[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[tor-commits] [webwml/master] Fix css in press page so that no style is added inline
commit 15a69a5acb324befdb9c2680675ae0cf7b3d5e5b
Author: hiro <hiro@xxxxxxxxxxxxxx>
Date: Fri Aug 10 19:44:53 2018 +0200
Fix css in press page so that no style is added inline
---
css/layout.css | 14 +-
css/layout.min.css | 2 +-
press/en/press.wml | 632 ++++++++++++++++++++++++++---------------------------
3 files changed, 326 insertions(+), 322 deletions(-)
diff --git a/css/layout.css b/css/layout.css
index 33cba6dc..0c4fea05 100644
--- a/css/layout.css
+++ b/css/layout.css
@@ -396,6 +396,10 @@ body {
/* TABLE ------------*/
+#press tr:nth-child(even) {
+ background-color: #e5e5e5;
+}
+
table { width: 100%; }
td { padding: 12px; }
@@ -674,7 +678,7 @@ table tr img {
background-origin: padding-box;
background-position: 0% 0%;
background-repeat: no-repeat;
- background-size: 100% 100%;
+ background-size: 100% 100%;
}
.easy .package h2,
@@ -1199,7 +1203,7 @@ div.blogFirstRow {
height: 22px;
background: url(../images/table-head.jpg) left top repeat-x #885ca4;
}
-
+
.blogRow:hover {
background: #f6ffd5;
}
@@ -1227,7 +1231,7 @@ p.blogAuthor {
text-align: right;
margin-top: -20px;
}
-
+
p.blogAuthor em{
color: #4e6a20;
text-align: right;
@@ -1237,7 +1241,7 @@ p.blogAuthor em{
p.blogDate {
color: #000000;
}
-
+
.blogFeed h2 {
font-size: 1.467em;
margin: 0;
@@ -1272,7 +1276,7 @@ p.blogDate {
left: 0;
}
- .projectbox .projectdesc {
+ .projectbox .projecesc {
margin-left: 100px;
}
/* END */
diff --git a/css/layout.min.css b/css/layout.min.css
index bb76b488..71463b5a 100644
--- a/css/layout.min.css
+++ b/css/layout.min.css
@@ -1 +1 @@
-@charset "UTF-8";body{background:#fff}#wrap{width:960px;margin:0 auto}.left{float:left}.right{float:right}.twenty{width:20%}.thirty{width:30%}.forty{width:40%}.fifty{width:50%}.sixty{width:60%}.hundred{width:100%}.nopad{padding:0}.toppad{padding-top:10px}.toptwenty{margin-top:20px}.topforty{margin-top:40px}.hidden{display:none}#header{width:960px;height:97px;margin-bottom:23px;position:relative}h1#logo{margin:0;float:left}h1#logo a,h1#logo a:visited{background:url(../images/tor-logo.png) left top no-repeat; background-size: 150px 97px; text-indent:-9999px;overflow:hidden;width:150px;height:97px;display:block}#nav{position:absolute;top:30px;left:115px;float:right}#nav ul{height:50px;float:right;margin-bottom:0}#nav ul li{float:left;display:inline;width:auto}#calltoaction{height:30px;float:right;margin-top:100px;margin-right:5px;text-align:center}#calltoaction ul{padding:0;margin:0;height:30px;list-style:none;float:right}#calltoaction ul li{list-style:none;display:inline;float:none;wi
dth:100px;margin-left:0}#calltoaction ul li a:link,#calltoaction ul li a:visited{display:block;background:url(../images/cta-buttons.jpg) top center no-repeat #885ca4;padding:4px 8px;color:#fff;font-weight:bold;text-decoration:none;font-size:13px;line-height:22px;height:22px;width:84px;float:left;text-shadow:1px 1px 0 #111}#calltoaction ul li:hover a{background:url(../images/cta-buttons.jpg) bottom center no-repeat #ff9800;font-weight:bold;text-shadow:1px 1px 0 #111}#calltoaction ul li:first-child a:link,#calltoaction ul li:first-child a:visited,#calltoaction ul li:hover:first-child a{-webkit-border-top-left-radius:7px;-webkit-border-bottom-left-radius:7px;-moz-border-radius-topleft:7px;-moz-border-radius-bottomleft:7px;border-top-left-radius:7px;border-bottom-left-radius:7px}#calltoaction ul li:first-child a:link,#calltoaction ul li:first-child a:visited{background:url(../images/cta-buttons.jpg) top left no-repeat #885ca4}#calltoaction ul li:hover:first-child a{background:url(../ima
ges/cta-buttons.jpg) bottom left no-repeat #ff9800}#calltoaction ul li:last-child a:link,#calltoaction ul li:last-child a:visited,#calltoaction ul li:hover:last-child a{-webkit-border-top-right-radius:7px;-webkit-border-bottom-right-radius:7px;-moz-border-radius-topright:7px;-moz-border-radius-bottomright:7px;border-top-right-radius:7px;border-bottom-right-radius:7px}#calltoaction ul li:last-child a:link,#calltoaction ul li:last-child a:visited{background:url(../images/cta-buttons.jpg) top right no-repeat #885ca4;color:#fff}#calltoaction ul li:hover:last-child a{background:url(../images/cta-buttons.jpg) bottom right no-repeat #ff9800}#banner{background:url(../images/bg-banner.jpg) left top no-repeat;height:200px;width:600px;padding:23px 15px;margin-bottom:15px}#download a:link,#download a:visited{margin:-17px 0 0;background:url(../images/button-download.png) left top no-repeat;width:257px;height:79px;float:left;padding:35px 0 0 80px;text-decoration:none}#download a .download-tor{bac
kground:url(../images/button-download-arrow.png) right center no-repeat;font-family:"Arial Narrow",Arial,sans-serif;color:#fff;font-size:2.167em;letter-spacing:1px;padding-right:25px}#download a .version{color:#bda5cc;font-size:1.167em;line-height:1.167em}#download a .info{color:#bda5cc;font-size:.833em;line-height:.833em}#download a:hover{background-position:0 -114px}#download a:hover .version,#download a:hover .info{color:#f1c6a1}#banner ul{background:#387520 url(../images/banner-gradient.jpg) left top repeat-x;border:1px solid #366b32;width:180px;float:right;margin:0 15px 0 0;padding:10px 10px 10px 30px}#banner ul li{list-style:url(../images/white-bullet.png) outside;padding:5px 0}#content{width:960px}#content img{max-width:710px}#breadcrumbs{padding:0 0 10px 5px}#home #maincol{float:left;width:620px;margin-right:20px}#maincol{float:right;width:710px;margin-bottom:20px}#dow-don-left,#maincol-left{float:left;width:710px;margin-bottom:20px}#maincol .topforty .icon img{border:0}.sub
col{width:280px;float:left;margin:0 0 25px}#content .first{margin-right:20px}#home #sidecol{float:right;width:300px}#sidecol{float:left;width:230px;margin-right:20px}#dow-don-right,#sidecol-right{float:right;width:230px;margin-left:20px;padding-top:100px}#torusers{margin:0 0 27px}.user{margin:0 0 12px;height:auto}.user img,.project-icon{border:1px solid #cac8a7;float:left;margin:3px 10px 0 0}.user p{margin:0}.img-shadow{float:left;background:url(../images/shadowAlpha.png) no-repeat bottom right!important;background:url(../images/shadow.gif) no-repeat bottom right;margin:10px 0 10px 10px!important;margin:10px 0 10px 5px}.img-shadow .infoblock,.img-shadow .important-infoblock,.img-shadow .custom-infoblock,.img-shadow #sidenav,.img-shadow .sidenav-sub{display:block;position:relative;margin:-6px 6px 6px -6px;background-color:#fff;border:1px solid #ddd}.img-shadow .important-infoblock{background-color:#f7f8f0;border:1px solid #eeefe8}.img-shadow .infoblock,.img-shadow .important-infobloc
k{padding:15px;width:188px}.img-shadow .custom-infoblock{padding:15px;height:120px;width:426px}.img-shadow .infoblock p,.img-shadow .important-infoblock p,.img-shadow .custom-infoblock p{margin:0}.img-shadow #sidenav,.img-shadow .sidenav-sub{padding:10px 0 0;width:218px}#sidenav ul li,.sidenav-sub ul li{border-bottom:1px solid #ddd}#sidenav ul li.dropdown a:link,#sidenav ul li.dropdown a:visited{background:url(../images/sidenav-arrow.gif) left center no-repeat}#sidenav ul li.dropdown a.active{background:url(../images/sidenav-arrow-active.gif) left center no-repeat}.sidenav-sub ul li.dropdown a:link,.sidenav-sub ul li.dropdown a:visited{background:url(../images/sidenav-arrow.gif) left top no-repeat;margin-top:12px}#sidenav ul li a:link,#sidenav ul li a:visited{display:block;height:auto;padding:8px 15px 8px 26px}#sidenav ul li ul li a:link,#sidenav ul li ul li a:visited{padding-left:37px}.sidenav-sub ul li a:link,.sidenav-sub ul li a:visited{display:block;padding:0 15px 10px 26px;line
-height:16px}#sidenav ul li.active{background:url(../images/sidenav-active.png) left center no-repeat;width:230px;border:0}#sidenav ul li ul li ul li a:link,#sidenav ul li ul li ul li a:visited{padding-left:48px}table{width:100%}td{padding:12px}table td img,table tr img{border:0;float:left;margin-right:10px}.icon{float:left;width:auto;margin-right:15px;padding:10px 0;border:0}.calendar{background:url(../images/icon-calendar.jpg) left top no-repeat;float:left;margin-right:10px;width:45px;height:54px;text-align:center;padding:4px 0}.fauxhead{background:url(../images/table-arrow.jpg) right top no-repeat;width:100%;height:11px}#home-our-projects td{height:92px;width:296px;padding:6px}#ecosystem_presentation{height:30px;padding-top:10px;padding-left:60px;vertical-align:middle;background:url("../images/video.png") no-repeat scroll left center transparent;font-size:1.7em;font-weight:bold}#ecosystem_presentation a{text-decoration:none}.project{float:left;padding:6px;border:1px solid #cac8a7
;height:76px;width:284px;-webkit-border-radius:10px;-moz-border-radius:10px;border-radius:10px}.project img{border:0;margin-right:6px}.beige{background:#f5f5df}.gray{background:#e0e0e0}.meta{float:right;width:auto}.windows24{background:url("../images/icon-windows24.png") no-repeat scroll left center transparent}.mac24{background:url("../images/icon-mac24.png") no-repeat scroll left center transparent}.linux24{background:url("../images/icon-linux24.png") no-repeat scroll left center transparent}.smartphone24{background:url("../images/icon-smartphone24.png") no-repeat scroll left center transparent}.sourcecode24{background:url("../images/icon-sourcecode24.png") no-repeat scroll left center transparent}.windows24,.mac24,.linux24,.smartphone24,.sourcecode24{display:block;line-height:32px;padding:0 0 0 33px}.accordionButton{background:url("../images/table-title.jpg") repeat-x left bottom #885ca4;color:#fff;margin:0;font-size:1.1em;font-weight:bold;height:32px;float:left;_float:none;borde
r:1px solid #fff;border-bottom:0;cursor:pointer;-webkit-border-top-left-radius:7px;-webkit-border-top-right-radius:7px;-moz-border-radius-topleft:7px;-moz-border-radius-topright:7px;border-top-left-radius:7px;border-top-right-radius:7px;position:relative;padding-left:30px;width:680px}.accordionButton:hover{background:url("../images/table-title-hover.jpg") repeat-x left bottom #885ca4;text-shadow:1px 1px 0 rgba(17,17,17,1)}.on:before,.off:before{position:absolute;content:'';height:0;width:0;font-size:0;line-height:0}.on:before{top:14px;left:10px;border-left:7px solid transparent;border-right:7px solid transparent;border-top:7px solid #fff}.off:before{top:9px;left:14px;border-bottom:7px solid transparent;border-top:7px solid transparent;border-left:7px solid #fff}.accordionContent{width:708px;float:left;_float:none;background:#fff;display:block}.accordionContent .fauxhead{width:710px}.package{float:left;height:280px;margin:0;padding:25px 20px 20px 20px;border-top:1px solid #888}.packa
ge h2{margin-bottom:3px}.package p{margin-top:16px;padding-left:10px}.downloads{display:block;float:left;width:238px;padding:0 16px 0 0;text-align:center}.lang{float:right;display:none;width:80px;height:20px;margin:0 7px 0 0;padding:0 0 0 3px;background-color:#fefff7;border:2px solid #cccfb8;border-top:0;-webkit-border-bottom-left-radius:5px;-webkit-border-bottom-right-radius:5px;-moz-border-radius-bottomleft:5px;-moz-border-radius-bottomright:5px;border-bottom-left-radius:5px;border-bottom-right-radius:5px}.button{text-align:center;display:block;width:234px;height:69px;text-decoration:none;background:url(../images/button-downloadpage.png) bottom left no-repeat;margin:0 auto 8px auto;text-shadow:1px 1px 0 rgba(17,17,17,1);-webkit-border-radius:7px;-moz-border-radius:7px;border-radius:7px}.button .strong{display:block;padding:10px 0 0 57px}.button .normal{padding:5px 0 0 57px;display:block}.sig{display:block;margin:3px 0 20px 0}.easy{width:712px;margin-bottom:10px;padding-bottom:8px}
#download-donate{background-attachment:scroll;background-clip:border-box;background-color:transparent;background-image:url(../images/headerbg.jpg);background-origin:padding-box;background-position:0 0;background-repeat:no-repeat;background-size:100% 100%}.easy .package h2,.easy .package em{display:block;width:100%;text-align:left}.easy .package h2{padding-top:10px;padding-bottom:5px}.easy .package em{font-size:1.2em;padding-top:8px;padding-bottom:4px}.easy .package p{padding-left:0;font-size:15px;text-align:justify}.easy .package p.alt-dl{text-align:left;text-indent:0;padding-left:0;margin-top:32px}.all-dl{display:block;text-align:left;width:100%;font-size:15px}.all-dl a{text-decoration:none;font-weight:bold}.all-dl a:hover{text-decoration:underline}.easy .package{float:none;padding:0 8px 0 12px}.open{display:block}.lang-alt{line-height:15px;font-size:10px;float:right;margin-right:10px}.expander{text-align:right;float:right;padding:10px 20px 0 0;font-size:15px;display:none}.title{ba
ckground:url(../images/table-title-arrow.jpg) right top no-repeat;padding:10px 25px 0 10px;height:33px;float:left}.title a:link,.title a:visited{background:url(../images/table-title.jpg) left top no-repeat;height:33px;display:block}.paypal{float:left;width:auto;min-height:159px;max-width:365px}.paypal span{padding-right:20px}.warning-top{width:618px;padding:10px 10px 10px 60px;margin:0 10px 0 10px;display:block;background:url("../images/warning.png") no-repeat scroll 2px 23px #fffeb6;border:1px solid #a6a427;border-bottom:0;-webkit-border-top-left-radius:5px;-webkit-border-top-right-radius:5px;-moz-border-radius-topleft:5px;-moz-border-radius-topright:5px;border-top-left-radius:5px;border-top-right-radius:5px}.warning-top h2{padding-right:15px;padding-left:0;margin-bottom:5px}.warning-top p{padding-left:10px;margin-bottom:0}.warning{float:left;_float:none;padding:25px 25px;margin-top:4px}.warning p{padding-left:10px}.focus{background:#f4f2c7;border:1px solid #ebd4a9;padding:10px 15p
x}.focus .icon{float:left;width:auto;margin-right:10px}.featured-project{width:313px}input,select{margin:0 3px 10px 0}input.textfield{padding:0 10px;vertical-align:top}.donate-btn{background:left top no-repeat;height:26px;width:92px;text-indent:-9999px;overflow:hidden;border:0;vertical-align:top;margin-top:5px}.donate-btn:hover{background-position:0 -26px;cursor:pointer}.signup{background:#96c35a;border-top:1px solid #6ab334;border-left:1px solid #6ab334;border-bottom:1px solid #5a952b;border-right:1px solid #5a952b;height:31px;padding:0 5px;vertical-align:top;color:#222c14;font-weight:bold;font-size:1em;line-height:1em}.signup:hover{background:#6ab334}select#lang{float:left;width:160px;margin-right:3px}.go{background:#96c35a;border-top:1px solid #6ab334;border-left:1px solid #6ab334;border-bottom:1px solid #5a952b;border-right:1px solid #5a952b;padding:0 5px;vertical-align:top;color:#222c14;font-weight:bold;font-size:1em;line-height:1em;height:18px}.go:hover{background:#6ab334}#foo
ter{width:1024px;height:200px;border-top:1px solid #ddd;padding:20px 0;margin:20px 0 0}.onion{float:left;width:88px;padding-right:20px;height:100%}#footer .about{width:180px;padding-right:30px;border-right:1px solid #ddd;float:left}#footer .newsletter{padding:0 0 15px 30px;width:auto;margin-left:308px}#footer input.textfield{width:220px;height:26px}#footer input{margin:0}#footer .col{float:left;width:100px;margin-left:20px}#footer .first{margin-left:30px}#footer .wider{width:201px}small{margin:0 auto 0 auto;text-align:center;font-size:10px;font-style:italic}.hlist{text-align:center;display:block;width:100%;padding:0;list-style:none;margin:0 0 18px 0}.hlist li{display:inline-block;border-right:1px solid #444;margin-left:-4px}.hlist li.last{border-right:0 solid #444}.hlist a{display:block;top:0;right:0;bottom:0;left:0;text-decoration:none;font-weight:bold;padding:0 8px}.dbox{float:none;text-align:center;color:#222;border:0;padding:1.4em .7em;width:163px;margin:0 0 0 10px}.dbox p{displ
