Updates from the Tor Project

Tor Project blog Official channel for news and updates from the Tor Project

  • Memory quota tracking in Arti, for Onion Service DoS resistance
    by Diziet on November 19, 2024 at 12:00 am

    Last week we released Arti 1.3.0, the latest version of our rewrite of Tor in Rust. One new feature in this release is memory quota tracking. Tracking and restricting memory for queued data The memory quota tracking feature allows you to restrict the amount of memory used by an Arti process. In particular, it allows you to limit the amount of memory that other people can cause your Arti to use. This is particularly important when Arti is being used to provide an Onion Service (aka a Tor Hidden Service). Running an Onion Service means letting users from all over the network connect to your service (depending, to an extent, on your configuration settings). That means those users can cause your system to do work, and, generally, to store data in transit to and from your Onion Service. In 2014, Jansen et al discovered that this kind of data storage can even be used to help deanonymise your service. We have now implemented the recommended countermeasure: Arti can track how much data is stored in its various queues. When the configured limit is reached, Arti starts shutting down connections, and discarding data, until the queued data is below the limit. We kill the connections with the oldest oustanding data. This minimises the impact on unrelated, innocent, traffic. We’ll also need this memory limit feature for Arti Relay, which is currently being developed. Configuration In Arti, the memory quota tracker is controlled by the [system.memory] configuration subsection in arti.toml. You can enable it by writing something like this: [system] memory.max = “1 GiB” The feature is compiled in by default. Setting the limit for the first time requires an Arti restart. After that, adjusting (or removing) the limit can be done at runtime. There is also a memory.low_water setting: When Arti needs to free memory because max is exceeded, it keeps tearing down connections until the usage is below low_water. This hysteresis helps stop the system oscillating. The defaualt value of low_water is 75% of max. (Note that unlike C Tor’s MaxMemInQueues setting, the current default in Arti is not to enable a memory limit. In Arti you must turn on the feature explicitly, by setting max. We hope to get more experience of how it works for users in practice, before we consider whether to enable a limit by default.) Logging After you’ve enabled memory quota tracking, you should see Arti print a log message like this: 2024-10-31T16:55:55Z INFO tor_memquota::mtracker: memory quota tracking initialised max=1.00 GiB low_water=768 MiB You can tell if memory reclaim has been triggered: 2024-10-31T17:22:19Z INFO tor_memquota::mtracker::reclaim: memory tracking: 1.86 GiB > 1.00 GiB, reclamation started (target 768 MiB) … 2024-10-31T17:22:20Z INFO tor_memquota::mtracker::reclaim: memory tracking reclamation reached: 44.3 KiB (target 768 MiB): complete Caution: very new code! This is a very new feature. There is a lot of complexity behind the scenes, and by its nature it is difficult to do a full-scale integration test. It is quite possible that there are bugs! We’d like to hear your feedback, when you enable this feature. You can report issues you discover in our gitlab (also available via an anonymous ticket reporting system). You can also contact us informally by email, or on irc: we’re in #tor-dev on OFTC. Thanks to our sponsors Thanks to Zcash Community Grants for their funding, which enabled the development of this feature, and of course to our other sponsors for funding the development of Arti. onion-services relays

  • New Release: Tor Browser 14.0.2
    by morgan on November 13, 2024 at 12:00 am

    Tor Browser 14.0.2 is now available from the Tor Browser download page and also from our distribution directory. This version fixes a tor crash bug on macOS when attempting to visit onion sites with PoW protections enabled (tor-browser#43245) Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 14.0.1 is: All Platforms Updated NoScript to 11.5.2 Bug tor-browser#43257: NoScript-blocked content placeholders causing slow downs Windows + macOS + Linux Bug tor-browser#32668: NoScript default whitelist re-appears on clicking NoScript Options / Reset Bug tor-browser#43258: NoScript Lifecycle error on extension updates Bug tor-browser#43262: Onion keys dialog. “Remove” removes all keys, “Remove all” does nothing. macOS Bug tor-browser#43245: TB14 on macOS crashing when visiting some onionsites Build System All Platforms Updated Go to 1.22.9 Windows + macOS + Linux Bug tor-browser-build#41286: Update the deploy update scripts to optinally take an override hash applications releases

  • Defending the Tor network: Mitigating IP spoofing against Tor
    by gus on November 8, 2024 at 12:00 am

