The Future of Tor Browser Alpha

by morgan | December 1, 2025

With the recent release of Tor Browser 15.0, we have come out of yet another ESR-transition season whereby Tor Browser has been updated to the latest version of Firefox Extended Support Release (ESR). Historically, we have spent several months each year on this work. It is a very important and methodical process which ensures Tor Browser remains secure and private through upstream security updates from Mozilla and by testing and updating our own features and customizations. You can find a somewhat detailed overview of this process and why it is so important in our previous Tor Browser 14.0a1 release blog post.

Starting with Tor Browser 16.0a1, rather than being based on Firefox ESR 140 (as would have been the case in the past), the Tor Browser Alpha release will instead be based on the latest Firefox Rapid Release. The Tor Browser Stable release (starting with 15.0) will remain on the latest Firefox ESR Release. This change will only affect Tor Browser Alpha users.

Release Channels

NOTE: This is a simplification of the available browser release channels offered both by Mozilla and the Tor Project, but these are by far the most relevant release channels to the majority of users.

Mozilla has two different release channels for shipping Firefox updates: Rapid Release and Extended Support Release. The basic idea is that the Rapid Release channel receives major features with each new version every four weeks, while the Extended Support Release channel only receives security updates every four weeks while receiving a year's worth of features roughly every 52 weeks (you can read about the differences in this Mozilla Support article).

The Tor Project also has two different release channels for shipping Tor Browser updates: Alpha and Stable. The Alpha channel is where the Tor Browser developers spend most of their time working on new features. To the end-users, this is where most of the visible changes happen throughout the development cycle. The Stable channel typically receives security updates with each release and only occasional new features through targeted backports from the Alpha channel.

Up until now, both of these channels (i.e. Tor Browser Alpha and Stable) have been based on Firefox's Extended Support Release channel. For the next release cycle, we are going to conduct an experiment whereby Tor Browser Stable will continue to be based on Firefox Extended Support Release while Tor Browser Alpha will instead be based on Firefox Rapid Release.

Traditionally, we would now be working on Tor Browser 15.5a1 based on Firefox ESR 140. Instead, we are already working on Tor Browser 16.0a1 and every Alpha from the 16.0aX series will be based on the Firefox Rapid Release channel. Tor Browser 16.0 will stabilize when Firefox 153 is ready next year and, once released, will follow the ESR channel for the remainder of its life-cycle.

Ramifications for Users and Testers

⚠️ If you are an at-risk user, concerned about your privacy, or just need a reliably working web-browser, you SHOULD NOT use Tor Browser Alpha and instead stick with Tor Browser Stable ⚠️

If you are an alpha tester running Tor Browser Alpha, you can expect the following changes:

  • Quicker access to new upstream features developed by Mozilla: Rather than waiting until the next major ESR version for newly shipped features in Firefox, Tor Browser Alpha users will receive these features shortly after they are introduced upstream. This will allow our alpha-testers to evaluate how new upstream features interact with (or break) our privacy and security patches over a much longer development and stabilization period.

  • Potentially Less Secure and Private Tor Browser Alpha Releases: One side-effect of quickly shipping upstream features to users, is that we will also be quickly shipping upstream bugs to users too. These bugs could have security and privacy implications. The upside is that we should also get bug reports from users more quickly as well, which will give us more time to develop proper fixes than we would otherwise. Therefore, users should only use Tor Browser Alpha for testing purposes! At-risk users should migrate to and remain on Tor Browser Stable.

  • A Less Predictable Release Cadence: Sometimes the intersection of upstream changes, our build system, and our patches introduce rather difficult problems for us to solve. It is entirely possible resolving such problems may take longer than the available four week window of time between scheduled Rapid Release versions. Therefore, Tor Browser Alpha releases may be delayed relative to Firefox's release schedule. The consequence of this is that Tor Browser Alpha may not receive upstream security updates as promptly as it has in the past.

  • Faster Platform Deprecation: Because we are following Mozilla directly, we will also be dropping support for platforms in the Alpha release channel sooner than we would have in the past. Previously, Tor Browser Alpha's minimum supported platforms would follow Firefox ESR, which would change on a yearly basis after the ESR Transition. In the general, Tor Browser Alpha will drop support for legacy platforms at the same time as Firefox Rapid Release. Specifically, the following platforms will no longer be supported by Tor Browser Alpha starting with 16.0a1:

    • x86 Linux and Android: As described in our Tor Browser 15.0 blog post, upstream has dropped support for Linux and Android running on 32-bit x86 processors. As such, we will not be releasing builds for these platforms in the Tor Browser Alpha 16.0 series.

    • Android older than Android 8.0: Also described in our Tor Browser 15.0 blog post, upstream has dropped support for Android versions 5.0, 6.0, and 7.0. This means to upgrade to the Tor Browser Alpha 16.0 series you will need a mobile device running at lest Android 8.0.