ay:block;padding:0;margin:0}.dbox h2{padding:13px 0 15px 0;position:relative;color:black;font-family:Helvetica,Arial,sans-serif;font-size:18px;font-weight:normal;height:35px;margin-bottom:-20px;margin-left:-6px;z-index:-10}.dbox input.donate-btn{background:url(../images/btn_donateCC_LG.gif) left top no-repeat transparent;height:68px;width:186px;margin-top:0;display:block;background-color:transparent;color:transparent;margin:10px auto 10px auto;padding:0}.dbox span{float:left;padding-right:0}.dbox div label{padding:0 10px 0 0}.dbox h6#ppinfo{width:100%;text-align:center;margin:-15px auto 0 auto}.dbox small,.dbox.donate #ppinfo{margin:0 auto 0 auto;text-align:center;font-size:10px;font-style:normal}.dbox.dl{float:none;width:177px;margin:0 5px 20px 5px}.dbox.dl input.amount{width:87px}.dbox.donate{float:none;padding:30px 30px;width:626px;min-height:0;max-width:none;text-align:left}.dbox.donate input,.dbox.donate select{padding-bottom:0;margin-bottom:0}.dbox.donate .drow{margin:0 0 0 20
px}.dbox.donate .drow div{padding:0;width:auto;display:block}.dbox.donate h3{padding-left:0;color:#23300e;margin:0 0 10px 0}.dbox.donate h4{padding-left:20px}.dbox.donate p{padding:5px 20px 15px 40px}.dbox.donate span{float:left;padding-right:0}.dbox.donate div label{padding:0 10px 0 0}.dbox.donate .type{padding-left:20px}.dbox.donate select#t3{width:auto;margin-bottom:0}.dbox.donate ul.amounts{width:auto}.dbox.donate ul.amounts li{display:inline-block}.dbox.donate ul.amounts li label{padding:0 0 0 5px}.dbox.donate input.donate-btn{background:url(../images/btn_donateCC_LG.gif) left top no-repeat transparent;height:26px;width:115px;margin-top:-3px;display:inline-block;background-color:transparent;color:transparent;border:0 solid transparent}.dbox.dsmall{position:relative;display:inline-block;width:170px;height:140px;text-align:center;margin:0 10px;vertical-align:top}.dbox.dsmall input.donate-btn{background:url() left top no-repeat transparent;width:auto;height:auto;margin-top:0;displ
ay:block;background-color:transparent;color:transparent;border:0 solid transparent}.dbox.dsmall div label{padding:0}.dbox.dsmall small{display:block;position:absolute;width:172px;float:none;bottom:20px;margin:0 auto}.givv p{text-align:justify;margin-top:10px;font-size:11px;line-height:13px}dwolla p{text-align:justify;margin-top:10px;font-size:11px;line-height:13px}div.blogRow,div.blogFirstRow{height:40px;padding:3px 10px;margin:0}div.blogLastRow{height:20px;text-align:center}div.blogFirstRow{height:22px;background:url(../images/table-head.jpg) left top repeat-x #885ca4}.blogRow:hover{background:#f6ffd5}div.blogRow1,div.blogRow3{background:#eee8f1}.blogFeed a{text-decoration:none}.blogFeed p{margin:0;font-size:12px}p.blogTitle{font-weight:bold;text-decoration:underline}p.blogAuthor{color:#000;text-align:right;margin-top:-20px}p.blogAuthor em{color:#4e6a20;text-align:right;margin-top:-20px}p.blogDate{color:#000}.blogFeed h2{font-size:1.467em;margin:0;line-height:23px;color:#f6f6ed}#pr
ojectpage td{width:50%}.projectbox{width:710px;position:relative;margin-bottom:80px}.projectbox .name{font-size:1.5em;font-weight:bold}.projectbox a img{float:none;position:absolute;top:0;left:0}.projectbox .projectdesc{margin-left:100px}.clearfix:after{content:".";display:block;height:0;clear:both;visibility:hidden}.clearfix{display:inline-block}/*\*/* html .clearfix{height:1%}.clearfix{display:block}/**/.joblink{display:block;font-size:128%;font-weight:bold;padding:10px 5px;text-align:right}.joblink a{text-decoration:none}.dropbtn{background-color:white;padding:16px 0 0 0;font-size:100%;border:0;cursor:pointer}.dropdown{position:relative;display:inline-block;padding:0;margin-top:-16px;top:0}.dropdown-content{display:none;position:absolute;background-color:#f9f9f9;box-shadow:0 8px 16px 0 rgba(0,0,0,0.2);z-index:1;margin:48px 0 0 0}.dropdown-content a{color:black;padding-top:12px 16px;text-decoration:none;display:block}.dropdown:hover .dropdown-content{display:block}
+@charset "UTF-8";body{background:#fff}#wrap{width:960px;margin:0 auto}.left{float:left}.right{float:right}.twenty{width:20%}.thirty{width:30%}.forty{width:40%}.fifty{width:50%}.sixty{width:60%}.hundred{width:100%}.nopad{padding:0}.toppad{padding-top:10px}.toptwenty{margin-top:20px}.topforty{margin-top:40px}.hidden{display:none}#header{width:960px;height:97px;margin-bottom:23px;position:relative}h1#logo{margin:0;float:left}h1#logo a,h1#logo a:visited{background:url(../images/tor-logo.png) left top no-repeat; background-size: 150px 97px; text-indent:-9999px;overflow:hidden;width:150px;height:97px;display:block}#nav{position:absolute;top:30px;left:115px;float:right}#nav ul{height:50px;float:right;margin-bottom:0}#nav ul li{float:left;display:inline;width:auto}#calltoaction{height:30px;float:right;margin-top:100px;margin-right:5px;text-align:center}#calltoaction ul{padding:0;margin:0;height:30px;list-style:none;float:right}#calltoaction ul li{list-style:none;display:inline;float:none;wi
dth:100px;margin-left:0}#calltoaction ul li a:link,#calltoaction ul li a:visited{display:block;background:url(../images/cta-buttons.jpg) top center no-repeat #885ca4;padding:4px 8px;color:#fff;font-weight:bold;text-decoration:none;font-size:13px;line-height:22px;height:22px;width:84px;float:left;text-shadow:1px 1px 0 #111}#calltoaction ul li:hover a{background:url(../images/cta-buttons.jpg) bottom center no-repeat #ff9800;font-weight:bold;text-shadow:1px 1px 0 #111}#calltoaction ul li:first-child a:link,#calltoaction ul li:first-child a:visited,#calltoaction ul li:hover:first-child a{-webkit-border-top-left-radius:7px;-webkit-border-bottom-left-radius:7px;-moz-border-radius-topleft:7px;-moz-border-radius-bottomleft:7px;border-top-left-radius:7px;border-bottom-left-radius:7px}#calltoaction ul li:first-child a:link,#calltoaction ul li:first-child a:visited{background:url(../images/cta-buttons.jpg) top left no-repeat #885ca4}#calltoaction ul li:hover:first-child a{background:url(../ima
ges/cta-buttons.jpg) bottom left no-repeat #ff9800}#calltoaction ul li:last-child a:link,#calltoaction ul li:last-child a:visited,#calltoaction ul li:hover:last-child a{-webkit-border-top-right-radius:7px;-webkit-border-bottom-right-radius:7px;-moz-border-radius-topright:7px;-moz-border-radius-bottomright:7px;border-top-right-radius:7px;border-bottom-right-radius:7px}#calltoaction ul li:last-child a:link,#calltoaction ul li:last-child a:visited{background:url(../images/cta-buttons.jpg) top right no-repeat #885ca4;color:#fff}#calltoaction ul li:hover:last-child a{background:url(../images/cta-buttons.jpg) bottom right no-repeat #ff9800}#banner{background:url(../images/bg-banner.jpg) left top no-repeat;height:200px;width:600px;padding:23px 15px;margin-bottom:15px}#download a:link,#download a:visited{margin:-17px 0 0;background:url(../images/button-download.png) left top no-repeat;width:257px;height:79px;float:left;padding:35px 0 0 80px;text-decoration:none}#download a .download-tor{bac
kground:url(../images/button-download-arrow.png) right center no-repeat;font-family:"Arial Narrow",Arial,sans-serif;color:#fff;font-size:2.167em;letter-spacing:1px;padding-right:25px}#download a .version{color:#bda5cc;font-size:1.167em;line-height:1.167em}#download a .info{color:#bda5cc;font-size:.833em;line-height:.833em}#download a:hover{background-position:0 -114px}#download a:hover .version,#download a:hover .info{color:#f1c6a1}#banner ul{background:#387520 url(../images/banner-gradient.jpg) left top repeat-x;border:1px solid #366b32;width:180px;float:right;margin:0 15px 0 0;padding:10px 10px 10px 30px}#banner ul li{list-style:url(../images/white-bullet.png) outside;padding:5px 0}#content{width:960px}#content img{max-width:710px}#breadcrumbs{padding:0 0 10px 5px}#home #maincol{float:left;width:620px;margin-right:20px}#maincol{float:right;width:710px;margin-bottom:20px}#dow-don-left,#maincol-left{float:left;width:710px;margin-bottom:20px}#maincol .topforty .icon img{border:0}.sub
col{width:280px;float:left;margin:0 0 25px}#content .first{margin-right:20px}#home #sidecol{float:right;width:300px}#sidecol{float:left;width:230px;margin-right:20px}#dow-don-right,#sidecol-right{float:right;width:230px;margin-left:20px;padding-top:100px}#torusers{margin:0 0 27px}.user{margin:0 0 12px;height:auto}.user img,.project-icon{border:1px solid #cac8a7;float:left;margin:3px 10px 0 0}.user p{margin:0}.img-shadow{float:left;background:url(../images/shadowAlpha.png) no-repeat bottom right!important;background:url(../images/shadow.gif) no-repeat bottom right;margin:10px 0 10px 10px!important;margin:10px 0 10px 5px}.img-shadow .infoblock,.img-shadow .important-infoblock,.img-shadow .custom-infoblock,.img-shadow #sidenav,.img-shadow .sidenav-sub{display:block;position:relative;margin:-6px 6px 6px -6px;background-color:#fff;border:1px solid #ddd}.img-shadow .important-infoblock{background-color:#f7f8f0;border:1px solid #eeefe8}.img-shadow .infoblock,.img-shadow .important-infobloc
k{padding:15px;width:188px}.img-shadow .custom-infoblock{padding:15px;height:120px;width:426px}.img-shadow .infoblock p,.img-shadow .important-infoblock p,.img-shadow .custom-infoblock p{margin:0}.img-shadow #sidenav,.img-shadow .sidenav-sub{padding:10px 0 0;width:218px}#sidenav ul li,.sidenav-sub ul li{border-bottom:1px solid #ddd}#sidenav ul li.dropdown a:link,#sidenav ul li.dropdown a:visited{background:url(../images/sidenav-arrow.gif) left center no-repeat}#sidenav ul li.dropdown a.active{background:url(../images/sidenav-arrow-active.gif) left center no-repeat}.sidenav-sub ul li.dropdown a:link,.sidenav-sub ul li.dropdown a:visited{background:url(../images/sidenav-arrow.gif) left top no-repeat;margin-top:12px}#sidenav ul li a:link,#sidenav ul li a:visited{display:block;height:auto;padding:8px 15px 8px 26px}#sidenav ul li ul li a:link,#sidenav ul li ul li a:visited{padding-left:37px}.sidenav-sub ul li a:link,.sidenav-sub ul li a:visited{display:block;padding:0 15px 10px 26px;line
-height:16px}#sidenav ul li.active{background:url(../images/sidenav-active.png) left center no-repeat;width:230px;border:0}#sidenav ul li ul li ul li a:link,#sidenav ul li ul li ul li a:visited{padding-left:48px}#press tr:nth-child(even){background-color: #e5e5e5;}table{width:100%}td{padding:12px}table td img,table tr img{border:0;float:left;margin-right:10px}.icon{float:left;width:auto;margin-right:15px;padding:10px 0;border:0}.calendar{background:url(../images/icon-calendar.jpg) left top no-repeat;float:left;margin-right:10px;width:45px;height:54px;text-align:center;padding:4px 0}.fauxhead{background:url(../images/table-arrow.jpg) right top no-repeat;width:100%;height:11px}#home-our-projects td{height:92px;width:296px;padding:6px}#ecosystem_presentation{height:30px;padding-top:10px;padding-left:60px;vertical-align:middle;background:url("../images/video.png") no-repeat scroll left center transparent;font-size:1.7em;font-weight:bold}#ecosystem_presentation a{text-decoration:none}.pr
oject{float:left;padding:6px;border:1px solid #cac8a7;height:76px;width:284px;-webkit-border-radius:10px;-moz-border-radius:10px;border-radius:10px}.project img{border:0;margin-right:6px}.beige{background:#f5f5df}.gray{background:#e0e0e0}.meta{float:right;width:auto}.windows24{background:url("../images/icon-windows24.png") no-repeat scroll left center transparent}.mac24{background:url("../images/icon-mac24.png") no-repeat scroll left center transparent}.linux24{background:url("../images/icon-linux24.png") no-repeat scroll left center transparent}.smartphone24{background:url("../images/icon-smartphone24.png") no-repeat scroll left center transparent}.sourcecode24{background:url("../images/icon-sourcecode24.png") no-repeat scroll left center transparent}.windows24,.mac24,.linux24,.smartphone24,.sourcecode24{display:block;line-height:32px;padding:0 0 0 33px}.accordionButton{background:url("../images/table-title.jpg") repeat-x left bottom #885ca4;color:#fff;margin:0;font-size:1.1em;font
-weight:bold;height:32px;float:left;_float:none;border:1px solid #fff;border-bottom:0;cursor:pointer;-webkit-border-top-left-radius:7px;-webkit-border-top-right-radius:7px;-moz-border-radius-topleft:7px;-moz-border-radius-topright:7px;border-top-left-radius:7px;border-top-right-radius:7px;position:relative;padding-left:30px;width:680px}.accordionButton:hover{background:url("../images/table-title-hover.jpg") repeat-x left bottom #885ca4;text-shadow:1px 1px 0 rgba(17,17,17,1)}.on:before,.off:before{position:absolute;content:'';height:0;width:0;font-size:0;line-height:0}.on:before{top:14px;left:10px;border-left:7px solid transparent;border-right:7px solid transparent;border-top:7px solid #fff}.off:before{top:9px;left:14px;border-bottom:7px solid transparent;border-top:7px solid transparent;border-left:7px solid #fff}.accordionContent{width:708px;float:left;_float:none;background:#fff;display:block}.accordionContent .fauxhead{width:710px}.package{float:left;height:280px;margin:0;padding
:25px 20px 20px 20px;border-top:1px solid #888}.package h2{margin-bottom:3px}.package p{margin-top:16px;padding-left:10px}.downloads{display:block;float:left;width:238px;padding:0 16px 0 0;text-align:center}.lang{float:right;display:none;width:80px;height:20px;margin:0 7px 0 0;padding:0 0 0 3px;background-color:#fefff7;border:2px solid #cccfb8;border-top:0;-webkit-border-bottom-left-radius:5px;-webkit-border-bottom-right-radius:5px;-moz-border-radius-bottomleft:5px;-moz-border-radius-bottomright:5px;border-bottom-left-radius:5px;border-bottom-right-radius:5px}.button{text-align:center;display:block;width:234px;height:69px;text-decoration:none;background:url(../images/button-downloadpage.png) bottom left no-repeat;margin:0 auto 8px auto;text-shadow:1px 1px 0 rgba(17,17,17,1);-webkit-border-radius:7px;-moz-border-radius:7px;border-radius:7px}.button .strong{display:block;padding:10px 0 0 57px}.button .normal{padding:5px 0 0 57px;display:block}.sig{display:block;margin:3px 0 20px 0}.ea
sy{width:712px;margin-bottom:10px;padding-bottom:8px}#download-donate{background-attachment:scroll;background-clip:border-box;background-color:transparent;background-image:url(../images/headerbg.jpg);background-origin:padding-box;background-position:0 0;background-repeat:no-repeat;background-size:100% 100%}.easy .package h2,.easy .package em{display:block;width:100%;text-align:left}.easy .package h2{padding-top:10px;padding-bottom:5px}.easy .package em{font-size:1.2em;padding-top:8px;padding-bottom:4px}.easy .package p{padding-left:0;font-size:15px;text-align:justify}.easy .package p.alt-dl{text-align:left;text-indent:0;padding-left:0;margin-top:32px}.all-dl{display:block;text-align:left;width:100%;font-size:15px}.all-dl a{text-decoration:none;font-weight:bold}.all-dl a:hover{text-decoration:underline}.easy .package{float:none;padding:0 8px 0 12px}.open{display:block}.lang-alt{line-height:15px;font-size:10px;float:right;margin-right:10px}.expander{text-align:right;float:right;paddin
