+
Date |
Publication |
Topic |
+
+2013 Dec 16 |
+PBS |
+Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists |
+
+
+2013 Dec 5 |
+Nieman Journalisim Lab |
+Freedom of the Press Foundation wants to help build secure communication tools for journalists |
+
+
+
+2013 Dec 2 |
+EFF |
+An Open Letter Urging Universities To Encourage Conversation About Online Privacy |
+
+
+2013 Nov 26 |
+TechRepublic |
+Get a grip on TOR with Vidalia |
+
+
+
+2013 Nov 20 |
+PBS |
+Getting to Know Tor, the Most Popular Anonymity Tool in the World |
+
+
+2013 Nov 10 |
+Politiken.dk |
+FAKTA: The Tor Project |
+
+
+
+2013 Nov 5 |
+The Guardian |
+What is Tor? A beginner's guide to the privacy tool |
+
+
+2013 Oct 25 |
+MIT Technology Review |
+Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance |
+
+
+
+2013 Oct 23 |
+Tom's Guide |
+What Is Tor? Answers to Frequently Asked Questions |
+
+
+2013 Oct 18 |
+Forbes |
+Taking Stock Of Tor: Top 5 Tips For Using The Onion Router |
+
+
+
+2013 Oct 10 |
+VentureBeat |
+TorSearch launches to be the Google of the hidden Internet |
+
+
+2013 Oct 8 |
+InformationWeek |
+NSA Battles Tor: 9 Facts |
+
+
+
+2013 Oct 8 |
+The Next Web |
+What is Tor and why does it matter? |
+
+
+2013 Oct 7 |
+Ars Technica |
+How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users |
+
+
+
+2013 Oct 7 |
+Infosecurity |
+How Does Law Enforcement 'Subvert' Tor? |
+
+
+2013 Oct 4 |
+Washington Post |
+Everything you need to know about the NSA and Tor in one FAQ |
+
+
+
+2013 Oct 4 |
+eWeek |
+Snowden Leaks Show NSA Targets Tor |
+
+
+2013 Oct 4 |
+The Guardian |
+Attacking Tor: how the NSA targets users' online anonymity |
+
+
+
+2013 Oct 4 |
+TIME |
+Docs Reveal NSA Campaign Against Anonymous Tor Network |
+
+
+2013 Oct 4 |
+ITProPortal |
+NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal |
+
+
+
+2013 Oct 4 |
+InfoWorld |
+The Tor teardown, brought to you by goats, giraffes, and Thor's hammer |
+
+
+2013 Oct 4 |
+Computerworld |
+Report: NSA has little success cracking Tor |
+
+
+
+2013 Oct 4 |
+Ars Technica |
+NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show |
+
+
+2013 Oct 4 |
+CNET |
+NSA sought to unmask users of Net-privacy tool Tor, says report |
+
+
+
+2013 Sep 16 |
+InformationWeek |
+FBI Admits To Tor Server Takeover |
+
+
+2013 Sep 16 |
+Techworld |
+Mevade botnet miscalculated effect on Tor network, says Damballa |
+
+
+
+2013 Sep 14 |
+Gizmodo |
+FBI Admits To Hacking Into The Tor Network |
+
+
+2013 Sep 13 |
+Wired |
+FBI Admits It Controlled Tor Servers Behind Mass Malware Attack |
+
+
+
+2013 Sep 11 |
+Infosecurity |
+Massive Botnet is Behind Tor Usage Spike |
+
+
+2013 Sep 11 |
+MIT Technology Review |
+Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic |
+
+
+
+2013 Sep 11 |
+Tom's Guide |
+Is Tor's Anonymous Internet Still Secure? |
+
+
+2013 Sep 9 |
+TechWeek Europe |
+Tor Network Spike Caused By Botnet |
+
+
+
+2013 Sep 5 |
+Gizmodo |
+The Anonymous Internet Is Under Attack |
+
+
+2013 Sep 4 |
+Stuff.co.nz |
+Is Tor right for you? |
+
+
+
+2013 Sep 3 |
+PC Advisor |
+Tor traffic doubles in a week to reach highest ever level |
+
+
+2013 Aug 29 |
+RT |
+Tor anonymity network membership has doubled since NSA leak |
+
+
+
+2013 Aug 6 |
+BBC |
+Users of hidden net advised to ditch Windows |
+
+
+2013 Aug 6 |
+ZDNet |
+Tor users advised to 'switch away from Windows' after malware attack |
+
+
+
+2013 Aug 5 |
+NBC |
+How anonymous? Tor users compromised in child porn takedown |
+
+
+2013 Aug 5 |
+Wired |
+Feds Are Suspects in New Malware That Attacks Tor Anonymity |
+
+
+
+2013 Aug 5 |
+Naked Security |
+Freedom Hosting arrest and takedown linked to Tor privacy compromise |
+
+
+2013 Jul 18 |
+Huffington Post |
+Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan |
+
+
+
+2013 Jul 18 |
+Gizmodo |
+The Technology You Need to Protect Against Mass Surveillance |
+
2013 Jul 01 |
Slice of MIT |
@@ -46,7 +282,17 @@ newest to oldest:
2013 Jun 26 |
Reason.com |
-Reason Interviews Karen Reilly of The Tor Project Regarding Online Privacy |
+Surf Without Surveillance: Tor's Karen Reilly |
+
+
+2013 Jun 22 |
+TribLIVE |
+Protesters, criminals get around government censors using secret Web network |
+
+
+2013 Jun 22 |
+TribLIVE |
+Hidden Web Tor helps average users and criminals avoid government snooping |
2013 Jun 21 |
@@ -54,15 +300,55 @@ newest to oldest:
NSA cramping your style? Use these easy encryption solutions |
+2013 Jun 19 |
+Help Net Security |
+Facebook once again accessible via Tor |
+
+
+2013 Jun 18 |
+The Register |
+Tor users locked out of Facebook after wave of dodgy traffic |
+
+
+2013 Jun 18 |
+TechWeek Europe |
+Facebook Blocks Tor Users After Heavy Malicious Activity |
+
+
2013 Jun 14 |
The Salt Lake Tribune |
Ideas for keeping your data safe from spying |
+
+2013 Jun 13 |
+Boston Globe |
+How to keep data away from prying eyes |
+
+2013 Jun 12 |
+Washington Post |
+Secrecy-focused Web services find a mainstream audience |
+
+
2013 Jun 11 |
Reflex (Czech) |
Privacy on the Internet already exists. But there's still Tor |
+
+2013 Jun 10 |
+Washington Post |
+Five ways to stop the NSA from spying on you |
+
+
+2013 Jun 8 |
+ZDNet |
+Ask a hacker: Top four anti-surveillance apps |
+
+
+2013 Jun 8 |
+The Hindu |
+Cryptography as a means to counter Internet censorship |
+
2013 Apr 23 |
The Verge |