Here is the complete changelog since 5.0.6:
- All Platforms
- Update NoScript to 2.9
- Update HTTPS Everywhere to 5.1.2
- Bug 17931: Tor Browser crashes in LogMessageToConsole()
- Bug 17875: Discourage editing of torrc-defaults
“I'm a Tor supporter for a very simple reason: my colleague's lives depend on it.
I'm the co-founder of Global Voices, an international community of bloggers, reporters, translators and activists dedicated to building a more inclusive picture of the world. Members of our community are located in more than 100 nations, and many members of our team live in countries where freedom of expression is under threat.
Some Global Voices members need to maintain anonymity so they can report from countries where their words could lead to imprisonment or worse. These threats are not imaginary - four members of our team were incarcerated for more than a year in Ethiopia, and our members in Bangladesh fear for their safety when they write about killings of secular bloggers, presumably by government-backed extremists.
We teach everyone who works with Global Voices about digital security, and Tor is a cornerstone of the toolkit we teach our authors and translators to use. In countries that monitor web traffic closely, frequently connecting to the Global Voices website could signal that a user is a Global Voices contributor. Correctly using Tor allows our authors in repressive nations to contribute to our site without revealing to local authorities that they are writing for Global Voices. We quite literally could not do our job in many nations we work in without Tor.
While financial support is critical for Tor to continue developing its tools, and while the real heroes of the Tor project are the thousands of volunteers who donate bandwidth and time to maintain Tor exit nodes, there's another way to help Tor: use Tor. Here's what I mean: in the most repressive countries we work in, we cannot use Tor because simply using strong encryption is so uncommon that governments seek out users of these tools. For Tor to be useful in an extremely repressive country like Ethiopia, it needs to be normal, as normal as HTTPS has become in the past few years. When you use Tor to do something quotidian, you're providing cover traffic for people who need to use Tor to do something extraordinary. So give, run an exit node, but at the very least, help make Tor utterly ordinary by using it as often as you can.”
“Communications metadata is remarkably revelatory. Just knowing what number you communicated with, when, and for how long can reveal whether you are having a flare-up of MS, seeking an abortion, or thinking about growing marijuana plants commercially. All of this comes from the numbers you call, and not what you say. It's why keeping communications metadata private is so important.
“Tor protects such data. It's not just journalists who need such privacy. It's human rights workers (that's why the State Department supports Tor), law-enforcement investigators checking out questionable sites, the businessperson collecting data to make decisions, the worker checking AIDS information or Alcoholics Anonymous over lunch hour on her private device but using her company's ISP. In a world of increasing surveillance, there's increasing need for Tor.
“I first began using Tor regularly in 2012 when I taught a freshman seminar in privacy. For one assignment I asked my students to try Tor and write a customer review. Tor was very clunky then. The fact that you couldn't simultaneously use Tor and the Firefox browser seriously diminished usability for me.
“Tor has much improved. The program runs faster, it is more secure, and there's greater functionality, including the ability to simultaneously use Tor and Firefox. I am delighted, but more is needed. We live in a world of pervasive surveillance, and Tor provides an essential service. Give generously and give often so that we can protect a modicum of private space in our increasingly public world. The privacy you protect may be your own.”
Giordano Nanni was a Tor supporter long before anyone at Tor actually knew him personally. Giordano and rap artist Hugo Farrant created the project called Juice Rap News in 2009. "We were adamant about using our respective art forms to bring attention to the issues that we care about,” Giordano says. “We are the generation that is living in the age of the advent of Internet. We are unique in this regard; no other generation will be like ours. We therefore have the blessing and also the responsibility of being the ones who’ll shape the Internet’s future."
Giordano and Hugo began posting Juice Rap News episodes in 2009 from Giordano’s house in Melbourne. "Episode 4 was our first episode about the Internet," Giordano says, "and we used the example of WikiLeaks and Julian Assange to explore the concept of digital rights and the importance of the Internet. It really struck a chord with people, and this encouraged us to keep going in that direction. We quickly grew from a little project that only few knew about to really having an audience. We went on to produce 35 episodes covering a wide range of subjects; but the topic of the Internet has always remained a constant theme throughout the series."
Giordano has fond memories of the events that led to the making of Juice Rap News episode 15: "Big Brother is WWWatching You" in which George Torwell makes his first appearance. "Jake [Appelbaum] came to Melbourne in 2012 to speak at a couple of events. While he was here he contacted us to say he’d like to meet up, and we all met for coffee,” he says. "Later on, we went to the beach and talked. Jake explained how Tor works by drawing onion router diagrams in the sand." Major data retention laws were being brought forward in Australia at the time, and by the end of their conversation, Giordano and Jake agreed on the need to create a Juice Rap News episode focused on surveillance, pointing to Tor as a solution.
