[tor-commits] [webwml/archive] Reformat press clips

hiro at torproject.org hiro at torproject.org
Mon Mar 25 20:28:53 UTC 2019


commit 1a0d1ae06cdd74e9e92510a752d7009d8153d0c7
Author: hiro <hiro at torproject.org>
Date:   Mon Mar 25 21:18:13 2019 +0100

    Reformat press clips
---
 press/en/press.wml | 509 +++++++++++++++--------------------------------------
 1 file changed, 138 insertions(+), 371 deletions(-)

diff --git a/press/en/press.wml b/press/en/press.wml
index f9989e3f..f7747994 100644
--- a/press/en/press.wml
+++ b/press/en/press.wml
@@ -2009,16 +2009,13 @@ Thinkers</a>. Number 78: Roger, Nick, and Paul from Tor.</td>
 <tr>
 <td>2012 Oct</td>
 <td>Forskning & Framsteg</td>
-<td><a href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-
-hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura
-nätcensuren</a></td>
+<td><a href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura nätcensuren</a></td>
 </tr>
 
 <tr>
 <td>2012 Oct</td>
 <td>Delta Airlines Sky Magazine</td>
-<td><a href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-
-Sight.aspx">Hidden in Plain Sight</a></td>
+<td><a href="http://deltaskymag.delta.com/Sky-Extras/Favorites/Hidden-in-Plain-Sight.aspx">Hidden in Plain Sight</a></td>
 </tr>
 
 <tr>
@@ -2030,1023 +2027,793 @@ Sight.aspx">Hidden in Plain Sight</a></td>
 <tr>
 <td>2012 Sep 19</td>
 <td>infoBAE</td>
-<td><a href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en
--la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la
-web 100% anónimas y seguras</a></td>
+<td><a href="http://www.infobae.com/notas/667840-Proyecto-Tor-comunicaciones-en-la-web-100-anonimas-y-seguras.html">Proyecto Tor: comunicaciones en la web 100% anónimas y seguras</a></td>
 </td>
 <tr>
 <td>2012 Aug 24</td>
 <td>security.nl</td>
-<td><a href="https://secure.security.nl/artikel/42807/1/
-Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar
-Facebook ondanks privacyrisico</a></td>
+<td><a href="https://secure.security.nl/artikel/42807/1/Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar Facebook ondanks privacyrisico</a></td>
 </tr>
 
 <tr>
 <td>2012 Jul 19</td>
 <td>Philadelphia Inquirer</td>
-<td><a href="http://www.philly.com/philly/business/
-20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life:
-Fostering anonymity online</a></td>
+<td><a href="http://www.philly.com/philly/business/20120719_Tech_Life__Fostering_anonymity_online.html">Tech Life: Fostering anonymity online</a></td>
 </tr>
 
 <tr>
 <td>2012 Jul 13</td>
 <td>NATO</td>
-<td><a href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-
-during-the-arab-spring/">Social Media and Online Anonymity during the
-Arab Spring</a></td>
+<td><a href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-during-the-arab-spring/">Social Media and Online Anonymity during the Arab Spring</a></td>
 </tr>
 
 <tr>
 <td>2012 Jun 19</td>
 <td>Nieman Journalism Lab</td>
-<td><a href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists
--and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project
-helps journalists and whistleblowers go online without leaving a
+<td><a href="http://www.niemanlab.org/2012/06/the-tor-project-helps-journalists-and-whistleblowers-go-online-without-leaving-a-trace/">The Tor Project helps journalists and whistleblowers go online without leaving a
 trace.</a></td>
 </tr>
 
 <tr>
 <td>2012 Jun 18</td>
 <td>Poynter</td>
-<td><a href="http://www.poynter.org/latest-news/top-stories/177642/news-
-challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6
-projects focused on networks</td>
+<td><a href="http://www.poynter.org/latest-news/top-stories/177642/news-challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6 projects focused on networks</td>
 </tr>
 
 <tr>
 <td>2012 Jun 18</td>
 <td>Knight Foundation</td>
-<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight
-Foundation funds project to protect journalists and their sources
-worldwide by providing them with a toolkit to preserve their anonymity
+<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight Foundation funds project to protect journalists and their sources worldwide by providing them with a toolkit to preserve their anonymity
 online.</td>
 </tr>
 
 <tr>
 <td>2012 Jun 15</td>
 <td>BBC</td>
-<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia
-clamps down on Skype and other internet use on Tor</td>
+<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia clamps down on Skype and other internet use on Tor</td>
 </tr>
 
 <tr>
 <td>2012 Apr 30</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-
-projects-new-tool-aims-to-map-out-internet-censorship/">The Tor
-Project's New Tool Aims To Map Out Internet Censorship</a></td>
+<td><a href="http://www.forbes.com/sites/andygreenberg/2012/04/30/the-tor-projects-new-tool-aims-to-map-out-internet-censorship/">The Tor Project's New Tool Aims To Map Out Internet Censorship</a></td>
 </tr>
 
 <tr>
 <td>2012 Apr 20</td>
 <td>The Guardian</td>
-<td><a href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-
-battle-internet">Hacktivists in the frontline battle for the
-internet</td>
+<td><a href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-battle-internet">Hacktivists in the frontline battle for the internet</td>
 </tr>
 
 <tr>
 <td>2012 Apr 19</td>
 <td>The Guardian</td>
-<td><a href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-
-authenticity-anonymity">Online identity: is authenticity or anonymity
-more important?</td>
+<td><a href="http://www.guardian.co.uk/technology/2012/apr/19/online-identity-authenticity-anonymity">Online identity: is authenticity or anonymity more important?</td>
 </tr>
 
