<?xml version='1.0' encoding='utf-8'?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Tor Project blog</title><link href="https://blog.torproject.org/" rel="alternate" /><link href="https://blog.torproject.org/feed.xml" rel="self" /><id>urn:uuid:201c3fb3-b4bd-3a4e-85ed-16327d11d7a6</id><updated>2026-05-15T00:00:00Z</updated><author><name>The Tor Project</name></author><subtitle>Official channel for news and updates from the Tor Project</subtitle><entry><title>Keeping the doors open</title><link href="https://blog.torproject.org/keeping-the-doors-open-unredacted/" rel="alternate" /><updated>2026-05-15T00:00:00Z</updated><author><name>Unredacted.org
</name></author><id>urn:uuid:f6897580-0497-3a50-83c4-5cab1c98a9cf</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/keeping-the-doors-open-unredacted/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/keeping-the-doors-open-unredacted/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/keeping-the-doors-open-unredacted/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;&lt;em&gt;This guest post is part of a spotlight series on the organizations defending the free internet.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;A user in China once said this about our work:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&lt;em&gt;"You have helped many many people to overcome the great firewall. 
Without your help, I would be in the totally darkness trap and being brain-washed."&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;We don't hear from the people who use our services very often. Most of them can't or don't feel that they can safely send a message. When one comes through, it's a reminder of what's actually at stake.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We're &lt;a href="https://unredacted.org/"&gt;Unredacted&lt;/a&gt;, a US-based 501(c)(3) non-profit. We build and operate Internet infrastructure that helps people reach the open Internet and protect their right to privacy. We do this by operating a network of over 300 servers around the world. We're a way through when the front door is locked, and a place to communicate when the public square isn't safe. Most of the work is invisible: datacenter work, hardware, automation, open source software, bandwidth, abuse queues, monitoring alerts, and the late nights spent keeping all of it online.&lt;/p&gt;
&lt;p&gt;What we do falls into three areas. Censorship Evasion is where Unredacted Door lives, our umbrella for the services designed to route around blocking. Secure Infrastructure is where we run things like&lt;a href="https://xmpp.is/"&gt;  XMPP.is&lt;/a&gt; and our&lt;a href="https://unredacted.org/services/si/matrix/"&gt;  Matrix homeserver&lt;/a&gt;, and other free services built with security and privacy in mind. Unredacted Education is the writing and documentation side: guides and explainers for the people who want to understand the work and replicate it. Alongside those, &lt;a href="https://unredacted.org/blog/2025/05/unredacted-labs/"&gt;Unredacted Labs&lt;/a&gt; is where we experiment with infrastructure ideas that aren't quite production-ready. GreenWare is one of those, our effort to run real network capacity on hardware that doesn't burn a lot of power.&lt;/p&gt;
&lt;h2&gt;Unredacted Door&lt;/h2&gt;
&lt;p&gt;The name is literal. When the entrance to the open Internet gets walled off, people need another way in.&lt;/p&gt;
&lt;p&gt;Unredacted Door brings together several of our circumvention services: FreeSocks, messaging proxies for Signal and Telegram, Tor bridges, and Snowflake proxies. In a recent 30-day window, these services carried nearly 300 TiB of traffic for tens of thousands of people routing around censorship in their countries. That's roughly the equivalent of bandwidth to stream tens of thousands of hours of 4K video. Demand isn't slowing, and we need to continue building more. Every new filter, every new law, every "for your safety" rollout sends more people looking for a route the censors haven't found yet.&lt;/p&gt;
&lt;p&gt;The largest piece of Unredacted Door is &lt;a href="https://freesocks.org/"&gt;FreeSocks&lt;/a&gt;: free proxies for people in places where censorship is severe. If you've never run into one, a proxy is a relay point. Your app doesn't talk directly to the blocked service. It talks to a server that carries the connection past whatever filters are sitting between you and the wider Internet. FreeSocks is built to make that relay quietly unremarkable, which is exactly the trait a standard VPN tends to lack. A VPN advertises itself. There's a known endpoint, a known handshake, an obvious shape on the wire. Censors are very good at blocking things they can recognize.&lt;/p&gt;
&lt;p&gt;No single tool covers every situation. Tor Browser gives you strong privacy and anonymity for browsing. Snowflake helps people reach Tor when access to the network itself is blocked. FreeSocks proxies push specific traffic through a route that's harder to spot. People living under censorship usually need a few of these on hand, because no single door stays open forever.&lt;/p&gt;
&lt;p&gt;That's why we're putting serious work into the next version of FreeSocks (v2). It uses Xray - a powerful and versatile traffic-routing engine, which can make proxy traffic look more like ordinary web traffic bundled with our open source &lt;a href="https://github.com/unredacted/freesocks-control-plane"&gt;control plane&lt;/a&gt; that allows us to rotate endpoints automatically when censors find and block a server. The less a user has to fiddle with their setup while they're already under pressure, the better.&lt;/p&gt;
&lt;h2&gt;GreenWare: sustainable infrastructure, literally&lt;/h2&gt;
&lt;p&gt;Tor relays, bridges, proxies, and more. They run on hardware in datacenters, and that hardware has a real footprint: financial, operational, and environmental. If we want privacy infrastructure to last, we have to ask what's actually sustainable to operate.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://unredacted.org/blog/2025/05/unredacted-labs/#greenware"&gt;GreenWare&lt;/a&gt; is our attempt to shrink that footprint without shrinking what we can carry on it. The premise is straightforward: most Tor relay traffic doesn't need a server that draws power like a space heater. A relay needs a steady network, predictable CPU, and enough memory to hold its state. That's a workload a single-board computer can handle, if the chassis around it is built to take it seriously.&lt;/p&gt;
