Tor Browser 6.0.7 is released
Tor Browser 6.0.7 is now available from the Tor Browser Project page and also from our distribution directory.
This release features an important security update to Firefox and contains, in addition to that, an update to NoScript (2.9.5.2).
The security flaw responsible for this urgent release is already actively exploited on Windows systems. Even though there is currently, to the best of our knowledge, no similar exploit for OS X or Linux users available the underlying bug affects those platforms as well. Thus we strongly recommend that all users apply the update to their Tor Browser immediately. A restart is required for it to take effect.
Tor Browser users who had set their security slider to "High" are believed to have been safe from this vulnerability.
We will have alpha and hardened Tor Browser updates out shortly. In the meantime, users of these series can mitigate the security flaw in at least two ways:
1) Set the security slider to "High" as this is preventing the exploit from working.
2) Switch to the stable series until updates for alpha and hardened are available, too.
Here is the full changelog since 6.0.6:
- All Platforms
- Update Firefox to 45.5.1esr
- Update NoScript to 2.9.5.2
Update: We would like to remind everyone that we (The Tor Project) are having our 2016 fundraising campaign! Donate today!
buen dia alguien aca habla
buen dia alguien aca habla español
hi good morning were speak spanish ?
mi inglish bery bad bery bery bad
thanks so much for rapidly
thanks so much for rapidly releasing this update and communicating openly with users and the community about the situation!
If you want to be sure just
If you want to be sure just max out the slider AND set javascript.enabled=false in about:config. Just remember to set it back to =true if you ever lower the slider(which should be never). If you have javascript=false with the slider on low your browser will be easier to fingerprint (see https://panopticlick.eff.org/).