g:10px 20px 0 0;font-size:15px;display:none}.title{background:url(../images/table-title-arrow.jpg) right top no-repeat;padding:10px 25px 0 10px;height:33px;float:left}.title a:link,.title a:visited{background:url(../images/table-title.jpg) left top no-repeat;height:33px;display:block}.paypal{float:left;width:auto;min-height:159px;max-width:365px}.paypal span{padding-right:20px}.warning-top{width:618px;padding:10px 10px 10px 60px;margin:0 10px 0 10px;display:block;background:url("../images/warning.png") no-repeat scroll 2px 23px #fffeb6;border:1px solid #a6a427;border-bottom:0;-webkit-border-top-left-radius:5px;-webkit-border-top-right-radius:5px;-moz-border-radius-topleft:5px;-moz-border-radius-topright:5px;border-top-left-radius:5px;border-top-right-radius:5px}.warning-top h2{padding-right:15px;padding-left:0;margin-bottom:5px}.warning-top p{padding-left:10px;margin-bottom:0}.warning{float:left;_float:none;padding:25px 25px;margin-top:4px}.warning p{padding-left:10px}.focus{backgro
und:#f4f2c7;border:1px solid #ebd4a9;padding:10px 15px}.focus .icon{float:left;width:auto;margin-right:10px}.featured-project{width:313px}input,select{margin:0 3px 10px 0}input.textfield{padding:0 10px;vertical-align:top}.donate-btn{background:left top no-repeat;height:26px;width:92px;text-indent:-9999px;overflow:hidden;border:0;vertical-align:top;margin-top:5px}.donate-btn:hover{background-position:0 -26px;cursor:pointer}.signup{background:#96c35a;border-top:1px solid #6ab334;border-left:1px solid #6ab334;border-bottom:1px solid #5a952b;border-right:1px solid #5a952b;height:31px;padding:0 5px;vertical-align:top;color:#222c14;font-weight:bold;font-size:1em;line-height:1em}.signup:hover{background:#6ab334}select#lang{float:left;width:160px;margin-right:3px}.go{background:#96c35a;border-top:1px solid #6ab334;border-left:1px solid #6ab334;border-bottom:1px solid #5a952b;border-right:1px solid #5a952b;padding:0 5px;vertical-align:top;color:#222c14;font-weight:bold;font-size:1em;line-hei
ght:1em;height:18px}.go:hover{background:#6ab334}#footer{width:1024px;height:200px;border-top:1px solid #ddd;padding:20px 0;margin:20px 0 0}.onion{float:left;width:88px;padding-right:20px;height:100%}#footer .about{width:180px;padding-right:30px;border-right:1px solid #ddd;float:left}#footer .newsletter{padding:0 0 15px 30px;width:auto;margin-left:308px}#footer input.textfield{width:220px;height:26px}#footer input{margin:0}#footer .col{float:left;width:100px;margin-left:20px}#footer .first{margin-left:30px}#footer .wider{width:201px}small{margin:0 auto 0 auto;text-align:center;font-size:10px;font-style:italic}.hlist{text-align:center;display:block;width:100%;padding:0;list-style:none;margin:0 0 18px 0}.hlist li{display:inline-block;border-right:1px solid #444;margin-left:-4px}.hlist li.last{border-right:0 solid #444}.hlist a{display:block;top:0;right:0;bottom:0;left:0;text-decoration:none;font-weight:bold;padding:0 8px}.dbox{float:none;text-align:center;color:#222;border:0;padding:1
.4em .7em;width:163px;margin:0 0 0 10px}.dbox p{display:block;padding:0;margin:0}.dbox h2{padding:13px 0 15px 0;position:relative;color:black;font-family:Helvetica,Arial,sans-serif;font-size:18px;font-weight:normal;height:35px;margin-bottom:-20px;margin-left:-6px;z-index:-10}.dbox input.donate-btn{background:url(../images/btn_donateCC_LG.gif) left top no-repeat transparent;height:68px;width:186px;margin-top:0;display:block;background-color:transparent;color:transparent;margin:10px auto 10px auto;padding:0}.dbox span{float:left;padding-right:0}.dbox div label{padding:0 10px 0 0}.dbox h6#ppinfo{width:100%;text-align:center;margin:-15px auto 0 auto}.dbox small,.dbox.donate #ppinfo{margin:0 auto 0 auto;text-align:center;font-size:10px;font-style:normal}.dbox.dl{float:none;width:177px;margin:0 5px 20px 5px}.dbox.dl input.amount{width:87px}.dbox.donate{float:none;padding:30px 30px;width:626px;min-height:0;max-width:none;text-align:left}.dbox.donate input,.dbox.donate select{padding-bottom
:0;margin-bottom:0}.dbox.donate .drow{margin:0 0 0 20px}.dbox.donate .drow div{padding:0;width:auto;display:block}.dbox.donate h3{padding-left:0;color:#23300e;margin:0 0 10px 0}.dbox.donate h4{padding-left:20px}.dbox.donate p{padding:5px 20px 15px 40px}.dbox.donate span{float:left;padding-right:0}.dbox.donate div label{padding:0 10px 0 0}.dbox.donate .type{padding-left:20px}.dbox.donate select#t3{width:auto;margin-bottom:0}.dbox.donate ul.amounts{width:auto}.dbox.donate ul.amounts li{display:inline-block}.dbox.donate ul.amounts li label{padding:0 0 0 5px}.dbox.donate input.donate-btn{background:url(../images/btn_donateCC_LG.gif) left top no-repeat transparent;height:26px;width:115px;margin-top:-3px;display:inline-block;background-color:transparent;color:transparent;border:0 solid transparent}.dbox.dsmall{position:relative;display:inline-block;width:170px;height:140px;text-align:center;margin:0 10px;vertical-align:top}.dbox.dsmall input.donate-btn{background:url() left top no-repeat
transparent;width:auto;height:auto;margin-top:0;display:block;background-color:transparent;color:transparent;border:0 solid transparent}.dbox.dsmall div label{padding:0}.dbox.dsmall small{display:block;position:absolute;width:172px;float:none;bottom:20px;margin:0 auto}.givv p{text-align:justify;margin-top:10px;font-size:11px;line-height:13px}dwolla p{text-align:justify;margin-top:10px;font-size:11px;line-height:13px}div.blogRow,div.blogFirstRow{height:40px;padding:3px 10px;margin:0}div.blogLastRow{height:20px;text-align:center}div.blogFirstRow{height:22px;background:url(../images/table-head.jpg) left top repeat-x #885ca4}.blogRow:hover{background:#f6ffd5}div.blogRow1,div.blogRow3{background:#eee8f1}.blogFeed a{text-decoration:none}.blogFeed p{margin:0;font-size:12px}p.blogTitle{font-weight:bold;text-decoration:underline}p.blogAuthor{color:#000;text-align:right;margin-top:-20px}p.blogAuthor em{color:#4e6a20;text-align:right;margin-top:-20px}p.blogDate{color:#000}.blogFeed h2{font-siz
e:1.467em;margin:0;line-height:23px;color:#f6f6ed}#projectpage td{width:50%}.projectbox{width:710px;position:relative;margin-bottom:80px}.projectbox .name{font-size:1.5em;font-weight:bold}.projectbox a img{float:none;position:absolute;top:0;left:0}.projectbox .projectdesc{margin-left:100px}.clearfix:after{content:".";display:block;height:0;clear:both;visibility:hidden}.clearfix{display:inline-block}/*\*/* html .clearfix{height:1%}.clearfix{display:block}/**/.joblink{display:block;font-size:128%;font-weight:bold;padding:10px 5px;text-align:right}.joblink a{text-decoration:none}.dropbtn{background-color:white;padding:16px 0 0 0;font-size:100%;border:0;cursor:pointer}.dropdown{position:relative;display:inline-block;padding:0;margin-top:-16px;top:0}.dropdown-content{display:none;position:absolute;background-color:#f9f9f9;box-shadow:0 8px 16px 0 rgba(0,0,0,0.2);z-index:1;margin:48px 0 0 0}.dropdown-content a{color:black;padding-top:12px 16px;text-decoration:none;display:block}.dropdown:h
over .dropdown-content{display:block}
diff --git a/press/en/press.wml b/press/en/press.wml
index 70cf25ee..4ff6779e 100644
--- a/press/en/press.wml
+++ b/press/en/press.wml
@@ -40,7 +40,7 @@ privacy, and Internet censorship issues. A sample of such media
appearances is below. This list is not comprehensive, but illustrates
some of the significant Tor-related stories that have popped up.</p>
-<table width="100%" cellpadding="3" cellspacing="0">
+<table id="press" width="100%" cellpadding="3" cellspacing="0">
<thead style="background-color: #e5e5e5;">
<tr>
@@ -50,7 +50,7 @@ some of the significant Tor-related stories that have popped up.</p>
</tr>
</thead>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 July 02</td>
<td>Mada Masr</td>
<td><a
@@ -58,21 +58,21 @@ href="https://www.madamasr.com/en/2018/07/02/news/u/report-internet-censorship-h
Internet censorship has become a "more pervasiveâ" in past year</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 June 28</td>
<td>CNET</td>
<td><a href="https://www.cnet.com/news/brave-advances-browser-privacy-with-tor-powered-tabs/">Brave
advances browser privacy with Tor-powered tabs</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 June 27</td>
<td>ZDNet</td>
<td><a href="https://www.zdnet.com/article/venezuela-ramps-up-censorship-with-tor-ban/">Venezuela ramps
up censorship</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 June 26</td>
<td>VICE</td>
<td><a
@@ -80,809 +80,809 @@ href="https://news.vice.com/en_us/article/59qvwz/venezuela-maduro-tor-network-ce
took a huge step towards controlling all access to the Internet</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 May 30</td>
<td>ZDNet</td>
<td><a href="https://www.zdnet.com/article/technology-that-changed-us-the-2000s/">Technology that changed us: The 2000s, from iPhone to Twitter</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 May 10</td>
<td>CBC</td>
<td><a href="http://www.cbc.ca/news/technology/ooni-tor-information-controls-measurement-censorship-iran-1.4653523">When governments censor websites and block messaging apps like Telegram, here's where to turn for proof</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 May 8</td>
<td>TechLector</td>
<td><a href="https://techlector.com/tor-project-will-transfer-to-azure-to-continue-offering-domain-fronting/">Tor Project will transfer to Azure to continue offering domain fronting</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 May 7</td>
<td>TechRadar</td>
<td><a href="https://www.techradar.com/how-to/how-to-become-anonymous-online">How to become anonymous online</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 May 4</td>
<td>Dark Web news</td>
<td><a href="https://darkwebnews.com/anonymity-tools/tor/new-tor-executive-director/">New Tor Project Executive Director</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Apr 20</td>
<td>TechDirt</td>
<td><a href="https://www.techdirt.com/articles/20180419/16184539674/bad-decisions-google-screws-over-tools-evading-internet-censorship-regimes.shtml">Tools Evading Internet Censorship Regimes</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Apr 19</td>
<td>Version2</td>
<td><a href="https://www.version2.dk/artikel/dansk-tor-udvikler-saadan-vil-vi-goere-lettere-at-vaere-anonym-paa-mobilen-1084911">Dansk Tor-udvikler: S�´dan vil vi g�üre det lettere at v�_re anonym p�´ mobilen</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Apr 13</td>
<td>Le Mondes</td>
<td><a href="http://www.lemonde.fr/pixels/article/2018/04/13/comment-facebook-piste-les-internautes-qui-ne-sont-pas-sur-le-reseau-social_5285079_4408996.html">Comment Facebook piste les internautes qui ne sont pas sur le reseau sociale</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Apr 2</td>
<td>Digital Trends</td>
<td><a href="https://www.digitaltrends.com/home/alexa-voice-charity-donation/">Raise your voice for a good cause</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Mar 19</td>
<td>Mozilla</td>
<td><a href="https://medium.com/read-write-participate/welcoming-11-new-partners-in-the-quest-for-internet-health-843c8d1b2bf9">11 New Partners in Quest for Internet Health</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Mar 15</td>
<td>Tom's Hardware</td>
<td><a href="https://www.tomshardware.com/news/turkey-blocks-protonmail-encrypted-email,36675.html">Turkey Blocks ProtonMail E2E Encrypted Email Service</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Mar 13</td>
<td>The Daily Dot</td>
<td><a href="https://www.dailydot.com/layer8/internet-shutdowns/">The slow creep of internet shutdowns</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Feb 22</td>
<td>CyberScoop</td>
<td><a href="https://www.cyberscoop.com/shari-steele-tor-director-resigns">Tor executive director Shari Steele to step down</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Feb 22</td>
<td>The Verge</td>
<td><a href="https://www.theverge.com/2018/2/22/17042544/tor-director-shari-steele-steps-down">Tor director Shari Steele steps down</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Feb 3</td>
<td>WIRED</td>
<td><a href="http://www.wired.co.uk/article/sex-toy-bluetooth-hacks-security-fix">Tor could be the answer to safer connected sex</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Jan 25</td>
<td>International Business Times</td>
<td><a href="http://www.ibtimes.com/tor-browser-75-update-released-whats-new-2645166">Tor Browser 7.5 Update Released: What's New?</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Jan 24</td>
<td>Tom's Hardware</td>
<td><a href="http://www.tomshardware.com/news/tor-7.5-next-gen-onion-services,36397.html">Tor Browser 7.5 Launches With Support For Next-Gen Onion Services</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2018 Jan 2</td>
<td>Sky News</td>
<td><a href="https://news.sky.com/story/google-faces-calls-to-lift-anti-censorship-blocks-in-iran-11192888">The number of Iranians using Tor has surged to over 10,000</a></td>
</tr>
-<tr style="">
+<tr>
<td>2018 Jan 2</td>
<td>Sky News</td>
<td><a href="https://news.sky.com/story/iranian-web-crackdown-drives-surge-in-privacy-technology-11191740">Iranian web crackdown drives surge in privacy technology</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Dec 10</td>
<td>BoingBoing</td>
<td><a href="https://boingboing.net/2017/12/10/charitable-giving-guide-2017.html">Charitable Giving Guide 2017</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Dec 9</td>
<td>WIRED</td>
<td><a href="https://www.wired.com/story/the-grand-tor">The Grand Tor: How to Go Anonymous Online</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Nov 20</td>
<td>Bleeping Computer</td>
<td><a href="https://www.bleepingcomputer.com/news/software/another-tor-browser-feature-makes-it-into-firefox-first-party-isolation/">Another Tor Browser Feature Makes It Into Firefox: First-Party Isolation</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Nov 15</td>
<td>Motherboard</td>
<td><a href="https://motherboard.vice.com/en_us/article/d3devm/motherboard-guide-to-not-getting-hacked-online-safety-guide">The Motherboard Guide to Not Getting Hacked</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Oct 30</td>
<td>NakedSecurity</td>
<td><a href="https://nakedsecurity.sophos.com/2017/10/30/firefox-takes-a-bite-out-of-the-canvas-super-cookie/">Firefox takes a bite out of the canvas 'super cookie'</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Oct 30</td>
<td>BleepingComputer</td>
<td><a href="https://www.bleepingcomputer.com/news/software/firefox-implements-another-privacy-preserving-feature-taken-from-the-tor-browser/">Firefox Implements Another Privacy-Preserving Feature Taken From the Tor Browser</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Oct 27</td>
<td>NYTimes</td>
<td><a href="https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482">The New York Times is Now Available as a Tor Onion Service</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Sep 7</td>
<td>Threatpost</td>
<td><a href="https://threatpost.com/tor-project-brings-security-slider-feature-to-android-app-orfox/127849/">Tor Project Brings Security Slider Feature to Android App Orfox</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Sep 5</td>
<td>Extreme Tech</td>
<td><a href="https://www.extremetech.com/mobile/255057-tor-project-adds-new-features-mobile-browser-support">Tor Amps Up its Mobile Browser Support</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Aug 30</td>
<td>Motherboard</td>
<td><a href="https://motherboard.vice.com/amp/en_us/article/vbbjxm/here-are-the-41-websites-you-cant-access-in-cuba">Here Are the 41 Websites You Can't Access in Cuba</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Aug 18</td>
<td>Fast Company</td>
<td><a href="https://www.fastcompany.com/40455652/the-tor-project-wont-censor-the-daily-stormer-heres-why">The Tor Project won't censor the Daily Stormer - here's why</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Aug 17</td>