 <tr>
 <td>2012 Apr 03</td>
 <td>V3</td>
-<td><a href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover
--key-chinas-tor-blocking">Swedish researchers uncover key to China's
-Tor-blocking system</a></td>
+<td><a href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover-key-chinas-tor-blocking">Swedish researchers uncover key to China's Tor-blocking system</a></td>
 </tr>
 
 <tr>
 <td>2012 Apr 02</td>
 <td>The Guardian</td>
-<td><a href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-
-warn-government-email-surveillance">Internet companies warn over
-government email surveillance plans</a></td>
+<td><a href="http://www.guardian.co.uk/media/2012/apr/02/internet-companies-warn-government-email-surveillance">Internet companies warn over government email surveillance plans</a></td>
 </td>
 <tr>
 <td>2012 Mar 22</td>
 <td>Reuters</td>
-<td><a href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-
-idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on
-citizens</a></td>
+<td><a href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on citizens</a></td>
 </tr>
 
 <tr>
 <td>2012 Mar 08</td>
 <td>Boston Globe</td>
-<td><a href="http://articles.boston.com/2012-03-08/business/31136655_1_law-
-enforcement-free-speech-technology">Privacy software. Unintended
-consequences of Walpole firm's technology.</a></td>
+<td><a href="http://articles.boston.com/2012-03-08/business/31136655_1_law-enforcement-free-speech-technology">Privacy software. Unintended consequences of Walpole firm's technology.</a></td>
 </tr>
 
 <tr>
 <td>2012 Mar 02</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-
-privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">
-Google's new privacy policy: what has changed and what you can do about
+<td><a href="http://arstechnica.com/tech-policy/news/2012/03/googles-new-privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">Google's new privacy policy: what has changed and what you can do about
 it</a></td>
 </tr>
 
 <tr>
 <td>2012 Mar 01</td>
 <td>Edmonton Journal</td>
-<td><a href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-
-with-tor/">Get your privacy on with Tor</a></td>
+<td><a href="http://blogs.edmontonjournal.com/2012/03/01/get-your-privacy-on-with-tor/">Get your privacy on with Tor</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 28</td>
 <td>PC World</td>
-<td><a href="https://www.pcworld.com/article/250943/
-https_everywhere_update_now_reports_website_weaknesses.html">HTTPS
-Everywhere Update: Now Reports Website Weaknesses</a></td>
+<td><a href="https://www.pcworld.com/article/250943/https_everywhere_update_now_reports_website_weaknesses.html">HTTPS Everywhere Update: Now Reports Website Weaknesses</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 27</td>
 <td>GigaOM</td>
-<td><a href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-
-balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td>
+<td><a href="http://gigaom.com/2012/02/27/iran-elections-censorship-tor-balatarin/">Activists vow to defeat Iran’s Internet censorship</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 15</td>
 <td>Le Monde</td>
-<td><a href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-
-outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un
-nouvel outil contre la cybercensure testé en Iran</a></td>
+<td><a href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un nouvel outil contre la cybercensure testé en Iran</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 13</td>
 <td>IDG NL webwereld</td>
-<td><a href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-
-https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td>
+<td><a href="http://webwereld.nl/nieuws/109501/iraanse-overheid-frustreert-https-verkeer-.html">Iraanse overheid frustreert https-verkeer</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 13</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-
-project-helps-iran-get-back-online-amidst-internet-censorship-regime.
-ars">Tor's latest project helps Iran get back online despite new
-Internet censorship regime</a></td>
+<td><a href="http://arstechnica.com/tech-policy/news/2012/02/tors-latest-project-helps-iran-get-back-online-amidst-internet-censorship-regime.ars">Tor's latest project helps Iran get back online despite new Internet censorship regime</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 13</td>
 <td>Radio Farda</td>
-<td><a href="http://www.radiofarda.com/content/
-f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">
-«تور» با پروژه‌ای جدید به جنگ فیلترینگ در ایران می‌رود "</a></td>
+<td><a href="http://www.radiofarda.com/content/f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">«تور» با پروژه‌ای جدید به جنگ فیلترینگ در ایران می‌رود "</a></td>
 </td>
 </tr>
 
 <tr>
 <td>2012 Feb 11</td>
 <td>ITP</td>
-<td><a href="http://www.itp.net/587901-iran-increases-web-censorship">Iran
-increases web censorship</a></td>
+<td><a href="http://www.itp.net/587901-iran-increases-web-censorship">Iran increases web censorship</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 10</td>
 <td>CNet News</td>
-<td><a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-
-project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project
-looks to help Iranians sidestep Net ban</a></td>
+<td><a href="http://news.cnet.com/8301-13578_3-57375166-38/tor-anonymity-project-looks-to-help-iranians-sidestep-net-ban/">Tor anonymity project looks to help Iranians sidestep Net ban</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 10</td>
 <td>Linkiesta</td>
-<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i
-dissidenti in Internet, la guerra in Iran è già iniziata</a></td>
+<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i dissidenti in Internet, la guerra in Iran è già iniziata</a></td>
 </tr>
 
 <tr>
 <td>2012 Feb 10</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-
-cracks-down-online-tor-tests-undetectable-encrypted-connections/">As
-Iran Cracks Down Online, Tor Tests Undetectable Encrypted
-Connections</a></td>
+<td><a href="http://www.forbes.com/sites/andygreenberg/2012/02/10/as-iran-cracks-down-online-tor-tests-undetectable-encrypted-connections/">As Iran Cracks Down Online, Tor Tests Undetectable Encrypted Connections</a></td>
 </tr>
 
 <tr>
 <td>2012 Jan 24</td>
 <td>PC Pro UK</td>
-<td><a href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of-
-tor-censorship">O2 plays down accusations of Tor censorship</a></td>
+<td><a href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of- tor-censorship">O2 plays down accusations of Tor censorship</a></td>
 </tr>
 
