Partnering with Mozilla

by phobos | November 11, 2014

Mozilla announced that the Tor Project and the Center for Democracy & Technology will be part of their new privacy initiative called Polaris, a collaboration to bring even more privacy features into Mozilla’s products. We are honored to be working alongside Mozilla as well as the Center for Democracy & Technology to give Firefox users more options to protect their privacy.

Why Mozilla?

Mozilla is an industry leader in developing features to support the user’s desire for increased privacy online and shares the Tor Project's mission of helping people protect their security online. At the core of Mozilla's values is the belief that individuals’ privacy cannot be treated as optional. We share this belief. Millions of people around the world rely on the protection of the Tor software and network to safeguard their anonymity. We appreciate companies like Mozilla that see the importance of safeguarding privacy. The Tor volunteer network has grown to the point that large companies can usefully contribute without hurting network diversity. The Tor network will get even better with Mozilla's help, and we hope that their participation will encourage even more organizations to join us.

The initial projects with Mozilla will focus on two areas:

Engineering support: 

The Tor Browser is built on the Firefox platform and we are excited to have the resources of Mozilla’s engineers to help us merge the many Firefox privacy fixes into the Mozilla codebase. The increased attention from Mozilla will give us time to focus on finding and fixing new issues rather than maintaining our fork.

Network Support:

Tor's network size constrains the number of users that can use Tor concurrently. In the short term, Mozilla will help address this by hosting high-capacity Tor middle relays to make Tor’s network more responsive and allow Tor to serve more users.

We believe that the Tor Browser is one of the best ways to protect privacy on the web and this partnership is a huge step in advancing people’s right to freedom of expression online.

Comments

Please note that the comment area below has been archived.

November 11, 2014

Permalink

This Cloudfare crap is becoming a serious pain the butt! It is even throwing up capchas in arabic! depending on where you exit from. Down with Cloudfare and their crap!

Is there any technical solution to the Cloudflare approach?

I mean, if they really need a solution to avoid automated attacks to their customers' servers, is there a way to certify we're human without risks on privacy?
A temporary cookie would solve the problem (or at least mitigate it) but will make it possible to identify the browser.

Maybe also a proposal to Cloudflare to work with Tor team to solve the problem could help: their catpcha approach is reducing the accessibility of their customers' contents directly affecting their business.

It seems like all the other hosting providers can handle Tor users just fine, and have appropriate security measures in place to deal with malicious traffic regardless of its source. Maybe Cloudflare doesn't have as strong a security team as the other players.

Me too.

Make a search for "bypass cloudflare" and you will find some valuable information about their architecture and how to bypass it. Bypassing cloudflare is however a "manual" process and it does not work for every cloudflare domain.

I found that, if you go to a www.domain.tdn that is hosted on cloudflare and you will see their (for me not working) captcha, then you may just type ftp.domain.tdn instead and you get access oftentimes (search for "bypass cloudflare" if you want to know the details).

However, first, this hack does not always work , and, second, problems remain for embedded links like images that are hosted by some Image hoster which in turn uses cloudflare but the Image is embedded in another site that you want to view. Then you won't get to see the image because the browser is presented with the captch page instead of the image and then of course does show nothing.

Cloudflare claims that restricted access for TOR users is not their fault, because site owners can in principle choose between different flavors of automatic blocking. It however seems that blocking everything suspicious (inlcuding TOR) is their default setting. Also, their blocking procedure that does not block TOR access is labeled s.th. like "block almost everything suspicious" whereas the stronger option is labeled "block everything suspicious". Why then should the website operator choose to only block _almost_ everything if he could easily block _everything_ suspicious? They should better Label the TOR enabled option s.th. like "block everything suspicious but allow anonymous access". This would be better to the point. Afterall it should be legitimate to be able to block anonymous access for some websites businesses, but I don't see why someone Image Hosting site wouldn't want to allow anonymous download of images.

I think, we would be much better off already if cloudflare decides to label their blocking options more appropriately.

I have a friend in China I keep in touch with. I want to introduce them to Tor, but I worry this will discourage them from using it. The people at Cloudflare are scum who know full well how much they're hurting Tor.

"The people at Cloudflare are scum who know full well how much they're hurting Tor."

I appreciate your frustration but using such language and tone is counterproductive. It only makes the one using it appear immature and petulant.

