[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[or-cvs] r16771: {} initial translation of tormedia (website/trunk/de)



Author: qbi
Date: 2008-09-05 11:44:13 -0400 (Fri, 05 Sep 2008)
New Revision: 16771

Added:
   website/trunk/de/tormedia.wml
Log:
initial translation of tormedia

Added: website/trunk/de/tormedia.wml
===================================================================
--- website/trunk/de/tormedia.wml	                        (rev 0)
+++ website/trunk/de/tormedia.wml	2008-09-05 15:44:13 UTC (rev 16771)
@@ -0,0 +1,775 @@
+## translation metadata
+# Based-On-Revision: 16647
+# Last-Translator: jens@xxxxxxxxxxxx
+
+#include "head.wmi" TITLE="The Tor Project in den Medien" CHARSET="UTF-8"
+
+<div class="main-column">
+
+<h1>Erscheinung in den Medien</h1>
+
+<h2>Interviews &amp; Auftritte</h2>
+
+<p>Medien wie die New York Times, Forbes und CBS Evening News haben Mitglieder
+des Tor-Projektes wegen ihrer Expertise zu Fragen der Anonymität, Privatsphäre
+und Zensur im Internet immer wieder befragt oder zitiert. Hier sind einige
+Beispiele:</p>
+
+<table width="100%" border="0" cellpadding="3" cellspacing="0">
+<thead style="background-color: #e5e5e5;">
+<tr>
+<th width="10%">Datum</th>
+<th width="15%">Publikation</th>
+<th>Thema</th>
+</tr>
+</thead>
+
+<tr>
+<td>2006-04-11</td>
+<td>PBS Frontline</td>
+<td><a
+href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html";>
+Chipping Away at China's Great Firewall</a></td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2006-02-28</td>
+<td>PC World</td>
+<td><a href="http://www.pcworld.com/article/id,124891-page,1/article.html";>
+Outsmarting the Online Privacy Snoops</a></td>
+</tr>
+
+<tr> 
+<td>2006-02-27</td>
+<td>Forbes</td>
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html";>
+Cracks In the Wall</a>.  Diskussion über Tor als Werkzeug zur Umgehung von
+Zensur</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2006-02-20</td>
+<td>The Boston Globe</td>
+<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html";>
+Beating censorship on the Internet</a></td>
+</tr>
+
+<tr> 
+<td>2006-02-15</td>
+<td>CBS Evening News</td>
+<td><a href="http://www.cbsnews.com/stories/2006/02/15/eveningnews/main1321785.shtml?source=search_story";>
+Cracking The 'Great Firewall Of China'</a>.  Roger Dingledine erschien in der
+Show, um Tor zu diskutieren. Die Sequenz startet bei 1:04 im Video.</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2006-02-15</td>
+<td>CNBC - Closing Bell</td>
+<td>TV-Auftritt von Roger Dingledine um  16:25. (keine URL)</td>
+</tr>
+
+<tr>
+<td>2006-01-27</td>
+<td>Fox News/eWeek</td>
+<td><a href="http://www.foxnews.com/story/0,2933,183005,00.html";> Web
+Anonymizers Suddenly Get Very Popular</a></td>
+</tr>
+
+<tr>
+<td>2006-01-25</td>
+<td>New York Times</td>
+<td><a href="http://www.nytimes.com/2006/01/25/technology/techspecial2/25privacy.html?_r=1&amp;oref=slogin";>
+Privacy for People Who Don't Show Their Navels</a></td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2005-08-06</td>
+<td>New Scientist</td>
+<td><a href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php";>Why we all need pornography</a></td>
+</tr>
+</table>
+
+<h2>Artikel</h2>
+
+<p>Tor wird weltweit regelmäßig benutzt und erscheint daher regelmäßig in der
+Presse. Diese Liste ist nicht umfangreich, sondern illustriert einige der wichtigeren
+Artikel.</p>
+
+<table width="100%" border="0" cellpadding="3" cellspacing="0">
+<thead style="background-color: #e5e5e5;">
+<tr>
+<th width="10%">Datum</th>
+<th width="15%">Publikation</th>
+<th>Thema</th>
+</tr>
+</thead>
+
+<tr>
+<td>2008-08-21</td>
+<td>CNN</td>
+<td><a
+href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html";>Experts:
+Internet filtering and censorship rife</a></td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2008-08-22</td>
+<td>The Sydney Morning Herald</td>
+<td><a
+href="http://www.smh.com.au/news/web/the-china-syndrome/2008/08/20/1218911800889.html";>The
+China Syndrome</a></td>
+</tr>
+
+<tr>
+<td>2008-08-20</td>
+<td>Scientific American</td>
+<td><a
+href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-secrets-safe";>Cryptography:
+How to Keep Your Secrets Safe</a></td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2008-09-05</td>
+<td>Guardian UK</td>
+<td><a
+href="http://www.guardian.co.uk/commentisfree/2008/aug/05/china.censorship";>Vaulting
+the great firewall</a></td>
+</tr>
+
+<tr>
+<td>2008-08-10</td>
+<td>Tech Radar UK</td>
+<td><a
+href="http://www.techradar.com/news/internet/web/freedom-stick-highlights-chinese-net-censorship-449233";>Freedom
+Stick highlights Chinese 'net censorship: USB drive promises anonymous surfing for the paranoid</a>
+</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2008-08-07</td>
+<td>Spiegel</td>
+<td><a
+href="http://www.spiegel.de/netzwelt/tech/0,1518,570421,00.html";>Tricks
+gegen Zensur und Überwachung</a>
+</td>
+</tr>
+<tr>
+<td>2008-08-07</td>
+<td>PC World</td>
+<td><a
+href="http://www.pcworld.com/article/149399-3/15_great_free_privacy_downloads.html";>15
+Great, Free Privacy Downloads</a>.  Tor is Number 1.
