@ -57,7 +52,8 @@
 	  <li><a href="http://www.fordfoundation.org/">The Ford Foundation</a> (2013-2014)</li>
 	  <li><a href="https://disconnect.me/">Disconnect</a> (2014)</li>
 	  <li><a href="https://freedom.press/">Freedom of the Press Foundation</a> (2014)</li>
-	  <li><a href="http://www.knightfoundation.org/">The Knight Foundation</a> (2012-2013, 2015-2017)</li>
+	  <li><a href="http://www.knightfoundation.org/">The Knight Foundation</a> (2012-2013)</li>
+          <li><a href="http://www.sida.se/English/">Sida - Swedish International Development Cooperation Agency</a> (2010-2013)</li>
 	  <li>An anonymous North American NGO (2008-2013)</li>
 	  <li><a href="http://www.bbg.gov/">Broadcasting Board of Governors</a> (2006-2013)</li>
           <li><a href="http://nsf.gov/">National Science Foundation</a> via Drexel University (2009-2011)</li>
diff --git a/about/findoc/2016-TorProject-combined-Form990_Audit_Results.pdf b/about/findoc/2016-TorProject-combined-Form990_Audit_Results.pdf
deleted file mode 100644
index df06aac6..00000000
Binary files a/about/findoc/2016-TorProject-combined-Form990_Audit_Results.pdf and /dev/null differ
diff --git a/about/findoc/2016-TorProject-combined-Form990_Audit_Results.pdf.asc b/about/findoc/2016-TorProject-combined-Form990_Audit_Results.pdf.asc
deleted file mode 100644
index 62e14782..00000000
--- a/about/findoc/2016-TorProject-combined-Form990_Audit_Results.pdf.asc
+++ /dev/null
@@ -1,17 +0,0 @@
------BEGIN PGP SIGNATURE-----
-Version: GnuPG v1
-
-iQIcBAABCAAGBQJcDXdGAAoJEMIYUlgZ94RRqgwP/3FC2zfcyvuIB4oPaSIdx9Td
-LOj9g9nr2x7fluxDImIwuePQOUD7JoVHaLtvwdQ4O72cVLDoolSZlQd/eBxLOnh9
-6t9p3StS0+irb/lBI9AXQdb8zSMDLONaWI8Dr1CUOS0tIBcmtKqSUlrU+V6HxW5n
-YDgTaP/55GuK5yups/5zTs7HqiFQaGHY9jljKQyb3FNJHOkfDBRLFcyKlI6NdqER
-GVbIBzmVUm0DHIYs/qP7EnV7D/x+ySwceE0pxoVsUqUCUAjEzO++W++lNeqnAspg
-AO/ax7I5nuQglBnSIxzb33PHGmzLcpbQ/DlU8IlAU2G7py73fNoy2Zet4B9f6fvh
-6pwntV4Ruj4eCbfXujdnla5owfCsh033fiAKH2FlI09S+chn/ch/6yCr82TyEXTb
-uuzvJrdCGywWvlPaTeP341dqyaxYNcNZ3bdgEfBInqKeLMKolEOzRADFlqOii5+T
-8ryTYhfOQMrUvh5VEYlWM/cyNRRnCP+b3gMehe0DqwpSi91/crCIW/4/wTQDMxkm
-s8Z9f5pKaDk8U8kQ//Efp8nKBm1MEKZbem/WsLMUP30/iveKVLVxv/1kFn9ZAuPI
-szNV+xqnzzEPw8IyAGY5Ea5Oou3k589DZzKLyvf5Jxh8kgv6Jo3W6GrzpFhf7AvP
-z1/PvPaftoJX3TyOGshf
-=rlio
------END PGP SIGNATURE-----
diff --git a/about/findoc/2017-TorProject-Form990.pdf b/about/findoc/2017-TorProject-Form990.pdf
deleted file mode 100644
index 3505c14a..00000000
Binary files a/about/findoc/2017-TorProject-Form990.pdf and /dev/null differ
diff --git a/about/findoc/2017-TorProject-Form990.pdf.asc b/about/findoc/2017-TorProject-Form990.pdf.asc
deleted file mode 100644
index 9b1bdbe7..00000000
--- a/about/findoc/2017-TorProject-Form990.pdf.asc
+++ /dev/null
@@ -1,16 +0,0 @@
------BEGIN PGP SIGNATURE-----
-
-iQIzBAABCAAdFiEE9lzjfwS6WzYK5u4XwhhSWBn3hFEFAlwMGPEACgkQwhhSWBn3
-hFE9Lg//SoFRyKvqOYIOouezLKetslHLun/alleOPT8KAVUk19DiaMV2p+/fdQ7q
-NFGTarU/lpldBTCvF8IkdUNN0SrEjJP5IsvpjAWkcaIkuhSlkh0nViLCqxPDoSM/
-IPhasx87AzdeCYOANkahl83DJik2at713k69KQ/s0qPE6dwKNvzXRAHxyPrComuP
-LzM+SY0svPRgsXOcz90hhMtGZTjVBimrjFaSUhQOH+k2AF2kA2IUxjfMsIUdkpIZ
-vKBB/xX2mRiST94rfCdBgxDKly/J17IYjQ372jYq91AdhW78lmjFX2BWeUXKRuSX
-qqTRJVamoj5HtWEwTQXp/trXQhu30BIG9TcFNZStnyIVtuCv1Lu+pz0IKPj1m16o
-TNIFrso5vwdS9G3xRWNgtujCVFUgdcf4Rp/fQ6+78UtrdxC/b74kvds0yzQNufRb
-jxP73ZQagOG1zxVM6iRf5s8OSF/CBMrDSg4lpf2d4qHtNvzQl4bSX3Rv9Xs9F5xg
-2KPWbb1GrLt78BorgKlY8/JZeAv1JUWtEh5hkNNMLctyBd/ZPLFB/oi7UhlK0kBZ
-kqX3i04mM4xPaxSNenmMYjmO+GGs2pE56gWkBZ2GBs+ZEJvIFFcT6pchlU3j6Dpw
-8pZxsuuClqrDQXL7I2ajDqYQrVBq5M54sWfvvPply9zxgx50TkU=
-=mKeO
------END PGP SIGNATURE-----
diff --git a/css/layout.css b/css/layout.css
index 16cd3ef7..3d6453c2 100644
--- a/css/layout.css
+++ b/css/layout.css
@@ -1531,40 +1531,5 @@ mark {
   width: 100%;
   align-content: center;
   font-size-adjust: 0.7;
-  line-height: 1.0em;
-}
-
-/* Checkbox Hack */
-
-input[type=checkbox] {
-   position: absolute;
-   top: -9999px;
-   left: -9999px;
-}
-
-label {
-  -webkit-appearance: push-button;
-  -moz-appearance: button;
-  display: inline-block;
-  cursor: pointer;
-  color: white;
-  float: right;
-  font-weight: bold;
-  padding-right: 15px;
-  padding-top: 15px;
-  font-size: 20px;
-}
-
-#eoy-banner {
-  visibility: visible;
-}
-
-/* Toggled State */
-input[type=checkbox]:checked ~ div#eoy-banner {
-   visibility: hidden;
-   display: none;
-}
-
-.black {
-  color: black;
+  line-height: 1.5em;
 }
diff --git a/css/layout.min.css b/css/layout.min.css
index 4a4d8f65..17969bb5 100644
--- a/css/layout.min.css
+++ b/css/layout.min.css
@@ -130,40 +130,5 @@ mark {
   width: 100%;
   align-content: center;
   font-size-adjust: 0.7;
-  line-height: 1.0em;
-}
-
-/* Checkbox Hack */
-
-input[type=checkbox] {
-   position: absolute;
-   top: -9999px;
-   left: -9999px;
-}
-
-label {
-  -webkit-appearance: push-button;
-  -moz-appearance: button;
-  display: inline-block;
-  cursor: pointer;
-  color: white;
-  float: right;
-  font-weight: bold;
-  padding-right: 15px;
-  padding-top: 15px;
-  font-size: 20px;
-}
-
-#eoy-banner {
-  visibility: visible;
-}
-
-/* Toggled State */
-input[type=checkbox]:checked ~ div#eoy-banner {
-   visibility: hidden;
-   display: none;
-}
-
-.black {
-  color: black;
+  line-height: 1.5em;
 }
diff --git a/css/tbbproject.css b/css/tbbproject.css
index c8f408aa..e012b7c5 100644
--- a/css/tbbproject.css
+++ b/css/tbbproject.css
@@ -237,7 +237,7 @@ h3{
   font-size:14px;
   border-bottom:1px solid #666666;
   font-weight:normal;}
-.dltable table tbody tr:nth-child(even) td{
+.dltable table tbody .alt td{
   background:#f6ffd5;}
 .dltable table tbody td:first-child{
   width:34%;
diff --git a/css/tbbproject.min.css b/css/tbbproject.min.css
index cdb3c276..de46602a 100644
--- a/css/tbbproject.min.css
+++ b/css/tbbproject.min.css
@@ -1 +1 @@
- at charset "UTF-8";#maincol{float:none;width:auto}#content img{max-width:880px}.tbbcol{margin:0;padding:0}a{text-decoration:none}a:hover{text-decoration:underline}.pjtitle{padding-top:18px;height:47px}p{font-size:16px;line-height:20px;margin-bottom:18px}code{font-size:14px;display:block;width:auto;padding:5px;background:#eee8f1;border:1px solid #885ca4}h2{font-size:28px;padding:0;margin:0;text-align:center;font-weight:normal;line-height:28px}h3{font-size:20px;padding-bottom:18px;line-height:20px}.anchor{height:35px}.box{margin:0;padding:0 0 15px 0;border:1px solid #885ca4;-webkit-border-radius:15px;-moz-border-radius:15px;border-radius:15px;text-align:left}.box .pjtext{padding:40px 0 12px;margin:0 50px 0}.img-shadow{float:none;background:none!important;margin:0!important}.img-shadow #sidenav{margin:0;text-align:center;width:auto;padding:5px 0 0;height:25px;background:#885ca4;border:1px solid #885ca4;-webkit-border-top-left-radius:13px;-webkit-border-top-right-radius:13px;-moz-border-r
 adius-topleft:13px;-moz-border-radius-topright:13px;border-top-left-radius:13px;border-top-right-radius:13px;display:block;position:relative}#sidenav ul li a:link,#sidenav ul li a:visited,#sidenav ul li ul li a:link,#sidenav ul li ul li a:visited{display:inline;color:#fff;padding-left:0;padding:0;text-decoration:none;line-height:18px;font-weight:bold;height:auto}#sidenav ul li a:hover,#sidenav ul li ul li a:hover{text-decoration:underline}#sidenav ul{display:inline;margin:0;padding:0;color:#fff;font-weight:bold;font-size:12px;text-align:center;list-style:none;line-height:20px}#sidenav .dropdown{display:inline;width:auto;margin:0 2px 0 0}#sidenav .dropdown:after{content:":";margin-left:0}#sidenav ul li.dropdown a.active{font-weight:normal;background:0}#sidenav ul li{border-bottom:0;display:inline;margin:0}#sidenav ul li ul li{font-size:inherit;margin:0 0 0 2px}#sidenav ul li.active{display:none;color:#fff;background:0;width:auto}#sidenav a.active{color:#fff}#sidenav ul li ul li:befor
 e{content:"\2022";margin-right:5px}#sidenav ul li ul li:first-child:before{content:none;margin:0}.tbb.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 100px;margin-top:10px;padding-bottom:0}.tbb.box .pjtitle{padding-top:21px;margin:0 50px 0 350px;height:54px}.tbb.box .pjtext{padding:30px 0 0 0;margin-left:350px}.tbb.box .pjtext p{font-size:17px;line-height:21px}.tbb.box .pjtext p:last-child{font-size:15px;text-align:right}.tbb.box .pjsplash{background:url(../images/tb-lg.png) no-repeat scroll 82px 35px;margin-top:-374px;position:relative;margin-right:610px;padding-top:205px;height:185px}.tbb.box .pjsplash p{padding-top:35px;text-align:center}.pjsplash a:hover{text-decoration:none}.tbb.box .pjvids{background:#885ca4;padding-top:7px;height:25px}.tbb.box .pjvids h3{margin:0;padding:0;font-size:16px;line-height:16px;font-weight:normal;color:#fff;text-align:center}.downloads.box .pjtitle{padding-top:31px;margin-right:440px;height:59px}.downloads.box .pjflavor{margin:-90px
  30px 0 520px;padding-top:19px;height:71px}.downloads.box .pjflavor p{line-height:17px;font-size:1.1em;font-style:italic}.downloads.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 90px;float:none;width:auto;margin:0}.macosx.box,.linux.box,.windows.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 65px}.macosx.box{height:450px}.macosx.box .pjtext{padding-top:110px;margin:0 auto 0 40px;width:420px;height:280px}.macosx.box .pjimage{margin:-400px 40px 0 504px;padding-top:40px;height:358px;text-align:center}.macosx.box img{box-shadow:0 0 25px black}.windows.box img{padding:25px 0}.feedback.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 0}.feedback.box p{margin-left:20px}.dltable table{margin-left:1px;border-collapse:collapse;text-align:center;width:856px}.dltable{margin-bottom:30px;font-size:12px;background:0;overflow:hidden}.dltable table td,.dltable table th{width:22%;padding:12px 0;text-align:center}.dltable table thead th{background:0
 ;color:#885ca4;font-size:14px;font-weight:bold;border-bottom:1px solid #666;line-height:20px}.dltable table thead th em{font-weight:normal}.dltable table tbody td{background:#fff;border-left:1px solid #666;font-size:14px;border-bottom:1px solid #666;font-weight:normal}.dltable table tbody tr:nth-child(even) td{background:#f6ffd5}.dltable table tbody td:first-child{width:34%;border-left:1px solid #666}.dltable table tbody td:last-child{border-right:1px solid #666}.vidtable table{border-collapse:collapse;text-align:center;width:100%}.vidtable{font-size:12px;background:0;overflow:hidden}.vidtable table td{width:16%;padding:12px 0;text-align:center}.vidtable table tbody tr{border-bottom:1px solid #885ca4}.vidtable table tbody tr:last-child{border-bottom:0}.vidtable table tbody td{background:0;border-left:1px solid #885ca4;font-size:14px;font-weight:normal}.vidtable table tbody .alt td{background:#eee8f1}.vidtable table tbody td:first-child{width:52%;border-left:none}.vidtable table tbod
 y td:last-child{border-right:0}
\ No newline at end of file
+ at charset "UTF-8";#maincol{float:none;width:auto}#content img{max-width:880px}.tbbcol{margin:0;padding:0}a{text-decoration:none}a:hover{text-decoration:underline}.pjtitle{padding-top:18px;height:47px}p{font-size:16px;line-height:20px;margin-bottom:18px}code{font-size:14px;display:block;width:auto;padding:5px;background:#eee8f1;border:1px solid #885ca4}h2{font-size:28px;padding:0;margin:0;text-align:center;font-weight:normal;line-height:28px}h3{font-size:20px;padding-bottom:18px;line-height:20px}.anchor{height:35px}.box{margin:0;padding:0 0 15px 0;border:1px solid #885ca4;-webkit-border-radius:15px;-moz-border-radius:15px;border-radius:15px;text-align:left}.box .pjtext{padding:40px 0 12px;margin:0 50px 0}.img-shadow{float:none;background:none!important;margin:0!important}.img-shadow #sidenav{margin:0;text-align:center;width:auto;padding:5px 0 0;height:25px;background:#885ca4;border:1px solid #885ca4;-webkit-border-top-left-radius:13px;-webkit-border-top-right-radius:13px;-moz-border-r
 adius-topleft:13px;-moz-border-radius-topright:13px;border-top-left-radius:13px;border-top-right-radius:13px;display:block;position:relative}#sidenav ul li a:link,#sidenav ul li a:visited,#sidenav ul li ul li a:link,#sidenav ul li ul li a:visited{display:inline;color:#fff;padding-left:0;padding:0;text-decoration:none;line-height:18px;font-weight:bold;height:auto}#sidenav ul li a:hover,#sidenav ul li ul li a:hover{text-decoration:underline}#sidenav ul{display:inline;margin:0;padding:0;color:#fff;font-weight:bold;font-size:12px;text-align:center;list-style:none;line-height:20px}#sidenav .dropdown{display:inline;width:auto;margin:0 2px 0 0}#sidenav .dropdown:after{content:":";margin-left:0}#sidenav ul li.dropdown a.active{font-weight:normal;background:0}#sidenav ul li{border-bottom:0;display:inline;margin:0}#sidenav ul li ul li{font-size:inherit;margin:0 0 0 2px}#sidenav ul li.active{display:none;color:#fff;background:0;width:auto}#sidenav a.active{color:#fff}#sidenav ul li ul li:befor
 e{content:"\2022";margin-right:5px}#sidenav ul li ul li:first-child:before{content:none;margin:0}.tbb.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 100px;margin-top:10px;padding-bottom:0}.tbb.box .pjtitle{padding-top:21px;margin:0 50px 0 350px;height:54px}.tbb.box .pjtext{padding:30px 0 0 0;margin-left:350px}.tbb.box .pjtext p{font-size:17px;line-height:21px}.tbb.box .pjtext p:last-child{font-size:15px;text-align:right}.tbb.box .pjsplash{background:url(../images/tb-lg.png) no-repeat scroll 82px 35px;margin-top:-374px;position:relative;margin-right:610px;padding-top:205px;height:185px}.tbb.box .pjsplash p{padding-top:35px;text-align:center}.pjsplash a:hover{text-decoration:none}.tbb.box .pjvids{background:#885ca4;padding-top:7px;height:25px}.tbb.box .pjvids h3{margin:0;padding:0;font-size:16px;line-height:16px;font-weight:normal;color:#fff;text-align:center}.downloads.box .pjtitle{padding-top:31px;margin-right:440px;height:59px}.downloads.box .pjflavor{margin:-90px
  30px 0 520px;padding-top:19px;height:71px}.downloads.box .pjflavor p{line-height:17px;font-size:1.1em;font-style:italic}.downloads.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 90px;float:none;width:auto;margin:0}.macosx.box,.linux.box,.windows.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 65px}.macosx.box{height:450px}.macosx.box .pjtext{padding-top:110px;margin:0 auto 0 40px;width:420px;height:280px}.macosx.box .pjimage{margin:-400px 40px 0 504px;padding-top:40px;height:358px;text-align:center}.macosx.box img{box-shadow:0 0 25px black}.windows.box img{padding:25px 0}.feedback.box{background:url(../images/tbb-bgrad.png) repeat-x scroll left 0}.feedback.box p{margin-left:20px}.dltable table{margin-left:1px;border-collapse:collapse;text-align:center;width:856px}.dltable{margin-bottom:30px;font-size:12px;background:0;overflow:hidden}.dltable table td,.dltable table th{width:22%;padding:12px 0;text-align:center}.dltable table thead th{background:0
 ;color:#885ca4;font-size:14px;font-weight:bold;border-bottom:1px solid #666;line-height:20px}.dltable table thead th em{font-weight:normal}.dltable table tbody td{background:#fff;border-left:1px solid #666;font-size:14px;border-bottom:1px solid #666;font-weight:normal}.dltable table tbody .alt td{background:#f6ffd5}.dltable table tbody td:first-child{width:34%;border-left:1px solid #666}.dltable table tbody td:last-child{border-right:1px solid #666}.vidtable table{border-collapse:collapse;text-align:center;width:100%}.vidtable{font-size:12px;background:0;overflow:hidden}.vidtable table td{width:16%;padding:12px 0;text-align:center}.vidtable table tbody tr{border-bottom:1px solid #885ca4}.vidtable table tbody tr:last-child{border-bottom:0}.vidtable table tbody td{background:0;border-left:1px solid #885ca4;font-size:14px;font-weight:normal}.vidtable table tbody .alt td{background:#eee8f1}.vidtable table tbody td:first-child{width:52%;border-left:none}.vidtable table tbody td:last-chil
 d{border-right:0}
\ No newline at end of file
diff --git a/donate/en/donate-options.wml b/donate/en/donate-options.wml
index 774dfb64..19410820 100644
--- a/donate/en/donate-options.wml
+++ b/donate/en/donate-options.wml
@@ -154,8 +154,8 @@ form#makeDonation {
      <div class="dbox donate">
        <h3>Donate via Check or Money Order</h3>
        <h4>You can send checks or money orders to:</h4>
-       <p>The Tor Project<br>
-        217 First Avenue South #4903<br>
+       <p>The Tor Project, Inc.<br>
+        P.O. Box 4903<br>
         Seattle, WA 98194 USA</p>
     </div>
   </div>
diff --git a/donate/en/donate.wml b/donate/en/donate.wml
index 92af65b5..bb7316e3 100644
--- a/donate/en/donate.wml
+++ b/donate/en/donate.wml
@@ -2,6 +2,6 @@
 # Revision: $Revision$
 # Status: obsolete
 
-#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org/"
+#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org"
 
 #include <foot.wmi>
diff --git a/donate/en/donor-faq.wml b/donate/en/donor-faq.wml
index e2a44980..ae349006 100644
--- a/donate/en/donor-faq.wml
+++ b/donate/en/donor-faq.wml
@@ -1,8 +1,457 @@
 ## translation metadata
 # Revision: $Revision$
-# Status: obsolete
+# Translation-Priority: 3-low
 