 <tr>
 <td>2012 Jan 24</td>
 <td>Broadband Choice UK</td>
-<td><a href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-
-providers-are-blocking-tor-801273330/">ORG says mobile broadband
-providers are blocking Tor</a></td>
-</td>
+<td><a href="http://www.broadbandchoice.co.uk/news/org-says-mobile-broadband-providers-are-blocking-tor-801273330/">ORG says mobile broadband providers are blocking Tor</a></td>
+</tr>
+
 <tr>
 <td>2012 Jan 24</td>
 <td>PC Welt</td>
-<td><a href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in
--neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td>
+<td><a href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in-neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td>
 </tr>
 
 <tr>
 <td>2011 Dec 30</td>
 <td>BNR Digital</td>
-<td><a href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-
-censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder
-Tor wordt gecensureerd</a></td>
+<td><a href="http://www.bnr.nl/programma/bnrdigitaal/224190-1112/hoe-censuurbestrijder-tor-wordt-gecensureerd-video">Hoe censuurbestrijder Tor wordt gecensureerd</a></td>
 </tr>
 
 <tr>
 <td>2011 Dec 30</td>
 <td>Deutsche Welle</td>
-<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit
-dem Zensor Katz-und-Maus spielen</a></td>
+<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit dem Zensor Katz-und-Maus spielen</a></td>
 </tr>
 
 <tr>
 <td>2011 Dec 29</td>
 <td>Boing Boing</td>
-<td><a href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.
-html">State of the arms race between repressive governments and
-anti-censorship/surveillance Tor technology (and why American companies
-are on the repressive governments' side)</a></td>
+<td><a href="http://boingboing.net/2011/12/29/state-of-the-arms-race-between.html">State of the arms race between repressive governments and anti-censorship/surveillance Tor technology (and why American companies are on the repressive governments' side)</a></td>
 </tr>
 
 <tr>
 <td>2011 Dec 28</td>
 <td>ZDNet Asia</td>
-<td><a href="http://www.zdnetasia.com/tor-project-creates-safer-internet-
-62303332.htm">Tor Project creates safer Internet</a></td>
+<td><a href="http://www.zdnetasia.com/tor-project-creates-safer-internet-62303332.htm">Tor Project creates safer Internet</a></td>
 </tr>
 
 <tr>
 <td>2011 Dec 01</td>
 <td>itbusiness.ca</td>
-<td><a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">
-Convenience technology threatening personal privacy, experts
-say</a></td>
+<td><a href="http://www.itbusiness.ca/it/client/en/home/news.asp?id=65170">Convenience technology threatening personal privacy, experts say</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 21</td>
 <td>Spiegel Online</td>
-<td><a href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas
-Internet-Zensoren testen neue Filter</a></td>
+<td><a href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas Internet-Zensoren testen neue Filter</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 20</td>
 <td>China Digital Times</td>
-<td><a href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-
-tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/"
->Government Blocks Encrypted Tunnels Through Great Firewall; Fang
-Binxing Talks Internet Sovereignty</a></td>
+<td><a href="http://chinadigitaltimes.net/2011/11/government-blocks-encrypted-tunnels-through-great-firewall-fang-binxing-talks-internet-sovereignty/">Government Blocks Encrypted Tunnels Through Great Firewall; Fang Binxing Talks Internet Sovereignty</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 23</td>
 <td>IT Security Belgium</td>
-<td><a href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-
-service">Tor Project is tapping Amazon’s EC2 cloud service</a></td>
+<td><a href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-service">Tor Project is tapping Amazon’s EC2 cloud service</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 22</td>
 <td>Boing Boing</td>
-<td><a href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.
-html">Tor project asks supporters to set up virtual Tor bridges in
-Amazon's cloud</a></td>
+<td><a href="http://boingboing.net/2011/11/22/tor-project-asks-supporters-to.html">Tor project asks supporters to set up virtual Tor bridges in Amazon's cloud</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 18</td>
 <td>Dagens IT</td>
-<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i
-den kinesiske internett-muren</a></td>
+<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i den kinesiske internett-muren</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 16</td>
 <td>Forbes</td>
-<td><a href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-
-firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great
-Firewall Tests Mysterious Scans On Encrypted Connections</a></td>
+<td><a href="http://www.forbes.com/sites/andygreenberg/2011/11/17/chinas-great-firewall-tests-mysterious-scans-on-encrypted-connections/">China's Great Firewall Tests Mysterious Scans On Encrypted Connections</a></td>
 </tr>
 
 <tr>
 <td>2011 Nov 15</td>
 <td>Ars Technica</td>
-<td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-
-yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself
-privacy bridge in Amazon cloud</a></td>
+<td><a href="http://arstechnica.com/business/news/2011/11/tor-launches-do-it-yourself-privacy-bridge-in-amazon-cloud.ars">Tor launches do-it-yourself privacy bridge in Amazon cloud</a></td>
 </tr>
 
 <tr>
 <td>2011 Aug 28</td>
 <td>The Tor Project</td>
-<td>The Tor Project announces a <a href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of
-the Tor software.</td>
+<td>The Tor Project announces a <a href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of the Tor software.</td>
 </tr>
 
 <tr>
 <td>2011 Aug 22</td>
 <td>VOA News: Asia</td>
-<td><a href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-
-for-Now-128178623.html">Some
-Chinese Surf Freely, for Now</a></td>
+<td><a href="http://www.voanews.com/english/news/asia/Some-Chinese-Surf-Freely-for-Now-128178623.html">Some Chinese Surf Freely, for Now</a></td>
 </tr>
 
 <tr>
 <td>2011 Aug 01</td>
 <td>Peace & Conflict Review</td>
-<td><a href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor,
-Anonymity, and the Arab Spring: An Interview with Jacob
-Appelbaum</a></td>
+<td><a href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor, Anonymity, and the Arab Spring: An Interview with Jacob Appelbaum</a></td>
 </tr>
 
