New Tor Browser Bundles

The Tor Browser Bundles have all been updated to the latest Firefox (10.0) as well as a number of other software version updates.

https://www.torproject.org/download

Tor Browser Bundle (2.2.35-5)

  • Update Firefox to 10.0
  • Update Qt to 4.7.4
  • Update OpenSSL to 1.0.0g
  • Update zlib to 1.2.6
  • Update HTTPS Everywhere to 1.2.2
  • Update NoScript to 2.2.8
  • New Firefox patches
    • Limit the number of fonts per document

Linux changes

  • Put documentation in remove-shared-lib-symlinks debug dumps (closes: #4984)

Windows changes

  • Make sure mozconfig always gets copied into the Firefox build directory
    (closes: #4879)
Anonymous

February 07, 2012

Permalink

Tor is becoming with every patch a honeypot! this update is fail!!!
ipcheck.info
Signature: medium! (not standard tor browser signature!)
Charset: medium! wtf
HTTP_ACCEPT Headers: allowed! (why not block this???) in the past updates it was blocked!

https://panopticlick.eff.org/
12.41 bits way too big with configuration, first it was around 8 with configuration! now with configuration in the default settings it is around 18

The bigest fail is this:
during any tor start up u connect again and again with the same relays/ips in the united states!!! again with same relays and IP.

the default settings are a total farce! i think it is time let the people know that tor browser is not connecting to random relays/ip. but connect to companys in the united states! and this companys are analysing our trafic!!!

Panopticlick works by checking your browser settings against all previous visitors to their site so obviously when you're one of the first to visit with a new configuration, it's going to give a bad score. That score doesn't translate into the real world very well. It implies that you stand out in a crowd but really you still look just like every other Tor Browser Bundle user and once enough of them visit Panopticlick, the numbers will begin to reflect that again.

oh gawd ... it's not ... not ... not ... that darn honeybee is it?! Say it ain't so, pha-lease!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Anonymous

February 07, 2012

Permalink

Tor is becoming with every patch a honeypot! this update is fail!!!
ipcheck.info
Signature: medium! (not standard tor browser signature!)
Charset: medium! wtf
HTTP_ACCEPT Headers: allowed! (why not block this???) in the past updates it was blocked!

https://panopticlick.eff.org/
12.41 bits way too big with configuration, first it was around 8 with configuration! now with configuration in the default settings it is around 18

The bigest fail is this:
during any tor start up u connect again and again with the same relays/ips in the united states!!! again with same relays and IP.

the default settings are a total farce! i think it is time let the people know that tor browser is not connecting to random relays/ip. but connect to companys in the united states! and this companys are analysing our trafic!!!

Anonymous

February 07, 2012

Permalink

Now when I start up the bundle and at random moments, I am now getting a message from PGP that it has detected an SSL/TLS connection initiated by my mail client. I don't have a mail client up. The PGP message says I am connected to: static.8.58.4.46.clients.your-server.de

Is this something that the Tor Bundle is doing or should I be worried?

Anonymous

February 08, 2012

Permalink

After a few days running a exit node it crashed. I was using Skype via a normal connection parallel to TOR and trying to get the node slower. It doesn't get slower and finally TOR crashed.

Anonymous

February 09, 2012

Permalink

please update Tor Bundle
in this release Flash Plugin is not in plugin list
it is not activate by Firefox because the plugin is an old not secure version
thanks

Do -never- use any Flash plugin with Tor. Flash applications may leak sensitive data like your real IP address. If it is Youtube you can use their experimental HTML5 video mode instead, which is safe together with Tor.

Anonymous

February 09, 2012

Permalink

+1 for the change from Firefox.

On OS X Firefox is my default browser, all types of applications are now trying to use the Tor Browser Bundle version, rather than previously when they ignored it as it was the Aurora version.

For those on OS X you can get part of the way for the moment and be able to tell the difference in the dock by changing the icon for Tor’s version of Firefox (right-click > Show Package Contents > Contents > MacOS > Firefox).

I tried renaming Firefox there too, but that seems to have killed Vidalia! Now re-installing XD

Regards,
r

Anonymous

February 09, 2012

Permalink

Any reason why we cannot write comments in blogger (blogspot) through tor bundle?

Anonymous

February 11, 2012

Permalink

This is the output when I try to download TBB with wget:

  1. [<a href="mailto:guest@localhost" rel="nofollow">guest@localhost</a> guest]$ wget <a href="https://www.torproject.org/dist/torbrowser/tor-browser-2.2.35-5_en-US.exe
  2. --2012-02-12" rel="nofollow">https://www.torproject.org/dist/torbrowser/tor-browser-2.2.35-5_en-US.e…</a> 02:17:13-- <a href="https://www.torproject.org/dist/torbrowser/tor-browser-2.2.35-5_en-US.exe
  3. ERROR:" rel="nofollow">https://www.torproject.org/dist/torbrowser/tor-browser-2.2.35-5_en-US.e…</a> Cannot open directory /etc/openssl/certs.<br />
  4. Resolving <a href="http://www.torproject.org" rel="nofollow">www.torproject.org</a> (<a href="http://www.torproject.org" rel="nofollow">www.torproject.org</a>)... 86.59.30.36, 38.229.72.14, 38.229.72.16, ...<br />
  5. Connecting to <a href="http://www.torproject.org" rel="nofollow">www.torproject.org</a> (<a href="http://www.torproject.org" rel="nofollow">www.torproject.org</a>)|86.59.30.36|:443... connected.<br />
  6. ERROR: The certificate of `<a href="http://www.torproject.org&#039" rel="nofollow">www.torproject.org&#039</a>; is not trusted.<br />
  7. ERROR: The certificate of `<a href="http://www.torproject.org&#039" rel="nofollow">www.torproject.org&#039</a>; hasn't got a known issuer.<br />
  8. [<a href="mailto:guest@localhost" rel="nofollow">guest@localhost</a> guest]$

Anonymous

February 12, 2012

Permalink

with this new TBB i noticed i get all the time the same 3 entry nodes.

whats going on?

Anonymous

February 13, 2012

Permalink

I use tor bundle for linux 32bit (arch linux + kde). When i right-clicking -> save over a file link (like for example .pdf files), appear the torbutton alert about an application of the third-party that try to access asking what to do. I don't understand what is the problem, is a kde component's that try to connect to the site or is a false allarm?

Anonymous

February 18, 2012

Permalink

hi first thanks for helping me and other pls tel me how can i up grade my tor there is message on my tor said i need to up grade but from the site its impossible to downlod how can i get it?

Anonymous

May 23, 2012

Permalink

I can't connect to anything. Every time I try to go to a site, it says the connection timed out. What the fuck is this bullshit?