+</td>
+</tr>
+<tr style="background-color: #e5e5e5;">
+<td>2008-08-07</td>
+<td>The Guardian UK</td>
+<td><a
+href="http://www.guardian.co.uk/technology/2008/aug/07/censorship.hacking";>Chaos
+aims to crack China's wall</a>
+</td>
+</tr>
+
+<tr>
+<td>2008-08-07</td>
+<td>The Register UK</td>
+<td><a
+href="http://www.theregister.co.uk/2008/08/07/torbrowser_olympics/";>German
+hackers poke hole in great firewall of China</a>
+</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2008-04-12</td>
+<td>SearchSecurity.com</td>
+<td><a href="http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1305120,00.html";>
+Tor network 'bridges' help evade blockers</a>.
+Covers new Tor features designed to overcome filtering and blocking that prevent access
+to the Tor network.
+</td>
+</tr>
+<tr>
+<td>2008-02-14</td>
+<td>Wired: Compiler Blog</td>
+<td><a href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html";>
+How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
+</td>
+</tr>
+<tr style="background-color: #e5e5e5;">
+<td>2008-02-01</td>
+<td>PC World</td>
+<td><a href="http://www.pcworld.com/article/id,142094-pg,1/article.html";>
+Hackers Can Expose Masked Surfers, Study Says</a>
+A report on <a href="http://www.lightbluetouchpaper.org/2007/12/10/covert-channel-vulnerabilities-in-anonymity-systems/";>
+Steven Murdoch's recent PhD thesis</a>. Steven <a
+href="http://blog.torproject.org/blog/media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-anonymity-systems%2526quot%3B";>
+responds on the Tor Blog</a>.</td>
+</tr>
+<tr style="background-color: #e5e5e5;">
+<td>2007-09-21</td>
+<td>Wired HowTo Blog</td>
+<td><a href="http://howto.wired.com/wiredhowtos/index.cgi?page_name=be_a_whistle_blower;action=display;category=Work";>
+Be a Whistleblower</a>.  Wired recommends Tor for whistleblowers who wish to remain anonymous.
+</td>
+</tr>
+
+<tr>
+<td>2007-09-16</td>
+<td>Cnet</td>
+<td><a href="http://news.cnet.com/8301-13739_3-9779225-46.html";>
+    Tor anonymity server admin arrested</a>.  A Tor exit node operator from Germany was arrested and then released once the police realized
+    their mistake. Unfortunately, the hassle <a href="http://arstechnica.com/news.ars/post/20070917-tor-node-operator-after-run-in-with-police-i-cant-do-this-any-more.html";> caused this operator to shut down the node</a>.
+    We have an <a href="<page faq-abuse>"> Abuse FAQ for Tor Relay Operators</a>, as well as a <a href="<page eff/tor-legal-faq>">
+    Legal FAQ for Tor Relay Operators</a> with advice on how to handle such issues if you are operating a Tor relay.
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2007-09-10</td>
+<td>Wired</td>
+<td> <a href="http://www.wired.com/politics/security/news/2007/09/embassy_hacks";>
+Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise</a><br />
+Swedish computer security consultant Dan Egerstad monitored the traffic going through a Tor exit node
+he was running, then published unencrypted account and password information.
+Note that the better articles covering this event correctly indicate that this is not a security
+flaw or design problem with Tor - Tor provides anonymity, but does not
+encrypt anything going to or from an exit node. You <strong>must</strong> use SSL (https) while
+browsing to ensure end-to-end encryption.
