Tor Browser 7.0.11 is released
The full changelog since Tor Browser 7.0.10 is:
Всё открывается. Проблем нет.
Нифига неоткрываетса для Win XP
I was interrupted the website due to my personal reasons. Now I am interested to begin again to make my self safe.
connecting to this site using obfs4 works well, and I don't get blocked.
Using a bridge/obsf4 only changes how you connect to the Tor network, not how the websites you visit see you. All they see is a request from an exit relay. The website you linked to appears to block all exit relay ip addresses. This is not something that you can get around without the website in question unblocking exit node ip addresses.
Usa un nuevo circuito y ya
i like this software
Any luck with fixing thath NoScript button jumping to the right?
This issue should already be fixed. Did you have the NoScript button on the left before updating?
TOR updated this morning even though I always uncheck automatic updates to avoid losing all of my bookmarks. TOR worked for 5 minutes and crashed and now will not restart. I've lost all my bookmarks AGAIN!!!
copy them to a text document
export your bookmarks to a file and save it on a flashdrive so you can import them if it updates again
Backup - CSC101 - B4 changes are executed.
my noscript was on the left up until a few updates ago. It's been on the right ever since, even now.
1. Update to the latest version and Close TorBrowser.
2. Delete the "TorBrowser-Data" folder and reopen TorBrowser, that should fix the bug.
Hey, That works. Deleting & reopening. Great !
Giorgio fixed some of the issues, yes, but it seems not all, see https://trac.torproject.org/projects/tor/ticket/23968. What we are missing right now are steps to reproduce the remaining issues. Without those it is tricky to solve them... So, if you have any, please add them to the ticket, thanks!
It would be really nice if you were to fix bug #24136. I had a useful page that made life easier, but it requires opening another local file. The workaround defeats the purpose. We've had a few updates since this started, but it's looking like this one might be here to stay.
I actually hope Mozilla is doing the fix for us as it seems non-trivial. I think they plan to do so but I heard no ETA yet.
This website cannot provide a secure connection warning in ms edge and slimjet browsers, ISP is Talktalk, are they blocking??? I have downloaded and installed successfully through filehippo :-)
is it safe to use Evolution email-client (with 7.0.11 TB) for an onion_webmail imap/pop settings ?
(thunderbird is not maintained & not included as add-on. )
Thanks for your software ..
Der Browser wird immer besser Ihr seid einfach Perfekt. Herzlichen Dank für Alles
Thanks for the great software.
For your second question, I'd like to mention that putting a proxy after Tor is rarely a good idea. It centralizes all your traffic and defeats the purpose of having rotating exit nodes. If you really have to connect to an individual website that is blocking Tor, try using a web proxy like kproxy.com or something, in Tor browser of course.
Depends on who your adversaries are, and how dangerous it would be to you if they were able to compromise your brower.
If you don't have such powerful adversaries then perhaps you don't need to worry about that. Or there are other steps you can take, such as using Whonix or sandboxed-tor-browser, to reduce the risks if your browser is compromised.
As far as proxies go, I think you'll find any free proxy service will look just as "suspicious", to server operators, as Tor. Paid services may appear more "reputable" because they're both less popular in general, and less appealing to spammers.
Great reply, but I think more needs to be said about this:
> If you don't have such powerful adversaries then perhaps you don't need to worry about that.
I think that almost everyone is seriously underestimating their chances of being victimized by a "serious" attack by a well-funded attacker. For at least two reasons:
o because some attacks are easily converted into dragnet attacks (e.g. targeting all Tor users) and because some well-funded attackers (e.g. cyberespionage-as-a-service companies) are clearly happy to perform dragnet attacks on entire classes of internet users,
o more and more cyberespionage-as-a-service companies, often founded by former FBI, USSS, NSA/TAO agents with experience in creating malware, keep appearing, because more and more large corporations and nasty governments are demanding their services; among the most popular is "active defense" which means using social media to suss out potential adversaries, finding their IPs, and attacking their personal devices; increasingly, almost anyone who engages in political activity in a dozens of countries including "Western democracies" is likely to be surveilled by these companies acting on behalf of government or corporate clients; known victims include dozens of
+ fracking protest groups
+ oil pipeline protest groups
+ Black Lives Matter, Occupy, and other social justice movements
+ human righst groups (including the best known such as Amnesty and HRW)
+ foreclosure and mega-bank protest groups
+ net-neutrality supporters
For more information, please see
USPERs please note that at least one of the UK-based companies mentioned in The Guardian, TASK International, appears to have an active US branch (in FL).