-#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org/donor-faq"
-
-#include <foot.wmi>
+#include "donatehead.wmi" TITLE="Donate to keep Tor alive!" CHARSET="UTF-8"
+<div class="donation">
+    <div class="container"> 
+    <div class="row text-justify">
+      <div class="col-md-12 col-md-offset-0">
+          <a href="<page donate/donate>" class="btn btn-primary btn-md active" role="button">Back to donate page!</a>
+      </div>
+          <div class="col-md-12 col-md-offset-0">
+              <h2 style="padding:2px; margin-bottom:10px;" class="text-justify">Donor FAQ</h2>
+          <ol>
+          <li>
+            <p><strong>What is the Tor Project and what does it do?</strong></p>
+            <p>The Tor Project’s mission is to advance human rights
+            and freedoms by creating and deploying free and open
+            anonymity and privacy technologies, supporting their
+            unrestricted availability and use, and furthering their
+            scientific and popular understanding. The main product of
+            the Tor Project is Tor Browser, which enables people
+            to browse the internet anonymously.  The Tor Project is a
+            501(c)3 tax-exempt non-profit organization based in Boston,
+            Massachusetts. It was founded in 2006.</p>
+          </li>
+          <li>
+            <p><strong>Who works for the Tor Project, and what do they do?</strong></p>
+            <p>Thousands people around the world actively support the
+            work of the Tor Project, including developers, designers,
+            relay operators, researchers, cryptographers, computer
+            scientists, and privacy advocates, and most are not paid
+            by the Tor Project. The paid staff of the Tor Project
+            is very small: about 20 people in total. You can read
+            about the core contributors to the Tor Project on our <a
+            href="<page about/corepeople>"
+            target="_blank">Core People page</a>.</p>
+          </li>
+          <li>
+            <p><strong>Who uses Tor?</strong></p>
+            <p>The vast majority of Tor users are ordinary people who
+            want control of their privacy online or people whose internet
+            use is censored. Other Tor users are journalists, human
+            rights defenders, domestic violence survivors, policymakers,
+            diplomats, and academic and research institutions.</p>
+          </li>
+          <li>
+            <p><strong>Can anyone use Tor?</strong></p>
+            <p>Yes! Tor is free, and anyone can
+            use it. To get started, you will need to <a
+            href="<page projects/torbrowser>"
+            target="_blank">download the Tor browser</a>. We
+            offer instructions on how to download for <a
+            href="<page projects/torbrowser>#windows"
+            target="_blank">Windows</a>, <a
+            href="<page projects/torbrowser>#macosx"
+            target="_blank">Mac OS X</a> and <a
+            href="<page projects/torbrowser>#linux"
+            target="_blank">Linux</a>.</p>
+          </li>
+          <li>
+            <p><strong>What kinds of people support Tor?</strong></p>
+            <p>All kinds of people. Thousands of individuals have donated
+            to support the Tor Project, and we have also received funding
+            from a wide range of organizations including Google, the Ford
+            Foundation, the Knight Foundation, Reddit, the U.S. National
+            Science Foundation, the Electronic Frontier Foundation,
+            Human Rights Watch, the Swedish International Development
+            Cooperation Agency, the Federal Foreign Office of Germany,
+            the U.S. Naval Research Laboratory, Omidyar Network, SRI
+            International, and Radio Free Asia. People also support Tor in
+            non-financial ways, for example by running Tor relays and exit
+            nodes. In addition, everybody who uses Tor is helping to keep
+            other users safe and anonymous, because the more people using
+            Tor, the harder it is to identify any single individual</p>
+          </li>
+          <li>
+            <p><strong>How does the Tor software work to protect people's anonymity?</strong></p>
+            <p>Tor protects you by bouncing your communications around
+            the Tor network, which is a distributed network of relays
+            run by volunteers all around the world. If someone is
+            watching your internet connection, Tor prevents them
+            from finding out what sites you are visiting. It also
+            prevents sites you visit from finding out where you're
+            located. You can read more about how Tor works on our <a
+            href="<page about/overview>"
+            target="_blank">overview page</a>.</p>
+          </li>
+          <li>
+            <p><strong>I would like to know more about how Tor works,
+            what onion services are, or how to run a relay.</strong></p>
+            <p><a href="<page docs/faq>"
+            target="_blank">This Tor Project FAQ</a> has answers to all
+            those questions, and more.</p>
+          </li>
+          <li>
+            <p><strong>Does the Tor software work?</strong></p>
+            <p>We believe Tor is the best solution available today,
+            and we know that it does a better job of keeping you
+            safely anonymous than other options such as VPNs,
+            proxychains, or browser "private browsing" modes. We
+            know that both the Russian government and the NSA
+            have tried in the past to crack Tor, and failed. The
+            Electronic Frontier Foundation says that Tor offers "<a
+            href="https://www.eff.org/deeplinks/2014/07/7-things-you-should-know-about-tor"
+            target="_blank">some of the strongest anonymity software
+            that exists</a>, and in his book Data and Goliath, security
+            expert Bruce Schneier wrote "The current best tool to protect
+            your anonymity when browsing the web is Tor."</p>
+          </li>
+          <li>
+            <p><strong>Is what Tor does legal? Can I get in trouble for
+            using it?</strong></p>
+            <p>Downloading the Tor browser or using the Tor network
+            is legal in nearly every country. A few web sites
+            occasionally block Tor, but that doesn't mean you're
+            doing anything wrong. Usually it means that site has had
+            difficulties with visitors who've been using Tor in the
+            past, or that they misunderstand what Tor is and how it
+            works (we’re working to change this). But it is not
+            illegal to use Tor, and you shouldn't get in trouble for
+            doing it. You can find more information about Tor's legal
+            status <a href="https://www.eff.org/torchallenge/faq.html"
+            target="_blank">on the EFF site</a>.</p>
+          </li>
+          <li>
+            <p><strong>Where can I find out more about the Tor Project,
+            especially financial information?</strong></p>
+            <p>Here are the Tor Project's <a
+            href="<page about/financials>"
+            target="_blank">financial statements, and its Form
+            990</a>.</p>
+          </li>
+          <li>
+            <p><strong>Where does the Tor Project's money come
+            from?</strong></p>
+            <p>Tor is supported by United States government funding
+            agencies, NGOs, private foundations, research institutions,
+            private companies, and nearly 8,000 personal donations
+            from people like you. The exact percentage varies by year,
+            but in any given year, 80-90% of the Tor Project's funding
+            comes from United States government funding sources. See
+            <a href="<page about/sponsors>"
+            target="_blank">https://www.torproject.org/about/sponsors</a>
+            for more.</p>
+          </li>
+          <li>
+            <p><strong>How much money does the Tor Project spend annually,
+            and what is it used for?</strong></p>
+            <p>The Tor Project spends about $2.5 million annually. About
+            80% of the Tor Project's spending goes on staffing, mostly
+            software engineers. About 10% goes towards administrative
+            costs such as accounting and legal costs and bank fees. The
+            remaining 10% is spent on travel, meetings and conferences,
+            which are important for Tor because the Tor community is
+            global.</p>
+          </li>
+          <li>
+            <p><strong>Is my donation tax-deductible?</strong></p>
+            <p>If you pay taxes in the United States, your donation to
+            Tor is tax deductible to the full extent required by law. The
+            tax ID number for the Tor Project is 20-8096820.</p>
+          </li>
+          <li>
+            <p><strong>If I am not in the United States, can I still
+            donate?</strong></p>
+            <p>Yes, definitely. Your donation probably isn't
+            tax-deductible (unless you pay taxes on U.S. income) but we
+            would very much appreciate your support. </p>
+          </li>
+          <li>
+            <p><strong>Am I right that the Tor Project has never asked
+            for donations before?</strong></p>
+            <p>Yes! We've had a donate button on the site for years,
+            and so far nearly 8,000 people have given money to the Tor
+            Project. But this is the first time we've actively sought
+            donations. To date, much of Tor Project funding has come
+            from United States federal funding sources, such as the
+            U.S. independent agency the International Broadcasting Bureau
+            (IBB) and the U.S. Department of State's Bureau of Democracy,
+            Human Rights, and Labor (DRL). While we are grateful for
+            this funding, we don't want the Tor Project to become too
+            dependent on any single type of funding. Crowdfunding is
+            unrestricted--It allows us to spend the money on the projects
+            we think are most important and respond quickly to changing
+            events.  And so, we are asking you to help financially support
+            us, to increase the Tor Project's independence and ensure the
+            sustainability of the products and services we provide.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate to a specific project, or restrict
+            my donation to a particular purpose?</strong></p>
+            <p>No, sorry. If we accept a donation from someone who has
+            specified how they want it used, we're required by the IRS
+            to track and report separately on that money. That would
+            be a big administrative burden for a small organization,
+            and we don't think it's a good idea for us. However, we
+            would be very happy to hear your ideas and feedback about
+            our work. If you're donating using a mechanism that allows
+            for comments, feel free to send your thoughts that way.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate while using the Tor browser?</strong></p>
+            <p>Maybe! In our testing, we saw two scenarios related to
+            Paypal + Tor browser:<br />
+            <ol>
+              <li>Sometimes you get an error after clicking on the
+              'Donate' button. If this is happening to you, you should
+              change your circuit and try again.</li>
+              <li>For users logging in to Paypal: some people had
+              no problem donating via PayPal while using the Tor
+              browser. But, some people couldn't complete the donation
+              process, and one person had their PayPal account temporarily
+              frozen. We recommend not using the Tor browser to donate
+              using your PayPal account, unless you're willing to risk
+              some difficulties with PayPal.</li>
+              </ol></p>
+          </li>
+          <li>
+            <p><strong>How can I donate via debit or credit card?</strong></p>
+            <p>To donate using a major credit card or debit card (VISA,
+            MasterCard, Discover or American Express) or via PayPal,
+            please visit our donate page. You do not need to have a
+            PayPal account to donate via credit card.</p>
+          </li>
+          <li>
+            <p><strong>Why do you ask for my address and similar
+            information?</strong></p>
+            <p>If you donate by credit card, you will be asked for some
+            information that's required to process your credit card
+            payment, including your billing address. This allows our
+            payment processor to verify your identity, process your
+            payment, and prevent fraudulent charges to your credit
+            card. We don't ask for information beyond what's required
+            by the payment processor.</p>
+          </li>
+          <li>
+            <p><strong>Why is there a minimum donation?</strong></p>
+            <p>People who have stolen credit card information often
+            donate to nonprofits as a way of testing whether the card
+            works. These people typically use a very small amount for
+            their testing, and we've found that setting a $1 minimum
+            donation seems to deter them.</p>
+          </li>  
+          <li>
+            <p><strong>Is there a maximum donation?</strong></p>
+            <p>No, no, no! More funding from you means we can do more
+            things we are excited to do, like hire a person to monitor
+            the Tor network full time, or research, test, and  implement
+            ideas we have for making  the Tor network even stronger.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate via bitcoin?</strong></p>
+            <p>Yes! We accept <a
+            href="<page donate/donate-options>"
+            target="_blank">bitcoin via BitPay</a>.</p>
+          </li>  
+          <li>
+            <p><strong>If I want my donation to be anonymous, what is
+            the best way for me to donate?</strong></p>
+            <p>You can donate by <a href="<page
+            donate/donate-options>#cash">mailing cash</a>.
+            You can donate via bitcoin
+            if you have bitcoin set up in a way that preserves your
+            anonymity. You can buy cash gift cards and mail them to
+            us. There are probably other ways to donate anonymously that
+            we haven't thought of-- maybe you will :)</p>
+          </li>
+          <li>
+            <p><strong>Is the Tor Project required to identify me as
+            a donor to the United States government, or to any other
+            authority?</strong></p>
+            <p>If you donate $5,000 or more to the Tor Project in a single
+            year, we are required to report the donation amount and your
+            name and address (if we have it) to the IRS, on Schedule
+            B of the Form 990, which is filed annually. However,  it's
+            normal for nonprofits to redact individual donor information
+            from the copy of the 990 that's made publicly-available, and
+            that's what we do. We are not required to identify donors to
+            any other organization or authority, and we do not. (Also,
+            if  you wanted, you could give us $4,999 in late 2015 and
+            $4,999 in early 2016 ;)</p>
+          </li>
+          <li>
+            <p><strong>In your privacy policy, you say you will never
+            publicly identify me as a donor without my permission. What
+            does that mean?</strong></p>
+            <p>Yes, that's right. If you donate to the Tor Project, there
+            will be some people at the Tor Project who know about your
+            donation. However, we will never publicly identify you as
+            a donor, unless you have given us permission to do so. That
+            means we won't post your name on our website, thank you on
+            Twitter, or do anything else that would publicly identify
+            you as someone who has donated. If we decide we would like
+            to publicly name you as a donor, we will ask you first,
+            and will not do it until and unless you say it's okay.</p>
+          </li>
+          <li>
+            <p><strong>It's important to me that my donation be
+            tax-deductible, but I don't pay taxes in the United
+            States. </strong></p>
+            <p>Right now, we can only offer tax-deductibility to
+            donors who pay taxes in the United States. If it's
+            important to you that your donations be tax-deductible
+            in a different country, let us know and we will
+            try to offer tax-deductibility in your country in
+            future.  Or, if you are in Germany, France or Sweden, <a
+            href="<page docs/faq>#RelayDonations"
+            target="_blank">these organizations support the Tor
+            network</a> and may be able to offer you tax-deductibility
+            for your donation.</p>
+          </li>
+          <li>
+            <p><strong>What if I don't want to use PayPal? Is there
+            another way I can donate? </strong></p>
+            <p>Yes! Here is a list of <a
+            href="<page donate/donate-options>"
+            target="_blank">other ways you can donate</a>.</p>
+          </li>
+          <li>
+            <p><strong>What is your donor privacy policy?</strong></p>
+            <p>Here is the Tor Project <a
+            href="<page donate/donor-privacy-policy>" target="_blank">donor
+            privacy policy</a>.</p>
+          </li>
+          <li>
+            <p><strong>What is your refund policy?</strong></p>
+            <p>If you want your donation refunded, please tell us
+            by emailing donations(at)torproject.org. To process your
+            refund we'll need to know the date of your donation, the
+            amount you donated, your full name, the payment method you
+            used and your country of origin. Please also tell us why
+            you're asking for a refund. Please note that some payment
+            methods won't support refunds, or require them to be made
+            in a specific way, so we may need additional information
+            from you in order to process yours.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate by mail?</strong></p>
+            <p>Yes. Our mailing address is The Tor Project, 217 1st Ave S #4903,
+            Seattle WA 98194, USA</p>
+          </li>
+          <li>
+            <p><strong>Do you accept cash donations?</strong></p>
+            <p>Yes.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate stock?</strong></p>
+            <p>Yes! Many companies --such as Google, Microsoft, eBay,
+            PayPal, Apple, Verizon, Red Hat, many universities,
+            and others-- will match donations made by their
+            employees. The fastest way to find out if your company
+            matches donations is usually by checking with your
+            HR department, or you can search for your company
+            name at <a href="https://www.matchinggifts.com/rit/"
+            target="_blank">https://www.matchinggifts.com/rit/</a>. If
+            your company isn't currently set up to match donations
+            to the Tor Project, we would be happy to help with the
+            paperwork. If you want help figuring out the process, write
+            us at donations(at)torproject.org.</p>
+          </li>
+          <li>
+            <p><strong>Can I become a Tor Project member?</strong></p>
+            <p>Right now, we don't have a membership program, but we may
+            set one up in the future. If you want to get involved with
+            the Tor Project, <a href="<page getinvolved/volunteer>">this
+            is a good place to start</a>.</p>
+          </li>
+          <li>
+            <p><strong>How can I get a Tor t-shirt or stickers?</strong></p>
+            <p>If you donate $23 or more, you will get stickers we
+            created just for this campaign. And if you donate $100 or
+            more, you will get a special 'Tor supporter' t-shirt!</p>
+          </li>
+          <li>
+            <p><strong>If I want to stay in touch with the Tor Project,
+            what's the best way for me to do that?</strong></p>
+            <p>You can sign up to receive the <a
+            href="https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-news"
+            target="_blank">Tor weekly newsletter</a>, read the <a
+            href="https://blog.torproject.org/" target="_blank">Tor
+            blog</a>, or <a href="https://twitter.com/torproject"
+            target="_blank">follow us on Twitter</a>.</p>
+          </li>
+          <li>
+            <p><strong>Does the Tor Project participate in the Combined
+            Federal Campaign program?</strong></p>
+            <p>No, Tor doesn't currently participate in the CFC
+            program. If you'd like to get Tor added to the CFC program
+            in your location, that would be great: please let us know
+            if you need any help. </p>
+          </li>
+          <li>
+            <p><strong>Can I donate my airline miles, flight vouchers,
+            or hotel points?</strong></p>
+            <p>No, sorry. We would like to accept your miles, vouchers
+            and hotel points, and in the future we may be able to.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate hardware?</strong></p>
+            <p>Typically no, we don't encourage people to donate
+            hardware. But if you want to make a hardware donation that
+            you think might be especially useful for us, please mail
+            donations(at)torproject.org.</p>
+          </li>
+          <li>
+            <p><strong>Can I donate my time?</strong></p>
+            <p>Yes. Here's a <a
+            href="<page getinvolved/volunteer>"
+            target="_blank">list of areas where we would love your
+            help</a>.</p>
+          </li>
+          <li>
+            <p><strong>I would like my company to support Tor. What can
+            we do to help?</strong></p>
+            <p>Your company could match donations made by its employees
+            to the Tor Project--that would be wonderful. Your
+            company may operate a corporate foundation that
+            gives out grants, and if so, you should encourage it
+            to fund us. Maybe your company would be willing to <a
+            href="<page docs/faq>#HowDoIDecide"
+            target="_blank">operate a Tor relay</a>. If your company
+            sells cloud services, perhaps it could donate these to Tor:
+            We use them in some anti-censorship projects.</p>
+          </li>
+          <li>
+            <p><strong>You don't support my preferred way to donate. Can
+            I recommend a new donation method to you?</strong></p>
+            <p>Sure. Just mail us at donations(at)torproject.org.</p>
+          </li>
+          <li>
+            <p><strong>Will the Tor Project accept donations from anybody,
+            or do you reserve the right to reject support from specific
+            organizations or individuals?</strong></p>
+            <p>We do reserve the right to reject a donation. To date
+            though, we haven't exercised that right. We are happy that
+            a broad range of people use and support Tor.</p>
+          </li>
+          <li>
+            <p><strong>I have more questions. How can I get
+            answers?</strong></p>
+            <p>Feel free to send questions to
+            donations(at)torproject.org. We will try to answer you,
+            and we'll also post your question (and the answer) here.</p>
+          </li>
+          </ol>
+          </div>
+     <div class="col-md-12 col-md-offset-0">
+          <a href="<page donate/donate>" class="btn btn-primary btn-md active" role="button">Back to donate page!</a>
+      </div>
+          <!-- Add the extra clearfix for only the required viewport -->
+          <div class="clearfix visible-xs-block"></div>
+      </div>
+    </div>
+</div>
+#include <donatefoot.wmi>
 
diff --git a/donate/en/donor-privacy-policy.wml b/donate/en/donor-privacy-policy.wml
index c3355b08..0f1f0bcd 100644
--- a/donate/en/donor-privacy-policy.wml
+++ b/donate/en/donor-privacy-policy.wml
@@ -1,7 +1,29 @@
 ## translation metadata
 # Revision: $Revision$
-# Status: obsolete
+# Translation-Priority: 3-low
 
-#include "head.wmi" TITLE="Redirecting" REDIRECT="https://donate.torproject.org/privacy-policy"
-
-#include <foot.wmi>
+#include "donatehead.wmi" TITLE="Donate to keep Tor alive!" CHARSET="UTF-8"
+<div class="donation">
+    <div class="container"> 
+    <div class="row text-justify">
+      <div class="col-md-12 col-md-offset-0">
+          <a href="<page donate/donate>" class="btn btn-primary btn-md active" role="button">Back to donate page!</a>
+      </div>
+          <div class="col-md-12 col-md-offset-0">
+              <h2 style="padding:2px; margin-bottom:10px;">Donor Privacy Policy</h2>
+              <p>The Tor Project respects donor privacy and welcomes anonymous donations. If being anonymous is important to you, the best way to preserve your anonymity is by donating using a method that doesn't disclose your personal information.</p>
+              <p>If you provide personal information as part of the donation process, it may be collected and retained by third-party service providers and/or the Tor Project, as described below. The Tor Project has very little influence over how third-party service providers, such as PayPal, may collect and use your information. We recommend you familiarize yourself with their <a href="https://www.paypal.com/webapps/mpp/ua/privacy-full" target="_blank">policies</a>, especially if you have privacy concerns.</p>
+              <p>When you donate to the Tor Project, depending what mechanism you use, we may learn your name, the amount you donated, your email address, phone number and/or mailing address, as well as any other information you provide. We may also learn incidental data such as the date and time of your donation. The Tor Project will never have access to your financial data, such as your credit card information.</p>
+              <p>We aim to be careful with your information. If you have provided your email address, we will email you once to thank you and give you a receipt. If you opt in during the donation process, we may email you again in future. If you donate more than $5,000 and we know your name and address, we are required to disclose it to the IRS in <a href="https://www.irs.gov/pub/irs-pdf/f990ezb.pdf" target="_blank">Schedule B of the Form 990</a>. But, that information is redacted from the publicly-available version of our Form 990. We will never publicly identify you as a donor without your permission.</p>
+              <p>We do not publish, sell, trade, or rent any information about you. For our records, we retain your name, the amount of your donation, the date of the donation, and your contact information. Access to that information is restricted inside the Tor Project to people who need it to do their work, for example by thanking you or mailing you a t-shirt.</p>
+              <p><strong>The Tor Project very much appreciates all its donors. Thank you for supporting Tor.</strong></p>
+            </div>
+      <div class="col-md-12 col-md-offset-0">
+          <a href="<page donate/donate>" class="btn btn-primary btn-md active" role="button">Back to donate page!</a>
+      </div>
+          <!-- Add the extra clearfix for only the required viewport -->
+          <div class="clearfix visible-xs-block"></div>
+      </div>
+    </div>
+</div>
+#include <donatefoot.wmi>
diff --git a/download/en/download-easy.wml b/download/en/download-easy.wml
index 489e7611..8b844610 100644
--- a/download/en/download-easy.wml
+++ b/download/en/download-easy.wml
@@ -184,14 +184,19 @@
           button below.
           </p>
           <p>
+          Note: For this release, you also need to install Orbot, you can
+          learn more about it
+          <a href="https://www.torproject.org/docs/android.html.en">here</a>.
+          </p>
+          <p>
           Known issue: Our Security Slider is now under ‘Security Settings,
           but because of a small issue, it’s only showing up after you restart
           the app. We plan on fixing it for the next release.
           </p>
           <form class="downloads">
-            <a class="button" href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk"><span class="strong">Download</span><span class="normal">Android</span></a>
+            <a class="button" href="../dist/torbrowser/mobile/<version-torbrowserbundleandroid>/tor-browser-android-arm-<version-torbrowserbundleandroid>.apk"><span class="strong">Download</span><span class="normal">Android</span></a>
 	    <div class="sig">
-              (<a class="android-tbb-sig" href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)
+              (<a class="android-tbb-sig" href="../dist/torbrowser/mobile/<version-torbrowserbundleandroid>/TorBrowser-<version-torbrowserbundleandroid>.asc">sig</a>)
               <a class="siginfo" href="<page docs/verifying-signatures>">What's This?</a>
             </div>
           </form>
@@ -209,6 +214,8 @@
 
 <div id="dow-don-right">
 <a href="<page donate/donate-download>"><img src="../images/btn_donateCC_LG.gif"></a>
+<p>Mozilla will match your <br />
+donation until 12/31!</p>
 </div> <!-- END dow-don-right -->
 
 
diff --git a/download/en/download.wml b/download/en/download.wml
index 6bea1060..ff40c486 100644
--- a/download/en/download.wml
+++ b/download/en/download.wml
@@ -165,9 +165,9 @@ custom configurations. All an apt-get or yum install away.</p>
         <div class="fauxhead"></div>
 	<div class="package" style="padding-top: 13px; border-top: 0px;">
           <form class="downloads">
-            <a class="button" href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk"><span class="strong">Download</span><span class="normal">Android</span></a>
+            <a class="button" href="../dist/torbrowser/mobile/<version-torbrowserbundleandroid>/tor-browser-android-arm-<version-torbrowserbundleandroid>.apk"><span class="strong">Download</span><span class="normal">Android</span></a>
             <div class="sig">
-              (<a class="android-tbb-sig" href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)
+              (<a class="android-tbb-sig" href="../dist/torbrowser/mobile/<version-torbrowserbundleandroid>/tor-browser-android-arm-<version-torbrowserbundleandroid>.apk.asc">sig</a>)
               <a class="siginfo" href="<page docs/verifying-signatures>">What's This?</a>
             </div>
           </form>
@@ -181,6 +181,10 @@ custom configurations. All an apt-get or yum install away.</p>
           or you can get the apk by clicking on the button below.
           </p>
           <p>
+          Note: For this release, <b>you also need to install Orbot</b>, you can
+          learn more about it <a href="https://guardianproject.info/apps/orbot">here</a>.
+          </p>
+          <p>
           Known issue: Our Security Slider is now under ‘Security Settings,
           but because of a small issue, it’s only showing up after you restart
 	  the app. We plan on fixing it for the next release.
diff --git a/en/banner.wmi b/en/banner.wmi
index b11c8eab..35c13e7c 100644
--- a/en/banner.wmi
+++ b/en/banner.wmi
@@ -1,5 +1,3 @@
-<label class="black" for="toggle-1">x</label>
-<input type="checkbox" id="toggle-1">
 <div class="eoy-background">
   <div class="eoy-wrap">
     <div class="eoy-artwork">
diff --git a/en/banner2.wmi b/en/banner2.wmi
index d21cc17d..3504994b 100644
--- a/en/banner2.wmi
+++ b/en/banner2.wmi
@@ -1,6 +1,4 @@
-<label for="toggle-1">x</label>
-<input type="checkbox" id="toggle-1">
-<div id="eoy-banner" class="eoy-background-2 align-center">
+<div class="eoy-background-2 align-center">
   <div class="eoy-wrap align-center">
     <div class="eoy-message-2 align-center">
       <div class="tor-strength-in-num green align-center">
diff --git a/en/index.wml b/en/index.wml
index 6434165e..f99eeed5 100644
--- a/en/index.wml
+++ b/en/index.wml
@@ -1,47 +1,8 @@
 ## translation metadata
 # Revision: $Revision$
 # Translation-Priority: 1-high
-<define-tag viewport whitespace=delete>
-<meta name="viewport" content="width\=device-width, initial-scale=1">
-</define-tag>
-<!DOCTYPE html>
- <html>
- <head>
-
-   <meta charset="utf-8">
-   <meta http-equiv="X-UA-Compatible" content="IE=edge">
-   <viewport>
-   <meta name="author" content="The Tor Project, Inc.">
-   <meta name="description" content="The Tor Project's free software protects your privacy online. Site blocked? Email [mailto:gettor at torproject.org] for help downloading Tor Browser.">
-   <meta name="keywords" content="tor, tor project, tor browser, avoid censorship, traffic analysis, anonymous communications, privacy, avoid surveillance, online security, anonymous online, private browsing, anonymity online, online privacy, protect privacy, private mac browser, private windows browser, private android browser, linux browser, anonymity network, tor network, onion router, onion browser">
-   <meta property="og:image" content="https://www.torproject.org/images/tor-logo.jpg">
-{#meta#}
-
-   <title>$(TITLE)</title>
-
-   <link rel="icon" href="$(IMGROOT)/favicon.ico">
-   <ifneq "$(REDIRECT)" "" "<meta http-equiv="refresh" content="0;url=$(DOCROOT)/$(REDIRECT)">">
-   <ifneq "$(REDIRECT_GLOBAL)" "" "<meta http-equiv="refresh" content="0;url=$(REDIRECT_GLOBAL)">">
-
-   # begin WML to generate css/js paths
-   <ifneq "$(STYLESHEET)" "" "<link href="$(DOCROOT)/$(STYLESHEET)" rel="stylesheet">">
-   <ifeq "$(STYLESHEET)" "" "<link href="$(DOCROOT)/css/master.min.css" rel="stylesheet">">
-
-   #<link href="css/master.min.css" rel="stylesheet">
-   <!--[if lte IE 8]>
-   <link href="$(DOCROOT)/css/ie8-and-down.min.css" rel="stylesheet">
-   <![endif]-->
-   <!--[if lte IE 7]>
-   <link href="$(DOCROOT)/css/ie7-and-down.min.css" rel="stylesheet">
-   <![endif]-->
-   <!--[if IE 6]>
-   <link href="$(DOCROOT)/css/ie6.min.css" rel="stylesheet">
-   <![endif]-->
-   #  <script language="javascript" type="text/javascript" src="$(DOCROOT)/global.js"></script>
-   # end WML to generate css/js paths
-</head>
-<body>
-#include "head-index.wmi" TITLE="Tor Project | Privacy Online" CHARSET="UTF-8"
+#include "banner2.wmi"
+#include "head.wmi" TITLE="Tor Project | Privacy Online" CHARSET="UTF-8"
 <div id="home">
     <div id="content" class="clearfix">
     	<div id="maincol">
diff --git a/es/banner.wmi b/es/banner.wmi
index 047acbfd..bb914cc8 100644
--- a/es/banner.wmi
+++ b/es/banner.wmi
@@ -1,5 +1,3 @@
-<label class="black" for="toggle-1">x</label>
-<input type="checkbox" id="toggle-1">
 <div class="eoy-background">
   <div class="eoy-wrap">
     <div class="eoy-artwork">
diff --git a/es/banner2.wmi b/es/banner2.wmi
index d21cc17d..3504994b 100644
--- a/es/banner2.wmi
+++ b/es/banner2.wmi
@@ -1,6 +1,4 @@
-<label for="toggle-1">x</label>
-<input type="checkbox" id="toggle-1">
-<div id="eoy-banner" class="eoy-background-2 align-center">
+<div class="eoy-background-2 align-center">
   <div class="eoy-wrap align-center">
     <div class="eoy-message-2 align-center">
       <div class="tor-strength-in-num green align-center">
diff --git a/es/index.wml b/es/index.wml
index a9f2c5f4..a720b87c 100644
--- a/es/index.wml
+++ b/es/index.wml
@@ -1,47 +1,8 @@
 ## translation metadata
 # Revision: $Revision$
 # Translation-Priority: 1-high
-<define-tag viewport whitespace=delete>
-<meta name="viewport" content="width\=device-width, initial-scale=1">
-</define-tag>
-<!DOCTYPE html>
- <html>
- <head>
-
-   <meta charset="utf-8">
-   <meta http-equiv="X-UA-Compatible" content="IE=edge">
-   <viewport>
-   <meta name="author" content="The Tor Project, Inc.">
-   <meta name="description" content="The Tor Project's free software protects your privacy online. Site blocked? Email [mailto:gettor at torproject.org] for help downloading Tor Browser.">
-   <meta name="keywords" content="tor, tor project, tor browser, avoid censorship, traffic analysis, anonymous communications, privacy, avoid surveillance, online security, anonymous online, private browsing, anonymity online, online privacy, protect privacy, private mac browser, private windows browser, private android browser, linux browser, anonymity network, tor network, onion router, onion browser">
-   <meta property="og:image" content="https://www.torproject.org/images/tor-logo.jpg">
-{#meta#}
-
-   <title>$(TITLE)</title>
-
-   <link rel="icon" href="$(IMGROOT)/favicon.ico">
-   <ifneq "$(REDIRECT)" "" "<meta http-equiv="refresh" content="0;url=$(DOCROOT)/$(REDIRECT)">">
-   <ifneq "$(REDIRECT_GLOBAL)" "" "<meta http-equiv="refresh" content="0;url=$(REDIRECT_GLOBAL)">">
-
-   # begin WML to generate css/js paths
-   <ifneq "$(STYLESHEET)" "" "<link href="$(DOCROOT)/$(STYLESHEET)" rel="stylesheet">">
-   <ifeq "$(STYLESHEET)" "" "<link href="$(DOCROOT)/css/master.min.css" rel="stylesheet">">
-
-   #<link href="css/master.min.css" rel="stylesheet">
-   <!--[if lte IE 8]>
-   <link href="$(DOCROOT)/css/ie8-and-down.min.css" rel="stylesheet">
-   <![endif]-->
-   <!--[if lte IE 7]>
-   <link href="$(DOCROOT)/css/ie7-and-down.min.css" rel="stylesheet">
-   <![endif]-->
-   <!--[if IE 6]>
-   <link href="$(DOCROOT)/css/ie6.min.css" rel="stylesheet">
-   <![endif]-->
-   #  <script language="javascript" type="text/javascript" src="$(DOCROOT)/global.js"></script>
-   # end WML to generate css/js paths
-</head>
-<body>
-#include "head-index.wmi" TITLE="Tor Project | Privacy Online" CHARSET="UTF-8"
+#include "banner2.wmi"
+#include "head.wmi" TITLE="Tor Project | Privacy Online" CHARSET="UTF-8"
 <define-tag lang>es-ES</define-tag>
 <div id="home">
     <div id="content" class="clearfix">
diff --git a/images/people/alsmith.png b/images/people/alsmith.png
deleted file mode 100644
index eda9dd69..00000000
Binary files a/images/people/alsmith.png and /dev/null differ
diff --git a/images/people/hc.png b/images/people/hc.png
deleted file mode 100644
index 8721c287..00000000
Binary files a/images/people/hc.png and /dev/null differ
diff --git a/images/people/orig/alsmith.jpg b/images/people/orig/alsmith.jpg
deleted file mode 100644
index 7d1f2ed4..00000000
Binary files a/images/people/orig/alsmith.jpg and /dev/null differ
diff --git a/images/people/orig/hc.jpg b/images/people/orig/hc.jpg
deleted file mode 100644
index 68eccd4a..00000000
Binary files a/images/people/orig/hc.jpg and /dev/null differ
diff --git a/include/head-index.wmi b/include/head-index.wmi
deleted file mode 100644
index e491a844..00000000
--- a/include/head-index.wmi
+++ /dev/null
@@ -1,116 +0,0 @@
-#! /usr/bin/wml
-<: use strict; :>
-<: use warnings; :>
-#use "perl-globals.wmi"
-#use "links.wmi"
-#use "versions.wmi"
-#use "navigation.wmi"
-
-
-<div id="wrap">
-  <div id="header">
-    <h1 id="logo"><a href="<page index>">Tor</a></h1>
-      # navigation menu generation
-      <div id="nav">
-        <ul>
-        <:{
-            # create a hash and maintain order of keys
-            my %navigation;
-            my @keys;
-            while (@navigation) {
-              my $key = shift @navigation;
-              my $val = shift @navigation;
-              push @keys, $key;
-              $navigation{$key} = $val;
-            }
-
-            my $page = $WML_SRC_BASENAME;
-            my $lang = "$(LANG)";
-
-            for my $key (@keys) {
-              my ($dir, $base) = $key =~ m,^(?:(.*)/)?(.*?)$,;
-
-              # in directory of active link, set class active. This rule should be improved with proper structuring of the links.
-              my $class;
-              if ((index($page, 'contact') ne -1) and (index($base, 'overview') ne -1)) {
-                $class = '';
-              } elsif ((defined $dir) and ($WML_SRC_DIRNAME =~/$dir/) and (index($key, 'contact') eq -1) or ($WML_SRC_BASENAME eq $base)) {
-                $class = 'class="active '.$base.' '.$page.'"';
-              } else {
-                $class = '';
-              }
-
-	            $dir = '.' unless defined $dir;
-
-              # translated version
-              if (-e "$(DOCROOT)/$dir/$lang/$base.wml") {
-                  printf '<li><a '.$class.' href="%s">%s</a></li>'."\n",
-                         stripDotSlashs("$(DOCROOT)/$dir/$base.html.$(LANG)"),$navigation{$key};
-              }
-              # english version
-              elsif (-e "$(DOCROOT)/$dir/en/$base.wml") {
-              	printf '<li><a '.$class.' href="%s">%s</a></li>'."\n",
-                  stripDotSlashs("$(DOCROOT)/$dir/$base.html"), $navigation{$key};
-              }
-              # full url
-              elsif ($key =~/^http/) {
-                printf '<li><a href="%s">%s</a></li>'."\n", $key, $navigation{$key};
-              } else {
-                warn "$WML_SRC_FILENAME has a [page $key] (parses to
-docdir: $(DOCROOT)/; dir: $dir; base: $base -> $(DOCROOT)/$dir/$lang/$base.wml), but that doesn't exist.";
-              }
-            }
-        }:>
-        </ul>
-      </div>
-      <!-- END NAV -->
-     # end navigation generation
-      <div id="calltoaction">
-        <ul>
-          <:{
-            my %calltoaction;
-            my @keys;
-            while (@calltoaction) {
-              my $key = shift @calltoaction;
-              my $val = shift @calltoaction;
-              push @keys, $key;
-              $calltoaction{$key} = $val;
-            }
-
-            my $page = $WML_SRC_BASENAME;
-            my $lang = "$(LANG)";
-            for my $key (@keys) {
-              my ($dir, $base) = $key =~ m,^(?:(.*)/)?(.*?)$,;
-
-              # in directory, set active
-              my $class;
-              if ((defined $dir) and ($WML_SRC_DIRNAME =~/$dir/) or ($WML_SRC_BASENAME eq $base)) {
-              #if ($WML_SRC_BASENAME eq $base) {
-                $class = 'class="active"';
-              } else {
-                $class = '';
-              }
-
-	          $dir = '.' unless defined $dir;
-              # try to use a translated version
-              if (-e "$(DOCROOT)/$dir/$lang/$base.wml") {
-                  printf '<li class="donate"><a '.$class.' href="%s">%s</a></li>'."\n",
-                         stripDotSlashs("$(DOCROOT)/$dir/$base.html.$(LANG)"),$calltoaction{$key};
-              }
-              # default to english version
-              elsif (-e "$(DOCROOT)/$dir/en/$base.wml") {
-              	printf '<li class="donate"><a '.$class.' href="%s">%s</a></li>'."\n",
-                  stripDotSlashs("$(DOCROOT)/$dir/$base.html"), $calltoaction{$key};
-              } else {
-                warn "$WML_SRC_FILENAME has a [page $key] (parses to docdir: $(DOCROOT)/; dir: $dir; base: $base -> $(DOCROOT)/$dir/$lang/$base.wml), but that doesn't exist.";
-              }
-            }
-          }:>
-        </ul>
-      </div>
-      <!-- END CALLTOACTION -->
-  </div>
-  <!-- END HEADER -->
-
-#<ifneq "$(REDIRECT)" "" "Redirecting to <a href="$(DOCROOT)/$(REDIRECT)">$(DOCROOT)/$(REDIRECT)</a>.">
-#<ifneq "$(REDIRECT_GLOBAL)" "" "Redirecting to <a href="$(REDIRECT_GLOBAL)">$(REDIRECT_GLOBAL)</a>.">
diff --git a/include/keys.txt b/include/keys.txt
index 5bc5e83f..826467a5 100644
--- a/include/keys.txt
+++ b/include/keys.txt
@@ -6,17 +6,17 @@ Nicolas Vigier: 0x3E39CEABFC69F6F7
 Arthur Edelstein: 0xD752F538C0D38C3A
 
 [Tor source tarballs]
-Roger Dingledine: 0xEB5A896A28988BF5, 0xC218525819F78451
+Roger Dingledine: 0x28988BF5, 0x19F78451
 Nick Mathewson: 0xFE43009C4607B1FB, 0x6AFEE6D49E92B601(signing key)
 
 [older Tor tarballs]
-Nick Mathewson: 0x21194EBB165733EA, 0x910397D88D29319A(signing key)
+Nick Mathewson: 0x165733EA, 0x8D29319A(signing key)
 