 <tr>
 <td>2011 June 18</td>
 <td>CNN: Tech</td>
-<td><a href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.
-revolution/index.html">Starting
-a revolution with technology</a></td>
+<td><a href="http://www.cnn.com/2011/TECH/innovation/06/17/mesh.technology.revolution/index.html">Starting a revolution with technology</a></td>
 </tr>
 
 <tr>
 <td>2011 June 12</td>
 <td>CNN: Tech</td>
-<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/
-index.html">Wiping
-away whistle-blowers' online fingerprints</a></td>
+<td><a href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/index.html">Wiping away whistle-blowers' online fingerprints</a></td>
 </tr>
 
 <tr>
 <td>2011 May 14</td>
 <td>BBC: Click</td>
-<td><a href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">
-Andrew
-and Dr. Angela Sasse from UCL were interviewed by the BBC Click program
-about why Internet Anonymity is important and valuable in a modern,
-networked society.</a></td>
+<td><a href="http://news.bbc.co.uk/2/hi/programmes/click_online/default.stm">Andrew and Dr. Angela Sasse from UCL were interviewed by the BBC Click program about why Internet Anonymity is important and valuable in a modern, networked society.</a></td>
 </tr>
 
 <tr>
 <td>2011 March 29</td>
 <td>CNN: Situation Room</td>
-<td><a href="http://edition.cnn.com/CNN/Programs/situation.room/">Tor
-featured in a segment about US companies providing censorship to
-repressive regimes and those circumventing their products.</a></td>
+<td><a href="http://edition.cnn.com/CNN/Programs/situation.room/">Tor featured in a segment about US companies providing censorship to repressive regimes and those circumventing their products.</a></td>
 </tr>
 
 <tr>
 <td>2011 March 18</td>
 <td>Telegraph</td>
-<td><a href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/
-Iran-cracks-down-on-web-dissident-technology.html">Iran
-cracks down on web dissident technology</a></td>
+<td><a href="http://www.telegraph.co.uk/news/worldnews/middleeast/iran/8388484/Iran-cracks-down-on-web-dissident-technology.html">Iran cracks down on web dissident technology</a></td>
 </tr>
 
 <tr>
 <td>2011 March 17</td>
 <td>BusinessWeek</td>
-<td><a href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.
-htm">Social
-Networking: Fighting to Remain Anonymous</a></td>
+<td><a href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.htm">Social Networking: Fighting to Remain Anonymous</a></td>
 </tr>
 
 <tr>
 <td>2011 March 10</td>
 <td>NyTeknik</td>
-<td><a href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.
-ece">Svenska
-biståndspengar till Facebookrevolutionen</a></td>
+<td><a href="http://www.nyteknik.se/nyheter/it_telekom/internet/article3123594.ece">Svenska biståndspengar till Facebookrevolutionen</a></td>
 </tr>
 
 <tr>
 <td>2011 March 09</td>
 <td>Washington Post</td>
-<td><a href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/
-AR2011030905157_pf.html">U.S.
-funding tech firms that help Mideast dissidents evade government
-censors</a></td>
+<td><a href="http://www.washingtonpost.com/wp-dyn/content/article/2011/03/09/AR2011030905157_pf.html">U.S. funding tech firms that help Mideast dissidents evade government censors</a></td>
 </tr>
 
 <tr>
 <td>2011 February 17</td>
 <td>Walpole Times</td>
-<td><a href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-
-Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-
-protests">Tor
-Project, a Walpole-based company, helps Egyptians avoid Internet
+<td><a href="http://www.wickedlocal.com/walpole/news/x95296113/Tor-Project-a-Walpole-based-company-helps-Egyptians-avoid-Internet-censorship-during-protests">Tor Project, a Walpole-based company, helps Egyptians avoid Internet
 censorship during protests</a></td>
 </tr>
 
 <tr>
 <td>2011 January 31</td>
 <td>NPR: WBUR</td>
-<td><a href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">
-Here
-& Now: U.S. Activists Help Egyptian Protesters Elude Government
-Censorship Online</a></td>
+<td><a href="http://hereandnow.wbur.org/2011/01/31/egypt-internet-government">Here & Now: U.S. Activists Help Egyptian Protesters Elude Government Censorship Online</a></td>
 </tr>
 
 <tr>
 <td>2011 February 01</td>
 <td>Discovery News</td>
-<td><a href="http://news.discovery.com/tech/egypt-internet-online-protesters-
-110201.html">Egypt's
-Internet Block Incomplete But Damaging</a></td>
+<td><a href="http://news.discovery.com/tech/egypt-internet-online-protesters-110201.html">Egypt's Internet Block Incomplete But Damaging</a></td>
 </tr>
 
 <tr>
 <td>2011 January 31</td>
 <td>IDG Poland</td>
-<td><a href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.
-szukaja.alternatyw.html">Egipt
-blokuje Internet, aktywiści szukają alternatyw</a></td>
+<td><a href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.szukaja.alternatyw.html">Egipt blokuje Internet, aktywiści szukają alternatyw</a></td>
 </tr>
 
 <tr>
 <td>2011 January 31</td>
 <td>New Scientist</td>
-<td><a href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains
--officially-offli.html">How
-Egypt is getting online</a></td>
+<td><a href="http://www.newscientist.com/blogs/onepercent/2011/01/egypt-remains-officially-offli.html">How Egypt is getting online</a></td>
 </tr>
 
 <tr>
 <td>2011 January 31</td>
 <td>El Pais</td>
-<td><a href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe
-/fax/elpepuint/20110130elpepuint_14/Tes">Sortear
-la censura a golpe de fax</a></td>
+<td><a href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe/fax/elpepuint/20110130elpepuint_14/Tes">Sortear la censura a golpe de fax</a></td>
 </tr>
 