&lt;p&gt;We started with Raspberry Pi 5 boards powered over PoE, fed entirely through their network cables. The idea worked. A typical server in a datacenter draws as much power as a small space heater. A Pi draws less than a lightbulb. But the first generation had ceilings. Density wasn't where we wanted it, and a few of the supporting components weren't built for the hours we were putting on them.&lt;/p&gt;
&lt;p&gt;So we run two deployments in parallel now. The first is a 1U chassis with 20 ComputeBlade modules stacked into it. We deployed all 20 in our datacenter and moved a chunk of our Tor exit relays onto them. That chassis pulls a little over 100W under load, roughly what an old incandescent bulb burns. The second is a custom Raspberry Pi chassis we designed after the ComputeBlade work taught us what we actually wanted in the field. Both are live, and as of writing all 123 of our Tor exit relays run on this combined infrastructure, drawing roughly 400W in total. As time goes on, we'll have more to say about the chassis design and the project as it matures.&lt;/p&gt;
&lt;p&gt;The Tor network runs on people and organizations willing to operate infrastructure for it. Exits are the hardest part of that job. They need bandwidth, maintenance, abuse handling, legal nerve, and money. If we can drop the cost and the power required to run real exit capacity, more people can take on a piece of the work and diversify and grow the network.&lt;/p&gt;
&lt;p&gt;Our longer-term ambition is to keep pushing on efficient hardware, carbon tracking, and eventually renewable-powered micro points of presence. We'd be more than glad to partner with organizations and companies that want to see this grow.&lt;/p&gt;
&lt;p&gt;The open Internet is kept open by many people and organizations investing energy, time, and effort: The &lt;a href="https://blog.torproject.org/Defending-the-right-to-know/"&gt;researchers measuring censorship&lt;/a&gt;, the &lt;a href="https://blog.torproject.org/exploring-stateless-relays/"&gt;relay operators providing bandwidth&lt;/a&gt;, and the communities that refuse to leave one another behind. At Unredacted, our part is building and maintaining the routes people may need when the obvious ones disappear.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/partners"&gt;
          partners
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/human-rights"&gt;
          human rights
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tails 7.7.3</title><link href="https://blog.torproject.org/new-release-tails-7_7_3/" rel="alternate" /><updated>2026-05-12T00:00:00Z</updated><author><name>tails
</name></author><id>urn:uuid:8954afe6-22ff-3bfd-8046-4ba62e12f48c</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tails-7_7_3/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tails-7_7_3/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tails-7_7_3/lead.jpg"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;This release is an emergency release to fix a critical security vulnerability
in the Linux kernel, as well as security vulnerabilities in &lt;em&gt;Tor Browser&lt;/em&gt; and
in the &lt;em&gt;Tor&lt;/em&gt; client.&lt;/p&gt;
&lt;h2&gt;Changes and updates&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Linux&lt;/em&gt; kernel to 6.12.86, which fixes &lt;a href="https://github.com/V4bel/dirtyfrag"&gt;Dirty Frag&lt;/a&gt;, a vulnerability that could allow an application in Tails to gain administration privileges.&lt;/p&gt;
&lt;p&gt;For example, if an attacker was able to exploit other unknown security
vulnerabilities in an application included in Tails, they might then use
Copy Fail to take full control of your Tails and deanonymize you.&lt;/p&gt;
&lt;p&gt;We are not aware of this vulnerability being used in practice until now.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Tor Browser&lt;/em&gt; to &lt;a href="https://blog.torproject.org/new-release-tor-browser-15012/"&gt;15.0.12&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update the &lt;em&gt;Tor&lt;/em&gt; client to 0.4.9.8.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update &lt;em&gt;Thunderbird&lt;/em&gt; to &lt;a href="https://www.thunderbird.net/en-US/thunderbird/140.10.1esr/releasenotes/"&gt;140.10.1&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Fixed problems&lt;/h2&gt;
&lt;p&gt;For more details, read our
&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog"&gt;changelog&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Get Tails 7.7.3&lt;/h2&gt;
&lt;h3&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.7.3.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a &lt;a href="https://tails.net/doc/upgrade/#manual"&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;To install Tails 7.7.3 on a new USB stick&lt;/h3&gt;
&lt;p&gt;Follow our &lt;a href="https://tails.net/install/"&gt;installation instructions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The Persistent Storage on the USB stick will be lost if you install instead of
upgrading.&lt;/p&gt;
&lt;h3&gt;To download only&lt;/h3&gt;
&lt;p&gt;If you don't need installation or upgrade instructions, you can download Tails
7.7.3 directly:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download/"&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download-iso/"&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Support and feedback&lt;/h2&gt;
&lt;p&gt;For support and feedback, visit the &lt;a href="https://tails.net/support/"&gt;Support
section&lt;/a&gt; on the Tails website.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/tails"&gt;
          tails
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Defending the public's right to know</title><link href="https://blog.torproject.org/Defending-the-right-to-know/" rel="alternate" /><updated>2026-05-12T00:00:00Z</updated><author><name>pavel