Isn't raiding sites and routers more productive? Disrupting communications by falsifying connections more productive? What "product" nsa and others make? For sure they are terrorists and criminals. The more people understand that the better.
And I don't like that new "business letter style" - 'Dear ... friends your finest product is really wonderful and amusing. But I can't get full experience because it does not work.' - instead of simple 'you sell shit'. So keep it that way with these criminal scums.

Circumvent the Cloudflare-trolls by using a simple, free-to-use web proxy like www.my-proxy.com. It works most of them for viewing pages.

And notify the webmaster(s), that Cloudflare's just horrible. Never waste time on their tasks!

I have found out how Cloudflare works.
https://www.quora.com/How-does-CloudFlare-work

The author of this claims to be the CEO of CloudFlare. So, take it with caution.

It acts as a Firewall, DNS-server, caching/filtering reverse proxy, router and uses some type of NAT. The websites using it have 2 URLs from CF as their authoritative name servers. It may even use DPI, record the traffic and meta data. So the issue is how to circumvent a reverse proxy.

Terminology
Reverse proxies are common place in the head-end infrastructure of organisations. They route web (HTTP and HTTPS) protocols from an external request to one of several internal web servers.
http://contextis.com/resources/blog/server-technologies-reverse-proxy-b…

This means your browser gets the ip of Cloudflare which requests content from the website and delivers it to your browser. So content comes from CF instead of the website directly. Since the IP you get returned is one of CF it isn't simple DNS-blocking. A whois delivers IPs of CF.

Note that designating CloudFlare as your authoritative name servers doesn't change anything else about your website's ecosystem. Your registrar remains your registrar. Your hosting provider remains your hosting provider. However, because we are your authoritative name server, we can begin cleaning and accelerating your traffic.

Cleaning means censorship and filtering out actual malicious traffic.

You can view our global CloudFlare network map at:
https://www.cloudflare.com/network-map

After a visitor's browser has done the initial DNS lookup, it begins making requests to retrieve the actual content of a website. These requests are directed to the IP address that was returned from the DNS lookup. Before CloudFlare, that would have been 1.1.1.1, with CloudFlare as the authoritative name server that would be 99.99.99.99 (or some other address depending on what CloudFlare data center is closest to the user). CloudFlare's frontline servers running on that IP address receive the request and perform analysis on it. We scan to see if the visitor appears to be a threat based a number of characteristics including the visitor's IP address, what resource they are requesting, what payload they are posting, how frequently they're making requests, etc.

How many dumb people keep keys from there houses at cloudflare?
Well I believe everybody who delegate there's own services are imbeciles. By the way is it 'legal' to hack dns traffic? Or are they just criminals?
Then where is the great nsa? Was cloudflare raided? I believe I saw some commercial https site unexpectedly change the location - and I stop using it. Seems they start use this criminal service.
So lets new round start - split dns? Just like browsers UA. - I don't like you and i will send you fake data, feed you viruses etc.
And tor devs what about fake collector? Or service like 'our network will prevent you from connecting to spy sites'? And 'our dns will authoritative response to you query based on artificial algorithm for all sites'?

"How many dumb people keep keys from there houses at cloudflare?
Well I believe everybody who delegate there's own services are imbeciles."

Not everyone has the requisite expertise to keep a server/site reasonably secure. In fact, very few people do.

Lacking IT expertise does not make one an "imbecile".

I hate ads too, but perhaps there are ways have non-annoying text-ads without hurting any privacy. DuckDuckGo does something like this, so does StartPage.com.

Careful though, i'd hate to see Tor Project become addicted to ad revenue. Make sure to never rely on it. Be ready to toss it out at time.

Perhaps, have such ads as opt-in.

Ads should be run as a subscription service - it has no connection to privacy. Want ads - subscribe and get them! Mark your prefs etc.
Stop use MY traffic for not selected/ordered by me ads!

ads? what ads? I do not see any ads....
what makes you think the combining of resources of tor and mozilla will bring in ads?
oh, and heres a plug for a nice thing i found for that ad issue you have, AdBlock Plus its a extension for firefox ;-)

November 11, 2014

Permalink

Does it mean:

1- you won't rely on ESR anymore, and move instead to the regular release?

2- TorBrowser's privacy features and enhancement will be integrated in the regular FireFox for all users, tor users and FF alike?

November 11, 2014

Permalink

It's great that Mozilla is running tor relays, but its unwillingness to host exit nodes tells us a lot about the contours of their commitment. If wikimedia can do it, I don't see why Mozilla couldn't.

They are blocking Tor for registered users, too, although they could easily ban the mischief's accounts. There is no reason to prevent long-running accounts from editing with Tor.

