<?xml version='1.0' encoding='utf-8'?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Tor Project blog</title><link href="https://blog.torproject.org/" rel="alternate" /><link href="https://blog.torproject.org/feed.xml" rel="self" /><id>urn:uuid:201c3fb3-b4bd-3a4e-85ed-16327d11d7a6</id><updated>2026-04-21T00:00:00Z</updated><author><name>The Tor Project</name></author><subtitle>Official channel for news and updates from the Tor Project</subtitle><entry><title>New Release: Tor Browser 15.0.10</title><link href="https://blog.torproject.org/new-release-tor-browser-15010/" rel="alternate" /><updated>2026-04-21T00:00:00Z</updated><author><name>ma1
</name></author><id>urn:uuid:634dc293-d1b0-33a3-9654-fc5de56e946e</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-15010/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-15010/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-15010/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 15.0.10 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/15.0.10/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-15.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 15.0.9 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated OpenSSL to 3.5.6&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44749"&gt;Bug tor-browser#44749&lt;/a&gt;: Check search engines parameter replacements&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44852"&gt;Bug tor-browser#44852&lt;/a&gt;: Rebase Tor Browser stable onto 140.10.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44859"&gt;Bug tor-browser#44859&lt;/a&gt;: Backport Bugzilla 1666613: Display XML error pages in the browser directionality while force LTRing the XML code itself, without the use of intl.css&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44863"&gt;Bug tor-browser#44863&lt;/a&gt;: Backport Security Fixes from Firefox 150&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41775"&gt;Bug tor-browser-build#41775&lt;/a&gt;: Update list of Snowflake STUN servers in default bridge line, 2026 edition&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 140.10.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44288"&gt;Bug tor-browser#44288&lt;/a&gt;: New identity fails to block loading a custom home page&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 140.10.0esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41767"&gt;Bug tor-browser-build#41767&lt;/a&gt;: Add jwilde to allowed signer for browser projects&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + Linux + Android&lt;ul&gt;
&lt;li&gt;Updated Go to 1.25.9&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Code audit for Tor VPN completed by Cure53</title><link href="https://blog.torproject.org/code-audit-tor-vpn/" rel="alternate" /><updated>2026-04-15T00:00:00Z</updated><author><name>micah
</name></author><id>urn:uuid:f5816507-d929-3214-9508-56022f2e7682</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/code-audit-tor-vpn/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/code-audit-tor-vpn/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/code-audit-tor-vpn/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Over the past several years, the Tor Project has been working to expand its mobile privacy offerings, including the development of TorVPN and its supporting components. This work is aimed at making Tor-based protections more accessible while maintaining strong security guarantees.&lt;/p&gt;
&lt;p&gt;As part of this effort, in June 2025, Cure53 conducted a penetration test and source code audit of TorVPN for Android.&lt;/p&gt;
&lt;p&gt;The assessment covered both the Android application and the underlying Onionmasq networking layer responsible for DNS resolution and traffic handling.&lt;/p&gt;
&lt;h2&gt;Audit findings&lt;/h2&gt;
&lt;p&gt;The audit covered two primary areas:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;TorVPN for Android: the mobile application responsible for routing device traffic through the Tor network&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Onionmasq / Tunnel Interface for Arti: the Ruse-based networking tunnel layer handling low-level network traffic forwarding, including TCP/UDP parsing, DNS resolution, and routing to the Tor network through Arti.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Key findings&lt;/h3&gt;
&lt;p&gt;The audit found that Tor’s core integration remains robust, with no fundamental issues in tunnel establishment or routing. Most findings instead cluster around two areas: incomplete input validation and weaknesses in DNS handling that could enable denial-of-service conditions in certain rare conditions.&lt;/p&gt;
&lt;p&gt;Additional issues included cryptographic hardening suggestions (such as certificate pinning and randomness), and typical mobile security concerns like plaintext configuration storage and lack of root detection.&lt;/p&gt;
&lt;h2&gt;Next steps&lt;/h2&gt;
&lt;p&gt;All findings are being tracked and addressed as part of ongoing security work. This audit helps prioritize improvements around validation, resource management, and the use of established libraries for security-critical functionality.&lt;/p&gt;
&lt;h2&gt;Read the full audit report&lt;/h2&gt;
&lt;p&gt;For detailed findings and recommendations, please see &lt;a href="https://blog.torproject.org/code-audit-tor-vpn/torvpn_cure53_audit.pdf"&gt;the complete audit report here&lt;/a&gt;&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/reports"&gt;
          reports
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/network"&gt;
          network
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tails 7.6.2</title><link href="https://blog.torproject.org/new-release-tails-7_6_2/" rel="alternate" /><updated>2026-04-15T00:00:00Z</updated><author><name>tails
</name></author><id>urn:uuid:7be16586-0224-3712-ace2-1750e3be9717</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tails-7_6_2/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tails-7_6_2/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tails-7_6_2/lead.jpg"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;This release is an emergency release to fix an important security