 [deb.torproject.org repositories and archives]
 Tor Project Archive: 0xEE8CBC9E886DDD89
 
 [Arm releases]
-Damian Johnson: 0x0445B7AB9ABBEEC6
+Damian Johnson: 0x9ABBEEC6
 
 [Tails live system releases]
 The Tails team: 0xDBB802B258ACD84F
diff --git a/include/keys.wmi b/include/keys.wmi
index 566b51a5..c163717a 100644
--- a/include/keys.wmi
+++ b/include/keys.wmi
@@ -6,15 +6,15 @@ To learn how to verify signatures, see <a href="<page docs/signing-keys>">
 our manual</a>.
 </p>
 <p>
-As of 11/118 the signing keys we use are:
+As of 8/118 the signing keys we use are:
 </p>
 
 <ul>
 <li>The Tor Browser Developers (<a href='https://pgp.mit.edu/pks/lookup?search=0x4E2C6E8793298290&op=vindex&exact=on'>0x4E2C6E8793298290</a>), Mike Perry (<a href='https://pgp.mit.edu/pks/lookup?search=0x29846B3C683686CC&op=vindex&exact=on'>0x29846B3C683686CC</a>), Georg Koppen (<a href='https://pgp.mit.edu/pks/lookup?search=0xD1483FA6C3C07136&op=vindex&exact=on'>0xD1483FA6C3C07136</a>), Nicolas Vigier (<a href='https://pgp.mit.edu/pks/lookup?search=0x3E39CEABFC69F6F7&op=vindex&exact=on'>0x3E39CEABFC69F6F7</a>), Arthur Edelstein (<a href='https://pgp.mit.edu/pks/lookup?search=0xD752F538C0D38C3A&op=vindex&exact=on'>0xD752F538C0D38C3A</a>) sign <strong>Tor Browser releases</strong></li>
-<li>Roger Dingledine (<a href='https://pgp.mit.edu/pks/lookup?search=0xEB5A896A28988BF5&op=vindex&exact=on'>0xEB5A896A28988BF5</a> and <a href='https://pgp.mit.edu/pks/lookup?search=0xC218525819F78451&op=vindex&exact=on'>0xC218525819F78451</a>), Nick Mathewson (<a href='https://pgp.mit.edu/pks/lookup?search=0x21194EBB165733EA&op=vindex&exact=on'>0x21194EBB165733EA</a>) sign <strong>Tor source tarballs</strong></li>
-<li>Nick Mathewson (<a href='https://pgp.mit.edu/pks/lookup?search=0x21194EBB165733EA&op=vindex&exact=on'>0x21194EBB165733EA</a>) signed <strong>older Tor tarballs</strong></li>
+<li>Roger Dingledine (<a href='https://pgp.mit.edu/pks/lookup?search=0x28988BF5&op=vindex&exact=on'>0x28988BF5</a> and <a href='https://pgp.mit.edu/pks/lookup?search=0x19F78451&op=vindex&exact=on'>0x19F78451</a>), Nick Mathewson (<a href='https://pgp.mit.edu/pks/lookup?search=0x165733EA&op=vindex&exact=on'>0x165733EA</a>) sign <strong>Tor source tarballs</strong></li>
+<li>Nick Mathewson (<a href='https://pgp.mit.edu/pks/lookup?search=0x165733EA&op=vindex&exact=on'>0x165733EA</a>) signed <strong>older Tor tarballs</strong></li>
 <li>Tor Project Archive (<a href='https://pgp.mit.edu/pks/lookup?search=0xEE8CBC9E886DDD89&op=vindex&exact=on'>0xEE8CBC9E886DDD89</a>) signs <strong>deb.torproject.org repositories and archives</strong></li>
-<li>Damian Johnson (<a href='https://pgp.mit.edu/pks/lookup?search=0x0445B7AB9ABBEEC6&op=vindex&exact=on'>0x0445B7AB9ABBEEC6</a>) signs <strong>Arm releases</strong></li>
+<li>Damian Johnson (<a href='https://pgp.mit.edu/pks/lookup?search=0x9ABBEEC6&op=vindex&exact=on'>0x9ABBEEC6</a>) signs <strong>Arm releases</strong></li>
 <li>The Tails team (<a href='https://pgp.mit.edu/pks/lookup?search=0xDBB802B258ACD84F&op=vindex&exact=on'>0xDBB802B258ACD84F</a>) signs <strong>Tails live system releases</strong></li>
 <li>David Goulet (<a href='https://pgp.mit.edu/pks/lookup?search=0x42E86A2A11F48D36&op=vindex&exact=on'>0x42E86A2A11F48D36</a>) signs <strong>Torsocks releases</strong></li>
 <li>Sukhbir Singh (<a href='https://pgp.mit.edu/pks/lookup?search=0xB01C8B006DA77FAA&op=vindex&exact=on'>0xB01C8B006DA77FAA</a>) signs <strong>TorBirdy releases</strong></li>
@@ -37,6 +37,10 @@ uid                   [ unknown] Mike Perry <mikeperry#endarken.info>
 uid                   [ unknown] Mike Perry <mikeperry#unencrypted.info>
 uid                   [ unknown] Mike Perry (Regular use key) <mikeperry#fscked.org>
 uid                   [ unknown] Mike Perry (Regular use key) <mikeperry#torproject.org>
+sub   rsa4096/0x004AD1045BA0FE28 2017-10-31 [S] [expires: 2018-10-31]
+      Key fingerprint = 7AB6 A050 C544 CB16 60A9  F1E9 004A D104 5BA0 FE28
+sub   rsa4096/0xEEC50E9938F9F4E9 2017-10-31 [E] [expires: 2018-10-31]
+      Key fingerprint = B403 E911 BA38 63DB ED82  C57C EEC5 0E99 38F9 F4E9
 
 pub   rsa4096/0x4E2C6E8793298290 2014-12-15 [C] [expires: 2020-08-24]
       Key fingerprint = EF6E 286D DA85 EA2A 4BA7  DE68 4E2C 6E87 9329 8290
@@ -70,6 +74,10 @@ uid                   [ unknown] Roger Dingledine <arma#mit.edu>
 sub   elg2048/0x147FF421788AFDCE 2000-02-27 [E]
       Key fingerprint = 08E6 A5BD CF81 D0A3 1BDE  9474 147F F421 788A FDCE
 
+pub   rsa1024/0x9C01813428988BF5 2014-06-16 [SCEA] [revoked: 2016-08-16]
+      Key fingerprint = 2629 5471 A26A B9F9 6C0C  45BB 9C01 8134 2898 8BF5
+uid                   [ revoked] Roger Dingledine <arma#mit.edu>
+
 pub   rsa4096/0xC218525819F78451 2010-05-07 [SC]
       Key fingerprint = F65C E37F 04BA 5B36 0AE6  EE17 C218 5258 19F7 8451
 uid                   [ unknown] Roger Dingledine <arma#mit.edu>
@@ -78,6 +86,14 @@ uid                   [ unknown] Roger Dingledine <arma#torproject.org>
 sub   rsa4096/0x1A61312B4600E8BE 2018-06-03 [E] [expires: 2019-06-03]
       Key fingerprint = 6C8F F7D9 F789 52A1 8986  52B7 1A61 312B 4600 E8BE
 
+pub   rsa4096/0x468FAE2919F78451 2014-06-16 [SCEA] [revoked: 2016-08-16]
+      Key fingerprint = 9C95 0D05 FC80 2DFA 79C3  7629 468F AE29 19F7 8451
+uid                   [ revoked] Roger Dingledine <arma#mit.edu>
+
+pub   rsa1024/0xD50624EC165733EA 2014-06-16 [SCEA] [revoked: 2016-08-16]
+      Key fingerprint = 33DC 81DC C099 4E0A 10D8  048B D506 24EC 1657 33EA
+uid                   [ revoked] Nick Mathewson <nickm#alum.mit.edu>
+
 pub   rsa3072/0x21194EBB165733EA 2004-07-03 [SC]
       Key fingerprint = B35B F85B F194 89D0 4E28  C33C 2119 4EBB 1657 33EA
 uid                   [ unknown] Nick Mathewson <nickm#alum.mit.edu>
@@ -103,6 +119,10 @@ sub   rsa3072/0xD2CA27F3F25B8E5E 2004-07-03 [E]
 </pre>
 <h3>older Tor tarballs</h3>
 <pre>
+pub   rsa1024/0xD50624EC165733EA 2014-06-16 [SCEA] [revoked: 2016-08-16]
+      Key fingerprint = 33DC 81DC C099 4E0A 10D8  048B D506 24EC 1657 33EA
+uid                   [ revoked] Nick Mathewson <nickm#alum.mit.edu>
+
 pub   rsa3072/0x21194EBB165733EA 2004-07-03 [SC]
       Key fingerprint = B35B F85B F194 89D0 4E28  C33C 2119 4EBB 1657 33EA
 uid                   [ unknown] Nick Mathewson <nickm#alum.mit.edu>
@@ -137,6 +157,10 @@ sub   rsa2048/0x74A941BA219EC810 2009-09-04 [S] [expires: 2020-11-23]
 </pre>
 <h3>Arm releases</h3>
 <pre>
+pub   rsa1024/0xF94ABB509ABBEEC6 2014-06-16 [SCEA] [revoked: 2016-08-16]
+      Key fingerprint = D8AA CF11 9067 89E8 91DD  2C27 F94A BB50 9ABB EEC6
+uid                   [ revoked] Damian Johnson (www.atagar.com) <atagar1#gmail.com>
+
 pub   dsa1024/0x0445B7AB9ABBEEC6 2009-06-17 [SC]
       Key fingerprint = 6827 8CC5 DD2D 1E85 C4E4  5AD9 0445 B7AB 9ABB EEC6
 uid                   [ unknown] Damian Johnson (www.atagar.com) <atagar1#gmail.com>
diff --git a/include/versions.wmi b/include/versions.wmi
index 6e850301..154041f6 100644
--- a/include/versions.wmi
+++ b/include/versions.wmi
@@ -1,12 +1,12 @@
-<define-tag version-stable whitespace=delete>0.3.5.7</define-tag>
-<define-tag version-alpha whitespace=delete>0.3.5.7</define-tag>
+<define-tag version-stable whitespace=delete>0.3.4.9</define-tag>
+<define-tag version-alpha whitespace=delete>0.3.5.3-alpha</define-tag>
 
 <define-tag version-torbrowserdevelopbranch whitespace=delete>maint-7.5</define-tag>
 
 # *** tor browser stable ***
-<define-tag version-torbrowserbundle-all whitespace=delete>8.0.4</define-tag>
-<define-tag releasedate-torbrowserbundle-all whitespace=delete>2018-11-17</define-tag>
-<define-tag version-win32-stable whitespace=delete>0.3.4.9</define-tag>
+<define-tag version-torbrowserbundle-all whitespace=delete>8.0.3</define-tag>
+<define-tag releasedate-torbrowserbundle-all whitespace=delete>2018-10-23</define-tag>
+<define-tag version-win32-stable whitespace=delete>0.3.4.8</define-tag>
 
 # If all platforms are on the same version, you only need to update
 # version-torbrowserbundle-all and releasedate-torbrowserbundle-all
@@ -26,8 +26,8 @@
 <define-tag package-win32-stable whitespace=delete>../dist/torbrowser/<version-torbrowserbundle>/tor-win32-<version-win32-stable>.zip</define-tag>
 
 # *** tor browser beta/alpha ***
-<define-tag version-torbrowserbundlebeta-all whitespace=delete>8.5a6</define-tag>
-<define-tag releasedate-torbrowserbundlebeta-all whitespace=delete>2018-12-11</define-tag>
+<define-tag version-torbrowserbundlebeta-all whitespace=delete>8.5a4</define-tag>
+<define-tag releasedate-torbrowserbundlebeta-all whitespace=delete>2018-10-23</define-tag>
 
 # If all platforms are on the same version, you only need to update
 # version-torbrowserbundlebeta-all and releasedate-torbrowserbundlebeta-all
@@ -41,10 +41,12 @@
 <let releasedate-torbrowserbundlelinux64beta=releasedate-torbrowserbundlebeta-all />
 <let version-torbrowserbundleosx64beta=version-torbrowserbundlebeta-all />
 <let releasedate-torbrowserbundleosx64beta=releasedate-torbrowserbundlebeta-all />
-<let version-torbrowserbundleandroidbeta=version-torbrowserbundlebeta-all />
-<let releasedate-torbrowserbundleandroidbeta=releasedate-torbrowserbundlebeta-all />
 
 <define-tag file-source-stable whitespace=delete>tor-<version-stable>.tar.gz</define-tag>
 <define-tag package-source-stable whitespace=delete>../dist/<file-source-stable></define-tag>
 <define-tag file-source-alpha whitespace=delete>tor-<version-alpha>.tar.gz</define-tag>
 <define-tag package-source-alpha whitespace=delete>../dist/<file-source-alpha></define-tag>
+
+# *** tor browser android ***
+<define-tag version-torbrowserbundleandroid whitespace=delete>1.0a3</define-tag>
+<define-tag releasedate-torbrowserbundleandroid whitespace=delete>2018-10-31</define-tag>
diff --git a/keys/alsmith.txt b/keys/alsmith.txt
deleted file mode 100644
index 8106f607..00000000
--- a/keys/alsmith.txt
+++ /dev/null
@@ -1,50 +0,0 @@
------BEGIN PGP PUBLIC KEY BLOCK-----
-
-mQENBFuqwcsBCADMU2weDU13YomrV6mzaLvccjqnA5FBVr+YnsbA5t8O773LvyFm
-05RiV0NY0AagUwsnjg+UD9U44BVBgCP3CeXjHXKGd43o2AiYS7EFIoPUlhqebfHg
-8gnMqCgchCdXNqtn6amt0M1h0PBID2X00l4vEaAhNf4i3eOFT+xSiLhtdOgEv0kH
-8e1IYU4X2heIcCC5DdO/zddrf+hb9MiFywJJc8bAY6UXTCCt387IaYJ+393Ho7M8
-0lunr2EZ4QpMNeHRNx9dwpusgzPgQ4TXxMjxpUR2qrBUGTh0kW/yQ7+cQ8x7SEs8
-twoX+JfnpwXWgZz8ppqBDg6fajv2wv/tmw/3ABEBAAG0H0FsIFNtaXRoIDxhbHNt
-aXRodG9yQGdtYWlsLmNvbT6JAVQEEwEIAD4WIQQf7XAOYea70AD1EVdGMGH/FzOt
-bQUCW6rBzQIbAwUJAeEzgAULCQgHAgYVCgkICwIEFgIDAQIeAQIXgAAKCRBGMGH/
-FzOtbfPRB/sENGXTzXoguHLpHrHe6tH4MEscdvpdlAuamt++c2vyqJi2cyzNjT2q
-BGXa2Fp6TDl1gI/0PSP7oq61uJpckDuKGzSbufoR9wSMgRaAvGcYcga3SBli0f9g
-e8Q10j5MeOu9SeKeNZywSu38v5CmvSwU4r9Fq7GFKZZeLusfvJVXCmDn1B6rx0mi
-CBBeIBwx4fmpBtART25aFTK8PcuxpjaDnEYXEK4RqQbWVJUTldZ1YOCk/nT44k/L
-IJlqw05A5wg2vB3RHULvPKv2uiVgWynHHN0dEnvf/IDolBKWbecYcJHM8vudr2wb
-aHuLVar183oitF/7bHwfYKOCUzYjJiNViQIzBBMBCgAdFiEEu0seOrlsP80Egong
-GpH0m6eDAL0FAluqyx8ACgkQGpH0m6eDAL2m7w//Qc7u+woEVqJPyICgwDc/10hi
-VfrMY/xUV8sH+RofQaoAg/PO4AUGhQ9qZ+7rYsyfPzepT/hxFGmrAouJEVrtrZTx
-T/mHA1+naBZXvxxa2a2HYg4q3Q+hLU9VRwvNsIE6HEmNwei00aaxHZ8GOhG50eZ1
-F20fQRJv8Sm6NadQJuVis4Om9OQILk5iw4LAWVBJwW5QwveoDyYLLQ7ymFUWoZ6m
-CJjh8D7ZqfeRHuDgNjDjKUQAUTl2kTPc+BClND5fJBPCK5L0GrR0XLqFo27Qqi9M
-AVR9DZMZdgeXpy7D+Le97buzxPJljLyJkpt7OBYhMhds+/yrJ39UqApKUMkZ7GMM
-MfsjxdqJZt6KCyKlQLVP14rdO7C5wPdM7025tMxFF4+eYXN6j21JXhXo8G7ICH32
-JeIHPr+J47cbPYuhqabDWW9tg/b8MACdVK3HIh5nNfKmFZxFqO/HMO7l3EsZ3M21
-50Smkv5Rzp/a5e2q/mYjvTQxgK5JQbJS1kbAeeuXqJmnRAb4ww/CNdoU9iKtw4SG
-+59PS4Ya4FlrXqNl+FDCvQX5rvRlDq7ruVXMcW56A28NU1k49I2ZemTDf90AaGlL
-Z2P7SCIMR/C/BlcFdStqbPNf2zzLtLClhI6kogItKr0NWoHxsicrraElEBRrtBaF
-jcgxhEAtLd1AQYvS3EG0H0FsIFNtaXRoIDxzbWl0aEB0b3Jwcm9qZWN0Lm9yZz6J
-AVQEEwEIAD4WIQQf7XAOYea70AD1EVdGMGH/FzOtbQUCW763uwIbAwUJAeEzgAUL
-CQgHAgYVCgkICwIEFgIDAQIeAQIXgAAKCRBGMGH/FzOtbT+lCACUBIKF9E+iPUss
-pXjXf9WDthAED+pHL+/kr+b3GuOIzepVJGycyMwzS0eM2FQI6/Dhjff0NERLbp0P
-QF5ga21aQ/R02ykWoWX27u2Vcd4VZo9Iw9taCeMX5QRMNS+PaXiNFZ8+PpRowJAS
-MGkkETjJrOS5GhQoAUtfbDBsCDKwsWf+nAOxYStMZz0ZAp34ZnjBL1cuxH/EIgYh
-625DuqVFMWXrU7pTWVkNtia0YP7UuZ+rYTXOuyuuN71PhE1tSRXzMbycpysozY//
-Ydw+ooRl49w6U2N/dqZBfcCneXS8hS0EW5U4HBdEwbo53z32aOkyZMN5aQHk+eT/
-3vPHtqbAuQENBFuqwc0BCADXYl2Ut1qkVj5l2wRWqVhisY+/tzI0JNiRjZtNOygo
-gB/a8ti/Eg4E7Hz+ukH+0G/rsDCJvgKSYWgy8UkVxo5gyOR4KASht3omrhbteHZP
-URYtOBsqPt7Fno4yxhBzD4o7wOcpzG5Mnh4FF3AbDPdgjKACetJniEJSNY7ZmrVD
-JK4vULduaQOBXqE3zvXkPppPq5rprsXqGoUA0YR7sfBx5SAiJ9RORoOU+GK3PQlO
-WR3Yq2nrCBF4l4E3BXFqFv5aIhvEUKcTsag2+UPLloiD3l9kEd32qxvHk1SRHSy8
-V2YgH/M5xqrdPZNpw3oIXsjeZFUL2MwImbXUfW85S2MlABEBAAGJATwEGAEIACYW
-IQQf7XAOYea70AD1EVdGMGH/FzOtbQUCW6rBzQIbDAUJAeEzgAAKCRBGMGH/FzOt
-bf00B/9HU3PLzBpxa229KeBPimvuWQV49O0QOfNGDV63W64zUFG78J61KOiOPa8I
-GrThtyAt2giFEc4VhfGiJif+9U7wKvnv3kQbaUgkJnYA0dhVQptuzDQ5NagczJ80
-0ZmzM5TzXHbkzecuXT3yhsBSN2KVB2XZxLPmNaUhSre1u693Xoni5KtUJQfoRGEL
-x/ePa1LDnZ19um5pS0hpb1MT5/scYrtOmYjKpX9dzkWXzMGbmM3b84NLAhx+7AHp
-pO1aj0RSlcScfLWcwKqeYQq+n/46Xq8M60E0a8L+5x0Bb+VF5V5FolhiVLwI1IlM
-8nK+F92i0cBCZ3MlPrw+9s2g0DLI
-=uC0p
------END PGP PUBLIC KEY BLOCK-----
diff --git a/press/en/press.wml b/press/en/press.wml
index 8463a550..f841fc90 100644
--- a/press/en/press.wml
+++ b/press/en/press.wml
@@ -51,1684 +51,1297 @@ some of the significant Tor-related stories that have popped up.</p>
 </thead>
 
 <tr>
-<td>2019 Jan 11</td>
-<td>TechCrunch</td>
-<td><a href='https://techcrunch.com/2019/01/11/tor-lessens-reliance-us-grants/'>
-Tor pulls in record donations as it lessens reliance on US government grants</a></td>
-</tr>
-
-<tr>
-<td>2019 Jan 01</td>
-<td>Wired</td>
-<td><a href='https://www.wired.com/story/tor-anonymity-easier-than-ever/'>
-Tor Is Easier Than Ever. Time to Give It a Try</a></td>
-</tr>
-
-<tr>
-<td>2018 Dec 18</td>
-<td>BoingBoing</td>
-<td><a href='https://boingboing.net/2018/12/18/charitablegivinguide.html'>
-Charitable Giving Guide 2018</a></td>
-</tr>
-
-<tr>
-<td>2018 Dec 10</td>
-<td>ZDNet</td>
-<td><a href='https://www.zdnet.com/article/half-of-the-tor-projects-funding-now-comes-from-the-private-sector/'>
-Half of the Tor Project's funding now comes from the private sector</a></td>
+<td>2018 July 09</td>
+<td>Tech Republic</td>
+<td><a href="https://www.techrepublic.com/article/5-ways-to-protect-your-privacy/">Top 5: Ways to protect your privacy</a></td>
 </tr>
 
 <tr>
-<td>2018 Dec 10</td>
+<td>2018 July 17</td>
 <td>CyberScoop</td>
-<td><a href='https://www.cyberscoop.com/tor-funding-isabela-bagueros-december-2018/'>
-"With new director, Tor seeks new funding sources and international growth"</a></td>
+<td><a href="https://www.cyberscoop.com/domain-fronting-ban-letter-ron-wyden-marco-rubio-amazon-google/">Lawmakers call on Amazon and Google to reconsider ban on domain fronting</a></td>
 </tr>
 
 <tr>
-<td>2018 Nov 02</td>
+<td>2018 July 23</td>
 <td>Motherboard</td>
-<td><a href='https://motherboard.vice.com/en_us/article/zm9jd4/old-school-sniffing-attacks-can-still-reveal-your-browsing-history'>
-Old School 'Sniffing' Attacks Can Still Reveal Your Browsing History</a></td>
+<td><a href=" https://motherboard.vice.com/en_us/article/wjkjzm/what-went-wrong-at-the-hope-hacking-conference">What Went Wrong at the HOPE Hacking Conference?</a></td>
 </tr>
 
 <tr>
-<td>2018 Oct 24</td>
-<td>TechCrunch</td>
-<td><a href='https://techcrunch.com/2018/10/24/mozilla-tor-project/'>
-Mozilla is matching all donations to the Tor Project</a></td>
+<td>2018 September 05</td>
+<td>ghacks.net</td>
+<td><a href="https://www.ghacks.net/2018/09/05/tor-browser-8-0-is-a-big-update">Tor Browser 8.0 is a big update</a></td>
 </tr>
 
 <tr>
-<td>2018 Oct 23</td>
+<td>2018 September 06</td>
 <td>ZDNet</td>
-<td><a href='https://www.zdnet.com/article/advertisers-can-track-users-across-the-internet-via-tls-session-resumption/'>
-Only seven of 45 browsers block TLS Session Resumption tracking</a></td>
-</tr>
-
-<tr>
-<td>2018 Oct 09</td>
-<td>Fossbytes</td>
-<td><a href='https://fossbytes.com/best-google-chrome-alternatives-most-private-web-browsers/'>
-10 Best Google Chrome Alternatives</a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 16</td>
-<td>Popular Science</td>
-<td><a href='https://www.popsci.com/alternative-phone-browsers'>
-Ditch your phone's built-in web browser for these seven alternatives</a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 14</td>
-<td>Lifehacker Australia</td>
-<td><a href='https://www.lifehacker.com.au/2018/09/what-is-the-tor-browser/'>
-What You Need to Know About Tor Browser </a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 10</td>
-<td>Version2</td>
-<td><a href="https://www.version2.dk/artikel/anonym-tor-browser-naesten-klar-android-1086176">
-Anonym Tor Browser er - nÌ_sten - klar til Android</a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 10</td>
-<td>ThreatPost</td>
-<td><a href="https://threatpost.com/tor-brings-onion-browser-to-android-devices/137325/">
-Tor Brings Browser to Android Devices</a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 08</td>
-<td>Gizmodo</td>
-<td><a href="http://www.gizmodo.co.uk/2018/09/the-tor-web-browser-officially-lands-on-android-in-alpha/">
-The Tor Web Browser Officially Lands on Android in Alpha</a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 07</td>
-<td>TechCrunch</td>
-<td><a href='https://techcrunch.com/2018/09/07/tor-project-launches-official-mobile-browser-for-android/'>
-Tor Project launches official mobile browser for Android </a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 07</td>
-<td>CyberScoop</td>
-<td><a href="https://www.cyberscoop.com/adware-doctor-mac-os-china/">
-Tor launches official anonymous Android browser</a></td>
+<td><a href="https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/">Tor Browser gets a redesign</a></td>
 </tr>
 
 <tr>
-<td>2018 Sep 07</td>
+<td>2018 September 05</td>
 <td>VentureBeat</td>
-<td><a href="https://venturebeat.com/2018/09/07/tor-gets-its-first-official-mobile-browser/">
-Tor gets its first official mobile browser</a></td>
+<td><a href="https://fossbytes.com/tor-browser-8-0-released-features-download/">Tor Browser 8.0 arrives with new user onboarding,https://venturebeat.com/2018/09/05/tor-browser-8-0-arrives-with-new-user-onboarding-improved-bridge-fetching-and-better-language-support/ 9/6/18,FossBytes,Tor Browser 8.0 Released: New Onboarding Experience & Optimized Bridge Fetching</a></td>
 </tr>
 
 <tr>
-<td>2018 Sep 06</td>
-<td>ZDNet</td>
-<td><a href="https://www.zdnet.com/article/tor-browser-gets-a-redesign-switches-to-new-firefox-quantum-engine/">
-Tor Browser gets a redesign</a></td>
+<td>2018 September 07</td>
+<td>VentureBeat</td>
+<td><a href="https://venturebeat.com/2018/09/07/tor-gets-its-first-official-mobile-browser/">Tor gets its first official mobile browser</a></td>
 </tr>
 
 <tr>
-<td>2018 Sep 05</td>
+<td>2018 September 05</td>
 <td>Irish Times </td>
-<td><a href="https://www.irishtimes.com/business/technology/chrome-lost-its-shine-five-alternative-browsers-to-try-1.3619083">
-Chrome lost its shine? Five alternative browsers to try</a></td>
-</tr>
-
-<tr>
-<td>2018 Sep 05</td>
-<td>VentureBeat</td>
-<td><a href="https://venturebeat.com/2018/09/05/tor-browser-8-0-arrives-with-new-user-onboarding-improved-bridge-fetching-and-better-language-support/">
-Tor Browser 8.0 Released: New Onboarding Experience & Optimized Bridge Fetching
-</a></td>
+<td><a href="https://www.irishtimes.com/business/technology/chrome-lost-its-shine-five-alternative-browsers-to-try-1.3619083">Chrome lost its shine? Five alternative browsers to try</a></td>
 </tr>
 
 <tr>
-<td>2018 Sep 05</td>
-<td>Ghacks</td>
-<td><a href="https://www.ghacks.net/2018/09/05/tor-browser-8-0-is-a-big-update">Tor Browser 8.0 is a big update</a></td>
+<td>2018 September 07</td>
+<td>CyberScoop</td>
+<td><a href="https://www.cyberscoop.com/adware-doctor-mac-os-china/">Tor launches official anonymous Android browser</a></td>
 </tr>
 
 <tr>
-<td>2018 Jul 23</td>
-<td>Motherboard</td>
-<td><a href=" https://motherboard.vice.com/en_us/article/wjkjzm/what-went-wrong-at-the-hope-hacking-conference">What Went Wrong at the HOPE Hacking Conference?</a></td>
+<td>2018 September 08</td>
+<td>Gizmodo</td>
+<td><a href="http://www.gizmodo.co.uk/2018/09/the-tor-web-browser-officially-lands-on-android-in-alpha/">The Tor Web Browser Officially Lands on Android in Alpha</a></td>
 </tr>
 
 <tr>
-<td>2018 Jul 17</td>
-<td>CyberScoop</td>
-<td><a href="https://www.cyberscoop.com/domain-fronting-ban-letter-ron-wyden-marco-rubio-amazon-google/">Lawmakers call on Amazon and Google to reconsider ban on domain fronting</a></td>
+<td>2018 September 10</td>
+<td>Version2</td>
+<td><a href="https://www.version2.dk/artikel/anonym-tor-browser-naesten-klar-android-1086176">Anonym Tor Browser er - nÌ_sten - klar til Android</a></td>
 </tr>
 
 <tr>
-<td>2018 Jul 09</td>
-<td>Tech Republic</td>
-<td><a href="https://www.techrepublic.com/article/5-ways-to-protect-your-privacy/">
-Top 5: Ways to protect your privacy</a></td>
+<td>2018 September 10</td>
+<td>ThreatPost</td>
+<td><a href="https://threatpost.com/tor-brings-onion-browser-to-android-devices/137325/">Tor Brings Browser to Android Devices</a></td>
 </tr>
 
 <tr>
-<td>2018 Jul 02</td>
+<td>2018 July 02</td>
 <td>Mada Masr</td>
-<td><a href="https://www.madamasr.com/en/2018/07/02/news/u/report-internet-censorship-has-become-more-pervasive-in-past-year-62-of-blocked-websites-are-media-outlets/">Report:
+<td><a
+href="https://www.madamasr.com/en/2018/07/02/news/u/report-internet-censorship-has-become-more-pervasive-in-past-year-62-of-blocked-websites-are-media-outlets/">Report:
 Internet censorship has become a "more pervasiveâ" in past year</a></td>
 </tr>
 
 <tr>
-<td>2018 Jun 28</td>
+<td>2018 June 28</td>
 <td>CNET</td>
 <td><a href="https://www.cnet.com/news/brave-advances-browser-privacy-with-tor-powered-tabs/">Brave
 advances browser privacy with Tor-powered tabs</a></td>
 </tr>
 