If you are an end-user running Tor Browser Stable, you can expect the following changes:

  • One major feature release per year: Previously, we have had two feature releases per year: one in Q2 and one in late Q3. With this new development model, we expect to have only one major feature release per year. Therefore, with Tor Browser Stable 15.0 just released, users can expect Tor Browser Stable 16.0 (based on Firefox ESR 153) to be released about halfway through Q3 of 2026 (i.e. there will not be a Tor Browser 15.5).

Developer Rationale

So why are we changing things? We believe changing our development model in this way will allow us to be both more effective at developing and maintaining Tor Browser while also reducing contributor stress.

For the past several years we have tried to divide the annual Tor Browser development cycle into two phases: a six month feature phase and a six month ESR transition phase. During the feature phase, we would work on new developments to be shipped during Q2 in the .5 release. During the ESR transition phase, we would work almost exclusively on ESR transition related work to be shipped during late Q3/early Q4 in the .0 release.

This division of the year into two distinct phases introduces problems:

  • Cascading Delays: If something is scheduled for a particular feature phase, then inevitable development and project management surprises can drive back the day we ship. However, doing so would also drive back when we begin the next ESR transition phase. This delay would of course pay it forward and further delay the next feature phase and so-forth.

    Unfortunately, we cannot just let these delays pile-up release upon release because we have a fixed window of time each year on the calendar where we must complete our annual ESR transition. This is because Mozilla offers only a four release overlap between major ESR versions where both the previous ESR and the new ESR receive security updates.

    This means that if we were to begin the ESR transition work only when the new major ESR version is released, there would be only about 16 weeks of calendar time before the old Tor Browser version would stop receiving security updates from upstream. We therefore have a responsibility to our users to get the ESR transition work done as quickly as humanly possible before this window closes.

    Unfortunately, we never really hit the desired six-month release cadence. In reality, we usually have more of a seven to eight month feature phase and a four to five month ESR transition phase.

    So, if we cannot let our development windows slide then the only recourse we have to remedy delayed features is to either kick them to the next major feature release or to try to finish them during the ESR transition phase.

  • Developer Stress: The 16 week ESR window is a very small amount of time for us to do our due-diligence and properly serve our users. There is a ton of work that has to happen (as described in our Tor Browser 14.0a1 release blog post) and not a whole lot of time to do it. As a result, this part of the Tor Browser release cycle has historically been quite stressful and a major contributor to developer burnout.

  • Poor Feature Development Continuity: Context switching in general is the bane of many developers. It is quite difficult to make consistent progress on a task when you are being constantly interrupted by other things. With our previous on-again/off-again development model, nearly everyone on the team had to switch from feature work to ESR transition work for an entire release cycle in order to make the ESR deadline.

    As a result, in the past we have had to take extra care to split large features across multiple feature release cycles, rather than naturally working on them incrementally across one. This process increases complexity and mental overhead when developing features to make sure that what we ship to users works even when not fully complete. It also adds an extra 'remembering what we were doing months ago' tax when coming back to a feature after an ESR transition and further complicates planning and scheduling.

The hope is that by spreading the ESR transition-related work out over the entire year, we will be able to:

  • Increase the number of major features shipped each year
  • Increase our confidence in the ESR transition itself
  • Trade the high-intensity/high-stress 16-week ESR transition window for lower-intensity/lower-stress over the entire year

Next Steps

It is yet to be seen whether this process change will have the intended results, but initial experiments have been promising. The first step in this process was experimenting with iterative Rapid Release to Rapid Release rebases (rather than a single large ESR to ESR rebase which we have traditionally done). This process has not only been easier to perform, but also much easier to code-review. It turns out rebasing after 4 weeks of changes is significantly easier than rebasing after 52 weeks of changes!

For the ESR 140 transition, this process also allowed us to catch several runtime bugs in Tor Browser for Android individually as they were introduced, rather than having to debug and disentangle them all at once. We have continued this iterative-rebase process throughout the ESR 140 cycle and will be releasing Tor Browser Alpha 16.0a1 based on Firefox 146 or 147 soon. The big challenge for us this release cycle will be keeping up the slow incremental progress each release while interleaving this with our regular feature work.

The nice thing about making this change now is that if there ends up being major problems or unintended consequences, we can always revert to the old ways next year without our Tor Browser Stable users noticing much of a difference. The worst-case scenario is that we already have a head-start on the ESR 153 transition.

Become a tester!

Now is a great time to become a Tor Browser Alpha tester! However, if you are at risk or need strong anonymity, please stick with Tor Browser Stable.

Comments

We encourage respectful, on-topic comments. Comments that violate our Code of Conduct will be deleted. Off-topic comments may be deleted at the discretion of the moderators. Please do not comment as a way to receive support or to report bugs on a post unrelated to a release. If you are looking for support, please see our FAQ, user support forum or ways to get in touch with us.