vulnerability in the confinement of &lt;em&gt;Tor Browser&lt;/em&gt;.&lt;/p&gt;
&lt;h2&gt;Changes and updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Update &lt;em&gt;Flatpak&lt;/em&gt; to 1.16.6, which fixes &lt;a href="https://www.cve.org/CVERecord?id=CVE-2026-34078"&gt;CVE-2026-34078&lt;/a&gt;, a major sandbox escape vulnerability. Using this vulnerability, an attacker could break the &lt;a href="https://tails.net/doc/anonymous_internet/Tor_Browser/#confinement"&gt;security confinement of &lt;em&gt;Tor Browser&lt;/em&gt;&lt;/a&gt; and access all files that don't require an administration password, including in the Persistent Storage.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This vulnerability can only be exploited by a powerful attacker who has
already exploited another vulnerability to take control of &lt;em&gt;Tor Browser&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;For more details, read our
&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog"&gt;changelog&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Get Tails 7.6.2&lt;/h2&gt;
&lt;h3&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.6.2.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a &lt;a href="https://tails.net/doc/upgrade/#manual"&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;To install Tails 7.6.2 on a new USB stick&lt;/h3&gt;
&lt;p&gt;Follow our &lt;a href="https://tails.net/install/"&gt;installation instructions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The Persistent Storage on the USB stick will be lost if you install instead of
upgrading.&lt;/p&gt;
&lt;h3&gt;To download only&lt;/h3&gt;
&lt;p&gt;If you don't need installation or upgrade instructions, you can download Tails
7.6.2 directly:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download/"&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download-iso/"&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Support and feedback&lt;/h2&gt;
&lt;p&gt;For support and feedback, visit the &lt;a href="https://tails.net/support/"&gt;Support
section&lt;/a&gt; on the Tails website.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/tails"&gt;
          tails
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>A Server That Forgets: Exploring Stateless Relays</title><link href="https://blog.torproject.org/exploring-stateless-relays/" rel="alternate" /><updated>2026-04-08T00:00:00Z</updated><author><name>Osservatorio Nessuno
</name></author><id>urn:uuid:5b79de2d-ee54-38ef-866d-66cf9a4981fa</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/exploring-stateless-relays/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/exploring-stateless-relays/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/exploring-stateless-relays/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Running Tor relays requires constant work against adversaries, private and state-backed, who try to undermine the network by attacking the nodes that make it up. On top of that, some operators have to deal with seizures, raids, and direct physical access to hardware. There are &lt;a href="https://www.zdnet.com/article/austrian-man-raided-for-operating-tor-exit-node/"&gt;precedents&lt;/a&gt; in &lt;a href="https://www.zdnet.com/article/austrian-man-raided-for-operating-tor-exit-node/"&gt;Austria&lt;/a&gt;, &lt;a href="https://forum.torproject.org/t/tor-relays-artikel-5-e-v-another-police-raid-in-germany-general-assembly-on-sep-21st-2024/14533"&gt;Germany&lt;/a&gt;, &lt;a href="https://www.npr.org/sections/alltechconsidered/2016/04/04/472992023/when-a-dark-web-volunteer-gets-raided-by-the-police"&gt;the United States&lt;/a&gt;, &lt;a href="https://torservers.net/blog/2017-04-14-freebogatov-relaymob/"&gt;Russia&lt;/a&gt;, and likely many others. In those instances, the server can become a liability.&lt;/p&gt;
&lt;p&gt;Tor exists because we want to shield internet users from unwanted surveillance. The network is designed so that no single operator or server can reconstruct who is talking to whom. Journalists, activists, and whistleblowers depend on that holding up. A relay that can be seized and its contents handed over erodes the very trust the system depends on. And that's a problem we want to solve.&lt;/p&gt;
&lt;p&gt;In this post we explore how a stateless, diskless operating system can improve relay security, from firmware to user space, with a focus on software integrity and physical attack resistance. This work comes from the experience of &lt;a href="https://osservatorionessuno.org/"&gt;Osservatorio Nessuno&lt;/a&gt; running exit relays in Italy. Managing relays varies greatly depending on context, technical capability, budget, and jurisdiction. We hope to stimulate discussion rather than propose a single model.&lt;/p&gt;
&lt;h2&gt;What stateless means&lt;/h2&gt;
&lt;p&gt;A stateless system doesn't store anything between reboots. Every time it starts, it begins from a known, fixed image, just like &lt;a href="https://tails.net/"&gt;Tails&lt;/a&gt; does. The idea of running a Tor relay entirely in RAM isn't new. &lt;a href="https://archive.torproject.org/websites/lists.torproject.org/pipermail/tor-talk/2015-July/038493.html"&gt;Tor-ramdisk&lt;/a&gt;, a uClibc-based micro Linux distribution built for exactly this purpose, dates back to at least 2015.&lt;/p&gt;
&lt;p&gt;For relay operators, this approach raises the security bar by enforcing better behaviors by design:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Physical attack resistance.&lt;/strong&gt; If the machine is seized or cloned, there is nothing to analyze. Depending on the setup, the extraction of relay keys might become infeasible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Declarative configuration.&lt;/strong&gt; The system is version controlled. A stateless system cannot drift from its declared configuration, since every boot is a fresh apply.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Immutable runtime.&lt;/strong&gt; The filesystem is read-only. Even if an attacker gains code execution, they cannot persist anything across a reboot.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Reproducibility.&lt;/strong&gt; A system that doesn't change between reboots is easier to verify and, eventually, to reproduce and audit.&lt;/p&gt;