 <tr>
-<td>2018 Jun 27</td>
+<td>2018 June 27</td>
 <td>ZDNet</td>
 <td><a href="https://www.zdnet.com/article/venezuela-ramps-up-censorship-with-tor-ban/">Venezuela ramps
 up censorship</a></td>
 </tr>
 
 <tr>
-<td>2018 Jun 26</td>
+<td>2018 June 26</td>
 <td>VICE</td>
-<td><a href="https://news.vice.com/en_us/article/59qvwz/venezuela-maduro-tor-network-censorship">Venezuela just
+<td><a
+href="https://news.vice.com/en_us/article/59qvwz/venezuela-maduro-tor-network-censorship">Venezuela just
 took a huge step towards controlling all access to the Internet</a></td>
 </tr>
 
 <tr>
-<td>2018 Jun 18</td>
-<td>FossBytes</td>
-<td><a href="https://fossbytes.com/tor-browser-8-0-released-features-download/">
-Tor Browser 8.0 arrives with new user onboarding,
-</a></td>
-</tr>
-
-<tr>
 <td>2018 May 30</td>
 <td>ZDNet</td>
-<td><a href="https://www.zdnet.com/article/technology-that-changed-us-the-2000s/">
-Technology that changed us: The 2000s, from iPhone to Twitter</a></td>
+<td><a href="https://www.zdnet.com/article/technology-that-changed-us-the-2000s/">Technology that changed us: The 2000s, from iPhone to Twitter</a></td>
 </tr>
 
 <tr>
 <td>2018 May 10</td>
 <td>CBC</td>
-<td><a href="http://www.cbc.ca/news/technology/ooni-tor-information-controls-measurement-censorship-iran-1.4653523">
-When governments censor websites and block messaging apps like Telegram, here's where to turn for proof</a></td>
+<td><a href="http://www.cbc.ca/news/technology/ooni-tor-information-controls-measurement-censorship-iran-1.4653523">When governments censor websites and block messaging apps like Telegram, here's where to turn for proof</a></td>
 </tr>
 
 <tr>
 <td>2018 May 8</td>
 <td>TechLector</td>
-<td><a href="https://techlector.com/tor-project-will-transfer-to-azure-to-continue-offering-domain-fronting/">
-Tor Project will transfer to Azure to continue offering domain fronting</a></td>
+<td><a href="https://techlector.com/tor-project-will-transfer-to-azure-to-continue-offering-domain-fronting/">Tor Project will transfer to Azure to continue offering domain fronting</a></td>
 </tr>
 
 <tr>
 <td>2018 May 7</td>
 <td>TechRadar</td>
-<td><a href="https://www.techradar.com/how-to/how-to-become-anonymous-online">
-How to become anonymous online</a></td>
+<td><a href="https://www.techradar.com/how-to/how-to-become-anonymous-online">How to become anonymous online</a></td>
 </tr>
 
 <tr>
 <td>2018 May 4</td>
 <td>Dark Web news</td>
-<td><a href="https://darkwebnews.com/anonymity-tools/tor/new-tor-executive-director/">
-New Tor Project Executive Director</a></td>
+<td><a href="https://darkwebnews.com/anonymity-tools/tor/new-tor-executive-director/">New Tor Project Executive Director</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 20</td>
 <td>TechDirt</td>
-<td><a href="https://www.techdirt.com/articles/20180419/16184539674/bad-decisions-google-screws-over-tools-evading-internet-censorship-regimes.shtml">
-Tools Evading Internet Censorship Regimes</a></td>
+<td><a href="https://www.techdirt.com/articles/20180419/16184539674/bad-decisions-google-screws-over-tools-evading-internet-censorship-regimes.shtml">Tools Evading Internet Censorship Regimes</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 19</td>
 <td>Version2</td>
-<td><a href="https://www.version2.dk/artikel/dansk-tor-udvikler-saadan-vil-vi-goere-lettere-at-vaere-anonym-paa-mobilen-1084911">
-Dansk Tor-udvikler: SÌ´dan vil vi gÌüre det lettere at vÌ_re anonym pÌ´ mobilen</a></td>
+<td><a href="https://www.version2.dk/artikel/dansk-tor-udvikler-saadan-vil-vi-goere-lettere-at-vaere-anonym-paa-mobilen-1084911">Dansk Tor-udvikler: SÌ´dan vil vi gÌüre det lettere at vÌ_re anonym pÌ´ mobilen</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 13</td>
 <td>Le Mondes</td>
-<td><a href="http://www.lemonde.fr/pixels/article/2018/04/13/comment-facebook-piste-les-internautes-qui-ne-sont-pas-sur-le-reseau-social_5285079_4408996.html">
-Comment Facebook piste les internautes qui ne sont pas sur le reseau sociale</a></td>
+<td><a href="http://www.lemonde.fr/pixels/article/2018/04/13/comment-facebook-piste-les-internautes-qui-ne-sont-pas-sur-le-reseau-social_5285079_4408996.html">Comment Facebook piste les internautes qui ne sont pas sur le reseau sociale</a></td>
 </tr>
 
 <tr>
 <td>2018 Apr 2</td>
 <td>Digital Trends</td>
-<td><a href="https://www.digitaltrends.com/home/alexa-voice-charity-donation/">
-Raise your voice for a good cause</a></td>
+<td><a href="https://www.digitaltrends.com/home/alexa-voice-charity-donation/">Raise your voice for a good cause</a></td>
 </tr>
 
 <tr>
 <td>2018 Mar 19</td>
 <td>Mozilla</td>
-<td><a href="https://medium.com/read-write-participate/welcoming-11-new-partners-in-the-quest-for-internet-health-843c8d1b2bf9">
-11 New Partners in Quest for Internet Health</a></td>
+<td><a href="https://medium.com/read-write-participate/welcoming-11-new-partners-in-the-quest-for-internet-health-843c8d1b2bf9">11 New Partners in Quest for Internet Health</a></td>
 </tr>
 
 <tr>
 <td>2018 Mar 15</td>
 <td>Tom's Hardware</td>
-<td><a href="https://www.tomshardware.com/news/turkey-blocks-protonmail-encrypted-email,36675.html">
-Turkey Blocks ProtonMail E2E Encrypted Email Service</a></td>
+<td><a href="https://www.tomshardware.com/news/turkey-blocks-protonmail-encrypted-email,36675.html">Turkey Blocks ProtonMail E2E Encrypted Email Service</a></td>
 </tr>
 
 <tr>
 <td>2018 Mar 13</td>
 <td>The Daily Dot</td>
-<td><a href="https://www.dailydot.com/layer8/internet-shutdowns/">
-The slow creep of internet shutdowns</a></td>
+<td><a href="https://www.dailydot.com/layer8/internet-shutdowns/">The slow creep of internet shutdowns</a></td>
 </tr>
 
 <tr>
 <td>2018 Feb 22</td>
 <td>CyberScoop</td>
-<td><a href="https://www.cyberscoop.com/shari-steele-tor-director-resigns">
-Tor executive director Shari Steele to step down</a></td>
+<td><a href="https://www.cyberscoop.com/shari-steele-tor-director-resigns">Tor executive director Shari Steele to step down</a></td>
 </tr>
 
 <tr>
 <td>2018 Feb 22</td>
 <td>The Verge</td>
-<td><a href="https://www.theverge.com/2018/2/22/17042544/tor-director-shari-steele-steps-down">
-Tor director Shari Steele steps down</a></td>
+<td><a href="https://www.theverge.com/2018/2/22/17042544/tor-director-shari-steele-steps-down">Tor director Shari Steele steps down</a></td>
 </tr>
 
 <tr>
 <td>2018 Feb 3</td>
 <td>WIRED</td>
-<td><a href="http://www.wired.co.uk/article/sex-toy-bluetooth-hacks-security-fix">
-Tor could be the answer to safer connected sex</a></td>
+<td><a href="http://www.wired.co.uk/article/sex-toy-bluetooth-hacks-security-fix">Tor could be the answer to safer connected sex</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 25</td>
 <td>International Business Times</td>
-<td><a href="http://www.ibtimes.com/tor-browser-75-update-released-whats-new-2645166">
-Tor Browser 7.5 Update Released: What's New?</a></td>
+<td><a href="http://www.ibtimes.com/tor-browser-75-update-released-whats-new-2645166">Tor Browser 7.5 Update Released: What's New?</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 24</td>
 <td>Tom's Hardware</td>
-<td><a href="http://www.tomshardware.com/news/tor-7.5-next-gen-onion-services,36397.html">
-Tor Browser 7.5 Launches With Support For Next-Gen Onion Services</a></td>
+<td><a href="http://www.tomshardware.com/news/tor-7.5-next-gen-onion-services,36397.html">Tor Browser 7.5 Launches With Support For Next-Gen Onion Services</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 2</td>
 <td>Sky News</td>
-<td><a href="https://news.sky.com/story/google-faces-calls-to-lift-anti-censorship-blocks-in-iran-11192888">
-The number of Iranians using Tor has surged to over 10,000</a></td>
+<td><a href="https://news.sky.com/story/google-faces-calls-to-lift-anti-censorship-blocks-in-iran-11192888">The number of Iranians using Tor has surged to over 10,000</a></td>
 </tr>
 
 <tr>
 <td>2018 Jan 2</td>
 <td>Sky News</td>
-<td><a href="https://news.sky.com/story/iranian-web-crackdown-drives-surge-in-privacy-technology-11191740">
-Iranian web crackdown drives surge in privacy technology</a></td>
+<td><a href="https://news.sky.com/story/iranian-web-crackdown-drives-surge-in-privacy-technology-11191740">Iranian web crackdown drives surge in privacy technology</a></td>
 </tr>
 
 <tr>
 <td>2017 Dec 10</td>
 <td>BoingBoing</td>
-<td><a href="https://boingboing.net/2017/12/10/charitable-giving-guide-2017.html">
-Charitable Giving Guide 2017</a></td>
+<td><a href="https://boingboing.net/2017/12/10/charitable-giving-guide-2017.html">Charitable Giving Guide 2017</a></td>
 </tr>
 
 <tr>
 <td>2017 Dec 9</td>
 <td>WIRED</td>
-<td><a href="https://www.wired.com/story/the-grand-tor">
-The Grand Tor: How to Go Anonymous Online</a></td>
+<td><a href="https://www.wired.com/story/the-grand-tor">The Grand Tor: How to Go Anonymous Online</a></td>
 </tr>
 
 <tr>
 <td>2017 Nov 20</td>
 <td>Bleeping Computer</td>
-<td><a href="https://www.bleepingcomputer.com/news/software/another-tor-browser-feature-makes-it-into-firefox-first-party-isolation/">
-Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation</a></td>
+<td><a href="https://www.bleepingcomputer.com/news/software/another-tor-browser-feature-makes-it-into-firefox-first-party-isolation/">Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation</a></td>
 </tr>
 
 <tr>
 <td>2017 Nov 15</td>
 <td>Motherboard</td>
-<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">
-The Motherboard Guide to Not Getting Hacked</a></td>
+<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">The Motherboard Guide to Not Getting Hacked</a></td>
 </tr>
 
 <tr>
 <td>2017 Oct 30</td>
 <td>NakedSecurity</td>
-<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">
-Firefox takes a bite out of the canvas 'super cookie'</a></td>
+<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">Firefox takes a bite out of the canvas 'super cookie'</a></td>
 </tr>
 
 <tr>
 <td>2017 Oct 30</td>
 <td>BleepingComputer</td>
-<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">
-Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
+<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
 </tr>
 
 <tr>
 <td>2017 Oct 27</td>
 <td>NYTimes</td>
-<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">
-The New York Times is Now Available as a Tor Onion Service</a></td>
+<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">The New York Times is Now Available as a Tor Onion Service</a></td>
 </tr>
 
 <tr>
 <td>2017 Sep 7</td>
 <td>Threatpost</td>
-<td><a href="https://threatpost.com/tor-project-brings-security-slider-feature-to-android-app-orfox/127849/">
-Tor Project Brings Security Slider Feature to Android App Orfox</a></td>
+<td><a href="https://threatpost.com/tor-project-brings-security-slider-feature-to-android-app-orfox/127849/">Tor Project Brings Security Slider Feature to Android App Orfox</a></td>
 </tr>
 
 <tr>
 <td>2017 Sep 5</td>
 <td>Extreme Tech</td>
-<td><a href="https://www.extremetech.com/mobile/255057-tor-project-adds-new-features-mobile-browser-support">
-Tor Amps Up its Mobile Browser Support</a></td>
+<td><a href="https://www.extremetech.com/mobile/255057-tor-project-adds-new-features-mobile-browser-support">Tor Amps Up its Mobile Browser Support</a></td>
 </tr>
 
 <tr>
 <td>2017 Aug 30</td>
 <td>Motherboard</td>
-<td><a href="https://motherboard.vice.com/amp/en_us/article/vbbjxm/here-are-the-41-websites-you-cant-access-in-cuba">
-Here Are the 41 Websites You Can't Access in Cuba</a></td>
+<td><a href="https://motherboard.vice.com/amp/en_us/article/vbbjxm/here-are-the-41-websites-you-cant-access-in-cuba">Here Are the 41 Websites You Can't Access in Cuba</a></td>
 </tr>
 
 <tr>
 <td>2017 Aug 18</td>
 <td>Fast Company</td>
-<td><a href="https://www.fastcompany.com/40455652/the-tor-project-wont-censor-the-daily-stormer-heres-why">
-The Tor Project won't censor the Daily Stormer - here's why</a></td>
+<td><a href="https://www.fastcompany.com/40455652/the-tor-project-wont-censor-the-daily-stormer-heres-why">The Tor Project won't censor the Daily Stormer - here's why</a></td>
 </tr>
 
 <tr>
 <td>2017 Aug 17</td>
 <td>CNET</td>
-<td><a href="https://www.cnet.com/g00/news/tor-project-disgusted-by-daily-stormer-defends-software-ethos-nazi-racist">
-Tor Project 'disgusted' by Daily Stormer, defends software ethos</a></td>
+<td><a href="https://www.cnet.com/g00/news/tor-project-disgusted-by-daily-stormer-defends-software-ethos-nazi-racist">Tor Project 'disgusted' by Daily Stormer, defends software ethos</a></td>
 </tr>
 
 <tr>
 <td>2017 Jul 29</td>
 <td>The Register</td>
-<td><a href="https://www.theregister.co.uk/2017/07/29/tor_dark_web/">
-Dark web doesn't exist</a></td>
+<td><a href="https://www.theregister.co.uk/2017/07/29/tor_dark_web/">Dark web doesn't exist</a></td>
 </tr>
 
 <tr>
 <td>2017 Jul 20</td>
 <td>Venture Beat</td>
-<td><a href="https://venturebeat.com/2017/07/20/the-tor-project-launches-its-first-public-bug-bounty-program-through-hackerone/">
-Tor Project Opens Bug The Tor Project launches its first public bug bounty program through HackerOne</a></td>
+<td><a href="https://venturebeat.com/2017/07/20/the-tor-project-launches-its-first-public-bug-bounty-program-through-hackerone/">Tor Project Opens Bug The Tor Project launches its first public bug bounty program through HackerOne</a></td>
 </tr>
 
 <tr>
 <td>2017 May 19</td>
 <td>BestVPN</td>
-<td><a href="https://www.bestvpn.com/best-free-utilities/">
-Best Free Utilities for Your Computer</a></td>
+<td><a href="https://www.bestvpn.com/best-free-utilities/">Best Free Utilities for Your Computer</a></td>
 </tr>
 
 <tr>
 <td>2017 Apr 25</td>
 <td>TechCrunch</td>
-<td><a href="https://techcrunch.com/2017/04/25/tor-project-funding-3-3-million-2015/">
-Funding for the Tor Project reached a record $3.3 million in 2015</a></td>
+<td><a href="https://techcrunch.com/2017/04/25/tor-project-funding-3-3-million-2015/">Funding for the Tor Project reached a record $3.3 million in 2015</a></td>
 </tr>
 
 <tr>
 <td>2017 Feb 9</td>
 <td>Forbes</td>
-<td><a href="https://www.forbes.com/sites/leemathews/2017/02/09/tor-projects-new-mobile-app-alerts-you-about-surveillance-and-censorship/#1fd08a7553e0">
-Tor Project's New Mobile App Alerts You To Internet Surveillance And Censorship</a></td>
+<td><a href="https://www.forbes.com/sites/leemathews/2017/02/09/tor-projects-new-mobile-app-alerts-you-about-surveillance-and-censorship/#1fd08a7553e0">Tor Project's New Mobile App Alerts You To Internet Surveillance And Censorship</a></td>
 </tr>
 
 <tr>
 <td>2017 Jan 17</td>
 <td>Macworld</td>
-<td><a href="http://www.macworld.com/article/3152823/security/anonymous-browsing-with-tor-reduces-exposure-but-still-has-risks.html">
-Anonymous browsing with Tor reduces exposure</a></td>
+<td><a href="http://www.macworld.com/article/3152823/security/anonymous-browsing-with-tor-reduces-exposure-but-still-has-risks.html">Anonymous browsing with Tor reduces exposure</a></td>
 </tr>
 
 <tr>
 <td>2016 Sep 19</td>
 <td>The Guardian</td>
-<td><a href="https://www.theguardian.com/help/2016/sep/19/how-to-contact-the-guardian-securely">
-How to contact the Guardian securely</a></td>
+<td><a href="https://www.theguardian.com/help/2016/sep/19/how-to-contact-the-guardian-securely">How to contact the Guardian securely</a></td>
 </tr>
 
 <tr>
 <td>2016 Sep 16</td>
 <td>CNN</td>
-<td><a href="http://money.cnn.com/2016/09/16/technology/internet-censorship-blackouts-gabon/">
-This African country is taking an unprecedented step in internet censorship</a></td>
+<td><a href="http://money.cnn.com/2016/09/16/technology/internet-censorship-blackouts-gabon/">This African country is taking an unprecedented step in internet censorship</a></td>
 </tr>
 
 <tr>
 <td>2016 Sep 10</td>
 <td>The Merkle</td>
-<td><a href="http://themerkle.com/tor-developers-are-preparing-for-the-next-generation-of-cyberattacks/">
-Tor Developers Are Preparing For The Next Generation of Cyberattacks</a></td>
+<td><a href="http://themerkle.com/tor-developers-are-preparing-for-the-next-generation-of-cyberattacks/">Tor Developers Are Preparing For The Next Generation of Cyberattacks</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 31</td>
 <td>ArsTechnica</td>
-<td><a href="http://arstechnica.com/security/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/">
-Building a new Tor that can resist next-generation state surveillance</a></td>
+<td><a href="http://arstechnica.com/security/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/">Building a new Tor that can resist next-generation state surveillance</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 26</td>
 <td>The Merkle</td>
-<td><a href="http://themerkle.com/dojs-ovie-carroll-tor-helps-protect-sensitive-user-information/">
-DOJ’s Ovie Carroll: “Tor Helps Protect Sensitive User Information”</a></td>
+<td><a href="http://themerkle.com/dojs-ovie-carroll-tor-helps-protect-sensitive-user-information/">DOJ’s Ovie Carroll: “Tor Helps Protect Sensitive User Information”</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 12</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2016/08/12/the-tor-projects-social-cont.html">
-Tor Project Social Contract</a></td>
+<td><a href="http://boingboing.net/2016/08/12/the-tor-projects-social-cont.html">Tor Project Social Contract</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 11</td>
 <td>The Inquirer</td>
-<td><a href="http://www.theinquirer.net/inquirer/news/2467718/tor-creates-social-contract-promising-never-to-harm-users">
-Tor creates 'social contract' promising never to harm users</a></td>
+<td><a href="http://www.theinquirer.net/inquirer/news/2467718/tor-creates-social-contract-promising-never-to-harm-users">Tor creates 'social contract' promising never to harm users</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 10</td>
 <td>TechCrunch</td>
-<td><a href="https://techcrunch.com/2016/08/10/tors-new-social-contract-includes-no-backdoors-pledge/">
-Tor’s new social contract includes ‘no backdoors’ pledge</a></td>
+<td><a href="https://techcrunch.com/2016/08/10/tors-new-social-contract-includes-no-backdoors-pledge/">Tor’s new social contract includes ‘no backdoors’ pledge</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 06</td>
 <td>MotherBoard</td>
-<td><a href="http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor">
-Department of Justice Official Tells Hundred Federal Judges to Use Tor</a></td>
+<td><a href="http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor">Department of Justice Official Tells Hundred Federal Judges to Use Tor</a></td>
 </tr>
 
 <tr>
 <td>2016 Aug 04</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/tor-project-0-2-8-6-improves-client-bootstrapping-performance-linux-security-506961.shtml">
-Tor Project 0.2.8.6 Improves Client Bootstrapping Performance, Linux Security</a></td>
+<td><a href="http://news.softpedia.com/news/tor-project-0-2-8-6-improves-client-bootstrapping-performance-linux-security-506961.shtml">Tor Project 0.2.8.6 Improves Client Bootstrapping Performance, Linux Security</a></td>
 </tr>
 
 <tr>
 <td>2016 Jul 07</td>
 <td>http://www.htxt. co.za/</td>
-<td><a href="http://www.htxt.co.za/2016/07/07/make-it-harder-for-the-govt-to-track-your-zimshutdown-messages/">
-Make it harder for the gov’t to track your #ShutdownZimbabwe2016 messages</a></td>
+<td><a href="http://www.htxt.co.za/2016/07/07/make-it-harder-for-the-govt-to-track-your-zimshutdown-messages/">Make it harder for the gov’t to track your #ShutdownZimbabwe2016 messages</a></td>
 </tr>
 
 <tr>
 <td>2016 Jul 05</td>
 <td>The Inquirer</td>
-<td><a href="http://www.theinquirer.net/inquirer/news/2463873/mozilla-ups-firefox-privacy-ante-with-tor-injection">
-Mozilla ups Firefox privacy ante with Tor injection</a></td>
+<td><a href="http://www.theinquirer.net/inquirer/news/2463873/mozilla-ups-firefox-privacy-ante-with-tor-injection">Mozilla ups Firefox privacy ante with Tor injection</a></td>
 </tr>
 
 <tr>
 <td>2016 Jul 03</td>
 <td>The Guardian</td>
-<td><a href="https://www.theguardian.com/technology/2016/jul/03/online-security-measures-digital-privacy-guide">
-Extreme online security measures to protect your digital privacy – a guide</a></td>
+<td><a href="https://www.theguardian.com/technology/2016/jul/03/online-security-measures-digital-privacy-guide">Extreme online security measures to protect your digital privacy – a guide</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 28</td>
 <td>Ghakhs.net</td>
-<td><a href="www.ghacks.net/2016/06/28/selfrando-improves-tor-browser-security">
-Selfrando improves Tor Browser security</a></td>
+<td><a href="www.ghacks.net/2016/06/28/selfrando-improves-tor-browser-security">Selfrando improves Tor Browser security</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 24</td>
 <td>The Merkel</td>
-<td><a href="http://themerkle.com/selfrando-technique-makes-tor-nearly-invulnerable-to-de-anonymization-attacks/">
-Selfrando Technique Makes Tor Nearly Invulnerable To De­anonymization Attacks</a></td>
+<td><a href="http://themerkle.com/selfrando-technique-makes-tor-nearly-invulnerable-to-de-anonymization-attacks/">Selfrando Technique Makes Tor Nearly Invulnerable To De­anonymization Attacks</a></td>
 </tr>
 
 <tr>
 <td>2015 Jun 23</td>
 <td>The Inquirer</td>
-<td><a href="http://www.theinquirer.net/inquirer/news/2462596/mozilla-throws-usd385k-at-open-source-projects-including-tor-and-nvda">
-Mozilla throws $385k at open source projects including Tor and NVDA</a></td>
+<td><a href="http://www.theinquirer.net/inquirer/news/2462596/mozilla-throws-usd385k-at-open-source-projects-including-tor-and-nvda">Mozilla throws $385k at open source projects including Tor and NVDA</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 23</td>
 <td>Register</td>
-<td><a href="http://www.theregister.co.uk/2016/06/23/mozilla_gives_out_moss_prizes/">
-What do Tor, Tails and Caddy have in common? Mozilla bucks</a></td>
+<td><a href="http://www.theregister.co.uk/2016/06/23/mozilla_gives_out_moss_prizes/">What do Tor, Tails and Caddy have in common? Mozilla bucks</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 22</td>
 <td>Tech Eye</td>
-<td><a href="http://www.techeye.net/news/human-rights-groups-furious-about-new-us-warrant-law">
-Human Rights groups furious about new US warrant law</a></td>
+<td><a href="http://www.techeye.net/news/human-rights-groups-furious-about-new-us-warrant-law">Human Rights groups furious about new US warrant law</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 22</td>
 <td>ZDNet</td>
-<td><a href="http://www.zdnet.com/article/tor-project-teams-up-with-researchers-to-toughen-up-tor-browser/">
-Tor Project teams up with researchers to toughen up Tor browser</a></td>
+<td><a href="http://www.zdnet.com/article/tor-project-teams-up-with-researchers-to-toughen-up-tor-browser/">Tor Project teams up with researchers to toughen up Tor browser</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 21</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/rule-41-online-protest/">
-Internet­rights groups launch protest over expanded FBI hacking powers</a></td>
+<td><a href="http://www.dailydot.com/layer8/rule-41-online-protest/">Internet­rights groups launch protest over expanded FBI hacking powers</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 16</td>
 <td>BBC­Persia</td>
-<td><a href="https://blog.torproject.org/blog/statement-tor-project-software-integrity-and-apple">
-Tor developer discusses privacy tools with BBC­Persia</a></td>
+<td><a href="https://blog.torproject.org/blog/statement-tor-project-software-integrity-and-apple">Tor developer discusses privacy tools with BBC­Persia</a></td>
 </tr>
 
 <tr>
 <td>2016 Jun 02</td>
 <td>dna</td>
-<td><a href="http://www.dnaindia.com/scitech/report-tor-browser-update-adds-improved-html5-support-and-duckduckgo-search-engine-2219121">
-Tor Browser update adds improved HTML5 support and DuckDuckGo search engine</a></td>
+<td><a href="http://www.dnaindia.com/scitech/report-tor-browser-update-adds-improved-html5-support-and-duckduckgo-search-engine-2219121">Tor Browser update adds improved HTML5 support and DuckDuckGo search engine</a></td>
 </tr>
 
 <tr>
 <td>2016 May 31</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/tor-browser-6-0-based-on-firefox-45-esr-released-with-updated-security-features-504668.shtml">
-Tor Browser 6.0 Based on Firefox 45­ESR Released with Updated Security Features</a></td>
+<td><a href="http://news.softpedia.com/news/tor-browser-6-0-based-on-firefox-45-esr-released-with-updated-security-features-504668.shtml">Tor Browser 6.0 Based on Firefox 45­ESR Released with Updated Security Features</a></td>
 </tr>
 
 <tr>
 <td>2016 May 25</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/tor-to-use-never-seen-before-distributed-rng-to-generate-truly-random-numbers-504461.shtml">
-Tor to Use Never­Before­Seen Distributed RNG to Generate Truly Random Numbers</a></td>
+<td><a href="http://news.softpedia.com/news/tor-to-use-never-seen-before-distributed-rng-to-generate-truly-random-numbers-504461.shtml">Tor to Use Never­Before­Seen Distributed RNG to Generate Truly Random Numbers</a></td>
 </tr>
 
 <tr>
 <td>2016 May 19</td>
 <td>The Merkle</td>
-<td><a href="http://themerkle.com/tor-technology-can-bring-much-needed-encryption-to-healthcare/">
-Tor Technology Can Bring Much Needed Encryption To Healthcare</a></td>
+<td><a href="http://themerkle.com/tor-technology-can-bring-much-needed-encryption-to-healthcare/">Tor Technology Can Bring Much Needed Encryption To Healthcare</a></td>
 </tr>
 
 <tr>
 <td>2016 May 12</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/uganda-censorship-circumvention-how-to/">
-How Ugandans can beat government censorship</a></td>
+<td><a href="http://www.dailydot.com/layer8/uganda-censorship-circumvention-how-to/">How Ugandans can beat government censorship</a></td>
 </tr>
 
 <tr>
 <td>2016 May 12</td>
 <td>The Huffington Post</td>
-<td><a href="http://www.huffingtonpost.com/entry/paul-syverson-tor-interview_us_5734a06ae4b060aa78197df2">
-Tor Founder: Your Medical Records Are The Next Big Target For Hackers</a></td>
+<td><a href="http://www.huffingtonpost.com/entry/paul-syverson-tor-interview_us_5734a06ae4b060aa78197df2">Tor Founder: Your Medical Records Are The Next Big Target For Hackers</a></td>
 </tr>
 
 <tr>
 <td>2016 May 12</td>
 <td>Committee to Protect Journalists</td>
-<td><a href="https://cpj.org/blog/2016/05/how-securedrop-helps-cpj-protect-journalists.php">
-How SecureDrop helps CPJ protect journalists</a></td>
+<td><a href="https://cpj.org/blog/2016/05/how-securedrop-helps-cpj-protect-journalists.php">How SecureDrop helps CPJ protect journalists</a></td>
 </tr>
 
 <tr>
 <td>2016 May 04</td>
 <td>The Mac Observer</td>
-<td><a href="https://www.macobserver.com/tmo/article/fbis-tor-vpn-targeted-warrants-amount-to-court-sanctioned-surveillance">
-FBI’s TOR, VPN­targeted Warrants Amount to Court Sanctioned Mass Surveillance</a></td>
+<td><a href="https://www.macobserver.com/tmo/article/fbis-tor-vpn-targeted-warrants-amount-to-court-sanctioned-surveillance">FBI’s TOR, VPN­targeted Warrants Amount to Court Sanctioned Mass Surveillance</a></td>
 </tr>
 
 <tr>
 <td>2016 May 03</td>
 <td>Technical.ly Philly</td>
-<td><a href="http://technical.ly/philly/2016/05/03/duckduckgo-tor-project/">
-DuckDuckGo donates $25K to privacy­focused Tor Project</a></td>
+<td><a href="http://technical.ly/philly/2016/05/03/duckduckgo-tor-project/">DuckDuckGo donates $25K to privacy­focused Tor Project</a></td>
 </tr>
 
 <tr>
 <td>2016 Apr 11</td>
 <td>DZone</td>
-<td><a href="https://dzone.com/articles/considering-tor-like-techniques-to-protect-your-us">
-Considering Tor­like Techniques to Protect Your Users</a></td>
+<td><a href="https://dzone.com/articles/considering-tor-like-techniques-to-protect-your-us">Considering Tor­like Techniques to Protect Your Users</a></td>
 </tr>
 