 <tr>
 <td>2011 January 30</td>
 <td>Fox 25 News - Boston</td>
-<td><a href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give
--egyptians-internet-access-20110130">Local
-company helps give Egyptians internet access</a></td>
+<td><a href="http://www.myfoxboston.com/dpp/news/local/local-company-helps-give-egyptians-internet-access-20110130">Local company helps give Egyptians internet access</a></td>
 </tr>
 
 <tr>
 <td>2011 January 30</td>
 <td>New England Cable News</td>
-<td><a href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-
-onlin/landing.html?blockID=400628&feedID=4213">Mass.
-company helps activists avoid online government censorship</a></td>
+<td><a href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-onlin/landing.html?blockID=400628&feedID=4213">Mass. company helps activists avoid online government censorship</a></td>
 </tr>
 
 <tr>
 <td>2011 January 30</td>
 <td>Boston Globe</td>
-<td><a href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30
-/mass_groups_software_helps_avoid_censorship/">Foreign
-activists stay covered online</a></td>
+<td><a href="http://www.boston.com/news/local/massachusetts/articles/2011/01/30/mass_groups_software_helps_avoid_censorship/">Foreign activists stay covered online</a></td>
 </tr>
 
 <tr>
 <td>2011 January 29</td>
 <td>SvD.se</td>
-<td><a href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-
-natdissidenter_5902693.svd">Tor
-öppnar dörrar för nätdissidenter</a></td>
+<td><a href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-natdissidenter_5902693.svd">Tor öppnar dörrar för nätdissidenter</a></td>
 </tr>
 
 <tr>
 <td>2011 January 29</td>
 <td>ComputerWorld</td>
-<td><a href="http://www.computerworld.com/s/article/9207058/
-Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">
-Without
-Internet, Egyptians find new ways to get online.</a></td>
+<td><a href="http://www.computerworld.com/s/article/9207058/Without_Internet_Egyptians_find_new_ways_to_get_online?taxonomyId=16">Without Internet, Egyptians find new ways to get online.</a></td>
 </tr>
 
 <tr>
 <td>2011 January 28</td>
 <td>Globe and Mail</td>
-<td><a href="https://www.theglobeandmail.com/news/technology/in-a-span-of-
-minutes-a-country-goes-offline/article1887207/">In
-a span of minutes, a country goes offline</a></td>
+<td><a href="https://www.theglobeandmail.com/news/technology/in-a-span-of-minutes-a-country-goes-offline/article1887207/">In a span of minutes, a country goes offline</a></td>
 </tr>
 
 <tr>
 <td>2010 December 22</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/web/26981/">Home Internet
-with Anonymity Built In</a></td>
+<td><a href="http://www.technologyreview.com/web/26981/">Home Internet with Anonymity Built In</a></td>
 </tr>
 
 <tr>
 <td>2010 December 17</td>
 <td>New York Times Magazine</td>
-<td><a href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">
-Granting
-Anonymity</a></td>
+<td><a href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">Granting Anonymity</a></td>
 </tr>
 
 <tr>
 <td>2010 November 03</td>
 <td>metro sverige</td>
-<td><a href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-
-anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td>
+<td><a href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td>
 </tr>
 
 <tr>
 <td>2010 Sept 17</td>
 <td>NPR: On the media</td>
-<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
-Media: Interview with Jacob Appelbaum</a>.</td>
+<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the Media: Interview with Jacob Appelbaum</a>.</td>
 </tr>
 
 <tr>
 <td>2010 Sept 16</td>
 <td>The Tor Project</td>
-<td>Tor announces an article discussing <a href="<page
-press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look
-for in a Circumvention Tool</a>.</td>
+<td>Tor announces an article discussing <a href="<page press/2010-09-16-ten-things-circumvention-tools>">Ten Things to Look for in a Circumvention Tool</a>.</td>
 </tr>
 
 <tr>
 <td>2010 August 01</td>
 <td>PC Format - Poland</td>
-<td><a href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-
-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
-and Facebook are spying on us</a></td>
+<td><a href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google and Facebook are spying on us</a></td>
 </tr>
 
 <tr>
 <td>2010 July 14</td>
 <td>China Rights Forum</td>
-<td><a href="http://www.hrichina.org/public/contents/category?cid=175033">China
-Rights Forum, No. 2 - “China’s Internet”: Staking Digital
-Ground</a></td>
+<td><a href="http://www.hrichina.org/public/contents/category?cid=175033">China Rights Forum, No. 2 - “China’s Internet”: Staking Digital Ground</a></td>
 </tr>
 
 <tr>
 <td>2010 May 25</td>
 <td>The Australian</td>
-<td><a href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-
-network-to-fight-censorship/story-e6frgakx-1225870756466">
-Call to join Tor network to fight censorship</a></td>
+<td><a href="http://www.theaustralian.com.au/australian-it/call-to-join-tor-network-to-fight-censorship/story-e6frgakx-1225870756466">Call to join Tor network to fight censorship</a></td>
 </tr>
 
 <tr>
 <td>2010 Mar 25</td>
 <td>The Tor Project</td>
-<td>Tor and Printfection launch <a href="<page
-press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td>
+<td>Tor and Printfection launch <a href="<page press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td>
 </tr>
 
 <tr>
 <td>2010 Mar 17</td>
 <td>PC World Poland</td>
-<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity
-in the Web</a></td>
+<td><a href="http://www.idg.pl/news/356993/Anonimowosc.w.Sieci.html">Anonymity in the Web</a></td>
 </tr>
 