</name></author><id>urn:uuid:d9f1a6f6-9d3f-3009-a511-07a94bc34da2</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/Defending-the-right-to-know/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/Defending-the-right-to-know/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/Defending-the-right-to-know/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;&lt;em&gt;This post is part of a spotlight series on the organizations defending the free internet.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Internet freedom has declined for &lt;a href="https://freedomhouse.org/article/new-report-persistent-authoritarian-repression-and-backsliding-democracies-drive-15th"&gt;15 consecutive years.&lt;/a&gt; Beyond surveillance, the erosion of privacy and anonymity, and information manipulation, governments are targeting specific sites and services, or attacking infrastructure itself, causing shutdowns and deliberate disruptions for internet users. But how do we know when the internet is censored and how?&lt;/p&gt;
&lt;p&gt;&lt;a href="https://ooni.org/"&gt;OONI&lt;/a&gt;, the Open Observatory for Network Interference, born out of the Tor Project, exists to answer that question. Through &lt;a href="https://ooni.org/install/"&gt;free software tools&lt;/a&gt; and &lt;a href="https://ooni.org/data/"&gt;open data&lt;/a&gt; OONI makes censorship measurable, verifiable, and actionable. This post is about what that looks like in practice.&lt;/p&gt;
&lt;h2&gt;Protecting the public record&lt;/h2&gt;
&lt;p&gt;OONI data is the &lt;a href="https://explorer.ooni.org/"&gt;world's largest open dataset on internet censorship&lt;/a&gt;: billions of measurements collected across tens of thousands of networks from 245 countries and territories since 2012. OONI's data exists because people around the world run &lt;a href="https://ooni.org/install/"&gt;OONI Probe&lt;/a&gt; and contribute measurements from the networks that they are connected to. Every new measurement adds to a shared public record.&lt;/p&gt;
&lt;p&gt;Both its scale and methodology contribute to OONI's impact. Internet censorship often works by making interference hard to see. It can make a blocked website look broken, a throttled app look unreliable, or a shutdown look like a technical failure. OONI helps expose these tactics through &lt;a href="https://github.com/ooni/spec/tree/master/nettests"&gt;open measurement methodologies&lt;/a&gt;, peer review, expert feedback, and comparison against control measurements, so that censorship claims can be tested, challenged, and verified.&lt;/p&gt;
&lt;p&gt;To make this dataset user-friendly, OONI launched &lt;a href="https://ooni.org/post/2025-ooni-explorer-thematic-censorship-pages/"&gt;thematic pages in OONI Explorer&lt;/a&gt; focusing on the areas most frequently targeted: social media and messaging apps, news media, and circumvention tools. Each page includes short reports, longer research reports, and charts with the latest OONI data.&lt;/p&gt;
&lt;p&gt;In 2025, a dedicated "&lt;a href="https://explorer.ooni.org/news-media"&gt;Blocking of News Media&lt;/a&gt;" page helped surface findings that would otherwise require sifting through billions or raw measurements: the &lt;a href="https://explorer.ooni.org/findings/99431807200"&gt;blocking of the independent media outlet Zawia3&lt;/a&gt; in Egypt, the &lt;a href="https://explorer.ooni.org/findings/101531332700"&gt;blocking of 12 news media websites&lt;/a&gt; in Jordan, and the &lt;a href="https://explorer.ooni.org/findings/667455800"&gt;blocking of The Wire in India&lt;/a&gt; during the military conflict with Pakistan.&lt;/p&gt;
&lt;p&gt;Think about &lt;a href="https://ooni.org/reports/"&gt;when censorship events tend to happen&lt;/a&gt;: elections, protests, armed conflict, national exams, and periods of political unrest. The moment when access to information matters most. OONI gives affected communities a shared factual basis at those moments to make accountability possible.&lt;/p&gt;
&lt;h2&gt;How journalists and media organizations use OONI&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://blog.torproject.org/Defending-the-right-to-know/blocking-of-dw-dot-com.png" alt="Image A screenshot of the OONI explorer showing blocking of news site dw.com in Russia, China, and Iran"&gt;&lt;/p&gt;
&lt;p&gt;In 2025, &lt;a href="https://meduza.io/en"&gt;Meduza&lt;/a&gt;, one of the most prominent Russian media outlets in exile &lt;a href="https://meduza.io/cards/tsenzury-v-runete-vse-bolshe-kak-mozhno-otslezhivat-blokirovki"&gt;published an article introducing OONI tools&lt;/a&gt; and encouraging readers to use them. It's just one example how a newsroom can effectively use censorship measurement not just to report a story, but as an act of public education: helping audiences understand how network interference works, how it can be documented, and how they can contribute to that evidence base themselves.&lt;/p&gt;
&lt;p&gt;When a news website is blocked, that's not just a technical event. It's the public losing access to reporting, communities losing access to timely information, and journalists losing access to their audiences. Documentation that can be cited and analyzed is what turns that event into something actionable.&lt;/p&gt;
&lt;p&gt;The most concrete example of that chain in action is Kenya. OONI data served as evidence in a public-interest case challenging the unlawful disruption of internet access. &lt;a href="https://blog.bake.co.ke/2025/05/14/bake-6-other-organizations-challenge-internet-shutdowns-in-kenya-in-landmark-public-interest-case/"&gt;The case was filed by a coalition&lt;/a&gt; that included BAKE, ICJ Kenya, Paradigm Initiative, the Kenya Union of Journalists, Katiba Institute, the Law Society of Kenya, and CIPESA. To support the petition before the High Court of Kenya, OONI produced&lt;a href="https://blog.bake.co.ke/wp-content/uploads/2025/05/HCCHRPET.276.2025-ICJ-v-CA-Internet-Shutdown-Case.pdf"&gt;  a detailed research report, in the form of an expert opinion&lt;/a&gt;, documenting the blocking of Telegram during Kenya's 2023 and 2024 KCSE national exams.&lt;/p&gt;
&lt;p&gt;This is a case where a journalists' union, digital rights organizations, legal advocates, and technical researchers were able to work from the same datasets to elevate internet disruption to a public-interest issue. And this case also helped set an important regional precedent: lawyers in Tanzania subsequently reached out to OONI for data to support legal efforts challenging the blocking of Twitter/X there, prompting OONI to publish &lt;a href="https://ooni.org/post/2025-tanzania-blocked-twitter/"&gt;a research report documenting the block.&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Collective action for a collective internet&lt;/h2&gt;
