Tor Browser 5.0.5 is released

by gk | December 15, 2015

A new stable release for Tor Browser is available from the Tor Browser Project page and also from our distribution directory.

This release features important security updates to Firefox.

Additionally, we included updated versions for Tor (0.2.7.6), OpenSSL (1.0.1q), NoScript (2.7) and HTTPS-Everywhere (5.1.1). Moreover, we fixed an annoying bug in our circuit display (circuits weren't visible sometimes) and improved our fingerprinting defense against MIME type enumeration.

Tor Browser 5.0.5 comes with a banner supporting our donations campaign. The banner is visible on the about:tor page and features either Roger Dingledine, Laura Poitras or Cory Doctorow which is chosen randomly.

These and all the other changes (minor bug fixes and new features) can be found in the complete changelog since 5.0.4:

  • All Platforms
    • Update Firefox to 38.5.0esr
    • Update Tor to 0.2.7.6
    • Update OpenSSL to 1.0.1q
    • Update NoScript to 2.7
    • Update HTTPS Everywhere to 5.1.1
    • Update Torbutton to 1.9.3.7
      • Bug 16990: Avoid matching '250 ' to the end of node name
      • Bug 17565: Tor fundraising campaign donation banner
      • Bug 17770: Fix alignments on donation banner
      • Bug 17792: Include donation banner in some non en-US Tor Browsers
      • Translation updates
    • Bug 17207: Hide MIME types and plugins from websites
    • Bug 16909+17383: Adapt to HTTPS-Everywhere build changes
    • Bug 16863: Avoid confusing error when loop.enabled is false
    • Bug 17502: Add a preference for hiding "Open with" on download dialog
    • Bug 17446: Prevent canvas extraction by third parties (fixup of #6253)
    • Bug 16441: Suppress "Reset Tor Browser" prompt
    • Bug 17747: Add ndnop3 as new default obfs4 bridge

Comments

Please note that the comment area below has been archived.

December 16, 2015

In reply to gk

Permalink

HTTPS Everywhere hasn't released an update in almost 4 months (5.1.1 was on August 25). Are they working on some big change?

Software that works and does its job doesn't need to be updated.

Your statement is based on the fallacious premise that threat vectors and attack vectors remain the same.

We know that hackers and the NSA are refining their hacking skills by the day.

No; it depends on the scope of the software. If the software isn't on a potential attack vector it can't be used.
With that said, HTTPS-Everywhere is potentially on an attack vector.

December 16, 2015

In reply to gk

Permalink

A new version of HTTPS Everywhere was released today, version 5.1.2. Unfortunate timing for Tor Browser, which will be stuck on 5.1.1 for the next 6 weeks. I guess there isn't any release co-ordination between the two projects.

>stuck
Yes, this reminds me, does updating HTTPS Everywhere or NoScript in TorBrowser mean that the next incremental .mar file can't be applied, forcing the full .mar to be downloaded?

HTTPS Everyhwere is maintained by the EFF and Tor Browser is maintained by Torproject, two different organisations.

December 16, 2015

Permalink

Hello
The certificate in the signature cannot be verified
5.0.4 = OK
5.0.5 = Error
please check
URL : https://i.imgsafe.org/290ecde.png

Filename: torbrowser-install-5.0.5_en-US.exe
MD5: 4761aad6ab889de8cf225877885c8441
SHA1: e41fc5a4ee505f61102ac873a4c79263e5815475
CRC32: b68b9130

My operating system is Windows 10

Thank you

December 16, 2015

Permalink

hello

i asked a question via E-mail several days a go but i didn't receive any answer..i ask it again here ...hope to get an answer :

is telegram desktop safe using Tor ?(setting ip & port )

Specifically I want to know using Tor on Telegram desktop prevents
Snooping of My Traffic By ISP Or others? as regards there is no option
to select Remote DNS Similar to what exists in the browser !

Do not use Telegram. Ever. Even over Tor.

The problem with Telegram is the creators "rolled their own crypto" — in other words, they aren't cryptographers and they built their own crypto system instead of relying on well-tested systems. If you route Telegram through the Tor network, yes it will stop your ISP and other middlemen between you and the exit node from spying. But after the exit node, and especially on the Telegram servers, you should not trust that your communications are private; they are very likely being read by government agencies and possibly other malicious actors too.