+Also covered in
+<a href="http://www.theinquirer.net/en/inquirer/news/2007/09/10/tor-network-exposes-sensitive-information";>
+The Inquirer</a>, <a href="http://www.infoworld.com/article/07/09/10/Security-researcher-intercepts-embassy-passwords_1.html?APPLICATION%20SECURITY";>
+InfoWorld</a>, <a href="http://www.smh.com.au/articles/2007/11/12/1194766589522.html?page=fullpage#contentSwap2";>
+The Sydney Morning Herald</a>,
+<a href="http://www.securityfocus.com/news/11486";>
+Security Focus</a>, <a href="http://arstechnica.com/news.ars/post/20070910-security-expert-used-tor-to-collect-government-e-mail-passwords.html";>
+ars technica</a>, and many others. It was reported as early as August 31, 2007 on the
+<a href="http://blog.wired.com/27bstroke6/2007/08/embassy-e-mail-.html";>
+Wired Blog</a>, before Mr. Egerstad revealed that he had obtained the information via his Tor exit node.
+In the end, Mr. Egerstad was arrested, which was covered by
+<a href="http://www.theregister.co.uk/2007/11/15/tor_hacker_arrest/";>
+The Register</a>, <a href="http://www.smh.com.au/news/security/police-swoop-on-hacker-of-the-year/2007/11/15/1194766821481.html?page=fullpage#contentSwap1";>
+The Sydney Morning Herald</a>, <a href="http://blogs.zdnet.com/Berlind/?p=900";>
+ZDNet</a>, and <a href="http://blog.wired.com/27bstroke6/2007/11/swedish-researc.html";> Wired Blog</a>.
+</td>
+</tr>
+
+<tr>
+<td>2007-07-27</td>
+<td>Wired Blog</td>
+<td><a href="http://blog.wired.com/27bstroke6/2007/07/cyber-jihadists.html";> Cyber Jihadists Embrace Tor</a><br />
+A pointer to a <a href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html";>
+blog</a> that posted screenshots of Arabic instructions on using Tor, ostensibly for jihadists. Make sure to read Shava Nerad's reply
+at the bottom of the article.
+</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2007-06-22</td>
+<td>Bangkok Post</td>
+<td> <a href="http://www.asiamedia.ucla.edu/article-southeastasia.asp?parentid=72388";>
+The problems with censorship</a>.  Mentions anecdotes that "everyone" has Tor installed in Thailand to avoid censorship.
+</td>
+</tr>
+
+<tr>
+<td>2007-04-15</td>
+<td>World Changing</td>
+<td><a href="http://www.worldchanging.com/archives/006309.html";>
+Blogging Where Speech Isn’t Free</a><br />
+Coverage of former Tor Executive Director Shava Nerad's participation at an
+<a href="http://2007.sxsw.com/interactive/programming/panels/?action=show&amp;id=IAP060124";>
+SXSW panel</a>, where she explained how Tor can help bloggers.
+</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2007-04-8</td>
+<td>Security Focus</td>
+<td><a href="http://www.securityfocus.com/news/11447/1";>
+Tor hack proposed to catch criminals</a>.
+Coverage of a toolset called "Torment" for monitoring exit nodes, and responses from the
+Tor Project illustrating why this approach may not be a good idea.
+</td>
+</tr>
+
+<tr>
+<td>2007-02-1</td>
+<td>Dr Dobb's</td>
+<td><a href="http://www.ddj.com/security/197002414";>
+Tor Project Protects Anonymous Sources</a>.
+An introduction to Tor, including technical and historical background.
+</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2006 Oct 19</td>
+<td>Wired Threat Level</td>
+<td><a href="http://blog.wired.com/27bstroke6/2006/10/the_onion_route.html";>
+The Onion Router (TOR) is Leaky (Leeky)</a>.
+Explains why you need something like Privoxy
+in addition to the core Tor code to ensure your anonymity. If you use the
+Vidalia bundle, it installs and configures Privoxy automatically, but it can't
+hurt to understand why it is necessary.
+</td>
+</tr>
+
+<tr>
+<td>2006-08-18</td>
+<td>NPR</td>
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5168456";>
+Tips for Protecting Privacy Online</a>.
+Kevin Bankston of the EFF recommends Tor during an NPR interview.
+Tor information begins at 8:15 into the program.
+</td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+<td>2006-07-5</td>
+<td>MSNBC</td>
+<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/";>
+Defending liberties in high-tech world</a>.
+Mentions EFF funding for Tor as one of its significant nonlitigation projects.
