This project is archived. Its data is read-only.
Add & update links on Press page
Add and update the following links on our press page: |Date|Publication|Topic| |----|-----------|-----| |2013 Jun 8|The Hindu|[Cryptography as a means to counter Internet censorship](http://www.thehindu.com/sci-tech/technology/internet/cryptography-as-a-means-to-counter-internet-censorship/article4772815.ece)| |2013 Jun 8|ZDNet|[Ask a hacker: Top four anti-surveillance apps](http://www.zdnet.com/ask-a-hacker-top-four-anti-surveillance-apps-7000016566/)| |2013 Jun 10|Washington Post|[Five ways to stop the NSA from spying on you](http://www.washingtonpost.com/blogs/wonkblog/wp/2013/06/10/five-ways-to-stop-the-nsa-from-spying-on-you/)| |2013 Jun 12|Washington Post|[Secrecy-focused Web services find a mainstream audience](http://www.washingtonpost.com/business/technology/secrecy-focused-web-services-find-a-mainstream-audience/2013/06/12/401c6256-d2a2-11e2-8cbe-1bcbee06f8f8_story.html)| |2013 Jun 13|Boston Globe|[How to keep data away from prying eyes](http://www.bostonglobe.com/business/2013/06/12/imperfect-privacy-better-than-none/DtKNAxrZjh2soMxZw27M0O/story.html)| |2013 Jun 18|TechWeek Europe|[Facebook Blocks Tor Users After Heavy Malicious Activity](http://www.techweekeurope.co.uk/news/facebook-bans-tor-anonymity-119413)| |2013 Jun 18|The Register|[Tor users locked out of Facebook after wave of dodgy traffic](http://www.theregister.co.uk/2013/06/18/facebook_blocks_tor_traffic_over_security/)| |2013 Jun 19|Help Net Security|[Facebook once again accessible via Tor](http://www.net-security.org/secworld.php?id=15098)| |2013 Jun 22|TribLIVE|[Hidden Web Tor helps average users and criminals avoid government snooping](http://triblive.com/news/allegheny/4191788-74/tor-computer-drugs)| |2013 Jun 22|TribLIVE|[Protesters, criminals get around government censors using secret Web network](http://triblive.com/news/allegheny/4191790-74/tor-network-government)| |2013 Jun 26|Reason.com|[Surf Without Surveillance: Tor's Karen Reilly](http://reason.com/reasontv/2013/06/26/surf-without-surveillance-tors-karen-rei)| |2013 Jul 18|Gizmodo|[The Technology You Need to Protect Against Mass Surveillance](http://gizmodo.com/the-technology-you-need-to-protect-against-mass-surveil-823081362)| |2013 Jul 18|Huffington Post|[Meet Tor, The Military-Made Privacy Network That Counts Edward Snowden As A Fan](http://www.huffingtonpost.com/2013/07/18/tor-snowden_n_3610370.html)| |2013 Aug 5|Naked Security|[Freedom Hosting arrest and takedown linked to Tor privacy compromise](http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/)| |2013 Aug 5|Wired|[Feds Are Suspects in New Malware That Attacks Tor Anonymity](http://www.wired.com/threatlevel/2013/08/freedom-hosting/)| |2013 Aug 5|NBC|[How anonymous? Tor users compromised in child porn takedown](http://www.nbcnews.com/technology/how-anonymous-tor-users-compromised-child-porn-takedown-6C10848680)| |2013 Aug 6|ZDNet|[Tor users advised to 'switch away from Windows' after malware attack](http://www.zdnet.com/tor-users-advised-to-switch-away-from-windows-after-malware-attack-7000019047/)| |2013 Aug 6|BBC|[Users of hidden net advised to ditch Windows](http://www.bbc.co.uk/news/technology-23587620)| |2013 Aug 29|RT|[Tor anonymity network membership has doubled since NSA leak](http://rt.com/usa/tor-membership-doubled-nsa-137/)| |2013 Sep 3|PC Advisor|[Tor traffic doubles in a week to reach highest ever level](http://www.pcadvisor.co.uk/news/security/3466718/tor-traffic-doubles-in-a-week-to-reach-highest-ever-level/)| |2013 Sep 4|Stuff.co.nz|[Is Tor right for you?](http://www.stuff.co.nz/technology/digital-living/9120947/Is-Tor-right-for-you)| |2013 Sep 5|Gizmodo|[The Anonymous Internet Is Under Attack](http://gizmodo.com/the-anonymous-internet-is-under-attack-1257343241)| |2013 Sep 9|TechWeek Europe|[Tor Network Spike Caused By Botnet](http://www.techweekeurope.co.uk/news/mevade-botnet-tor-network-126497)| |2013 Sep 11|Tom's Guide|[Is Tor's Anonymous Internet Still Secure?](http://www.tomsguide.com/us/tor-encryption-cracked-nsa,news-17530.html)| |2013 Sep 11|MIT Technology Review|[Security Flaw Shows Tor Anonymity Network Dominated by Botnet Command and Control Traffic](http://www.technologyreview.com/view/519186/security-flaw-shows-tor-anonymity-network-dominated-by-botnet-command-and-control/)| |2013 Sep 11|Infosecurity|[Massive Botnet is Behind Tor Usage Spike](http://www.infosecurity-magazine.com/view/34453/massive-botnet-is-behind-tor-usage-spike-/)| |2013 Sep 13|Wired|[FBI Admits It Controlled Tor Servers Behind Mass Malware Attack](http://www.wired.com/threatlevel/2013/09/freedom-hosting-fbi/)| |2013 Sep 14|Gizmodo|[FBI Admits To Hacking Into The Tor