Use Signal or an OTR client (such as Pidgin, Adium, Jitsi, Cryptocat, or Tor Messenger) instead for real privacy.

http://www.alexrad.me/discourse/a-264-attack-on-telegram-and-why-a-supe…
http://unhandledexpression.com/2013/12/17/telegram-stand-back-we-know-m…
http://thoughtcrime.org/blog/telegram-crypto-challenge/

December 16, 2015

Permalink

Hi gk

Thanks for the awesome product.

However we would appreciate it if Tor developers could come up with ways to mitigate the issues discussed in "Towards measuring unobservability in anonymous communication systems", Journal of Computer Research and Development, 2015, 52(10): 2373-2381.

The PDF version can be downloaded from: http://crad.ict.ac.cn/CN/abstract/abstract3031.shtml# The file size is about 6861 KB.

Thanks, we have seen that paper. As far as we know, it doesn't describe current abilities (the title says "towards"), but it is something to be aware of for the future.

obfs4 and ScrambleSuit actually already have the ability to modify their traffic signature, but it is currently turned off because we don't think censors are really capable of blocking traffic on that basis yet. But it is something we can turn on in the future when it becomes necessary.

You can see an example of timing and packet size obfuscation here:
https://trac.torproject.org/projects/tor/wiki/doc/AChildsGardenOfPlugga…

December 16, 2015

Permalink

My Tor Browser Bundle seems to have updated itself to 5.0.5. This is weird, it has never done this before. Was auto-updating introduced in 5.0.4?

Yes it has had auto-update turned on since several builds ago. If you prefer it not to, type about:config in the url bar, search for app.update.auto and set it to false.

December 16, 2015

Permalink

Panda Antivirus neutralized this Tor update. Bloody annoying antivirus, I should get rid of it.

Hey, this is just a friendly suggestion to switch to the fully free software Trisquel GNU/Linux and abandon your anti-virus. It will help freedom and also improve your security :)

Hey, this is just a friendly suggestion to switch to the fully free software Trisquel GNU/Linux and abandon your anti-virus.

Excuse me, I'd love to try Trisquel out but it doesn't seem to be updated regularly with security fixes, or does it?

December 16, 2015

Permalink

Still wont let you use keepshare or Oboom.com . Loads the captcha then fails. Older version and Mac version work but windows just fail

December 16, 2015

Permalink

My flash is no longer working. I need it working to play a game. It was fine in the previous versions. I have an up to date version of flash installed. I have checked in Tor options regarding blocking and can't see the problem.
Windows XP OS.
Cheers

Try to uncheck "Change details that distinguish you from other Tor Browser users" in Privacy and Security Settings

My flash is no longer working. I need it working to play a game. It was fine in the previous versions. I have an up to date version of flash installed. I have checked in Tor options regarding blocking and can't see the problem.
Windows XP OS.

Firstly DON'T ever use Adobe Flash. It's lots of security vulnerabilities and is the favorite software of hackers. Go read about what The Hacking Team did with Adobe Flash.

Secondly Tor is meant to primarily help people who genuinely need anonymity to communicate with others. We don't see how playing games is fulfilling one of the primary objectives of Tor. Please respect that. If you want people to respect you, you must learn how to respect others first.

In addition people like you who use Tor to play games are one of the causes of slow Tor connections. Please be civic-minded and unless you're the person who pays for all of Tor's bandwidth, you'd better be respectful of humanity.

Thirdly Microsoft has stopped issuing security fixes for Windows XP OS years ago. The company itself cautioned people against using it.

P.S.: We know who you're. In every new release of TBB you post messages like this one to try to ensnare unsuspecting Tor users to use defective software. Well, keep on trying. You're doomed to fail.

1. Indeed, yet Adobe Flash is needed to run most applications on the Internet

2. Around 90% of the people don't really use Tor for anonymity, considering that Tor Browser doesn't even grant it, on most occasions

3. Windows XP is the 2nd most widely used OS, even after its end of life. He may be living in India; in India, China and most African countries WinXP is still widely used, and in Cuba it's even more popular than Windows 7... with 41% of the OS market share...