    At the end of October, Tor directory authorities, relay operators, and even the Tor Project sysadmin team received multiple abuse complaints from their providers about port scanning. These complaints were traced back to a coordinated IP spoofing attack, where an attacker spoofed non-exit relays and other Tor-related IPs to trigger abuse reports aimed at disrupting the Tor Project and the Tor network. Thanks to a joint effort from the Tor community, InterSecLab, and the support of Andrew Morris and the team at GreyNoise, the origin of these spoofed packets was identified and shut down on November 7th, 2024. We want to reassure everyone that this incident had no effect on Tor users. While the attack had a limited impact on the Tor network – taking a few relays offline temporarily – it caused unnecessary stress and inconvenience for many relay operators who had to address these complaints. Although this attack targeted our community, IP spoofing attacks can happen with any online service. There’s still work ahead: we need to support relay operators in getting their accounts reinstated and assist providers in unblocking IPs for Tor directory authorities. Hosting providers and abuse complaints If you are a relay operator whose hosting provider is still blocking or has suspended your relay due to these complaints, here are steps you can take to resolve the issue: Check Tor directory authorities reachability from your relay: If you suspect your provider has blocked Tor access — i.e., because your relay dropped from the Tor consensus –, use OONI Probe and “Circumvention” test to check the reachability of Tor directory authorities. If the test shows that most directory authorities are reachable, your relay will successfully (re-)connect to the Tor network. If Tor directory authorities are still blocked, please contact your hosting provider support and share this blog post. Reply to your hosting company: If you got contacted by your provider due to the abuse complaints, share this blog post to help them understand the incident and clarify that your Tor relay was targeted by a spoofing attack, and is NOT originating any suspicious traffic. You can adapt and use this template about abuse complaints. Community strength and collaboration This incident has demonstrated the resilience and collaborative spirit of the Tor relay operator community. Over the past days, we’ve seen many instances of good collaboration to defend the Tor network: analysis, investigation, and knowledge sharing. Relay operators worked together to troubleshoot issues, support each other over email and chat, and keep relays online. We encourage relay operators to stay connected and informed through our official community channels and participate in our monthly relay operator meetups. Thank you to every relay operator for your ongoing efforts to run relays, protect online privacy, and support the Tor Project! <3 Background: What happened? On October 20, Tor directory authorities began receiving abuse complaints claiming that their servers were engaged in unauthorized port scans. In the Tor network, directory authorities play a critical role in maintaining the list of available relays. This attack focused on non-exit relays, using spoofed SYN packets to make it appear that Tor relay IP addresses were the sources of these scans. This led to automated abuse complaints directed at data centers such as OVH, Hetzner, and other providers. The attacker’s intent seems to have been to disrupt the Tor network and the Tor Project by getting these IPs on blocklists with these unfounded complaints. Pierre Bourdon, a relay operator, shared insights into the attack in his post, “One weird trick to get the whole planet to send abuse complaints to your best friend(s)”, which sheds light on how the attacker used spoofed IP packets to trigger automated abuse complaints across the network. A huge thank you to Pierre for his detailed analysis and for sharing his findings with the community! While we received support from many individuals and organizations during this incident, we also experienced instances of unprofessional conduct, where a the refusal to investigate and lack of diligence inadvertently amplified the impact of this attack. Much of the reporting on this fake abuse attack comes from watchdogcyberdefense[.]com and we endorse the calls within the cybersecurity community to treat these reports with caution. For a more detailed discussion, please refer to our public ticket on the issue and our mailing list. While spoofing activity is not specific to Tor, it’s concerning that someone would choose to deliberately disrupt a service that is essential for people experiencing digital surveillance and internet censorship. Tor plays a critical role in supporting freedom of access and expression globally, and targeting it undermines these fundamental rights. We are grateful for the resilience and dedication of our relay operator community, whose collective efforts ensure the strength of Tor’s decentralized network. community network relays

  • Get the latest from Tor, join us for State of the Onion 2024
    by pavel on November 7, 2024 at 12:00 am

    Get ready for the 2024 recap of all things Tor: Our annual State of the Onion is less than a week away. It’s our virtual two-day event where we share updates from our teams and the Tor community. As in previous years, we are organizing two streams one week apart. So please make sure to save the date for both days! Save the Dates Wednesday, November 13, 17:00 – 18:00 UTC – Updates from the Tor Project Wednesday, November 20, 17:00 – 18:00 UTC – Updates from the Tor Community Both events will be live-streamed and available for replay on our YouTube channel. Engage in the conversation on social media with the hashtag #StateOfTheOnion2024 or post questions and comments in the chat during the event. Tor Project Day – November 13, 2024 Join us on Day 1 as the Tor Project’s teams discuss their work over the past year, from major updates to incremental improvements to exciting new tools for fighting censorship and increasing network resilience. Here are some highlights: Onion Services Team – Better Access to Onions: Learn about tools like Onionspray—a plug-and-play kit to “onionize” websites—and our ongoing work with the Onion Service Ecosystem Portal to make Onion Services more accessible to everyone. Anti-Censorship Team – Strengthening Tor’s Foundation: Find out more about how we’re bolstering Tor’s anti-censorship infrastructure, including what happened since launching Webtunnel, research on Snowflake, ensuring access to Tor with a new bridge distribution mechanism.  Network Health Team – Measuring Onions: Get a download of what we’re doing to make the user experience more consistent, faster, and safer by better distributing load across the network, according to relay capacity. We’ll also feature the Community Team’s programs to promote Tor geographic relay diversity, the Application Team’s learnings from over 15 years of developing Tor Browser, and much more. Tor Community Day – November 20, 2024 On Day 2, we turn the spotlight to Tor’s community and the wider ecosystem with updates from projects that are built on Tor. Here’s what to expect: Guardian Project – Mobilize Your Onions: The Guardian Project will talk about features that make it easier for mobile devs to “onionize” their apps and services. Cwtch – Learn more about Cwtch, a Tor-based secure communication tool establishing surveillance resistant channels between people and their journey to a stable release. They’ll talk about new features like hybrid groups and bot integration. And also featured for the first time, Hushline will showcase their encrypted messaging capabilities and how it supports whistleblower and journalist protection. Quiet will join us again to present updates on encryption and user privacy, among other things. As well as Ricochet-Refresh to talk about building private and secure p2p applications with Gosling. OONI will provide a 2024 in Review and look back at OONI’s work measuring internet censorship worldwide, and their outlook for 2025. See you there! We couldn’t do the work we’re sharing at this year’s State of the Onion without your support! This event is part of our year-end fundraising campaign. You can fund the Tor Project’s work by making a donation today. Right now, if you make a donation to Tor, your donation will be matched by a generous donor. That means if you donate $25, they will also donate $25 — effectively doubling your gift and raising $50 for our teams. You can check out our previous State of the Onion streams on our YouTube channel or replay some of our other virtual events we’ve hosted earlier this year like the Postbox Launch and our event for Global Encryption Day on Distributed Trust. community fundraising