&lt;p&gt;The Kenya-to-Tanzania ripple effect illustrates how internet censorship works across geographies. But also how we can fight it. A block on messaging apps isn't a standalone event. Journalists may lose access to sources. Activists may lose organizing channels. &lt;a href="https://blog.torproject.org/fighting-censorship-with-webtunnel/"&gt;Circumvention tool developers may need to adapt.&lt;/a&gt; Researchers may need to verify what happened. Lawyers may need evidence. But everyone needs documentation.&lt;/p&gt;
&lt;p&gt;OONI's &lt;a href="https://ooni.org/data/"&gt;open data&lt;/a&gt; model is built for exactly these moments. Protecting the free internet requires documenting censorship, sharing evidence, and building the collective capacity to respond.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/partners"&gt;
          partners
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/human-rights"&gt;
          human rights
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tor Browser 15.0.13</title><link href="https://blog.torproject.org/new-release-tor-browser-15013/" rel="alternate" /><updated>2026-05-08T00:00:00Z</updated><author><name>ma1
</name></author><id>urn:uuid:70e330f6-cd91-39d5-9a75-8b121ad82143</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-15013/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-15013/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-15013/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 15.0.13 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/15.0.13/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-15.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 15.0.12 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated tor to 0.4.9.8&lt;/li&gt;
&lt;li&gt;Updated NoScript to 13.6.19.1984&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Arti 2.3.0 released: Logging, Relay, Directory authority, and RPC development.</title><link href="https://blog.torproject.org/arti_2_3_0_released/" rel="alternate" /><updated>2026-05-07T00:00:00Z</updated><author><name>wesleyac
</name></author><id>urn:uuid:79cb11dd-4153-3014-b3f4-4df876b74f45</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/static/images/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/static/images/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/static/images/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Arti is our ongoing project to create a next-generation Tor implementation in
Rust.  We're happy to announce the latest release, Arti 2.3.0.&lt;/p&gt;
&lt;p&gt;This release bumps the minimum MacOS version supported by Arti to 10.14,
up from 10.12. Despite being supported on a technical level,
we do not recommend the use of MacOS versions that old,
as they are no longer receiving updates from Apple and may have unpatched security issues.&lt;/p&gt;
&lt;p&gt;This release continues our ongoing development towards using Arti as a relay
and as a directory authority. It also continues development on RPC,
including adding a new RPC API for inspecting tunnel paths.&lt;/p&gt;
&lt;p&gt;Additionally, there are a couple new logging related features.
Arti now supports logging to syslog when the &lt;code&gt;syslog&lt;/code&gt; feature is enabled
and the &lt;code&gt;logging.syslog&lt;/code&gt; config option is enabled. We've also added a new
&lt;code&gt;logging.protocol_warnings&lt;/code&gt; option to log protocol violations as warnings.&lt;/p&gt;
&lt;p&gt;Developers who use the &lt;code&gt;arti-client&lt;/code&gt; crate should note that in the release after this one,
we plan to change &lt;code&gt;TorClient&lt;/code&gt; to be wrapped in an &lt;code&gt;Arc&lt;/code&gt; explicitly,
rather than implicitly having &lt;code&gt;Arc&lt;/code&gt;-like semantics. Be prepared for this breaking change,
and if you have any thoughts about it, please speak up in &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/work_items/2469"&gt;#2469&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;As usual, there is also a signigicant amount of cleanup, improvements to testing,
infrastructure, and documentation, and many small bugfixes.&lt;/p&gt;
&lt;p&gt;For full details on what we've done, including API changes,
and for information about many more minor and less-visible changes,
please see the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/CHANGELOG.md#arti-230--7-may-2026"&gt;CHANGELOG&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;For more information on using Arti, see our top-level &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/README.md"&gt;README&lt;/a&gt;,
and the documentation for the &lt;a href="https://gitlab.torproject.org/tpo/core/arti/-/blob/main/crates/arti/README.md"&gt;&lt;code&gt;arti&lt;/code&gt; binary&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Thanks to everybody who's contributed to this release, including
Andrew Kloet, hjrgrn, and moumenalaoui.&lt;/p&gt;
&lt;p&gt;Also, our deep thanks to our &lt;a href="https://www.torproject.org/about/sponsors/"&gt;sponsors&lt;/a&gt; for funding the development of Arti!&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/announcements"&gt;
          announcements
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Alpha Release: Tor Browser 16.0a6</title><link href="https://blog.torproject.org/new-alpha-release-tor-browser-160a6/" rel="alternate" /><updated>2026-05-07T00:00:00Z</updated><author><name>ma1
</name></author><id>urn:uuid:ff9d7f3f-5126-3b25-b2b4-882d7e5b7e81</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-alpha-release-tor-browser-160a6/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-alpha-release-tor-browser-160a6/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-alpha-release-tor-browser-160a6/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 16.0a6 is now available from the &lt;a href="https://www.torproject.org/download/alpha/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/16.0a6/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;p&gt;⚠️ &lt;strong&gt;Reminder&lt;/strong&gt;: The Tor Browser Alpha release-channel is for &lt;a href="https://community.torproject.org/user-research/become-tester/"&gt;testing only&lt;/a&gt;. As such, Tor Browser Alpha is not intended for general use because it is more likely to include bugs affecting usability, security, and privacy.&lt;/p&gt;