December 16, 2015

Permalink

sha256sum of torbrowser-install-5.0.5_en-US.exe is:
c717ca07aba66452ca237cb968d70a54ec968aeb0c2fa75953b968cd99c09b73, however, sha256sums-unsigned-build.txt says:
fb65e2a5af9a7d1a26fdadd712defdc06f2a51890a0a72508b9e8914f28f6d77 torbrowser-install-5.0.5_en-US.exe

The date of the binary itself is 2015-12-15 08:42, but the date of the sha256sums-unsigned-build.txt is 2015-12-12 15:54 -- was the binary rebuilt after the sha256sum file was generated?

December 16, 2015

Permalink

thanks again for churning out an excellent release just a day after i saw the prompt on my non-TBB firefox client to upgrade. the team has done an excellent job of closing this 'release timeline' gap!

December 16, 2015

Permalink

After this update, some Web sites are no longer displayed video. How to deal with it. Is it just me such a problem? And sorry for my clumsy English

December 16, 2015

Permalink

I am OK with donations but never donate to organizations
sporting some individual as a front, usually to much about their ego
and not about the core values.

I donated before, very small sums admittedly,
but will refrain from donating this time since
I do not like this campaign.

Will give more in the future though cause I love
the product.

Keep up the good work!

Just speculation, but I think they use individuals for the donations campaign for the same reasons as "This Is What a Tor Supporter Looks Like." Tor has been in the news a lot lately for being used by Cryptowall randsomware, illegal auction sites, illegal porn sites, illegal hacking/warez sites, and other criminals. Tor is in danger of having its abuse cases more well known than its use cases. TIWATSLL puts a face on the Tor user and tries to show everyone how many good people need and use Tor. Nothing egotistical about it in my opinion.

December 16, 2015

Permalink

Was happy to get a new update for tor browser 5.0.5
Until I could not play Pandora Radio.
It said i needed to install a flash player plugin 10 or higher.
I have ver. 20 installed.

Finally I could not make it worked so went back to Tor browser 5.0.4
Now Pandora Works again.

I was about to update and try this:
uncheck "Change details that distinguish you from other Tor Browser users" in Privacy and Security Settings

i did change the setting and Updated but not to ver 5.0.5.

I got Tor Browser version 5.0.6. and the setting is still not checked.

Anyway since I have the right update I am not asked to update and Pandora radio is working.

THANKS

It said i needed to install a flash player plugin 10 or higher.

Don't ever install Adobe Flash. It's lots of security vulnerabilities and is the favorite of hackers. In fact it's The Hacking Team's favorite launchpad.

Apple dumped it ages ago.

P.S.: We know who you are. You're trying to get unsuspecting Tor users to either install a very defective software like Adobe Flash or revert to using an earlier version of TBB whose vulnerabilities have been fixed in the latest release. Well, keep on trying. You're doomed to fail.

December 16, 2015

Permalink

I have same problem with flash, don't work in 5.0.5. I went back to 5.0.4., disable automatic update but it's keeps update Tor on 5.0.5 again...and again...

I have same problem with flash, don't work in 5.0.5. I went back to 5.0.4

Hackers and the NSA love Adobe Flash because they're able to embed malicious scripts that de-anonymize users.

Your real IP address may be revealed if you use Adobe Flash.

Did you know that 5.0.4 has many security vulnerabilities and 5.0.5 has been released to fix them?

Flash palyer have problem with 5.0.5

Flash itself has many security vulnerabilities, several of which hackers and the NSA have used to de-anonymize the user, that is, to reveal your real IP address.

December 16, 2015

Permalink

I run windows 10 home

I have tried it again by accepting the update to 5.0.5

and tried www.pandora.com

and this is the message I get from pandora:

In order to use Pandora internet radio, please upgrade to a more current browser
or install a newer version of Flash (v.10 or later).

Going back to tor browser 5.0.4

In order to use Pandora internet radio, please upgrade to a more current browser
or install a newer version of Flash (v.10 or later).

Going back to tor browser 5.0.4

Adobe Flash has many security vulnerabilities so much so that The Hacking Team is expoiting them for financial gain.

Apple dumped it many years ago in favor of open standards.

Reverting to using TBB 5.0.4? Why do you think Tor developers released 5.0.5? Is it for their amusement or just to show off their IT prowess?