 <tr>
 <td>2016 Apr 08</td>
 <td>Cyber Shack</td>
-<td><a href="http://www.cybershack.com.au/feature/panama-papers-privacy-encryption-and-you-080416-3">
-Panama Papers, privacy, encryption, and you</a></td>
+<td><a href="http://www.cybershack.com.au/feature/panama-papers-privacy-encryption-and-you-080416-3">Panama Papers, privacy, encryption, and you</a></td>
 </tr>
 
 <tr>
 <td>2016 Apr 06</td>
 <td>MotherBoard</td>
-<td><a href="http://motherboard.vice.com/read/countries-that-use-tor-most-are-either-highly-repressive-or-highly-liberal">
-Countries that Use Tor Most Are Either Highly Repressive or Highly Liberal</a></td>
+<td><a href="http://motherboard.vice.com/read/countries-that-use-tor-most-are-either-highly-repressive-or-highly-liberal">Countries that Use Tor Most Are Either Highly Repressive or Highly Liberal</a></td>
 </tr>
 
 <tr>
 <td>2016 Mar 22</td>
 <td>ComputerWorld</td>
-<td><a href="http://www.csoonline.com/article/3046505/security/tor-project-says-it-can-quickly-catch-spying-code.html">
-Tor Project says it can quickly catch spying code</a></td>
+<td><a href="http://www.csoonline.com/article/3046505/security/tor-project-says-it-can-quickly-catch-spying-code.html">Tor Project says it can quickly catch spying code</a></td>
 </tr>
 
 <tr>
 <td>2016 Mar 22</td>
 <td>The Register</td>
-<td><a href="http://www.theregister.co.uk/2016/03/22/tor_project_fbi_apple/">
-Tor Project works on anti­FBI defenses amid iOS row with Apple</a></td>
+<td><a href="http://www.theregister.co.uk/2016/03/22/tor_project_fbi_apple/">Tor Project works on anti­FBI defenses amid iOS row with Apple</a></td>
 </tr>
 
 <tr>
 <td>2016 Mar 21</td>
 <td>Softpedia</td>
-<td><a href="http://news.softpedia.com/news/like-apple-tor-devs-would-quit-their-jobs-if-ordered-to-backdoor-their-software-502040.shtml">
-Like Apple, Tor Devs Would Quit Their Jobs If Ordered to Backdoor Their Software</a></td>
+<td><a href="http://news.softpedia.com/news/like-apple-tor-devs-would-quit-their-jobs-if-ordered-to-backdoor-their-software-502040.shtml">Like Apple, Tor Devs Would Quit Their Jobs If Ordered to Backdoor Their Software</a></td>
 </tr>
 
 <tr>
 <td>2016 Feb 16</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/shari-steele-tor-project-eff/">
-The woman who aims to take Tor mainstream</a></td>
+<td><a href="http://www.dailydot.com/layer8/shari-steele-tor-project-eff/">The woman who aims to take Tor mainstream</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 22</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/business/2016/01/tor-project-raises-over-200000-in-attempt-to-diversify-its-funding/">
-Tor Project raises over $200,000 in attempt to “diversify” its funding</a></td>
+<td><a href="http://arstechnica.com/business/2016/01/tor-project-raises-over-200000-in-attempt-to-diversify-its-funding/">Tor Project raises over $200,000 in attempt to “diversify” its funding</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 20</td>
 <td>China Digital Times</td>
-<td><a href="http://money.cnn.com/2016/01/20/technology/facebook-android-tor/">
-Facebook Makes App that Can Bypass China's Censors</a></td>
+<td><a href="http://money.cnn.com/2016/01/20/technology/facebook-android-tor/">Facebook Makes App that Can Bypass China's Censors</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 20</td>
 <td>The Verge</td>
-<td><a href="http://www.theverge.com/2016/1/20/10796872/facebook-android-app-tor-support">
-Facebook's Android app now lets you flip a switch to browse over Tor</a></td>
+<td><a href="http://www.theverge.com/2016/1/20/10796872/facebook-android-app-tor-support">Facebook's Android app now lets you flip a switch to browse over Tor</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 20</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/3024305/security/privacy-conscious-users-rejoice-you-can-now-use-facebooks-android-app-over-tor.html">
-Privacy­conscious users rejoice: Facebook's Android app now supports Tor</a></td>
+<td><a href="http://www.pcworld.com/article/3024305/security/privacy-conscious-users-rejoice-you-can-now-use-facebooks-android-app-over-tor.html">Privacy­conscious users rejoice: Facebook's Android app now supports Tor</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 19</td>
 <td>Business Insider</td>
-<td><a href="http://www.businessinsider.com/facebook-tor-android-2016-1">
-You can now connect to Facebook on your phone without leaving a digital trail</a></td>
+<td><a href="http://www.businessinsider.com/facebook-tor-android-2016-1">You can now connect to Facebook on your phone without leaving a digital trail</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 18</td>
 <td>Sky News</td>
-<td><a href="http://news.sky.com/story/tor-map-reveals-networks-use-across-europe-10135419">
-Tor Map Reveals Network's Use Across Europe</a></td>
+<td><a href="http://news.sky.com/story/tor-map-reveals-networks-use-across-europe-10135419">Tor Map Reveals Network's Use Across Europe</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 08</td>
 <td>The Guardian</td>
-<td><a href="https://www.theguardian.com/media/2016/jan/08/propublica-launches-worlds-first-major-news-site-for-dark-web">
-ProPublica launches world's first major news site for dark web</a></td>
+<td><a href="https://www.theguardian.com/media/2016/jan/08/propublica-launches-worlds-first-major-news-site-for-dark-web">ProPublica launches world's first major news site for dark web</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 08</td>
 <td>Salon</td>
-<td><a href="http://www.salon.com/2016/01/08/this_is_the_web_browser_you_should_be_using_if_you_care_at_all_about_security_partner/">
-This is the web browser you should be using if you at all about security</a></td>
+<td><a href="http://www.salon.com/2016/01/08/this_is_the_web_browser_you_should_be_using_if_you_care_at_all_about_security_partner/">This is the web browser you should be using if you at all about security</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 07</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.techrepublic.com/blog/it-security/everything-you-need-to-know-about-using-tor/">
-Everything you need to know about Tor</a></td>
+<td><a href="http://www.techrepublic.com/blog/it-security/everything-you-need-to-know-about-using-tor/">Everything you need to know about Tor</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 07</td>
 <td>Wired</td>
-<td><a href="https://www.wired.com/2016/01/propublica-launches-the-dark-webs-first-major-news-site/">
-ProPublica Launches the Dark Web’s First Major News Site</a></td>
+<td><a href="https://www.wired.com/2016/01/propublica-launches-the-dark-webs-first-major-news-site/">ProPublica Launches the Dark Web’s First Major News Site</a></td>
 </tr>
 
 <tr>
 <td>2016 Jan 05</td>
 <td>The Register</td>
-<td><a href="http://www.theregister.co.uk/2016/01/05/tor_launches_inviteonly_exploit_bug_bounty/">
-Tor launches invite­only exploit bug bounty</a></td>
+<td><a href="http://www.theregister.co.uk/2016/01/05/tor_launches_inviteonly_exploit_bug_bounty/">Tor launches invite­only exploit bug bounty</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 29</td>
 <td>MotherBoard</td>
-<td><a href="http://motherboard.vice.com/read/the-tor-project-is-starting-a-bug-bounty-program">
-The Tor Project Is Starting a Bug Bounty Program</a></td>
+<td><a href="http://motherboard.vice.com/read/the-tor-project-is-starting-a-bug-bounty-program">The Tor Project Is Starting a Bug Bounty Program</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 14</td>
 <td>ZDNET</td>
-<td><a href="http://www.zdnet.com/article/twitter-says-why-not-try-tor-after-issuing-first-state-backed-hack-alert/">
-Twitter says 'Why not try Tor?' after issuing first state­backed hack alert</a></td>
+<td><a href="http://www.zdnet.com/article/twitter-says-why-not-try-tor-after-issuing-first-state-backed-hack-alert/">Twitter says 'Why not try Tor?' after issuing first state­backed hack alert</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 11</td>
 <td>The Register (UK)</td>
-<td><a href="http://www.theregister.co.uk/2015/12/11/silicon_valley_congresswoman_to_bat_for_tor/">
-Silicon Valley's Congresswoman comes to the defense of Tor</a></td>
+<td><a href="http://www.theregister.co.uk/2015/12/11/silicon_valley_congresswoman_to_bat_for_tor/">Silicon Valley's Congresswoman comes to the defense of Tor</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 11</td>
 <td>WIRED</td>
-<td><a href="https://www.wired.com/2015/12/tor-hires-a-new-leader-to-help-it-combat-the-war-on-privacy/">
-Tor Hires a New Leader to Help It Combat the War on Privacy</a></td>
+<td><a href="https://www.wired.com/2015/12/tor-hires-a-new-leader-to-help-it-combat-the-war-on-privacy/">Tor Hires a New Leader to Help It Combat the War on Privacy</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 11</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2015/12/11/the-tor-project-has-a-new-exec.html">
-The Tor Project has a new executive director: former EFF director Shari Steele!</a></td>
+<td><a href="http://boingboing.net/2015/12/11/the-tor-project-has-a-new-exec.html">The Tor Project has a new executive director: former EFF director Shari Steele!</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 10</td>
 <td>MotherBoard</td>
-<td><a href="http://motherboard.vice.com/read/tor-and-public-wi-fi-safe-in-france-prime-minister-says">
-Tor and Public Wi­Fi Safe in France, Prime Minister Says</a></td>
+<td><a href="http://motherboard.vice.com/read/tor-and-public-wi-fi-safe-in-france-prime-minister-says">Tor and Public Wi­Fi Safe in France, Prime Minister Says</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 07</td>
 <td>ZDNET</td>
-<td><a href="http://www.zdnet.com/article/france-considers-public-wi-fi-tor-network-ban-in-wake-of-terror-attacks/">
-France considers public Wi­Fi, Tor network ban in wake of terror attacks</a></td>
+<td><a href="http://www.zdnet.com/article/france-considers-public-wi-fi-tor-network-ban-in-wake-of-terror-attacks/">France considers public Wi­Fi, Tor network ban in wake of terror attacks</a></td>
 </tr>
 
 <tr>
 <td>2015 Dec 04</td>
 <td>SC Magazine</td>
-<td><a href="https://www.scmagazine.com/top-6-influential-security-thinkers/article/534087/">
-Top 6 influential security thinkers</a></td>
+<td><a href="https://www.scmagazine.com/top-6-influential-security-thinkers/article/534087/">Top 6 influential security thinkers</a></td>
 </tr>
 
 <tr>
 <td>2015 Nov 30</td>
 <td>Fusion</td>
-<td><a href="http://fusion.net/story/238742/tor-carnegie-mellon-attack/">
-The attack that broke the Dark Web—and how Tor plans to fix it.</a></td>
+<td><a href="http://fusion.net/story/238742/tor-carnegie-mellon-attack/">The attack that broke the Dark Web—and how Tor plans to fix it.</a></td>
 </tr>
 
 <tr>
 <td>2015 Nov 25</td>
 <td>The Register (UK)</td>
-<td><a href="http://www.theregister.co.uk/2015/11/25/tor_project_donations/">
-Tor Project: Anonymity ain't free, folks. Pony up</a></td>
+<td><a href="http://www.theregister.co.uk/2015/11/25/tor_project_donations/">Tor Project: Anonymity ain't free, folks. Pony up</a></td>
 </tr>
 
 <tr>
 <td>2015 Nov 16</td>
 <td>International Journalists Network (IJNet)</td>
-<td><a href="https://ijnet.org/en/blog/five-tools-journalists%E2%80%99-online-safety-privacy-highlighted-during-aaron-swartz-day-event-0">
-Five tools for journalists’ online safety, privacy highlighted during Aaron Swartz Day event</a></td>
+<td><a href="https://ijnet.org/en/blog/five-tools-journalists%E2%80%99-online-safety-privacy-highlighted-during-aaron-swartz-day-event-0">Five tools for journalists’ online safety, privacy highlighted during Aaron Swartz Day event</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 30</td>
 <td>BBC</td>
-<td><a href="http://www.bbc.com/news/technology-34677323">
-Tor launches anti­censorship Messenger service</a></td>
+<td><a href="http://www.bbc.com/news/technology-34677323">Tor launches anti­censorship Messenger service</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 30</td>
 <td>ZDNET</td>
-<td><a href="http://www.zdnet.com/article/tor-project-launches-encrypted-anonymous-chat-app-to-the-public/">
-Tor Project launches encrypted anonymous chat app to the public</a></td>
+<td><a href="http://www.zdnet.com/article/tor-project-launches-encrypted-anonymous-chat-app-to-the-public/">Tor Project launches encrypted anonymous chat app to the public</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 29</td>
 <td>WIRED</td>
-<td><a href="https://www.wired.com/2015/10/tor-just-launched-the-easiest-app-yet-for-anonymous-encrypted-im/">
-Tor Just Launched the Easiest App Yet for Anonymous, Encrypted IM</a></td>
+<td><a href="https://www.wired.com/2015/10/tor-just-launched-the-easiest-app-yet-for-anonymous-encrypted-im/">Tor Just Launched the Easiest App Yet for Anonymous, Encrypted IM</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 29</td>
 <td>Tech Times</td>
-<td><a href="http://www.techtimes.com/articles/101138/20151029/with-facebooks-support-tor-projects-onion-domains-remain-hidden.htm">
-With Facebook's Support, Tor Project's .Onion Domains Remain Hidden</a></td>
+<td><a href="http://www.techtimes.com/articles/101138/20151029/with-facebooks-support-tor-projects-onion-domains-remain-hidden.htm">With Facebook's Support, Tor Project's .Onion Domains Remain Hidden</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 28</td>
 <td>The Verge</td>
-<td><a href="http://www.theverge.com/2015/10/28/9631006/tor-hidden-addresses-recognition">
-Facebook helps Tor’s hidden sites get official recognition</a></td>
+<td><a href="http://www.theverge.com/2015/10/28/9631006/tor-hidden-addresses-recognition">Facebook helps Tor’s hidden sites get official recognition</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 14</td>
 <td>The Daily Dot</td>
-<td><a href="http://www.dailydot.com/layer8/tor-app-ios-orfox-tor-browser-ios-9-apple/">
-Tor is getting major upgrades on iOS 9</a></td>
+<td><a href="http://www.dailydot.com/layer8/tor-app-ios-orfox-tor-browser-ios-9-apple/">Tor is getting major upgrades on iOS 9</a></td>
 </tr>
 
 <tr>
 <td>2015 Oct 13</td>
 <td>Economic Times</td>
-<td><a href="http://economictimes.indiatimes.com/tech/internet/more-indians-are-logging-on-anonymously-using-browsers-like-tor-freenet-i2p-and-tails/articleshow/49330271.cms">
-More Indians are logging on anonymously using browsers like Tor, Freenet, I2P and Tails</a></td>
+<td><a href="http://economictimes.indiatimes.com/tech/internet/more-indians-are-logging-on-anonymously-using-browsers-like-tor-freenet-i2p-and-tails/articleshow/49330271.cms">More Indians are logging on anonymously using browsers like Tor, Freenet, I2P and Tails</a></td>
 </tr>
 
