Updates from the Tor Project

Tor Project blog Official channel for news and updates from the Tor Project

  • New Alpha Release: Tor Browser 13.5a6
    by richard on March 28, 2024 at 12:00 am

    Tor Browser 13.5a6 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. We would like to thank the folowing community members for their contributions this release: RustyBird for their fix for tor-browser-build#41110 If you would like to contribute, our contributor guide can be found here. Letterboxing Improvements and Configuration Options Over the past month we have merged various usability improvements and configuration options for the new letterboxing UX. In about:preferences#general one may now configure some aspects of the letterbox behaviour, including whether the content area floats in the center of the window or is snapped to the browser chrome at the top. We also implemented a somewhat hidden feature which will allow you to remove the extra spacing when you resize the window by double-clicking within the letterbox gutter area. This will snap the whole window down to the size required by the content. Native Android Connect-Assist We have continued improving our connect-assist implementation on Android. This has included backend work continuing to improve and generalise the low-level systems used by both Desktop and Android versions, frontend work re-immplementing the same flow, configuration options, and error handling presently found in the Desktop frontend. We have also started refactoring the various Tor configuration related menus and the Tor Logs are once again accessible using the native ux by navigating to Settings > Connection > Tor Logs Please give the new systems a go by navigating to Settings > Connection > Enable beta connection features and toggling Enable beta connection features and selecting Native Android UI Known Issues We still have a lot of work to do, bugs to fix, and general polish to apply. We currently have one known issue whereby manually enabling bridges in the Config Bridge menu usually fails to stick after navigating away from that menu. This issue is being tracked in tor-browser#42486 Connect-Assist Backend Work As mentioned in the previous section, we have been iteratively improving the connect-assist backend code which is used on both Desktop and Android. If you are Desktop user we would appreciate you verifying that your bootstrapping experience is unchanged between releases, particularly if you have any custom configuration or settings. Localisation Updates We have been developing several improvements to our localisation pipelines and we have been merging patches which remove legacy ‘dtd’-based translation strings and migrate to the modern ‘fluent’ system used by modern Firefox. End-users should not see any changes as a result of these changes. Please keep an eye out for for any broken strings or translation regressions and report any issues you may find! Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 13.5a5 is: All Platforms Bug tor-browser#41114: Fix no-async-promise-executor on TorConnect Bug tor-browser#41676: Set privacy.resistFingerprinting.testing.setTZtoUTC as a defense-in-depth Bug tor-browser#42336: Review the relationship between TorSettings and the TorProvider Bug tor-browser#42428: Timezone offset leak via document.lastModified Bug tor-browser#42435: Update moat domain fronting configuration Bug tor-browser#42437: Drop “torbrowser.version” preference Bug tor-browser#42444: Remove the “Prioritize .onion sites when known” option Bug tor-browser#42449: Rebase Tor Browser alpha onto Firefox 115.9.0esr Bug tor-browser#42459: Add startpage onion service to list of search providers Bug tor-browser#42466: Drop the “Onion Logo” from trademark statement Bug tor-browser#42472: Timezone May leak from XSLT Date function Bug tor-browser#42473: ESR 115.9.1 fixes Bug tor-browser#42481: Modularize SecurityLevel Bug tor-browser-build#41105: Bump version of snowflake to v2.9.2 Windows + macOS + Linux Updated Firefox to 115.9.0esr Bug tor-browser#41916: Letterboxing preferences UI Bug tor-browser#41918: Add option to reuse last window size when letterboxing is enabled Bug tor-browser#42203: Fluent migration: about dialog Bug tor-browser#42209: Fluent migration: tor circuit Bug tor-browser#42211: Fluent migration: new identity Bug tor-browser#42214: Fluent migration: security level Bug tor-browser#42236: Let users decide whether to load their home page on new identity. Bug tor-browser#42443: Shrink the window to match letterboxing size when the emtpy area is doble-clicked Bug tor-browser#42446: Improve accessible descriptions in built-in dialog Bug tor-browser#42458: Update the “Submit Feedback” link in “About Tor Browser” Windows Bug tor-browser#42377: Hidden fonts are automatically added to the allow list Linux Bug tor-browser#42438: Adapt the data import wizard to use the original $HOME on Linux Bug tor-browser-build#41110: Avoid Fontconfig warning about “ambiguous path” Android Updated GeckoView to 115.9.0esr Bug tor-browser#41187: Improve Android’s bridge settings UI Bug tor-browser#42427: Do not ship bridges as prefences anymore Build System All Platforms Updated Go to 1.21.8 Bug tor-browser-build#41102: src archive does not match likely due to mismatched xz-utils version Bug tor-browser-build#41107: Update download-unsigned-sha256sums-gpg-signatures-from-people-tpo for new type of URL Bug rbm#40073: We should remove ./ when using 7-zip for zip files Windows + macOS + Linux Bug tor-browser#42305: (Semi-)Automatically merge translation resources across tor browser releases (desktop) Bug tor-browser-build#41088: Remove use of projects/browser/run_scripts Windows Bug tor-browser-build#41097: authenticode-timestamping.sh fails to run again because tmp-timestamp already exists Android Bug tor-browser#40502: Do not recommend addons on Tor Browser Bug tor-browser-build#41082: Package tor expert bundle on android as .aar that firefox-android can use in lieu of tor-android-service with geckoview bootstrap applications releases