  • New Release: Tails 6.9
    by tails on October 31, 2024 at 12:00 am

    Changes and updates Update Tor Browser to 14.0.1. Update the Tor client to 0.4.8.13. Update Thunderbird to 115.16.0. Fixed problems Fix automatic upgrades aborting with the error message “The upgrade could not be downloaded” even after a successful download. (#20593) For more details, read our changelog. Get Tails 6.9 To upgrade your Tails USB stick and keep your Persistent Storage Automatic upgrades are available from Tails 6.0 or later to 6.9. If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a manual upgrade. To install Tails 6.9 on a new USB stick Follow our installation instructions: Install from Windows Install from macOS Install from Linux Install from Debian or Ubuntu using the command line and GnuPG The Persistent Storage on the USB stick will be lost if you install instead of upgrading. To download only If you don’t need installation or upgrade instructions, you can download Tails 6.9 directly: For USB sticks (USB image) For DVDs and virtual machines (ISO image) Support and feedback For support and feedback, visit the Support section on the Tails website. partners releases

  • Arti 1.3.0 is released: memory quota tracking, onion services, and more
    by Diziet on October 31, 2024 at 12:00 am

    Arti is our ongoing project to create a next-generation Tor client in Rust. Now we’re announcing the latest release, Arti 1.3.0. This release is a significant milestone: we have achieved parity on most major client features with C Tor. Much other major work is taking place, too! Work on Arti Relay is accelerating, and the RPC system is proceeding too. For full details on what we’ve done, and for information about many smaller and less visible changes as well, please see the CHANGELOG. For more information on using Arti, see our top-level README, and the documentation for the arti binary. Thanks to everybody who’s contributed to this release, including Morgan, and Neel Chauhan. Also, our welcome to Clara Engler as they join the team! And as always, our deep thanks to Zcash Community Grants, the Bureau of Democracy, Human Rights and Labor, and our other sponsors for funding the development of Arti! announcements releases

  • New Release: Tor Browser 14.0.1
    by morgan on October 29, 2024 at 12:00 am

    Tor Browser 14.0.1 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. Known Issues The tor daemon for aarch64 macOS (M1 and friends) will crash when visiting some onion-service sites, resulting in an inoperable Tor Browser (you can restart Tor Browser to work around this for now, but the particular failing onion-service sites will be inaccessible until we develop a fix). This issue is being tracked in tor-browser#43245 Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 14.0 is: All Platforms Updated Tor to 0.4.8.13 Bug tor-browser#43231: Rebase Tor Browser 128-based stable and alpha onto 128.4.0esr Bug tor-browser#43240: Backport security fixes from Firefox 132 Windows + macOS + Linux Updated Firefox to 128.4.0esr Android Updated GeckoView to 128.4.0esr Build System All Platforms Bug tor-browser-build#41289: Fix single-browser in relprep.py Linux Bug tor-browser-build#41282: Add SSL to our custom Python for MozBug 1924022 applications releases

