Tor Browser 6.0.4 released yesterday, finally brings Tor Browser users the latest Tor stable, 0.2.8.6, and avoids pinging Mozilla’s servers for system extensions. Pinging Mozilla’s servers was responsible for users getting an extension into their Tor Browser that resulted in annoying and confusing “Your Firefox is out of date” notifications on start-up (bug 19890). Thanks to Mozilla engineers, who fixed that issue as quickly as possible on their side, the extension is not shipped to Tor Browser users anymore since August 11 13:00 UTC.
Tor 0.2.8.6 has been released and it comes with a large number of improvements, changes and fixes. Tor 0.2.8.6 is the first stable version of the Tor 0.2.8 series. The Tor 0.2.8 series improves client bootstrapping performance, completes the authority-side implementation of improved identity keys for relays, and includes numerous bugfixes and performance improvements throughout the program. This release continues to improve the coverage of Tor’s test suite. Tor 0.2.8.6 Changelog New system requirements: Tor no longer attempts to support platforms where the “time_t” type is unsigned.
Tor Browser 6.0 released today, comes with major updates and is the first stable release in the 6.0 series. This release brings us up to date with Firefox 45-ESR, which should mean a better support for HTML5 video on Youtube, as well as a host of other improvements. The release also features new privacy enhancements and disables features. While on the security side this release makes sure that SHA1 certificate support is disabled and the updater is not only relying on the signature alone but is checking the hash of the downloaded update file as well before applying it.
Tor Browser 5.5.5 recently released, comes with important security updates to firefox. This release updates Firefox to 38.8.0esr. Additionally, NoScript was bump to version 126.96.36.199 and HTTPS-Everywhere to 5.1.6. For those who may not know, Tor Browser is a network of servers that allows people to improve their privacy and security on the Internet. Tor Browser encrypts everything everything in the Tor network. Via the HTTPS-Everywhere extension, it also encrypts the traffic between the Tor network and the final destination.
Tails 1.7 recently released, is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to Use the Internet anonymously and circumvent censorship; all connections to the Internet are forced to go through the Tor network; leave no trace on the computer you are using unless you ask it explicitly; use state-of-the-art cryptographic tools to encrypt your files, emails and instant messaging.
Tor 0.2.7.2-alpha is the second alpha release in the Tor 0.2.7 series, and comes with a number of new features, including a way to manually pick the number of introduction points for hidden services, and the much stronger Ed25519 signing key algorithm for regular Tor relays (including support for encrypted offline identity keys in the new algorithm). Support for Ed25519 on relays is currently limited to signing router descriptors; later alphas in this series will extend Ed25519 key support to more parts of the Tor protocol.
Mike Perry announced the release of Tor Browser 0.2.6.10, which is based on Firefox ESR 31.7.0 and features important security updates to Firefox. Tor version 0.2.6.10 fixes some significant stability and hidden service client bugs, bulletproofs the cryptography init process, and fixes a bug when using the sandbox code with some older versions of Linux. Tor Browser 0.2.6.10 changelog Major bugfixes (hidden service clients, stability): Stop refusing to store updated hidden service descriptors on a client.
Mike Perry announced the release of Tor Browser 4.5.2, which is based on Firefox ESR 31.7.0 and features important security updates to Firefox. Tor Browser 4.5.2 provides a fix for the Logjam attack and updates a number of Tor Browser components: Tor to version 0.2.6.9, Torbutton to version 188.8.131.52, NoScript to version 184.108.40.206 and HTTPS-Everywhere to version 5.0.5. Moreover, it fixes a possible crash on Linux and avoids breaking the Add-ons page if Torbutton is disabled.
Mike Perry announced the release of Tor Browser 4.5.1, which is based on Firefox ESR 31.7.0 and features important security updates to Firefox. The 4.5.1 release also addresses several regressions and usability issues discovered during the 4.5 release. The most notable change is that we have slightly relaxed the first party isolation privacy property, due to issues encountered on several file hosting sites as well as other sites that host content on multiple subdomains.
A new release for the stable Tor Browser is available from the extended downloads page and also from the distribution directory. Tor Browser 4.0.4 is based on Firefox ESR 31.5.0, which features important security updates to Firefox. Additionally, it contains updates to NoScript, HTTPS-Everywhere, and OpenSSL (none of the OpenSSL advisories since OpenSSL 1.0.1i have affected Tor, but we decided to update to the latest 1.0.1 release anyway). Changelog since 4.
Tor Browser was developed to protect users privacy and anonymity when browsing the web by bouncing your communications around a distributed network of relays run by volunteers all around the world. It prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked. Note: Once you close TorBrowser, the list of visited websites and the cookies are deleted Install Tor Browser sudo add-apt-repository ppa:webupd8team/tor-browser sudo apt-get update sudo apt-get install tor-browser – Launch TorBrowser from Dash click on Connect if you don’t use a proxy – Now you have successfully installed Tor Browser Remove Tor Browser sudo apt-get remove tor-browser rm -r ~/.