&lt;h2&gt;Why Tor relays are hard to make stateless&lt;/h2&gt;
&lt;p&gt;Tor relays build reputation over time: a relay that has been running for months earns bandwidth flags that make it more useful to the network. That reputation is tied to a long-term cryptographic identity key. Lose those keys and the relay loses its identity, and as such is reputation in the network, starting from scratch.&lt;/p&gt;
&lt;p&gt;Thus, the relay's identity must survive reboots without being extractable. A key stored on disk can be seized and copied; a key stored in a security chip such as the TPM might be more challenging for attackers.&lt;/p&gt;
&lt;p&gt;Beyond the identity key, a relay accumulates a state file containing bandwidth history and other temporary information. Discarding it on every reboot degrades performance, and running entirely in RAM means the OS has to fit in memory, with no possibility of swapping to disk. Whenever processes exceed available memory, the kernel's OOM killer terminates them outright. In practice, replacing glibc's allocator with jemalloc or mimalloc &lt;a href="https://1aeo.com/blog/tor-memory-optizations-what-actually-works.html"&gt;reduces Tor's memory footprint significantly&lt;/a&gt;, from around 5.7 GB to under 1.2 GB on a busy guard relay, largely by avoiding fragmentation from high-churn directory cache objects.&lt;/p&gt;
&lt;h2&gt;The TPM as the primary tool&lt;/h2&gt;
&lt;p&gt;A TPM (Trusted Platform Module) is a dedicated hardware chip on the motherboard that stores cryptographic keys and performs operations with them without ever exposing the private key to the operating system. It can &lt;em&gt;seal&lt;/em&gt; a secret: bind it to a specific measured state of the machine, so the key can only be used if the TPM sees the exact same software stack it saw when the key was created.&lt;/p&gt;
&lt;p&gt;For a stateless relay, this means the identity key survives reboots, as it lives in the hardware, but can't be conventionally extracted even with physical access. TPMs also support &lt;em&gt;remote attestation&lt;/em&gt;: the chip can prove to an external system what software the machine was started with, backed by a hardware-rooted signature. This makes it possible to verify what a node is running without trusting the operator.&lt;/p&gt;
&lt;p&gt;The TPM doesn't solve everything. Tor's usage of ed25519-based keys are not supported by the TPM chips, so the key is encrypted by the TPM but still stored as a byte string in non-volatile memory, meaning it is still technically possible to export it.&lt;/p&gt;
&lt;p&gt;Sealing also requires deciding upfront what software state the TPM will trust. When you update the kernel or bootloader, the measured state changes, and you have to re-seal the TPM by predicting what the next boot will look like.&lt;/p&gt;
&lt;h2&gt;Existing approaches&lt;/h2&gt;
&lt;p&gt;Different operators have tackled this problem at different points on the trade-off curve between simplicity and depth of security.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Minimal ramdisk.&lt;/strong&gt; The simplest approach: run everything in RAM, manage keys manually. &lt;a href="https://archive.torproject.org/websites/lists.torproject.org/pipermail/tor-talk/2015-July/038493.html"&gt;Tor-ramdisk&lt;/a&gt; has done this since 2015. Identity keys are exported and imported over SCP; rebooting without doing so means starting over. No TPM, no attestation, no verified boot — just the guarantee that RAM doesn't survive a power cut. It remains a meaningful improvement over a conventional disk-based setup.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VM-based ramdisk.&lt;/strong&gt; &lt;a href="https://blog.emeraldonion.org/evolving-our-tor-relay-security-architecture"&gt;Emerald Onion&lt;/a&gt; runs per-relay Alpine Linux images (66 MB each) on a Proxmox hypervisor. The VMs boot entirely into RAM with no persistent storage attached. Identity is managed with Tor's OfflineMasterKey feature: the long-term master key is generated offline and never touches the relay. Updates are image rebuilds, rollback is trivial, and no special hardware is required.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Bare metal with TPM-backed identity.&lt;/strong&gt; &lt;a href="https://github.com/osservatorionessuno/patela"&gt;Patela&lt;/a&gt;, our tool, takes a more hardware-focused approach. The relay boots via &lt;a href="https://docs.system-transparency.org/st-1.3.0/docs/reference/stboot-system/"&gt;stboot&lt;/a&gt;, a bootloader that fetches and cryptographically verifies a signed OS image before handing off control. Once running, the node pulls its configuration from a central server over mTLS, though a potentially compromised server can deny service but cannot push credentials or extract keys from the node. The relay's identity key lives in TPM non-volatile memory, bound to the measured boot state. It survives reboots but can't be extracted even with physical access. The trade-off is operational complexity: bare metal is required and re-sealing is needed after updates.&lt;/p&gt;
&lt;h2&gt;Open problems&lt;/h2&gt;
&lt;p&gt;Some of these problems are specific to our setup; others affect any stateless relay deployment.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Re-sealing after updates.&lt;/strong&gt; When the software stack changes, the TPM's measured state changes too. Automating this, which implies predicting what the boot measurements will look like after an update, is one of the harder unsolved problems. Tooling like systemd-pcrlock is moving in this direction, but it's not turnkey yet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Stateless reboots versus upgrades.&lt;/strong&gt; We use standard unattended upgrades for the Tor binary. But a reboot reverts to the OS image, which contains the previous version, a causing an involuntary downgrade. Reconciling automatic security updates with stateless images is something we haven't fully solved.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Memory constraints.&lt;/strong&gt; No swap means processes that exceed available memory are killed without warning. Tor's memory usage is hard to predict at runtime. The allocator replacement described above helps enormously, but the fundamental constraint remains.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Network stability.&lt;/strong&gt; Persistent updates can only be applied rebuilding the images and booting it again. A relay that restarts frequently risks losing its Stable flag, which affects how much traffic the network sends to it.&lt;/p&gt;