Network](http://www.gizmodo.com.au/2013/09/the-fbi-just-admitted-to-hacking-into-the-tor-network/)| |2013 Sep 16|Techworld|[Mevade botnet miscalculated effect on Tor network, says Damballa](http://news.techworld.com/security/3468988/mevade-botnet-miscalculated-effect-on-tor-network-says-damballa/)| |2013 Sep 16|InformationWeek|[FBI Admits To Tor Server Takeover](http://www.informationweek.com/security/risk-management/fbi-admits-to-tor-server-takeover/d/d-id/1111553)| |2013 Oct 4|CNET|[NSA sought to unmask users of Net-privacy tool Tor, says report](http://news.cnet.com/8301-13578_3-57606133-38/nsa-sought-to-unmask-users-of-net-privacy-tool-tor-says-report/)| |2013 Oct 4|Ars Technica|[NSA repeatedly tries to unpeel Tor anonymity and spy on users, memos show](http://arstechnica.com/security/2013/10/nsa-repeatedly-tries-to-unpeel-tor-anonymity-and-spy-on-users-memos-show/)| |2013 Oct 4|Computerworld|[Report: NSA has little success cracking Tor](http://www.computerworld.com/s/article/9242992/Report_NSA_has_little_success_cracking_Tor?taxonomyId=13)| |2013 Oct 4|InfoWorld|[The Tor teardown, brought to you by goats, giraffes, and Thor's hammer](http://www.infoworld.com/t/cringely/the-tor-teardown-brought-you-goats-giraffes-and-thors-hammer-228244)| |2013 Oct 4|ITProPortal|[NSA and GCHQ repeatedly tried to infiltrate Tor, documents reveal](http://www.itproportal.com/2013/10/04/nsa-and-gchq-repeatedly-tried-infiltrate-tor-documents-reveal/)| |2013 Oct 4|TIME|[Docs Reveal NSA Campaign Against Anonymous Tor Network](http://techland.time.com/2013/10/04/docs-reveal-nsa-campaign-against-anonymous-tor-network/)| |2013 Oct 4|The Guardian|[Attacking Tor: how the NSA targets users' online anonymity](http://www.theguardian.com/world/2013/oct/04/tor-attacks-nsa-users-online-anonymity)| |2013 Oct 4|eWeek|[Snowden Leaks Show NSA Targets Tor](http://www.eweek.com/security/snowden-leaks-show-nsa-targets-tor.html/)| |2013 Oct 4|Washington Post|[Everything you need to know about the NSA and Tor in one FAQ](http://www.washingtonpost.com/blogs/the-switch/wp/2013/10/04/everything-you-need-to-know-about-the-nsa-and-tor-in-one-faq/)| |2013 Oct 7|Infosecurity|[How Does Law Enforcement 'Subvert' Tor?](http://www.infosecurity-magazine.com/view/34898/how-does-law-enforcement-subvert-tor)| |2013 Oct 7|Ars Technica|[How the NSA might use Hotmail, Yahoo or other cookies to identify Tor users](http://arstechnica.com/security/2013/10/how-the-nsa-might-use-hotmail-or-yahoo-cookies-to-identify-tor-users/)| |2013 Oct 8|The Next Web|[What is Tor and why does it matter?](http://thenextweb.com/insider/2013/10/08/what-is-tor-and-why-does-it-matter/)| |2013 Oct 8|InformationWeek|[NSA Battles Tor: 9 Facts](http://www.informationweek.com/traffic-management/nsa-battles-tor-9-facts/d/d-id/1111857)| |2013 Oct 10|VentureBeat|[TorSearch launches to be the Google of the hidden Internet](http://venturebeat.com/2013/10/10/torsearch-launches-to-be-the-google-of-the-hidden-internet/)| |2013 Oct 18|Forbes|[Taking Stock Of Tor: Top 5 Tips For Using The Onion Router](http://www.forbes.com/sites/rajsabhlok/2013/10/18/taking-stock-of-tor-top-5-tips-for-using-the-onion-router/)| |2013 Oct 23|Tom's Guide|[What Is Tor? Answers to Frequently Asked Questions](http://www.tomsguide.com/us/what-is-tor-faq,news-17754.html)| |2013 Oct 25|MIT Technology Review|[Anonymity Network Tor Needs a Tune-up to Protect Users from Surveillance](http://www.technologyreview.com/news/520141/anonymity-network-tor-needs-a-tune-up-to-protect-users-from-surveillance/)| |2013 Nov 5|The Guardian|[What is Tor? A beginner's guide to the privacy tool](http://www.theguardian.com/technology/2013/nov/05/tor-beginners-guide-nsa-browser)| |2013 Nov 10|Politiken.dk|[FAKTA: The Tor Project](http://politiken.dk/indland/ECE2127879/fakta-the-tor-project/)| |2013 Nov 20|PBS|[Getting to Know Tor, the Most Popular Anonymity Tool in the World](http://www.pbs.org/idealab/2013/11/getting-to-know-tor-the-most-popular-anonymity-tool-in-the-world/)| |2013 Nov 26|TechRepublic|[Get a grip on TOR with Vidalia](http://www.techrepublic.com/blog/linux-and-open-source/get-a-grip-on-tor-with-vidalia/)| |2013 Dec 2|EFF|[An Open Letter Urging Universities To Encourage Conversation About Online Privacy](https://www.eff.org/deeplinks/2013/12/open-letter-urging-universities-encourage-conversation-about-online-privacy)| |2013 Dec 5|Nieman Journalisim Lab|[Freedom of the Press Foundation wants to help build secure communication tools for journalists](http://www.niemanlab.org/2013/12/91274/)| |2013 Dec 16|PBS|[Freedom of the Press Foundation Steps Up Encryption Efforts for Journalists](http://www.pbs.org/mediashift/2013/12/freedom-of-the-press-foundation-steps-up-encryption-efforts-for-journalists/)|
issue