<div class="entry">
<div class="title">Always download Debian packages using Tor - the simple recipe</div>
<div class="date">15th January 2016</div>
- <div class="body"><p>During his DebConf15 keynote, Jacob Applebaum
+ <div class="body"><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
<link>http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</link>
<guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</guid>
<pubDate>Fri, 15 Jan 2016 00:30:00 +0100</pubDate>
- <description><p>During his DebConf15 keynote, Jacob Applebaum
+ <description><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
15th January 2016
</div>
<div class="body">
- <p>During his DebConf15 keynote, Jacob Applebaum
+ <p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
<div class="entry">
<div class="title"><a href="http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html">Always download Debian packages using Tor - the simple recipe</a></div>
<div class="date">15th January 2016</div>
- <div class="body"><p>During his DebConf15 keynote, Jacob Applebaum
+ <div class="body"><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
<link>http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</link>
<guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</guid>
<pubDate>Fri, 15 Jan 2016 00:30:00 +0100</pubDate>
- <description><p>During his DebConf15 keynote, Jacob Applebaum
+ <description><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
<link>http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</link>
<guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</guid>
<pubDate>Fri, 15 Jan 2016 00:30:00 +0100</pubDate>
- <description><p>During his DebConf15 keynote, Jacob Applebaum
+ <description><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
15th January 2016
</div>
<div class="body">
- <p>During his DebConf15 keynote, Jacob Applebaum
+ <p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
<link>http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</link>
<guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</guid>
<pubDate>Fri, 15 Jan 2016 00:30:00 +0100</pubDate>
- <description><p>During his DebConf15 keynote, Jacob Applebaum
+ <description><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
15th January 2016
</div>
<div class="body">
- <p>During his DebConf15 keynote, Jacob Applebaum
+ <p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
15th January 2016
</div>
<div class="body">
- <p>During his DebConf15 keynote, Jacob Applebaum
+ <p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a
<link>http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</link>
<guid isPermaLink="true">http://people.skolelinux.org/pere/blog/Always_download_Debian_packages_using_Tor___the_simple_recipe.html</guid>
<pubDate>Fri, 15 Jan 2016 00:30:00 +0100</pubDate>
- <description><p>During his DebConf15 keynote, Jacob Applebaum
+ <description><p>During his DebConf15 keynote, Jacob Appelbaum
<a href="https://summit.debconf.org/debconf15/meeting/331/what-is-to-be-done/">observed
that those listening on the Internet lines would have good reason to
believe a computer have a given security hole</a> if it download a