Tor Browser 7.0.4 is released
Tor Browser 7.0.4 is now available from the Tor Browser Project page and also from our distribution directory.
This release features important security updates to Firefox.
A lot of Tor Browser components have been updated in this release. Apart from the usual Firefox update (to 52.3.0esr) we include a new Tor stable release (0.3.0.10) + an updated HTTPS-Everywhere (5.2.21) and NoScript (5.0.8.1).
In this new release we continue to fix regressions that happened due to the transition to Firefox 52. Most notably, we avoid the scary warnings popping up when entering passwords on .onion sites without a TLS certificate (bug 21321). Handling of our default start page (about:tor) has improved, too, so that using the searchbox on it is working again and it does no longer need enhanced privileges in order to function.
The full changelog since Tor Browser 7.0.2 (for Linux since Tor Browser 7.0.3) is:
- All Platforms
- Update Firefox to 52.3.0esr
- Update Tor to 0.3.0.10
- Update Torbutton to 1.9.7.5
- Update Tor Launcher to 0.2.12.3
- Bug 22592: Default bridge settings are not removed
- Translations update
- Update HTTPS-Everywhere to 5.2.21
- Update NoScript to 5.0.8.1
- Bug 21321: Exempt .onions from HTTP related security warnings
- Bug 22073: Disable GetAddons option on addons page
- Bug 22884: Fix broken about:tor page on higher security levels
- Windows
- OS X
- Bug 22829: Remove default obfs4 bridge riemann.
Join the discussion...
We encourage respectful, on-topic comments. Comments that violate our Code of Conduct will be deleted. Off-topic comments may be deleted at the discretion of the post moderator. Please do not comment as a way to receive support or report bugs on a post unrelated to a release. If you are looking for support, please see our support portal or ways to get in touch with us.
dear tor, i found this…
dear tor, i found this surfing the deepweb and wanted you to know. don't know if its fake or real but you might know...
http://yjrb5bvdgbrs2rhi.onion
Experiments on realistic conditions
This contains the code we used for our paper, "On Realistically Attacking Tor with Website Fingerprinting."
We wrote "notes" for each of the following, which describes how to run and use the files:
Training update. For testing a training set updating scheme.
Splitting. For split finding, split decision, and pre-splitting. About 100 MB.
Classifier. Takes packet sequences collected in the wild as input, and performs time-based splitting, classification-based splitting, and kNN classification on them. About 700 MB.
Tor Logging. Implementation of Tor logging for the above. This is necessary for the file format required by the classifier. Note that the classifier is only allowed to look at time and direction; other information is not available to the website fingerprinting attacker.