  • New Release: Tor Browser 14.0
    by duncan on October 22, 2024 at 12:00 am

    Tor Browser 14.0 is now available from the Tor Browser download page and our distribution directory. This is our first stable release based on Firefox ESR 128, incorporating a year’s worth of changes shipped upstream in Firefox. As part of this process we’ve also completed our annual ESR transition audit, where we reviewed and addressed over 200 Bugzilla issues for changes in Firefox that may negatively affect the privacy and security of Tor Browser users. Our final reports from this audit are now available in the tor-browser-spec repository on our Gitlab instance. Firefox’s design also continues to evolve, and the ESR transition is our opportunity to update Tor Browser to reflect the most recent patterns and styles used in Firefox. For example, eagle-eyed Tor Browser users will notice updates to Tor Browser’s typography that we’ve inherited from Firefox, including heavier headings and changes to line heights intended to improve font compatibility and accessibility. In addition to the ESR, we overcame many other technical challenges that you can read more about in Morgan’s series of blog posts chronicling the team’s progress with Tor Browser Alpha, including: unifying Tor Browser for Android’s codebase into a monorepo, addressing reproducibility issues in our Android APK generation, reducing Android’s APK size for x86 and x86_64 platforms, and changes to how we spoof Tor Browser’s user agent, to name a few. This release also includes a series of improvements to the usability and compatibility of our fingerprinting protections without compromising their effectiveness, allowing us to enable useful features like picture-in-picture, screenshots and more. The ongoing development of Tor Browser is made possible thanks to the support of our community. If Tor Browser is important to you, now is a great time to support our mission, as all donations will be matched through the end of the year. What’s new? New circuit for Android In previous versions of Tor Browser for Android, users could request a “New identity” by interacting with a persistent notification that appeared while Tor Browser was running. However this was unusual for a couple of reasons – firstly, no such feature was available in the app’s user interface itself, and it could only be enabled outside the app via Android’s notification drawer. Secondly, this feature did not perform the same steps as Tor Browser for desktop to reset your identity, such as closing all tabs, clearing all cookies and wiping your browsing history. In actuality, it functioned more like a “refresh all circuits” button. We’ve since learned that most Android users were relying on this feature as workaround to request a new circuit for a broken website, rather than reset their identity as such. So when this notification inadvertently disappeared in Tor Browser 13.5, we didn’t rush to bring it back in its original state. Instead, we chose to focus our efforts on porting the desktop feature “New circuit for this site” to Android, allowing our mobile users to request a new circuit in a more targeted fashion. Extended support for legacy platforms With the release of Tor Browser 13.5, we began warning users of Windows 7, 8 and 8.1 and macOS 10.12, 10.13 and 10.14 that this would be the last major release to support their platforms. In short, that situation has now changed, and users of these legacy platforms will continue to receive critical security updates updates on a temporary basis until at least March 2025. Microsoft ended support for Windows 7, 8 and 8.1 in January of 2023, and Apple typically provides support for the previous three versions of macOS. In turn, Mozilla moved support for these versions to the Extended Support Release (ESR) of Firefox last year, and ESR 115 will be the final version of Firefox to support these platforms. However, Mozilla have since announced that ESR 115 will continue to receive critical security updates until at least March 2025, with the intention to re-evaluate the situation at the beginning of the year. So how does this affect Tor Browser users? That’s where it gets a little complicated: Tor Browser 13 is currently based on Firefox ESR 115, whereas Tor Browser 14 is based on ESR 128 – which doesn’t support these legacy platforms. This means that the Tor Browser user base will be split across two update paths: Users of Windows 10 or later and macOS 10.15 or later will be updated to Tor Browser 14.0. User of Windows 7, 8 and 8.1 and macOS 10.12, 10.13 and 10.14 will remain on Tor Browser 13.5. In turn, the Tor Project will continue to release new versions of Tor Browser 13.5 whenever critical security updates are made available for Firefox ESR 115. Ultimately, this support is only temporary, and is dependent on Mozilla’s timetable. Therefore we strongly recommend users of legacy Windows and macOS platforms upgrade their operating systems in order to update to Tor Browser 14.0 before the extended support window ends. Keeping Tor Browser up to date is critical to protect your privacy, security and anonymity online. Known issues Tor Browser 14.0 comes with a number of known issues that are searchable on Tor Browser’s Gitlab project. In particular, Windows and Android users should be aware of the following: Android We are currently working on a fix for an issue with Guardian Project’s F-Droid repo that’s been preventing F-Droid users from updating since Tor Browser 13.5.3’s release. Until this issue is resolved, Android users who have installed Tor Browser via Guardian Project’s F-Droid repo will not receive the 14.0 update. Google Play is unaffected by this issue, and Tor Browser 14.0 can be downloaded from there in the interim. Alternatively, affected users may download and install the APK for Tor Browser 14.0 directly from our download page, however please note that APKs do not update automatically. For more details, see tor-browser#43208. Windows Running Tor Browser in compatibility mode in Windows 10 and 11 can make it appear as though you’re using Windows 7 instead. Given the minimum support requirements for Tor Browser 14.0 described above, Windows 10 and 11 users will need to ensure compatibility mode is switched off before they can update to 14.0. Contributors <3 Thanks to all of the teams across Tor, and the wider community, who contributed to this release. In particular we’d like to extend our gratitude to the following volunteers who have contributed their expertise, labor, and time to this release: cypherpunks1 Thank you for tackling the (now shrinking) list of Android bugs, UI discrepancies, and packaging problems. The Android release is more polished than it otherwise would be because of your help. tor-browser#41550 tor-browser#43052 tor-browser#43129 tor-browser#43146 tor-browser#43147 tor-browser#43202 tor-browser#43223 tor-browser#43225 tor-browser#43227 tor-browser#43228 tor-browser-build#41261 NoisyCoil Thank you for bringing us one step closer to reproducible aarch64 Linux builds. This merge-request was long in the making. tor-browser-build#41142 thorin Last but not least, a big thank you to thorin for your help keeping track of and flagging upstream issues, developing tests, verifying our fixes, maximizing Tor Browser’s fingerprinting protections, and for being an ever present advocate for user privacy in general. If you would like to contribute to a future release, please see our guide for new contributors to get started. If you find a bug or have a suggestion for how we could improve this release, we’d love to hear your feedback. Full changelog The full changelog since Tor Browser 13.5.7 for desktop and Tor Browser 13.5.8 for Android is: All Platforms Bug tor-browser#30543: compat: make