 <tr>
 <td>2015 Sep 16</td>
 <td>NPR</td>
-<td><a href="http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor">
-N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor</a></td>
+<td><a href="http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor">N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 16</td>
 <td>Motherboard</td>
-<td><a href="http://motherboard.vice.com/read/dissent-a-new-type-of-security-tool-could-markedly-improve-online-anonymity">
-'Dissent,' a New Type of Security Tool, Could Markedly Improve Online Anonymity</a></td>
+<td><a href="http://motherboard.vice.com/read/dissent-a-new-type-of-security-tool-could-markedly-improve-online-anonymity">'Dissent,' a New Type of Security Tool, Could Markedly Improve Online Anonymity</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 14</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/2015/09/mapping-tors-anonymity-network-spread-around-world/">
-Mapping How Tor’s Anonymity Network Spread Around the World</a></td>
+<td><a href="http://www.wired.com/2015/09/mapping-tors-anonymity-network-spread-around-world/">Mapping How Tor’s Anonymity Network Spread Around the World</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 12</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/2015/09/security-news-week-russia-us-homeland-security-agree-something/">
-Russia Tried and Failed to Hack the Tor Browser</a></td>
+<td><a href="http://www.wired.com/2015/09/security-news-week-russia-us-homeland-security-agree-something/">Russia Tried and Failed to Hack the Tor Browser</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 11</td>
 <td>Motherboard</td>
-<td><a href="http://motherboard.vice.com/en_ca/read/the-us-government-pressured-a-small-local-library-to-turn-off-its-tor-server">
-The US Government Pressured a Small Local Library to Turn Off Its Tor Server</a></td>
+<td><a href="http://motherboard.vice.com/en_ca/read/the-us-government-pressured-a-small-local-library-to-turn-off-its-tor-server">The US Government Pressured a Small Local Library to Turn Off Its Tor Server</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 10</td>
 <td>Web Host Industry Review</td>
-<td><a href="http://www.thewhir.com/web-hosting-news/iana-designates-onion-as-special-use-domain-to-boost-security">
-IANA Designates .Onion as Special Use Domain to Boost Security</a></td>
+<td><a href="http://www.thewhir.com/web-hosting-news/iana-designates-onion-as-special-use-domain-to-boost-security">IANA Designates .Onion as Special Use Domain to Boost Security</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 10</td>
 <td>Softpedia News</td>
-<td><a href="http://news.softpedia.com/news/tor-gets-its-own-tld-special-use-domain-at-onion-491473.shtml">
-Tor Gets Its Own TLD Special-Use Domain at .onion</a></td>
+<td><a href="http://news.softpedia.com/news/tor-gets-its-own-tld-special-use-domain-at-onion-491473.shtml">Tor Gets Its Own TLD Special-Use Domain at .onion</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 10</td>
 <td>SiliconANGLE</td>
-<td><a href="http://siliconangle.com/blog/2015/09/10/tor-anonymity-network-benefits-from-onion-added-as-special-use-domain-name/">
-Tor anonymity network benefits from .onion added as special-use domain name</a></td>
+<td><a href="http://siliconangle.com/blog/2015/09/10/tor-anonymity-network-benefits-from-onion-added-as-special-use-domain-name/">Tor anonymity network benefits from .onion added as special-use domain name</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 10</td>
 <td>Propublica</td>
-<td><a href="https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email">
-First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email</a></td>
+<td><a href="https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email">First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 10</td>
 <td>The Register</td>
-<td><a href="http://www.theregister.co.uk/2015/09/10/tors_onion_domain_gets_privacyconscious_users_off_the_dns/">
-Monsters defeated in quest to free .onion from clutches of DNS-snooping demons</a></td>
+<td><a href="http://www.theregister.co.uk/2015/09/10/tors_onion_domain_gets_privacyconscious_users_off_the_dns/">Monsters defeated in quest to free .onion from clutches of DNS-snooping demons</a></td>
 </tr>
-
 <tr>
 <td>2015 Sep 10</td>
 <td>Motherboard</td>
-<td><a href="http://motherboard.vice.com/read/internet-regulators-just-legitimized-the-dark-web">
-Privacy by design, thanks to Tor's Jacob Appelbaum and Facebook's Alec Muffett</a></td>
+<td><a href="http://motherboard.vice.com/read/internet-regulators-just-legitimized-the-dark-web">Privacy by design, thanks to Tor's Jacob Appelbaum and Facebook's Alec Muffett</a></td>
 </tr>
-
 <tr>
 <td>2015 Aug 31</td>
 <td>Statesman</td>
-<td><a href="http://www.statesman.com/news/technology/tor-is-software-for-keeping-things-online-anonymou/nnR7z/">
-‘Tor’ is software for keeping things online anonymous</a></td>
+<td><a href="http://www.statesman.com/news/technology/tor-is-software-for-keeping-things-online-anonymou/nnR7z/">‘Tor’ is software for keeping things online anonymous</a></td>
 </tr>
-
 <tr>
 <td>2015 Aug 29</td>
 <td>Saturday Paper</td>
-<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">
-Tor and the Deep Web Going Mainstream</a></td>
+<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">Tor and the Deep Web Going Mainstream</a></td>
 </tr>
-
 <tr>
 <td>2015 Aug 28</td>
 <td>SC MAGAZINE</td>
-<td><a href="http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/">
-Dark website Agora closes over Tor vulnerability suspicions</a></td>
+<td><a href="http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/">Dark website Agora closes over Tor vulnerability suspicions</a></td>
 </tr>
-
 <tr>
 <td>2015 Jul 31</td>
 <td>SC Magazine</td>
-<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">
-Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td>
+<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td>
 </tr>
-
 <tr>
 <td>2015 Jul 24</td>
 <td>WHYY Radio</td>
-<td><a href="https://technical.ly/philly/2015/07/24/kate-krauss-radio-times/">
-Security and Privacy on the Internet, with Julia Angwen and Tor Project’s Kate Krauss (starts at 13:30)</a></td>
+<td><a href="https://technical.ly/philly/2015/07/24/kate-krauss-radio-times/">Security and Privacy on the Internet, with Julia Angwen and Tor Project’s Kate Krauss (starts at 13:30)</a></td>
 </tr>
-
 <tr>
 <td>2015 Jul 16</td>
 <td>Technically Philly</td>
-<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">
-How this West Philly activist became Tor’s first director of communications</a></td>
+<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">How this West Philly activist became Tor’s first director of communications</a></td>
 </tr>
-
 <tr>
 <td>2015 Jul 8</td>
 <td>Technically Philly</td>
-<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">
-Inside Philly’s Growing Internet Privacy Community</a></td>
+<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">Inside Philly’s Growing Internet Privacy Community</a></td>
 </tr>
-
 <tr>
 <td>2015 Jun 13</td>
 <td>CNN</td>
-<td><a href="http://money.cnn.com/2014/06/13/technology/security/dont-get-hacked/index.html">
-Simple tips to avoid getting hacked</a></td>
+<td><a href="http://money.cnn.com/2014/06/13/technology/security/dont-get-hacked/index.html">Simple tips to avoid getting hacked</a></td>
 </tr>
-
 <tr>
 <td>2015 Jun 30</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/tech-policy/2015/07/crypto-activists-announce-vision-for-tor-exit-relay-in-every-library/">
-Crypto activists announce vision for Tor exit relay in every library "Librarians see the value as soon as you say ‘privacy protecting technology.'" </a></td>
+<td><a href="http://arstechnica.com/tech-policy/2015/07/crypto-activists-announce-vision-for-tor-exit-relay-in-every-library/">Crypto activists announce vision for Tor exit relay in every library "Librarians see the value as soon as you say ‘privacy protecting technology.'" </a></td>
 </tr>
-
 <tr>
 <td>2015 Jun 18</td>
 <td>WIRED</td>
-<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">
-The Dark Web as You Know It Is a Myth</a></td>
+<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">The Dark Web as You Know It Is a Myth</a></td>
 </tr>
-
 <tr>
 <td>2015 Jun 18</td>
 <td>Liberation</td>
-<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">
-Tor: "The emancipatory use of technology"</a></td>
+<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">Tor: "The emancipatory use of technology"</a></td>
 </tr>
-
 <tr>
 <td>2015 Apr 9</td>
 <td>Silicon Republic</td>
-<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">
-Interview with Runa Sandvik</a></td>
+<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">Interview with Runa Sandvik</a></td>
 </tr>
-
 <tr>
 <td>2015 Apr 4</td>
 <td>El Pais</td>
-<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">
-Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td>
+<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td>
 </tr>
-
 <tr>
 <td>2015 Apr 2</td>
 <td>Motherboard </td>
-<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">
-Tor wants to know how to make the darknet mainstream</a></td>
+<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">Tor wants to know how to make the darknet mainstream</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 26</td>
 <td>Daily Dot</td>
-<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">
-Tor's great rebranding</a></td>
+<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">Tor's great rebranding</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 22</td>
 <td>The Hill</td>
-<td><a href="http://thehill.com/policy/cybersecurity/236512-silicon-valley-spars-with-obama-over-backdoor-surveillance">
-Silicon Valley Spars with Obama over Backdoor Surveillance</a></td>
+<td><a href="http://thehill.com/policy/cybersecurity/236512-silicon-valley-spars-with-obama-over-backdoor-surveillance">Silicon Valley Spars with Obama over Backdoor Surveillance</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 18</td>
 <td>Boston Globe</td>
-<td><a href="http://www.betaboston.com/news/2015/03/18/in-an-effort-to-educate-users-tor-animates-online-privacy/">
-In an effort to educate users, Tor animates online privacy</a></td>
+<td><a href="http://www.betaboston.com/news/2015/03/18/in-an-effort-to-educate-users-tor-animates-online-privacy/">In an effort to educate users, Tor animates online privacy</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 16</td>
 <td>Wall Street Journal</td>
-<td><a href="http://www.wsj.com/articles/u-s-cloud-providers-face-backlash-from-chinas-censors-1426541126#livefyre-comment">
-U.S. Cloud Providers Face Backlash From China’s Censors</a></td>
+<td><a href="http://www.wsj.com/articles/u-s-cloud-providers-face-backlash-from-chinas-censors-1426541126#livefyre-comment">U.S. Cloud Providers Face Backlash From China’s Censors</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 11</td>
 <td>The Guardian</td>
-<td><a href="http://www.theguardian.com/technology/2015/mar/11/tor-should-not-be-banned-in-britain">
-Tor Should Not be Banned in Britain</a></td>
+<td><a href="http://www.theguardian.com/technology/2015/mar/11/tor-should-not-be-banned-in-britain">Tor Should Not be Banned in Britain</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 10</td>
 <td>The Hill</td>
-<td><a href="http://thehill.com/policy/cybersecurity/235171-uk-lawmakers-we-cant-ban-online-anonymity-services">
-We Can’t Outlaw Anonymous Web Services</a></td>
+<td><a href="http://thehill.com/policy/cybersecurity/235171-uk-lawmakers-we-cant-ban-online-anonymity-services">We Can’t Outlaw Anonymous Web Services</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 10</td>
 <td>BBC</td>
-<td><a href="http://www.bbc.com/news/technology-31816410">
-Banning Tor unwise and infeasible, MPs told</a></td>
+<td><a href="http://www.bbc.com/news/technology-31816410">Banning Tor unwise and infeasible, MPs told</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 10</td>
 <td>El Diario</td>
-<td><a href="http://www.eldiario.es/turing/vigilancia_y_privacidad/Proyecto-Tor-comunidad-alrededor-NSA_0_365014509.html">
-Tor helps resist the NSA</a></td>
+<td><a href="http://www.eldiario.es/turing/vigilancia_y_privacidad/Proyecto-Tor-comunidad-alrededor-NSA_0_365014509.html">Tor helps resist the NSA</a></td>
 </tr>
-
 <tr>
 <td>2015 Mar 3</td>
 <td>AFP</td>
-<td><a href="http://fr.canoe.ca/techno/internet/archives/2015/03/20150303-125006.html">
-2.5 million Tor users can’t all be criminals!</a></td>
+<td><a href="http://fr.canoe.ca/techno/internet/archives/2015/03/20150303-125006.html">2.5 million Tor users can’t all be criminals!</a></td>
 </tr>
-
 <tr>
 <td>2015 Jan 7</td>
 <td>Inside BitCoins</td>
-<td><a href="http://insidebitcoins.com/news/developers-say-privacy-network-tor-was-not-compromised-during-silk-road-takedown/28469">
-Developers Say Privacy Network Tor Was Not Compromised During Silk Road Takedown</a></td>
+<td><a
+href="http://insidebitcoins.com/news/developers-say-privacy-network-tor-was-not-compromised-during-silk-road-takedown/28469">Developers
+Say Privacy Network Tor Was Not Compromised During Silk Road Takedown</a></td>
 </tr>
-
 <tr>
 <td>2015 Jan 29</td>
 <td>The Inquirer</td>
-<td><a href="http://www.theinquirer.net/inquirer/news/2392703/mozilla-treats-tor-network-to-a-hardware-helping-hand">
-Mozilla treats Tor Network to a hardware helping hand
+<td><a
+href="http://www.theinquirer.net/inquirer/news/2392703/mozilla-treats-tor-network-to-a-hardware-helping-hand">Mozilla treats Tor Network to a hardware helping hand
 </a></td>
 </tr>
-
 <tr>
 <td>2014 Dec 30</td>
 <td>31C3</td>
-<td><a href="http://media.ccc.de/browse/congress/2014/31c3_-_6251_-_en_-_saal_1_-_201412301400_-_state_of_the_onion_-_jacob_-_arma.html#video">
-“State of the Onion"</a> video on the state of the Tor Project with Roger
+<td><a
+href="http://media.ccc.de/browse/congress/2014/31c3_-_6251_-_en_-_saal_1_-_201412301400_-_state_of_the_onion_-_jacob_-_arma.html#video">“State
+of the Onion"</a> video on the state of the Tor Project with Roger
 Dingledine, Jacob Appelbaum, Arturo Filastò, and Laura Poitras.</td>
 </tr>
-
 <tr>
 <td>2014 Dec 26</td>
 <td>Engadget</td>
-<td><a href="http://www.engadget.com/2014/12/26/lizard-squad-hackers-attack-tor/">
-Band of hackers manages to take down Sony--but not Tor</a></td>
+<td><a
+href="http://www.engadget.com/2014/12/26/lizard-squad-hackers-attack-tor/">Band
+of hackers manages to take down Sony--but not Tor</a></td>
 </tr>
-
 <tr>
 <td>2014 Dec 19</td>
 <td>The Guardian</td>
-<td><a href="http://www.theguardian.com/technology/2014/dec/05/how-faceboook-tor-service-encourage-open-web">
-How Facebook's Tor service could encourage a more open web</a></td>
+<td><a
+href="http://www.theguardian.com/technology/2014/dec/05/how-faceboook-tor-service-encourage-open-web">How
+Facebook's Tor service could encourage a more open web</a></td>
 </tr>
-
 <tr>
 <td>2014 Dec 17</td>
 <td>Gizmodo</td>
-<td><a href="http://gizmodo.com/tor-is-still-safe-1669011966">Tor is Still Safe
+<td><a
+href="http://gizmodo.com/tor-is-still-safe-1669011966">Tor is Still Safe
 </a></td>
 </tr>
-
 <tr>
 <td>2014 Dec 12</td>
 <td>The Independent</td>
-<td><a href="http://www.independent.co.uk/voices/comment/the-dark-web-is-not-just-for-paedophiles-drug-dealers-and-terrorists-9920667.html">
-OpEd</a> on hidden services and censorship</td>
+<td><a
+href="http://www.independent.co.uk/voices/comment/the-dark-web-is-not-just-for-paedophiles-drug-dealers-and-terrorists-9920667.html">OpEd
+</a>on hidden services and censorship</td>
 </tr>
-
 <tr>
 <td>2014 Dec 12</td>
 <td>Boing Boing</td>
-<td><a href="https://boingboing.net/2014/12/12/tor-project-declares-solidarit.html">
-Tor Project declares solidarity with harassed colleague
+<td><a href="https://boingboing.net/2014/12/12/tor-project-declares-solidarit.html">Tor Project declares solidarity with harassed colleague
 </a></td>
 </tr>
-
 <tr>
 <td>2014 Dec 11</td>
 <td>DCInno</td>
-<td><a href="http://dcinno.streetwise.co/2014/11/11/mozilla-firefox-anonymous-internet-tor/">
-Firefox is Building an Anonymous Internet Browser With Tor</a> via @DC_Inno</td>
+<td><a
+href="http://dcinno.streetwise.co/2014/11/11/mozilla-firefox-anonymous-internet-tor/">Firefox
+is Building an Anonymous Internet Browser With Tor</a> via @DC_Inno</td>
 </tr>
-
 <tr>
 <td>2014 Nov 10</td>
 <td>Gizmodo</td>
-<td><a href="http://gizmodo.com/mozilla-is-helping-tor-get-bigger-and-better-1656860653">
-Mozilla get bigger and better</a></td>
+<td><a
+href="http://gizmodo.com/mozilla-is-helping-tor-get-bigger-and-better-1656860653">Mozilla
+get bigger and better</a></td>
 </tr>
-
 <tr>
 <td>2014 Nov 20</td>
 <td>Wired.co.UK</td>
-<td><a href="http://www.wired.co.uk/news/archive/2014-11/20/tor-still-secure">
-Don't panic, Tor is still safe and Here’s Why</a></td>
+<td><a
+href="http://www.wired.co.uk/news/archive/2014-11/20/tor-still-secure">Don't
+panic, Tor is still safe and Here’s Why</a></td>
 </tr>
-
 <tr>
 <td>2014 Oct 31</td>
 <td>The Next Web</td>
-<td><a href="http://thenextweb.com/facebook/2014/10/31/facebook-now-available-tor-network/">
-Facebook is now available on Tor for more secure browsing</a></td>
+<td><a
+href="http://thenextweb.com/facebook/2014/10/31/facebook-now-available-tor-network/">Facebook
+is now available on Tor for more secure browsing</a></td>
 </tr>
-
 <tr>
 <td>2014 Jul 8</td>
 <td>Cambridge Community Television</td>
-<td><a href="http://www.cctvcambridge.org/NSATor">
-NSA Surveillance Targets Cambridge - based TOR Project</a></td>
+<td><a href="http://www.cctvcambridge.org/NSATor">NSA Surveillance Targets Cambridge - based TOR Project</a></td>
 </tr>
-
 <tr>
 <td>2014 Jul 8</td>
 <td>Tech Times</td>
-<td><a href="http://www.techtimes.com/articles/9779/20140708/nsa-might-tag-you-as-extremist-when-you-use-tor-other-privacy-online-services.htm">
-NSA might tag you as extremist when you use Tor, other privacy online services</a></td>
+<td><a href="http://www.techtimes.com/articles/9779/20140708/nsa-might-tag-you-as-extremist-when-you-use-tor-other-privacy-online-services.htm">NSA might tag you as extremist when you use Tor, other privacy online services</a></td>
 </tr>
-
 <tr>
 <td>2014 Jul 7</td>
 <td>Computerworld</td>
-<td><a href="http://blogs.computerworld.com/privacy/24102/if-you-care-about-online-privacy-then-nsa-cares-about-targeting-you">
-If you can about online privacy, then the NSA cares about targeting you</a></td>
+<td><a href="http://blogs.computerworld.com/privacy/24102/if-you-care-about-online-privacy-then-nsa-cares-about-targeting-you">If you can about online privacy, then the NSA cares about targeting you</a></td>
 </tr>
-
 <tr>
 <td>2014 Jul 3</td>
 <td>DasErste.de</td>
-<td><a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">
-NSA targets the privacy-conscious</a></td>
+<td><a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">NSA targets the privacy-conscious</a></td>
 </tr>
-
 <tr>
 <td>2014 Jun 17</td>
 <td>IT News Online</td>
-<td><a href="http://www.itnewsonline.com/realwire/How-to-be-anonymous-on-the-Internet-AppSec-presents-the-latest-developments-of-The-Tor-Project-for-anonymous-communications/13530">
-How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications</a></td>
+<td><a href="http://www.itnewsonline.com/realwire/How-to-be-anonymous-on-the-Internet-AppSec-presents-the-latest-developments-of-The-Tor-Project-for-anonymous-communications/13530">How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications</a></td>
 </tr>
-
 <tr>
 <td>2014 Jun 15</td>
 <td>International Business Times</td>
-<td><a href="http://www.ibtimes.co.uk/iraq-crisis-gvoernment-blocks-access-tor-project-following-isis-insurgency-1452879">
-Iraq Crisis: Government Blocks Access to Tor Project Following Isis Insurgency </a></td>
+<td><a href="http://www.ibtimes.co.uk/iraq-crisis-gvoernment-blocks-access-tor-project-following-isis-insurgency-1452879">Iraq Crisis: Government Blocks Access to Tor Project Following Isis Insurgency </a></td>
 </tr>
-
 <tr>
 <td>2014 Jun 15</td>
 <td>Gizmodo</td>
-<td><a href="http://gizmodo.com/tor-is-for-everyone-why-you-should-use-tor-1591191905">
-Tor is for Everyone: Why Should You Use Tor </a></td>
+<td><a href="http://gizmodo.com/tor-is-for-everyone-why-you-should-use-tor-1591191905">Tor is for Everyone: Why Should You Use Tor </a></td>
 </tr>
-
 <tr>
 <td>2014 May 25</td>
 <td>NPR</td>
-<td><a href="http://www.npr.org/blogs/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet">
-Going Dark: The Internet Behind The Internet</a></td>
+<td><a href="http://www.npr.org/blogs/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet">Going Dark: The Internet Behind The Internet</a></td>
 </tr>
-
 <tr>
 <td>2014 May 13</td>
 <td>ABC News</td>
-<td><a href="http://abc7news.com/technology/i-team-investigates-underworld-marketplaces-of-the-darknet/56262/">
-I-Team: Understanding TOR and the dark net</a></td>
+<td><a href="http://abc7news.com/technology/i-team-investigates-underworld-marketplaces-of-the-darknet/56262/">I-Team: Understanding TOR and the dark net</a></td>
 </tr>
-
 <tr>
 <td>2014 May 9</td>
 <td>Vice</td>
-<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">
-Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
+<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
 </tr>
-
 <tr>
 <td>2014 May 7</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">
-Tor: network security for domestic abuse survivors</a></td>
+<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">Tor: network security for domestic abuse survivors</a></td>
 </tr>
-
 <tr>
 <td>2014 May 7</td>
 <td>BetaBoston</td>
-<td><a href="http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/">
-As domestic abuse goes digital, shelters turn to counter-survellience with Tor</a></td>
+<td><a href="http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/">As domestic abuse goes digital, shelters turn to counter-survellience with Tor</a></td>
 </tr>
-
 <tr>
 <td>2014 May</td>
 <td>Boston Magazine</td>
-<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">
-The Power of Ideas</a></td>
+<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">The Power of Ideas</a></td>
 </tr>
-
 <tr>
 <td>2014 Apr 29</td>
 <td>ThinkProgress</td>
-<td><a href="http://thinkprogress.org/culture/2014/04/29/3432050/can-you-hide-from-big-data/">
-Meet the Woman Who did Everything in Her Power to Hide Her Pregnancy From Big Data</a></td>
+<td><a href="http://thinkprogress.org/culture/2014/04/29/3432050/can-you-hide-from-big-data/">Meet the Woman Who did Everything in Her Power to Hide Her Pregnancy From Big Data</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 26</td>
 <td>IT News Africa</td>
-<td><a href="http://www.itnewsafrica.com/2014/03/hidden-internet-growing-rapidly/">
-“Hidden” internet growing rapidly</a></td>
+<td><a href="http://www.itnewsafrica.com/2014/03/hidden-internet-growing-rapidly/">“Hidden” internet growing rapidly</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 25</td>
 <td>Westmoreland Times</td>
-<td><a href="http://westmorelandtimes.com/news/11611/25/how-to-mask-your-location-internet-privacy-tools/">
-Masking your location on the internet with privacy tools</a></td>
+<td><a href="http://westmorelandtimes.com/news/11611/25/how-to-mask-your-location-internet-privacy-tools/">Masking your location on the internet with privacy tools</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 24</td>
 <td>BoingBoing</td>
-<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">
-Turkey orders block of Twitter's IP addresses</a></td>
+<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">Turkey orders block of Twitter's IP addresses</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 24</td>
 <td>Telegraph.co.uk</td>
-<td><a href="http://blogs.telegraph.co.uk/technology/willardfoxton2/100012913/dozens-of-firms-are-invisibly-tracking-you-online-heres-how-to-hide-from-them/">
-Dozens of firms are invisibly tracking you online. Here's how to hide from them</a></td>
+<td><a href="http://blogs.telegraph.co.uk/technology/willardfoxton2/100012913/dozens-of-firms-are-invisibly-tracking-you-online-heres-how-to-hide-from-them/">Dozens of firms are invisibly tracking you online. Here's how to hide from them</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 24</td>
 <td>Washington Post</td>
-<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">
-The Switchboard: Turkey's Twitter ban gets tougher</a></td>
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">The Switchboard: Turkey's Twitter ban gets tougher</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 23</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/tech-policy/2014/03/after-dns-change-fails-turkish-government-steps-up-twitter-censorship/">
-After DNS change fails, Turkish government steps up Twitter censorship</a></td>
+<td><a href="http://arstechnica.com/tech-policy/2014/03/after-dns-change-fails-turkish-government-steps-up-twitter-censorship/">After DNS change fails, Turkish government steps up Twitter censorship</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 23</td>
 <td>CSO</td>
-<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">
-Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
+<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 20</td>
 <td>Threat Post</td>
-<td><a href="http://threatpost.com/malicious-ios-tor-browser-in-apple-app-store/104911">
-Malicious iOS Tor Browswer in Apple App Store</a></td>
+<td><a href="http://threatpost.com/malicious-ios-tor-browser-in-apple-app-store/104911">Malicious iOS Tor Browswer in Apple App Store</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 20</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">
-Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
+<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 10</td>
 <td>USA Today</td>
-<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">
-Four questions about Tor</a></td>
+<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">Four questions about Tor</a></td>
 </tr>
-
 <tr>
 <td>2014 Mar 3</td>
 <td>Computerworld</td>
-<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">
-The paranoid's survival guide, part 1: How to protect your personal data</a></td>
+<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">The paranoid's survival guide, part 1: How to protect your personal data</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 21</td>
 <td>Lifehacker</td>
-<td><a href="http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029">
-What Is Tor and Should I Use It?</a></td>
+<td><a href="http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029">What Is Tor and Should I Use It?</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 20</td>
 <td>Watchdog.org</td>
-<td><a href="http://watchdog.org/129349/securedrop-deep-throat/">
-Are you ready to be Deep Throat?</a></td>
+<td><a href="http://watchdog.org/129349/securedrop-deep-throat/">Are you ready to be Deep Throat?</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 19</td>
 <td>Daily Illini</td>
-<td><a href="http://www.dailyillini.com/news/article_407e25da-9909-11e3-8f33-0017a43b2370.html">
-Security technology to help students in future careers</a></td>
+<td><a href="http://www.dailyillini.com/news/article_407e25da-9909-11e3-8f33-0017a43b2370.html">Security technology to help students in future careers</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 19</td>
 <td>Nature World News</td>
-<td><a href="http://www.natureworldnews.com/articles/6098/20140219/wildleaks-new-service-allows-anonymous-whistleblowers-report-wildlife-crime.htm">
-WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime</a></td>
+<td><a href="http://www.natureworldnews.com/articles/6098/20140219/wildleaks-new-service-allows-anonymous-whistleblowers-report-wildlife-crime.htm">WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 6</td>
 <td>Help Net Security</td>
-<td><a href="http://www.net-security.org/secworld.php?id=16323">
-HTTPS Everywhere add-on now available for Firefox on Android</a></td>
+<td><a href="http://www.net-security.org/secworld.php?id=16323">HTTPS Everywhere add-on now available for Firefox on Android</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 5</td>
 <td>OEN</td>
-<td><a href="http://www.opednews.com/articles/HTTPS-Everywhere-More-se-by-John-Moffett-Communication_Internet_Surveillance-140205-843.html">
-"HTTPS Everywhere" More secure browsing courtesy of the EFF and Tor</a></td>
+<td><a href="http://www.opednews.com/articles/HTTPS-Everywhere-More-se-by-John-Moffett-Communication_Internet_Surveillance-140205-843.html">"HTTPS Everywhere" More secure browsing courtesy of the EFF and Tor</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 4</td>
 <td>Popular Mechanics</td>
-<td><a href="http://www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529">
-7 Ways to Reclaim Your Digital Privacy</a></td>
+<td><a href="http://www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529">7 Ways to Reclaim Your Digital Privacy</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb 3</td>
 <td>IBTimes</td>
-<td><a href="http://www.ibtimes.co.uk/avoiding-sochi-snoopers-using-tor-common-sense-nail-polish-prevent-russian-authorities-spying-1434938">
-Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russian Authorities Spying on Journalists</a></td>
+<td><a href="http://www.ibtimes.co.uk/avoiding-sochi-snoopers-using-tor-common-sense-nail-polish-prevent-russian-authorities-spying-1434938">Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russian Authorities Spying on Journalists</a></td>
 </tr>
-
 <tr>
 <td>2014 Feb</td>
 <td>TechTarget</td>
-<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">
-Tor networks: Stop employees from touring the deep web</a></td>
+<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">Tor networks: Stop employees from touring the deep web</a></td>
 </tr>
-
 <tr>
 <td>2014 Jan 23</td>
 <td>BusinessWeek</td>
-<td><a href="http://www.businessweek.com/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency">
-The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built</a></td>
+<td><a href="http://www.businessweek.com/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency">The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built</a></td>
 </tr>
-
 <tr>
 <td>2014 Jan 21</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/threatlevel/2014/01/russia-tor-attack/">
-Russian Spy Notes Caught Snooping on Facebook Users</a></td>
+<td><a href="http://www.wired.com/threatlevel/2014/01/russia-tor-attack/">Russian Spy Notes Caught Snooping on Facebook Users</a></td>
 </td>
 <tr>
 <tr>
 <td>2014 Jan 17</td>
 <td>ZDNet</td>
-<td><a href="http://www.zdnet.com/if-microsoft-thinks-old-tor-clients-are-risky-why-not-windows-xp-7000025283/">
-If Microsoft thinks old Tor clients are risky, why not Windows XP?</a></td>
+<td><a href="http://www.zdnet.com/if-microsoft-thinks-old-tor-clients-are-risky-why-not-windows-xp-7000025283/">If Microsoft thinks old Tor clients are risky, why not Windows XP?</a></td>
 </tr>
-
 <tr>
 <td>2014 Jan 15</td>
 <td>Boise Weekly</td>
-<td><a href="http://www.boiseweekly.com/boise/privacy-tools-how-to-safely-browse-the-internet/Content?oid=3040524">
-Privacy Tools: How to Safely Browse the Internet</a></td>
+<td><a href="http://www.boiseweekly.com/boise/privacy-tools-how-to-safely-browse-the-internet/Content?oid=3040524">Privacy Tools: How to Safely Browse the Internet</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Dec 31</td>
 <td>Dawn.com</td>
-<td><a href="http://www.dawn.com/news/1077527/anonymous-the-parallel-internet">
-Anonymous: The Parallel Internet?</a></td>
+<td><a href="http://www.dawn.com/news/1077527/anonymous-the-parallel-internet">Anonymous: The Parallel Internet?</a></td>
 </tr>
-
 <tr>
 <td>2013 Dec 30</td>
 <td>Think Digit</td>
-<td><a href="http://www.thinkdigit.com/Software/Top-free-PC-Security-Tools_19171.html">
-Top free PC Security Tools</a></td>
+<td><a href="http://www.thinkdigit.com/Software/Top-free-PC-Security-Tools_19171.html">Top free PC Security Tools</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Dec 28</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/threatlevel/2013/12/tor-publicity-mixed-blessing/">
-For Tor, Publicity a Mixed Blessing</a></td>
+<td><a href="http://www.wired.com/threatlevel/2013/12/tor-publicity-mixed-blessing/">For Tor, Publicity a Mixed Blessing</a></td>
 </tr>
-
 <tr>
 <td>2013 Dec 18</td>
 <td>SiliconANGLE</td>
-<td><a href="http://siliconangle.com/blog/2013/12/18/bitcoin-weekly-2013-december-18-more-chinese-market-woes-eu-banking-authority-warning-about-btc-tor-project-thumbs-up-bitcoin-donations/">
-Bitcoin Weekly 2013 December 18: More Chinese market upheaval, EU banking
-authority warning about BTC, Tor Project thumbs-up Bitcoin donations</a></td>
+<td><a href="http://siliconangle.com/blog/2013/12/18/bitcoin-weekly-2013-december-18-more-chinese-market-woes-eu-banking-authority-warning-about-btc-tor-project-thumbs-up-bitcoin-donations/">Bitcoin Weekly 2013 December 18: More Chinese market upheaval, EU banking authority warning about BTC, Tor Project thumbs-up Bitcoin donations</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Dec 18</td>
 <td>PC Pro UK</td>
-<td><a href="http://www.pcpro.co.uk/news/386149/tor-accepts-donations-in-bitcoin">
-Tor accepts donations in Bitcoin</a></td>
+<td><a href="http://www.pcpro.co.uk/news/386149/tor-accepts-donations-in-bitcoin">Tor accepts donations in Bitcoin</a></td>
 </tr>
-
 <tr>
 <td>2013 Dec 18</td>
 <td>The Register</td>
-<td><a href="http://www.theregister.co.uk/2013/12/18/tor_project_to_accept_bitcoin_donations/">
-Lovers of Tor can now sprinkle Bitcoins on its developers as thanks</a></td>
+<td><a href="http://www.theregister.co.uk/2013/12/18/tor_project_to_accept_bitcoin_donations/">Lovers of Tor can now sprinkle Bitcoins on its developers as thanks</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Dec 16</td>
 <td>PBS</td>
-<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">
-Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a>
-</td>
+<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a></td>
 </tr>
-
 <tr>
 <td>2013 Dec 5</td>
 <td>Nieman Journalisim Lab</td>
-<td><a href="http://www.niemanlab.org/2013/12/91274/">
-Freedom of the Press Foundation wants to help build secure communication tools
-for journalists</a></td>
+<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools for journalists</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Dec 2</td>
 <td>EFF</td>
-<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">
-An Open Letter Urging Universities To Encourage Conversation About Online Privacy
-</a></td>
+<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">An Open Letter Urging Universities To Encourage Conversation About Online Privacy</a></td>
 </tr>
-
 <tr>
 <td>2013 Nov 26</td>
 <td>TechRepublic</td>
-<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">
-Get a grip on TOR with Vidalia</a></td>
+<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">Get a grip on TOR with Vidalia</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Nov 20</td>
 <td>PBS</td>
-<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">
-Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td>
+<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td>
 </tr>
-
 <tr>
 <td>2013 Nov 10</td>
 <td>Politiken.dk</td>
-<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">
-FAKTA: The Tor Project</a></td>
+<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td>
 </td>
 <tr>
 <tr>
 <td>2013 Nov 5</td>
 <td>The Guardian</td>
-<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">
-What is Tor? A beginner's guide to the privacy tool</a></td>
+<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">What is Tor? A beginner's guide to the privacy tool</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 25</td>
 <td>MIT Technology Review</td>
-<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">
-Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td>
-</tr>
-
+<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td>
+</td>
+<tr>
 <tr>
 <td>2013 Oct 23</td>
 <td>Tom's Guide</td>
-<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">
-What Is Tor? Answers to Frequently Asked Questions</a></td>
+<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">What Is Tor? Answers to Frequently Asked Questions</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 18</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">
-Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
-</tr>
-
+<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
+</td>
+<tr>
 <tr>
 <td>2013 Oct 10</td>
 <td>VentureBeat</td>
-<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">
-TorSearch launches to be the Google of the hidden Internet</a></td>
+<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 8</td>
 <td>InformationWeek</td>
-<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">
-NSA Battles Tor: 9 Facts</a></td>
-</tr>
-
+<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td>
+</td>
+<tr>
 <tr>
 <td>2013 Oct 8</td>
 <td>The Next Web</td>
-<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">
-What is Tor and why does it matter?</a></td>
+<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">What is Tor and why does it matter?</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 7</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">
-How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
-</tr>
-
+<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
+</td>
+<tr>
 <tr>
 <td>2013 Oct 7</td>
 <td>Infosecurity</td>
-<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">
-How Does Law Enforcement 'Subvert' Tor?</a></td>
+<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 4</td>
 <td>Washington Post</td>
-<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">
-Everything you need to know about the NSA and Tor in one FAQ</a></td>
-</tr>
-
+<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">Everything you need to know about the NSA and Tor in one FAQ</a></td>
+</td>
 <tr>
 <tr>
 <td>2013 Oct 4</td>
 <td>eWeek</td>
 <td><a href="http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/">Snowden Leaks Show NSA Targets Tor</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 4</td>
 <td>The Guardian</td>
@@ -1740,7 +1353,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>TIME</td>
 <td><a href="http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/">Docs Reveal NSA Campaign Against Anonymous Tor Network</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 4</td>
 <td>ITProPortal</td>
@@ -1752,7 +1364,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>InfoWorld</td>
 <td><a href="http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244">The Tor teardown, brought to you by goats, giraffes, and Thor's hammer</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 4</td>
 <td>Computerworld</td>
@@ -1764,7 +1375,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Ars Technica</td>
 <td><a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show</a></td>
 </tr>
-
 <tr>
 <td>2013 Oct 4</td>
 <td>CNET</td>
@@ -1776,7 +1386,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>InformationWeek</td>
 <td><a href="http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553">FBI Admits To Tor Server Takeover</a></td>
 </tr>
-
 <tr>
 <td>2013 Sep 16</td>
 <td>Techworld</td>
@@ -1788,7 +1397,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Gizmodo</td>
 <td><a href="http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/">FBI Admits To Hacking Into The Tor Network</a></td>
 </tr>
-
 <tr>
 <td>2013 Sep 13</td>
 <td>Wired</td>
@@ -1800,7 +1408,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Infosecurity</td>
 <td><a href="http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/">Massive Botnet is Behind Tor Usage Spike</a></td>
 </tr>
-
 <tr>
 <td>2013 Sep 11</td>
 <td>MIT Technology Review</td>
@@ -1812,7 +1419,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Tom's Guide</td>
 <td><a href="http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html">Is Tor's Anonymous Internet Still Secure?</a></td>
 </tr>
-
 <tr>
 <td>2013 Sep 9</td>
 <td>TechWeek Europe</td>
@@ -1824,7 +1430,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Gizmodo</td>
 <td><a href="http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241">The Anonymous Internet Is Under Attack</a></td>
 </tr>
-
 <tr>
 <td>2013 Sep 4</td>
 <td>Stuff.co.nz</td>
@@ -1836,7 +1441,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>PC Advisor</td>
 <td><a href="http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/">Tor traffic doubles in a week to reach highest ever level</a></td>
 </tr>
-
 <tr>
 <td>2013 Aug 29</td>
 <td>RT</td>
@@ -1848,7 +1452,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>BBC</td>
 <td><a href="http://www.bbc.co.uk/news/technology-23587620">Users of hidden net advised to ditch Windows</a></td>
 </tr>
-
 <tr>
 <td>2013 Aug 6</td>
 <td>ZDNet</td>
@@ -1860,7 +1463,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>NBC</td>
 <td><a href="http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680">How anonymous? Tor users compromised in child porn takedown</a></td>
 </tr>
-
 <tr>
 <td>2013 Aug 5</td>
 <td>Wired</td>
@@ -1872,7 +1474,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Naked Security</td>
 <td><a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a></td>
 </tr>
-
 <tr>
 <td>2013 Jul 18</td>
 <td>Huffington Post</td>
@@ -1884,7 +1485,6 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Gizmodo</td>
 <td><a href="http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362">The Technology You Need to Protect Against Mass Surveillance</a></td>
 </tr>
-
 <tr>
 <td>2013 Jul 01</td>
 <td>Slice of MIT</td>
@@ -1896,185 +1496,168 @@ Everything you need to know about the NSA and Tor in one FAQ</a></td>
 <td>Mercury News</td>
 <td><a href="http://www.mercurynews.com/business/ci_23561083/how-increase-your-online-privacy">How to increase your online privacy</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 26</td>
 <td>Reason.com</td>
 <td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Surf Without Surveillance: Tor's Karen Reilly</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 22</td>
 <td>TribLIVE</td>
 <td><a href="http://triblive.com/news/allegheny/4191790-74/tor-network-government">Protesters, criminals get around government censors using secret Web network</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 22</td>
 <td>TribLIVE</td>
 <td><a href="http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs">Hidden Web Tor helps average users and criminals avoid government snooping</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 21</td>
 <td>Fast Company</td>
 <td><a href="http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions">NSA cramping your style? Use these easy encryption solutions</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 19</td>
 <td>Help Net Security</td>
 <td><a href="http://www.net-security.org/secworld.php?id=15098">Facebook once again accessible via Tor</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 18</td>
 <td>The Register</td>
 <td><a href="http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/">Tor users locked out of Facebook after wave of dodgy traffic</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 18</td>
 <td>TechWeek Europe</td>
 <td><a href="http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413">Facebook Blocks Tor Users After Heavy Malicious Activity</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 14</td>
 <td>The Salt Lake Tribune</td>
 <td><a href="http://www.sltrib.com/sltrib/world/56463680-68/privacy-data-nsa-disadvantages.html.csp">Ideas for keeping your data safe from spying</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 13</td>
 <td>Boston Globe</td>
 <td><a href="http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.htmlp">How to keep data away from prying eyes</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 12</td>
 <td>Washington Post</td>
 <td><a href="http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html">Secrecy-focused Web services find a mainstream audience</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 11</td>
 <td>Reflex (Czech)</td>
 <td><a href="http://www.reflex.cz/clanek/zpravy/50756/soukromi-na-internetu-uz-neexistuje-ale-porad-je-tu-tor.html">Privacy on the Internet already exists. But there's still Tor</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 10</td>
 <td>Washington Post</td>
 <td><a href="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/">Five ways to stop the NSA from spying on you</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 8</td>
 <td>ZDNet</td>
 <td><a href="http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/">Ask a hacker: Top four anti-surveillance apps</a></td>
 </tr>
-
 <tr>
 <td>2013 Jun 8</td>
 <td>The Hindu</td>
 <td><a href="http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece">Cryptography as a means to counter Internet censorship</a></td>
 </tr>
-
 <tr>
 <td>2013 Apr 23</td>
 <td>The Verge</td>
-<td><a href="http://www.theverge.com/2013/4/24/4259672/world-wide-redacted-inside-irans-private-internet">World Wide [Redacted]: inside Iran's private internet</a></td>
+<td><a
+href="http://www.theverge.com/2013/4/24/4259672/world-wide-redacted-inside-irans-private-internet">World Wide [Redacted]: inside Iran's private internet</a></td>
 </tr>
-
 <tr>
 <td>2012 Dec 17</td>
 <td>Wall Street Journal</td>
 <td><a href="http://online.wsj.com/article/SB10001424127887324677204578185382377144280.html">Tor: An Anonymous, And Controversial, Way to Web-Surf</a></td>
 </tr>
-
 <tr>
 <td>2012 Dec</td>
 <td>Foreign Policy</td>
 <td><a href="http://www.foreignpolicy.com/articles/2012/11/26/the_fp_100_global_thinkers?page=0,48#thinker78">The FP Top 100 Global
 Thinkers</a>. Number 78: Roger, Nick, and Paul from Tor.</td>
 </tr>
-
 <tr>
 <td>2012 Nov 18</td>
 <td>WOUB</td>
 <td><a href="http://woub.org/2012/11/18/future-cyber-security">Conversations from Studio B: The Future of Cybersecurity</a></td>
 </tr>
-
 <tr>
 <td>2012 Oct</td>
 <td>Forskning & Framsteg</td>
-<td><a href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-
+<td><a
+href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-
 hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura
 nätcensuren</a></td>
 </tr>
-
 <tr>
 <td>2012 Oct</td>
 <td>Delta Airlines Sky Magazine</td>
-<td><a href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-
+<td><a
+href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-
 Sight.aspx">Hidden in Plain Sight</a></td>
 </tr>
-
 <tr>
 <td>2012 Sep 20</td>
 <td>EFF</td>
-<td>Tor named as one of the 2012 <a href="https://www.eff.org/awards/pioneer">EFF Pioneer Awards</a></td>
+<td>Tor named as one of the 2012 <a
+href="https://www.eff.org/awards/pioneer">EFF Pioneer Awards</a></td>
 </tr>
-
 <tr>
 <td>2012 Sep 19</td>
 <td>infoBAE</td>
-<td><a href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en
+<td><a
+href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en