December 16, 2015

Permalink

I had one of my Tor Browser Bundles update from 5.0.4 to 5.0.5 and I saw the Laura Poitras quote ONCE before I accidentally closed it. I reopened it and refreshed it a couple of times to show someone her quote but it showed other people's quotes before stopping altogether. My other Tor Browser Bundle does not even see the update yet... it is all very frustrating :(

The banner only displays a limited number of times. If you keep refreshing, it'll disappear eventually. If you want to see the banners again, delete Tor Browser and re-install it.

December 18, 2015

In reply to gk

Permalink

Hi gk,

A small suggestion:

You might want to caution users that doing so is not good for their anonymity.

It's clear that for people foolish enough to use Flash all bets are already off, but you are a tp.o developer, your comments are highlighted, it would be better if you don't (albeit inadvertently) increase the cacophony and misinformation which already abound.

Many thanks to you and the rest of the tp.o guys!

December 16, 2015

Permalink

Having the same problem with flash as the other users. Even after enabling plugins and choosing 'ask to activate' or 'always activate' in the add-on menu, flash still doesn't work. I have the latest version of flash installed and have Windows 10.

December 16, 2015

Permalink

Flash player set to ' Ask to Activate' as always. Worked fine on every previous version.
Now it doesn't work, it doesn't ask to activate, it doesn't do a bloody thing.
Tried setting to always activate, still nothing.
:-(

Flash player set to ' Ask to Activate' as always. Worked fine on every previous version.

Why do you guys use TBB to watch Flash videos?

Don't you guys know that watching Flash videos may de-anonymize/un-mask your geo-location? Hackers and the NSA have been known to surreptitiously embed their Flash videos with malware scripts in an effort to uncover the real IP of downloaders such as you. CONSIDER YOURSELF WARNED.

December 16, 2015

Permalink

I saw the donation campain so I tried to donated in BTC but OMG bloody captcha @ BitPay so I gave up.

Bitpay? For donations? Really? Thanks for letting me know; I'd rather not pay a commercial payment processor a fee on my donation to a nonprofit. Bad enough the basic Bitcoin transaction fee is as high as it is.

Great jobs guys for coming up with stupid excuses not to donate to Tor. I believe Bitpay has no transaction fee for nonprofits anyway.

December 16, 2015

Permalink

On XP, 5.0.4 -> 5.0.5 software update failed. I am getting a window stating that, and then 5.0.4 starts. The error window advise me to close any other firefox that might be running, and try again. I had a firefox 42 --no-remote running when tor tried to install its update. I have closed it. But the update insists it can not be installed. The problem persists even though I upgraded firefox to 43, and that upgrade disabled httpsEverywhere for firefox 43. Tor upgrade failed even when firefox 43 is closed.

The error msg reported can appear when TBB resident drive does nor have enough free space left to hold the update and ancillary files to be created by the updater.

That condition will make the update attempt fail AND leaves the user with even less free space left. I have observed the space used in the TBB dir in Linux more than doubling from just one failed update attempt.

If there is a rollback/undo guide or script to solve this problem, I am unaware of it. There really ought to be one that even newbie users can understand and employ.

The TBB updater really should check the users drive to be sure there is enough free space before beginning the version upgrade process; the results should be reported to the user to allow an informed update or cancel decision.

December 16, 2015

Permalink

Would you make this "broser only"?
I want to use my own proxy, to switch Tor and internal SOCKs.

Tor Broswer ---> My Proxy ---> Tor or Socks.

December 16, 2015

Permalink

Also, when do you release Only-Tor for windows?
I have to strip tor.exe and DLLs everytime you guys packed with unpackable executables.

December 16, 2015

Permalink

Something is wrong with the guard node (The first IP in tor circuit) It now keep on changing.

The guard node (The first IP in tor circuit) is not changing for me on 5.0.5 when I restart tor, or I click new identity or new circuit for this site, it's on win xp, I don't know if this happens on tails os. Is this a bug or something?

5.0.4 is much better. 5.0.5 is too slow.

What is your definition of "5.0.4 is much better"? Much better in terms of what?

Why do you think Tor developers released 5.0.5? Is it for their amusement or just to show off their IT prowess?

December 16, 2015

Permalink

I really wish you could rebase to a newer version of Firefox.