<td>CNET</td>
<td><a href="https://www.cnet.com/g00/news/tor-project-disgusted-by-daily-stormer-defends-software-ethos-nazi-racist">Tor Project 'disgusted' by Daily Stormer, defends software ethos</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Jul 29</td>
<td>The Register</td>
<td><a href="https://www.theregister.co.uk/2017/07/29/tor_dark_web/">Dark web doesn't exist</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Jul 20</td>
<td>Venture Beat</td>
<td><a href="https://venturebeat.com/2017/07/20/the-tor-project-launches-its-first-public-bug-bounty-program-through-hackerone/">Tor Project Opens Bug The Tor Project launches its first public bug bounty program through HackerOne</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 May 19</td>
<td>BestVPN</td>
<td><a href="https://www.bestvpn.com/best-free-utilities/">Best Free Utilities for Your Computer</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Apr 25</td>
<td>TechCrunch</td>
<td><a href="https://techcrunch.com/2017/04/25/tor-project-funding-3-3-million-2015/">Funding for the Tor Project reached a record $3.3 million in 2015</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2017 Feb 9</td>
<td>Forbes</td>
<td><a href="https://www.forbes.com/sites/leemathews/2017/02/09/tor-projects-new-mobile-app-alerts-you-about-surveillance-and-censorship/#1fd08a7553e0">Tor Project's New Mobile App Alerts You To Internet Surveillance And Censorship</a></td>
</tr>
-<tr style="">
+<tr>
<td>2017 Jan 17</td>
<td>Macworld</td>
<td><a href="http://www.macworld.com/article/3152823/security/anonymous-browsing-with-tor-reduces-exposure-but-still-has-risks.html">Anonymous browsing with Tor reduces exposure</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Sep 19</td>
<td>The Guardian</td>
<td><a href="https://www.theguardian.com/help/2016/sep/19/how-to-contact-the-guardian-securely">How to contact the Guardian securely</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Sep 16</td>
<td>CNN</td>
<td><a href="http://money.cnn.com/2016/09/16/technology/internet-censorship-blackouts-gabon/">This African country is taking an unprecedented step in internet censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Sep 10</td>
<td>The Merkle</td>
<td><a href="http://themerkle.com/tor-developers-are-preparing-for-the-next-generation-of-cyberattacks/">Tor Developers Are Preparing For The Next Generation of Cyberattacks</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Aug 31</td>
<td>ArsTechnica</td>
<td><a href="http://arstechnica.com/security/2016/08/building-a-new-tor-that-withstands-next-generation-state-surveillance/">Building a new Tor that can resist next-generation state surveillance</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Aug 26</td>
<td>The Merkle</td>
<td><a href="http://themerkle.com/dojs-ovie-carroll-tor-helps-protect-sensitive-user-information/">DOJâ??s Ovie Carroll: â??Tor Helps Protect Sensitive User Informationâ??</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Aug 12</td>
<td>BoingBoing</td>
<td><a href="http://boingboing.net/2016/08/12/the-tor-projects-social-cont.html">Tor Project Social Contract</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Aug 11</td>
<td>The Inquirer</td>
<td><a href="http://www.theinquirer.net/inquirer/news/2467718/tor-creates-social-contract-promising-never-to-harm-users">Tor creates 'social contract' promising never to harm users</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Aug 10</td>
<td>TechCrunch</td>
<td><a href="https://techcrunch.com/2016/08/10/tors-new-social-contract-includes-no-backdoors-pledge/">Torâ??s new social contract includes â??no backdoorsâ?? pledge</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Aug 06</td>
<td>MotherBoard</td>
<td><a href="http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor">Department of Justice Official Tells Hundred Federal Judges to Use Tor</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Aug 04</td>
<td>Softpedia</td>
<td><a href="http://news.softpedia.com/news/tor-project-0-2-8-6-improves-client-bootstrapping-performance-linux-security-506961.shtml">Tor Project 0.2.8.6 Improves Client Bootstrapping Performance, Linux Security</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jul 07</td>
<td>http://www.htxt. co.za/</td>
<td><a href="http://www.htxt.co.za/2016/07/07/make-it-harder-for-the-govt-to-track-your-zimshutdown-messages/">Make it harder for the govâ??t to track your #ShutdownZimbabwe2016 messages</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jul 05</td>
<td>The Inquirer</td>
<td><a href="http://www.theinquirer.net/inquirer/news/2463873/mozilla-ups-firefox-privacy-ante-with-tor-injection">Mozilla ups Firefox privacy ante with Tor injection</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jul 03</td>
<td>The Guardian</td>
<td><a href="https://www.theguardian.com/technology/2016/jul/03/online-security-measures-digital-privacy-guide">Extreme online security measures to protect your digital privacy â?? a guide</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jun 28</td>
<td>Ghakhs.net</td>
<td><a href="www.ghacks.net/2016/06/28/selfrando-improves-tor-browser-security">Selfrando improves Tor Browser security</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jun 24</td>
<td>The Merkel</td>
<td><a href="http://themerkle.com/selfrando-technique-makes-tor-nearly-invulnerable-to-de-anonymization-attacks/">Selfrando Technique Makes Tor Nearly Invulnerable To DeÂanonymization Attacks</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Jun 23</td>
<td>The Inquirer</td>
<td><a href="http://www.theinquirer.net/inquirer/news/2462596/mozilla-throws-usd385k-at-open-source-projects-including-tor-and-nvda">Mozilla throws $385k at open source projects including Tor and NVDA</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jun 23</td>
<td>Register</td>
<td><a href="http://www.theregister.co.uk/2016/06/23/mozilla_gives_out_moss_prizes/">What do Tor, Tails and Caddy have in common? Mozilla bucks</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jun 22</td>
<td>Tech Eye</td>
<td><a href="http://www.techeye.net/news/human-rights-groups-furious-about-new-us-warrant-law">Human Rights groups furious about new US warrant law</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jun 22</td>
<td>ZDNet</td>
<td><a href="http://www.zdnet.com/article/tor-project-teams-up-with-researchers-to-toughen-up-tor-browser/">Tor Project teams up with researchers to toughen up Tor browser</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jun 21</td>
<td>The Daily Dot</td>
<td><a href="http://www.dailydot.com/layer8/rule-41-online-protest/">InternetÂrights groups launch protest over expanded FBI hacking powers</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jun 16</td>
<td>BBCÂPersia</td>
<td><a href="https://blog.torproject.org/blog/statement-tor-project-software-integrity-and-apple">Tor developer discusses privacy tools with BBCÂPersia</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jun 02</td>
<td>dna</td>
<td><a href="http://www.dnaindia.com/scitech/report-tor-browser-update-adds-improved-html5-support-and-duckduckgo-search-engine-2219121">Tor Browser update adds improved HTML5 support and DuckDuckGo search engine</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 May 31</td>
<td>Softpedia</td>
<td><a href="http://news.softpedia.com/news/tor-browser-6-0-based-on-firefox-45-esr-released-with-updated-security-features-504668.shtml">Tor Browser 6.0 Based on Firefox 45ÂESR Released with Updated Security Features</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 May 25</td>
<td>Softpedia</td>
<td><a href="http://news.softpedia.com/news/tor-to-use-never-seen-before-distributed-rng-to-generate-truly-random-numbers-504461.shtml">Tor to Use NeverÂBeforeÂSeen Distributed RNG to Generate Truly Random Numbers</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 May 19</td>
<td>The Merkle</td>
<td><a href="http://themerkle.com/tor-technology-can-bring-much-needed-encryption-to-healthcare/">Tor Technology Can Bring Much Needed Encryption To Healthcare</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 May 12</td>
<td>The Daily Dot</td>
<td><a href="http://www.dailydot.com/layer8/uganda-censorship-circumvention-how-to/">How Ugandans can beat government censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 May 12</td>
<td>The Huffington Post</td>
<td><a href="http://www.huffingtonpost.com/entry/paul-syverson-tor-interview_us_5734a06ae4b060aa78197df2">Tor Founder: Your Medical Records Are The Next Big Target For Hackers</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 May 12</td>
<td>Committee to Protect Journalists</td>
<td><a href="https://cpj.org/blog/2016/05/how-securedrop-helps-cpj-protect-journalists.php">How SecureDrop helps CPJ protect journalists</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 May 04</td>
<td>The Mac Observer</td>
<td><a href="https://www.macobserver.com/tmo/article/fbis-tor-vpn-targeted-warrants-amount-to-court-sanctioned-surveillance">FBIâ??s TOR, VPNÂtargeted Warrants Amount to Court Sanctioned Mass Surveillance</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 May 03</td>
<td>Technical.ly Philly</td>
<td><a href="http://technical.ly/philly/2016/05/03/duckduckgo-tor-project/">DuckDuckGo donates $25K to privacyÂfocused Tor Project</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Apr 11</td>
<td>DZone</td>
<td><a href="https://dzone.com/articles/considering-tor-like-techniques-to-protect-your-us">Considering TorÂlike Techniques to Protect Your Users</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Apr 08</td>
<td>Cyber Shack</td>
<td><a href="http://www.cybershack.com.au/feature/panama-papers-privacy-encryption-and-you-080416-3">Panama Papers, privacy, encryption, and you</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Apr 06</td>
<td>MotherBoard</td>
<td><a href="http://motherboard.vice.com/read/countries-that-use-tor-most-are-either-highly-repressive-or-highly-liberal">Countries that Use Tor Most Are Either Highly Repressive or Highly Liberal</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Mar 22</td>
<td>ComputerWorld</td>
<td><a href="http://www.csoonline.com/article/3046505/security/tor-project-says-it-can-quickly-catch-spying-code.html">Tor Project says it can quickly catch spying code</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Mar 22</td>
<td>The Register</td>
<td><a href="http://www.theregister.co.uk/2016/03/22/tor_project_fbi_apple/">Tor Project works on antiÂFBI defenses amid iOS row with Apple</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Mar 21</td>
<td>Softpedia</td>
<td><a href="http://news.softpedia.com/news/like-apple-tor-devs-would-quit-their-jobs-if-ordered-to-backdoor-their-software-502040.shtml">Like Apple, Tor Devs Would Quit Their Jobs If Ordered to Backdoor Their Software</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Feb 16</td>
<td>The Daily Dot</td>
<td><a href="http://www.dailydot.com/layer8/shari-steele-tor-project-eff/">The woman who aims to take Tor mainstream</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jan 22</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/business/2016/01/tor-project-raises-over-200000-in-attempt-to-diversify-its-funding/">Tor Project raises over $200,000 in attempt to â??diversifyâ?? its funding</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jan 20</td>
<td>China Digital Times</td>
<td><a href="http://money.cnn.com/2016/01/20/technology/facebook-android-tor/">Facebook Makes App that Can Bypass China's Censors</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jan 20</td>
<td>The Verge</td>
<td><a href="http://www.theverge.com/2016/1/20/10796872/facebook-android-app-tor-support">Facebook's Android app now lets you flip a switch to browse over Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jan 20</td>
<td>PC World</td>
<td><a href="http://www.pcworld.com/article/3024305/security/privacy-conscious-users-rejoice-you-can-now-use-facebooks-android-app-over-tor.html">PrivacyÂconscious users rejoice: Facebook's Android app now supports Tor</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jan 19</td>
<td>Business Insider</td>
<td><a href="http://www.businessinsider.com/facebook-tor-android-2016-1">You can now connect to Facebook on your phone without leaving a digital trail</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jan 18</td>
<td>Sky News</td>
<td><a href="http://news.sky.com/story/tor-map-reveals-networks-use-across-europe-10135419">Tor Map Reveals Network's Use Across Europe</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jan 08</td>
<td>The Guardian</td>
<td><a href="https://www.theguardian.com/media/2016/jan/08/propublica-launches-worlds-first-major-news-site-for-dark-web">ProPublica launches world's first major news site for dark web</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jan 08</td>
<td>Salon</td>
<td><a href="http://www.salon.com/2016/01/08/this_is_the_web_browser_you_should_be_using_if_you_care_at_all_about_security_partner/">This is the web browser you should be using if you at all about security</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jan 07</td>
<td>The Daily Dot</td>
<td><a href="http://www.techrepublic.com/blog/it-security/everything-you-need-to-know-about-using-tor/">Everything you need to know about Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2016 Jan 07</td>
<td>Wired</td>
<td><a href="https://www.wired.com/2016/01/propublica-launches-the-dark-webs-first-major-news-site/">ProPublica Launches the Dark Webâ??s First Major News Site</a></td>
</tr>
-<tr style="">
+<tr>
<td>2016 Jan 05</td>
<td>The Register</td>
<td><a href="http://www.theregister.co.uk/2016/01/05/tor_launches_inviteonly_exploit_bug_bounty/">Tor launches inviteÂonly exploit bug bounty</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Dec 29</td>
<td>MotherBoard</td>
<td><a href="http://motherboard.vice.com/read/the-tor-project-is-starting-a-bug-bounty-program">The Tor Project Is Starting a Bug Bounty Program</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Dec 14</td>
<td>ZDNET</td>
<td><a href="http://www.zdnet.com/article/twitter-says-why-not-try-tor-after-issuing-first-state-backed-hack-alert/">Twitter says 'Why not try Tor?' after issuing first stateÂbacked hack alert</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Dec 11</td>
<td>The Register (UK)</td>
<td><a href="http://www.theregister.co.uk/2015/12/11/silicon_valley_congresswoman_to_bat_for_tor/">Silicon Valley's Congresswoman comes to the defense of Tor</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Dec 11</td>
<td>WIRED</td>
<td><a href="https://www.wired.com/2015/12/tor-hires-a-new-leader-to-help-it-combat-the-war-on-privacy/">Tor Hires a New Leader to Help It Combat the War on Privacy</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Dec 11</td>
<td>BoingBoing</td>
<td><a href="http://boingboing.net/2015/12/11/the-tor-project-has-a-new-exec.html">The Tor Project has a new executive director: former EFF director Shari Steele!</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Dec 10</td>
<td>MotherBoard</td>
<td><a href="http://motherboard.vice.com/read/tor-and-public-wi-fi-safe-in-france-prime-minister-says">Tor and Public WiÂFi Safe in France, Prime Minister Says</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Dec 07</td>