Well they need something like svn with option to view previous revisions. In that case i'm fully agree with you. Till then 'long-running account' can be compromised and data be lost. With or without tor... Try to explain that to them.

orwell__46__ means 1946? And isn't "has now no meaning" related to 1946? In 1946 most people believed that that "not desirable" regime vanished _forever_. And I believe he didn't even think where we all are now in 2014.

November 11, 2014

Permalink

"Mozilla will help address this by hosting high-capacity Tor middle relays"

So Mozilla, which financially depends on Google and functionally adapts their browser to Google needs, will know the IP numbers of many guard/exit node pairings.

I wonder what could go wrong.

Nothing stops Google from doing that anyways. The amount of cash they give Mozilla is a pittance compared to what they have. For all we know, Google could already run 90% of all Tor relays. Google doesn't need Mozilla as a middle-man.

Mozilla has a very transparent relationship with google. They take Google's money and give them the top search position. Absolutely nothing else. Please don't spread FUD. I'm sure you're also the guy that uses Google's 'open source' Android.

Firefox reports visited web sites and software downloads to Google with its various "safe browsing" features.

Firefox's interface to remove cookies has been made increasingly obscure for normal users. Thus benefiting Google with its various tracking cookies to follow users all over the web year after year.

And Firefox is eager to send your Location data to Google.

For Mozilla's corporate orientation read with comments:
https://blog.mozilla.org/labs/2013/07/a-user-personalization-proposal-f…
https://blog.mozilla.org/advancingcontent/2014/02/11/publisher-transfor…

ghostery extension for firefox as well as adblock plus and noscript, any more petty issues you have with the most secure and privacay oriented browser, which is open source btw

November 11, 2014

Permalink

There was speculation in the past that Mozilla might be looking into integrating Tor support into Firefox, effectively replacing the existing private browsing mode, but the description of Polaris on the Mozilla wiki [1] falls short of this - has this idea been dropped (if indeed it was ever being discussed)?

[1] https://wiki.mozilla.org/Polaris

I don't think so. At least we are still trying to get all or the most relevant patches into Firefox mainline to get the privacy of all Firefox users enhanced, too. It will take some time, though.

November 12, 2014

In reply to gk

Permalink

"At least we are still trying to get all or the most relevant patches into Firefox mainline to get the privacy of all Firefox users enhanced, too"
Thank you so much, G-d bless you :)

Actually, if you look at the set of people who use private browsing mode, and then consider a subset of those that click the "make it private for real" button, that's a totally manageable 6-figure user number -- especially if organizations like Mozilla step up and help build capacity.

Check out
https://lists.torproject.org/pipermail/tor-dev/2014-September/007538.ht…
and the discussion around it for many more details.

November 11, 2014

Permalink

i am so happy for everyone :D well done !!

Any love for the ricochet IM , onionshare and tails ?

November 11, 2014

Permalink

Well, I guess this's the best news I heard this year! I'm no fan of Mozilla but...

But that ain't why I called.

I've been having issues, this year, with TBB's ability to open. Betimes I needed to log off the system to clear the failed .exe an' try for a second time to get connected.

TBB 4.0.0 too was a bust.

With TBB 4.0.1 I found it necessary to avoid designating an alternative folder for downloading data for this TBB version to operate without crashing the browser - which then requires re-installation.

But the .exe sequence is now seamless. It don't even require that I clear the task bar of wip links. It jus' leaps into action! I retried TBB 3.6.6. Same ol' story of draggin' its heels.

So, good job! Well done!

An' well done with y'alls Mozilla negotiations. We be proud of y'all!

Enjoy the holiday season. Y'all deserve it!

November 11, 2014

Permalink

I've read that there currently is too much middle relay capacity compared to the available exit nodes. While I do appreciate Mozilla's efforts, what is this going to achieve?

well - google.nsa have entry node, mosilla middle and you win - you can tell them to select exit node!!! Some press on devs to tell you it's one node what you need and you have the nsa team at you toilet to get you some paper.