 -la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la
 web 100% anónimas y seguras</a></td>
 </td>
 <tr>
 <td>2012 Aug 24</td>
 <td>security.nl</td>
-<td><a href="https://secure.security.nl/artikel/42807/1/
+<td><a
+href="https://secure.security.nl/artikel/42807/1/
 Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar
 Facebook ondanks privacyrisico</a></td>
 </tr>
-
 <tr>
 <td>2012 Jul 19</td>
 <td>Philadelphia Inquirer</td>
-<td><a href="http://www.philly.com/philly/business/
+<td><a
+href="http://www.philly.com/philly/business/
 20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life:
 Fostering anonymity online</a></td>
 </tr>
-
 <tr>
 <td>2012 Jul 13</td>
 <td>NATO</td>
-<td><a href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-
+<td><a
+href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-
 during-the-arab-spring/">Social Media and Online Anonymity during the
 Arab Spring</a></td>
 </tr>
-
 <tr>
 <td>2012 Jun 19</td>
 <td>Nieman Journalism Lab</td>
-<td><a href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists
+<td><a
+href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists
 -and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project
 helps journalists and whistleblowers go online without leaving a
 trace.</a></td>
 </tr>
-
 <tr>
 <td>2012 Jun 18</td>
 <td>Poynter</td>
-<td><a href="http://www.poynter.org/latest-news/top-stories/177642/news-
+<td><a
+href="http://www.poynter.org/latest-news/top-stories/177642/news-
 challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6
 projects focused on networks</td>
 </tr>
-
 <tr>
 <td>2012 Jun 18</td>
 <td>Knight Foundation</td>
@@ -2083,327 +1666,324 @@ Foundation funds project to protect journalists and their sources
 worldwide by providing them with a toolkit to preserve their anonymity
 online.</td>
 </tr>
-
 <tr>
 <td>2012 Jun 15</td>
 <td>BBC</td>
 <td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia
 clamps down on Skype and other internet use on Tor</td>
 </tr>
-
 <tr>
 <td>2012 Apr 30</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-
+<td><a
+href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-
 projects-new-tool-aims-to-map-out-internet-censorship/">The Tor
 Project's New Tool Aims To Map Out Internet Censorship</a></td>
 </tr>
-
 <tr>
 <td>2012 Apr 20</td>
 <td>The Guardian</td>
-<td><a href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-
+<td><a
+href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-
 battle-internet">Hacktivists in the frontline battle for the
 internet</td>
 </tr>
-
 <tr>
 <td>2012 Apr 19</td>
 <td>The Guardian</td>
-<td><a href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-
+<td><a
+href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-
 authenticity-anonymity">Online identity: is authenticity or anonymity
 more important?</td>
 </tr>
-
 <tr>
 <td>2012 Apr 03</td>
 <td>V3</td>
-<td><a href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover
+<td><a
+href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover
 -key-chinas-tor-blocking">Swedish researchers uncover key to China's
 Tor-blocking system</a></td>
 </tr>
-
 <tr>
 <td>2012 Apr 02</td>
 <td>The Guardian</td>
-<td><a href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-
+<td><a
+href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-
 warn-government-email-surveillance">Internet companies warn over
 government email surveillance plans</a></td>
 </td>
 <tr>
 <td>2012 Mar 22</td>
 <td>Reuters</td>
-<td><a href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-
+<td><a
+href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-
 idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on
 citizens</a></td>
 </tr>
-
 <tr>
 <td>2012 Mar 08</td>
 <td>Boston Globe</td>
-<td><a href="http://articles.boston.com/2012-03-08/business/31136655_1_law-
+<td><a
+href="http://articles.boston.com/2012-03-08/business/31136655_1_law-
 enforcement-free-speech-technology">Privacy software. Unintended
 consequences of Walpole firm's technology.</a></td>
 </tr>
-
 <tr>
 <td>2012 Mar 02</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-
+<td><a
+href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-
 privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">
 Google's new privacy policy: what has changed and what you can do about
 it</a></td>
 </tr>
-
 <tr>
 <td>2012 Mar 01</td>
 <td>Edmonton Journal</td>
-<td><a href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-
+<td><a
+href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-
 with-tor/">Get your privacy on with Tor</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 28</td>
 <td>PC World</td>
-<td><a href="https://www.pcworld.com/article/250943/
+<td><a
+href="https://www.pcworld.com/article/250943/
 https_everywhere_update_now_reports_website_weaknesses.html">HTTPS
 Everywhere Update: Now Reports Website Weaknesses</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 27</td>
 <td>GigaOM</td>
-<td><a href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-
+<td><a
+href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-
 balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 15</td>
 <td>Le Monde</td>
-<td><a href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-
+<td><a
+href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-
 outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un
 nouvel outil contre la cybercensure testé en Iran</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 13</td>
 <td>IDG NL webwereld</td>
-<td><a href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-
+<td><a
+href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-
 https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 13</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-
+<td><a
+href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-
 project-helps-iran-get-back-online-amidst-internet-censorship-regime.
 ars">Tor's latest project helps Iran get back online despite new
 Internet censorship regime</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 13</td>
 <td>Radio Farda</td>
-<td><a href="http://www.radiofarda.com/content/
+<td><a
+href="http://www.radiofarda.com/content/
 f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">
 «تور» با پروژه‌ای جدید به جنگ فیلترینگ در ایران می‌رود "</a></td>
 </td>
 </tr>
-
 <tr>
 <td>2012 Feb 11</td>
 <td>ITP</td>
-<td><a href="http://www.itp.net/587901-iran-increases-web-censorship">Iran
+<td><a
+href="http://www.itp.net/587901-iran-increases-web-censorship">Iran
 increases web censorship</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 10</td>
 <td>CNet News</td>
-<td><a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-
+<td><a
+href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-
 project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project
 looks to help Iranians sidestep Net ban</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 10</td>
 <td>Linkiesta</td>
 <td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i
 dissidenti in Internet, la guerra in Iran è già iniziata</a></td>
 </tr>
-
 <tr>
 <td>2012 Feb 10</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-
+<td><a
+href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-
 cracks-down-online-tor-tests-undetectable-encrypted-connections/">As
 Iran Cracks Down Online, Tor Tests Undetectable Encrypted
 Connections</a></td>
 </tr>
-
 <tr>
 <td>2012 Jan 24</td>
 <td>PC Pro UK</td>
-<td><a href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of-
+<td><a
+href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of-
 tor-censorship">O2 plays down accusations of Tor censorship</a></td>
 </tr>
-
 <tr>
 <td>2012 Jan 24</td>
 <td>Broadband Choice UK</td>
-<td><a href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-
+<td><a
+href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-
 providers-are-blocking-tor-801273330/">ORG says mobile broadband
 providers are blocking Tor</a></td>
 </td>
 <tr>
 <td>2012 Jan 24</td>
 <td>PC Welt</td>
-<td><a href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in
+<td><a
+href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in
 -neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td>
 </tr>
-
 <tr>
 <td>2011 Dec 30</td>
 <td>BNR Digital</td>
-<td><a href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-
+<td><a
+href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-
 censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder
 Tor wordt gecensureerd</a></td>
 </tr>
-
 <tr>
 <td>2011 Dec 30</td>
 <td>Deutsche Welle</td>
 <td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit
 dem Zensor Katz-und-Maus spielen</a></td>
 </tr>
-
 <tr>
 <td>2011 Dec 29</td>
 <td>Boing Boing</td>
-<td><a href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.
+<td><a
+href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.
 html">State of the arms race between repressive governments and
 anti-censorship/surveillance Tor technology (and why American companies
 are on the repressive governments' side)</a></td>
 </tr>
-
 <tr>
 <td>2011 Dec 28</td>
 <td>ZDNet Asia</td>
-<td><a href="http://www.zdnetasia.com/tor-project-creates-safer-internet-
+<td><a
+href="http://www.zdnetasia.com/tor-project-creates-safer-internet-
 62303332.htm">Tor Project creates safer Internet</a></td>
 </tr>
-
 <tr>
 <td>2011 Dec 01</td>
 <td>itbusiness.ca</td>
-<td><a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">
+<td><a
+href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">
 Convenience technology threatening personal privacy, experts
 say</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 21</td>
 <td>Spiegel Online</td>
-<td><a href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas
+<td><a
+href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas
 Internet-Zensoren testen neue Filter</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 20</td>
 <td>China Digital Times</td>
-<td><a href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-
+<td><a
+href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-
 tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/"
 >Government Blocks Encrypted Tunnels Through Great Firewall; Fang
 Binxing Talks Internet Sovereignty</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 23</td>
 <td>IT Security Belgium</td>
-<td><a href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-
+<td><a
+href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-
 service">Tor Project is tapping Amazon’s EC2 cloud service</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 22</td>
 <td>Boing Boing</td>
-<td><a href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.
+<td><a
+href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.
 html">Tor project asks supporters to set up virtual Tor bridges in
 Amazon's cloud</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 18</td>
 <td>Dagens IT</td>
 <td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i
 den kinesiske internett-muren</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 16</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-
+<td><a
+href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-
 firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great
 Firewall Tests Mysterious Scans On Encrypted Connections</a></td>
 </tr>
-
 <tr>
 <td>2011 Nov 15</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-
+<td><a
+href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-
 yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself
 privacy bridge in Amazon cloud</a></td>
 </tr>
-
 <tr>
 <td>2011 Aug 28</td>
 <td>The Tor Project</td>
-<td>The Tor Project announces a <a href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of
+<td>The Tor Project announces a <a
+href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of
 the Tor software.</td>
 </tr>
-
 <tr>
 <td>2011 Aug 22</td>
 <td>VOA News: Asia</td>
-<td><a href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-
+<td><a
+href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-
 for-Now-128178623.html">Some
 Chinese Surf Freely, for Now</a></td>
 </tr>
-
 <tr>
 <td>2011 Aug 01</td>
 <td>Peace & Conflict Review</td>
-<td><a href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor,
+<td><a
+href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor,
 Anonymity, and the Arab Spring: An Interview with Jacob
 Appelbaum</a></td>
 </tr>
-
 <tr>
 <td>2011 June 18</td>
 <td>CNN: Tech</td>
-<td><a href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.
+<td><a
+href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.
 revolution/index.html">Starting
 a revolution with technology</a></td>
 </tr>
-
 <tr>
 <td>2011 June 12</td>
 <td>CNN: Tech</td>
-<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/
+<td><a
+href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/
 index.html">Wiping
 away whistle-blowers' online fingerprints</a></td>
 </tr>
-
 <tr>
 <td>2011 May 14</td>
 <td>BBC: Click</td>
-<td><a href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">
+<td><a
+href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">
 Andrew
 and Dr. Angela Sasse from UCL were interviewed by the BBC Click program
 about why Internet Anonymity is important and valuable in a modern,
 networked society.</a></td>
 </tr>
-
 <tr>
 <td>2011 March 29</td>
 <td>CNN: Situation Room</td>
@@ -2411,169 +1991,166 @@ networked society.</a></td>
 featured in a segment about US companies providing censorship to
 repressive regimes and those circumventing their products.</a></td>
 </tr>
-
 <tr>
 <td>2011 March 18</td>
 <td>Telegraph</td>
-<td><a href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/
+<td><a
+href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/
 Iran-cracks-down-on-web-dissident-technology.html">Iran
 cracks down on web dissident technology</a></td>
 </tr>
-
 <tr>
 <td>2011 March 17</td>
 <td>BusinessWeek</td>
-<td><a href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.
+<td><a
+href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.
 htm">Social
 Networking: Fighting to Remain Anonymous</a></td>
 </tr>
-
 <tr>
 <td>2011 March 10</td>
 <td>NyTeknik</td>
-<td><a href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.
+<td><a
+href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.
 ece">Svenska
 biståndspengar till Facebookrevolutionen</a></td>
 </tr>
-
 <tr>
 <td>2011 March 09</td>
 <td>Washington Post</td>
-<td><a href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/
+<td><a
+href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/
 AR2011030905157_pf.html">U.S.
 funding tech firms that help Mideast dissidents evade government
 censors</a></td>
 </tr>
-
 <tr>
 <td>2011 February 17</td>
 <td>Walpole Times</td>
-<td><a href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-
+<td><a
+href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-
 Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-
 protests">Tor
 Project, a Walpole-based company, helps Egyptians avoid Internet
 censorship during protests</a></td>
 </tr>
-
 <tr>
 <td>2011 January 31</td>
 <td>NPR: WBUR</td>
-<td><a href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">
+<td><a
+href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">
 Here
 & Now: U.S. Activists Help Egyptian Protesters Elude Government
 Censorship Online</a></td>
 </tr>
-
 <tr>
 <td>2011 February 01</td>
 <td>Discovery News</td>
-<td><a href="http://news.discovery.com/tech/egypt-internet-online-protesters-
+<td><a
+href="http://news.discovery.com/tech/egypt-internet-online-protesters-
 110201.html">Egypt's
 Internet Block Incomplete But Damaging</a></td>
 </tr>
-
 <tr>
 <td>2011 January 31</td>
 <td>IDG Poland</td>
-<td><a href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.
+<td><a
+href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.
 szukaja.alternatyw.html">Egipt
 blokuje Internet, aktywiści szukają alternatyw</a></td>
 </tr>
-
 <tr>
 <td>2011 January 31</td>
 <td>New Scientist</td>
-<td><a href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains
+<td><a
+href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains
 -officially-offli.html">How
 Egypt is getting online</a></td>
 </tr>
-
 <tr>
 <td>2011 January 31</td>
 <td>El Pais</td>
-<td><a href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe
+<td><a
+href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe
 /fax/elpepuint/20110130elpepuint_14/Tes">Sortear
 la censura a golpe de fax</a></td>
 </tr>
-
 <tr>
 <td>2011 January 30</td>
 <td>Fox 25 News - Boston</td>
-<td><a href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give
+<td><a
+href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give
 -egyptians-internet-access-20110130">Local
 company helps give Egyptians internet access</a></td>
 </tr>
-
 <tr>
 <td>2011 January 30</td>
 <td>New England Cable News</td>
-<td><a href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-
+<td><a
+href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-
 onlin/landing.html?blockID=400628&feedID=4213">Mass.
 company helps activists avoid online government censorship</a></td>
 </tr>
-
 <tr>
 <td>2011 January 30</td>
 <td>Boston Globe</td>
-<td><a href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30
+<td><a
+href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30
 /mass_groups_software_helps_avoid_censorship/">Foreign
 activists stay covered online</a></td>
 </tr>
-
 <tr>
 <td>2011 January 29</td>
 <td>SvD.se</td>
-<td><a href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-
+<td><a
+href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-
 natdissidenter_5902693.svd">Tor
 öppnar dörrar för nätdissidenter</a></td>
 </tr>
-
 <tr>
 <td>2011 January 29</td>
 <td>ComputerWorld</td>
-<td><a href="http://www.computerworld.com/s/article/9207058/
+<td><a
+href="http://www.computerworld.com/s/article/9207058/
 Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">
 Without
 Internet, Egyptians find new ways to get online.</a></td>
 </tr>
-
 <tr>
 <td>2011 January 28</td>
 <td>Globe and Mail</td>
-<td><a href="https://www.theglobeandmail.com/news/technology/in-a-span-of-
+<td><a
+href="https://www.theglobeandmail.com/news/technology/in-a-span-of-
 minutes-a-country-goes-offline/article1887207/">In
 a span of minutes, a country goes offline</a></td>
 </tr>
-
 <tr>
 <td>2010 December 22</td>
 <td>Technology Review</td>
 <td><a href="http://www.technologyreview.com/web/26981/">Home Internet
 with Anonymity Built In</a></td>
 </tr>
-
 <tr>
 <td>2010 December 17</td>
 <td>New York Times Magazine</td>
-<td><a href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">
+<td><a
+href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">
 Granting
 Anonymity</a></td>
 </tr>
-
 <tr>
 <td>2010 November 03</td>
 <td>metro sverige</td>
-<td><a href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-
+<td><a
+href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-
 anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td>
 </tr>
-
 <tr>
 <td>2010 Sept 17</td>
 <td>NPR: On the media</td>
 <td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
 Media: Interview with Jacob Appelbaum</a>.</td>
 </tr>
-
 <tr>
 <td>2010 Sept 16</td>
 <td>The Tor Project</td>
@@ -2581,69 +2158,67 @@ Media: Interview with Jacob Appelbaum</a>.</td>
 press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look
 for in a Circumvention Tool</a>.</td>
 </tr>
-
 <tr>
 <td>2010 August 01</td>
 <td>PC Format - Poland</td>
-<td><a href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-
+<td><a
+href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-
 facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
 and Facebook are spying on us</a></td>
 </tr>
-
 <tr>
 <td>2010 July 14</td>
 <td>China Rights Forum</td>
-<td><a href="http://www.hrichina.org/public/contents/category?cid=175033">China
+<td><a
+href="http://www.hrichina.org/public/contents/category?cid=175033">China
 Rights Forum, No. 2 - “China’s Internet”: Staking Digital
 Ground</a></td>
 </tr>
-
 <tr>
 <td>2010 May 25</td>
 <td>The Australian</td>
-<td><a href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-
+<td><a
+href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-
 network-to-fight-censorship/story-e6frgakx-1225870756466">
 Call to join Tor network to fight censorship</a></td>
 </tr>
-
 <tr>
 <td>2010 Mar 25</td>
 <td>The Tor Project</td>
 <td>Tor and Printfection launch <a href="<page
 press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td>
 </tr>
-
 <tr>
 <td>2010 Mar 17</td>
 <td>PC World Poland</td>
-<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity
+<td><a
+href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity
 in the Web</a></td>
 </tr>
-
 <tr>
 <td>2010 Mar 11</td>
 <td>ABC Australia</td>
-<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">
+<td><a
+href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">
 Future Tense:  The Deep Web</a></td>
 </tr>
-
 <tr>
 <td>2010 Mar 09</td>
 <td>PC Pro UK</td>
-<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">
+<td><a
+href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">
 The dark
 side of the web</a></td>
 </tr>
-
 <tr>
 <td>2009 Dec 29</td>
 <td>Times Online</td>
-<td><a href="http://www.timesonline.co.uk/tol/news/world/middle_east/
+<td><a
+href="http://www.timesonline.co.uk/tol/news/world/middle_east/
 article6969958.ece">When
 Iran’s regime falls this will be remembered as the YouTube revolution
 </a></td>
 </tr>
-
 <tr>
 <td>2009 Oct 15</td>
 <td>Technology Review</td>
@@ -2651,341 +2226,354 @@ Iran’s regime falls this will be remembered as the YouTube revolution
 Cracks Down
 on Tor Anonymity Network</a></td>
 </tr>
-
 <tr>
 <td>2009 Sep 30</td>
 <td>BusinessWeek</td>
-<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/
+<td><a
+href="http://www.businessweek.com/globalbiz/content/sep2009/
 gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
 </tr>
-
 <tr>
 <td>2009 Aug 19</td>
 <td>Reuters</td>
-<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?
+<td><a
+href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?
 pageNumber=1&virtualBrandChannel=0&sp=true">Web tools help
 protect human
 rights activists</a></td>
 </tr>
-
 <tr>
 <td>2009 Aug 10</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How
+<td><a
+href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How
 to Build Anonymity Into the Internet</a></td>
 </tr>
-
 <tr>
 <td>2009 Jul 26</td>
 <td>Washington Times</td>
-<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-
+<td><a
+href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-
 dodge-internet-censorship/">Senate OKs funds to thwart Iran Web
 censors</a></td>
 </tr>
-
 <tr>
 <td>2009 Jul 26</td>
 <td>Boston Globe</td>
-<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/
+<td><a
+href="http://www.boston.com/news/nation/washington/articles/2009/07/26/
 us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike
 aid aimed
 at Iranians</a></td>
 </tr>
-
 <tr>
 <td>2009 Jul 24</td>
 <td>Associated Press</td>
-<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-
+<td><a
+href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-
 p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude
 crackdown on
 Internet</a></td>
 </tr>
-
 <tr>
 <td>2009 Jul 08</td>
 <td>Tehran Bureau</td>
-<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
+<td><a
+href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
 Around the Globe Rally to Help Iranians Online</a></td>
 </tr>
-
 <tr>
 <td>2009 Jul 02</td>
 <td>NED/CIMA</td>
 <td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role
 of New Media in the Iranian Elections</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 26</td>
 <td>Washington Times</td>
-<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-
+<td><a
+href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-
 navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian
-protesters avoid censorship with Navy technology</a></td>
+protesters avoid
+censorship with Navy technology</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 29</td>
 <td>EFF</td>
-<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-
+<td><a
+href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-
 relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor
 Relay</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 24</td>
 <td>Daily Finance</td>
-<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-
+<td><a
+href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-
 controversy/">Nokia and Siemens in Iran controversy</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 18</td>
 <td>Wall Street Journal</td>
-<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-
+<td><a
+href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-
 anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 19</td>
 <td>O'Reilly Radar</td>
-<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">
+<td><a
+href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.
+html">
 Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor
-Project and the EFF</a></td>
+Project
+and the EFF</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 18</td>
 <td>Deutsche Welle</td>
-<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">
-Internet proxies let Iranians and others connect to blocked Web sites</a></td>
+<td><a
+href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet
+proxies let Iranians and others connect to blocked Web sites</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 18</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/web/22893/">
-The Web vs. the Republic of Iran</a></td>
+<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the
+Republic of Iran</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 17</td>
 <td>CNet News</td>
-<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">
-Iranians find ways to bypass Net censors</a></td>
+<td><a
+href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find
+ways to bypass Net censors</a></td>
 </tr>
-
 <tr>
 <td>2009 Jun 17</td>
 <td>ComputerWorld</td>
-<td><a href="http://www.computerworld.com/action/article.do?command=
-viewArticleBasic&articleId=9134471&intsrc=news_ts_head">
-Iran's leaders fight Internet; Internet wins (so far)</a></td>
+<td><a
+href="http://www.computerworld.com/action/article.do?command=
+viewArticleBasic&articleId=9134471&intsrc=news_ts_head">Iran's
+leaders fight Internet;
+Internet wins (so far)</a></td>
 </tr>
-
 <tr>
 <td>2009 May 29</td>
 <td>Le Monde</td>
-<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-
+<td><a
+href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-
 censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
 </tr>
-
 <tr>
 <td>2009 May 15</td>
 <td>Mass High Tech</td>
-<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-
-tackles-Net-privacy-game-makers-flock-to-Hub.html">
-Tor tackles Net privacy</a></td>
+<td><a
+href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-
+tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net
+privacy</a></td>
 </tr>
-
 <tr>
 <td>2009 May 01</td>
 <td>New York Times</td>
-<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">
-Iranians and Others Outwit Net Censors</a></td>
+<td><a
+href="http://www.nytimes.com/2009/05/01/technology/01filter.html">
+Iranians and
+Others Outwit Net Censors</a></td>
 </tr>
-
 <tr>
 <td>2009 Apr 23</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/computing/22427/?a=f">
-Dissent Made Safer:  How anonymity technology could save free speech on the
+<td><a
+href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made
+Safer:  How anonymity technology could save free speech on the
 Internet.</a></td>
 </tr>
-
 <tr>
 <td>2009 Apr 22</td>
 <td>Le Monde</td>
-<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la
+<td><a
+href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la
 -cybersurveillance/">How to circumvent cybersurveillance</a></td>
 </tr>
-
 <tr>
 <td>2009 Apr 06</td>
 <td>Reader's Digest</td>
-<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/
+<td><a
+href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/
 article122219.html">How to Hide Anything</a></td>
 </tr>
-
 <tr>
 <td>2009 Apr 06</td>
 <td>Al Jazeera</td>
-<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">
-Global Village Voices showcases Tor</a></td>
+<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
+Voices showcases Tor</a></td>
 </tr>
-
 <tr>
 <td>2009 Mar 18</td>
 <td>Marie Claire</td>
-<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">
-How to Manage Your Web Footprint</a></td>
+<td><a
+href="http://www.marieclaire.com/career-money/career-coach/manage-online
+--web-image">How to Manage Your Web Footprint</a></td>
 </tr>
-
 <tr>
 <td>2009 Mar 13</td>
 <td>Wall Street Journal</td>
-<td><a href="http://online.wsj.com/article/SB123567809587886053.html">
-The Kindness of Strangers</a></td>
+<td><a
+href="http://online.wsj.com/article/SB123567809587886053.html">The
+Kindness of Strangers</a></td>
 </tr>
-
 <tr>
 <td>2009 Mar 12</td>
 <td>The Tor Project</td>
-<td>Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>">
-performance roadmap</a> and campaign.</td>
+<td>Tor launches a <a href="<page
+press/2009-03-12-performance-roadmap-press-release>">performance
+roadmap</a> and campaign.</td>
 </tr>
-
 <tr>
 <td>2009 Mar 12</td>
 <td>BBC World Service</td>
-<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-
+<td><a
+href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-
 world-day-against-cyber-censorship/">Steven J Murdoch interviewed about
 Tor and Censorship</a></td>
 </tr>
-
 <tr>
 <td>2009 Mar 03</td>
 <td>Orf Austria</td>
-<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER
+<td><a
+href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER
 column</a></td>
 </tr>
-
 <tr>
 <td>2009 Feb 18</td>
 <td>Bangkok Post</td>
-<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-
+<td><a
+href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-
 not-found-routine">The old fake "404 not found" routine</a></td>
 </tr>
-
 <tr>
 <td>2009 Feb 13</td>
 <td>Hearsay Culture</td>
-<td><a href="http://www.hearsayculture.com/?p=307">
-Hearsay Culture Radio Interview/Podcast</a></td>
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio
+Interview/Podcast</a></td>
 </tr>
-
 <tr>
 <td>2008 Dec 29</td>
 <td>nu.nl</td>
-<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">
-Anoniem browsen voor gsm in de maak</a></td>
+<td><a
+href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-
+maak.html">Anoniem browsen voor gsm in de maak</a></td>
 </tr>
-
 <tr>
 <tr>
 <td>2008 Dec 19</td>
 <td>The Tor Project</td>
-<td>Tor announces 3-year <a href="<page press/2008-12-19-roadmap-press-release>">
-development roadmap</a>.</td>
+<td>Tor announces 3-year <a href="<page
+press/2008-12-19-roadmap-press-release>">development roadmap</a>.</td>
 </tr>
-
 <tr>
 <td>2008 Dec 14</td>
 <td>PC Magazine: Middle & Near East</td>
-<td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">
-How To Reclaim Your Online Privacy</a></td>
+<td><a
+href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To
+Reclaim Your Online Privacy</a></td>
 </tr>
-
 <tr>
 <td>2008 Aug 21</td>
 <td>CNN</td>
-<td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">
-Experts: Internet filtering and censorship rife</a></td>
+<td><a
+href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">
+Experts:
+Internet filtering and censorship rife</a></td>
 </tr>
-
 <tr>
 <td>2008 Aug 22</td>
 <td>The Sydney Morning Herald</td>
-<td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/
+<td><a
+href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/
 1218911800889.html">The
 China Syndrome</a></td>
 </tr>
-
 <tr>
 <td>2008 Aug 20</td>
 <td>Scientific American</td>
-<td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">
-Cryptography: How to Keep Your Secrets Safe</a></td>
+<td><a
+href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-
+secrets-safe">Cryptography:
+How to Keep Your Secrets Safe</a></td>
 </tr>
-
 <tr>
 <td>2008 Aug 05</td>
 <td>Guardian UK</td>
-<td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">
-Vaulting the great firewall</a></td>
+<td><a
+href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.
+censorship">
+Vaulting
+the great firewall</a></td>
 </tr>
-
 <tr>
 <td>2008 Aug 10</td>
 <td>Tech Radar UK</td>
-<td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">
-Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous
-surfing for the paranoid</a>
+<td><a
+href="http://www.techradar.com/news/internet/web/freedom-stick-
+highlights-chinese-net-censorship-449233">Freedom
+Stick highlights Chinese 'net censorship: USB drive promises anonymous
+surfing
+for the paranoid</a>
 </td>
 </tr>
-
 <tr>
 <td>2008 Aug 07</td>
 <td>Spiegel</td>
-<td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">
-Tricks gegen Zensur und Überwachung</a>
+<td><a
+href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks
+gegen Zensur und Überwachung</a>
 </td>
 </tr>
-
 <tr>
 <td>2008 Aug 07</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">
-15 Great, Free Privacy Downloads</a>.  Tor is Number 1.</td>
+<td><a
+href="http://www.pcworld.com/article/149399-3/
+15_great_free_privacy_downloads.html">15
+Great, Free Privacy Downloads</a>.  Tor is Number 1.
+</td>
 </tr>
-
 <tr>
 <td>2008 Aug 07</td>
 <td>The Guardian UK</td>
-<td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">
-Chaos aims to crack China's wall</a>
+<td><a
+href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.
+hacking">Chaos
+aims to crack China's wall</a>
 </td>
 </tr>
-
 <tr>
 <td>2008 Aug 07</td>
 <td>The Register UK</td>
-<td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">
-German hackers poke hole in great firewall of China</a>
+<td><a
+href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">
+German
+hackers poke hole in great firewall of China</a>
 </td>
 </tr>
-
 <tr>
 <td>2008 May 24</td>
 <td>Groupo Estado</td>
-<td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525">
-Interview at Computers, Freedom, and Privacy 2008 Conference</a>
+<td><a
+href="http://blog.estadao.com.br/blog/cruz/?title=
+cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&amp
+;cat=525">Interview
+at Computers, Freedom, and Privacy 2008 Conference</a>
 </td>
 </tr>
-
 <tr>
 <td>2008 Mar 12</td>
 <td>SearchSecurity.com</td>
-<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">
+<td><a
+href="http://searchsecurity.techtarget.com/news/article/0,289142,
+sid14_gci1305120,00.html">
 Tor network 'bridges' help evade blockers</a>.
 Covers new Tor features designed to overcome filtering and blocking that
 prevent
@@ -2993,53 +2581,58 @@ access
 to the Tor network.
 </td>
 </tr>
-
 <tr>
 <td>2008 Feb 14</td>
 <td>Wired: Compiler Blog</td>
-<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
+<td><a
+href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
 How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
 </td>
 </tr>
-
 <tr>
 <td>2008 Feb 01</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
+<td><a
+href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
 Hackers Can Expose Masked Surfers, Study Says</a>
-A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
-Steven Murdoch's recent PhD thesis</a>. Steven
-<a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
+A report on <a
+href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-
+vulnerabilities-in-anonymity-systems/">
+Steven Murdoch's recent PhD thesis</a>. Steven <a
+href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-
+anonymity-systems%2526quot%3B">
 responds on the Tor Blog</a>.</td>
 </tr>
-
 <tr>
 <td>2007 Sep 21</td>
 <td>Wired HowTo Blog</td>
-<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
-Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to
+<td><a
+href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=
+be_a_whistle_blower;action=display;category=Work">Be a
+Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to
 remain anonymous.</td>
 </tr>
-
 <tr>
 <td>2007 Sep 16</td>
 <td>Cnet</td>
 <td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor
 anonymity server admin arrested</a>.  A Tor exit node operator from
 Germany was arrested and then released once the police realized their
-mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html">
-caused this operator to shut down the node</a>. We have an
-<a href="<page docs/faq-abuse>">Abuse FAQ for Tor Relay Operators</a>,
-as well as a
-<a href="<page eff/tor-legal-faq>">Legal FAQ for Tor Relay Operators</a>
-with advice on how to handle such issues if you are operating a Tor relay.</td>
+mistake. Unfortunately, the hassle <a
+href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-
+after-run-in-with-police-i-cant-do-this-any-more.html"> caused this
+operator to shut down the node</a>.  We have an <a href="<page
+docs/faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a
+href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a>
+with advice on how to handle such issues if you are operating a Tor
+relay.</td>
 </tr>
-
 <tr>
 <td>2007 Sep 10</td>
 <td>Wired</td>
-<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
-Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/>
+<td> <a
+href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks"
+> Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/>
 Swedish computer security consultant Dan Egerstad monitored the traffic
 going through a Tor exit node he was running, then published unencrypted
 account and password information.  Note that the better articles
@@ -3047,57 +2640,61 @@ covering this event correctly indicate that this is not a security flaw
 or design problem with Tor - Tor provides anonymity, but does not
 encrypt anything going to or from an exit node. You
 <strong>must</strong> use SSL (https) while browsing to ensure
-end-to-end encryption.  Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
-The Inquirer</a>,
-<a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
-InfoWorld</a>,
-<a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2">
-The Sydney Morning Herald</a>,
-<a href="http://www.securityfocus.com/news/11486">Security Focus</a>,
-<a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html">
-ars technica</a>,
-and many others. It was reported as early as August 31, 2007 on the
-<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
+end-to-end encryption.  Also covered in <a
+href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network
+-exposes-sensitive-information"> The Inquirer</a>, <a
+href="http://www.infoworld.com/article/07/09/10/Security-researcher-
+intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">
+InfoWorld</a>, <a
+href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=
+fullpage#
+contentSwap2">The Sydney Morning Herald</a>, <a
+href="http://www.securityfocus.com/news/11486">Security Focus</a>, <a
+href="http://arstechnica.com/news.ars/post/20070910-security-expert-used
+-tor-to-collect-government-e-mail-passwords.html"> ars technica</a>, and
+many others. It was reported as early as August 31, 2007 on the <a
+href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html">
 Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the
 information via his Tor exit node.  In the end, Mr. Egerstad was
-arrested, which was covered by
-<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/">
-The Register</a>,
-<a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1">
-The Sydney Morning Herald</a>,
-<a href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and
-<a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html">
+arrested, which was covered by <a
+href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/"> The
+Register</a>, <a
+href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-
+year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1"> The
+Sydney Morning Herald</a>, <a
+href="http://blogs.zdnet.com/Berlind/?p=900"> ZDNet</a>, and <a
+href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html">
 Wired Blog</a>.</td>
 </tr>
-
 <tr>
 <td>2007 Jul 27</td>
 <td>Wired Blog</td>
-<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html">
-Cyber Jihadists Embrace Tor</a><br/> A pointer to a
-<a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html">
-blog</a> that posted screenshots of Arabic instructions on using Tor,
+<td><a
+href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html">
+Cyber Jihadists Embrace Tor</a><br/> A pointer to a <a
+href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"
+> blog</a> that posted screenshots of Arabic instructions on using Tor,
 ostensibly for jihadists. Make sure to read Shava Nerad's reply at the
 bottom of the article.</td>
 </tr>
-
 <tr>
 <td>2007 Jun 22</td>
 <td>Bangkok Post</td>
-<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388">
-The problems with censorship</a>.  Mentions anecdotes that
+<td> <a
+href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=
+72388"> The problems with censorship</a>.  Mentions anecdotes that
 "everyone" has Tor installed in Thailand to avoid censorship.</td>
 </tr>
-
 <tr>
 <td>2007 Mar 15</td>
 <td>World Changing</td>
 <td><a href="http://www.worldchanging.com/archives/006309.html">
 Blogging Where Speech Isn’t Free</a><br/> Coverage of former Tor
-Executive Director Shava Nerad's participation at an <a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&id=IAP060124"> SXSW panel</a>, where she explained how Tor can help
+Executive Director Shava Nerad's participation at an <a
+href="http://2007.sxsw.com/interactive/programming/panels/?action=show&
+amp;id=IAP060124"> SXSW panel</a>, where she explained how Tor can help
 bloggers.</td>
 </tr>
-
 <tr>
 <td>2007 Mar 8</td>
 <td>Security Focus</td>
@@ -3106,7 +2703,6 @@ proposed to catch criminals</a>.  Coverage of a toolset called "Torment"
 for monitoring exit nodes, and responses from the Tor Project
 illustrating why this approach may not be a good idea.</td>
 </tr>
-
 <tr>
 <td>2007 Feb 1</td>
 <td>Dr Dobb's</td>
@@ -3114,49 +2710,46 @@ illustrating why this approach may not be a good idea.</td>
 Protects Anonymous Sources</a>.  An introduction to Tor, including
 technical and historical background. </td>
 </tr>
-
 <tr>
 <td>2006 Oct 19</td>
 <td>Wired Threat Level</td>
-<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
+<td><a
+href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html">
 The Onion Router (TOR) is Leaky (Leeky)</a>.  Explains why you need
 something like Privoxy in addition to the core Tor code to ensure your
 anonymity. If you use the Vidalia bundle, it installs and configures
 Privoxy automatically, but it can't hurt to understand why it is
 necessary.</td>
 </tr>
-
 <tr>
 <td>2006 Aug 18</td>
 <td>NPR</td>
-<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
+<td><a
+href="http://www.npr.org/templates/story/story.php?storyId=5168456">
 Tips for Protecting Privacy Online</a>.  Kevin Bankston of the EFF
 recommends Tor during an NPR interview.  Tor information begins at 8:15
 into the program.</td>
 </tr>
-
 <tr>
 <td>2006 Jul 5</td>
 <td>MSNBC</td>
-<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/">
-Defending liberties in high-tech world</a>. Mentions EFF funding for Tor as
-one of its significant nonlitigation projects.</td>
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> Defending
+liberties in high-tech world</a>.  Mentions EFF funding for Tor as one
+of its significant nonlitigation projects.</td>
 </tr>
-
-<tr>
 <td>2006 Apr 11</td>
 <td>PBS Frontline</td>
-<td><a href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html">
-Chipping Away at China's Great Firewall</a></td>
+<td><a
+href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"
+>Chipping Away at China's Great Firewall</a></td>
 </tr>
-
 <tr>
 <td>2006 Feb 28</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html">
+<td><a
+href="http://www.pcworld.com/article/id,124891-page,1/article.html">
 Outsmarting the Online Privacy Snoops</a></td>
 </tr>
-
 <tr>
 <td>2006 Feb 27</td>
 <td>Forbes</td>
@@ -3164,153 +2757,157 @@ Outsmarting the Online Privacy Snoops</a></td>
 Cracks In the Wall</a>.  Discussion of Tor being used for evading
 censorship by repressive governments.</td>
 </tr>
-
 <tr>
 <td>2006 Feb 20</td>
 <td>The Boston Globe</td>
 <td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
 Beating censorship on the Internet</a></td>
 </tr>
-
 <tr>
 <td>2006 Feb 15</td>
 <td>CBS Evening News</td>
-<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story">
-Cracking The 'Great Firewall Of China'</a>.
+<td><a
+href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.
+shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>.
 Roger Dingledine appeared on the show to discuss Tor, starting at 1:04
 into the video.</td>
 </tr>
-
 <tr>
 <td>2006 Feb 15</td>
 <td>CNBC - Closing Bell</td>
 <td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
 </tr>
-
 <tr>
 <td>2006 Feb 15</td>
 <td>Network Secure</td>
-<td><a href="http://www.network-secure.de/index.php?option=com_content&task=view&id=3909">
-Tor: Anonymisierungswerkzeug entwickelt</a>
+<td><a
+href="http://www.network-secure.de/index.php?option=com_content&task
+=view&id=3909">Tor: Anonymisierungswerkzeug entwickelt</a>
 (German)</td>
 </tr>
-
 <tr>
 <td>2006 Feb 13</td>
 <td>Wall Street Journal</td>
 <td><a href="http://online.wsj.com/article/SB113979965346572150.html">
 Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a>Full article
 text can also be found
-<a href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.</td>
+<a
+href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.</td>
 </tr>
-
 <tr>
 <td>2006 Jan 31</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/Infotech/16216/page2/">
-Evading the Google Eye</a></td>
+<td><a
+href="http://www.technologyreview.com/Infotech/16216/page2/">Evading the
+Google Eye</a></td>
 </tr>
-
 <tr>
 <td>2006 Jan 29</td>
 <td>New York Times</td>
-<td><a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html">
-How to Outwit the World's Internet Censors</a></td>
+<td><a
+href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html"> How
+to Outwit the World's Internet Censors</a></td>
 </tr>
-
 <tr>
 <td>2006 Jan 27</td>
 <td>Fox News/eWeek</td>
-<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html">
-Web Anonymizers Suddenly Get Very Popular</a></td>
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html"> Web
+Anonymizers Suddenly Get Very Popular</a></td>
 </tr>
-
 <tr>
 <td>2006 Jan 25</td>
 <td>New York Times</td>
-<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/
+<td><a
+href="http://www.nytimes.com/2006/01/25/technology/techspecial2/
 25privacy.html?_r=1&oref=slogin"> Privacy for People Who Don't Show
 Their Navels</a></td>
 </tr>
-
 <tr>
 <td>2006 Jan 23</td>
 <td>NPR Talk of the Nation</td>
-<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456">
-Search Engines and Privacy Rights on the Web</a><br/>
-<a href="http://xeni.net/">Xeni Jardin</a>
-recommends Tor at 33:30 into the program.</td>
+<td><a
+href="http://www.npr.org/templates/story/story.php?storyId=5168456">
+Search Engines and Privacy Rights on the Web</a><br/> <a
+href="http://xeni.net/">Xeni Jardin</a> recommends Tor at 33:30 into the
+program.</td>
 </tr>
 