Specifically, I would love anything after Firefox 43 for the support of Subresource Integrity hashing.

https://wiki.mozilla.org/Security/SRI

I want hidden services to be able to publish the hashes of any included or inline js/css files to prevent modification.

From a stability and maintainability point of view is the ESR series much better for us. We tried to follow the rapid releases as you suggested a couple of years ago but decided that it is too much work for too little benefit given that a lot of new features need to get altered in order to comply with our privacy goals.

December 17, 2015

In reply to gk

Permalink

From a stability and maintainability point of view is the ESR series much better for us.

Totally agree. I support Tor developers' decision on this one.

We tried to follow the rapid releases as you suggested a couple of years ago

Yes you guys did. I was one of the users. That was about two years before the Edward Snowden's leaks.

December 16, 2015

Permalink

Why can't any PluggableTransports such as meek-azure,scramblesuit,fte and so on be used in China

December 17, 2015

In reply to by Anonymous (not verified)

Permalink

Why can't any PluggableTransports such as meek-azure,scramblesuit,fte and so on be used in China

Can you read Mandarin Chinese? The so-called Father of the Great Firewall of China and some of his colleagues published a research paper on Tor: "Towards measuring unobservability in anonymous communication systems", Journal of Computer Research and Development, 2015, 52(10): 2373-2381.

The PDF version can be downloaded from: http://crad.ict.ac.cn/CN/abstract/abstract3031.shtml# The file size is about 6861 KB.

The existence of this paper is interesting, but it is not the reason why some pluggable transports are currently blocked. The paper is about potential future censor capabilities, not current capabilities. Another recent paper along these lines is "Seeing through Network-Protocol Obfuscation", which I like because they paid attention to the cost of false positives.

We know why some pluggable transports are blocked. All the default bridges (the ones you can select under "Connect with provided bridges") are blocked by the GFW, with the exception of meek-azure and meek-amazon. Therefore you have to use meek or custom bridges. (You can get custom bridges from https://bridges.torproject.org/ or bridges@torproject.org.)

But even with custom bridges, you have to use an obfs4 or scramblesuit bridge, because the GFW uses active probing to discover other protocols like obfs3. (obfs4 and scramblesuit are resistant to active probing.) A custom fte or fte-ipv6 bridge might work too.

meek-google doesn't work because all Google services are blocked in China.

December 17, 2015

In reply to dcf

Permalink

But even with custom bridges, you have to use an obfs4 or scramblesuit bridge, because the GFW uses active probing to discover other protocols like obfs3. (obfs4 and scramblesuit are resistant to active probing.)

Tails, the Live CD/USB, is unable to work with obfs4.

We've informed Tails' developers about it for about 6 months now.

December 18, 2015

In reply to by Anonymous (not verified)

Permalink

Yes,I can because I am Chinese.I prefer PluggableTransports close source rather than be blocked easily.Please make a Closed source PluggableTransports.

I prefer PluggableTransports close source rather than be blocked easily.Please make a Closed source PluggableTransports.

wo de tongzhi, nihao!
(Hello, Comrade)

That's not gonna happen....now and in the future!

Tor, by design, is open source and will remain so.

December 17, 2015

In reply to dcf

Permalink

custom obfs4 or scramblesuit bridge

I know it for a fact that obfs4 bridges don't work in Tails, the live CD/USB.

I assume this has to do with PMTU Discovery being broken in Tails due to (what I consider) an overaggressive firewall configuration. As far as I know on networks with with standard link MTU, obfs4 works fine.

Any one of:
* Clamping the interface MTU to the correct value for your network config.
* Changing the firewall configuration to accept ICMP Unreachable packets.

Should resolve the issue. It's not anything I can really work around easily from userland, so it's up to the Tails developers to fix this.

After updating to 5.0.5 I can no longer open options. Using Win XP SP3

Are you still using the end-of-support Win XP? Seriously?

Microsoft cautioned users against using Win XP as the former no longer issues security fixes.

XP is still supported after registry hack.

Ha, Ha, Ha....

Can you see how illogical your statement is?

Firstly Microsoft Windows XP is written in code that is proprietary. Both you and I haven't seen it but the NSA has.

Secondly hacking Windows registry may introduce instability to the whole OS. Why would one use an unstable, closed source OS?