spoofed orientation reflect spoofed screen dimensions Bug tor-browser#30862: 10ms time precision via EXSLT date-time function Bug tor-browser#41328: Follow firefox ESMify for Bug 1308512 Bug tor-browser#42054: ESR128: investigate – thorin’s list Bug tor-browser#42220: Flip all the possible preferences to prevent any automatic download Bug tor-browser#42255: pdfjs.disabled used to be part of RFP until Bug 1838415; lock pref to false in stable Bug tor-browser#42356: Review 000-tor-browser.js and 001-base-profile.js for 128 Bug tor-browser#42601: Check Bug 1894779: Allow font-face urls to be resource:// urls and relax CORS for resource:// URLs Bug tor-browser#42611: Set clipboard.imageAsFile.enabled to false Bug tor-browser#42646: Drop patch for tor-browser#40166 Bug tor-browser#42683: Create script to generate issue triage csv’s from bugzilla query and git scraping Bug tor-browser#42684: Disable network prefetch Bug tor-browser#42685: compat: ESR128: enable textmetrics Bug tor-browser#42716: Disable unwanted about:* pages Bug tor-browser#42730: Make RemoteSettings use only local dumps Bug tor-browser#42746: Extend prefers-contrast rules to include forced-colors Bug tor-browser#42759: CI: remove localization file names that are in neither 14.0 nor 13.5 branches Bug tor-browser#42814: Opt out from Firefox relay by default. Bug tor-browser#42830: Enable WebAudio APIs Bug tor-browser#42831: Remove the shopping components Bug tor-browser#42867: Disable contentRelevancy component Bug tor-browser#43011: Ship only one copy of the MIT license, like upstream. Bug tor-browser#43012: Mixed content: browser requests HTTPS images from onion domain accessed via HTTP Bug tor-browser#43013: security.mixed_content.upgrade_display_content.image is true by default Bug tor-browser#43054: check bounceTrackingProtection in PB mode does not persist to disk Bug tor-browser#43074: Pass the browser to TorDomainIsolator.newCircuitForBrowser Bug tor-browser#43144: Ensure non-privacy browsing also sets the GPC header Bug tor-browser#43163: Disable offscreen canvas until verified it is not fingerprintable Bug tor-browser#43170: Disable user-agent spoofing in HTTP header Bug tor-browser#43178: Audit fingerprinting overrides (MozBug 1834274) Bug tor-browser#43184: Backport Bugzilla 1922294: RFP: fixup square spoofed orientation Bug tor-browser#43197: Disable automatic exception for HTTPS-First Windows + macOS + Linux Updated Firefox to 128.3.0esr Updated NoScript to 11.4.42 Bug tor-browser#40147: Re-enable Picture-in-Picture mode Bug tor-browser#41309: Re-enable screenshots component Bug tor-browser#41811: Primary buttons that result in a connection attempt should be purple Bug tor-browser#41817: Add more color aliases that take dark mode into account Bug tor-browser#41820: Downloads warning styling improvements (use moz-message-bar) Bug tor-browser#42070: Backport Bugzilla 1834307 and hide smooth-scroll UX Bug tor-browser#42212: Fluent migration: onion services Bug tor-browser#42362: “New window” missing from File menu Bug tor-browser#42441: Evaluate RR version-by-RR version rebases instead of ESR-to-ESR Bug tor-browser#42488: ESR 128: Remove role=”code” from tor circuit panel Bug tor-browser#42603: Remove safebrowsing URLs Bug tor-browser#42612: Re-implement moz-toggle customizations for ESR 128 Bug tor-browser#42617: Restore the HTML form on DDG when using safest in 128 Bug tor-browser#42629: Tweak isOnNewTabPage patch Bug tor-browser#42630: Review LaterRun in 128 Bug tor-browser#42640: Disable Firefox Flame button due to unknown interactions with New Identity Bug tor-browser#42641: Move from panel-footer class to moz-button-group Bug tor-browser#42643: downloads panel separator has mismatched margin Bug tor-browser#42644: toolbar rules in panelUI-shared.css are unneccessary Bug tor-browser#42647: “Switching to a new device” regressed on 128 Bug tor-browser#42653: The Neterror page has a checkbox to report iframe origin errors to TPO Bug tor-browser#42662: Use data-hidden-from-search for hiding the firefox connection settings Bug tor-browser#42663: Tor Browser “Connection” settings missing a tooltip Bug tor-browser#42665: Drop “Learn More” spacing Bug tor-browser#42667: Add description-deemphasized class to our additions to about:preferences Bug tor-browser#42679: Use a more robust approach to hide the “tracking protection” urlbar button Bug tor-browser#42687: Disable Privacy-Preserving Attribution Bug tor-browser#42695: Use –arrowpanel- variables for tor circuit panel spacing Bug tor-browser#42698: Bridge card background contrast is low for bridge-moji Bug tor-browser#42699: Drop level=”top” attribute from panels Bug tor-browser#42700: Remove !nodes condition from gTorCircuitPanel._updateCurrentBrowser Bug tor-browser#42704: Drop the badged=”true” attribute from security level button Bug tor-browser#42705: Update our preferences to account for new line height Bug tor-browser#42713: Some –in-content CSS variables were renamed/removed Bug tor-browser#42718: Remove the firefox-view button from UI, even when always-on private-browsing mode is disabled Bug tor-browser#42735: Disable recent search suggestions Bug tor-browser#42740: Stop trying to hide “Restore previous session” Bug tor-browser#42742: Inconsistent use of “New private window” vs “New window” Bug tor-browser#42743: Invalid onion sites are shown as secure in the page info window Bug tor-browser#42744: Light theme override for “about:tor” is inherited by chrome error pages. Bug tor-browser#42745: Remove some residuals from update scripts Bug tor-browser#42764: Unconditionally disable find-bar transition animation Bug tor-browser#42777: Remove ‘Website Privacy Preferences’ and ensure sensible default prefs Bug tor-browser#42803: Lost focus styling for built-in bridges radio options Bug tor-browser#42806: Use the lh CSS unit Bug tor-browser#42872: Disable translations until audited and solved the UX problems Bug tor-browser#43015: Missing region-name-skr fluent entry when fetching TorConnect country names Bug tor-browser#43067: Use html:link rather than xml-stylesheet in our dialogs Bug tor-browser#43071: Make sure “tor-button” elements that are also “primary” still use the tor colors Bug tor-browser#43072: moz-message-bar does not get announced on Orca screen-reader Bug tor-browser#43075: Should we drop link spacing in about:tor Bug tor-browser#43081: Remove hard-coded CSS line-height Bug tor-browser#43082: Search engine icon is not shown while typing in the address bar Bug tor-browser#43083: Backport fix for Mozilla 1436462 Bug tor-browser#43087: Onion pattern on about:torconnect needs a dark theme asset Bug tor-browser#43103: Verify whether an update is unsupported before choosing one Bug tor-browser#43104: Local files and extensions can’t be loaded in new windows before bootstrap Bug tor-browser#43105: Migrating Disconnect is not needed anymore Bug tor-browser#43109: Remove mention of Firefox Relay from settings Bug tor-browser#43115: Height of search bar has collapsed on about:tor Bug tor-browser#43117: Hide ‘Always underline links’ option Bug tor-browser#43118: hide CFR Bug tor-browser#43131: Reduce layout jank when loading about:tor Bug tor-browser#43134: Backport Bugzilla 1436226 Hardcode VP8/VP9 Bug tor-browser#43164: Prevent search-bar from being auto-hidden when not used for awhile Bug tor-browser#43169: compat: align userAgent in navigator + HTTP Header Bug tor-browser#43174: Issue with custom home page on local filesystem Bug tor-browser#43209: UI freezes when clipboard is empty after screen lock Bug tor-browser#43217: Fullscreen videos have rounded letterboxing corners Bug tor-browser#43218: Switch to browser.reload, since Browser:Reload signal was dropped upstream Bug tor-browser-build#41248: Check and update