&lt;h2&gt;Future directions&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Remote attestation.&lt;/strong&gt; Sealing binds a key to a machine state. Attestation lets the node &lt;em&gt;prove&lt;/em&gt; that state to an external party. A verifier, suach as a configuration server or eventually the Tor directory authorities, can issue a cryptographic challenge that only a node running the expected software stack can answer correctly. This turns boot integrity from a local property into something verifiable remotely, reducing operator trust.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Transparency logs.&lt;/strong&gt; Once you have a measured boot chain, you can publish it. A relay operator provides a recipe for a reproducible build; anyone can recompute the expected hash and verify it matches what the TPM reports. An append-only transparency log can make these attestations publicly auditable. The Tor community could run an independent monitor to track this across the relay fleet.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Confidential computing.&lt;/strong&gt; The VM-based approach can be extended with technologies like AMD SEV-SNP, which isolate a guest VM's memory from the hypervisor itself. This too, is useful to reduce operator trust, and can reduce the security gap between the VM and bare-metal approaches.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Smaller hardware.&lt;/strong&gt; Walking onions, a proposed Tor protocol extension, would remove the need for nodes to hold an entire view of the network locally. Getting arti and related tools to run on smaller hardware would open up possibilities for devices that currently can't afford the resource cost.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;For applications like Tor, being stateless can bring multiple benefits: helps both prevent attacks and operator errors, and with further research and work could improve the overall network trustworthiness.&lt;/p&gt;
&lt;p&gt;Stateless systems come with real operational costs and genuinely hard unsolved problems, even for project and organizations with more resources. But they can serve as a foundation for improving privacy infrastructure, and similar concepts and frameworks could be applied to other parts of the stack.&lt;/p&gt;
&lt;p&gt;This work started at the &lt;a href="https://tcg2025.4711.se/sessions/stateless_tor_relay/"&gt;Tor Community Gathering in 2025&lt;/a&gt;, and it's ongoing. If you run relays, work on Tor tooling, or have thought about any of these open problems, we'd like to hear from you.&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://tcg2025.4711.se/sessions/stateless_tor_relay/"&gt;Stateless Tor Relay – Tor Community Gathering 2025&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osservatorionessuno.org/blog/2025/05/patela-a-basement-full-of-amnesic-servers/"&gt;Patela v1: A Basement Full of Amnesic Servers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://osservatorionessuno.org/blog/2025/12/patela-v2-from-certificates-to-hardware/"&gt;Patela v2: From Certificates to Hardware&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.system-transparency.org/st-1.3.0/docs/reference/stboot-system/"&gt;stboot System Documentation – System Transparency&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://archive.torproject.org/websites/lists.torproject.org/pipermail/tor-talk/2015-July/038493.html"&gt;Tor-ramdisk 20150714 Release Announcement&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.emeraldonion.org/evolving-our-tor-relay-security-architecture"&gt;Evolving Our Tor Relay Security Architecture – Emerald Onion&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://1aeo.com/blog/tor-memory-optizations-what-actually-works.html"&gt;Tor Memory Optimizations: What Actually Works – 1AEO&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/network"&gt;
          network
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/relays"&gt;
          relays
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tails 7.6.1</title><link href="https://blog.torproject.org/new-release-tails-7_6_1/" rel="alternate" /><updated>2026-04-08T00:00:00Z</updated><author><name>tails
</name></author><id>urn:uuid:73254c40-73cc-36c1-aae6-19766b9e9557</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tails-7_6_1/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tails-7_6_1/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tails-7_6_1/lead.jpg"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;This release is an emergency release to fix important security
vulnerabilities in &lt;em&gt;Tor Browser&lt;/em&gt;.&lt;/p&gt;
&lt;h2&gt;Changes and updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Update &lt;em&gt;Tor Browser&lt;/em&gt; to &lt;a href="https://blog.torproject.org/new-release-tor-browser-1509"&gt;15.0.9&lt;/a&gt;, which fixes &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2026-27/"&gt;several vulnerabilities in &lt;em&gt;Firefox&lt;/em&gt; 140.9.1&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We are not aware of these vulnerabilities being exploited in practice.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Tor&lt;/em&gt; client to 0.4.9.6.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href="https://www.thunderbird.net/en-US/thunderbird/140.9.0esr/releasenotes/"&gt;140.9.0&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update some firmware packages. This improves support for newer hardware: graphics, Wi-Fi, and so on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details, read our