  • New Release: Tor Browser 13.0.13
    by richard on March 22, 2024 at 12:00 am

    Tor Browser 13.0.13 is now available from the Tor Browser download page and also from our distribution directory. This is an unscheduled emergency release with important security updates to Firefox for Desktop platforms. Android is unaffected. Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 13.0.12 is: Windows + macOS + Linux Updated Firefox to 115.9.1esr Bug tor-browser#42473: ESR 115.9.1 fixes Bug tor-browser#42474: Rebase stable browsers on 115.9.1 applications releases

  • New Release: Tor Browser 13.0.12
    by boklm on March 19, 2024 at 12:00 am

    Tor Browser 13.0.12 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. Removal of automatic .onion site prioritization The Tor Project has recently been notified of a potential fingerprinting vulnerability with automatic Onion-Location redirects. In an abundance of caution, we have removed the ‘prioritize .onion sites when known’ option from Tor Browser. We are looking further into this issue and will provide timely updates as more research and additional recommendations become available. Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 13.0.11 is: All Platforms Updated Snowflake to 2.9.2 Bug tor-browser#42376: The placeholder of datetime inputs keeps being localized when spoof English is on Bug tor-browser#42378: spoof english + htmlform <details> can leak app language Bug tor-browser#42444: Remove the “Prioritize .onion sites when known” option Bug tor-browser#42448: Rebase Tor Browser stable onto Firefox 115.9.0esr Bug tor-browser#42459: Add startpage onion service to list of search providers Bug tor-browser-build#41105: Bump version of snowflake to v2.9.2 Windows + macOS + Linux Updated Firefox to 115.9.0esr Windows Bug tor-browser#42377: Hidden fonts are automatically added to the allow list Android Updated GeckoView to 115.9.0esr Bug tor-browser#42407: TTP-03-010 WP3: Potential phishing Build System All Platforms Updated Go to 1.21.8 Bug tor-browser-build#41102: src archive does not match likely due to mismatched xz-utils version applications releases

  • Hiding in plain sight: Introducing WebTunnel
    by shelikhoo, ggus on March 12, 2024 at 12:00 am