bundled font versions Windows + macOS Bug tor-browser#43021: Revert the OS deprecation notification introduced in #42347 macOS + Linux Bug tor-browser#42467: Make OS HTTP User-Agent OS spoofing configurable by pref Windows Bug tor-browser#43051: windows: remove UI for “open Tor Browser automatically when computer starts” macOS Bug tor-browser#42494: mac: add Arial Black and Arial Narrow to allowlist Linux Bug tor-browser#42702: Cannot access the clipboard for the crypto address check (wayland) Bug tor-browser#42773: Replace ~ with the original HOME Bug tor-browser#43092: Disable Wayland by default in 14.0 Bug tor-browser#43101: Security features warning links to Firefox installation support page with incomplete info Bug tor-browser#43141: Hardcode Arimo as a system-ui font Bug tor-browser#43196: Remove the vendor name from the “is playing media” notification on Linux Bug tor-browser-build#41237: Add some aliases to our Linux font config for compatibility Android Updated GeckoView to 128.3.0esr Bug tor-browser#41550: Remove unused extensions from Tor Browser for Android Bug tor-browser#42386: Remove unused assets to reduce APK size Bug tor-browser#42590: “Tor browser” text in top left of home fragment/new tab view gets cut off with larger text sizes Bug tor-browser#42655: Implement “New circuit for this site” on Android Bug tor-browser#42660: Review the patch on Android’s ProxySelector Bug tor-browser#42731: Verify privacy.spoof_english still works once we have Android builds Bug tor-browser#42954: Remove product recommendation API integration (Review Mozilla 1857215) Bug tor-browser#43006: Disable RFP for Font Visibility on Android Bug tor-browser#43016: Re-disable Nimbus Bug tor-browser#43043: Remove credit card autofill UI elements from menu Bug tor-browser#43048: Firefox logo on splash Bug tor-browser#43050: Center text in connect buttons Bug tor-browser#43052: Remove non private tabs icon and “other device tabs” from tab view Bug tor-browser#43057: fenix/…/search/list.json failing linting Bug tor-browser#43078: Disable Sharing Links to TBA Bug tor-browser#43088: Query stripping is disabled on Android Bug tor-browser#43094: Remove “Open in regular tab” button Bug tor-browser#43097: NoScript fails to install on Android Bug tor-browser#43102: Android notifications tell to make Firefox your default browser Bug tor-browser#43108: Backport Android fullscreen notifications refactoring on ESR128 Bug tor-browser#43114: Reader view uses the catch-all circuit on Android Bug tor-browser#43116: The lack of GeoIP databases produces a lot of spam in the console on Android Bug tor-browser#43128: Use DuckDuckGo HTML on the Safest security level for Android Bug tor-browser#43129: about:neterror cannot display SVG on Android with Security Level Safest Bug tor-browser#43132: Enable extensions installation on Tor Browser 14 for Android. Bug tor-browser#43146: Update the icon of DuckDuckGo onion search engine on Android Bug tor-browser#43147: Remove unused search plugins from the apk files Bug tor-browser#43151: MOZ_DATA_REPORTING, MOZ_TELEMETRY_REPORTING, MOZ_CRASHREPORTER, and MOZ_BACKGROUNDTASKS enabled on Android Bug tor-browser#43172: remove remote settings and SERPTelemetry Bug tor-browser#43202: Extensions page unnecessarily fetches recommended addons on Android Bug tor-browser#43223: Hide option to open bookmarks in non-private tabs on Android Bug tor-browser#43225: Hide non-private tab settings and history search on Android Bug tor-browser#43227: Hide the Firefox Suggest label above search suggestions on Android Bug tor-browser#43228: Fix the “What’s new” URL and text on Android Bug tor-browser-build#41223: Tor Browser Alpha version not displayed correctly Build System All Platforms Updated Go to 1.22.8 Bug tor-browser#42722: clang-format and localization linters are not running Bug tor-browser#42799: Do not run lint pipelines on new tag Bug tor-browser#43014: Add purgecaches to the dev build Bug tor-browser#43156: Update translation CI to account for the extended 13.5 release Bug tor-browser#43157: Move tb-dev to base-browser Bug tor-browser#43181: Run translation CI if there is a change in a string.xml file Bug tor-browser-build#41013: Add a README to each project Bug tor-browser-build#41096: Set SOURCE_DATE_EPOCH in the default env variables Bug tor-browser-build#41155: Update toolchains for ESR128 Bug tor-browser-build#41156: Split the Rust configuration options Bug tor-browser-build#41180: Some files do not need to be copied when building tor-expert-bundle Bug tor-browser-build#41188: Upgrade binutils to 2.41 Bug tor-browser-build#41189: Add matzfan to list of downstream projects in alpha release-prep template Bug tor-browser-build#41195: Update Go to 1.22 Bug tor-browser-build#41198: Update release-prep issue template to include notifiying anti-censorship team of package name changes for GetTor distributor Bug tor-browser-build#41203: Tor Blog generation script uses the wrong url scheme for alpha releases Bug tor-browser-build#41236: Remove binutils when not needed Bug tor-browser-build#41273: relprep.py: bump Firefox and GV to a (yet) non-existing tag when the last one does not match HEAD Bug tor-browser-build#41274: Improve fetch_changelogs.py for major releases Bug tor-browser-bundle-testsuite#40078: Update tools/tb-build-06-start-nightly-build after tor-browser-build#40829 Windows + macOS + Linux Bug tor-browser#42668: Drop torconnect rule in eslint-plugin-mozilla Bug tor-browser-build#41247: Adapt tools/update-responses/update_responses to support multiple versions in the same xml files Bug tor-browser-build#41256: tools/signing/upload-update_responses-to-staticiforme should regenerate update-responses when it already exists Bug tor-browser-build#41259: Don’t try to generate incrementals for versions which don’t set incremental_from Bug tor-browser-build#41270: Add updater rewriterules to make 13.5.7 a watershed Windows + macOS Bug tor-browser-build#41197: Modify update-responses to prevent upgrades on unsupported Windows and macOS versions Windows Bug tor-browser-build#29318: Drop mingw-w64/gcc toolchain Bug tor-browser-build#29320: Use mingw-w64/clang toolchain to build Rust Bug tor-browser-build#41185: Drop Windows 7 support for 14.0 from build tools Bug tor-browser-build#41201: Bump the Windows version checked by the installer macOS Bug tor-browser-build#41267: Go dropping support for macOS <= 11.0 in Go 1.23 Android Bug tor-browser#42480: Use translation CI in android Bug tor-browser-build#40544: Bump Java 8 version to something more recent Bug tor-browser-build#41106: Non matching builds after application-services not being rebuilt in a long time Bug tor-browser-build#41123: Drop the firefox-android project Bug tor-browser-build#41171: Switch Android containers to Debian bookworm Bug tor-browser-build#41172: Refactor the android-toolchain project Bug tor-browser-build#41178: Force IPv4 when downloading in fix_gradle_deps.py Bug tor-browser-build#41200: Remove allowed_addons.json and the related tools Bug tor-browser-build#41210: Use tor-expert-bundle-aar in geckoview/build_apk Bug tor-browser-build#41211: The Android license file is not deterministic anymore Bug tor-browser-build#41214: Update geckoview/config to be more like firefox/config Bug tor-browser-build#41217: Update realprep.py script to handle Firefox 128-based Tor Browser Android Bug tor-browser-build#41224: Do not ship Conjure and GeoIP databases on Android x86, x86-64 to save some space Bug tor-browser-build#41232: Re-implement single-arch builds after the monorepo migration Bug tor-browser-build#41234: More dependencies are needed when building Android as a release Bug tor-browser-build#41261: Use an uncompressed NoScript xpi file to improve apk compression applications releases