There are many cyberespionage-as-a-service companies based in such places as USA, EU, India, South Asia, and Russia, but the best known are Gamma International (London and Munich), maker of FinFisher, Hacking Team (Italy), NSO Group (Israel) and Cyberbit (Israel, formed by merging NICE Ltd and portions of Elbit Systems, the Israeli spy/kill-drone maker; see the books on NSA by James Bamford for more background on NICE's business relations with the biggest US telecoms) .
My feeling is that pretty much anyone who is politically active needs to use Tor, strong end-to-end encryption, and other privacy/security-enhancing tools.
i noticed few mistakes :
1° * dragnet : more relays, more users, the next generation of onions could help.
2° * as service = Contract manufacturer
it is like that most of secret service work afaik.
- cyber-espionage : related at police/deviance/free lance.
- Western democracies : do you mean an occupied area with a fake label ? It is an E.U. plan not an US one.
- caterpilar does not obeys to u.k orders but to fr/israeli joint-venture (organized crime)
- the business relations with the telecom are a part of counter-terrorism & anti-mafia ops.
Tor can't do nothing against Professional Parabolic Microphone & harassment/racket/missing person/fake news/fake uspers.
The roses grow up on the dung-heap , almost everyone is seriously over estimating their chances to not be a victim after a "serious" attack by a well-funded attacker.
My feeling is that if you can't beat it , they can be stopped by their allies.
Using Tor, strong end-to-end encryption, and other privacy/security-enhancing tools ; it can be reported, denounced, and their criminal plot will fail.
When will Tor Browser get Firefox 59? It is much faster than the current version, and it looks better!
And as a ...betterment the addons GUI api gets ...impractical.
How can I have a personal email using Tor?
You realize hushmail is the one that gave their logs to the FBI with no resistance a while back, right? Their reputation is almost as bad as HMA is now days. I thought we were over recommending those scammers.
That's one of the long-standing unsolved problems for Tor users, and I believe it is fair to say that most experts think it is unsolvable.
One point here is that most email services require you to log in as a unique user (and to use some payment method), and sending any unique identifier over Tor would appear to be inconsistent with anonymity, which is the purpose of Tor.
I would urge you to explore using end-to-end encrypted messaging instead. I have great hopes for Tor Messenger (a still experimential project of Tor Project which may eventually be incorporated into Tails; see tails.boum.org), but you can try Signal. In a recent tweet, Edward Snowden recommends using Signal with Tor.
Careful. "Anonymity" is a tricky concept. What Tor provides you could be called location privacy: whatever site you visit/wherever you log in those folks providing the services don't see where you are from doing so. And in that way doing email over Tor is working perfectly fine.
I'd love to hear your thoughts on "Onions Everywhere" (analogous to "HTTPS Everywhere").
I am seeing the update in green on tor's menu. So I clicked on it. Then my antivirus software then requests to block the firefox.exe and tor.exe files from opening. These files are legit, right? What should I do? Tech dummy here. Please help, anyone?
I'm sure someone else has a better answer, but you should make sure that you downloaded from the real Tor Project website, using HTTPS. You can be additionally sure by using GnuPG to verify the downloads. The website provides explanations on how to do this.
Antivirus software is never perfect and can generate false alarms. Executable files (.exe's) could easily carry nasty stuff, so it's not surprising your AV software would be worried about them. But since you know these two files are coming from the Tor project, just go ahead and install them.
my avg does not like the new version of firefox.exe too. I did add it to the exeption list.