I'll be as clear as i can with this:
If you are using tor, and you genuinely want to stay anonymous because of life and death circumstances, then you had better know the technology in and out, do your research, practice, practice, practice, and you should have much less worry than tor getting the resources it needs from the most solid browser ever distributed

Exit nodes are more valuable, but more middle nodes is not harmful. The reason for this is that stable middle nodes are also guards, and we *do* need more honest, trustworthy guards. Having more guards effectively put up by mozilla reduces the strain on exit nodes because they have to act as guards themselves less and are able to put more resources into pure exit traffic (exit nodes are also middle and guard nodes most of the time, even if their primary traffic goes to their exit functionality). Furthermore, it means an attacker who is trying to mount a traffic correlation attack by putting up rouge guards and exits will need to invest even more resources, because even if getting someone to use a rogue exit is easy due to the relative lack of exits, Mozilla will provide high-bandwidth competition that reduce the chance that a client will chose the attacker's guard.

tl;dr
More exits means faster and safer Tor, but more guards is always a good thing too!

November 11, 2014

Permalink

<3

November 11, 2014

Permalink

Mozilla's a political organization that also makes a browser. While I commend some of their activities commitment to privacy etc), they are also a left-wing organization.

And I'm saddened by this decision by Tor Project. Saddened because Mozilla Firefox is a 3rd-rate browser that's not as secure as alternatives. It lacks numerous security protections and it lacks a good sandbox. It's also vastly easier to exploit (as can be witnessed by looking at CVE reports from the past year).

Tor Project needs a better, more secure, web browser. Mozilla Firefox is simply not it.

Mozilla is working on the sandboxing/isolating content processes and should have something ready soon (you can test it already on the nightly channel). Additionally, we plan to start producing specially hardened Tor Browser builds soon, too. Thus, stay tuned. All the other browsers we have are worse if it comes to our needs and there is lack of resources to get that fixed.

November 13, 2014

In reply to gk

Permalink

gk,

If we go by history and look at growing pains that Chrome, Safari, IE went through, it will take Firefox team at least 3-4 years before their sandbox is as good as alternatives. There's just no way that their bolt-on sandbox will be any good right away. Maybe by 2017 they'll have something comparable to alternatives.

Could you please elaborate on the "alternatives"? Do you mean Icecat/Iceweasel (which would still be forks of Firefox) or completely different browsers?
I am always eager and happy to learn more

Almost sure you're using similar logic:
Left-wing => planned economy fans => stalinists => totalitarian pigs killing mah freedoms => gulag oppression danger => NO NO NO

Ha-ha corporations =>corrupted govs "=> totalitarian pigs killing mah freedoms => gulag oppression danger => NO NO NO"
Seem the same end...

November 11, 2014

Permalink

I agree with the second poster. At this point I wouldn't be surprised to find out that Cloudflare is being run by the NSA for the express purpose of turning people away from Tor and identifying Tor users. The amount of people using Tor will certainly not expand when every new TBB user loads up the browser for the first time and finds out that almost every site they use demands that they fill out a CAPTCHA (some of them in foreign languages and some of them not loading at all due to the connection to the CAPTCHA image being redirected to Google's own "too many connections" CAPTCHA page/domain which will not load inline like reCAPTCHA -- a CAPTCHA to load a CAPTCHA and it doesn't even work!) while suggesting that their computer might be infected with malware. Furthermore, whenever you do enter in one of these CAPTCHAs to view a website, you get a Cloudflare "verification" ID cookie. If your Tor circuit changes, so does your IP, and you have to fill in a new CAPTCHA to browse the site again. But you still have the verification cookie from the old circuit unless you've deleted it, so they can correlate the two circuits together. This is dangerous for inexperienced users who won't practice manual cookie/circuit management.

Am I the only one who finds Cloudflare ridiculous and scary? A few fluff pieces in the news about how it makes your website OMG FASTER and all of a sudden having Cloudflare on your site is common wisdom, like you'd be an idiot not to, and we have a centralized entity controlling who is allowed to access a large portion of the web, with no discernible competition even. It's a psyops wet dream. It spread like a virus.

If Mozilla/Tor Project want to do something really useful, they can negotiate with Cloudflare about what would need to be done to end this insanity, if it isn't simply a government asset like I speculate. Either that or start up a campaign to inform website administrators that they are blocking a very necessary anonymity tool for vulnerable users when they use Cloudflare. Or maybe your average web admin could just stop being such a gullible sheep that does whatever Wired tells them to...

NSA bribed RSA in the past to weaken security. Maybe they are up to their old tricks and bribed Cloudflare the same way, and/or have a couple plants inside the company making bad decisions for them.

November 11, 2014

Permalink

<3

November 11, 2014

Permalink

I feel safer using a fork of Firefox maintained by the Tor developers. It was my understanding Tor forked Firefox because it reduced the workload on Tor developers.