  • All donations to the Tor Project matched 1:1, now through Dec 31
    by alsmith on October 14, 2024 at 12:00 am

    Each year during this season, the Tor Project holds a fundraiser during which we ask for your support. We do this because the Tor Project is a nonprofit organization, powered by donations from our community. Donations make it possible for the Tor Project to build tools powered by people—not profit. Over the next few months, we’ll be sharing stories from some of the millions of people you’re helping when you support Tor, the impact we’ve made this year, details about what’s coming next to our suite of privacy and censorship circumvention tools, and ways you can help make privacy online easy and accessible. Now is a great time to give and spread the word about the Tor Project because through the end of the year, all donations will be matched by our supporters at Power Up Privacy. That means when you donate $25, you’re making a $50 impact. Plus, we’ve introduced a brand-new item to our list of gifts you can receive in return for making a donation. 👀 Below is a short preview of the events we’re hosting for you from now until the end of the year. We hope you will save these dates and choose a way to contribute or spread the word about the Tor Project today! Upcoming events Global Encryption Day: Distribute(d) trust – The key to global encryption access (Monday, October 21) For many vulnerable Internet users, the Tor network is the only way to gain access to encrypted services. It’s made possible by relay operators, the thousands of volunteers who donate their time, technical expertise, and hardware. Join us for a roundtable discussion with individual and institutional relay operators to learn more about the ins and outs of powering a safer, more equitable internet. The virtual live event is part of Tor’s contributions to Global Encryption Day. 📺 Stream live on our YouTube channel State of the Onion – the Tor Project (Wednesday, November 13) The State of the Onion is the Tor Project’s annual virtual event where we share updates from the Tor Project and the Tor community. The event on November 13 will focus on the Tor Project and the organization’s work. 📺 Stream live on our YouTube channel State of the Onion – Community (Wednesday, November 20) The State of the Onion is the Tor Project’s annual virtual event where we share updates from the Tor Project and the Tor community. The event on November 20 will focus on organizations in the Tor community and their work. 📺 Stream live on our YouTube channel Human Rights Day (Tuesday, December 10) Every year on December 10, we celebrate the UN’s adoption and proclamation of the Universal Declaration of Human Rights (UDHR) in 1948. The UDHR outlines privacy as one of the human rights everyone should be free to exercise. 📎 Keep an eye on the blog and newsletter for event updates. Ways to contribute Make a donation: Donate through our website (or any other method listed on our FAQ) and your donation will be matched, 1:1, up to $300,000. Ask the company you work for if they will match your donation: Many corporations will match their employees’ donations to charitable organizations. Ask at work if your company will match your gift. Share on social media: Let the people in your networks know that all donations to the Tor Project are currently being matched. You can easily share a post from our social channels: Mastodon, Bluesky, X, and more. Subscribe to Tor News: No ads. No tracking. Just low-traffic Tor updates via email. fundraising