    Today, March 12th, on the World Day Against Cyber Censorship, the Tor Project’s Anti-Censorship Team is excited to officially announce the release of WebTunnel, a new type of Tor bridge designed to assist users in heavily censored regions to connect to the Tor network. Available now in the stable version of Tor Browser, WebTunnel joined our collection of censorship circumvention tech developed and maintained by The Tor Project.  The development of different types of bridges are crucial for making Tor more resilient against censorship and stay ahead of adversaries in the highly dynamic and ever-changing censorship landscape. This is especially true as we’re going through the 2024 global election megacycle, the role of censorship circumvention tech becomes crucial in defending Internet Freedom. If you’ve ever considered becoming a Tor bridge operator to help others connect to Tor, now is an excellent time to get started! You can find the requirements and instructions for running a WebTunnel bridge in the Tor Community portal. What is WebTunnel and how does it work? WebTunnel is a censorship-resistant pluggable transport designed to mimic encrypted web traffic (HTTPS) inspired by HTTPT. It works by wrapping the payload connection into a WebSocket-like HTTPS connection, appearing to network observers as an ordinary HTTPS (WebSocket) connection. So, for an onlooker without the knowledge of the hidden path, it just looks like a regular HTTP connection to a webpage server giving the impression that the user is simply browsing the web.  In fact, WebTunnel is so similar to ordinary web traffic that it can coexist with a website on the same network endpoint, meaning the same domain, IP address, and port. This coexistence allows a standard traffic reverse proxy to forward both ordinary web traffic and WebTunnel to their respective application servers. As a result, when someone attempts to visit the website at the shared network address, they will simply perceive the content of that website address and won’t notice the existence of a secret bridge (WebTunnel). Comparing WebTunnel to obfs4 bridges WebTunnel can be used as an alternative to obfs4 for most Tor Browser users. While obfs4 and other fully encrypted traffic aim to be entirely distinct and unrecognizable, WebTunnel’s approach to mimicking known and typical web traffic makes it more effective in scenarios where there is a protocol allow list and a deny-by-default network environment. Consider a network traffic censorship mechanism as a coin sorting machine, with coins representing the flowing traffic. Traditionally, such a machine checks if the coin fits a known shape and allows it to pass if it does or discards it if it does not. In the case of fully encrypted, unknown traffic, as demonstrated in the published research How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic, which doesn’t conform to any specific shape, it would be subject to censorship. In our coin analogy, not only must the coin not fit the shape of any known blocked protocol, it also needs to fit a recognized allowed shape–otherwise, it would be dropped. Obfs4 traffic, being neither a match for any known allowed protocol nor a text protocol, would be rejected. In contrast, WebTunnel traffic resembling HTTPS traffic, a permitted protocol, will pass. If you want to learn more about bridges, different designs and how they work, check out our video series. How to use a WebTunnel Bridge?  🌉 Step 1 – Getting a WebTunnel bridge At the moment, WebTunnel bridges are only distributed via the Tor Project bridges website. We plan to include more distributor methods like Telegram and moat.  Using your regular web browser, visit the website: https://bridges.torproject.org/options In “Advanced Options”, select “webtunnel” from the dropdown menu, and click on “Get Bridges”. Solve the captcha. Copy the bridge line. 💻 Step 2 – Download and install Tor Browser for Desktop Note: WebTunnel bridges will not work on old versions of Tor Browser (12.5.x). Download and install the latest version of Tor Browser for Desktop. Open Tor Browser and go to the Connection preferences window (or click on “Configure Connection”). Click on “Add a Bridge Manually” and add the bridge lines provided on Step 1. Close the bridge dialog and click on “Connect.” Note any issues or unexpected behavior while using WebTunnel. 📲 Or Download and install Tor Browser for Android Download and install the latest version of Tor Browser for Android. Run Tor Browser and choose the option to configure a bridge. Select “Provide a Bridge I know” and enter the provided bridge addresses. Tap “OK” and, if everything works well, it will connect. ✍️ Step 3 – Share feedback with us Your feedback is crucial to help us identify any issues and ensuring the reliability of WebTunnel bridges. For users living in censored regions, we would love to hear how this new bridge’s performance compares to other circumvention methods such as obfs4 and Snowflake. Thank you to all the volunteers who have contributed to making WebTunnel possible The more tools we have at our disposal, the better we will be able to target our response, keeping censors at bay and enabling millions of users to access the free and open internet. We first announced this new bridge type in October 2023 with a call for testers asking Tor users for whom it was safe to use WebTunnel to provide feedback. So many of you sprung into action and we received a lot of feedback, both public and private, that allowed us to make numerous stability improvements to WebTunnel.  Right now, there are 60 WebTunnel bridges hosted all over the world, and more than 700 daily active users using WebTunnel on different platforms. However, while WebTunnel works in regions like China and Russia, it does not currently work in some regions in Iran. Our goal is to ensure that Tor works for everyone. Amid geopolitical conflicts that put millions of people at risk, the internet has become crucial for us to communicate, to witness and share what is happening around the world, to organize, to defend human rights, and to build solidarity. That is why our community’s volunteer contributions are vital. Remember, there are many ways to get engaged: You can run more bridges, Snowflake proxies and relays to continue our fight against censorship and for free and open access to the unrestricted internet. circumvention human rights announcements