 <tr>
 <td>2010 Mar 11</td>
 <td>ABC Australia</td>
-<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">
-Future Tense:  The Deep Web</a></td>
+<td><a href="http://www.abc.net.au/rn/futuretense/stories/2010/2837736.htm">Future Tense: The Deep Web</a></td>
 </tr>
 
 <tr>
 <td>2010 Mar 09</td>
 <td>PC Pro UK</td>
-<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">
-The dark
-side of the web</a></td>
+<td><a href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">The dark side of the web</a></td>
 </tr>
 
 <tr>
 <td>2009 Dec 29</td>
 <td>Times Online</td>
-<td><a href="http://www.timesonline.co.uk/tol/news/world/middle_east/
-article6969958.ece">When
-Iran’s regime falls this will be remembered as the YouTube revolution
-</a></td>
+<td><a href="http://www.timesonline.co.uk/tol/news/world/middle_east/article6969958.ece">When Iran’s regime falls this will be remembered as the YouTube revolution</a></td>
 </tr>
 
 <tr>
 <td>2009 Oct 15</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/web/23736/?a=f">China
-Cracks Down
-on Tor Anonymity Network</a></td>
+<td><a href="http://www.technologyreview.com/web/23736/?a=f">China Cracks Down on Tor Anonymity Network</a></td>
 </tr>
 
 <tr>
 <td>2009 Sep 30</td>
 <td>BusinessWeek</td>
-<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/
-gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
+<td><a href="http://www.businessweek.com/globalbiz/content/sep2009/gb20090930_620354.htm">China's Online Censors Work Overtime</a></td>
 </tr>
 
 <tr>
 <td>2009 Aug 19</td>
 <td>Reuters</td>
-<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?
-pageNumber=1&virtualBrandChannel=0&sp=true">Web tools help
-protect human
-rights activists</a></td>
+<td><a href="http://www.reuters.com/article/internetNews/idUSTRE57I4IE20090819?pageNumber=1&virtualBrandChannel=0&sp=true">Web tools help protect human rights activists</a></td>
 </tr>
 
 <tr>
 <td>2009 Aug 10</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How
-to Build Anonymity Into the Internet</a></td>
+<td><a href="http://www.technologyreview.com/blog/editors/23958/?nlid=2255">How to Build Anonymity Into the Internet</a></td>
 </tr>
 
 <tr>
 <td>2009 Jul 26</td>
 <td>Washington Times</td>
-<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-
-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web
-censors</a></td>
+<td><a href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-dodge-internet-censorship/">Senate OKs funds to thwart Iran Web censors</a></td>
 </tr>
 
 <tr>
 <td>2009 Jul 26</td>
 <td>Boston Globe</td>
-<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/
-us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike
-aid aimed
-at Iranians</a></td>
+<td><a href="http://www.boston.com/news/nation/washington/articles/2009/07/26/us_to_increase_funding_for_hackivists_aiding_iranians/">US set to hike aid aimed at Iranians</a></td>
 </tr>
 
 <tr>
 <td>2009 Jul 24</td>
 <td>Associated Press</td>
-<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-
-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude
-crackdown on
-Internet</a></td>
+<td><a href="http://www.google.com/hostednews/ap/article/ALeqM5hTf-p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude crackdown on Internet</a></td>
 </tr>
 
 <tr>
 <td>2009 Jul 08</td>
 <td>Tehran Bureau</td>
-<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
-Around the Globe Rally to Help Iranians Online</a></td>
+<td><a href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks Around the Globe Rally to Help Iranians Online</a></td>
 </tr>
 
 <tr>
 <td>2009 Jul 02</td>
 <td>NED/CIMA</td>
-<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role
-of New Media in the Iranian Elections</a></td>
+<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role of New Media in the Iranian Elections</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 26</td>
 <td>Washington Times</td>
-<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-
-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian
-protesters avoid censorship with Navy technology</a></td>
+<td><a href="http://www.washingtontimes.com/news/2009/jun/26/protesters-use-navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian protesters avoid censorship with Navy technology</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 29</td>
 <td>EFF</td>
-<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-
-relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor
-Relay</a></td>
+<td><a href="http://www.eff.org/deeplinks/2009/06/help-protesters-iran-run-tor-relays-bridges">Help Protesters in Iran: Run a Tor Bridge or a Tor Relay</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 24</td>
 <td>Daily Finance</td>
-<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-
-controversy/">Nokia and Siemens in Iran controversy</a></td>
+<td><a href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-controversy/">Nokia and Siemens in Iran controversy</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 18</td>
 <td>Wall Street Journal</td>
-<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-
-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
+<td><a href="http://blogs.wsj.com/digits/2009/06/18/iranians-using-tor-to-anonymize-web-use/">Iranians Using Tor to Anonymize Web Use</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 19</td>
 <td>O'Reilly Radar</td>
-<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">
-Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor
-Project and the EFF</a></td>
+<td><a href="http://radar.oreilly.com/2009/06/tor-and-the-legality-of-runnin.html">Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor Project and the EFF</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 18</td>
 <td>Deutsche Welle</td>
-<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">
-Internet proxies let Iranians and others connect to blocked Web sites</a></td>
+<td><a href="http://www.dw-world.de/dw/article/0,,4400882,00.html">Internet proxies let Iranians and others connect to blocked Web sites</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 18</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/web/22893/">
-The Web vs. the Republic of Iran</a></td>
+<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the Republic of Iran</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 17</td>
 <td>CNet News</td>
-<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">
-Iranians find ways to bypass Net censors</a></td>
+<td><a href="http://news.cnet.com/8301-13578_3-10267287-38.html">Iranians find ways to bypass Net censors</a></td>
 </tr>
 