&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog"&gt;changelog&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Get Tails 7.6.1&lt;/h2&gt;
&lt;h3&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.6.1.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a &lt;a href="https://tails.net/doc/upgrade/#manual"&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;To install Tails 7.6.1 on a new USB stick&lt;/h3&gt;
&lt;p&gt;Follow our installation instructions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/windows/"&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/mac/"&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/linux/"&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/expert/"&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Persistent Storage on the USB stick will be lost if you install instead of
upgrading.&lt;/p&gt;
&lt;h3&gt;To download only&lt;/h3&gt;
&lt;p&gt;If you don't need installation or upgrade instructions, you can download Tails
7.6.1 directly:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download/"&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download-iso/"&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Support and feedback&lt;/h2&gt;
&lt;p&gt;For support and feedback, visit the &lt;a href="https://tails.net/support/"&gt;Support
section&lt;/a&gt; on the Tails website.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/tails"&gt;
          tails
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tor Browser 15.0.9</title><link href="https://blog.torproject.org/new-release-tor-browser-1509/" rel="alternate" /><updated>2026-04-07T00:00:00Z</updated><author><name>pierov
</name></author><id>urn:uuid:384489d0-73fa-3129-bf2b-3c3a24ccd4fd</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-1509/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-1509/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-1509/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 15.0.9 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/15.0.9/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-15.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 15.0.8 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated Tor to 0.4.9.6&lt;/li&gt;
&lt;li&gt;Updated NoScript to 13.6.15.1984&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44837"&gt;Bug tor-browser#44837&lt;/a&gt;: Rebase Tor Browser stable onto 140.9.1esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 140.9.1esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 140.9.1esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41758"&gt;Bug tor-browser-build#41758&lt;/a&gt;: Rename &lt;code&gt;tools/signing/deploy-legacy&lt;/code&gt; to &lt;code&gt;tools/signing/redeploy-update_responses-release&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41741"&gt;Bug tor-browser-build#41741&lt;/a&gt;: Create a 13.5-specific update path&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Alpha Release: Tor Browser 16.0a5</title><link href="https://blog.torproject.org/new-alpha-release-tor-browser-160a5/" rel="alternate" /><updated>2026-04-01T00:00:00Z</updated><author><name>ma1
</name></author><id>urn:uuid:87a3ea26-1ad3-3f56-9ac3-ec356ecf49b0</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-alpha-release-tor-browser-160a5/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-alpha-release-tor-browser-160a5/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-alpha-release-tor-browser-160a5/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 16.0a5 is now available from the &lt;a href="https://www.torproject.org/download/alpha/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/16.0a5/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;p&gt;⚠️ &lt;strong&gt;Reminder&lt;/strong&gt;: The Tor Browser Alpha release-channel is for &lt;a href="https://community.torproject.org/user-research/become-tester/"&gt;testing only&lt;/a&gt;. As such, Tor Browser Alpha is not intended for general use because it is more likely to include bugs affecting usability, security, and privacy.&lt;/p&gt;
&lt;p&gt;Moreover, Tor Browser Alphas are now based on Firefox's betas. Please read more about this important change in the &lt;a href="https://blog.torproject.org/future-of-tor-browser-alpha/"&gt;Future of Tor Browser Alpha&lt;/a&gt; blog post.&lt;/p&gt;
&lt;p&gt;If you are an at-risk user, require strong anonymity, or just want a reliably-working browser, please stick with the &lt;a href="https://www.torproject.org/download/"&gt;stable release channel&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/main/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 16.0a4 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated NoScript to 13.6.14.90101984&lt;/li&gt;
&lt;li&gt;Updated Tor to 0.4.9.6&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43858"&gt;Bug tor-browser#43858&lt;/a&gt;: Clean out deprecated or unused methods in TorConnect&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44251"&gt;Bug tor-browser#44251&lt;/a&gt;: Drop pt_config.json meek-azure migration logic&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44546"&gt;Bug tor-browser#44546&lt;/a&gt;: Rename &lt;code&gt;appearance-chooser-item&lt;/code&gt; to &lt;code&gt;setting-chooser-item&lt;/code&gt; after we reach nightly 149&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44621"&gt;Bug tor-browser#44621&lt;/a&gt;: Move about:torconnect back to browser&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44702"&gt;Bug tor-browser#44702&lt;/a&gt;: Rebase alpha onto 149.0a1&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44720"&gt;Bug tor-browser#44720&lt;/a&gt;: Migrate New Identity commit to Tor Browser&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44753"&gt;Bug tor-browser#44753&lt;/a&gt;: Drop TorProvider.isBootstrapDone&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44755"&gt;Bug tor-browser#44755&lt;/a&gt;: Trusted Types (Firefox 148 and above) + Web Workers broken on Safer Level&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/rebase-149/-/issues/44757"&gt;Bug rebase-149#44757&lt;/a&gt;: Update tests for removed Services.search [tor-browser]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44761"&gt;Bug tor-browser#44761&lt;/a&gt;: Safer Level's worker patching filters out Worker constructor options&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44763"&gt;Bug tor-browser#44763&lt;/a&gt;: Disable WebGPU until audited&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44764"&gt;Bug tor-browser#44764&lt;/a&gt;: Review Mozilla 2012344: Hide main AI settings when the feature is blocked&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44765"&gt;Bug tor-browser#44765&lt;/a&gt;: Review Mozilla 1972073: Convert Sidebar to config-based prefs&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44767"&gt;Bug tor-browser#44767&lt;/a&gt;: Safer Level's worker patching throws on new about:blank frames with Trusted Types&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44772"&gt;Bug tor-browser#44772&lt;/a&gt;: Review Mozilla 1980264: Canvas randomization is too slow&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44778"&gt;Bug tor-browser#44778&lt;/a&gt;: Safer Level: xray causes patched TrustedTypePolicy instances to be unusable by content.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44801"&gt;Bug tor-browser#44801&lt;/a&gt;: Redact onion origins from Location.ancestorOrigins.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44814"&gt;Bug tor-browser#44814&lt;/a&gt;: Disable trustpanel until our new designs are ready&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 149.0a1&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44714"&gt;Bug tor-browser#44714&lt;/a&gt;: The browser opens a new about:blank tab in 148&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44780"&gt;Bug tor-browser#44780&lt;/a&gt;: AIFeature.sys.mjs failures in 149 desktop builds&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44781"&gt;Bug tor-browser#44781&lt;/a&gt;: Use a static page title for about:torconnect&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44793"&gt;Bug tor-browser#44793&lt;/a&gt;: &lt;code&gt;privacy.spoof_english&lt;/code&gt; console error in about:preferences&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44797"&gt;Bug tor-browser#44797&lt;/a&gt;: Clean up &lt;code&gt;about:torconnect&lt;/code&gt; styling&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44799"&gt;Bug tor-browser#44799&lt;/a&gt;: Onionize toggle in &lt;code&gt;about:tor&lt;/code&gt; uses blue text color&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 149.0a1&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43790"&gt;Bug tor-browser#43790&lt;/a&gt;: Address "Various android workarounds" commit introduced in the 138 rebase&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44332"&gt;Bug tor-browser#44332&lt;/a&gt;: Fix android tor logs screen issues presented in 144 rebase&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44594"&gt;Bug tor-browser#44594&lt;/a&gt;: DoH is visible on Android&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44653"&gt;Bug tor-browser#44653&lt;/a&gt;: Disable "Allow search suggestions in private sessions" prompt presented in RR 148 android&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44694"&gt;Bug tor-browser#44694&lt;/a&gt;: Remove new "Tab bar" feature on Android&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44698"&gt;Bug tor-browser#44698&lt;/a&gt;: Clean up comments in AccountSettingsFragment.kt. FIXME: Update A-S&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44700"&gt;Bug tor-browser#44700&lt;/a&gt;: Untracked change to &lt;code&gt;HomepageHeader.kt&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44751"&gt;Bug tor-browser#44751&lt;/a&gt;: Noscript (and likely any extension) can be accidently turned off on Android alpha&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44752"&gt;Bug tor-browser#44752&lt;/a&gt;: Remove new expanded toolbar option on Android due to fingerprintability&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44785"&gt;Bug tor-browser#44785&lt;/a&gt;: Fix SiteSecurityRobot.kt after the 149 rebase&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44788"&gt;Bug tor-browser#44788&lt;/a&gt;: Extensions are unreachable via 3 dot menu in alpha (android)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44789"&gt;Bug tor-browser#44789&lt;/a&gt;: Icon of "New Circuit" is not centered but lies in top left corner&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43180"&gt;Bug tor-browser#43180&lt;/a&gt;: Remove translation CI 13.5 legacy extension&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41758"&gt;Bug tor-browser-build#41758&lt;/a&gt;: Rename &lt;code&gt;tools/signing/deploy-legacy&lt;/code&gt; to &lt;code&gt;tools/signing/redeploy-update_responses-release&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41766"&gt;Bug tor-browser-build#41766&lt;/a&gt;: Use gzip for all platforms for Go vendoring&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41741"&gt;Bug tor-browser-build#41741&lt;/a&gt;: Create a 13.5-specific update path&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41753"&gt;Bug tor-browser-build#41753&lt;/a&gt;: Allow running custom commands when vendoring Go dependencies&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Arti 2.2.0 released: HTTP CONNECT, RPC, and Relay development.</title><link href="https://blog.torproject.org/arti_2_2_0_released/" rel="alternate" /><updated>2026-03-31T00:00:00Z</updated><author><name>Diziet
</name></author><id>urn:uuid:bd1989bd-d121-32ea-b033-a07d09aa8afd</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/static/images/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/static/images/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/static/images/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Arti is our ongoing project to create a next-generation Tor implementation in
Rust.  We're happy to announce the latest release, Arti 2.2.0.&lt;/p&gt;
&lt;p&gt;This release adds support for using HTTP CONNECT rather than SOCKS,
when connecting to the Tor network via Arti.
This previously-experimental feature is now included
a &lt;code&gt;full&lt;/code&gt; build, and will then be enabled by default.