That said, if some of the privacy fixes from Tor developers make it upstream into mainline Firefox. That would be great and reduce their workload even more.

Work smarter not harder. ;)

"I feel safer using a fork of Firefox maintained by the Tor developers."
Same here. I don't trust Mozilla, the only difference between them and google is they advertise caring about privacy, while google doesn't. No other differences exist in matters of Modes Operandi

And when that privacy is inconvenient to them (like, say, their CEO has different political views than them) they have no problem throwing him under the bus. The TorBrowser fork is safer.

Unfortunately, I have no reason to think that the Tor Project would have handled a Brendan Eich-type situation any better than Mozilla did.

execs are public face of corporation, aka "leadership".
insurmountable conflict when 'leader' of pro-freedom org opposes freedom.
so organization must fire 'leader' fire for malfeasance.

When you load firefox, first thing you do is go to IXQUICK.COM and set it up as your home page
ixquick uses google results without maintaining a database on your searches

chech it out

tell your friends

No, don't. Set about:blank as your homepage. Remember, ixquick / startpage or DuckDuckGo or whatever - another for-profit company. And it is quite a trend to do "We protect you" services. Do use them, as they don't add you hassle like as Google does with it's "automated requests" thing, but do not trust them anything else, what is not related to your search queries.

November 11, 2014

Permalink

Why CDT instead of EFF as a partner? CDT is more demonstrably beholden to major tech companies like Google via New America and other avenues (e.g. their laughably weak policy positions on various pieces of legislation), and EFF--at least historically--has a reputation for having a deeper bench of technical expertise. I totally understand the rationale for partnering with Mozilla, but CDT is much less clear.

So Andrew, how did The Tor Project end up partnering with CDT instead of EFF/EPIC/PK/etc., and what value do you expect CDT to contribute to the project?

November 11, 2014

Permalink

I would hope mozilla run Tor Relay and exit nodes on every FF installation on the desktop in background.

November 11, 2014

Permalink

--Mozilla has always been for privacy, on the other hand, Google does not care about privacy...good alliance with Mozilla.
--Cloudflare does not function well...it needs to change or be replaced.

November 11, 2014

Permalink

I need help with regards to the Vidalia Bridge Bundle.
How do I delete the Vidalia Bridge Bundle off my computer?
My computer won't let me delete it.
I downloaded it as an experiment, my ISP does not block me connections to the Public Tor Network.
Any help would be appreciated.

November 11, 2014

Permalink

When IE try to rules internet, Mozilla browser Save us.
Today we have a worst problem with privacy...
Tor project is the new revolution
Good idea and Good luck

November 12, 2014

Permalink

Hmmm... No, no, no, I don't like the perspective of Tor
being swallowed by Mozilla, if that's what is happening
in any sense (of course you're not going to admit if it's the case).

Their money may be good to take, but what is the counterpart ?

Firefox has been turned into a 3rd rate dinobrowser, with especially dubious choices in the domain of security and privacy. I hope you can veto dangerous options and will stay fully free to build a more secure Tor browser. Better yet, I do hope this move doesn't mean you're going to stop providing easy access to standalone "Tor only" builds for popular platforms. I don't buy the "get anonymity by merging in the TBB-users crowd" motto.

November 12, 2014

Permalink

Contact the web administrators and tell them Cloudflare's captcha is making them lose visits. I did it and not a single captcha since then.

http://peerjs.com/

This isn't the best solution, but it's a lot better than Cloudflare.

November 12, 2014

Permalink

Really great, thumbs up for the Tor Project and Mozilla. Thank you for all the amazing efforts that went into the development of Tor ecosystem. Tor is great!

November 12, 2014

Permalink

I have a few websites that report breaking news hours, if not days before the mainstream media. The fact that this happens, should alarm every person who learns this fact.

November 12, 2014

Permalink

Won't these high capacity middle relays eventually become fast guards (and because of the new flag assignment process, possibly both guards and exit relays simultaneously) or can the directory authorities restrict flag assignments even if the relay is eligible? By "can" I mean "should they" I suppose?

November 12, 2014

Permalink

Fuckoff the captchas!, write the man OCR word wrong ;),and don't let them gets money helping google ocr books.

November 12, 2014

Permalink

It sounds like they are doing some good things when it comes to privacy. Too bad Mozilla is so intolerant of diverse opinions, ousting the creator of the browser for his political speech. The bigger problem is both of the other browser companies are likely even more intolerant of diverse opinions.