Thirdly there exist many Linux distros (slang for distributions) that are FOSS (free open source software). Take a leap of faith and regain your freedom on the internet: Start your migration from the NSA-hackable closed source Microsoft Windows to Linux or any of the *BSD distros.

December 16, 2015

Permalink

Is it just me or sometime around a week ago Crudflare flipped the switch and blacklisted the whole Tor network?

Why the fuck is half the public Internet behind their servers?

For me this has been going on for a lot more than a week ago. Half the public Internet is behind their servers because the men behind the curtains control the media, most of the governments and a large fraction of the Internet's infrastructure, and are relying on Crudflare (I liked it) to stop Tor altogether.

"Is it just me or sometime around a week ago Crudflare flipped the switch and blacklisted the whole Tor network?"

I noticed this too. At first it was only a small set of sites but several days ago it seems like most of the sites I visit have this BS Cl0udf1are page.

You can mash the "New Tor Circuit For This Site" option until the page loads, if you're lucky, but it's to the point now where I mash the option over a dozen times on each of these Cl0udf1are sites and I rarely get past it to the content.

If I'm very fortunate, I'll eventually reach the real site. But browse there for longer than a few minutes/clicks and it's back to the Cl0udf1are blocking page again.

It's bullshit and it needs to stop. Someone needs to develop a work around, or some type of feature where when it lands on a Cl0udf1are page, it automatically tries a new circuit, and does this quickly until the Cl0udf1are pages are gone.

It's becoming more and more obvious that someone wants to destroy Tor and if they can't do it with code, they do it with these shitty Cl0udf1are page blocks.

You can still use ixquick's web proxy or other free web proxies, but, and maybe I'm wrong, I read somewhere that using a web proxy through Tor may pass your unique real world IP and/or the entry node of your Tor session. Please correct me if I'm wrong.

This Cl0udf1are shit really, really sucks. Please do something about it.

While I don't think enabling JavaScript is a good idea over Tor, it does fix the Cloudflare captcha pages.

For example, you normally browse with JavaScript disabled (via NoScript or Tor Browser's security slider) and you come across a Cloudflare "One more step" page with a captcha. You correctly type the captcha letters into the textbox and hit Enter, but it doesn't work; every time it just keeps showing you a new captcha. The problem is Cloudflare needs JavaScript enabled in order to properly execute the captcha. If you enable JavaScript and reload the page, it will work. You may even find that the new JavaScript captcha is significantly easier to solve, such as going from "frmultyn htryntu" to simply "312."

However, if you do this, I'd suggest disabling JavaScript again after completing the captcha.

While I don't think enabling JavaScript is a good idea over Tor, it does fix the Cloudflare captcha pages.
.......
However, if you do this, I'd suggest disabling JavaScript again after completing the captcha.

Caution guys: if you're using the above method on Microsoft Windows OS, you may expose your real IP geo-location.

To be really safe, use Tails. You may enable JavaScript all the time if you use the live CD/USB.

Caution guys: if you're using the above method on Microsoft Windows OS, you may expose your real IP geo-location.

How does that happen, can you explain it please?

Not the same anon, but I think he meant this:

Vulnerabilities: security-sensitive bugs. Some vulnerabilities can allow the attacker to escape the sandbox and execute code capable of determining your "real" IP (and other identifying information).

While it's true that vulnerabilities can occur in any kind of software, the JavsScript engine in Firefox has proven a fertile source (the same is true for the other major browsers). Therefore, enabling JavaScript constitutes a significant increase in risk of de-anonymization.

Unless you use an environment like Tails, Whonix, or a properly configured Qubes [1], which "torify" applications at a deeper level, and as a consequence, even if the attacker can execute user-space code, it will not necessarily gain access to identifying information like your "real" IP ([2].

[1] All of which are GNU/Linux systems, by the way.
[2] In the case of Tails, only if it's not privileged code: if the attacker gains superuser privileges your IP is compromised. This is not necessarily the case for Whonix and Qubes.

