Skip to main content
Home

The Tor Project

Enter the terms you wish to search for.

Main menu

  • About Tor
  • Donate

Tor’s Bug Smash Fund: $86K Raised!

by al | September 13, 2019

To the Tor community: we owe you a thank you! You made the Bug Smash Fund campaign more successful than we could have predicted.

  • 7 comments

New Release: Tor Browser 8.5.6

by boklm | September 09, 2019

Tor Browser for Android 8.5.6 is now available from the Tor Browser Download page and also from our

  • 48 comments

New Release: Tor Browser 9.0a6

by boklm | September 05, 2019

Update 6/9 0600UTC: Added another known issue.

  • 75 comments
  • Join the discussion...

Browser Fingerprinting: An Introduction and the Challenges Ahead

by gk | September 04, 2019

In the past few years, a technique called browser fingerprinting has received a lot of attention because of the risks it can pose to privacy. What is it? How is it used? What is Tor Browser doing against it? In this blog post, I’m here to answer these questions.

  • 80 comments

New Release: Tor Browser 8.5.5

by boklm | September 03, 2019

Tor Browser 8.5.5 is now available from the Tor Browser Download page and also from our

  • 130 comments

Orfox Paved the Way for Tor Browser on Android

by sysrqb | September 03, 2019

After nearly a year since we released the alpha version of Tor Browser for Android, the time for sunsetting Orfox has come.

  • 63 comments

Run Tor Bridges to Defend the Open Internet

by phw | August 28, 2019

Thanks to bridges, Tor users are still able to connect to the network when the public Tor relays are blocked. It's not enough to have many bridges: eventually, all of them could find themselves in block lists. We therefore need a constant trickle of new bridges that aren't blocked anywhere yet. This is where we need your help.

  • 38 comments

Join Our DocsHackathon Next Week

by pili | August 27, 2019

Documentation is extremely valuable to the health of open source software projects, but it is often overlooked. Due to the amount of interest we received during our search for a Google Season of Docs candidate, we're kicking off a week-long documentation hackathon Monday 2nd September 00:00UTC to Friday 6th September 23:59UTC. *Update: The DocsHackathon has been extended to Monday 9th September 14:59 UTC.

  • 7 comments

New release: Tor 0.4.1.5

by nickm | August 20, 2019

After months of work, we have a new stable release series! If you build Tor from source, you can download the source code for 0.4.1.5 on the website. Packages should be available within the next several weeks, with a new Tor Browser in early September.

This is the first stable release in the 0.4.1.x series. This series adds experimental circuit-level padding, authenticated SENDME cells to defend against certain attacks, and several performance improvements to save on CPU consumption. It fixes bugs in bootstrapping and v3 onion services. It also includes numerous smaller features and bugfixes on earlier versions.

Per our support policy, we will support the 0.4.1.x series for nine months, or until three months after the release of a stable 0.4.2.x: whichever is longer. If you need longer-term support, please stick with 0.3.5.x, which will we plan to support until Feb 2022.

Below are the changes since 0.4.0.5. For a list of only the changes since 0.4.1.4-rc, see the ChangeLog file.

Changes in version 0.4.1.5 - 2019-08-20

  • Directory authority changes:
    • The directory authority "dizum" has a new IP address. Closes ticket 31406.
  • Major features (circuit padding):
    • Onion service clients now add padding cells at the start of their INTRODUCE and RENDEZVOUS circuits, to make those circuits' traffic look more like general purpose Exit traffic. The overhead for this is 2 extra cells in each direction for RENDEZVOUS circuits, and 1 extra upstream cell and 10 downstream cells for INTRODUCE circuits. This feature is only enabled when also supported by the circuit's middle node. (Clients may specify fixed middle nodes with the MiddleNodes option, and may force-disable this feature with the CircuitPadding option.) Closes ticket 28634.

 

  • 21 comments
  • Join the discussion...

New Release: Tor Browser 9.0a5

by boklm | August 01, 2019

Tor Browser 9.0a5 is now available for Android from our distribution directory and

  • 71 comments
  • Join the discussion...

Pagination

  • First page « First
  • Previous page ‹ Previous
  • …
  • Page 3
  • Current page 4
  • Page 5
  • Page 6
  • …
  • Next page Next ›
  • Last page Last »

Upcoming Events

January 09, 2020
Censorship Resistance für den Anonymisierungsdienst Tor (Hagenberg)
See All Upcoming Events

Recent Updates

Modularizing Key Aspects of the Tor Network, Supported by MOSS

by gaba | December 12, 2019

In 2018, the Tor Project was awarded a grant from Mozilla’s Open Source Support (MOSS) program’s Mission Partners track to improve

Digital Rights are Human Rights

by ggus | December 10, 2019

In honor of the United Nations' proclamation and adoption of the Universal Declaration of Human Rights (UDHR) in 1948, December 10 is Human Rights Day.

New Release: Tor 0.4.2.5 (also 0.4.1.7, 0.4.0.6, and 0.3.5.9)

by nickm | December 09, 2019

Ater months of work, we have a new stable release series! If you build Tor from source, you can download the source code for 0.4.2.5 on the website. Packages should be available within the next several weeks, with a new Tor Browser around January 7.

This is the first stable release in the 0.4.2.x series. This series improves reliability and stability, and includes several stability and correctness improvements for onion services. It also fixes many smaller bugs present in previous series.

Per our support policy, we will support the 0.4.2.x series for nine months, or until three months after the release of a stable 0.4.3.x: whichever is longer. If you need longer-term support, please stick with 0.3.5.x, which will we plan to support until Feb 2022.

Today we are also releasing updates to our older series: 0.4.1.7 (changelog), 0.4.0.6 (changelog), and 0.3.5.9 (changelog), which you can download at dist.torproject.org.  Note that the 0.4.0.x series and the 0.2.9.x series will become unsupported early next year, so if you're running one of those versions, you should plan to upgrade.

Below are the changes in 0.4.2.5, since 0.4.1.4-rc. For a complete list of only the changes since 0.4.2.4-rc, see the ChangeLog file.

Changes in version 0.4.2.5 - 2019-12-09

  • Major features (directory authorities):
    • Directory authorities now reject relays running all currently deprecated release series. The currently supported release series are: 0.2.9, 0.3.5, 0.4.0, 0.4.1, and 0.4.2. Closes ticket 31549.
  • Major features (onion service v3, denial of service):
    • Add onion service introduction denial of service defenses. Intro points can now rate-limit client introduction requests, using parameters that can be sent by the service within the ESTABLISH_INTRO cell. If the cell extension for this is not used, the intro point will honor the consensus parameters. Closes ticket 30924.

 

The Next Chapter in Anti-Censorship

by arma | December 04, 2019

The video from my DEF CON 2019 talk ("The Tor Censorship Arms Race: The Next Chapter") is now up:

© 2019 The Tor Project

Footer

  • The Tor Project
  • RSS
  • Donate