&lt;p&gt;Moreover, Tor Browser Alphas are now based on Firefox's betas. Please read more about this important change in the &lt;a href="https://blog.torproject.org/future-of-tor-browser-alpha/"&gt;Future of Tor Browser Alpha&lt;/a&gt; blog post.&lt;/p&gt;
&lt;p&gt;If you are an at-risk user, require strong anonymity, or just want a reliably-working browser, please stick with the &lt;a href="https://www.torproject.org/download/"&gt;stable release channel&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/main/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 16.0a5 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated tor to 0.4.9.7&lt;/li&gt;
&lt;li&gt;Updated NoScript to 13.6.18.90101984&lt;/li&gt;
&lt;li&gt;Updated OpenSSL to 3.5.6&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43857"&gt;Bug tor-browser#43857&lt;/a&gt;: Review in-source TODOs&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44402"&gt;Bug tor-browser#44402&lt;/a&gt;: Re-enable ESLint rule mozilla/no-browser-refs-in-toolkit as an error&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44749"&gt;Bug tor-browser#44749&lt;/a&gt;: Check search engines parameter replacements&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44792"&gt;Bug tor-browser#44792&lt;/a&gt;: Rebase alpha onto 150.0a1&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44796"&gt;Bug tor-browser#44796&lt;/a&gt;: Adjust TorProviderBuilder to report the provider state to consumers&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44828"&gt;Bug tor-browser#44828&lt;/a&gt;: Remove browser module references from toolkit/modules/ActorManagerParent.sys.mjs&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44841"&gt;Bug tor-browser#44841&lt;/a&gt;: TorDomainIsolator proxy filter returns null on exception instead of preserving SOCKS proxy&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44865"&gt;Bug tor-browser#44865&lt;/a&gt;: Block chrome://&lt;em&gt;/locale/&lt;/em&gt; to content&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44868"&gt;Bug tor-browser#44868&lt;/a&gt;: Backport 138c33ea964b2e0a4875aadc39d8a948e0c2aace to 150 to fix Windows builds&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44870"&gt;Bug tor-browser#44870&lt;/a&gt;: Remove legacy branch from gitlab templates&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44895"&gt;Bug tor-browser#44895&lt;/a&gt;: Undo the patch for #44772&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41775"&gt;Bug tor-browser-build#41775&lt;/a&gt;: Update list of Snowflake STUN servers in default bridge line, 2026 edition&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41778"&gt;Bug tor-browser-build#41778&lt;/a&gt;: Remove base-browser from protected-branches.py&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41780"&gt;Bug tor-browser-build#41780&lt;/a&gt;: Create sha256sums-unsigned-build.txt in artifacts/$platform directories&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 150.0a1&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/43824"&gt;Bug tor-browser#43824&lt;/a&gt;: Switch resource:// modules to use moz-src:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44288"&gt;Bug tor-browser#44288&lt;/a&gt;: New identity fails to block loading a custom home page&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44458"&gt;Bug tor-browser#44458&lt;/a&gt;: Fix the "Connect" and ".onion available" button height&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44560"&gt;Bug tor-browser#44560&lt;/a&gt;: Customize the flags for alternate 'Application Data' directories&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44630"&gt;Bug tor-browser#44630&lt;/a&gt;: Use settings config to hide settings, rather than data-hidden-from-search or commenting out&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44648"&gt;Bug tor-browser#44648&lt;/a&gt;: Unexpected changes to SearchService.sys.mjs&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44685"&gt;Bug tor-browser#44685&lt;/a&gt;: Use border radius for letterboxing&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44798"&gt;Bug tor-browser#44798&lt;/a&gt;: Don't load &lt;code&gt;about:torconnect&lt;/code&gt; into iframes&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44829"&gt;Bug tor-browser#44829&lt;/a&gt;: Hide the settings privacy card&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44832"&gt;Bug tor-browser#44832&lt;/a&gt;: Hide the Firefox mascot in about:neterror&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44846"&gt;Bug tor-browser#44846&lt;/a&gt;: about:torconnect redirect doesn't work with the new neterror page&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44847"&gt;Bug tor-browser#44847&lt;/a&gt;: Drop letterboxing sidebar rounded corner logic&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44902"&gt;Bug tor-browser#44902&lt;/a&gt;: Error in privacy preference initialisation due to missing &lt;code&gt;dataCollectionViewProfilesMultiProfileBackupWarning&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/31860"&gt;Bug tor-browser-build#31860&lt;/a&gt;: Start using LTO for firefox project&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44862"&gt;Bug tor-browser#44862&lt;/a&gt;: Fontvis is missing Segoe MDL2 Assets&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44868"&gt;Bug tor-browser#44868&lt;/a&gt;: Backport 138c33ea964b2e0a4875aadc39d8a948e0c2aace to 150 to fix Windows builds&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44850"&gt;Bug tor-browser#44850&lt;/a&gt;: Wrong path for bootstrapped tor daemon on macOS&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41476"&gt;Bug tor-browser-build#41476&lt;/a&gt;: Since 13.5-legacy is not longer supported, remove tools/signing/wrappers/sign-rcodesign&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44361"&gt;Bug tor-browser#44361&lt;/a&gt;: Notify Linux i686 users that they won't receive updates anymore&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44521"&gt;Bug tor-browser#44521&lt;/a&gt;: Disable