First of all, while it may be possible for Tor Browser to find a way to work around Cloudflare it would be easy for Cloudflare to fix that loophole. You'd still end up having to deal with Cloudflare pages most of the time. To make matters worse, it would make Cloudflare less likely to want to find some type of solution. This isn't the first time Cloudflare has had difficulty with tor, but in the past times they have eased up after a while. If you piss them off they're less likely to ease up.
Despite what you seem to think, Cloudflare's blocking isn't an attempt to destroy tor. They still allow access from tor, you just need to fill out a Captcha and have javascript enabled. Yes, the latter requirement might not be one you want to have, but they could easily just ban all access from the tor network. In fact, that would be easier than the whole Captcha "solution."
Using a web proxy through tor in the way you're suggesting won't leak your IP or entry node. It may make it easier to make traffic correlation attacks or insert malicious code or objects but it isn't all powerful.
Of course, there is another solution to dealing with Cloudflare on a case by case basis: ask the sites you visit to stop using Cloudflare. It's a service. A website has to choose to use it. They can easily choose to not use it or stop using it.

Cloudflare is annoying, but sometimes, not always, getting a new Tor circuit for the site does the trick. I can't ever read their Captchas anyway. If it hasn't worked after a few changes of circuit I just give up in the realization I wasn't that interested in reading the page anyway. Their loss.

You can still use ixquick's web proxy or other free web proxies, but, and maybe I'm wrong, I read somewhere that using a web proxy through Tor may pass your unique real world IP and/or the entry node of your Tor session. Please correct me if I'm wrong.

You are wrong. A web proxy, an HTTP(S) site you visit though Tor, will not get any more information about you than any other HTTP(S) site.

However, I fear that, unless you are smart in the way you containerize/diversify your web proxy usage, it could increase your fingerprintability. It is much less convenient and more complicated than just clicking "New identity" in TorButton (it involves having a pool of usable web proxies and thinking carefully which one you use for a given session). This are just my own ruminations, though. Maybe some Tor developer can comment about this.

I've seen this as well. My logs say it started Dec 11 (I have my RSS reader set up to fetch news over Tor). Pretty much every exit node I try gets a captcha now.

What I would like to know is what changed? Why doing this now?

Dec. 11 corresponds to my experience as well. Nearly 100% since, and the rare circuit that does get through will be blocked within a handful of page views.

December 17, 2015

Permalink

i used to run tor browser in sandboxie and only allow "firefox.exe" and "tor.exe" to connect to internet with sandboxie restriction setting.

After upgrade, i keep getting "program cannot access the internet due to restrictions - firefox.exe" even "firefox.exe" is allowed in the restriction setting.

i used to run tor browser in sandboxie and only allow "firefox.exe" and "tor.exe" to connect to internet with sandboxie restriction setting.

What OS are you using?

Why would you want to run TBB in a sandbox when there's an FOSS (free open source software) that has been customized to route all internet traffic through Tor?

Why would you want to reinvent the wheel?

December 17, 2015

Permalink

could you add a version without banner ?
at least i hope the next release will be without this advert/harassment !

December 17, 2015

Permalink

" uncheck "Change details that distinguish you from other Tor Browser users" in Privacy and Security Settings."

I can't see this option in privacy or security option menu . How do I get to them ?

December 17, 2015

Permalink

Before, my ip changed rarely on a website. now every page load my exit node ip changes. changelog does not mention this update, whats happened? because ips change, my connection doesnt always work because of bad exit node.

thank you tor team, i would donate but im scared ill be added to watchlist :(

December 17, 2015

Permalink

i problem i am having is Disconnect.me does not load (top bar loads but results do not), it also complains of no cookies, but I am using cookies

i problem i am having is Disconnect.me does not load (top bar loads but results do not), it also complains of no cookies, but I am using cookies

What OS are you using?

Have you ever considered using Tails, the live CD/USB?

December 17, 2015

Permalink

"firefox.exe could not be recognized and it is about to access the DNS/RPC Client Service. Windows DNS/RPC Client service allows applications to perform recursive network connections by using the Windows process svchost.exe"

December 17, 2015

Permalink

The first relay in tor circuit is not changing for me on 5.0.5 when I restart tor, or I click new identity or new circuit for this site, it's on win xp, I don't know if this happens on tails os. Is this a bug or something?

December 17, 2015

Permalink

After update to new version by the inside updater, the search engine list are the same as last version, I find the search engine list from TBB folder, each engine file includes a long special code, not as short as usual URL, from time to time I think, the search engine can know your TBB version as you use the old version search plugin with special code

December 18, 2015

Permalink

" uncheck "Change details that distinguish you from other Tor Browser users" in Privacy and Security Settings."