<td>ZDNET</td>
<td><a href="http://www.zdnet.com/article/france-considers-public-wi-fi-tor-network-ban-in-wake-of-terror-attacks/">France considers public WiÂFi, Tor network ban in wake of terror attacks</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Dec 04</td>
<td>SC Magazine</td>
<td><a href="https://www.scmagazine.com/top-6-influential-security-thinkers/article/534087/">Top 6 influential security thinkers</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Nov 30</td>
<td>Fusion</td>
<td><a href="http://fusion.net/story/238742/tor-carnegie-mellon-attack/">The attack that broke the Dark Webâ??and how Tor plans to fix it.</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Nov 25</td>
<td>The Register (UK)</td>
<td><a href="http://www.theregister.co.uk/2015/11/25/tor_project_donations/">Tor Project: Anonymity ain't free, folks. Pony up</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Nov 16</td>
<td>International Journalists Network (IJNet)</td>
<td><a href="https://ijnet.org/en/blog/five-tools-journalists%E2%80%99-online-safety-privacy-highlighted-during-aaron-swartz-day-event-0">Five tools for journalistsâ?? online safety, privacy highlighted during Aaron Swartz Day event</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Oct 30</td>
<td>BBC</td>
<td><a href="http://www.bbc.com/news/technology-34677323">Tor launches antiÂcensorship Messenger service</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Oct 30</td>
<td>ZDNET</td>
<td><a href="http://www.zdnet.com/article/tor-project-launches-encrypted-anonymous-chat-app-to-the-public/">Tor Project launches encrypted anonymous chat app to the public</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Oct 29</td>
<td>WIRED</td>
<td><a href="https://www.wired.com/2015/10/tor-just-launched-the-easiest-app-yet-for-anonymous-encrypted-im/">Tor Just Launched the Easiest App Yet for Anonymous, Encrypted IM</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Oct 29</td>
<td>Tech Times</td>
<td><a href="http://www.techtimes.com/articles/101138/20151029/with-facebooks-support-tor-projects-onion-domains-remain-hidden.htm">With Facebook's Support, Tor Project's .Onion Domains Remain Hidden</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Oct 28</td>
<td>The Verge</td>
<td><a href="http://www.theverge.com/2015/10/28/9631006/tor-hidden-addresses-recognition">Facebook helps Torâ??s hidden sites get official recognition</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Oct 14</td>
<td>The Daily Dot</td>
<td><a href="http://www.dailydot.com/layer8/tor-app-ios-orfox-tor-browser-ios-9-apple/">Tor is getting major upgrades on iOS 9</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Oct 13</td>
<td>Economic Times</td>
<td><a href="http://economictimes.indiatimes.com/tech/internet/more-indians-are-logging-on-anonymously-using-browsers-like-tor-freenet-i2p-and-tails/articleshow/49330271.cms">More Indians are logging on anonymously using browsers like Tor, Freenet, I2P and Tails</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Sep 16</td>
<td>NPR</td>
<td><a href="http://www.npr.org/2015/09/16/440914105/n-h-public-library-reconsiders-support-for-anonymous-internet-network-tor">N.H. Public Library Reconsiders Support For Anonymous Internet Network Tor</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Sep 16</td>
<td>Motherboard</td>
<td><a href="http://motherboard.vice.com/read/dissent-a-new-type-of-security-tool-could-markedly-improve-online-anonymity">'Dissent,' a New Type of Security Tool, Could Markedly Improve Online Anonymity</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Sep 14</td>
<td>Wired</td>
<td><a href="http://www.wired.com/2015/09/mapping-tors-anonymity-network-spread-around-world/">Mapping How Torâ??s Anonymity Network Spread Around the World</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Sep 12</td>
<td>Wired</td>
<td><a href="http://www.wired.com/2015/09/security-news-week-russia-us-homeland-security-agree-something/">Russia Tried and Failed to Hack the Tor Browser</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Sep 11</td>
<td>Motherboard</td>
<td><a href="http://motherboard.vice.com/en_ca/read/the-us-government-pressured-a-small-local-library-to-turn-off-its-tor-server">The US Government Pressured a Small Local Library to Turn Off Its Tor Server</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Sep 10</td>
<td>Web Host Industry Review</td>
<td><a href="http://www.thewhir.com/web-hosting-news/iana-designates-onion-as-special-use-domain-to-boost-security">IANA Designates .Onion as Special Use Domain to Boost Security</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Sep 10</td>
<td>Softpedia News</td>
<td><a href="http://news.softpedia.com/news/tor-gets-its-own-tld-special-use-domain-at-onion-491473.shtml">Tor Gets Its Own TLD Special-Use Domain at .onion</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Sep 10</td>
<td>SiliconANGLE</td>
<td><a href="http://siliconangle.com/blog/2015/09/10/tor-anonymity-network-benefits-from-onion-added-as-special-use-domain-name/">Tor anonymity network benefits from .onion added as special-use domain name</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Sep 10</td>
<td>Propublica</td>
<td><a href="https://www.propublica.org/article/library-support-anonymous-internet-browsing-effort-stops-after-dhs-email">First Library to Support Anonymous Internet Browsing Effort Stops After DHS Email</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Sep 10</td>
<td>The Register</td>
<td><a href="http://www.theregister.co.uk/2015/09/10/tors_onion_domain_gets_privacyconscious_users_off_the_dns/">Monsters defeated in quest to free .onion from clutches of DNS-snooping demons</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Sep 10</td>
<td>Motherboard</td>
<td><a href="http://motherboard.vice.com/read/internet-regulators-just-legitimized-the-dark-web">Privacy by design, thanks to Tor's Jacob Appelbaum and Facebook's Alec Muffett</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Aug 31</td>
<td>Statesman</td>
<td><a href="http://www.statesman.com/news/technology/tor-is-software-for-keeping-things-online-anonymou/nnR7z/">â??Torâ?? is software for keeping things online anonymous</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Aug 29</td>
<td>Saturday Paper</td>
<td><a href="https://www.thesaturdaypaper.com.au/2015/08/29/tor-and-the-deep-web-going-mainstream/14407704002293">Tor and the Deep Web Going Mainstream</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Aug 28</td>
<td>SC MAGAZINE</td>
<td><a href="http://www.scmagazine.com/dark-website-agora-closes-over-tor-vulnerability-suspicions/article/435278/">Dark website Agora closes over Tor vulnerability suspicions</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Jul 31</td>
<td>SC Magazine</td>
<td><a href="http://www.scmagazine.com/tor-project-library-freedom-project-to-establish-tor-exit-nodes-in-libraries/article/429867/">Tor Project, Library Freedom Project to establish Tor exit nodes in libraries</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Jul 24</td>
<td>WHYY Radio</td>
<td><a href="https://technical.ly/philly/2015/07/24/kate-krauss-radio-times/">Security and Privacy on the Internet, with Julia Angwen and Tor Projectâ??s Kate Krauss (starts at 13:30)</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Jul 16</td>
<td>Technically Philly</td>
<td><a href="https://technical.ly/philly/2015/07/16/kate-krauss-tor/">How this West Philly activist became Torâ??s first director of communications</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Jul 8</td>
<td>Technically Philly</td>
<td><a href="https://technical.ly/philly/2015/07/08/philadelphia-internet-privacy-tor/">Inside Phillyâ??s Growing Internet Privacy Community</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Jun 13</td>
<td>CNN</td>
<td><a href="http://money.cnn.com/2014/06/13/technology/security/dont-get-hacked/index.html">Simple tips to avoid getting hacked</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Jun 30</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/tech-policy/2015/07/crypto-activists-announce-vision-for-tor-exit-relay-in-every-library/">Crypto activists announce vision for Tor exit relay in every library "Librarians see the value as soon as you say â??privacy protecting technology.'" </a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Jun 18</td>
<td>WIRED</td>
<td><a href="http://www.wired.com/2015/06/dark-web-know-myth/">The Dark Web as You Know It Is a Myth</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Jun 18</td>
<td>Liberation</td>
<td><a href="http://www.liberation.fr/economie/2015/06/18/tor-mails-toi-de-tes-oignons_1332660">Tor: "The emancipatory use of technology"</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Apr 9</td>
<td>Silicon Republic</td>
<td><a href="http://www.siliconrepublic.com/enterprise/item/41531-the-interview-runa-sandvik">Interview with Runa Sandvik</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Apr 4</td>
<td>El Pais</td>
<td><a href="http://tecnologia.elpais.com/tecnologia/2015/04/04/actualidad/1428169979_196077.html">Hay que lograr que Internet deje de ser un medio de vigilancia masiva </a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Apr 2</td>
<td>Motherboard </td>
<td><a href="http://motherboard.vice.com/read/tor-wants-to-know-how-to-make-the-darknet-mainstream">Tor wants to know how to make the darknet mainstream</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Mar 26</td>
<td>Daily Dot</td>
<td><a href="http://www.dailydot.com/politics/tor-media-public-relations-perception/">Tor's great rebranding</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Mar 22</td>
<td>The Hill</td>
<td><a href="http://thehill.com/policy/cybersecurity/236512-silicon-valley-spars-with-obama-over-backdoor-surveillance">Silicon Valley Spars with Obama over Backdoor Surveillance</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Mar 18</td>
<td>Boston Globe</td>
<td><a href="http://www.betaboston.com/news/2015/03/18/in-an-effort-to-educate-users-tor-animates-online-privacy/">In an effort to educate users, Tor animates online privacy</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Mar 16</td>
<td>Wall Street Journal</td>
<td><a href="http://www.wsj.com/articles/u-s-cloud-providers-face-backlash-from-chinas-censors-1426541126#livefyre-comment">U.S. Cloud Providers Face Backlash From Chinaâ??s Censors</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Mar 11</td>
<td>The Guardian</td>
<td><a href="http://www.theguardian.com/technology/2015/mar/11/tor-should-not-be-banned-in-britain">Tor Should Not be Banned in Britain</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Mar 10</td>
<td>The Hill</td>
<td><a href="http://thehill.com/policy/cybersecurity/235171-uk-lawmakers-we-cant-ban-online-anonymity-services">We Canâ??t Outlaw Anonymous Web Services</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Mar 10</td>
<td>BBC</td>
<td><a href="http://www.bbc.com/news/technology-31816410">Banning Tor unwise and infeasible, MPs told</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Mar 10</td>
<td>El Diario</td>
<td><a href="http://www.eldiario.es/turing/vigilancia_y_privacidad/Proyecto-Tor-comunidad-alrededor-NSA_0_365014509.html">Tor helps resist the NSA</a></td>
</tr>
-<tr style="">
+<tr>
<td>2015 Mar 3</td>
<td>AFP</td>
<td><a href="http://fr.canoe.ca/techno/internet/archives/2015/03/20150303-125006.html">2.5 million Tor users canâ??t all be criminals!</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Jan 7</td>
<td>Inside BitCoins</td>
<td><a
href="http://insidebitcoins.com/news/developers-say-privacy-network-tor-was-not-compromised-during-silk-road-takedown/28469">Developers
Say Privacy Network Tor Was Not Compromised During Silk Road Takedown</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2015 Jan 29</td>
<td>The Inquirer</td>
<td><a
href="http://www.theinquirer.net/inquirer/news/2392703/mozilla-treats-tor-network-to-a-hardware-helping-hand">Mozilla treats Tor Network to a hardware helping hand
</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Dec 30</td>
<td>31C3</td>
<td><a
@@ -890,239 +890,239 @@ href="http://media.ccc.de/browse/congress/2014/31c3_-_6251_-_en_-_saal_1_-_20141
of the Onion"</a> video on the state of the Tor Project with Roger
Dingledine, Jacob Appelbaum, Arturo Filastò, and Laura Poitras.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Dec 26</td>
<td>Engadget</td>
<td><a
href="http://www.engadget.com/2014/12/26/lizard-squad-hackers-attack-tor/">Band
of hackers manages to take down Sony--but not Tor</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Dec 19</td>
<td>The Guardian</td>
<td><a
href="http://www.theguardian.com/technology/2014/dec/05/how-faceboook-tor-service-encourage-open-web">How
Facebook's Tor service could encourage a more open web</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Dec 17</td>
<td>Gizmodo</td>
<td><a
href="http://gizmodo.com/tor-is-still-safe-1669011966">Tor is Still Safe
</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Dec 12</td>
<td>The Independent</td>
<td><a
href="http://www.independent.co.uk/voices/comment/the-dark-web-is-not-just-for-paedophiles-drug-dealers-and-terrorists-9920667.html">OpEd
</a>on hidden services and censorship</td>
</tr>
-<tr style="">
+<tr>
<td>2014 Dec 12</td>
<td>Boing Boing</td>
<td><a href="https://boingboing.net/2014/12/12/tor-project-declares-solidarit.html">Tor Project declares solidarity with harassed colleague
</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Dec 11</td>
<td>DCInno</td>
<td><a
href="http://dcinno.streetwise.co/2014/11/11/mozilla-firefox-anonymous-internet-tor/">Firefox
is Building an Anonymous Internet Browser With Tor</a> via @DC_Inno</td>
</tr>
-<tr style="">
+<tr>
<td>2014 Nov 10</td>
<td>Gizmodo</td>
<td><a
href="http://gizmodo.com/mozilla-is-helping-tor-get-bigger-and-better-1656860653">Mozilla
get bigger and better</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Nov 20</td>
<td>Wired.co.UK</td>
<td><a
href="http://www.wired.co.uk/news/archive/2014-11/20/tor-still-secure">Don't
panic, Tor is still safe and Hereâ??s Why</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Oct 31</td>
<td>The Next Web</td>
<td><a
href="http://thenextweb.com/facebook/2014/10/31/facebook-now-available-tor-network/">Facebook
is now available on Tor for more secure browsing</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Jul 8</td>
<td>Cambridge Community Television</td>
<td><a href="http://www.cctvcambridge.org/NSATor">NSA Surveillance Targets Cambridge - based TOR Project</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Jul 8</td>
<td>Tech Times</td>
<td><a href="http://www.techtimes.com/articles/9779/20140708/nsa-might-tag-you-as-extremist-when-you-use-tor-other-privacy-online-services.htm">NSA might tag you as extremist when you use Tor, other privacy online services</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Jul 7</td>
<td>Computerworld</td>
<td><a href="http://blogs.computerworld.com/privacy/24102/if-you-care-about-online-privacy-then-nsa-cares-about-targeting-you">If you can about online privacy, then the NSA cares about targeting you</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Jul 3</td>
<td>DasErste.de</td>
<td><a href="http://daserste.ndr.de/panorama/aktuell/nsa230_page-1.html">NSA targets the privacy-conscious</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Jun 17</td>