Anybody know of a browser besides, IE, Chrome, and Firefox that doesn't have the ideological baggage?

"Too bad Mozilla is so intolerant of diverse opinions, ousting the creator of the browser for his political speech."

I'm glad to see others who object to the deplorable way in which Brendan Eich was treated by the very entitiy that he had helped found and build to what is today.

Just to be clear, the political expression of Eich's that cost him his job consisted of nothing more than a personal donation he had made to a cause that happens to run afoul of current McCarthyesque political and social orthodoxy-- orthodoxy that, at least in the particular area in question, Mozilla prides itself upon being an exemplar of. Eich's donation (and any other expressions he may have made or actions he may have taken in support of the cause in question) was wholly and unambiguously discrete and distinct from his position and role at Mozilla. Yet, despite this salient fact, Eich's colleagues at Mozilla, along with many of the sheeple from the indoctrinated masses all-too-eager to prove their purity and virtue in an area very much in vogue, joined together in a mass spectacle of self-righteous, moral preening. Whether or not anyone at Mozilla ever actually told Eich, who reportedly "resigned", to step-down and/or leave the organization seems to be of little consequence here. An environment that was unmistakably hostile toward Eich had been created at Mozilla.

November 12, 2014

Permalink

Mozilla = feminist coven.
Feminists have had projects removed from sourceforge in the past because the author was against women's empowerment.

"Feminists have had projects removed from sourceforge in the past because the author was against women's empowerment."

Wouldn't a more accurate or objective statement be,

Projects have been removed from SourceForge in the past, when their authors were charged, by individuals and/or groups calling themselves "Feminist", with being "against women's empowerment",

or something similar?

November 13, 2014

Permalink

This is really a good news for the freedom web surfers. My warm welcome to Firefox & Tor for such type of initiation.

Can you both integrate some good add-ons with the browser to play flash. As of now flash is a great security threat to security & anonymity
Sorry for my bad English.

Best Regards
White Panther.

A good initiation is the first step for a great achievement.

November 13, 2014

Permalink

It is not just Cloudfare that is in danger of destroying Tor. If you exit through a French exit node you will be confronted with a notice something like this: "Confidentialité- France

Notre réseau a détecté que vous êtes localisé en France.

SlashdotMedia accorde de l’importance à la vie privée de nos utilisateurs.

Les lois françaises exigent que nous obtenions votre permission avant d'envoyer des cookies à votre navigateur Web.

Notre site dépend de ces cookies pour fonctionner correctement.

S'il vous plaît cliquez sur le bouton: «Accepter l"

Don't worry; it is only asking for your consent to place cookies on your device. Problem is you can't get past this crap with Tor, even with Javascript enabled.

There is also another pop-up box from some outfit call consent.? that you similary you can't browse past with Tor with or without Javascript running. So, Tor French exit nodes are effectively useless!

November 13, 2014

Permalink

Privacy- France

Our system has detected that you are located in France.

SlashdotMedia attaches importance to the privacy of our users.

French laws require us to obtain your permission before sending cookies to your web browser.

Our site depends on cookies to function properly.

Please click the "Accept Cookies" to continue browsing our site.

My browser setting has already informed you of my cookie permission policy, according to french law (supposed) intent.
But I thank you for (supposedly) redundantly allowing me to only accept cookies in order to inform you of my policy to reject cookies.

November 13, 2014

Permalink

its super funny back in the day people pointed out that cookies would end up being used to do evil shit track people and all that shit and those people were call "conspiracy theorist" now it has all happened ,like most things "conspiracy theorist" say and even after these things happen they still use that term to try and silence people

November 14, 2014

Permalink

It's not just French exits, it is or will soon be affecting all exits
in the European (so-called union), as the law in question is but (obligatory) "tranposition" off a European "directive". (where "directive" is Brusselspeak for "law").

Don't panic though ! The pop-up is for information only, it in general DOESN'T HAVE TO be clicked off to effectively browse a site, in my experience.

November 14, 2014

Permalink

is Tor still Safe???

when next tor version is released??

i wonder will you Fix Lake security on next Tor version?

no one grant anything at least use common sense and tor browser. it's better then others browsers. and change useragent for another os of course.

Changing the default user agent string in Tor Browser is emphatically NOT recommended. Doing so will make one stand-out from other TB users.

November 15, 2014

Permalink

Has @mozilla renounced and moderated their n-zi tendencies? What about those who don't agree with them on social issues? Can @mozilla really be your friend when they are as tolerant as isl-mo-f-cists?