 <tr>
 <td>2006 Feb 15</td>
 <td>Punto Informatico</td>
-<td><a href="http://punto-informatico.it/p.aspx?i=1430903">
-TOR c'è</a> (Italian)</td>
+<td><a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a>
+(Italian)</td>
 </tr>
 
 <tr>
 <td>2006 Jan 20</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2">
-How to Foil Search Engine Snoops</a></td>
+<td><a
+href="http://www.wired.com/science/discoveries/news/2006/01/70051?
+currentPage=2"> How to Foil Search Engine Snoops</a></td>
 </tr>
 
 <tr>
 <td>2006 Jan 20</td>
 <td>NPR</td>
-<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854">
+<td><a
+href="http://www.npr.org/templates/story/story.php?storyId=5165854">
 Google Records Subpoena Raises Privacy Fears</a></td>
 </tr>
 
 <tr>
 <td>2005 Sep 30</td>
 <td>Viva o Linux</td>
-<td><a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
+<td><a
+href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
 TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
 </tr>
-
 <tr>
 <td>2005 Aug 6</td>
 <td>New Scientist</td>
-<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">
+<td><a
+href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">
 Why we all need pornography</a></td>
 </tr>
-
 <tr>
 <td>2005 Jul 12</td>
-<td>IEEE Computer Society's Technical Committee on Security and Privacy</td>
-<td><a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR">
-Onion routing application Tor makes PCWorld's top
+<td>IEEE Computer Society's Technical Committee on Security and
+Privacy</td>
+<td><a
+href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.
+html#TOR"> Onion routing application Tor makes PCWorld's top
 100</a></td>
 </tr>
 
 <tr>
 <td>2005 Jun 22</td>
 <td>The Unofficial Apple Blog</td>
-<td><a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/">
-Privacy Watch: Tor</a></td>
+<td><a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/"> Privacy
+Watch: Tor</a></td>
 </tr>
 
 <tr>
 <td>2005 Jun 10</td>
 <td>The New Zealand Herald</td>
-<td><a href="https://www.nzherald.co.nz/technology/news/article.cfm?objectid=10329896">
-China's internet censorship stranglehold can't last</a></td>
+<td><a
+href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&objectid=
+10329896"> China's internet censorship stranglehold can't last</a></td>
 </tr>
 
 <tr>
 <td>2005 Jun 8</td>
 <td>American Public Radio</td>
-<td><a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
+<td><a
+href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
 An Internet privacy tool called "Tor"</a></td>
 </tr>
 
 <tr>
 <td>2005 Jun 1</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/id,120763-page,4/article.html">
-The 100 Best Products of 2005</a><br/> Tor is ranked #40 on the list.</td>
+<td><a
+href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The
+100 Best Products of 2005</a><br/> Tor is ranked #40 on the list. </td>
 </tr>
 
 <tr>
@@ -3330,23 +2927,25 @@ Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
 <tr>
 <td>2005 May 20</td>
 <td>Security.uz</td>
-<td><a href="http://security.uz/news/default.asp?id=10541">
-Tor - мощный анонимайзер для всех ОС</a> (Russian)</td>
+<td><a href="http://security.uz/news/default.asp?id=10541"> Tor - мощный
+анонимайзер для всех ОС</a> (Russian)</td>
 </tr>
 
 <tr>
 <td>2005 May 19</td>
 <td>WebPlanet</td>
-<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html">
-Tor: распределенная система анонимного серфинга</a> (Russian)</td>
+<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor:
+распределенная система анонимного серфинга</a> (Russian)</td>
 </tr>
 
 <tr>
 <td>2005 May 17</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all">
-Tor Torches Online Tracking</a>. Also available in
-<a href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a>.</td>
+<td><a
+href="http://www.wired.com/politics/security/news/2005/05/67542?
+currentPage=all"> Tor Torches Online Tracking</a>. Also available in <a
+href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a
+>.</td>
 </tr>
 
 <tr>
@@ -3366,7 +2965,8 @@ kafkaesken Schwinden der Anonymität</a> (German)</td>
 <tr>
 <td>2005 Apr 5</td>
 <td>Libero</td>
-<td><a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
+<td><a
+href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml">
 Anonimato on line, ecco Tor</a> (Italian)</td>
 </tr>
 
@@ -3387,29 +2987,31 @@ Securing your online privacy with Tor</a></td>
 <tr>
 <td>2004 Dec 27</td>
 <td>BoingBoing</td>
-<td><a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
+<td><a
+href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
 EFF helping produce anonymizing software</a></td>
 </tr>
 
 <tr>
 <td>2004 Dec 25</td>
 <td>Kansas City infozine</td>
-<td><a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
+<td><a
+href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/">
 EFF Joins Forces with Tor Software Project</a></td>
 </tr>
 
 <tr>
 <td>2004 Dec 23</td>
 <td>golem.de</td>
-<td><a href="http://www.golem.de/0412/35340.html">
-EFF unterstützt Anonymisierer Tor</a> (German)</td>
+<td><a href="http://www.golem.de/0412/35340.html"> EFF unterstützt
+Anonymisierer Tor</a> (German)</td>
 </tr>
 
 <tr>
 <td>2004 Dec 23</td>
 <td>SuicideGirls</td>
-<td><a href="http://suicidegirls.com/news/technology/6150/">
-New Routing Software Allows Anonymous Internet Use</a></td>
+<td><a href="http://suicidegirls.com/news/technology/6150/"> New Routing
+Software Allows Anonymous Internet Use</a></td>
 </tr>
 
 <tr>
@@ -3421,8 +3023,10 @@ New Routing Software Allows Anonymous Internet Use</a></td>
 <tr>
 <td>2004 Dec 22</td>
 <td>Slashdot</td>
-<td><a href="https://yro.slashdot.org/story/04/12/22/2031229/eff-promotes-freenet-like-system-tor">
-EFF Promotes Freenet-like System Tor</a></td>
+<td><a
+href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&tid=95
+&tid=158&tid=153&tid=17"> EFF Promotes Freenet-like System
+Tor</a></td>
 </tr>
 
 <tr>
@@ -3435,58 +3039,62 @@ Traffic</a></td>
 <tr>
 <td>2004 Aug 30</td>
 <td>Newsweek</td>
-<td><a href="http://www.newsweek.com/technology-instant-security-126733">
-Technology: Instant Security</a></td>
+<td><a
+href="http://www.newsweek.com/technology-instant-security-126733">Technology:
+Instant Security</a></td>
 </tr>
 
 <tr>
 <td>2004 Aug 16</td>
 <td>Eweek</td>
-<td><a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/">
-Don't Fear Internet Anonymity Tools</a></td>
+<td><a
+href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-
+Tools/"> Don't Fear Internet Anonymity Tools</a></td>
 </tr>
 
 <tr>
 <td>2004 Aug 6</td>
 <td>HCC magazine</td>
-<td><a href="http://www.hcc.nl/eCache/DEF/21/083.html">
-Anoniem surfen met hulp van marine VS</a> (Dutch)</td>
+<td><a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen
+met hulp van marine VS</a> (Dutch)</td>
 </tr>
 
 <tr>
 <td>2004 Aug 6</td>
 <td>Golem</td>
-<td><a href="http://www.golem.de/0408/32835.html">
-Tor: Anonymisierer nutzt Onion-Routing</a></td>
+<td><a href="http://www.golem.de/0408/32835.html"> Tor: Anonymisierer
+nutzt Onion-Routing</a></td>
 </tr>
 
 <tr>
 <td>2004 Aug 5</td>
 <td>Network World Security</td>
-<td><a href="http://www.networkworld.com/details/7088.html">
-Onion routing</a></td>
+<td><a href="http://www.networkworld.com/details/7088.html"> Onion
+routing</a></td>
 </tr>
 
 <tr>
 <td>2004 May 8</td>
 <td>Wired</td>
 <td><a href="http://www.wired.com/politics/security/news/2004/08/64464">
-Onion Routing Averts Prying Eyes</a>. Also in
-<a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html">
-Japanese</a>.</td>
+Onion Routing Averts Prying Eyes</a>. Also in <a
+href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.
+html">Japanese</a>.</td>
 </tr>
 
 <tr>
 <td>2004 Mar 8</td>
 <td>CNET Japan blog</td>
-<td><a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
+<td><a
+href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/">
 Yearning of hackers and insecurity</a> (Japanese)</td>
 </tr>
 
 <tr>
 <td>1999 Apr 13</td>
 <td>Wired</td>
-<td><a href="http://www.wired.com/science/discoveries/news/1999/04/19091">
+<td><a
+href="http://www.wired.com/science/discoveries/news/1999/04/19091">
 Anonymous Web Surfing? Uh-Uh</a></td>
 </tr>
 
diff --git a/press/press.pl b/press/press.pl
index e1e329db..d0c16a9e 100755
--- a/press/press.pl
+++ b/press/press.pl
@@ -1,58 +1,59 @@
 #!/usr/bin/env perl
 # Returns html rows based on csv lines
+# Usage: /path/to/script /path/to/csv/file > file
 use strict;
 use warnings;
-use Time::Piece;
 #use HTML::Escape qw/escape_html/;
 
-my %pub; # save all publications
-my $debug = 0;
+my $str; # append all strings here
 
-sub debug {
-  my $msg = shift;
-  print "$msg\n" if $debug;
+sub print_rows {
+  my $string = shift;
+
+  # define where to output to:
+  #  1) STDOUT
+  print "$string";
+
+  #  2) press.html
+  #open my $out, '>>', 'press.html';
+  #print $out $string;
+  #  3) escaped htmlfile (install module above: cpan -i HTML::Escape
+  #print $out escape_html($string);
+  #close $out;
+}
+sub add_row {
+  $str .= shift;
 }
 sub parse_line {
   my $str = shift;
-  debug "Parsing:\n$str";
   if ($str =~ /(\d+\/\d+\/\d+),([^,]+),(.+),(.+)/) { # magic regex :)
-      my $time = Time::Piece->strptime($1, "%m/%d/%y"); # given format: MM/DD/YY
-      my $date = $time->strftime("%Y %b %d");
+      chomp(my $date = qx/LANG=en_US.UTF-8 date -d "$1" "+%Y %B %d"/);
       chomp(my $source = $2);
-      $pub{$time->epoch} .= "<tr>\n<td>$date</td>\n<td>$source</td>\n<td><a href='$4'>\n$3</a></td>\n</tr>\n\n";
-      # TODO use uniqe keys to avoid .=
-      debug "Added: $pub{$time->epoch}"
+      my $name = $3;
+      my $url = $4;
+      my $string = "
+<tr>
+<td>$date</td>
+<td>$source</td>
+<td><a href=\"$url\">$name</a></td>
+</tr>
+";
+    add_row $string;
   }
 }
 
-unless (@ARGV) { print "Usage: $0 [-d] /path/to/csv/file > file\n"; exit 1; }
-
-# parse all arguments (hopefully existing files)
 foreach my $arg (@ARGV) {
   chomp($arg);
-  debug "arg: $arg";
-  if ($arg eq '-d') {
-    $debug++;
-    debug "Enabling debug output on request."
-  } elsif (-f "$arg") {
-    debug 'argument looks like a file.';
+  if (-f $arg) {
     open my $fh, '<', $arg
-      or die "Can't open '$arg': $!\n";
-    debug "Reading $arg.";
+      or warn "Can't open '$arg': $!\n" and next;
     foreach (<$fh>) {
-      # https://stackoverflow.com/questions/6373888/converting-newline-formatting-from-mac-to-windows
-      foreach my $line (split '\r', $_) {
-        parse_line $line;
-      }
+      parse_line $_;
     }
-    close $fh; debug "Finished reading $arg."
+    close $fh;
   } else {
-    debug 'argument is no file, assuming piped string.';
     parse_line $arg;
   }
 }
-
-my $str = join '', map { $pub{$_} } reverse sort keys %pub;
-debug "Generated final html string (". (scalar keys %pub) ." entries):";
-if ($str) { print "$str\nAdd above to press/en/press.wml.\n"; }
+if ($str) { print_rows $str; }
 else { print "Nothing found.\n"; exit 1; }
diff --git a/projects/en/torbrowser.wml b/projects/en/torbrowser.wml
index b5f394ce..172ce411 100644
--- a/projects/en/torbrowser.wml
+++ b/projects/en/torbrowser.wml
@@ -512,7 +512,7 @@
           <th>Microsoft Windows<br><em>(<version-torbrowserbundlebeta>)</em></th>
           <th>Mac OS X<br><em>(<version-torbrowserbundleosx64beta>)</em></th>
           <th>Linux<br><em>(<version-torbrowserbundlelinux32beta>)</em></th>
-          <th>Android<br><em>(<version-torbrowserbundleandroidbeta>)</em></th>
+          <th>Android<br><em>(<version-torbrowserbundleandroid>)</em></th>
         </tr>
           </thead>
           <tbody>
@@ -531,8 +531,8 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_en-US.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_en-US.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_en-US.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td><a href="../dist/torbrowser/mobile/<version-torbrowserbundleandroid>/tor-browser-android-arm-<version-torbrowserbundleandroid>.apk">Android</a>
+          <em>(<a href="../dist/torbrowser/mobile/<version-torbrowserbundleandroid>/tor-browser-android-arm-<version-torbrowserbundleandroid>.apk.asc">sig</a>)</em></td> 
         </tr>
         <tr class="alt">
           <td>&#x0627;&#x0644;&#x0639;&#x0631;&#x0628;&#x064a;&#x0629; (ar)</td>
@@ -549,8 +549,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ar.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ar.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ar.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>Català (ca)</td>
@@ -567,26 +566,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ca.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ca.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ca.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
-        </tr>
-        <tr class="alt">
-          <td>Čeština (cs)</td>
-          <td>
-                <a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_cs.exe">32/64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_cs.exe.asc">sig</a>)</em>
-                •
-                <a href="../dist/torbrowser/<version-torbrowserbundlewin64beta>/torbrowser-install-win64-<version-torbrowserbundlewin64beta>_cs.exe">64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlewin64beta>/torbrowser-install-win64-<version-torbrowserbundlewin64beta>_cs.exe.asc">sig</a>)</em>
-          </td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_cs.dmg">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_cs.dmg.asc">sig</a>)</em>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_cs.tar.xz">32-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_cs.tar.xz.asc">sig</a>)</em>
-          • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_cs.tar.xz">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_cs.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Dansk (da)</td>
@@ -603,8 +583,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_da.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_da.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_da.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Deutsch (de)</td>
@@ -621,26 +600,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_de.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_de.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_de.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
-        </tr>
-        <tr class="alt">
-          <td>&#x03B5;&#x03BB;&#x03BB;&#x03B7;&#x03BD;&#x03B9;&#x03BA;&#x03AC; (el)</td>
-          <td>
-                <a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_el.exe">32/64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_el.exe.asc">sig</a>)</em>
-                •
-                <a href="../dist/torbrowser/<version-torbrowserbundlewin64beta>/torbrowser-install-win64-<version-torbrowserbundlewin64beta>_el.exe">64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlewin64beta>/torbrowser-install-win64-<version-torbrowserbundlewin64beta>_el.exe.asc">sig</a>)</em>
-          </td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_el.dmg">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_el.dmg.asc">sig</a>)</em>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_el.tar.xz">32-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_el.tar.xz.asc">sig</a>)</em>
-          • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_el.tar.xz">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_el.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>&#x0045;&#x0073;&#x0070;&#x0061;&#x00f1;&#x006f;&#x006c; (es-ES)</td>
@@ -657,8 +617,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_es-ES.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_es-ES.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_es-ES.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>&#x0641;&#x0627;&#x0631;&#x0633;&#x06cc; (fa)</td>
@@ -675,8 +634,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_fa.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_fa.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_fa.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>&#x0046;&#x0072;&#x0061;&#x006e;&#x00e7;&#x0061;&#x0069;&#x0073; (fr)</td>
@@ -693,8 +651,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_fr.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_fr.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_fr.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>Gaeilge (Irish) (ga-IE)</td>
@@ -711,8 +668,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ga-IE.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ga-IE.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ga-IE.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>&#x5e2;&#x5d1;&#x5e8;&#x5d9;&#x5ea; (he)</td>
@@ -729,26 +685,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_he.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_he.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_he.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
-        </tr>
-        <tr class="alt">
-          <td>Magyar (hu)</td>
-          <td>
-                <a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_hu.exe">32/64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_hu.exe.asc">sig</a>)</em>
-                •
-                <a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-win64-<version-torbrowserbundlebeta>_hu.exe">64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-win64-<version-torbrowserbundlebeta>_hu.exe.asc">sig</a>)</em>
-          </td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_hu.dmg">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_hu.dmg.asc">sig</a>)</em>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_hu.tar.xz">32-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_hu.tar.xz.asc">sig</a>)</em>
-          • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_hu.tar.xz">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_hu.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>bahasa Indonesia (id)</td>
@@ -765,8 +702,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_id.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_id.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_id.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>íslenska (is)</td>
@@ -783,8 +719,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_is.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_is.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_is.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Italiano (it)</td>
@@ -801,8 +736,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_it.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_it.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_it.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>日本語 (ja)</td>
@@ -821,26 +755,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ja.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ja.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ja.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
-        </tr>
-        <tr class="alt">
-          <td>&#x10E5;&#x10D0;&#x10E0;&#x10D7;&#x10E3;&#x10DA;&#x10D8; &#x10D4;&#x10DC;&#x10D0; (ka)</td>
-          <td>
-                <a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_ka.exe">32/64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlebeta>/torbrowser-install-<version-torbrowserbundlebeta>_ka.exe.asc">sig</a>)</em>
-                •
-                <a href="../dist/torbrowser/<version-torbrowserbundlewin64beta>/torbrowser-install-win64-<version-torbrowserbundlewin64beta>_ka.exe">64-bit</a>
-                <em>(<a href="../dist/torbrowser/<version-torbrowserbundlewin64beta>/torbrowser-install-win64-<version-torbrowserbundlewin64beta>_ka.exe.asc">sig</a>)</em>
-          </td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_ka.dmg">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleosx64beta>/TorBrowser-<version-torbrowserbundleosx64beta>-osx64_ka.dmg.asc">sig</a>)</em>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ka.tar.xz">32-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ka.tar.xz.asc">sig</a>)</em>
-          • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ka.tar.xz">64-bit</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ka.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Korean (ko)</td>
@@ -857,8 +772,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ko.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ko.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ko.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>Norsk bokmå&#x0345;l (nb)</td>
@@ -875,8 +789,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_nb-NO.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_nb-NO.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_nb-NO.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>Nederlands (nl)</td>
@@ -893,8 +806,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_nl.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_nl.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_nl.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Polish (pl)</td>
@@ -911,8 +823,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_pl.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_pl.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_pl.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>&#x0050;&#x006f;&#x0072;&#x0074;&#x0075;&#x0067;&#x0075;&#x00ea;&#x0073; (pt-BR)</td>
@@ -929,8 +840,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_pt-BR.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_pt-BR.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_pt-BR.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>&#x0420;&#x0443;&#x0441;&#x0441;&#x043a;&#x0438;&#x0439; (ru)</td>
@@ -947,8 +857,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_ru.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ru.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_ru.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Svenska (sv-SE)</td>
@@ -965,8 +874,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_sv-SE.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_sv-SE.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_sv-SE.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>Türkçe (tr)</td>
@@ -983,8 +891,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_tr.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_tr.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_tr.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>Vietnamese (vi)</td>
@@ -1001,8 +908,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_vi.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_vi.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_vi.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr class="alt">
           <td>&#x7b80;&#x4f53;&#x5b57; (zh-CN)</td>
@@ -1019,8 +925,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_zh-CN.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_zh-CN.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_zh-CN.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
         <tr>
           <td>&#x6b63;&#x9ad4;&#x5b57 (zh-TW)</td>
@@ -1037,8 +942,7 @@
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux32beta>/tor-browser-linux32-<version-torbrowserbundlelinux32beta>_zh-TW.tar.xz.asc">sig</a>)</em>
           • <a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_zh-TW.tar.xz">64-bit</a>
           <em>(<a href="../dist/torbrowser/<version-torbrowserbundlelinux64beta>/tor-browser-linux64-<version-torbrowserbundlelinux64beta>_zh-TW.tar.xz.asc">sig</a>)</em></td>
-          <td><a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk">Android</a>
-          <em>(<a href="../dist/torbrowser/<version-torbrowserbundleandroidbeta>/tor-browser-<version-torbrowserbundleandroidbeta>-android-armv7-multi.apk.asc">sig</a>)</em></td>
+          <td></td>
         </tr>
           </tbody>
         </table>
diff --git a/projects/torbrowser/RecommendedTBBVersions b/projects/torbrowser/RecommendedTBBVersions
index d51f0df0..3292a6b7 100644
--- a/projects/torbrowser/RecommendedTBBVersions
+++ b/projects/torbrowser/RecommendedTBBVersions
@@ -1,10 +1,10 @@
 [
-"8.0.4",
-"8.0.4-MacOS",
-"8.0.4-Linux",
-"8.0.4-Windows",
-"8.5a6",
-"8.5a6-MacOS",
-"8.5a6-Linux",
-"8.5a6-Windows"
+"8.0.3",
+"8.0.3-MacOS",
+"8.0.3-Linux",
+"8.0.3-Windows",
+"8.5a4",
+"8.5a4-MacOS",
+"8.5a4-Linux",
+"8.5a4-Windows"
 ]



More information about the tor-commits mailing list