<td>IT News Online</td>
<td><a href="http://www.itnewsonline.com/realwire/How-to-be-anonymous-on-the-Internet-AppSec-presents-the-latest-developments-of-The-Tor-Project-for-anonymous-communications/13530">How to be anonymous on the Internet: AppSec presents the latest developments of The Tor Project for anonymous communications</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Jun 15</td>
<td>International Business Times</td>
<td><a href="http://www.ibtimes.co.uk/iraq-crisis-gvoernment-blocks-access-tor-project-following-isis-insurgency-1452879">Iraq Crisis: Government Blocks Access to Tor Project Following Isis Insurgency </a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Jun 15</td>
<td>Gizmodo</td>
<td><a href="http://gizmodo.com/tor-is-for-everyone-why-you-should-use-tor-1591191905">Tor is for Everyone: Why Should You Use Tor </a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 May 25</td>
<td>NPR</td>
<td><a href="http://www.npr.org/blogs/alltechconsidered/2014/05/25/315821415/going-dark-the-internet-behind-the-internet">Going Dark: The Internet Behind The Internet</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 May 13</td>
<td>ABC News</td>
<td><a href="http://abc7news.com/technology/i-team-investigates-underworld-marketplaces-of-the-darknet/56262/">I-Team: Understanding TOR and the dark net</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 May 9</td>
<td>Vice</td>
<td><a href="http://motherboard.vice.com/read/tor-is-being-used-as-a-safe-haven-for-victims-of-cyberstalking">Tor is Being Used as a Safe Haven for Victims of Cyberstalking</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 May 7</td>
<td>BoingBoing</td>
<td><a href="http://boingboing.net/2014/05/07/tor-network-security-for-dome.html">Tor: network security for domestic abuse survivors</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 May 7</td>
<td>BetaBoston</td>
<td><a href="http://betaboston.com/news/2014/05/07/as-domestic-abuse-goes-digital-shelters-turn-to-counter-surveillance-with-tor/">As domestic abuse goes digital, shelters turn to counter-survellience with Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 May</td>
<td>Boston Magazine</td>
<td><a href="http://www.bostonmagazine.com/news/article/2014/04/29/power-of-ideas/4/">The Power of Ideas</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Apr 29</td>
<td>ThinkProgress</td>
<td><a href="http://thinkprogress.org/culture/2014/04/29/3432050/can-you-hide-from-big-data/">Meet the Woman Who did Everything in Her Power to Hide Her Pregnancy From Big Data</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Mar 26</td>
<td>IT News Africa</td>
<td><a href="http://www.itnewsafrica.com/2014/03/hidden-internet-growing-rapidly/">â??Hiddenâ?? internet growing rapidly</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Mar 25</td>
<td>Westmoreland Times</td>
<td><a href="http://westmorelandtimes.com/news/11611/25/how-to-mask-your-location-internet-privacy-tools/">Masking your location on the internet with privacy tools</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Mar 24</td>
<td>BoingBoing</td>
<td><a href="http://boingboing.net/2014/03/24/turkey-orders-block-of-twitter.html">Turkey orders block of Twitter's IP addresses</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Mar 24</td>
<td>Telegraph.co.uk</td>
<td><a href="http://blogs.telegraph.co.uk/technology/willardfoxton2/100012913/dozens-of-firms-are-invisibly-tracking-you-online-heres-how-to-hide-from-them/">Dozens of firms are invisibly tracking you online. Here's how to hide from them</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Mar 24</td>
<td>Washington Post</td>
<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/03/24/the-switchboard-turkeys-twitter-ban-gets-tougher/">The Switchboard: Turkey's Twitter ban gets tougher</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Mar 23</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/tech-policy/2014/03/after-dns-change-fails-turkish-government-steps-up-twitter-censorship/">After DNS change fails, Turkish government steps up Twitter censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Mar 23</td>
<td>CSO</td>
<td><a href="http://www.csoonline.com/article/2136262/social-networking-security/turkey--twitter---censorship--vpn--tor-and-more.html">Turkey, Twitter & Censorship: VPN, Tor and more</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Mar 20</td>
<td>Threat Post</td>
<td><a href="http://threatpost.com/malicious-ios-tor-browser-in-apple-app-store/104911">Malicious iOS Tor Browswer in Apple App Store</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Mar 20</td>
<td>PC World</td>
<td><a href="http://www.pcworld.com/article/2110440/fake-tor-app-has-been-sitting-in-apples-app-store-for-months-tor-project-says.html">Fake Tor app has been sitting on Apple's App Store for months, Tor Project says</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Mar 10</td>
<td>USA Today</td>
<td><a href="http://www.usatoday.com/story/tech/2014/03/10/tor-snowden-sxsw/6263157/">Four questions about Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Mar 3</td>
<td>Computerworld</td>
<td><a href="http://www.computerworld.com.au/article/539579/paranoid_survival_guide_part_1_how_protect_your_personal_data/">The paranoid's survival guide, part 1: How to protect your personal data</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Feb 21</td>
<td>Lifehacker</td>
<td><a href="http://lifehacker.com/what-is-tor-and-should-i-use-it-1527891029">What Is Tor and Should I Use It?</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Feb 20</td>
<td>Watchdog.org</td>
<td><a href="http://watchdog.org/129349/securedrop-deep-throat/">Are you ready to be Deep Throat?</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Feb 19</td>
<td>Daily Illini</td>
<td><a href="http://www.dailyillini.com/news/article_407e25da-9909-11e3-8f33-0017a43b2370.html">Security technology to help students in future careers</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Feb 19</td>
<td>Nature World News</td>
<td><a href="http://www.natureworldnews.com/articles/6098/20140219/wildleaks-new-service-allows-anonymous-whistleblowers-report-wildlife-crime.htm">WildLeaks: New Service Allows Anonymous Whistleblowers to Report Wildlife Crime</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Feb 6</td>
<td>Help Net Security</td>
<td><a href="http://www.net-security.org/secworld.php?id=16323">HTTPS Everywhere add-on now available for Firefox on Android</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Feb 5</td>
<td>OEN</td>
<td><a href="http://www.opednews.com/articles/HTTPS-Everywhere-More-se-by-John-Moffett-Communication_Internet_Surveillance-140205-843.html">"HTTPS Everywhere" More secure browsing courtesy of the EFF and Tor</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Feb 4</td>
<td>Popular Mechanics</td>
<td><a href="http://www.popularmechanics.com/technology/how-to/computer-security/7-ways-to-reclaim-your-digital-privacy-16453529">7 Ways to Reclaim Your Digital Privacy</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Feb 3</td>
<td>IBTimes</td>
<td><a href="http://www.ibtimes.co.uk/avoiding-sochi-snoopers-using-tor-common-sense-nail-polish-prevent-russian-authorities-spying-1434938">Avoiding Sochi Snoopers: Using Tor, Common Sense and Nail Polish to Prevent Russian Authorities Spying on Journalists</a></td>
</tr>
-<tr style="">
+<tr>
<td>2014 Feb</td>
<td>TechTarget</td>
<td><a href="http://searchsecurity.techtarget.com/feature/Tor-networks-Stop-employees-from-touring-the-deep-Web">Tor networks: Stop employees from touring the deep web</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Jan 23</td>
<td>BusinessWeek</td>
<td><a href="http://www.businessweek.com/articles/2014-01-23/tor-anonymity-software-vs-dot-the-national-security-agency">The Inside Story of Tor, the Best Internet Anonymity Tool the Government Ever Built</a></td>
@@ -1133,7 +1133,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.wired.com/threatlevel/2014/01/russia-tor-attack/">Russian Spy Notes Caught Snooping on Facebook Users</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2014 Jan 17</td>
<td>ZDNet</td>
<td><a href="http://www.zdnet.com/if-microsoft-thinks-old-tor-clients-are-risky-why-not-windows-xp-7000025283/">If Microsoft thinks old Tor clients are risky, why not Windows XP?</a></td>
@@ -1144,7 +1144,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.boiseweekly.com/boise/privacy-tools-how-to-safely-browse-the-internet/Content?oid=3040524">Privacy Tools: How to Safely Browse the Internet</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Dec 31</td>
<td>Dawn.com</td>
<td><a href="http://www.dawn.com/news/1077527/anonymous-the-parallel-internet">Anonymous: The Parallel Internet?</a></td>
@@ -1155,7 +1155,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.thinkdigit.com/Software/Top-free-PC-Security-Tools_19171.html">Top free PC Security Tools</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Dec 28</td>
<td>Wired</td>
<td><a href="http://www.wired.com/threatlevel/2013/12/tor-publicity-mixed-blessing/">For Tor, Publicity a Mixed Blessing</a></td>
@@ -1166,7 +1166,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://siliconangle.com/blog/2013/12/18/bitcoin-weekly-2013-december-18-more-chinese-market-woes-eu-banking-authority-warning-about-btc-tor-project-thumbs-up-bitcoin-donations/">Bitcoin Weekly 2013 December 18: More Chinese market upheaval, EU banking authority warning about BTC, Tor Project thumbs-up Bitcoin donations</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Dec 18</td>
<td>PC Pro UK</td>
<td><a href="http://www.pcpro.co.uk/news/386149/tor-accepts-donations-in-bitcoin">Tor accepts donations in Bitcoin</a></td>
@@ -1177,7 +1177,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.theregister.co.uk/2013/12/18/tor_project_to_accept_bitcoin_donations/">Lovers of Tor can now sprinkle Bitcoins on its developers as thanks</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Dec 16</td>
<td>PBS</td>
<td><a href="http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/">Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists</a></td>
@@ -1188,7 +1188,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.niemanlab.org/2013/12/91274/">Freedom of the Press Foundation wants to help build secure communication tools for journalists</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Dec 2</td>
<td>EFF</td>
<td><a href="https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy">An Open Letter Urging Universities To Encourage Conversation About Online Privacy</a></td>
@@ -1199,7 +1199,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/">Get a grip on TOR with Vidalia</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Nov 20</td>
<td>PBS</td>
<td><a href="http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/">Getting to Know Tor, the Most Popular Anonymity Tool in the World</a></td>
@@ -1210,7 +1210,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/">FAKTA: The Tor Project</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Nov 5</td>
<td>The Guardian</td>
<td><a href="http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser">What is Tor? A beginner's guide to the privacy tool</a></td>
@@ -1221,7 +1221,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/">Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 23</td>
<td>Tom's Guide</td>
<td><a href="http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html">What Is Tor? Answers to Frequently Asked Questions</a></td>
@@ -1232,7 +1232,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/">Taking Stock Of Tor: Top 5 Tips For Using The Onion Router</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 10</td>
<td>VentureBeat</td>
<td><a href="http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/">TorSearch launches to be the Google of the hidden Internet</a></td>
@@ -1243,7 +1243,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857">NSA Battles Tor: 9 Facts</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 8</td>
<td>The Next Web</td>
<td><a href="http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/">What is Tor and why does it matter?</a></td>
@@ -1254,7 +1254,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/">How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 7</td>
<td>Infosecurity</td>
<td><a href="http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor">How Does Law Enforcement 'Subvert' Tor?</a></td>
@@ -1265,7 +1265,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/">Everything you need to know about the NSA and Tor in one FAQ</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 4</td>
<td>eWeek</td>
<td><a href="http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/">Snowden Leaks Show NSA Targets Tor</a></td>
@@ -1276,7 +1276,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity">Attacking Tor: how the NSA targets users' online anonymity</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 4</td>
<td>TIME</td>
<td><a href="http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/">Docs Reveal NSA Campaign Against Anonymous Tor Network</a></td>
@@ -1287,7 +1287,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/">NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 4</td>
<td>InfoWorld</td>
<td><a href="http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244">The Tor teardown, brought to you by goats, giraffes, and Thor's hammer</a></td>
@@ -1298,7 +1298,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.computerworld.com/s/article/9242992/Report_NSA_has_little_success_cracking_Tor?taxonomyId=13">Report: NSA has little success cracking Tor</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Oct 4</td>
<td>Ars Technica</td>
<td><a href="http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/">NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show</a></td>
@@ -1309,7 +1309,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/">NSA sought to unmask users of Net-privacy tool Tor, says report</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Sep 16</td>
<td>InformationWeek</td>
<td><a href="http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553">FBI Admits To Tor Server Takeover</a></td>
@@ -1320,7 +1320,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://news.techworld.com/security/3468988/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa/">Mevade botnet miscalculated effect on Tor network, says Damballa</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Sep 14</td>
<td>Gizmodo</td>
<td><a href="http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/">FBI Admits To Hacking Into The Tor Network</a></td>
@@ -1331,7 +1331,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/">FBI Admits It Controlled Tor Servers Behind Mass Malware Attack</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Sep 11</td>
<td>Infosecurity</td>
<td><a href="http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/">Massive Botnet is Behind Tor Usage Spike</a></td>
@@ -1342,7 +1342,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.technologyreview.com/view/519186/security-flaw-shows-tor-anonymity-network-dominated-by-botnet-command-and-control/">Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Sep 11</td>
<td>Tom's Guide</td>
<td><a href="http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html">Is Tor's Anonymous Internet Still Secure?</a></td>