widget.wayland.fractional-scale.enabled&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 150.0a1&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44615"&gt;Bug tor-browser#44615&lt;/a&gt;: Remove ability to "Rate/Review in Google Play" in app&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44827"&gt;Bug tor-browser#44827&lt;/a&gt;: Always enable noscript for android&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44842"&gt;Bug tor-browser#44842&lt;/a&gt;: Replace instances of SwitchPreference with SwitchPreferenceCompat&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44848"&gt;Bug tor-browser#44848&lt;/a&gt;: Do not overwrite Android toolchains on default mozconfigs&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44880"&gt;Bug tor-browser#44880&lt;/a&gt;: Fix edgeToEdge display issue presented in 150 android rebase&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44925"&gt;Bug tor-browser#44925&lt;/a&gt;: Fix bootstrap screen color styling for light mode presented in one of the rebases between 140 and 150&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44935"&gt;Bug tor-browser#44935&lt;/a&gt;: Remove incorrectly shown "open in app" notification dot on settings button&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41591"&gt;Bug tor-browser-build#41591&lt;/a&gt;: Remove support for old mar filenames when 13.5 legacy branch is EOL&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41764"&gt;Bug tor-browser-build#41764&lt;/a&gt;: Update toolchains for Firefox 150&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41767"&gt;Bug tor-browser-build#41767&lt;/a&gt;: Add jwilde to allowed signer for browser projects&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41778"&gt;Bug tor-browser-build#41778&lt;/a&gt;: Remove base-browser from protected-branches.py&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41780"&gt;Bug tor-browser-build#41780&lt;/a&gt;: Create sha256sums-unsigned-build.txt in artifacts/$platform directories&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41786"&gt;Bug tor-browser-build#41786&lt;/a&gt;: Add comment to rbm.local.conf.example warning about potential recursive loops in tmp_dir definition&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/rbm/-/issues/40106"&gt;Bug rbm#40106&lt;/a&gt;: Improve error message in case of recursive definition&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41759"&gt;Bug tor-browser-build#41759&lt;/a&gt;: Remove references to legacy release in tor-browser-build&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + Linux + Android&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41770"&gt;Bug tor-browser-build#41770&lt;/a&gt;: Update Go to 1.26.x&lt;/li&gt;
&lt;li&gt;Updated Go to 1.26.2&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44853"&gt;Bug tor-browser#44853&lt;/a&gt;: Update target in mozconfig-windows-x86_64 and mozconfig-windows-i686&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;macOS&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41773"&gt;Bug tor-browser-build#41773&lt;/a&gt;: Change the position of -mindepth when creating the dmg&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Linux&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44555"&gt;Bug tor-browser#44555&lt;/a&gt;: Remove mozconfig-linux-i686&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44848"&gt;Bug tor-browser#44848&lt;/a&gt;: Do not overwrite Android toolchains on default mozconfigs&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tor Browser 15.0.12</title><link href="https://blog.torproject.org/new-release-tor-browser-15012/" rel="alternate" /><updated>2026-05-07T00:00:00Z</updated><author><name>ma1
</name></author><id>urn:uuid:3da2dd6a-b895-37f8-aa5a-5ec11e7d9192</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tor-browser-15012/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tor-browser-15012/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tor-browser-15012/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;Tor Browser 15.0.12 is now available from the &lt;a href="https://www.torproject.org/download/"&gt;Tor Browser download page&lt;/a&gt; and also from our &lt;a href="https://www.torproject.org/dist/torbrowser/15.0.12/"&gt;distribution directory&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This version includes important &lt;a href="https://www.mozilla.org/en-US/security/advisories/"&gt;security updates&lt;/a&gt; to Firefox.&lt;/p&gt;
&lt;h2&gt;Send us your feedback&lt;/h2&gt;
&lt;p&gt;If you find a bug or have a suggestion for how we could improve this release, &lt;a href="https://support.torproject.org/misc/bug-or-feedback/"&gt;please let us know&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Full changelog&lt;/h2&gt;
&lt;p&gt;The &lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/raw/maint-15.0/projects/browser/Bundle-Data/Docs-TBB/ChangeLog.txt"&gt;full changelog&lt;/a&gt; since Tor Browser 15.0.11 is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;Updated tor to 0.4.9.7&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44940"&gt;Bug tor-browser#44940&lt;/a&gt;: Rebase Tor Browser stable onto 140.10.2esr&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Windows + macOS + Linux&lt;ul&gt;
&lt;li&gt;Updated Firefox to 140.10.2esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44746"&gt;Bug tor-browser#44746&lt;/a&gt;: Funding the Commons Implementation (Desktop)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Android&lt;ul&gt;
&lt;li&gt;Updated GeckoView to 140.10.2esr&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser/-/issues/44747"&gt;Bug tor-browser#44747&lt;/a&gt;: Funding the Commons Implementation (Android)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Build System&lt;ul&gt;
&lt;li&gt;All Platforms&lt;ul&gt;
&lt;li&gt;&lt;a href="https://gitlab.torproject.org/tpo/applications/tor-browser-build/-/issues/41781"&gt;Bug tor-browser-build#41781&lt;/a&gt;: Fix clean section in rbm.local.conf.example&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/applications"&gt;
          applications
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>3 Days of Fun with Tor</title><link href="https://blog.torproject.org/tor-community-gathering-2026/" rel="alternate" /><updated>2026-05-06T00:00:00Z</updated><author><name>GeKo, ahf, ln5