+</td>
+</tr>
+
+<tr>
+  <td>
+    2006-02-15
+  </td>
+  <td>
+    Network Secure</td>
+    <td><a href="http://www.network-secure.de/index.php?option=com_content&amp;task=view&amp;id=3909";>
+    Tor: Anonymisierungswerkzeug entwickelt</a> (German)<br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2006-02-13
+  </td>
+  <td>
+    Wall Street Journal</td>
+<td>    <a href="http://online.wsj.com/article/SB113979965346572150.html";>
+    Chinese Censors Of Internet Face 'Hacktivists' in U.S.</a><br />
+    Full article text can also be found
+    <a href="http://yaleglobal.yale.edu/display.article?id=6981";>here</a>.
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2006-01-31
+  </td>
+  <td>
+    Technology Review</td>
+<td>    <a href="http://www.technologyreview.com/Infotech/16216/page2/";>
+    Evading the Google Eye</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2006-01-29
+  </td>
+  <td>
+    New York Times</td>
+<td>    <a href="http://www.nytimes.com/2006/01/29/weekinreview/29basic.html";>
+    How to Outwit the World's Internet Censors</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2006-01-23
+  </td>
+  <td>
+    NPR Talk of the Nation</td>
+<td>    <a href="http://www.npr.org/templates/story/story.php?storyId=5168456";>
+    Search Engines and Privacy Rights on the Web</a><br />
+    <a href="http://xeni.net/";>Xeni Jardin</a>
+    recommends Tor at 33:30 into the program.
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2006-02-15
+  </td>
+  <td>
+    Punto Informatico</td>
+<td>    <a href="http://punto-informatico.it/p.aspx?i=1430903";>
+    TOR c'è</a> (Italian)<br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2006-01-20
+  </td>
+  <td>
+    Wired</td>
+<td>    <a href="http://www.wired.com/science/discoveries/news/2006/01/70051?currentPage=2";>
+    How to Foil Search Engine Snoops</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2006-01-20
+  </td>
+  <td>
+    NPR</td>
+<td><a href="http://www.npr.org/templates/story/story.php?storyId=5165854";>
+    Google Records Subpoena Raises Privacy Fears</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-09-30
+  </td>
+  <td>
+    Viva o Linux</td>
+   <td> <a href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759";>
+    TOR: A Internet sem rastreabilidade</a> (Portuguese)<br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-07-12
+  </td>
+  <td>
+    IEEE Computer Society's Technical Committee on Security and Privacy</td>
+<td>    <a href="http://www.ieee-security.org/Cipher/Newsbriefs/2005/071805.html#TOR";>
+    Onion routing application Tor makes PCWorld's top 100</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-06-22
+  </td>
+  <td>
+    The Unofficial Apple Blog</td>
+<td>    <a href="http://www.tuaw.com/2005/06/22/privacy-watch-tor/";>
+    Privacy Watch: Tor</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-06-10
+  </td>
+  <td>
+    The New Zealand Herald</td>
+<td>    <a href="http://www.nzherald.co.nz/section/story.cfm?c_id=5&amp;objectid=10329896";>
+    China's internet censorship stranglehold can't last</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-06-8
+  </td>
+  <td>
+    American Public Radio</td>
+<td>    <a href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml";>
+    An Internet privacy tool called "Tor"</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-06-1
+  </td>
+  <td>
+    PC World</td>
+<td>    <a href="http://www.pcworld.com/article/id,120763-page,4/article.html";>
+    The 100 Best Products of 2005</a><br />
+    Tor is ranked #40 on the list.
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-06-1
+  </td>
+  <td>
+    Linux Weekly News</td>
+<td>    <a href="http://lwn.net/Articles/138242/";>
+    A Look at The Onion Router (Tor)</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-05-22
+  </td>
+  <td>
+    Slashdot</td>
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244";>
+     Tor Anonymity Network Reaches 100 Verified Nodes</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-05-20
+  </td>
+  <td>
+    Security.uz</td>
+<td>    <a href="http://security.uz/news/default.asp?id=10541";>
+    Tor - мощный анонимайзер для всех ОС</a> (Russian)<br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-05-19
+  </td>
+  <td>
+    WebPlanet</td>
+<td>    <a href="http://webplanet.ru/news/security/2005/5/19/tor.html";>
+    Tor: распределенная система анонимного серфинга</a> (Russian)<br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-05-17
+  </td>
+  <td>
+    Wired</td>
+<td>    <a href="http://www.wired.com/politics/security/news/2005/05/67542?currentPage=all";>
+    Tor Torches Online Tracking</a><br />
+    Also available in
+    <a href="http://wiredvision.jp/archives/200505/2005051904.html";>Japanese</a>.