@@ -1353,7 +1353,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.techweekeurope.co.uk/news/mevade-botnet-tor-network-126497">Tor Network Spike Caused By Botnet</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Sep 5</td>
<td>Gizmodo</td>
<td><a href="http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241">The Anonymous Internet Is Under Attack</a></td>
@@ -1364,7 +1364,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.stuff.co.nz/technology/digital-living/9120947/Is-Tor-right-for-you">Is Tor right for you?</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Sep 3</td>
<td>PC Advisor</td>
<td><a href="http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/">Tor traffic doubles in a week to reach highest ever level</a></td>
@@ -1375,7 +1375,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://rt.com/usa/tor-membership-doubled-nsa-137/">Tor anonymity network membership has doubled since NSA leak</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Aug 6</td>
<td>BBC</td>
<td><a href="http://www.bbc.co.uk/news/technology-23587620">Users of hidden net advised to ditch Windows</a></td>
@@ -1386,7 +1386,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.zdnet.com/tor-users-advised-to-switch-away-from-windows-after-malware-attack-7000019047/">Tor users advised to 'switch away from Windows' after malware attack</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Aug 5</td>
<td>NBC</td>
<td><a href="http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680">How anonymous? Tor users compromised in child porn takedown</a></td>
@@ -1397,7 +1397,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.wired.com/threatlevel/2013/08/freedom-hosting/">Feds Are Suspects in New Malware That Attacks Tor Anonymity</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Aug 5</td>
<td>Naked Security</td>
<td><a href="http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/">Freedom Hosting arrest and takedown linked to Tor privacy compromise</a></td>
@@ -1408,7 +1408,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html">Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jul 18</td>
<td>Gizmodo</td>
<td><a href="http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362">The Technology You Need to Protect Against Mass Surveillance</a></td>
@@ -1419,7 +1419,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a href="http://alum.mit.edu/pages/sliceofmit/2013/07/01/after-prism-asking-how-much-is-too-much-anonymity/">After PRISM, Is Too Much Anonymity Possible?</a></td>
</td>
<tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 28</td>
<td>Mercury News</td>
<td><a href="http://www.mercurynews.com/business/ci_23561083/how-increase-your-online-privacy">How to increase your online privacy</a></td>
@@ -1429,7 +1429,7 @@ is now available on Tor for more secure browsing</a></td>
<td>Reason.com</td>
<td><a href="http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei">Surf Without Surveillance: Tor's Karen Reilly</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 22</td>
<td>TribLIVE</td>
<td><a href="http://triblive.com/news/allegheny/4191790-74/tor-network-government">Protesters, criminals get around government censors using secret Web network</a></td>
@@ -1439,7 +1439,7 @@ is now available on Tor for more secure browsing</a></td>
<td>TribLIVE</td>
<td><a href="http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs">Hidden Web Tor helps average users and criminals avoid government snooping</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 21</td>
<td>Fast Company</td>
<td><a href="http://www.fastcompany.com/3013346/nsa-cramping-your-style-use-these-easy-encryption-solutions">NSA cramping your style? Use these easy encryption solutions</a></td>
@@ -1449,7 +1449,7 @@ is now available on Tor for more secure browsing</a></td>
<td>Help Net Security</td>
<td><a href="http://www.net-security.org/secworld.php?id=15098">Facebook once again accessible via Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 18</td>
<td>The Register</td>
<td><a href="http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/">Tor users locked out of Facebook after wave of dodgy traffic</a></td>
@@ -1459,7 +1459,7 @@ is now available on Tor for more secure browsing</a></td>
<td>TechWeek Europe</td>
<td><a href="http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413">Facebook Blocks Tor Users After Heavy Malicious Activity</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 14</td>
<td>The Salt Lake Tribune</td>
<td><a href="http://www.sltrib.com/sltrib/world/56463680-68/privacy-data-nsa-disadvantages.html.csp">Ideas for keeping your data safe from spying</a></td>
@@ -1469,7 +1469,7 @@ is now available on Tor for more secure browsing</a></td>
<td>Boston Globe</td>
<td><a href="http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.htmlp">How to keep data away from prying eyes</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 12</td>
<td>Washington Post</td>
<td><a href="http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html">Secrecy-focused Web services find a mainstream audience</a></td>
@@ -1479,7 +1479,7 @@ is now available on Tor for more secure browsing</a></td>
<td>Reflex (Czech)</td>
<td><a href="http://www.reflex.cz/clanek/zpravy/50756/soukromi-na-internetu-uz-neexistuje-ale-porad-je-tu-tor.html">Privacy on the Internet already exists. But there's still Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 10</td>
<td>Washington Post</td>
<td><a href="http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/">Five ways to stop the NSA from spying on you</a></td>
@@ -1489,7 +1489,7 @@ is now available on Tor for more secure browsing</a></td>
<td>ZDNet</td>
<td><a href="http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/">Ask a hacker: Top four anti-surveillance apps</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2013 Jun 8</td>
<td>The Hindu</td>
<td><a href="http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece">Cryptography as a means to counter Internet censorship</a></td>
@@ -1500,7 +1500,7 @@ is now available on Tor for more secure browsing</a></td>
<td><a
href="http://www.theverge.com/2013/4/24/4259672/world-wide-redacted-inside-irans-private-internet">World Wide [Redacted]: inside Iran's private internet</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Dec 17</td>
<td>Wall Street Journal</td>
<td><a href="http://online.wsj.com/article/SB10001424127887324677204578185382377144280.html">Tor: An Anonymous, And Controversial, Way to Web-Surf</a></td>
@@ -1511,7 +1511,7 @@ href="http://www.theverge.com/2013/4/24/4259672/world-wide-redacted-inside-irans
<td><a href="http://www.foreignpolicy.com/articles/2012/11/26/the_fp_100_global_thinkers?page=0,48#thinker78">The FP Top 100 Global
Thinkers</a>. Number 78: Roger, Nick, and Paul from Tor.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Nov 18</td>
<td>WOUB</td>
<td><a href="http://woub.org/2012/11/18/future-cyber-security">Conversations from Studio B: The Future of Cybersecurity</a></td>
@@ -1524,7 +1524,7 @@ href="http://fof.se/tidning/2012/9/artikel/svenskt-bistand-hjalper-
hackare-att-lura-natcensuren">Svenskt bistånd hjälper hackare att lura
nätcensuren</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Oct</td>
<td>Delta Airlines Sky Magazine</td>
<td><a
@@ -1537,7 +1537,7 @@ Sight.aspx">Hidden in Plain Sight</a></td>
<td>Tor named as one of the 2012 <a
href="https://www.eff.org/awards/pioneer">EFF Pioneer Awards</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Sep 19</td>
<td>infoBAE</td>
<td><a
@@ -1553,7 +1553,7 @@ href="https://secure.security.nl/artikel/42807/1/
Tor_gaat_naar_Facebook_ondanks_privacyrisico.html">Tor gaat naar
Facebook ondanks privacyrisico</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Jul 19</td>
<td>Philadelphia Inquirer</td>
<td><a
@@ -1569,7 +1569,7 @@ href="http://we-nato.org/2012/07/13/social-media-and-online-anonymity-
during-the-arab-spring/">Social Media and Online Anonymity during the
Arab Spring</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Jun 19</td>
<td>Nieman Journalism Lab</td>
<td><a
@@ -1586,7 +1586,7 @@ href="http://www.poynter.org/latest-news/top-stories/177642/news-
challenge-funds-6-projects-focused-on-networks/">News Challenge funds 6
projects focused on networks</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Jun 18</td>
<td>Knight Foundation</td>
<td><a href="http://www.knightfoundation.org/grants/20121802/">Knight
@@ -1600,7 +1600,7 @@ online.</td>
<td><a href="http://www.bbc.co.uk/news/technology-18461292">Ethiopia
clamps down on Skype and other internet use on Tor</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Apr 30</td>
<td>Forbes</td>
<td><a
@@ -1616,7 +1616,7 @@ href="http://www.guardian.co.uk/technology/2012/apr/20/hacktivists-
battle-internet">Hacktivists in the frontline battle for the
internet</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Apr 19</td>
<td>The Guardian</td>
<td><a
@@ -1632,7 +1632,7 @@ href="http://www.v3.co.uk/v3-uk/news/2165733/swedish-researchers-uncover
-key-chinas-tor-blocking">Swedish researchers uncover key to China's
Tor-blocking system</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Apr 02</td>
<td>The Guardian</td>
<td><a
@@ -1648,7 +1648,7 @@ href="http://www.reuters.com/article/2012/03/22/us-iran-telecoms-
idUSBRE82L0B820120322">Special Report: Chinese firm helps Iran spy on
citizens</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Mar 08</td>
<td>Boston Globe</td>
<td><a
@@ -1665,7 +1665,7 @@ privacy-policy-what-has-changed-and-what-you-can-do-about-it.ars">
Google's new privacy policy: what has changed and what you can do about
it</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Mar 01</td>
<td>Edmonton Journal</td>
<td><a
@@ -1680,7 +1680,7 @@ href="https://www.pcworld.com/article/250943/
https_everywhere_update_now_reports_website_weaknesses.html">HTTPS
Everywhere Update: Now Reports Website Weaknesses</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Feb 27</td>
<td>GigaOM</td>
<td><a
@@ -1695,7 +1695,7 @@ href="http://www.lemonde.fr/technologies/article/2012/02/15/un-nouvel-
outil-contre-la-cyber-censure-teste-en-iran_1643731_651865.html">Un
nouvel outil contre la cybercensure testé en Iran</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Feb 13</td>
<td>IDG NL webwereld</td>
<td><a
@@ -1711,7 +1711,7 @@ project-helps-iran-get-back-online-amidst-internet-censorship-regime.
ars">Tor's latest project helps Iran get back online despite new
Internet censorship regime</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Feb 13</td>
<td>Radio Farda</td>
<td><a
@@ -1727,7 +1727,7 @@ f3_tor_goes_to_war_against_filtering_with_new_project/24482355.html">
href="http://www.itp.net/587901-iran-increases-web-censorship">Iran
increases web censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Feb 10</td>
<td>CNet News</td>
<td><a
@@ -1741,7 +1741,7 @@ looks to help Iranians sidestep Net ban</a></td>
<td><a href="http://www.linkiesta.it/hacker-iran-internet">Contro i
dissidenti in Internet, la guerra in Iran è già iniziata</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Feb 10</td>
<td>Forbes</td>
<td><a
@@ -1757,7 +1757,7 @@ Connections</a></td>
href="http://www.pcpro.co.uk/news/372391/o2-plays-down-accusations-of-
tor-censorship">O2 plays down accusations of Tor censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2012 Jan 24</td>
<td>Broadband Choice UK</td>
<td><a
@@ -1772,7 +1772,7 @@ providers are blocking Tor</a></td>
href="http://www.pcwelt.de/news/SSL-Verschluesselung-HTTPS-Everywhere-in
-neuer-Version-4631953.html">HTTPS Everywhere in neuer Version</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Dec 30</td>
<td>BNR Digital</td>
<td><a
@@ -1786,7 +1786,7 @@ Tor wordt gecensureerd</a></td>
<td><a href="http://www.dw-world.de/dw/article/0,,6690047,00.html">Mit
dem Zensor Katz-und-Maus spielen</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Dec 29</td>
<td>Boing Boing</td>
<td><a
@@ -1802,7 +1802,7 @@ are on the repressive governments' side)</a></td>
href="http://www.zdnetasia.com/tor-project-creates-safer-internet-
62303332.htm">Tor Project creates safer Internet</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Dec 01</td>
<td>itbusiness.ca</td>
<td><a
@@ -1817,7 +1817,7 @@ say</a></td>
href="http://www.spiegel.de/netzwelt/web/0,1518,798977,00.html">Chinas
Internet-Zensoren testen neue Filter</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Nov 20</td>
<td>China Digital Times</td>
<td><a
@@ -1833,7 +1833,7 @@ Binxing Talks Internet Sovereignty</a></td>
href="http://www.itsecurity.be/tor-project-is-tapping-amazons-ec2-cloud-
service">Tor Project is tapping Amazonâ??s EC2 cloud service</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Nov 22</td>
<td>Boing Boing</td>
<td><a
@@ -1847,7 +1847,7 @@ Amazon's cloud</a></td>
<td><a href="http://www.dagensit.no/article2272736.ece">Tetter hullene i
den kinesiske internett-muren</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Nov 16</td>
<td>Forbes</td>
<td><a
@@ -1870,7 +1870,7 @@ privacy bridge in Amazon cloud</a></td>
href="<page press/2011-08-28-tor-022-stable>">new stable release</a> of
the Tor software.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 Aug 22</td>
<td>VOA News: Asia</td>
<td><a
@@ -1886,7 +1886,7 @@ href="http://www.monitor.upeace.org/innerpg.cfm?id_article=816">Tor,
Anonymity, and the Arab Spring: An Interview with Jacob
Appelbaum</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 June 18</td>
<td>CNN: Tech</td>
<td><a
@@ -1902,7 +1902,7 @@ href="http://www.cnn.com/2011/TECH/web/06/11/hiding.online.identity/
index.html">Wiping
away whistle-blowers' online fingerprints</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 May 14</td>
<td>BBC: Click</td>
<td><a
@@ -1919,7 +1919,7 @@ networked society.</a></td>
featured in a segment about US companies providing censorship to
repressive regimes and those circumventing their products.</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 March 18</td>
<td>Telegraph</td>
<td><a
@@ -1935,7 +1935,7 @@ href="http://www.businessweek.com/magazine/content/11_13/b4221043353206.
htm">Social
Networking: Fighting to Remain Anonymous</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 March 10</td>
<td>NyTeknik</td>
<td><a
@@ -1952,7 +1952,7 @@ AR2011030905157_pf.html">U.S.
funding tech firms that help Mideast dissidents evade government
censors</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 February 17</td>
<td>Walpole Times</td>
<td><a
@@ -1971,7 +1971,7 @@ Here
& Now: U.S. Activists Help Egyptian Protesters Elude Government
Censorship Online</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 February 01</td>
<td>Discovery News</td>
<td><a
@@ -1987,7 +1987,7 @@ href="http://www.idg.pl/news/366773/Egipt.blokuje.Internet.aktywisci.
szukaja.alternatyw.html">Egipt
blokuje Internet, aktywiÅ?ci szukajÄ? alternatyw</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 January 31</td>
<td>New Scientist</td>
<td><a
@@ -2003,7 +2003,7 @@ href="http://www.elpais.com/articulo/internacional/Sortear/censura/golpe
/fax/elpepuint/20110130elpepuint_14/Tes">Sortear
la censura a golpe de fax</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 January 30</td>
<td>Fox 25 News - Boston</td>
<td><a
@@ -2019,7 +2019,7 @@ href="http://www.necn.com/01/30/11/Mass-company-helps-activists-avoid-
onlin/landing.html?blockID=400628&feedID=4213">Mass.