</name></author><id>urn:uuid:3a841fec-415e-32af-a681-d521494f94fa</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/tor-community-gathering-2026/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/tor-community-gathering-2026/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/tor-community-gathering-2026/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;After organizing a successful &lt;a href="https://blog.torproject.org/bringing-tor-community-together/"&gt;first community gathering last year in Denmark&lt;/a&gt;, we were eager to find out: Could we get another productive, community-organized meeting off the ground taking into account what we've learned so far?&lt;/p&gt;
&lt;h2&gt;Preparations&lt;/h2&gt;
&lt;p&gt;We decided to do the next community gathering organized by us at the same location we used last year: Hylkedam, in Denmark. We knew it worked well, was sufficiently cheap, and we could likely cut down the overall planning overhead given our past experience there. And, indeed, planning was minimal, reusing much of the "playbook" we developed for our first meeting last year. We spent most of our preparation time on revamping our meeting website. We have &lt;a href="https://onionize.space/"&gt;a shiny new onionized space&lt;/a&gt; now, including &lt;a href="https://lists.onionize.space/mailman3/postorius/lists/tcg.lists.onionize.space/"&gt;a public mailing list&lt;/a&gt;!&lt;/p&gt;
&lt;h2&gt;3 days of fun with Tor&lt;/h2&gt;
&lt;p&gt;We gathered on the weekend of March 13 - 15 at Hylkedam. Overall we were a little less people this time (around 12) but had, on the plus side, participants with backgrounds not being present at our first Tor community gathering: we got the research angle covered this time (with focus on anti-censorship) and had people from &lt;a href="https://reproducible-builds.org/"&gt;the Reproducible Builds project&lt;/a&gt; attending. The latter allowed us to think about potentially doing community gatherings together, which would make collaboration and sharing of ideas easier between our projects. Talking about research on the other hand has been very inspiring as we could see what is currently happening in the research world and help shaping particular project plans by explaining related tools and already existing projects and needs within the Tor eco system.&lt;/p&gt;
&lt;p&gt;Apart from the new contributions we were happy as well to see that various work started at the previous gathering got picked up and pushed forward again, showing the overall commitment of our volunteers in the community. Notably, we saw further improvements to the network social graph proof of concept project and the relay operator Grafana dashboard. We also continued &lt;a href="https://gitlab.torproject.org/linus/tor-consensus-transparency"&gt;the discussion around consensus-transparency&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;We had the usual structure during our meeting days, following the established cycle of: opening session -&amp;gt; structured sessions -&amp;gt; unstructured sessions -&amp;gt; closing circle, which, again, worked pretty well. Unstructured sessions included general free hacking time and room for getting ad hoc together, thinking through or working on a topic that might have come up during the more structured sessions previously or is just not ready for "prime time" yet. We think that this time without a moderator and a clear session time limit is an essential part of making the whole meeting productive, as it gives the participants the freedom to work on random things they are interested in and might get excited about.&lt;/p&gt;
&lt;p&gt;For the structured sessions we made sure we had note takers again, so someone not being able to attend can get up to speed afterwards. We had a set of different topics again, ranging from anti-censorship related sessions to an update on upcoming changes for relay operators and a session dedicated to how the community can get organized itself, so we would have similar gatherings or an 'onion festival' in the future. Check out &lt;a href="https://onionize.space/2026/sessions/"&gt;the session notes on our website&lt;/a&gt;, in case you are interested!&lt;/p&gt;
&lt;h2&gt;What's next?&lt;/h2&gt;
&lt;p&gt;We plan to have more Tor community meetings in the future. As already said: they don't have to be at Hylkedam (we'd like to see other venues as well!), nor does it have to be the same group of people sharing the organization workload. So, if you are excited about what you read in this blog post and are experiencing a serious case of FOMO or want to help organize future community gatherings, get in touch! Our mailing list[3] is a good starting point for that.&lt;/p&gt;
&lt;p&gt;The same goes for providing feedback about this format and how we can make such events more inviting and inclusive in the future. Want to be invited, too? Let us know as well!&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>New Release: Tails 7.7.2</title><link href="https://blog.torproject.org/new-release-tails-7_7_2/" rel="alternate" /><updated>2026-05-04T00:00:00Z</updated><author><name>tails
</name></author><id>urn:uuid:35ad341c-58e4-3f9b-87b2-5e2f2c2cc27c</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/new-release-tails-7_7_2/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/new-release-tails-7_7_2/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/new-release-tails-7_7_2/lead.jpg"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;This release is an emergency release to fix a critical security vulnerability
in the Linux kernel.&lt;/p&gt;
&lt;h2&gt;Changes and updates&lt;/h2&gt;
&lt;p&gt;Update the &lt;em&gt;Linux&lt;/em&gt; kernel to 6.12.85, which fixes &lt;a href="https://copy.fail/"&gt;Copy Fail&lt;/a&gt;, a vulnerability that could allow an application in Tails to gain administration privileges.&lt;/p&gt;
&lt;p&gt;For example, if an attacker was able to exploit other unknown security
vulnerabilities in an application included in Tails, they might then use Copy
Fail to take full control of your Tails and deanonymize you.&lt;/p&gt;
&lt;p&gt;We are not aware of this vulnerability being used in practice until now.&lt;/p&gt;
&lt;h2&gt;Fixed problems&lt;/h2&gt;
&lt;p&gt;For more details, read our