The HTTP CONNECT protocol is available over the same port as SOCKS.&lt;/p&gt;
&lt;p&gt;The RPC client library (&lt;code&gt;arti-rpc-client-core&lt;/code&gt;)
now supports non-blocking requests,
and integration with application event loops.
And the RPC system now supports administrative access to the Arti instance,
via a new "superuser" facility.&lt;/p&gt;
&lt;p&gt;We also fixed a low-severity security issue,
&lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/issues/2418"&gt;TROVE-2026-005&lt;/a&gt;,
which would somewhat weaken DoS resistance
in in certain unusual embedded build configurations.&lt;/p&gt;
&lt;p&gt;Behind the scenes we have been working on relay support,
including relay channels and circuits, and directory server functionality
(mirrors and authorities).
As ever there are also lots of bugfixes, cleanups,
and test and CI improvements.&lt;/p&gt;
&lt;p&gt;For full details on what we've done, including API changes,
and for information about many more minor and less-visible changes,
please see the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/CHANGELOG.md#arti-220--30-march-2026"&gt;CHANGELOG&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For more information on using Arti, see our top-level &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/README.md"&gt;README&lt;/a&gt;,
and the documentation for the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/crates/arti/README.md"&gt;&lt;code&gt;arti&lt;/code&gt; binary&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Thanks to everybody who's contributed to this release, including
hjrgrn, HydroxideUnlaced, Nihal, and Tobias Stoeckmann.&lt;/p&gt;
&lt;p&gt;Also, our deep thanks to our &lt;a href="https://www.torproject.org/about/sponsors/"&gt;sponsors&lt;/a&gt; for funding the development of Arti!&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/announcements"&gt;
          announcements
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tails 7.6</title><link href="https://blog.torproject.org/new-release-tails-7_6/" rel="alternate" /><updated>2026-03-26T00:00:00Z</updated><author><name>tails
</name></author><id>urn:uuid:61d1bba0-544e-3635-911e-7e2934ab3891</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tails-7_6/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tails-7_6/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tails-7_6/lead.jpg"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;h2&gt;New features&lt;/h2&gt;
&lt;h3&gt;Automatic Tor bridges&lt;/h3&gt;
&lt;p&gt;You can now learn about Tor bridges directly from the &lt;em&gt;Tor Connection&lt;/em&gt;
assistant in Tails.&lt;/p&gt;
&lt;p&gt;Tor bridges are secret Tor relays that hide that you are connecting to Tor. If
connecting to Tor is blocked from where you are, you can use a bridge as your
first Tor relay to circumvent this censorship.&lt;/p&gt;
&lt;p&gt;In Tails 7.6, choose &lt;strong&gt;Connect to Tor automatically&lt;/strong&gt; when opening &lt;em&gt;Tor
Connection&lt;/em&gt;. If access to the Tor network is blocked, the bridge configuration
screen offers a new option called &lt;strong&gt;Ask for a Tor bridge based on your
region&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://tails.net/doc/anonymous_internet/tor/bridge.png"&gt;&lt;img src="https://tails.net/doc/anonymous_internet/tor/bridge.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This feature uses the same technology as the connection assistant in &lt;em&gt;Tor
Browser&lt;/em&gt; outside of Tails, which was introduced in &lt;a href="https://blog.torproject.org/new-release-tor-browser-115/"&gt;Tor Browser
11.5&lt;/a&gt; (July 2022).&lt;/p&gt;
&lt;p&gt;Tails downloads information about bridges that are most likely to work in your
region from the &lt;a href="https://gitlab.torproject.org/tpo/anti-
censorship/rdsys/-/blob/main/doc/moat.md"&gt;Moat API&lt;/a&gt; of the Tor Project. To circumvent
censorship, this connection is disguised as a connection to another website
using &lt;a href="https://en.wikipedia.org/wiki/domain%20fronting"&gt;domain fronting&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;GNOME Secrets&lt;/h3&gt;
&lt;p&gt;In Tails 7.6, the &lt;a href="https://gitlab.gnome.org/World/secrets"&gt;&lt;em&gt;Secrets&lt;/em&gt;&lt;/a&gt; password
manager replaces &lt;a href="https://keepassxc.org/"&gt;&lt;em&gt;KeePassXC&lt;/em&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Secrets&lt;/em&gt; has a simpler interface and is better integrated in the GNOME
desktop. For example, accessibility features, such as the screen keyboard and
cursor size, are working again with &lt;em&gt;Secrets&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Secrets&lt;/em&gt; offers to unlock your previous &lt;em&gt;KeePassXC&lt;/em&gt; database automatically,
because both &lt;em&gt;Secrets&lt;/em&gt; and &lt;em&gt;KeePassXC&lt;/em&gt; use the same file format to store
passwords.&lt;/p&gt;
&lt;p&gt;If you miss more advanced features from &lt;em&gt;KeePassXC&lt;/em&gt; , you can install
&lt;em&gt;KeePassXC&lt;/em&gt; as &lt;a href="https://tails.net/doc/persistent_storage/additional_software/"&gt;additional
software&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://tails.net/news/version_7.6/secrets.png"&gt;&lt;img src="https://tails.net/news/version_7.6/secrets.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The main keyboard shortcuts of &lt;em&gt;Secrets&lt;/em&gt; are similar to the ones of
&lt;em&gt;KeePassXC&lt;/em&gt; , with &lt;strong&gt;Shift&lt;/strong&gt; in addition to &lt;strong&gt;Ctrl&lt;/strong&gt; :&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Shift+Ctrl+C&lt;/strong&gt; : copy password&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Shift+Ctrl+V&lt;/strong&gt; : copy address&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Shift+Ctrl+B&lt;/strong&gt; : copy username&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Shift+Ctrl+T&lt;/strong&gt; : copy one-time password&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To see the full list of keyboard shortcuts of &lt;em&gt;Secrets&lt;/em&gt; , press &lt;strong&gt;Ctrl+?&lt;/strong&gt;.&lt;/p&gt;