company helps activists avoid online government censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 January 30</td>
<td>Boston Globe</td>
<td><a
@@ -2035,7 +2035,7 @@ href="http://www.svd.se/nyheter/utrikes/tor-oppnar-dorrar-for-
natdissidenter_5902693.svd">Tor
öppnar dörrar för nätdissidenter</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2011 January 29</td>
<td>ComputerWorld</td>
<td><a
@@ -2052,7 +2052,7 @@ href="https://www.theglobeandmail.com/news/technology/in-a-span-of-
minutes-a-country-goes-offline/article1887207/">In
a span of minutes, a country goes offline</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2010 December 22</td>
<td>Technology Review</td>
<td><a href="http://www.technologyreview.com/web/26981/">Home Internet
@@ -2066,14 +2066,14 @@ href="https://www.nytimes.com/2010/12/19/magazine/19FOB-Medium-t.html">
Granting
Anonymity</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2010 November 03</td>
<td>metro sverige</td>
<td><a
href="http://www.metro.se/2010/11/03/73897/sida-hjalper-utsatta-bli-
anonyma-pa-n/">Sida hjälper utsatta bli anonyma på nätet</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2010 Sept 17</td>
<td>NPR: On the media</td>
<td><a href="http://www.onthemedia.org/transcripts/2010/09/17/05">On the
@@ -2094,7 +2094,7 @@ href="http://www.pcformat.pl/index.php/artykul/aid/1236/t/google-
facebook-nas-szpieguj-jak-chroni-prywatno-w-sieci">Google
and Facebook are spying on us</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2010 July 14</td>
<td>China Rights Forum</td>
<td><a
@@ -2116,7 +2116,7 @@ Call to join Tor network to fight censorship</a></td>
<td>Tor and Printfection launch <a href="<page
press/2010-03-25-tor-store-press-release>">The Tor Store</a>.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2010 Mar 17</td>
<td>PC World Poland</td>
<td><a
@@ -2138,7 +2138,7 @@ href="http://www.pcpro.co.uk/features/356254/the-dark-side-of-the-web">
The dark
side of the web</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Dec 29</td>
<td>Times Online</td>
<td><a
@@ -2154,7 +2154,7 @@ Iranâ??s regime falls this will be remembered as the YouTube revolution
Cracks Down
on Tor Anonymity Network</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Sep 30</td>
<td>BusinessWeek</td>
<td><a
@@ -2170,7 +2170,7 @@ pageNumber=1&virtualBrandChannel=0&sp=true">Web tools help
protect human
rights activists</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Aug 10</td>
<td>Technology Review</td>
<td><a
@@ -2185,7 +2185,7 @@ href="http://www.washingtontimes.com/news/2009/jul/26/senate-help-iran-
dodge-internet-censorship/">Senate OKs funds to thwart Iran Web
censors</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jul 26</td>
<td>Boston Globe</td>
<td><a
@@ -2203,14 +2203,14 @@ p6Iy3sWHK8BRR58npGosLC3AD99L01QO0">Iran activists work to elude
crackdown on
Internet</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jul 08</td>
<td>Tehran Bureau</td>
<td><a
href="http://tehranbureau.com/geeks-globe-rally-iranians-online/">Geeks
Around the Globe Rally to Help Iranians Online</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jul 02</td>
<td>NED/CIMA</td>
<td><a href="http://cima.ned.org/events/new-media-in-iran.html">The Role
@@ -2225,7 +2225,7 @@ navy-technology-to-avoid-censorship/?feat=home_headlines">Iranian
protesters avoid
censorship with Navy technology</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jun 29</td>
<td>EFF</td>
<td><a
@@ -2240,7 +2240,7 @@ Relay</a></td>
href="http://www.dailyfinance.com/2009/06/24/nokia-and-siemens-in-iran-
controversy/">Nokia and Siemens in Iran controversy</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jun 18</td>
<td>Wall Street Journal</td>
<td><a
@@ -2257,7 +2257,7 @@ Dramatic Increase in Number of Tor Clients from Iran: Interview with Tor
Project
and the EFF</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jun 18</td>
<td>Deutsche Welle</td>
<td><a
@@ -2270,7 +2270,7 @@ proxies let Iranians and others connect to blocked Web sites</a></td>
<td><a href="http://www.technologyreview.com/web/22893/">The Web vs. the
Republic of Iran</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Jun 17</td>
<td>CNet News</td>
<td><a
@@ -2286,7 +2286,7 @@ viewArticleBasic&articleId=9134471&intsrc=news_ts_head">Iran's
leaders fight Internet;
Internet wins (so far)</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 May 29</td>
<td>Le Monde</td>
<td><a
@@ -2301,7 +2301,7 @@ href="http://www.masshightech.com/stories/2009/05/11/newscolumn2-Tor-
tackles-Net-privacy-game-makers-flock-to-Hub.html">Tor tackles Net
privacy</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 May 01</td>
<td>New York Times</td>
<td><a
@@ -2317,7 +2317,7 @@ href="http://www.technologyreview.com/computing/22427/?a=f">Dissent Made
Safer: How anonymity technology could save free speech on the
Internet.</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Apr 22</td>
<td>Le Monde</td>
<td><a
@@ -2337,7 +2337,7 @@ article122219.html">How to Hide Anything</a></td>
<td><a href="http://www.youtube.com/watch?v=vuatxUN2cUQ">Global Village
Voices showcases Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Mar 18</td>
<td>Marie Claire</td>
<td><a
@@ -2358,7 +2358,7 @@ Kindness of Strangers</a></td>
press/2009-03-12-performance-roadmap-press-release>">performance
roadmap</a> and campaign.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Mar 12</td>
<td>BBC World Service</td>
<td><a
@@ -2366,7 +2366,7 @@ href="http://bbcworldservicetrust.wordpress.com/2009/03/12/12-march-
world-day-against-cyber-censorship/">Steven J Murdoch interviewed about
Tor and Censorship</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2009 Mar 03</td>
<td>Orf Austria</td>
<td><a
@@ -2386,7 +2386,7 @@ not-found-routine">The old fake "404 not found" routine</a></td>
<td><a href="http://www.hearsayculture.com/?p=307">Hearsay Culture Radio
Interview/Podcast</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Dec 29</td>
<td>nu.nl</td>
<td><a
@@ -2400,7 +2400,7 @@ maak.html">Anoniem browsen voor gsm in de maak</a></td>
<td>Tor announces 3-year <a href="<page
press/2008-12-19-roadmap-press-release>">development roadmap</a>.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Dec 14</td>
<td>PC Magazine: Middle & Near East</td>
<td><a
@@ -2415,7 +2415,7 @@ href="http://www.cnn.com/2008/TECH/08/21/internet.filtering/index.html">
Experts:
Internet filtering and censorship rife</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Aug 22</td>
<td>The Sydney Morning Herald</td>
<td><a
@@ -2431,7 +2431,7 @@ href="http://www.sciam.com/article.cfm?id=cryptography-how-to-keep-your-
secrets-safe">Cryptography:
How to Keep Your Secrets Safe</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Aug 05</td>
<td>Guardian UK</td>
<td><a
@@ -2451,7 +2451,7 @@ surfing
for the paranoid</a>
</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Aug 07</td>
<td>Spiegel</td>
<td><a
@@ -2468,7 +2468,7 @@ href="http://www.pcworld.com/article/149399-3/
Great, Free Privacy Downloads</a>. Tor is Number 1.
</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Aug 07</td>
<td>The Guardian UK</td>
<td><a
@@ -2496,7 +2496,7 @@ cfp08_navegacao_anonima_na_rede&more=1&c=1&tb=1&pb=1&
at Computers, Freedom, and Privacy 2008 Conference</a>
</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Mar 12</td>
<td>SearchSecurity.com</td>
<td><a
@@ -2517,7 +2517,7 @@ href="http://blog.wired.com/monkeybites/2008/02/how-to-set-up-a.html">
How To: Set Up Anonymous Browsing in 30 Seconds or Less</a>.
</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2008 Feb 01</td>
<td>PC World</td>
<td><a
@@ -2531,7 +2531,7 @@ href="<blog>media-coverage-%2526quot%3Bcovert-channel-vulnerabilities-
anonymity-systems%2526quot%3B">
responds on the Tor Blog</a>.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2007 Sep 21</td>
<td>Wired HowTo Blog</td>
<td><a
@@ -2555,7 +2555,7 @@ href="<page eff/tor-legal-faq>"> Legal FAQ for Tor Relay Operators</a>
with advice on how to handle such issues if you are operating a Tor
relay.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2007 Sep 10</td>
<td>Wired</td>
<td> <a
@@ -2605,7 +2605,7 @@ href="http://ddanchev.blogspot.com/2007/07/cyber-jihadists-and-tor.html"
ostensibly for jihadists. Make sure to read Shava Nerad's reply at the
bottom of the article.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2007 Jun 22</td>
<td>Bangkok Post</td>
<td> <a
@@ -2623,7 +2623,7 @@ href="http://2007.sxsw.com/interactive/programming/panels/?action=show&
amp;id=IAP060124"> SXSW panel</a>, where she explained how Tor can help
bloggers.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2007 Mar 8</td>
<td>Security Focus</td>
<td><a href="http://www.securityfocus.com/news/11447/1"> Tor hack
@@ -2638,7 +2638,7 @@ illustrating why this approach may not be a good idea.</td>
Protects Anonymous Sources</a>. An introduction to Tor, including
technical and historical background. </td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Oct 19</td>
<td>Wired Threat Level</td>
<td><a
@@ -2658,7 +2658,7 @@ Tips for Protecting Privacy Online</a>. Kevin Bankston of the EFF
recommends Tor during an NPR interview. Tor information begins at 8:15
into the program.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Jul 5</td>
<td>MSNBC</td>
<td><a href="http://www.msnbc.msn.com/id/13718446/page/2/"> Defending
@@ -2671,7 +2671,7 @@ of its significant nonlitigation projects.</td>
href="http://pbs.gen.in/wgbh/pages/frontline/tankman/internet/tech.html"
>Chipping Away at China's Great Firewall</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Feb 28</td>
<td>PC World</td>
<td><a
@@ -2685,7 +2685,7 @@ Outsmarting the Online Privacy Snoops</a></td>
Cracks In the Wall</a>. Discussion of Tor being used for evading
censorship by repressive governments.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Feb 20</td>
<td>The Boston Globe</td>
<td><a href="http://members.forbes.com/global/2006/0227/018A_2.html">
@@ -2700,7 +2700,7 @@ shtml?source=search_story"> Cracking The 'Great Firewall Of China'</a>.
Roger Dingledine appeared on the show to discuss Tor, starting at 1:04
into the video.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Feb 15</td>
<td>CNBC - Closing Bell</td>
<td>TV Appearance by Roger Dingledine at 4:25pm. (no link)</td>
@@ -2713,7 +2713,7 @@ href="http://www.network-secure.de/index.php?option=com_content&task
=view&id=3909">Tor: Anonymisierungswerkzeug entwickelt</a>
(German)</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Feb 13</td>
<td>Wall Street Journal</td>
<td><a href="http://online.wsj.com/article/SB113979965346572150.html">
@@ -2729,7 +2729,7 @@ href="http://yaleglobal.yale.edu/display.article?id=6981">here</a>.</td>
href="http://www.technologyreview.com/Infotech/16216/page2/">Evading the
Google Eye</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Jan 29</td>
<td>New York Times</td>
<td><a
@@ -2760,7 +2760,7 @@ href="http://xeni.net/">Xeni Jardin</a> recommends Tor at 33:30 into the
program.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Feb 15</td>
<td>Punto Informatico</td>
<td><a href="http://punto-informatico.it/p.aspx?i=1430903"> TOR c'è</a>
@@ -2775,7 +2775,7 @@ href="http://www.wired.com/science/discoveries/news/2006/01/70051?
currentPage=2"> How to Foil Search Engine Snoops</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2006 Jan 20</td>
<td>NPR</td>
<td><a
@@ -2790,14 +2790,14 @@ Google Records Subpoena Raises Privacy Fears</a></td>
href="http://www.vivaolinux.com.br/artigos/verArtigo.php?codigo=2759">
TOR: A Internet sem rastreabilidade</a> (Portuguese)</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 Aug 6</td>
<td>New Scientist</td>
<td><a
href="http://www.eurekalert.org/pub_releases/2005-08/ns-wwa080305.php">
Why we all need pornography</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 Jul 12</td>
<td>IEEE Computer Society's Technical Committee on Security and
Privacy</td>
@@ -2814,7 +2814,7 @@ html#TOR"> Onion routing application Tor makes PCWorld's top
Watch: Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 Jun 10</td>
<td>The New Zealand Herald</td>
<td><a
@@ -2830,7 +2830,7 @@ href="http://www.publicradio.org/columns/futuretense/2005/06/08.shtml">
An Internet privacy tool called "Tor"</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 Jun 1</td>
<td>PC World</td>
<td><a
@@ -2845,7 +2845,7 @@ href="http://www.pcworld.com/article/id,120763-page,4/article.html"> The
Router (Tor)</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 May 22</td>
<td>Slashdot</td>
<td><a href="http://yro.slashdot.org/article.pl?sid=05/05/22/0113244">
@@ -2859,7 +2859,7 @@ Tor Anonymity Network Reaches 100 Verified Nodes</a></td>
анонимайзеÑ? длÑ? вÑ?еÑ? Ð?С</a> (Russian)</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 May 19</td>
<td>WebPlanet</td>
<td><a href="http://webplanet.ru/news/security/2005/5/19/tor.html"> Tor:
@@ -2876,7 +2876,7 @@ href="http://wiredvision.jp/archives/200505/2005051904.html">Japanese</a
>.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 May 17</td>
<td>XBiz</td>
<td><a href="http://xbiz.com/news/8761"> Navy Project Allows Anonymous
@@ -2890,7 +2890,7 @@ Browsing</a></td>
kafkaesken Schwinden der Anonymität</a> (German)</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 Apr 5</td>
<td>Libero</td>
<td><a
@@ -2905,7 +2905,7 @@ Anonimato on line, ecco Tor</a> (Italian)</td>
EFF Throws Support to 'Anonymous' Internet Project</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2005 Mar 31</td>
<td>Linux.com</td>
<td><a href="http://www.linux.com/articles/43713?tid=19&tid=78">
@@ -2920,7 +2920,7 @@ href="http://www.boingboing.net/2004/12/27/eff-helping-produce-.html">
EFF helping produce anonymizing software</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Dec 25</td>
<td>Kansas City infozine</td>
<td><a
@@ -2935,7 +2935,7 @@ EFF Joins Forces with Tor Software Project</a></td>
Anonymisierer Tor</a> (German)</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Dec 23</td>
<td>SuicideGirls</td>
<td><a href="http://suicidegirls.com/news/technology/6150/"> New Routing
@@ -2948,7 +2948,7 @@ Software Allows Anonymous Internet Use</a></td>
<td><a href="http://p2pnet.net/story/3357"> EFF to sponsor Tor</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Dec 22</td>
<td>Slashdot</td>
<td><a
@@ -2964,7 +2964,7 @@ Tor</a></td>
Traffic</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Aug 30</td>
<td>Newsweek</td>
<td><a
@@ -2980,7 +2980,7 @@ href="http://www.eweek.com/c/a/Security/Dont-Fear-Internet-Anonymity-
Tools/"> Don't Fear Internet Anonymity Tools</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Aug 6</td>
<td>HCC magazine</td>
<td><a href="http://www.hcc.nl/eCache/DEF/21/083.html"> Anoniem surfen
@@ -2994,7 +2994,7 @@ met hulp van marine VS</a> (Dutch)</td>
nutzt Onion-Routing</a></td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Aug 5</td>
<td>Network World Security</td>
<td><a href="http://www.networkworld.com/details/7088.html"> Onion
@@ -3010,7 +3010,7 @@ href="http://hotwired.goo.ne.jp/news/news/technology/story/20040806301.
html">Japanese</a>.</td>
</tr>
-<tr style="background-color: #e5e5e5;">
+<tr>
<td>2004 Mar 8</td>
<td>CNET Japan blog</td>
<td><a
_______________________________________________
tor-commits mailing list
tor-commits@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-commits