  • New Release: Tor Browser 13.0.11
    by richard on March 6, 2024 at 12:00 am

    Tor Browser 13.0.11 is now available from the Tor Browser download page and also from our distribution directory. This is an emergency release which updates our the domain fronting configuration for the Snowflake pluggable transport and the moat connection to the rdsys backend used by the censorship circumvention system. A known issue is that the source archives do not match likely due to a change in xz-utils (the underlying source in the archive is identical, only the compressed archive differs). This is not considered a blocker for this release and is being tracked here: https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41102 Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 13.0.10 is: All Platforms Bug tor-browser#42435: Update moat domain fronting configuration Build System All Platforms Bug tor-browser-build#41085: kick_devmole_build script prints wrong URL for Mullvad’s build hashes Bug tor-browser-build#41097: authenticode-timestamping.sh fails to run again because tmp-timestamp already exists applications releases

  • Arti 1.2.0 is released: onion services development
    by gabi on March 4, 2024 at 12:00 am

    Arti is our ongoing project to create a next-generation Tor client in Rust. Now we’re announcing the latest release, Arti 1.2.0. In Arti 1.2.0, trying out onion services will hopefully be a smoother experience. We have fixed a number of bugs and security issues, and have made the onion-service-service feature non-experimental. We have begun design work on some of the onion service security features on our roadmap, such as the memory DoS prevention subsystem, and the connection bandwidth rate-limiter. In addition, we have scoped the remaining work for supporting hidden service client authorization, which will be implemented in a future release. This release also fixes a low severity security issue: the relay message handling code was not rejecting empty DATA messages, which could be used to inject an undetected traffic signal. This issue is tracked as TROVE-2024-001. There are still some rough edges and missing security features, so we don’t (yet) recommend Arti onion services for production use, or for any purpose that requires privacy. For instructions on how to run an onion service in Arti, see our work-in-progress HOWTO document. We hope to make these instructions simpler and better as our implementation improves. For full details on what we’ve done, and for information about many smaller and less visible changes as well, please see the CHANGELOG. In the next releases, we will focus on implementing the missing security features and on improving stability. For more information on using Arti, see our top-level README, and the documentation for the arti binary. Thanks to everybody who’s contributed to this release, including Alexander Færøy, Jim Newsome, Tobias Stoeckmann, and trinity-1686a. Also, our deep thanks to Zcash Community Grants and our other sponsors for funding the development of Arti! announcements

  • New Alpha Release: Tor Browser 13.5a5
    by richard on February 28, 2024 at 12:00 am

