New Release: Tor Browser 8.5a6
Tor Browser 8.5a6 is now available from the Tor Browser Project page and also from our distribution directory.
This release features important security updates to Firefox and updates OpenSSL to 1.0.2q for our desktop platforms.
The most exciting news, however, compared to the alpha release early last week, comes from progress we made on our mobile builds. Tor Browser 8.5a6 is the first version that is built reproducibly for Android devices and is localized in all locales the desktop platforms support.
Moreover, we added an updated donation banner for our year-end donation campaign.
Known Issues:
- This release is only supported on armv7 devices (most Android phones and tablets), but x86 devices are not supported yet (such as Chromebooks), even if the Google Playstore is suggesting different things.
- Downloading files on newer Android devices crashes Tor Browser. We are currently reviewing a potential fix.
The full changelog since Tor Browser 8.5a5 is:
- All Platforms
- Update Firefox to 60.4.0esr
- Update Torbutton to 2.1.3
- Bug 28608: Disable background HTTP response throttling
- Bug 28695: Set default security.pki.name_matching_mode to enforce (3)
- Bug 27290: Remove WebGL pref for min capability mode
- Bug 27919: Backport SSL status API
- Bug 25794: Disable pointer events
- Windows
- Update OpenSSL to 1.0.2q
- Bug 28740: Adapt Windows navigator.platform value on 64-bit systems
- OS X
- Update OpenSSL to 1.0.2q
- Linux
- Update OpenSSL to 1.0.2q
- Android
- Bug 26843: Multi-locale support for Tor Browser on Android
- Build System
Would you test a 32-bit…
Would you test a 32-bit debug build to get more information about the shutdown crash you are seeing?
Isn't it easier to update…
Isn't it easier to update the ancient VS 2010 CRT?
Well, maybe, if that's the…
Well, maybe, if that's the issue. The debug build could help finding that out.
https://www.bitdefender.com/…
https://www.bitdefender.com/ is broken in TBB.
Suggestions?
Suggestions?
No unconditional uses of…
No unconditional uses of SSE2 instructions on x86!
https://bugzilla.mozilla.org/show_bug.cgi?id=1492065
Could you be one of that adequate downstreams?
I think we decided to not…
I think we decided to not support SSE2 starting from ESR60 on to not diverge even more from Mozilla code and run into the risk of shipping essentially untested Mozilla code.
It would be the risk only…
It would be the risk only for machines without SSE2 which is rare. And such logic didn't prevent you from shipping essentially untested Mozilla code for Windows and Android. One of the goals of Tor Project was to diverge even more from Mozilla code towards saner code, wasn't it?
Interesting https:/…
Interesting https://phabricator.services.mozilla.com/D14232