 <tr>
 <td>2009 Jun 17</td>
 <td>ComputerWorld</td>
-<td><a href="http://www.computerworld.com/action/article.do?command=
-viewArticleBasic&articleId=9134471&intsrc=news_ts_head">
-Iran's leaders fight Internet; Internet wins (so far)</a></td>
+<td><a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9134471&intsrc=news_ts_head">Iran's leaders fight Internet; Internet wins (so far)</a></td>
 </tr>
 
 <tr>
 <td>2009 May 29</td>
 <td>Le Monde</td>
-<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-
-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
+<td><a href="http://www.lemonde.fr/actualite-medias/article/2009/05/29/les-censeurs-du-net_1199993_3236.html">Les censeurs du Net</a></td>
 </tr>
 
 <tr>
 <td>2009 May 15</td>
 <td>Mass High Tech</td>
-<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-
-tackles-Net-privacy-game-makers-flock-to-Hub.html">
+<td><a href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-tackles-Net-privacy-game-makers-flock-to-Hub.html">
 Tor tackles Net privacy</a></td>
 </tr>
 
 <tr>
 <td>2009 May 01</td>
 <td>New York Times</td>
-<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">
-Iranians and Others Outwit Net Censors</a></td>
+<td><a href="http://www.nytimes.com/2009/05/01/technology/01filter.html">Iranians and Others Outwit Net Censors</a></td>
 </tr>
 
 <tr>
 <td>2009 Apr 23</td>
 <td>Technology Review</td>
-<td><a href="http://www.technologyreview.com/computing/22427/?a=f">
-Dissent Made Safer:  How anonymity technology could save free speech on the
-Internet.</a></td>
+<td><a href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made Safer:  How anonymity technology could save free speech on the Internet.</a></td>
 </tr>
 
 <tr>
 <td>2009 Apr 22</td>
 <td>Le Monde</td>
-<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la
--cybersurveillance/">How to circumvent cybersurveillance</a></td>
+<td><a href="http://bugbrother.blog.lemonde.fr/2009/04/22/comment-contourner-la-cybersurveillance/">How to circumvent cybersurveillance</a></td>
 </tr>
 
 <tr>
 <td>2009 Apr 06</td>
 <td>Reader's Digest</td>
-<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/
-article122219.html">How to Hide Anything</a></td>
+<td><a href="http://www.rd.com/advice-and-know-how/how-to-hide-anything/article122219.html">How to Hide Anything</a></td>
 </tr>
 
 <tr>
 <td>2009 Apr 06</td>
 <td>Al Jazeera</td>
-<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">
-Global Village Voices showcases Tor</a></td>
+<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village Voices showcases Tor</a></td>
 </tr>
 
 <tr>
 <td>2009 Mar 18</td>
 <td>Marie Claire</td>
-<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">
-How to Manage Your Web Footprint</a></td>
+<td><a href="http://www.marieclaire.com/career-money/career-coach/manage-online--web-image">How to Manage Your Web Footprint</a></td>
 </tr>
 
 <tr>
 <td>2009 Mar 13</td>
 <td>Wall Street Journal</td>
-<td><a href="http://online.wsj.com/article/SB123567809587886053.html">
-The Kindness of Strangers</a></td>
+<td><a href="http://online.wsj.com/article/SB123567809587886053.html">The Kindness of Strangers</a></td>
 </tr>
 
 <tr>
 <td>2009 Mar 12</td>
 <td>The Tor Project</td>
-<td>Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>">
-performance roadmap</a> and campaign.</td>
+<td>Tor launches a <a href="<page press/2009-03-12-performance-roadmap-press-release>">performance roadmap</a> and campaign.</td>
 </tr>
 
 <tr>
 <td>2009 Mar 12</td>
 <td>BBC World Service</td>
-<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-
-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about
-Tor and Censorship</a></td>
+<td><a href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-world-day-against-cyber-censorship/">Steven J Murdoch interviewed about Tor and Censorship</a></td>
 </tr>
 
 <tr>
 <td>2009 Mar 03</td>
 <td>Orf Austria</td>
-<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER
-column</a></td>
+<td><a href="http://futurezone.orf.at/stories/1503028/">WIRTSCHAFTSKAMMER column</a></td>
 </tr>
 
 <tr>
 <td>2009 Feb 18</td>
 <td>Bangkok Post</td>
-<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-
-not-found-routine">The old fake "404 not found" routine</a></td>
+<td><a href="http://www.bangkokpost.com/tech/technews/11872/the-old-fake-404-not-found-routine">The old fake "404 not found" routine</a></td>
 </tr>
 
 <tr>
 <td>2009 Feb 13</td>
 <td>Hearsay Culture</td>
-<td><a href="http://www.hearsayculture.com/?p=307">
-Hearsay Culture Radio Interview/Podcast</a></td>
+<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio Interview/Podcast</a></td>
 </tr>
 
 <tr>
 <td>2008 Dec 29</td>
 <td>nu.nl</td>
-<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">
-Anoniem browsen voor gsm in de maak</a></td>
+<td><a href="http://www.nu.nl/internet/1891289/anoniem-browsen-voor-gsm-in-de-maak.html">Anoniem browsen voor gsm in de maak</a></td>
 </tr>
 
 <tr>
 <tr>
 <td>2008 Dec 19</td>
 <td>The Tor Project</td>
-<td>Tor announces 3-year <a href="<page press/2008-12-19-roadmap-press-release>">
-development roadmap</a>.</td>
+<td>Tor announces 3-year <a href="<page press/2008-12-19-roadmap-press-release>">development roadmap</a>.</td>
 </tr>
 
 <tr>
 <td>2008 Dec 14</td>
 <td>PC Magazine: Middle & Near East</td>
-<td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">
-How To Reclaim Your Online Privacy</a></td>
+<td><a href="http://www.pcmag-mideast.com/FeatureDetail.aspx?ID=1039">How To Reclaim Your Online Privacy</a></td>
 </tr>
 