    Tor Browser 13.5a5 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. We would like to thank the folowing community members for their contributions this release: ppisar for their fixup to rbm#40072 We would also like to bring attention to a work-in-progress merge request from community members NoisyCoil, tor-browser-build!920. This work is the first step toward potentially supporting aarch64 Linux builds of Tor Browser in an official capacity. If you’ve any interest in the work behind cross-compiled Tor Browser builds, this MR is the one keep an eye on! Thank you both for your contributions! If you would like to contribute, our contributor guide can be found here. Native Android Connect Assist UX As discussed in the 13.5a3 and 13.5a4 release posts, we have been working on bringing the connect-assist feature from Desktop to Android. The work continues, and we now have an initial implementation of this feature exposed via native Android interface. You can access the native Android interface by navigating to Settings > Tor Network and selecting Enable beta connection features. From there, select Native Android UI. The HTML UI option is still available for debugging purposes, but will be removed once this feature stabilises in 13.5. Please give this feature a go! The native UI is not yet feature complete but regardless, if you run into problems please open an issue on our gitlab or on our forum. Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 13.5a4 is: All Platforms Updated OpenSSL to 3.0.13 Updated Snowflake to 2.9.0 Bug tor-browser#42376: The placeholder of datetime inputs keeps being localized when spoof English is on Bug tor-browser#42378: spoof english + htmlform <details> can leak app language Bug tor-browser#42390: Betterboxing: make the decorator border disappear when the corners are flat Bug tor-browser#42397: Change RFP-spoofed Timezone from UTC to a real-world, less discriminable one Bug tor-browser#42412: Rebase Tor Browser Alpha onto 115.8.0esr Bug tor-browser-build#41079: Bump version of Snowflake to v2.9.0 Windows + macOS + Linux Updated Firefox to 115.8.0esr Bug tor-browser#41814: Change “vanilla bridge:” to “Tor bridge:” in bridge cards Bug tor-browser#42270: Implement design changes to QR code dialog Bug tor-browser#42389: Betterboxing: gradient is never shown Bug tor-browser#42398: Include Alpha and Nightly in MOZ_APP_DISPLAYNAME (and possibly in other places) Bug tor-browser#42414: Show ellipsis when the tor bridge address overflows Bug tor-browser#42415: Improve focus styling for forced focus in bridge settings Bug tor-browser#42421: Remove bridge option should be hidden for Lox bridges Bug tor-browser#42423: Move temporary Lox Fluent strings to new file Bug tor-browser#42425: Improve accessibility of the bridge emoji cells Android Updated GeckoView to 115.8.0esr Bug tor-browser#42253: Remove “New private tab” action and widget Bug tor-browser#42402: Remove Android YEC strings Bug tor-browser#42407: TTP-03-010 WP3: Potential phishing Bug tor-browser#42416: Backport Android security fixes from Firefox 123 macOS Bug tor-browser-build#40569: Create build-specific installer for macOS Build System All Platforms Updated Go to 1.20.14 and 1.21.7 Bug tor-browser-build#41081: Update detailsURL in tools/signing/nightly/update-responses-base-config.yml Bug tor-browser-build#41085: kick_devmole_build script prints wrong URL for Mullvad’s build hashes Bug rbm#40068: Switch from IO::CaptureOutput to Capture::Tiny Bug rbm#40069: Make stdout and stderr utf8 Bug rbm#40071: Add an option to create zip files using 7z Bug rbm#40072: Move capture_exec to a separate module Windows Bug tor-browser-build#41076: Include the ShellLink plugin in NSIS macOS Bug tor-browser-build#41084: $app_bundle is missing the final .app in projects/firefox/build Android Bug tor-browser#42399: Re-enable minimization of JS for Android Bug tor-browser-build#41080: Re-pack omni.ja with 7-zip on Android Bug tor-browser-build#41092: Use an uncompressed omni.ja to improve final apk compression. Bug tor-browser-build#41093: Sign unsigned APKs instead of the QA-signed ones applications releases