I can't see this option in privacy or security option menu . How do I get to them ?

------------------------------------------------------------------------------
it's place was in the menu bar, u can see in the Tor logo.

not in the "option" or "add on"

December 18, 2015

Permalink

19-Dec-15 4:00:30 AM.900 [NOTICE] Opening Socks listener on 127.0.0.1:9150
19-Dec-15 4:00:31 AM.500 [NOTICE] Bootstrapped 5%: Connecting to directory server
19-Dec-15 4:00:31 AM.500 [NOTICE] Bootstrapped 10%: Finishing handshake with directory server
19-Dec-15 4:00:31 AM.500 [WARN] The https proxy refused to allow connection to 171.25.193.9 (status code 403, "Forbidden"). Closing.
19-Dec-15 4:00:31 AM.500 [WARN] Proxy Client: unable to connect to 171.25.193.9:80
19-Dec-15 4:00:32 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:33 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:35 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:36 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:38 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:39 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:41 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:42 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:44 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:45 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:47 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:48 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:50 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:51 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:53 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:54 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:55 AM.800 [WARN] Rejecting SOCKS request for anonymous connection to private address [scrubbed].
19-Dec-15 4:00:56 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:57 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:00:59 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:00 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:02 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:03 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:05 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:06 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:08 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:09 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:11 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:12 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:14 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:15 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:17 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:18 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:20 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:21 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:23 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:24 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:26 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:27 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:29 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:30 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:32 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:33 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:35 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:36 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:38 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:39 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:41 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:42 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:44 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:45 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:47 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:48 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:50 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:51 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:53 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:54 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:56 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:57 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:01:59 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:00 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:02 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:03 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:05 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:06 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:08 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:09 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:11 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:12 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:14 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:15 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:17 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:18 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:20 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:21 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:23 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:24 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:26 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:27 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:29 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:30 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:32 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:33 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:35 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:36 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:38 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:39 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:41 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:42 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:44 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:45 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:47 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:48 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:50 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:51 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:53 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:54 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:56 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:57 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:02:59 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:00 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:02 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:03 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:05 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:06 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:08 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:09 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:11 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:12 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:14 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:15 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:17 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:18 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:20 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:21 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:23 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:24 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:26 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:27 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:29 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:30 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:32 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:33 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:35 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:36 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:38 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:39 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:41 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:42 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:44 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:45 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:47 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:48 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:50 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:51 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:53 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:54 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:56 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:57 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:03:59 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:00 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:02 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:03 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:05 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:06 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:08 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:09 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:11 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:12 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:14 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:15 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:17 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:18 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:20 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:21 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:23 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:24 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:26 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:27 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:29 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:30 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:32 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:33 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:35 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:36 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:38 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:39 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:41 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:42 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:44 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:45 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:47 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:48 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:50 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:51 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:53 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:54 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:56 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:57 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:04:59 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:00 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:02 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:03 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:05 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:06 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:08 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:09 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:11 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:12 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:14 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:15 AM.700 [WARN] socks5: command 3 not recognized. Rejecting.
19-Dec-15 4:05:16 AM.500 [NOTICE] Closing no-longer-configured Socks listener on 127.0.0.1:9150
19-Dec-15 4:05:16 AM.500 [NOTICE] DisableNetwork is set. Tor will not make or accept non-control network connections. Shutting down all existing connections.
19-Dec-15 4:05:16 AM.500 [NOTICE] Closing old Socks listener on 127.0.0.1:9150
19-Dec-15 4:05:17 AM.400 [NOTICE] Delaying directory fetches: DisableNetwork is set.

December 20, 2015

Permalink

I understand that other people use the tor browser for many different situations.

Me the only reason I use it si for access to the PANDORA radio.
It is restricted in my country. but not in US

So when you update has found a solution for me to get PANDORA I will update.

when I update to 5.0.5 and go to pandora I am anonimous and get access to the site, but it finds that in that version of the browser the flash player does not work, the site cant be played.

So until then, I will stay with 5.0.4

when I update to 5.0.5 and go to pandora I am anonimous

By using Flash you are _not_ anonymous. By using an old version of Tor Browser you are, additionally, vulnerable to known exploits.

But suit yourself, I guess.