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-05-17
+  </td>
+  <td>
+    XBiz</td>
+<td>    <a href="http://xbiz.com/news/8761";>
+    Navy Project Allows Anonymous Browsing</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-04-13
+  </td>
+  <td>
+    Heise online</td>
+<td>    <a href="http://www.heise.de/newsticker/meldung/58506";>
+    CFP: Vom kafkaesken Schwinden der Anonymität</a> (German)<br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-04-5
+  </td>
+  <td>
+    Libero</td>
+<td>    <a href="http://magazine.libero.it/internetlife/scienzaeweb/ne208.phtml";>
+    Anonimato on line, ecco Tor</a> (Italian)<br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2005-01-4
+  </td>
+  <td>
+    Internetnews</td>
+<td>    <a href="http://www.internetnews.com/dev-news/article.php/3454521";>
+    EFF Throws Support to 'Anonymous' Internet Project</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2005-04-31
+  </td>
+  <td>
+    Linux.com</td>
+<td>    <a href="http://www.linux.com/articles/43713?tid=19&amp;tid=78";>
+    Securing your online privacy with Tor</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-12-27
+  </td>
+  <td>
+    BoingBoing</td>
+<td>    <a href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html";>
+    EFF helping produce anonymizing software</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-12-25
+  </td>
+  <td>
+    Kansas City infozine</td>
+<td>    <a href="http://www.infozine.com/news/stories/op/storiesView/sid/4933/";>
+    EFF Joins Forces with Tor Software Project</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-12-23
+  </td>
+  <td>
+    golem.de</td>
+<td>    <a href="http://www.golem.de/0412/35340.html";>
+    EFF unterstützt Anonymisierer Tor</a> (German)<br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-12-23
+  </td>
+  <td>
+    SuicideGirls</td>
+<td>    <a href="http://suicidegirls.com/news/technology/6150/";>
+    New Routing Software Allows Anonymous Internet Use</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-12-18
+  </td>
+  <td>
+    P2Pnet</td>
+<td>    <a href="http://p2pnet.net/story/3357";>
+    EFF to sponsor Tor</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-12-22
+  </td>
+  <td>
+    Slashdot</td>
+<td>    <a href="http://yro.slashdot.org/article.pl?sid=04/12/22/2031229&amp;tid=95&amp;tid=158&amp;tid=153&amp;tid=17";>
+     EFF Promotes Freenet-like System Tor</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-11-16
+  </td>
+  <td>
+    AlterNet</td>
+<td>    <a href="http://www.alternet.org/columnists/story/20523/";>
+    Heavy Traffic</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-08-30
+  </td>
+  <td>
+    Newsweek</td>
+<td>    Technology: Instant Security (no link)<br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-08-16
+  </td>
+  <td>
+    Eweek</td>
+<td>    <a href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-Tools/";>
+    Don't Fear Internet Anonymity Tools</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-08-6
+  </td>
+  <td>
+    HCC magazine</td>
+<td>    <a href="http://www.hcc.nl/eCache/DEF/21/083.html";>
+    Anoniem surfen met hulp van marine VS</a> (Dutch)<br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-08-6
+  </td>
+  <td>
+    Golem</td>
+<td>    <a href="http://www.golem.de/0408/32835.html";>
+    Tor: Anonymisierer nutzt Onion-Routing</a><br />
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-08-5
+  </td>
+  <td>
+    Network World Security</td>
+<td>    <a href="http://www.networkworld.com/details/7088.html";>
+    Onion routing</a><br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    2004-05-8
+  </td>
+  <td>
+    Wired</td>
+<td>    <a href="http://www.wired.com/politics/security/news/2004/08/64464";>
+    Onion Routing Averts Prying Eyes</a><br />
+    Also in <a href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.html";>Japanese</a>.
+  </td>
+</tr>
+
+<tr style="background-color: #e5e5e5;">
+  <td>
+    2004-04-08
+  </td>
+  <td>
+    CNET Japan blog</td>
+<td>    <a href="http://japan.cnet.com/blog/umeda/2004/03/08/entry_post_126/";>
+    Yearning of hackers and insecurity</a> (Japanese)<br />
+  </td>
+</tr>
+
+<tr>
+  <td>
+    1999-04-13
+  </td>
+  <td>
+    Wired</td>
+<td>    <a href="http://www.wired.com/science/discoveries/news/1999/04/19091";>
+    Anonymous Web Surfing? Uh-Uh</a><br />
+  </td>
+</tr>
+
+</table>
+
+</div>
+
+#include <foot.wmi>