 <tr>
 <td>2008 Aug 21</td>
 <td>CNN</td>
-<td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">
-Experts: Internet filtering and censorship rife</a></td>
+<td><a href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">Experts: Internet filtering and censorship rife</a></td>
 </tr>
 
 <tr>
 <td>2008 Aug 22</td>
 <td>The Sydney Morning Herald</td>
-<td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/
-1218911800889.html">The
+<td><a href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html">The
 China Syndrome</a></td>
 </tr>
 
 <tr>
 <td>2008 Aug 20</td>
 <td>Scientific American</td>
-<td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">
-Cryptography: How to Keep Your Secrets Safe</a></td>
+<td><a href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe">Cryptography: How to Keep Your Secrets Safe</a></td>
 </tr>
 
 <tr>
 <td>2008 Aug 05</td>
 <td>Guardian UK</td>
-<td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">
-Vaulting the great firewall</a></td>
+<td><a href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship">Vaulting the great firewall</a></td>
 </tr>
 
 <tr>
 <td>2008 Aug 10</td>
 <td>Tech Radar UK</td>
-<td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">
-Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous
-surfing for the paranoid</a>
+<td><a href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233">Freedom Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a>
 </td>
 </tr>
 
 <tr>
 <td>2008 Aug 07</td>
 <td>Spiegel</td>
-<td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">
-Tricks gegen Zensur und Überwachung</a>
+<td><a href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html">Tricks gegen Zensur und Überwachung</a>
 </td>
 </tr>
 
 <tr>
 <td>2008 Aug 07</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">
-15 Great, Free Privacy Downloads</a>.  Tor is Number 1.</td>
+<td><a href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html">15 Great, Free Privacy Downloads</a>.  Tor is Number 1.</td>
 </tr>
 
 <tr>
 <td>2008 Aug 07</td>
 <td>The Guardian UK</td>
-<td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">
-Chaos aims to crack China's wall</a>
+<td><a href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking">Chaos aims to crack China's wall</a>
 </td>
 </tr>
 
 <tr>
 <td>2008 Aug 07</td>
 <td>The Register UK</td>
-<td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">
-German hackers poke hole in great firewall of China</a>
+<td><a href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/">German hackers poke hole in great firewall of China</a>
 </td>
 </tr>
 
 <tr>
 <td>2008 May 24</td>
 <td>Groupo Estado</td>
-<td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525">
-Interview at Computers, Freedom, and Privacy 2008 Conference</a>
+<td><a href="http://blog.estadao.com.br/blog/cruz/?title=cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&cat=525">Interview at Computers, Freedom, and Privacy 2008 Conference</a>
 </td>
 </tr>
 
 <tr>
 <td>2008 Mar 12</td>
 <td>SearchSecurity.com</td>
-<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">
-Tor network 'bridges' help evade blockers</a>.
-Covers new Tor features designed to overcome filtering and blocking that
-prevent
-access
-to the Tor network.
+<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html">Tor network 'bridges' help evade blockers</a>.Covers new Tor features designed to overcome filtering and blocking that prevent access to the Tor network.
 </td>
 </tr>
 
 <tr>
 <td>2008 Feb 14</td>
 <td>Wired: Compiler Blog</td>
-<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
-How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
 </td>
 </tr>
 
 <tr>
 <td>2008 Feb 01</td>
 <td>PC World</td>
-<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">
-Hackers Can Expose Masked Surfers, Study Says</a>
-A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
-Steven Murdoch's recent PhD thesis</a>. Steven
-<a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B">
-responds on the Tor Blog</a>.</td>
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html">Hackers Can Expose Masked Surfers, Study Says</a>A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/">
+Steven Murdoch's recent PhD thesis</a>. Steven <a href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B"> responds on the Tor Blog</a>.</td>
 </tr>
 
 <tr>
 <td>2007 Sep 21</td>
 <td>Wired HowTo Blog</td>
-<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">
-Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to
-remain anonymous.</td>
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work">Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.</td>
 </tr>
 
 <tr>
 <td>2007 Sep 16</td>
 <td>Cnet</td>
-<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor
-anonymity server admin arrested</a>.  A Tor exit node operator from
-Germany was arrested and then released once the police realized their
-mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html">
-caused this operator to shut down the node</a>. We have an
-<a href="<page docs/faq-abuse>">Abuse FAQ for Tor Relay Operators</a>,
-as well as a
-<a href="<page eff/tor-legal-faq>">Legal FAQ for Tor Relay Operators</a>
-with advice on how to handle such issues if you are operating a Tor relay.</td>
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html">Tor anonymity server admin arrested</a>. A Tor exit node operator from Germany was arrested and then released once the police realized their
+mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html"> caused this operator to shut down the node</a>. We have an
+<a href="<page docs/faq-abuse>">Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>">Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.</td>
 </tr>
 
 <tr>
 <td>2007 Sep 10</td>
 <td>Wired</td>
-<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">
-Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/>
-Swedish computer security consultant Dan Egerstad monitored the traffic
-going through a Tor exit node he was running, then published unencrypted
-account and password information.  Note that the better articles
-covering this event correctly indicate that this is not a security flaw
-or design problem with Tor - Tor provides anonymity, but does not
-encrypt anything going to or from an exit node. You
-<strong>must</strong> use SSL (https) while browsing to ensure
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks">Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br/> Swedish computer security consultant Dan Egerstad monitored the traffic
+going through a Tor exit node he was running, then published unencrypted account and password information.  Note that the better articles covering this event correctly indicate that this is not a security flaw
+or design problem with Tor - Tor provides anonymity, but does not encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while browsing to ensure
 end-to-end encryption.  Also covered in <a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information">
 The Inquirer</a>,
 <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY">



More information about the tor-commits mailing list