&lt;a href="https://gitlab.tails.boum.org/tails/tails/-/blob/master/debian/changelog"&gt;changelog&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Get Tails 7.7.2&lt;/h2&gt;
&lt;h3&gt;To upgrade your Tails USB stick and keep your Persistent Storage&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Automatic upgrades are available from Tails 7.0 or later to 7.7.2.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If you cannot do an automatic upgrade or if Tails fails to start after an automatic upgrade, please try to do a &lt;a href="https://tails.net/doc/upgrade/#manual"&gt;manual upgrade&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;To install Tails 7.7.2 on a new USB stick&lt;/h3&gt;
&lt;p&gt;Follow our &lt;a href="https://tails.net/install/"&gt;installation instructions&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The Persistent Storage on the USB stick will be lost if you install instead of
upgrading.&lt;/p&gt;
&lt;h3&gt;To download only&lt;/h3&gt;
&lt;p&gt;If you don't need installation or upgrade instructions, you can download Tails
7.7.2 directly:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download/"&gt;For USB sticks (USB image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tails.net/install/download-iso/"&gt;For DVDs and virtual machines (ISO image)&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Support and feedback&lt;/h2&gt;
&lt;p&gt;For support and feedback, visit the &lt;a href="https://tails.net/support/"&gt;Support
section&lt;/a&gt; on the Tails website.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/tails"&gt;
          tails
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/releases"&gt;
          releases
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry><entry><title>Tor Project Statement on the Abrupt Cancellation of RightsCon 2026</title><link href="https://blog.torproject.org/rightscon2026-statement-Tor-Project/" rel="alternate" /><updated>2026-04-30T00:00:00Z</updated><author><name>isabela
</name></author><id>urn:uuid:9f7c80be-39ad-31a3-a4f6-dc72325f1be5</id><content type="html">
  &lt;article class="blog-post"&gt;
    &lt;picture&gt;
      &lt;source media="(min-width:415px)" srcset="https://blog.torproject.org/static/images/lead.webp" type="image/webp"&gt;
&lt;source srcset="https://blog.torproject.org/static/images/lead_small.webp" type="image/webp"&gt;

      &lt;img class="lead" referrerpolicy="no-referrer" loading="lazy" src="https://blog.torproject.org/static/images/lead.png"&gt;
    &lt;/picture&gt;
    &lt;div class="body"&gt;&lt;p&gt;The Tor Project is deeply saddened by the last-minute cancellation of &lt;a href="https://www.rightscon.org/"&gt;RightsCon 2026&lt;/a&gt; in Lusaka, Zambia, and online. The right to assemble, associate, and speak freely must not be conditioned on political approval. Convenings like RightsCon are essential precisely because they create space for difficult, urgent, and necessary conversation about power, technology, rights, and accountability.&lt;/p&gt;
&lt;p&gt;Tor's work is rooted in the belief that everyone should be able to speak freely, safely, and privately. We build tools that help people connect, communicate, organize, and seek information; especially those facing censorship, surveillance, repression, discrimination, and other forms of vulnerability. The disruption of a space dedicated to advancing these shared goals represents a serious gutpunch to the global human rights community.&lt;/p&gt;
&lt;p&gt;While the cancellation may have been the only responsible path to prevent further harm to the community, the circumstances that made it necessary are unacceptable. This moment underscores why the fight against censorship, surveillance, and restrictions on civic participation remains urgent.&lt;/p&gt;
&lt;p&gt;We share the deep concerns expressed by those directly affected: participants who were already traveling or preparing to travel, speakers and organizers who invested significant labor into this gathering, communities who were counting on these conversations, and local partners and small businesses who now face the consequences of a cancellation &lt;a href="https://www.techpolicy.press/rightscon-canceled-after-zambia-requires-full-alignment-with-national-values/"&gt;imposed over night.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;We stand in solidarity with the &lt;a href="https://www.rightscon.org/"&gt;RightsCon&lt;/a&gt; and &lt;a href="https://www.accessnow.org/"&gt;Access Now&lt;/a&gt; teams, who have worked to protect the safety and integrity of the community under extremely difficult circumstances. We also stand firmly with local organizers, digital rights defenders, and civil society actors in Zambia and across the region, who are left to absorb the backlash of a broader and longstanding pattern of repression against civil society.&lt;/p&gt;
&lt;p&gt;For Tor, RightsCon has been especially important because it allows us to connect directly with the people and organizations who use, teach, and share our tools with their communities. Our organization has &lt;a href="https://blog.torproject.org/event/tor-silicon-valley-human-rights-conference/"&gt;participated in RightsCon since its first edition in 2011&lt;/a&gt;. Over the years, it has become a central gathering place for our broader community: a space where small open source hacker nonprofits could collaborate with more established, mainstream human rights organizations.&lt;/p&gt;
&lt;p&gt;Tor remains committed to advancing human rights online AND offline, supporting vulnerable internet users globally, and building technologies that help people break through censorship and reclaim their right to communicate freely. We will continue to work alongside the digital rights community in solidarity.&lt;/p&gt;

    &lt;/div&gt;
  &lt;div class="categories"&gt;
    &lt;ul&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/human-rights"&gt;
          human rights
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/global-south"&gt;
          global south
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/partners"&gt;
          partners
        &lt;/a&gt;
      &lt;/li&gt;&lt;li&gt;
        &lt;a href="https://blog.torproject.org/category/community"&gt;
          community
        &lt;/a&gt;
      &lt;/li&gt;&lt;/ul&gt;
  &lt;/div&gt;
  &lt;/article&gt;
</content></entry></feed>