Ticket #12022: 12022.patch

File 12022.patch, 6.9 KB (added by jmtodaro, 6 years ago)
  • press/en/press.wml

     
    2525
    2626<table width="100%" cellpadding="3" cellspacing="0">
    2727
    28 <thead style="">
     28<thead style="background-color: #e5e5e5;">
    2929<tr>
    3030<th width="15%">Date</th>
    3131<th width="15%">Publication</th>
    3232<th>Topic</th>
    3333</tr>
    3434</thead>
     35<tr style="">
     36<td>2014 May 9</td>
     37<td>Vice</td>
     38<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
     39</tr>
    3540<tr style="background-color: #e5e5e5;">
     41<td>2014 May 7</td>
     42<td>BoingBoing</td>
     43<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">Tor: network security for domestic abuse survivors</a></td>
     44</tr>
     45<tr style="">
     46<td>2014 May 7</td>
     47<td>BetaBoston</td>
     48<td><a href="http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/">As domestic abuse goes digital, shelters turn to counter-survellience with Tor</a></td>
     49</tr>
     50<tr style="background-color: #e5e5e5;">
     51<td>2014 May</td>
     52<td>Boston Magazine</td>
     53<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">The Power of Ideas</a></td>
     54</tr>
     55<tr style="">
     56<td>2014 Apr 29</td>
     57<td>ThinkProgress</td>
     58<td><a href="http://thinkprogress.org/culture/2014/04/29/3432050/can-you-hide-from-big-data/">Meet the Woman Who did Everything in Her Power to Hide Her Pregnancy From Google</a></td>
     59</tr>
     60<tr style="background-color: #e5e5e5;">
     61<td>2014 Mar 26</td>
     62<td>IT News Africa</td>
     63<td><a href="http://www.itnewsafrica.com/2014/03/hidden-internet-growing-rapidly/">“Hidden” internet growing rapidly</a></td>
     64</tr>
     65<tr style="">
     66<td>2014 Mar 25</td>
     67<td>Westmoreland Times</td>
     68<td><a href="http://westmorelandtimes.com/news/11611/25/how-to-mask-your-location-internet-privacy-tools/">Masking your location on the internet with privacy tools</a></td>
     69</tr>
     70<tr style="background-color: #e5e5e5;">
     71<td>2014 Mar 24</td>
     72<td>BoingBoing</td>
     73<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">Turkey orders block of Twitter's IP addresses</a></td>
     74</tr>
     75<tr style="">
     76<td>2014 Mar 24</td>
     77<td>Telegraph.co.uk</td>
     78<td><a href="http://blogs.telegraph.co.uk/technology/willardfoxton2/100012913/dozens-of-firms-are-invisibly-tracking-you-online-heres-how-to-hide-from-them/">Dozens of firms are invisibly tracking you online. Here's how to hide from them</a></td>
     79</tr>
     80<tr style="background-color: #e5e5e5;">
     81<td>2014 Mar 24</td>
     82<td>Washington Post</td>
     83<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">The Switchboard: Turkey's Twitter ban gets tougher</a></td>
     84</tr>
     85<tr style="">
     86<td>2014 Mar 23</td>
     87<td>Ars Technica</td>
     88<td><a href="http://arstechnica.com/tech-policy/2014/03/after-dns-change-fails-turkish-government-steps-up-twitter-censorship/">After DNS change fails, Turkish government steps up Twitter censorship</a></td>
     89</tr>
     90<tr style="background-color: #e5e5e5;">
     91<td>2014 Mar 23</td>
     92<td>CSO</td>
     93<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
     94</tr>
     95<tr style="">
     96<td>2014 Mar 20</td>
     97<td>Threat Post</td>
     98<td><a href="http://threatpost.com/malicious-ios-tor-browser-in-apple-app-store/104911">Malicious iOS Tor Browswer in Apple App Store</a></td>
     99</tr>
     100<tr style="background-color: #e5e5e5;">
     101<td>2014 Mar 20</td>
     102<td>PC World</td>
     103<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
     104</tr>
     105<tr style="">
     106<td>2014 Mar 10</td>
     107<td>USA Today</td>
     108<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">Four questions about Tor</a></td>
     109</tr>
     110<tr style="background-color: #e5e5e5;">
     111<td>2014 Mar 3</td>
     112<td>Computerworld</td>
     113<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">The paranoid's survival guide, part 1: How to protect your personal data</a></td>
     114</tr>
     115<tr style="">
     116<td>2014 Feb 21</td>
     117<td>Lifehacker</td>
     118<td><a href="http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029">What Is Tor and Should I Use It?</a></td>
     119</tr>
     120<tr style="background-color: #e5e5e5;">
     121<td>2014 Feb 20</td>
     122<td>Watchdog.org</td>
     123<td><a href="http://watchdog.org/129349/securedrop-deep-throat/">Are you ready to be Deep Throat?</a></td>
     124</tr>
     125<tr style="">
     126<td>2014 Feb 19</td>
     127<td>Daily Illini</td>
     128<td><a href="http://www.dailyillini.com/news/article_407e25da-9909-11e3-8f33-0017a43b2370.html">Security technology to help students in future careers</a></td>
     129</tr>
     130<tr style="background-color: #e5e5e5;">
     131<td>2014 Feb 19</td>
     132<td>Nature World News</td>
     133<td><a href="http://www.natureworldnews.com/articles/6098/20140219/wildleaks-new-service-allows-anonymous-whistleblowers-report-wildlife-crime.htm">WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime</a></td>
     134</tr>
     135<tr style="">
     136<td>2014 Feb 6</td>
     137<td>Help Net Security</td>
     138<td><a href="http://www.net-security.org/secworld.php?id=16323">HTTPS Everywhere add-on now available for Firefox on Android</a></td>
     139</tr>
     140<tr style="background-color: #e5e5e5;">
     141<td>2014 Feb 5</td>
     142<td>OEN</td>
     143<td><a href="http://www.opednews.com/articles/HTTPS-Everywhere-More-se-by-John-Moffett-Communication_Internet_Surveillance-140205-843.html">"HTTPS Everywhere" More secure browsing courtesy of the EFF and Tor</a></td>
     144</tr>
     145<tr style="">
     146<td>2014 Feb 4</td>
     147<td>Popular Mechanics</td>
     148<td><a href="http://www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529">7 Ways to Reclaim Your Digital Privacy</a></td>
     149</tr>
     150<tr style="background-color: #e5e5e5;">
     151<td>2014 Feb 3</td>
     152<td>IBTimes</td>
     153<td><a href="http://www.ibtimes.co.uk/avoiding-sochi-snoopers-using-tor-common-sense-nail-polish-prevent-russian-authorities-spying-1434938">Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russian Authorities Spying on Journalists</a></td>
     154</tr>
     155<tr style="">
     156<td>2014 Feb</td>
     157<td>TechTarget</td>
     158<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">Tor networks: Stop employees from touring the deep web</a></td>
     159</tr>
     160<tr style="background-color: #e5e5e5;">
    36161<td>2014 Jan 23</td>
    37162<td>BusinessWeek</td>
    38163<td><a href="http://www.businessweek.com/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency">The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built</a></td>