Through Juice Rap News, Giordano and Hugo brought their creativity and humor to bear on the issues that concern them most, and Giordano continues that in his current work with the Juice Media channel—like his newest video: "A Message from George Orwell", in which George Torwell makes a new appearance to raise awareness about why digital rights matter.
"I feel that one of the unique responsibilities of our generation is to ensure that the foundation for the Internet is based in strong ethics of justice and transparency, as a democratic platform for openness and free speech", Giordano says. "Our mission with The Juice Media is really to explain these issues in an easy-to-understand way, and to make it fun."
In mid-October, the Tor Project had an opportunity to interview Edward Snowden. Below are key excerpts from the conversation.
Tor: What would you say to a non-technical person about why they should support and care about Tor?
ES: Tor is a critical technology, not just in terms of privacy protection, but in defense of our publication right -- our ability to route around censorship and ensure that when people speak their voices can be heard.
The design of the Tor system is structured in such a way that even if the US Government wanted to subvert it, it couldn't because it's a decentralized authority. It's a volunteer based network. Nobody's getting paid to run Tor relays -- they're volunteers worldwide. And because of this, it provides a built-in structural defense against abuses and most types of adversaries.
Tor provides a level of safety, a level of guarantee, to the confidentiality, and in some cases anonymity of human communications. I think this is an incredible thing because it makes us more human. We are at the greatest peace with ourselves when nobody's watching.
Tor: Can you talk about how the world would be different if Tor did not exist?
ES: Without Tor, the streets of the Internet become like the streets of a very heavily surveilled city. There are surveillance cameras everywhere, and if the adversary simply takes enough time, they can follow the tapes back and see everything you've done.
With Tor, we have private spaces and private lives, where we can choose who we want to associate with and how, without the fear of what that is going to look like if it is abused.
What the Tor network allows is what's called a mixed routing experience where, due to a voluntary cooperation of peers around the Internet -- around the world, across borders, across jurisdictions -- you get individuals who are able to share traffic in ways that don't require them to be able to read the content of it. So you don't have to trust every participant of the Tor network to know who you are and what you're looking for.
Tor: Did you know that Tor is run by a non-profit organization?
ES: Yes, Tor has been extremely open. Almost everybody who is involved in development has an online presence; they're involved in online engagement. You can drop into the IRC and talk to these people directly and ask them questions, or criticize them (laughs). It's a very open and inclusive community, and I think that's incredibly valuable.
They also have a very rich and well-supported mailing list, which is very helpful for people who want to move beyond being a passive user of Tor and actually start being an active participant in expanding the network, in running a relay node from your home, or even starting to experiment with running an exit, which I think is one of the most interesting parts of the Tor experience.
Please join Ed in supporting Tor Today!
Ask Alison Macrina about the Tor Project and she immediately thinks of all of the librarians who have been transformed by learning how to use the Tor Browser in her trainings through the Library Freedom Project. "You teach people how to use the Tor Browser and they are so thrilled," she says. "They are most excited when you teach them about invisible trackers, and then about how Tor creates a different circuit on every tab, protecting you from trackers who would create a trail of what you look at. This one reason why Tor is so great—it is for everyone, not just techie people."
Macrina founded Library Freedom Project for just that reason. She travels to libraries all over the United States, Canada, and increasingly internationally, educating librarians about current privacy issues.
"Helping librarians understand privacy issues impacts not just libraries but the larger community," she says. "Libraries offer public Internet terminals, and librarians like me teach free computer classes to the public. Our patrons come from all walks of life, but we tend to serve communities particularly vulnerable to surveillance (including immigrants, Muslim Americans, people of color, people who are homeless, and those who have been incarcerated) in higher numbers than in the general population."
Education about privacy tools and protecting oneself online is particularly important for these communities, Macrina adds, because they are targeted more. "One thing about using Tor is that it really does protect and allow them to move in the online world unfettered from the pernicious effects of surveillance. It makes a big difference for people’s material realities. Most people realize that the Internet is a hostile place, and to know that there really is something you can do about it, and that you can always do more—they really respond to that."
Library Freedom Project has collaborated with the Tor Project for the last year, and, due to securing some additional grant funding, LFP and the Tor Project will be working together more closely to open up Tor relays in libraries. "We get to hire Nima Fatemi, a core Tor Project person in order to scale our relay project. We will also be able to hold more advanced trainings for librarians because of Nima's expertise, and we will reach many more libraries. We feel that there is a lot of possibility here."
Both Macrina and Fatemi place a strong emphasis on strengthening the communities they serve through the FLP trainings.