  • New Release: Tor Browser 13.5.8 (Android only)
    by morgan on October 14, 2024 at 12:00 am

    Tor Browser 13.5.8 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. This is an unplanned release which backports the remaining Android-specific security fixes from Firefox 131 to Tor Browser 13.5. This is due to a release-process failure on our part during the 13.5.7 release. How did this happen? The fundamental issue that led to us missing patches in the previous release is that we have two different ways of prepping Android releases, and we forgot a step. To elaborate, Tor Browser 13.5 is based of Firefox 115. This version of Firefox uses a separate source-code repository for the Android-specific functionality. Tor Browser 14.0 is based off of Firefox 128 which has integrated Android and Desktop source-code into a single repository. So, to prep a 13.5 release we have to update two source-code tags, while in 14.0 we only have to update only one. Since we have been mostly prepping 14.0 alpha-channel releases in recent weeks, this extra tag update was overlooked and these Android-specific updates never made it into the final release. The good news is that this particular error won’t happen again as we will not need to release any more Tor Browser 13.5 for Android after this because Tor Browser 14.0 will stabilise soon. Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. https://www.mozilla.org/en-US/firefox/131.0.3/releasenotes/ Full changelog The full changelog since Tor Browser 13.5.7 is: Android Updated NoScript to 11.4.42 Bug tor-browser#43099: YEC 2024 Takeover for Android Stable Bug tor-browser#43173: Backport security fixes from Firefox 131 applications releases

Share Websitecyber