  • New Release: Tails 6.0
    by tails on February 27, 2024 at 12:00 am

    New features Error detection on the Persistent Storage Tails 6.0 warns you about errors when reading or writing from your Tails USB stick. These alerts can help you diagnose hardware failures on your USB stick and backup your Persistent Storage before it’s too late. Mount external devices automatically When you plug in an external storage device, a USB stick or an external hard disk, Tails 6.0 mounts it automatically. If the storage device contains an encrypted partition, Tails 6.0 offers you to unlock the encryption automatically. This feature also simplifies how to unlock VeraCrypt encrypted volumes. Protection against malicious USB devices If an attacker manages to plug a malicious USB device in your computer, they could run software that breaks the security built in Tails without your knowledge. To protect from such attacks while you are away from your computer, Tails 6.0 ignores any USB device that is plugged in while your screen is locked. You can only use new USB devices if they are plugged in while the screen is unlocked. Dark Mode and Night Light From the system menu of Tails 6.0, you can now switch between: The default light mode with colder colors and more brightness A dark mode A night light mode with warmer colors and less brightness A combination of both the dark mode and night light mode Easier screenshots and screencasts GNOME 43 introduces a new shortcut in the system menu that makes it easier to take a screenshot or record a screencast. Easier Gmail in Thunderbird Thanks to changes in both Thunderbird and Gmail, it’s much easier to configure a Gmail account in Thunderbird in Tails 6.0. You don’t have to configure anything special in your Gmail account, other than the usual 2-Step Verification. You can sign in to your Gmail account directly when configuring it in Thunderbird. Diceware passphrases in 5 more languages When creating a Persistent Storage, suggested passphrases are now also generated in Catalan, German, Italian, Portuguese, and Spanish. Thanks to jawlensky who created the word lists for Catalan, Italian, and Spanish for Tails, but also made them available to all users of diceware. Changes and updates Included software Tails 6.0 updates most of the applications included in Tails, among others: Tor Browser to 13.0.10. Electrum from 4.0.9 to 4.3.4 Improve support for the Lightning protocol and hardware wallets. KeePassXC from 2.6.2 to 2.7.4 Add entry tags. Support dark mode. Redesign history view. Metadata Cleaner from 1.0.2 to 2.4.0 Redesign the whole user interface. Support dark mode. Add support for AIFF and HEIC files. Text Editor from gedit to gnome-text-editor Support dark mode. Inkscape from 1.0.2 to 1.2.2 Audacity from 2.4.2 to 3.2.4 Gimp from 2.10.22 to 2.10.34 Kleopatra from 4:20.08 to 4:22.12 Removed features Remove the icons on the desktop. The extension of GNOME Shell that we used to provide this feature is not well integrated into GNOME and created other problems. (#19920) Remove the item Wipe and Wipe available disk space from the shortcut menu of the Files browser. Secure deletion is not reliable enough on USB sticks and Solid-State Drives (SSDs) for us to keep advertising this feature. We updated our documentation on secure deletion to new recommendations: use encrypted volumes, overwrite the entire device, or disintegrate it physically. Remove the item Remove metadata from the shortcut menu of the Files browser. The developers of MAT2, the metadata removal library used by Metadata Cleaner are not providing this option anymore. Remove GtkHash You can still install GtkHash as Additional Software. Fixed problems Fix several issues with special characters and non-Latin scripts in the screen keyboard. (#18076) For more details, read our changelog. Known issues OnionShare is still included as version 2.2. We tried to include OnionShare 2.6 in Tails 6.0, but it has several issues that had security implications. (#20135 and #20140) Mounting external devices automatically interferes with the Back Up Persistent Storage utility. (#20143) Get Tails 6.0 To upgrade your Tails USB stick and keep your Persistent Storage Automatic upgrades are only available from Tails 6.0~rc1 to 6.0. All other users have to do a manual upgrade. To install Tails 6.0 on a new USB stick Follow our installation instructions: Install from Windows Install from macOS Install from Linux Install from Debian or Ubuntu using the command line and GnuPG The Persistent Storage on the USB stick will be lost if you install instead of upgrading. To download only If you don’t need installation or upgrade instructions, you can download Tails 6.0 directly: For USB sticks (USB image) For DVDs and virtual machines (ISO image) Support and feedback For support and feedback, visit the Support section on the Tails website. partners releases

  • New Release: Tor Browser 13.0.10
    by richard on February 20, 2024 at 12:00 am

    Tor Browser 13.0.10 is now available from the Tor Browser download page and also from our distribution directory. This version includes important security updates to Firefox. This release updates Firefox to 115.8.0esr, OpenSSL to 3.0.13, zlib to 1.3.1, and Snowflake to 2.9.0. It also includes various bug fixes (see changelog for details). Send us your feedback If you find a bug or have a suggestion for how we could improve this release, please let us know. Full changelog The full changelog since Tor Browser 13.0.9 is: All Platforms Updated OpenSSL to 3.0.13 Updated zlib to 1.3.1 Updated Snowflake to 2.9.0 Bug tor-browser#42374: spoof english leaks via numberingSystem: numbers (non-latn) or decimal separator (latn) Bug tor-browser#42411: Rebase Tor Browser stable onto 115.8.0esr Bug tor-browser-build#41079: Bump version of Snowflake to v2.9.0 Windows + macOS + Linux Updated Firefox to 115.8.0esr Bug tor-browser#42338: Changing circuit programmatically in Tor Browser not working anymore! Android Updated GeckoView to 115.8.0esr Bug tor-browser#42402: Remove Android YEC strings Bug tor-browser#42416: Backport Android security fixes from Firefox 123 Linux Bug tor-browser#42293: Updater is disabled when tor-browser is run by torbrowser-launcher flatpak Build System All Platforms Updated Go to 1.20.14 and 1.21.7 Bug tor-browser-build#41067: Use Capture::Tiny instead of IO::CaptureOutput Bug rbm#40067: Use –no-verbose wget option when not running in a terminal Bug rbm#40068: Switch from IO::CaptureOutput to Capture::Tiny Bug rbm#40069: Make stdout and stderr utf8 Bug rbm#40072: Move capture_exec to a separate module applications releases

  • Thank you! Our 2023 year-end fundraising results 🎉
    by alsmith on February 14, 2024 at 12:00 am