"One of the most helpful things we can do to participate in the movement to protect Internet freedom globally is to run a Tor relay. We have many interested libraries who want to participate, and now we have a better capacity to serve them," Macrina says. "With Nima working more closely with Library Freedom Project, we will be able to show them the rich complexity of what Tor can offer them and their communities, that there are many options for protecting their patrons' privacy, and that there is always more that you can do. Part of our strength is all of the people who are involved in this."
“The public, the media, and congress have tolerated, for the entire length of the Cold War and since, an extremely elaborate secrecy system in the government on the declared rationale that this is necessary for national security.
“Actually, this is largely a fraud. Secrets can be necessary from foreign enemies, but we rarely need secrecy for more than a few years. And yet the vast amount of the billions and billions of pages of classified secret documents are…decades old. The only reason for that is to protect officials: from accountability, from blame for criminal prosecution in some cases, but more often just from mistakes, from admitting error, bad predictions, deceptions of the public, disastrous policies. In other words, these documents remain classified to protect officials from the electorate, to subvert democracy essentially. And that has been the effect.
“The price of maintaining this lack of responsibility and accountability was Vietnam, and the Iraq war. Had there been an Ed Snowden or a Chelsea Manning at high levels in the government in let’s say, 2001 or 2002, there would have been no Iraq war.
“Likewise, had I thought of putting out what I knew already in 1964 and 1965 to the press—what I did 5 years later in the Pentagon Papers—there would have been no Vietnam War. Future disasters lie ahead unless whistleblowers do emerge who can communicate securely and safely with media and get the information out to the public.
“Tor permits the possibility of the continuation of whistle-blowing. That really means the continuation of investigative journalism in the area of so-called national security, and that in turn means the recapture or preservation of democracy, of the first amendment. You can’t have a democratic government with as little public information as the government now allows us. That has to change. We need more whistle blowers—more Mannings, more Snowdens—and that is not going to happen with the government’s current capability to trace and listen to every source, every journalist, every congressional staffer, through capabilities that simply didn’t exist for the East German secret police, the Stasi. The government now has capabilities the Stasi couldn’t even imagine, the possibility for a total authoritarian control.
“The counter to that is courage, because putting out information that the government doesn’t want told…will never be without risk. There has to be courage. But to limit the risks and make that more accessible we have to have the ability for secure, safe, anonymous communication, to congressional staff, to the media, to the public at large. And that is what Tor facilitates. So I would say that the future, the future of democracy, and not only in this country, depends upon countering the abilities of this government and every other government in this world to know everything about our private lives while they keep secret everything about what they’re doing officially.”
— Dan Ellsberg
Ben Wizner, in thinking about the ways that Tor facilitates his work, is very clear: “It’s not an overstatement to say that secure technology such as Tor has made the ACLU’s work with Edward Snowden possible, “ he says.
Like Laura Poitras, using encryption was a learning process for Wizner, facilitated by key teachers, the first of whom was Laura herself.
“I was someone who went through most of my life unaware of these tools,” he says. “Laura (Poitras) came to my office in 2011 and installed Adium for me. `This is how we are going to communicate,” she said. “And this will help you communicate with the rest of the world as well.”
Jacob Appelbaum, Chris Soghoian, Renata Avila, and Daniel Kahn Gillmor were all instrumental to Wizner as he followed a similar learning curve to Poitras, quickly becoming familiar with Tor, PGP, Tails and Signal for many aspects of his work as Director of the ACLU’s Speech, Privacy and Technology project. It was his next teacher that, as he says, “gets us to the heart of the story. Starting in July 2013 I had a need to be able to communicate securely with Edward Snowden.”
From the start, as Ben aided Snowden with legal advice, he learned from him as well.
“[I was…] dealing with someone who is a world-class security technologist and also an excellent and very patient teacher,” he says. “I was entering a mode of communication where he felt extremely at home and I did not. This was going to be the only means of communication for an unknown length of time and we needed to exchange critical information, get to know each other and build trust, all while I am hunting and pecking on this tiny burner keyboard. And I have learned over the months and years how profound and intimate a chat conversation can be.”
Somehow it worked, and worked so well in fact, that meeting Snowden in person was a different experience for Wizner that he had expected.
“That was the surprising thing,” he says. “Even though we had gotten to know each other so well over so many hours of online conversation, I still had the expectation that our real relationship would begin when we met face to face. And yet it turned out to be a continuation rather than a new chapter.”
Wizner thinks often about the role that secure technology continues to play in both providing the foundation for their work together, and more broadly, in Ed’s continued participation in the larger dialogue around encryption.
“On one level, secure technology like Tor and Tails, has allowed Ed to defeat exile in a really profound way. Physical isolation has been imposed, but Ed is able to continue communicating to larger audiences from wherever he is. All of the legal and strategic advice,” he adds, “that goes into making these opportunities available and accessible for him would not be possible without using secure communications tools like Tor.”