&lt;h2&gt;Changes and updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Electrum&lt;/em&gt; from 4.5.8 to &lt;a href="https://github.com/spesmilo/electrum/blob/master/RELEASE-NOTES"&gt;4.7.0&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Tor Browser&lt;/em&gt; to &lt;a href="https://blog.torproject.org/new-release-tor-browser-1508/"&gt;15.0.8&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href="https://www.thunderbird.net/en-US/thunderbird/140.8.0esr/releasenotes/"&gt;140.8.0&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update most firmware packages. This improves support for newer hardware: graphics, Wi-Fi, and so on.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Fixed problems&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Translate the confirmation dialog that appears before saving the language and keyboard layout on the USB stick. (&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/issues/21448"&gt;#21448&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://tails.net/news/version_7.6/save.png"&gt;&lt;img src="https://tails.net/news/version_7.6/save.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fix the &lt;strong&gt;Learn More&lt;/strong&gt; button in the &lt;em&gt;Thunderbird&lt;/em&gt; migration notification. (&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/issues/21455"&gt;#21455&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://tails.net/doc/anonymous_internet/thunderbird/additional_software/manual.png"&gt;&lt;img src="https://tails.net/doc/anonymous_internet/thunderbird/additional_software/manual.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Fix automated upgrades in Turkish. (&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/issues/21466"&gt;#21466&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more details, read our
&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog"&gt;changelog&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Get Tails 7.6&lt;/h2&gt;
&lt;h3&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.6.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a &lt;a href="https://tails.net/doc/upgrade/#manual"&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;To install Tails 7.6 on a new USB stick&lt;/h3&gt;
&lt;p&gt;Follow our installation instructions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/windows/"&gt;Install from Windows&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/mac/"&gt;Install from macOS&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/linux/"&gt;Install from Linux&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/expert/"&gt;Install from Debian or Ubuntu using the command line and GnuPG&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Persistent Storage on the USB stick will be lost if you install instead of
upgrading.&lt;/p&gt;
&lt;h3&gt;To download only&lt;/h3&gt;
&lt;p&gt;If you don't need installation or upgrade instructions, you can download Tails
7.6 directly:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download/"&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download-iso/"&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Support and feedback&lt;/h2&gt;
&lt;p&gt;For support and feedback, visit the &lt;a href="https://tails.net/support/"&gt;Support
section&lt;/a&gt; on the Tails website.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/tails"&gt;
          tails
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tor Browser 15.0.8</title><link href="https://blog.torproject.org/new-release-tor-browser-1508/" rel="alternate" /><updated>2026-03-24T00:00:00Z</updated><author><name>ma1
</name></author><id>urn:uuid:018e0655-934e-3b92-9e29-5a2fa37ca051</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-1508/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-1508/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-1508/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 15.0.8 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/15.0.8/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-15.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 15.0.7 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated NoScript to 13.6.12.1984&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44663"&gt;Bug tor-browser#44663&lt;/a&gt;: NoScript behavior on “Safer” security level prevents integrity checks for dynamically loaded javascript&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44680"&gt;Bug tor-browser#44680&lt;/a&gt;: Properly handle subdocuments created by data: URLs&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44761"&gt;Bug tor-browser#44761&lt;/a&gt;: Safer Level's worker patching filters out Worker constructor options&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44771"&gt;Bug tor-browser#44771&lt;/a&gt;: Rebase Tor Browser stable onto 140.9.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44784"&gt;Bug tor-browser#44784&lt;/a&gt;: Backport Security Fixes from Firefox 149&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41738"&gt;Bug tor-browser-build#41738&lt;/a&gt;: Allow to specify an unsupportedURL on update responses&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 140.9.0esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44327"&gt;Bug tor-browser#44327&lt;/a&gt;: ERROR: Your Tor Browser profile cannot be loaded. It may be missing or inaccessible&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44386"&gt;Bug tor-browser#44386&lt;/a&gt;: Firefox profiles no longer work in Tor Browser 15.0&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44657"&gt;Bug tor-browser#44657&lt;/a&gt;: Backport tor-browser#44394: Do not read default prefs from /etc/firefox&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 140.9.0esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;Windows + Linux + Android&lt;ul&gt;
&lt;li&gt;Updated Go to 1.25.8&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44249"&gt;Bug tor-browser#44249&lt;/a&gt;: Backport tor-browser-build#41580: Update Go major to 1.25.x&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry></feed>