    Good news, Tor community! Today I am happy to share the results of the Tor Project’s 2023 year-end fundraising campaign. From October through December 2023, you answered the call for support by contributing $427,558 to power the Tor network, Tor Browser, onion services, Snowflake, and the ecosystem of tools and services built and maintained by the Tor Project. Everyone in our community deserves a big THANK YOU for supporting the Tor Project during the campaign. Whether you made a donation, shared the campaign on social media, or spread the world about the importance of using Tor, you have made our success this year possible. Your impact was then amplified by the Friends of Tor who provided the generous match during the campaign. How will the Tor Project spend the money raised? Defending access to information during the Year of Democracy. In 2024, more people are living in a place with a national election than ever before. Over the last decade, we’ve seen that election events bring spikes in internet censorship — and we’re expecting that these tactics of suppressing speech will be used widely this year. We’ve already begun to use funds raised to prepare. We’re monitoring elections as they take place and watching for events of censorship. We’re holding trainings on how to use Tor to bypass censorship to relevant communities. Not all of this work is funded by grants, and our community team relies on your contributions to make this work possible and reach more at-risk users. Increasing our capacity to achieve our mission. As the Tor Project has matured into a human-rights focused organization, we have grown to meet the challenges of an increasingly restrictive internet landscape. We share the ambitious vision of a world where everyone is able to exercise their right to privacy and access information freely. To achieve this vision, we need to have the proper infrastructure, staff support, and tools to be effective. That includes things like hiring an additional project manager, improving our donation infrastructure, and investing in tools that will help our team focus on reaching more users in real-time, support our community in moments of crises, and increase adoption of Tor technology globally. Your donation keeps the Tor Project a strong organization that can continue to build vital privacy and anti-censorship tools. Expanding global access to Tor. Every initiative to help more people use Tor is powered in part by individual donations. Your contributions will go towards expanding our live user support channels, localization, training with community partners, and tracking the development of internet freedom around the world. You’ll also be supporting onion service adoption by continuing our development of administration tools for onion service operators and support of organizations that want to release onion sites; strengthening the Tor network against attacks in our multi-year focus on reducing malicious relay activity on the network; and re-writing Tor in Rust, a safer, more modern language that makes Tor easier to integrate in a variety of applications and services. You can trust that your donations are hard at work – and not just because we say so. The Tor Project is a Charity Navigator Four-Star Charity, and we’ve earned Candid’s Platinum Seal of Transparency. Plus, you can read in detail about all of our revenue and expenses in our annual fiscal year transparency reports. We look forward to our continued collaboration with you, our community, to stand up for the human right to privacy, freedom of expression, and access to information. Keep up with progress and get the latest Tor news by subscribing to our newsletter. fundraising

Websitecyber related posts:

Financial Cyberscoop

The latest financial news and information from Cyberscoop.

Identity Theft Victim Can Teach Us

Every year millions become victims of identity theft and many other cyber-attacks, including ransomware, phishing, scams, and more.

Google

Latest stories for ZDNET in Google.

Cyber Threat Pro-Russian Group

A pro-Russian cyber threat group is believed to be behind an attack blocking access to Prime Minister Justin Trudeau’s official web site earlier this week.

Artificial Intelligence and Algorithms

Developments in artificial intelligence (AI) are leading to fundamental changes in the way we live. How will AI change our society in the future?

US Nationwide TikTok Ban

The CEO of TikTok announced the platform has about 150 million American users.

Cybersecurity Jobs Millions of Openings

Cybersecurity Ventures’ prediction that there will be 3.5 million unfilled cybersecurity jobs globally by 2022, up from one million positions in 2014.

Ardent Health Services Cyberattack

The ongoing cyberattack at Ardent Health Services is forcing roughly a dozen of their hospitals to divert patients away from emergency rooms.

Car Hacking a New Threat

Modern car technology makes our lives easier but it's now also exposing us to a new threat car hacking.

Coronavirus was made in a Chinese lab and released ‘intentio...

A Chinese virologist whistleblower who fled the country after leaving her job at a Hong Kong university claims coronavirus was “man-made” in a lab and the commu...

Large scale cyber attack on Australian institutions and comp...

This cyber attack is targeting Australian organizations across a range of sectors.

Cyber Attacks Possibly Connected

The world has seen an alarming increase in cyber attacks, with high-profile incidents targeting government agencies, private companies, and even individuals.
Share Websitecyber